diff --git a/Makefile b/Makefile index b212794..9eb65b9 100644 --- a/Makefile +++ b/Makefile @@ -42,15 +42,19 @@ test: build .PHONY: testdb testdb: export DB_BACKEND=sqlite -testdb: export DB_PATH=out/testdb/output2_sqlite_NoDBPATH.db +testdb: export DB_PATH=out/testdb/output_db.db testdb: build rm -f ./out/output.html rm -f ./out/output2.html rm -f ./out/testdb/output_sqlite_summary.db rm -f ./out/testdb/output2_sqlite_summary.db + rm -f ./out/testdb/output_db.db .${BINARY} -name "KVM Linux" -repo "github.com/kubernetes/minikube/" -pr "6096" -in "testdata/minikube-logs.json" -out_html "./out/output.html" -out_summary out/output_summary.json -db_path out/testdb/output_sqlite_summary.db -details "0c07e808219403a7241ee5a0fc6a85a897594339" .${BINARY} -name "KVM Linux" -repo "github.com/kubernetes/minikube/" -pr "6096" -in "testdata/Docker_Linux.json" -out_html "./out/output2.html" -out_summary out/output2_summary.json -db_path out/testdb/output2_sqlite_summary.db -details "0c07e808219403a7241ee5a0fc6a85a897594339" .${BINARY} -name "KVM Linux" -repo "github.com/kubernetes/minikube/" -pr "6096" -in "testdata/Docker_Linux.json" -out_html "./out/output2NoDBPath.html" -details "0c07e808219403a7241ee5a0fc6a85a897594339" + .${BINARY} -name "Docker MacOS" -repo "github.com/kubernetes/minikube/" -pr "16569" -in "testdata/testdb/Docker_macOS.json" -out_html "./out/docker_macOS_output.html" -details "0168d63fc8c165681b1cad1801eadd6bbe2c8a5c" + .${BINARY} -name "KVM Linux containerd" -repo "github.com/kubernetes/minikube/" -pr "16569" -in "testdata/testdb/KVM_Linux_containerd.json" -out_html "./out/kvm_linux_containerd_output.html" -details "0168d63fc8c165681b1cad1801eadd6bbe2c8a5c" + .${BINARY} -name "QEMU MacOS" -repo "github.com/kubernetes/minikube/" -pr "16569" -in "testdata/testdb/QEMU_macOS.json" -out_html "./out/qemu_macos_output.html" -details "0168d63fc8c165681b1cad1801eadd6bbe2c8a5c" .PHONY: cross diff --git a/pkg/db/db.go b/pkg/db/db.go index 807b316..696e01b 100644 --- a/pkg/db/db.go +++ b/pkg/db/db.go @@ -7,8 +7,8 @@ import ( "github.com/medyagh/gopogh/pkg/models" ) -// Config is database configuration -type Config struct { +// config is database configuration +type config struct { Type string Path string } @@ -20,11 +20,11 @@ type datab interface { Initialize() error } -// New handles which database driver to use and initializes the db -func New(cfg Config) (datab, error) { +// newDB handles which database driver to use and initializes the db +func newDB(cfg config) (datab, error) { switch cfg.Type { case "sqlite": - return NewSQLite(cfg) + return newSQLite(cfg) default: return nil, fmt.Errorf("unknown backend: %q", cfg.Type) } @@ -47,7 +47,7 @@ func FromEnv(backend string, path string) (datab, error) { return nil, fmt.Errorf("missing DB_PATH") } - c, err := New(Config{ + c, err := newDB(config{ Type: backend, Path: path, }) diff --git a/pkg/db/sqlite.go b/pkg/db/sqlite.go index c6c8c29..e675bd1 100644 --- a/pkg/db/sqlite.go +++ b/pkg/db/sqlite.go @@ -20,7 +20,9 @@ var createEnvironmentTestsTableSQL = ` NumberOfFail INTEGER, NumberOfPass INTEGER, NumberOfSkip INTEGER, - PRIMARY KEY (CommitID) + TotalDuration REAL, + GopoghVersion TEXT, + PRIMARY KEY (CommitID, EnvName) ); ` var createTestCasesTableSQL = ` @@ -29,17 +31,20 @@ var createTestCasesTableSQL = ` CommitId TEXT, TestName TEXT, Result TEXT, - PRIMARY KEY (CommitId, TestName) + Duration REAL, + EnvName TEXT, + TestOrder INTEGER, + PRIMARY KEY (CommitId, EnvName, TestName) ); ` -type SQLite struct { +type sqlite struct { db *sqlx.DB path string } // Set adds/updates rows to the database -func (m *SQLite) Set(commitRow models.DBEnvironmentTest, dbRows []models.DBTestCase) error { +func (m *sqlite) Set(commitRow models.DBEnvironmentTest, dbRows []models.DBTestCase) error { tx, err := m.db.DB.Begin() if err != nil { return fmt.Errorf("failed to create SQL transaction: %v", err) @@ -52,7 +57,7 @@ func (m *SQLite) Set(commitRow models.DBEnvironmentTest, dbRows []models.DBTestC } }() - sqlInsert := `INSERT OR REPLACE INTO db_test_cases (PR, CommitId, TestName, Result) VALUES (?, ?, ?, ?)` + sqlInsert := `INSERT OR REPLACE INTO db_test_cases (PR, CommitId, TestName, Result, Duration, EnvName, TestOrder) VALUES (?, ?, ?, ?, ?, ?, ?)` stmt, err := tx.Prepare(sqlInsert) if err != nil { return fmt.Errorf("failed to prepare SQL insert statement: %v", err) @@ -60,14 +65,14 @@ func (m *SQLite) Set(commitRow models.DBEnvironmentTest, dbRows []models.DBTestC defer stmt.Close() for _, r := range dbRows { - _, err := stmt.Exec(r.PR, r.CommitID, r.TestName, r.Result) + _, err := stmt.Exec(r.PR, r.CommitID, r.TestName, r.Result, r.Duration, r.EnvName, r.TestOrder) if err != nil { return fmt.Errorf("failed to execute SQL insert: %v", err) } } - sqlInsert = `INSERT OR REPLACE INTO db_environment_tests (CommitID, EnvName, GopoghTime, TestTime, NumberOfFail, NumberOfPass, NumberOfSkip) VALUES (?, ?, ?, ?, ?, ?, ?)` - _, err = tx.Exec(sqlInsert, commitRow.CommitID, commitRow.EnvName, commitRow.GopoghTime, commitRow.TestTime, commitRow.NumberOfFail, commitRow.NumberOfPass, commitRow.NumberOfSkip) + sqlInsert = `INSERT OR REPLACE INTO db_environment_tests (CommitID, EnvName, GopoghTime, TestTime, NumberOfFail, NumberOfPass, NumberOfSkip, TotalDuration, GopoghVersion) VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?)` + _, err = tx.Exec(sqlInsert, commitRow.CommitID, commitRow.EnvName, commitRow.GopoghTime, commitRow.TestTime, commitRow.NumberOfFail, commitRow.NumberOfPass, commitRow.NumberOfSkip, commitRow.TotalDuration, commitRow.GopoghVersion) if err != nil { return fmt.Errorf("failed to execute SQL insert: %v", err) } @@ -79,8 +84,8 @@ func (m *SQLite) Set(commitRow models.DBEnvironmentTest, dbRows []models.DBTestC return rollbackError } -// NewSQLite opens the database returning an SQLite database struct instance -func NewSQLite(cfg Config) (*SQLite, error) { +// newSQLite opens the database returning an SQLite database struct instance +func newSQLite(cfg config) (*sqlite, error) { if err := os.MkdirAll(filepath.Dir(cfg.Path), 0755); err != nil { return nil, fmt.Errorf("failed to create directory: %v", err) } @@ -88,7 +93,7 @@ func NewSQLite(cfg Config) (*SQLite, error) { if err != nil { return nil, fmt.Errorf("failed to open database connection: %v", err) } - m := &SQLite{ + m := &sqlite{ db: database, path: cfg.Path, } @@ -96,7 +101,7 @@ func NewSQLite(cfg Config) (*SQLite, error) { } // Initialize creates the tables within the SQLite database -func (m *SQLite) Initialize() error { +func (m *sqlite) Initialize() error { if _, err := m.db.Exec(createEnvironmentTestsTableSQL); err != nil { return fmt.Errorf("failed to initialize environment tests table: %w", err) diff --git a/pkg/models/models.go b/pkg/models/models.go index c18a5cb..3fb5e1b 100644 --- a/pkg/models/models.go +++ b/pkg/models/models.go @@ -33,19 +33,24 @@ type TestGroup struct { // DBTestCase represents a row in db table that holds each individual subtest type DBTestCase struct { - PR string - CommitID string - TestName string - Result string + PR string + CommitID string + TestName string + Result string + Duration float64 + EnvName string + TestOrder int } -// DBEnvironmentTest represents a row in db table that has finished tests in each environments +// DBEnvironmentTest represents a row in db table that has finished tests in each environment type DBEnvironmentTest struct { - CommitID string - EnvName string - GopoghTime string - TestTime string - NumberOfFail int - NumberOfPass int - NumberOfSkip int + CommitID string + EnvName string + GopoghTime string + TestTime string + NumberOfFail int + NumberOfPass int + NumberOfSkip int + TotalDuration float64 + GopoghVersion string } diff --git a/pkg/report/report.go b/pkg/report/report.go index 027fb45..4b57e93 100644 --- a/pkg/report/report.go +++ b/pkg/report/report.go @@ -115,18 +115,20 @@ func (c DisplayContent) SQL(dbPath string) error { dbTestRows := make([]models.DBTestCase, 0, expectedRowNumber) for resultType, testGroups := range c.Results { for _, test := range testGroups { - r := models.DBTestCase{PR: c.Detail.PR, CommitID: c.Detail.Details, TestName: test.TestName, Result: resultType} + r := models.DBTestCase{PR: c.Detail.PR, CommitID: c.Detail.Details, TestName: test.TestName, Result: resultType, Duration: test.Duration, EnvName: c.Detail.Name, TestOrder: test.TestOrder} dbTestRows = append(dbTestRows, r) } } dbEnvironmentRow := models.DBEnvironmentTest{ - CommitID: c.Detail.Details, - EnvName: c.Detail.Name, - GopoghTime: time.Now().String(), - TestTime: c.TestTime.String(), - NumberOfFail: len(c.Results[fail]), - NumberOfPass: len(c.Results[pass]), - NumberOfSkip: len(c.Results[skip]), + CommitID: c.Detail.Details, + EnvName: c.Detail.Name, + GopoghTime: time.Now().String(), + TestTime: c.TestTime.String(), + NumberOfFail: len(c.Results[fail]), + NumberOfPass: len(c.Results[pass]), + NumberOfSkip: len(c.Results[skip]), + TotalDuration: c.TotalDuration, + GopoghVersion: c.BuildVersion, } return database.Set(dbEnvironmentRow, dbTestRows) diff --git a/testdata/testdb/Docker_macOS.json b/testdata/testdb/Docker_macOS.json new file mode 100644 index 0000000..8272cd5 --- /dev/null +++ b/testdata/testdb/Docker_macOS.json @@ -0,0 +1,65361 @@ +{"Time":"2023-05-31T11:42:58.181341-07:00","Action":"start"} +{"Time":"2023-05-31T11:42:58.872464-07:00","Action":"output","Output":"Found 12 cores, limiting parallelism with --test.parallel=2\n"} +{"Time":"2023-05-31T11:42:58.872616-07:00","Action":"run","Test":"TestDownloadOnly"} +{"Time":"2023-05-31T11:42:58.872623-07:00","Action":"output","Test":"TestDownloadOnly","Output":"=== RUN TestDownloadOnly\n"} +{"Time":"2023-05-31T11:42:58.872662-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0"} +{"Time":"2023-05-31T11:42:58.872668-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":"=== RUN TestDownloadOnly/v1.16.0\n"} +{"Time":"2023-05-31T11:42:58.872675-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/json-events"} +{"Time":"2023-05-31T11:42:58.872682-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":"=== RUN TestDownloadOnly/v1.16.0/json-events\n"} +{"Time":"2023-05-31T11:42:58.87277-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" aaa_download_only_test.go:69: (dbg) Run: out/minikube-darwin-amd64 start -o=json --download-only -p download-only-601000 --force --alsologtostderr --kubernetes-version=v1.16.0 --container-runtime=docker --driver=docker \n"} +{"Time":"2023-05-31T11:43:17.710112-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" aaa_download_only_test.go:69: (dbg) Done: out/minikube-darwin-amd64 start -o=json --download-only -p download-only-601000 --force --alsologtostderr --kubernetes-version=v1.16.0 --container-runtime=docker --driver=docker : (18.837168612s)\n"} +{"Time":"2023-05-31T11:43:17.710281-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/preload-exists"} +{"Time":"2023-05-31T11:43:17.71029-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/preload-exists","Output":"=== RUN TestDownloadOnly/v1.16.0/preload-exists\n"} +{"Time":"2023-05-31T11:43:17.712085-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/cached-images"} +{"Time":"2023-05-31T11:43:17.712092-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":"=== RUN TestDownloadOnly/v1.16.0/cached-images\n"} +{"Time":"2023-05-31T11:43:17.712095-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":" aaa_download_only_test.go:117: Preload exists, images won't be cached\n"} +{"Time":"2023-05-31T11:43:17.712104-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/binaries"} +{"Time":"2023-05-31T11:43:17.712107-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":"=== RUN TestDownloadOnly/v1.16.0/binaries\n"} +{"Time":"2023-05-31T11:43:17.712109-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":" aaa_download_only_test.go:136: Preload exists, binaries are present within.\n"} +{"Time":"2023-05-31T11:43:17.712128-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/kubectl"} +{"Time":"2023-05-31T11:43:17.712133-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/kubectl","Output":"=== RUN TestDownloadOnly/v1.16.0/kubectl\n"} +{"Time":"2023-05-31T11:43:17.712151-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/LogsDuration"} +{"Time":"2023-05-31T11:43:17.712155-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"=== RUN TestDownloadOnly/v1.16.0/LogsDuration\n"} +{"Time":"2023-05-31T11:43:17.712176-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Run: out/minikube-darwin-amd64 logs -p download-only-601000\n"} +{"Time":"2023-05-31T11:43:17.991331-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Non-zero exit: out/minikube-darwin-amd64 logs -p download-only-601000: exit status 85 (278.361725ms)\n"} +{"Time":"2023-05-31T11:43:17.991356-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T11:43:17.99136-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:43:17.991363-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:17.991366-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T11:43:17.991369-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* |---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:17.991374-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T11:43:17.991377-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:17.99138-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-601000 | jenkins | v1.30.1 | 31 May 23 11:42 PDT | |\n"} +{"Time":"2023-05-31T11:43:17.991383-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | -p download-only-601000 | | | | | |\n"} +{"Time":"2023-05-31T11:43:17.991387-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:43:17.99139-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T11:43:17.991393-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --container-runtime=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:17.991397-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:17.9914-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:17.991403-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T11:43:17.991405-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:17.991408-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T11:43:17.991411-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* Log file created at: 2023/05/31 11:42:58\n"} +{"Time":"2023-05-31T11:43:17.991414-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tRunning on machine: MacOS-Agent-3\n"} +{"Time":"2023-05-31T11:43:17.991416-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tBinary: Built with gc go1.20.4 for darwin/amd64\n"} +{"Time":"2023-05-31T11:43:17.991424-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T11:43:17.991427-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.910661 1568 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:43:17.99143-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.910858 1568 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:17.991453-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.910863 1568 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:43:17.991456-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.910867 1568 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:17.99146-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.910982 1568 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:43:17.991464-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:42:58.911072 1568 root.go:312] Error reading config file at /Users/jenkins/minikube-integration/16569-1078/.minikube/config/config.json: open /Users/jenkins/minikube-integration/16569-1078/.minikube/config/config.json: no such file or directory\n"} +{"Time":"2023-05-31T11:43:17.99147-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.912610 1568 out.go:303] Setting JSON to true\n"} +{"Time":"2023-05-31T11:43:17.991475-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.934000 1568 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":746,\"bootTime\":1685557832,\"procs\":405,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T11:43:17.991489-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:42:58.934073 1568 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:43:17.991493-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.955690 1568 out.go:97] [download-only-601000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T11:43:17.991496-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.955927 1568 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:43:17.991498-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:58.976913 1568 out.go:169] MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:43:17.991502-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:42:58.955955 1568 preload.go:295] Failed to list preload files: open /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball: no such file or directory\n"} +{"Time":"2023-05-31T11:43:17.991512-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.020686 1568 out.go:169] KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T11:43:17.991515-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.041956 1568 out.go:169] MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T11:43:17.991518-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.063736 1568 out.go:169] MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:43:17.991523-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.084746 1568 out.go:169] MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T11:43:17.991528-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:42:59.126738 1568 out.go:272] minikube skips various validations when --force is supplied; this may lead to unexpected behavior\n"} +{"Time":"2023-05-31T11:43:17.991532-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.127221 1568 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:43:17.991537-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.181624 1568 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T11:43:17.991541-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.181728 1568 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:43:17.991552-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.278338 1568 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:0 ContainersRunning:0 ContainersPaused:0 ContainersStopped:0 Images:0 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:40 OomKillDisable:false NGoroutines:58 SystemTime:2023-05-31 18:42:59.267710093 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T11:43:17.991571-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T11:43:17.99158-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T11:43:17.991588-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T11:43:17.991601-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T11:43:17.991606-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.299578 1568 out.go:97] Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T11:43:17.991619-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.299624 1568 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T11:43:17.991624-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.299648 1568 start.go:875] validating driver \"docker\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:43:17.991629-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.299779 1568 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:43:17.99164-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.393429 1568 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:0 ContainersRunning:0 ContainersPaused:0 ContainersStopped:0 Images:0 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:40 OomKillDisable:false NGoroutines:58 SystemTime:2023-05-31 18:42:59.382228089 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T11:43:17.991647-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T11:43:17.991654-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T11:43:17.991662-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T11:43:17.991669-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T11:43:17.991672-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.393589 1568 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:43:17.991677-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.397831 1568 start_flags.go:382] Using suggested 5895MB memory alloc based on sys=32768MB, container=5943MB\n"} +{"Time":"2023-05-31T11:43:17.991696-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.397993 1568 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T11:43:17.991701-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.419691 1568 out.go:169] Using Docker Desktop driver with root privileges\n"} +{"Time":"2023-05-31T11:43:17.991703-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.440851 1568 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:43:17.991706-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.440890 1568 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T11:43:17.991708-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.440904 1568 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:43:17.991714-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t{Name:download-only-601000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:5895 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:download-only-601000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRu"} +{"Time":"2023-05-31T11:43:17.991718-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"ntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T11:43:17.991763-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.462543 1568 out.go:97] Starting control plane node download-only-601000 in cluster download-only-601000\n"} +{"Time":"2023-05-31T11:43:17.991768-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.462622 1568 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T11:43:17.991772-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.483793 1568 out.go:97] Pulling base image ...\n"} +{"Time":"2023-05-31T11:43:17.991776-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.483897 1568 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:17.99178-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.483988 1568 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T11:43:17.991784-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.533306 1568 cache.go:150] Downloading gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 to local cache\n"} +{"Time":"2023-05-31T11:43:17.991788-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.533618 1568 image.go:63] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local cache directory\n"} +{"Time":"2023-05-31T11:43:17.991791-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.533752 1568 image.go:118] Writing gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 to local cache\n"} +{"Time":"2023-05-31T11:43:17.991794-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.546054 1568 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.16.0/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:17.991796-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.546081 1568 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:43:17.991798-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.546354 1568 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:17.991808-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.567689 1568 out.go:97] Downloading Kubernetes v1.16.0 preload ...\n"} +{"Time":"2023-05-31T11:43:17.99181-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.567737 1568 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:17.991813-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.698974 1568 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.16.0/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4?checksum=md5:326f3ce331abb64565b50b8c9e791244 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:17.991816-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:12.591649 1568 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:17.991818-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:12.591799 1568 preload.go:256] verifying checksum of /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:17.99182-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:13.136222 1568 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T11:43:17.991822-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:13.136430 1568 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/download-only-601000/config.json ...\n"} +{"Time":"2023-05-31T11:43:17.991825-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:13.136456 1568 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/download-only-601000/config.json: {Name:mkdeb42fec362e7088735e1f2cac9b14313454c8 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:43:17.991827-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:13.136729 1568 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:17.99183-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:13.136981 1568 download.go:107] Downloading: https://dl.k8s.io/release/v1.16.0/bin/darwin/amd64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/amd64/kubectl.sha1 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/darwin/amd64/v1.16.0/kubectl\n"} +{"Time":"2023-05-31T11:43:17.991832-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:13.323317 1568 cache.go:153] successfully saved gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 as a tarball\n"} +{"Time":"2023-05-31T11:43:17.991836-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T11:43:17.991838-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:17.99184-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* The control plane node \"\" does not exist.\n"} +{"Time":"2023-05-31T11:43:17.991843-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t To start a cluster, run: \"minikube start -p download-only-601000\"\n"} +{"Time":"2023-05-31T11:43:17.991845-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T11:43:17.991847-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:43:17.991849-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:170: minikube logs failed with error: exit status 85\n"} +{"Time":"2023-05-31T11:43:17.991853-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2"} +{"Time":"2023-05-31T11:43:17.991855-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2","Output":"=== RUN TestDownloadOnly/v1.27.2\n"} +{"Time":"2023-05-31T11:43:17.991858-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/json-events"} +{"Time":"2023-05-31T11:43:17.99186-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":"=== RUN TestDownloadOnly/v1.27.2/json-events\n"} +{"Time":"2023-05-31T11:43:17.991862-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" aaa_download_only_test.go:69: (dbg) Run: out/minikube-darwin-amd64 start -o=json --download-only -p download-only-601000 --force --alsologtostderr --kubernetes-version=v1.27.2 --container-runtime=docker --driver=docker \n"} +{"Time":"2023-05-31T11:43:34.875766-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" aaa_download_only_test.go:69: (dbg) Done: out/minikube-darwin-amd64 start -o=json --download-only -p download-only-601000 --force --alsologtostderr --kubernetes-version=v1.27.2 --container-runtime=docker --driver=docker : (16.884151866s)\n"} +{"Time":"2023-05-31T11:43:34.875894-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/preload-exists"} +{"Time":"2023-05-31T11:43:34.875901-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/preload-exists","Output":"=== RUN TestDownloadOnly/v1.27.2/preload-exists\n"} +{"Time":"2023-05-31T11:43:34.876-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/cached-images"} +{"Time":"2023-05-31T11:43:34.876008-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":"=== RUN TestDownloadOnly/v1.27.2/cached-images\n"} +{"Time":"2023-05-31T11:43:34.876011-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":" aaa_download_only_test.go:117: Preload exists, images won't be cached\n"} +{"Time":"2023-05-31T11:43:34.876037-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/binaries"} +{"Time":"2023-05-31T11:43:34.87604-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":"=== RUN TestDownloadOnly/v1.27.2/binaries\n"} +{"Time":"2023-05-31T11:43:34.876043-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":" aaa_download_only_test.go:136: Preload exists, binaries are present within.\n"} +{"Time":"2023-05-31T11:43:34.876047-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/kubectl"} +{"Time":"2023-05-31T11:43:34.876048-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/kubectl","Output":"=== RUN TestDownloadOnly/v1.27.2/kubectl\n"} +{"Time":"2023-05-31T11:43:34.876087-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/LogsDuration"} +{"Time":"2023-05-31T11:43:34.876091-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"=== RUN TestDownloadOnly/v1.27.2/LogsDuration\n"} +{"Time":"2023-05-31T11:43:34.876111-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Run: out/minikube-darwin-amd64 logs -p download-only-601000\n"} +{"Time":"2023-05-31T11:43:35.156946-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Non-zero exit: out/minikube-darwin-amd64 logs -p download-only-601000: exit status 85 (280.28606ms)\n"} +{"Time":"2023-05-31T11:43:35.156959-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T11:43:35.156961-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:43:35.156963-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:35.156966-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T11:43:35.156968-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* |---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:35.15697-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T11:43:35.156972-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:35.156985-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-601000 | jenkins | v1.30.1 | 31 May 23 11:42 PDT | |\n"} +{"Time":"2023-05-31T11:43:35.156993-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | -p download-only-601000 | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.156996-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.156998-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.157-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --container-runtime=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.157002-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.15701-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-601000 | jenkins | v1.30.1 | 31 May 23 11:43 PDT | |\n"} +{"Time":"2023-05-31T11:43:35.157012-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | -p download-only-601000 | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.157026-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.157028-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.15703-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --container-runtime=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.157033-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:35.157035-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:35.157041-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T11:43:35.157043-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:35.157045-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T11:43:35.157048-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* Log file created at: 2023/05/31 11:43:18\n"} +{"Time":"2023-05-31T11:43:35.15705-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tRunning on machine: MacOS-Agent-3\n"} +{"Time":"2023-05-31T11:43:35.157052-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tBinary: Built with gc go1.20.4 for darwin/amd64\n"} +{"Time":"2023-05-31T11:43:35.157054-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T11:43:35.157056-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.029991 1601 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:43:35.157059-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.030165 1601 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:35.157061-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.030170 1601 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:43:35.157063-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.030174 1601 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:35.157065-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.030294 1601 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:43:35.157076-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:18.030391 1601 root.go:312] Error reading config file at /Users/jenkins/minikube-integration/16569-1078/.minikube/config/config.json: open /Users/jenkins/minikube-integration/16569-1078/.minikube/config/config.json: no such file or directory\n"} +{"Time":"2023-05-31T11:43:35.157078-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.031533 1601 out.go:303] Setting JSON to true\n"} +{"Time":"2023-05-31T11:43:35.157081-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.050601 1601 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":766,\"bootTime\":1685557832,\"procs\":399,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T11:43:35.157084-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:18.050697 1601 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:43:35.157087-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.071848 1601 out.go:97] [download-only-601000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T11:43:35.157089-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.072072 1601 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:43:35.157093-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.093693 1601 out.go:169] MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:43:35.157095-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.114908 1601 out.go:169] KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T11:43:35.157097-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.135988 1601 out.go:169] MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T11:43:35.1571-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.157923 1601 out.go:169] MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:43:35.157102-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.178843 1601 out.go:169] MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T11:43:35.157104-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:18.220701 1601 out.go:272] minikube skips various validations when --force is supplied; this may lead to unexpected behavior\n"} +{"Time":"2023-05-31T11:43:35.157106-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.221412 1601 config.go:182] Loaded profile config \"download-only-601000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T11:43:35.157109-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:18.221505 1601 start.go:783] api.Load failed for download-only-601000: filestore \"download-only-601000\": Docker machine \"download-only-601000\" does not exist. Use \"docker-machine ls\" to list machines. Use \"docker-machine create\" to add a new one.\n"} +{"Time":"2023-05-31T11:43:35.157112-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.221655 1601 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:43:35.157114-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:18.221704 1601 start.go:783] api.Load failed for download-only-601000: filestore \"download-only-601000\": Docker machine \"download-only-601000\" does not exist. Use \"docker-machine ls\" to list machines. Use \"docker-machine create\" to add a new one.\n"} +{"Time":"2023-05-31T11:43:35.157116-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.275992 1601 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T11:43:35.157118-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.276094 1601 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:43:35.157126-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.367156 1601 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:0 ContainersRunning:0 ContainersPaused:0 ContainersStopped:0 Images:0 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:40 OomKillDisable:false NGoroutines:58 SystemTime:2023-05-31 18:43:18.356992314 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T11:43:35.157135-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T11:43:35.157139-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T11:43:35.157142-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T11:43:35.157147-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T11:43:35.157149-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.388443 1601 out.go:97] Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T11:43:35.157151-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.388485 1601 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T11:43:35.157155-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.388535 1601 start.go:875] validating driver \"docker\" against \u0026{Name:download-only-601000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:5895 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:download-only-601000 Namespace:default APIServerName:"} +{"Time":"2023-05-31T11:43:35.157161-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: Socket"} +{"Time":"2023-05-31T11:43:35.157165-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"VMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T11:43:35.157167-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.388849 1601 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:43:35.157173-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.482919 1601 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:0 ContainersRunning:0 ContainersPaused:0 ContainersStopped:0 Images:0 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:40 OomKillDisable:false NGoroutines:58 SystemTime:2023-05-31 18:43:18.472334334 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T11:43:35.157177-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T11:43:35.15718-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T11:43:35.157189-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T11:43:35.157192-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T11:43:35.157194-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.485571 1601 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:43:35.157196-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.485592 1601 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:43:35.157198-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.485603 1601 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:43:35.157202-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t{Name:download-only-601000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:5895 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:download-only-601000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRu"} +{"Time":"2023-05-31T11:43:35.157205-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"ntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T11:43:35.157214-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.507257 1601 out.go:97] Starting control plane node download-only-601000 in cluster download-only-601000\n"} +{"Time":"2023-05-31T11:43:35.157216-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.507332 1601 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T11:43:35.15722-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.529062 1601 out.go:97] Pulling base image ...\n"} +{"Time":"2023-05-31T11:43:35.157222-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.529174 1601 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:43:35.157224-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.529262 1601 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T11:43:35.157227-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.579102 1601 cache.go:150] Downloading gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 to local cache\n"} +{"Time":"2023-05-31T11:43:35.157229-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.579265 1601 image.go:63] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local cache directory\n"} +{"Time":"2023-05-31T11:43:35.157232-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.579290 1601 image.go:66] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local cache directory, skipping pull\n"} +{"Time":"2023-05-31T11:43:35.157234-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.579297 1601 image.go:105] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in cache, skipping pull\n"} +{"Time":"2023-05-31T11:43:35.157237-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.579304 1601 cache.go:153] successfully saved gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 as a tarball\n"} +{"Time":"2023-05-31T11:43:35.157239-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.587982 1601 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.27.2/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:35.157242-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.587993 1601 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:43:35.157244-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.588138 1601 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:43:35.157246-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.609969 1601 out.go:97] Downloading Kubernetes v1.27.2 preload ...\n"} +{"Time":"2023-05-31T11:43:35.157248-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.610039 1601 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:35.157251-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:18.743164 1601 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.27.2/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4?checksum=md5:1858f4460df043b5f83c3d1ea676dbc0 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:35.157253-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:31.659089 1601 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:35.157255-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:31.659251 1601 preload.go:256] verifying checksum of /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:35.157258-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:32.266700 1601 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:43:35.15726-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:32.266784 1601 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/download-only-601000/config.json ...\n"} +{"Time":"2023-05-31T11:43:35.157262-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:32.267124 1601 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:43:35.157265-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:32.267341 1601 download.go:107] Downloading: https://dl.k8s.io/release/v1.27.2/bin/darwin/amd64/kubectl?checksum=file:https://dl.k8s.io/release/v1.27.2/bin/darwin/amd64/kubectl.sha256 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/darwin/amd64/v1.27.2/kubectl\n"} +{"Time":"2023-05-31T11:43:35.157267-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T11:43:35.157269-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:35.157271-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* The control plane node \"\" does not exist.\n"} +{"Time":"2023-05-31T11:43:35.157273-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t To start a cluster, run: \"minikube start -p download-only-601000\"\n"} +{"Time":"2023-05-31T11:43:35.157275-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T11:43:35.157277-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:43:35.157279-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:170: minikube logs failed with error: exit status 85\n"} +{"Time":"2023-05-31T11:43:35.157284-07:00","Action":"run","Test":"TestDownloadOnly/DeleteAll"} +{"Time":"2023-05-31T11:43:35.157286-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":"=== RUN TestDownloadOnly/DeleteAll\n"} +{"Time":"2023-05-31T11:43:35.157288-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":" aaa_download_only_test.go:187: (dbg) Run: out/minikube-darwin-amd64 delete --all\n"} +{"Time":"2023-05-31T11:43:35.760096-07:00","Action":"run","Test":"TestDownloadOnly/DeleteAlwaysSucceeds"} +{"Time":"2023-05-31T11:43:35.760111-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":"=== RUN TestDownloadOnly/DeleteAlwaysSucceeds\n"} +{"Time":"2023-05-31T11:43:35.76012-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":" aaa_download_only_test.go:199: (dbg) Run: out/minikube-darwin-amd64 delete -p download-only-601000\n"} +{"Time":"2023-05-31T11:43:36.110794-07:00","Action":"output","Test":"TestDownloadOnly","Output":" helpers_test.go:175: Cleaning up \"download-only-601000\" profile ...\n"} +{"Time":"2023-05-31T11:43:36.110811-07:00","Action":"output","Test":"TestDownloadOnly","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p download-only-601000\n"} +{"Time":"2023-05-31T11:43:36.45633-07:00","Action":"output","Test":"TestDownloadOnly","Output":"--- PASS: TestDownloadOnly (37.58s)\n"} +{"Time":"2023-05-31T11:43:36.456344-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" --- PASS: TestDownloadOnly/v1.16.0 (19.12s)\n"} +{"Time":"2023-05-31T11:43:36.456348-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" --- PASS: TestDownloadOnly/v1.16.0/json-events (18.84s)\n"} +{"Time":"2023-05-31T11:43:36.456353-07:00","Action":"pass","Test":"TestDownloadOnly/v1.16.0/json-events","Elapsed":18.84} +{"Time":"2023-05-31T11:43:36.4564-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/preload-exists","Output":" --- PASS: TestDownloadOnly/v1.16.0/preload-exists (0.00s)\n"} +{"Time":"2023-05-31T11:43:36.456402-07:00","Action":"pass","Test":"TestDownloadOnly/v1.16.0/preload-exists","Elapsed":0} +{"Time":"2023-05-31T11:43:36.456404-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":" --- SKIP: TestDownloadOnly/v1.16.0/cached-images (0.00s)\n"} +{"Time":"2023-05-31T11:43:36.456406-07:00","Action":"skip","Test":"TestDownloadOnly/v1.16.0/cached-images","Elapsed":0} +{"Time":"2023-05-31T11:43:36.456408-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":" --- SKIP: TestDownloadOnly/v1.16.0/binaries (0.00s)\n"} +{"Time":"2023-05-31T11:43:36.45641-07:00","Action":"skip","Test":"TestDownloadOnly/v1.16.0/binaries","Elapsed":0} +{"Time":"2023-05-31T11:43:36.456412-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/kubectl","Output":" --- PASS: TestDownloadOnly/v1.16.0/kubectl (0.00s)\n"} +{"Time":"2023-05-31T11:43:36.456414-07:00","Action":"pass","Test":"TestDownloadOnly/v1.16.0/kubectl","Elapsed":0} +{"Time":"2023-05-31T11:43:36.456416-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" --- PASS: TestDownloadOnly/v1.16.0/LogsDuration (0.28s)\n"} +{"Time":"2023-05-31T11:43:36.45642-07:00","Action":"pass","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Elapsed":0.28} +{"Time":"2023-05-31T11:43:36.456422-07:00","Action":"pass","Test":"TestDownloadOnly/v1.16.0","Elapsed":19.12} +{"Time":"2023-05-31T11:43:36.456424-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2","Output":" --- PASS: TestDownloadOnly/v1.27.2 (17.17s)\n"} +{"Time":"2023-05-31T11:43:36.456427-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" --- PASS: TestDownloadOnly/v1.27.2/json-events (16.88s)\n"} +{"Time":"2023-05-31T11:43:36.456429-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2/json-events","Elapsed":16.88} +{"Time":"2023-05-31T11:43:36.456431-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/preload-exists","Output":" --- PASS: TestDownloadOnly/v1.27.2/preload-exists (0.00s)\n"} +{"Time":"2023-05-31T11:43:36.456433-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2/preload-exists","Elapsed":0} +{"Time":"2023-05-31T11:43:36.456435-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":" --- SKIP: TestDownloadOnly/v1.27.2/cached-images (0.00s)\n"} +{"Time":"2023-05-31T11:43:36.456438-07:00","Action":"skip","Test":"TestDownloadOnly/v1.27.2/cached-images","Elapsed":0} +{"Time":"2023-05-31T11:43:36.456441-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":" --- SKIP: TestDownloadOnly/v1.27.2/binaries (0.00s)\n"} +{"Time":"2023-05-31T11:43:36.456445-07:00","Action":"skip","Test":"TestDownloadOnly/v1.27.2/binaries","Elapsed":0} +{"Time":"2023-05-31T11:43:36.456447-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/kubectl","Output":" --- PASS: TestDownloadOnly/v1.27.2/kubectl (0.00s)\n"} +{"Time":"2023-05-31T11:43:36.456449-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2/kubectl","Elapsed":0} +{"Time":"2023-05-31T11:43:36.456451-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" --- PASS: TestDownloadOnly/v1.27.2/LogsDuration (0.28s)\n"} +{"Time":"2023-05-31T11:43:36.456453-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Elapsed":0.28} +{"Time":"2023-05-31T11:43:36.456455-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2","Elapsed":17.17} +{"Time":"2023-05-31T11:43:36.456457-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":" --- PASS: TestDownloadOnly/DeleteAll (0.60s)\n"} +{"Time":"2023-05-31T11:43:36.456459-07:00","Action":"pass","Test":"TestDownloadOnly/DeleteAll","Elapsed":0.6} +{"Time":"2023-05-31T11:43:36.456461-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":" --- PASS: TestDownloadOnly/DeleteAlwaysSucceeds (0.35s)\n"} +{"Time":"2023-05-31T11:43:36.456465-07:00","Action":"pass","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Elapsed":0.35} +{"Time":"2023-05-31T11:43:36.456468-07:00","Action":"pass","Test":"TestDownloadOnly","Elapsed":37.58} +{"Time":"2023-05-31T11:43:36.45647-07:00","Action":"run","Test":"TestDownloadOnlyKic"} +{"Time":"2023-05-31T11:43:36.456474-07:00","Action":"output","Test":"TestDownloadOnlyKic","Output":"=== RUN TestDownloadOnlyKic\n"} +{"Time":"2023-05-31T11:43:36.456478-07:00","Action":"output","Test":"TestDownloadOnlyKic","Output":" aaa_download_only_test.go:222: (dbg) Run: out/minikube-darwin-amd64 start --download-only -p download-docker-317000 --alsologtostderr --driver=docker \n"} +{"Time":"2023-05-31T11:43:37.933857-07:00","Action":"output","Test":"TestDownloadOnlyKic","Output":" helpers_test.go:175: Cleaning up \"download-docker-317000\" profile ...\n"} +{"Time":"2023-05-31T11:43:37.93387-07:00","Action":"output","Test":"TestDownloadOnlyKic","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p download-docker-317000\n"} +{"Time":"2023-05-31T11:43:38.373739-07:00","Action":"output","Test":"TestDownloadOnlyKic","Output":"--- PASS: TestDownloadOnlyKic (1.92s)\n"} +{"Time":"2023-05-31T11:43:38.373955-07:00","Action":"pass","Test":"TestDownloadOnlyKic","Elapsed":1.92} +{"Time":"2023-05-31T11:43:38.373963-07:00","Action":"run","Test":"TestBinaryMirror"} +{"Time":"2023-05-31T11:43:38.373965-07:00","Action":"output","Test":"TestBinaryMirror","Output":"=== RUN TestBinaryMirror\n"} +{"Time":"2023-05-31T11:43:38.505928-07:00","Action":"output","Test":"TestBinaryMirror","Output":" aaa_download_only_test.go:304: (dbg) Run: out/minikube-darwin-amd64 start --download-only -p binary-mirror-969000 --alsologtostderr --binary-mirror http://127.0.0.1:49338 --driver=docker \n"} +{"Time":"2023-05-31T11:43:39.385201-07:00","Action":"output","Test":"TestBinaryMirror","Output":" helpers_test.go:175: Cleaning up \"binary-mirror-969000\" profile ...\n"} +{"Time":"2023-05-31T11:43:39.385216-07:00","Action":"output","Test":"TestBinaryMirror","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p binary-mirror-969000\n"} +{"Time":"2023-05-31T11:43:39.828578-07:00","Action":"output","Test":"TestBinaryMirror","Output":"--- PASS: TestBinaryMirror (1.45s)\n"} +{"Time":"2023-05-31T11:43:39.828591-07:00","Action":"pass","Test":"TestBinaryMirror","Elapsed":1.45} +{"Time":"2023-05-31T11:43:39.828594-07:00","Action":"run","Test":"TestOffline"} +{"Time":"2023-05-31T11:43:39.828604-07:00","Action":"output","Test":"TestOffline","Output":"=== RUN TestOffline\n"} +{"Time":"2023-05-31T11:43:39.828608-07:00","Action":"output","Test":"TestOffline","Output":"=== PAUSE TestOffline\n"} +{"Time":"2023-05-31T11:43:39.82861-07:00","Action":"pause","Test":"TestOffline"} +{"Time":"2023-05-31T11:43:39.828617-07:00","Action":"run","Test":"TestAddons"} +{"Time":"2023-05-31T11:43:39.828619-07:00","Action":"output","Test":"TestAddons","Output":"=== RUN TestAddons\n"} +{"Time":"2023-05-31T11:43:39.828622-07:00","Action":"run","Test":"TestAddons/Setup"} +{"Time":"2023-05-31T11:43:39.828624-07:00","Action":"output","Test":"TestAddons/Setup","Output":"=== RUN TestAddons/Setup\n"} +{"Time":"2023-05-31T11:43:39.828707-07:00","Action":"output","Test":"TestAddons/Setup","Output":" addons_test.go:88: (dbg) Run: out/minikube-darwin-amd64 start -p addons-597000 --wait=true --memory=4000 --alsologtostderr --addons=registry --addons=metrics-server --addons=volumesnapshots --addons=csi-hostpath-driver --addons=gcp-auth --addons=cloud-spanner --addons=inspektor-gadget --driver=docker --addons=ingress --addons=ingress-dns --addons=helm-tiller\n"} +{"Time":"2023-05-31T11:47:18.411857-07:00","Action":"output","Test":"TestAddons/Setup","Output":" addons_test.go:88: (dbg) Done: out/minikube-darwin-amd64 start -p addons-597000 --wait=true --memory=4000 --alsologtostderr --addons=registry --addons=metrics-server --addons=volumesnapshots --addons=csi-hostpath-driver --addons=gcp-auth --addons=cloud-spanner --addons=inspektor-gadget --driver=docker --addons=ingress --addons=ingress-dns --addons=helm-tiller: (3m38.571388419s)\n"} +{"Time":"2023-05-31T11:47:18.41188-07:00","Action":"run","Test":"TestAddons/parallel"} +{"Time":"2023-05-31T11:47:18.411884-07:00","Action":"output","Test":"TestAddons/parallel","Output":"=== RUN TestAddons/parallel\n"} +{"Time":"2023-05-31T11:47:18.41192-07:00","Action":"run","Test":"TestAddons/parallel/Registry"} +{"Time":"2023-05-31T11:47:18.411926-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":"=== RUN TestAddons/parallel/Registry\n"} +{"Time":"2023-05-31T11:47:18.411936-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":"=== PAUSE TestAddons/parallel/Registry\n"} +{"Time":"2023-05-31T11:47:18.411942-07:00","Action":"pause","Test":"TestAddons/parallel/Registry"} +{"Time":"2023-05-31T11:47:18.41195-07:00","Action":"run","Test":"TestAddons/parallel/Ingress"} +{"Time":"2023-05-31T11:47:18.411954-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":"=== RUN TestAddons/parallel/Ingress\n"} +{"Time":"2023-05-31T11:47:18.411972-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":"=== PAUSE TestAddons/parallel/Ingress\n"} +{"Time":"2023-05-31T11:47:18.411983-07:00","Action":"pause","Test":"TestAddons/parallel/Ingress"} +{"Time":"2023-05-31T11:47:18.411987-07:00","Action":"run","Test":"TestAddons/parallel/InspektorGadget"} +{"Time":"2023-05-31T11:47:18.41199-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":"=== RUN TestAddons/parallel/InspektorGadget\n"} +{"Time":"2023-05-31T11:47:18.411995-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":"=== PAUSE TestAddons/parallel/InspektorGadget\n"} +{"Time":"2023-05-31T11:47:18.411998-07:00","Action":"pause","Test":"TestAddons/parallel/InspektorGadget"} +{"Time":"2023-05-31T11:47:18.412-07:00","Action":"run","Test":"TestAddons/parallel/MetricsServer"} +{"Time":"2023-05-31T11:47:18.412003-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":"=== RUN TestAddons/parallel/MetricsServer\n"} +{"Time":"2023-05-31T11:47:18.41201-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":"=== PAUSE TestAddons/parallel/MetricsServer\n"} +{"Time":"2023-05-31T11:47:18.412013-07:00","Action":"pause","Test":"TestAddons/parallel/MetricsServer"} +{"Time":"2023-05-31T11:47:18.412017-07:00","Action":"run","Test":"TestAddons/parallel/HelmTiller"} +{"Time":"2023-05-31T11:47:18.412019-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":"=== RUN TestAddons/parallel/HelmTiller\n"} +{"Time":"2023-05-31T11:47:18.412051-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":"=== PAUSE TestAddons/parallel/HelmTiller\n"} +{"Time":"2023-05-31T11:47:18.412057-07:00","Action":"pause","Test":"TestAddons/parallel/HelmTiller"} +{"Time":"2023-05-31T11:47:18.41206-07:00","Action":"run","Test":"TestAddons/parallel/Olm"} +{"Time":"2023-05-31T11:47:18.412063-07:00","Action":"output","Test":"TestAddons/parallel/Olm","Output":"=== RUN TestAddons/parallel/Olm\n"} +{"Time":"2023-05-31T11:47:18.41207-07:00","Action":"output","Test":"TestAddons/parallel/Olm","Output":"=== PAUSE TestAddons/parallel/Olm\n"} +{"Time":"2023-05-31T11:47:18.412073-07:00","Action":"pause","Test":"TestAddons/parallel/Olm"} +{"Time":"2023-05-31T11:47:18.412076-07:00","Action":"run","Test":"TestAddons/parallel/CSI"} +{"Time":"2023-05-31T11:47:18.412078-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":"=== RUN TestAddons/parallel/CSI\n"} +{"Time":"2023-05-31T11:47:18.412082-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":"=== PAUSE TestAddons/parallel/CSI\n"} +{"Time":"2023-05-31T11:47:18.412084-07:00","Action":"pause","Test":"TestAddons/parallel/CSI"} +{"Time":"2023-05-31T11:47:18.412088-07:00","Action":"run","Test":"TestAddons/parallel/Headlamp"} +{"Time":"2023-05-31T11:47:18.412091-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":"=== RUN TestAddons/parallel/Headlamp\n"} +{"Time":"2023-05-31T11:47:18.412127-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":"=== PAUSE TestAddons/parallel/Headlamp\n"} +{"Time":"2023-05-31T11:47:18.412151-07:00","Action":"pause","Test":"TestAddons/parallel/Headlamp"} +{"Time":"2023-05-31T11:47:18.412168-07:00","Action":"run","Test":"TestAddons/parallel/CloudSpanner"} +{"Time":"2023-05-31T11:47:18.412171-07:00","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":"=== RUN TestAddons/parallel/CloudSpanner\n"} +{"Time":"2023-05-31T11:47:18.412176-07:00","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":"=== PAUSE TestAddons/parallel/CloudSpanner\n"} +{"Time":"2023-05-31T11:47:18.412178-07:00","Action":"pause","Test":"TestAddons/parallel/CloudSpanner"} +{"Time":"2023-05-31T11:47:18.412181-07:00","Action":"cont","Test":"TestAddons/parallel/Registry"} +{"Time":"2023-05-31T11:47:18.412184-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":"=== CONT TestAddons/parallel/Registry\n"} +{"Time":"2023-05-31T11:47:18.412193-07:00","Action":"cont","Test":"TestAddons/parallel/Olm"} +{"Time":"2023-05-31T11:47:18.412196-07:00","Action":"output","Test":"TestAddons/parallel/Olm","Output":"=== CONT TestAddons/parallel/Olm\n"} +{"Time":"2023-05-31T11:47:18.412264-07:00","Action":"output","Test":"TestAddons/parallel/Olm","Output":" addons_test.go:474: Skipping OLM addon test until https://github.com/operator-framework/operator-lifecycle-manager/issues/2534 is resolved\n"} +{"Time":"2023-05-31T11:47:18.41229-07:00","Action":"cont","Test":"TestAddons/parallel/CloudSpanner"} +{"Time":"2023-05-31T11:47:18.412296-07:00","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":"=== CONT TestAddons/parallel/CloudSpanner\n"} +{"Time":"2023-05-31T11:47:18.449232-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:306: registry stabilized in 35.329373ms\n"} +{"Time":"2023-05-31T11:47:18.450029-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:308: (dbg) TestAddons/parallel/Registry: waiting 6m0s for pods matching \"actual-registry=true\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T11:47:18.450042-07:00","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" addons_test.go:833: (dbg) TestAddons/parallel/CloudSpanner: waiting 6m0s for pods matching \"app=cloud-spanner-emulator\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:18.454802-07:00","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" helpers_test.go:344: \"cloud-spanner-emulator-6964794569-fn4n9\" [496a7767-e691-4af4-93ee-9139a1159504] Running\n"} +{"Time":"2023-05-31T11:47:18.455277-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" helpers_test.go:344: \"registry-v464w\" [0c0cfdce-48ac-4ba8-b23f-0df96dac8d9e] Running\n"} +{"Time":"2023-05-31T11:47:23.459002-07:00","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" addons_test.go:833: (dbg) TestAddons/parallel/CloudSpanner: app=cloud-spanner-emulator healthy within 5.008931153s\n"} +{"Time":"2023-05-31T11:47:23.45903-07:00","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" addons_test.go:836: (dbg) Run: out/minikube-darwin-amd64 addons disable cloud-spanner -p addons-597000\n"} +{"Time":"2023-05-31T11:47:23.459037-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:308: (dbg) TestAddons/parallel/Registry: actual-registry=true healthy within 5.00898117s\n"} +{"Time":"2023-05-31T11:47:23.460432-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:311: (dbg) TestAddons/parallel/Registry: waiting 10m0s for pods matching \"registry-proxy=true\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T11:47:23.464625-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" helpers_test.go:344: \"registry-proxy-dxqvp\" [808490a5-6691-46c9-a64e-948d88af9b90] Running\n"} +{"Time":"2023-05-31T11:47:23.871645-07:00","Action":"cont","Test":"TestAddons/parallel/Headlamp"} +{"Time":"2023-05-31T11:47:23.871657-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":"=== CONT TestAddons/parallel/Headlamp\n"} +{"Time":"2023-05-31T11:47:23.871679-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" addons_test.go:800: (dbg) Run: out/minikube-darwin-amd64 addons enable headlamp -p addons-597000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T11:47:25.45569-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" addons_test.go:800: (dbg) Done: out/minikube-darwin-amd64 addons enable headlamp -p addons-597000 --alsologtostderr -v=1: (1.583920431s)\n"} +{"Time":"2023-05-31T11:47:25.456588-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" addons_test.go:805: (dbg) TestAddons/parallel/Headlamp: waiting 8m0s for pods matching \"app.kubernetes.io/name=headlamp\" in namespace \"headlamp\" ...\n"} +{"Time":"2023-05-31T11:47:25.460158-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" helpers_test.go:344: \"headlamp-6b5756787-n6949\" [7b03d0f2-c72a-4010-8c88-1804552e8e3d] Pending / Ready:ContainersNotReady (containers with unready status: [headlamp]) / ContainersReady:ContainersNotReady (containers with unready status: [headlamp])\n"} +{"Time":"2023-05-31T11:47:28.470973-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:311: (dbg) TestAddons/parallel/Registry: registry-proxy=true healthy within 5.010508798s\n"} +{"Time":"2023-05-31T11:47:28.471019-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:316: (dbg) Run: kubectl --context addons-597000 delete po -l run=registry-test --now\n"} +{"Time":"2023-05-31T11:47:28.641127-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:321: (dbg) Run: kubectl --context addons-597000 run --rm registry-test --restart=Never --image=gcr.io/k8s-minikube/busybox -it -- sh -c \"wget --spider -S http://registry.kube-system.svc.cluster.local\"\n"} +{"Time":"2023-05-31T11:47:33.464522-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" helpers_test.go:344: \"headlamp-6b5756787-n6949\" [7b03d0f2-c72a-4010-8c88-1804552e8e3d] Running\n"} +{"Time":"2023-05-31T11:47:36.041576-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:321: (dbg) Done: kubectl --context addons-597000 run --rm registry-test --restart=Never --image=gcr.io/k8s-minikube/busybox -it -- sh -c \"wget --spider -S http://registry.kube-system.svc.cluster.local\": (7.400388688s)\n"} +{"Time":"2023-05-31T11:47:36.041601-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:331: Unable to complete rest of the test due to connectivity assumptions\n"} +{"Time":"2023-05-31T11:47:36.041606-07:00","Action":"cont","Test":"TestAddons/parallel/CSI"} +{"Time":"2023-05-31T11:47:36.041608-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":"=== CONT TestAddons/parallel/CSI\n"} +{"Time":"2023-05-31T11:47:36.047202-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:537: csi-hostpath-driver pods stabilized in 4.92051ms\n"} +{"Time":"2023-05-31T11:47:36.047257-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:540: (dbg) Run: kubectl --context addons-597000 create -f testdata/csi-hostpath-driver/pvc.yaml\n"} +{"Time":"2023-05-31T11:47:36.19831-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:545: (dbg) TestAddons/parallel/CSI: waiting 6m0s for pvc \"hpvc\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:36.198436-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:47:37.251298-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:47:38.251033-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:47:39.250003-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:47:39.466024-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" addons_test.go:805: (dbg) TestAddons/parallel/Headlamp: app.kubernetes.io/name=headlamp healthy within 14.009387937s\n"} +{"Time":"2023-05-31T11:47:39.466038-07:00","Action":"cont","Test":"TestAddons/parallel/MetricsServer"} +{"Time":"2023-05-31T11:47:39.46604-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":"=== CONT TestAddons/parallel/MetricsServer\n"} +{"Time":"2023-05-31T11:47:39.46992-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:383: metrics-server stabilized in 3.206472ms\n"} +{"Time":"2023-05-31T11:47:39.470459-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:385: (dbg) TestAddons/parallel/MetricsServer: waiting 6m0s for pods matching \"k8s-app=metrics-server\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T11:47:39.474045-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" helpers_test.go:344: \"metrics-server-844d8db974-sskbs\" [fa84c630-5181-4ccd-b354-214e9f9196d1] Running\n"} +{"Time":"2023-05-31T11:47:40.24957-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:47:41.249249-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:47:42.249737-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:47:43.25133-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:47:43.300165-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:550: (dbg) Run: kubectl --context addons-597000 create -f testdata/csi-hostpath-driver/pv-pod.yaml\n"} +{"Time":"2023-05-31T11:47:43.44276-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:555: (dbg) TestAddons/parallel/CSI: waiting 6m0s for pods matching \"app=task-pv-pod\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:43.448005-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod\" [a3a7592e-6cbb-4abb-9151-16b4439a7acb] Pending\n"} +{"Time":"2023-05-31T11:47:44.45437-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod\" [a3a7592e-6cbb-4abb-9151-16b4439a7acb] Pending / Ready:ContainersNotReady (containers with unready status: [task-pv-container]) / ContainersReady:ContainersNotReady (containers with unready status: [task-pv-container])\n"} +{"Time":"2023-05-31T11:47:44.478366-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:385: (dbg) TestAddons/parallel/MetricsServer: k8s-app=metrics-server healthy within 5.007867293s\n"} +{"Time":"2023-05-31T11:47:44.478436-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:391: (dbg) Run: kubectl --context addons-597000 top pods -n kube-system\n"} +{"Time":"2023-05-31T11:47:44.528585-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:408: (dbg) Run: out/minikube-darwin-amd64 -p addons-597000 addons disable metrics-server --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T11:47:45.043889-07:00","Action":"cont","Test":"TestAddons/parallel/HelmTiller"} +{"Time":"2023-05-31T11:47:45.043903-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":"=== CONT TestAddons/parallel/HelmTiller\n"} +{"Time":"2023-05-31T11:47:45.04821-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:432: tiller-deploy stabilized in 3.423441ms\n"} +{"Time":"2023-05-31T11:47:45.048802-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:434: (dbg) TestAddons/parallel/HelmTiller: waiting 6m0s for pods matching \"app=helm\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T11:47:45.053049-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" helpers_test.go:344: \"tiller-deploy-6847666dc-sxbb5\" [972c4b04-8af4-4fd0-b191-11f8f48a8fe8] Running\n"} +{"Time":"2023-05-31T11:47:50.057971-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:434: (dbg) TestAddons/parallel/HelmTiller: app=helm healthy within 5.0090971s\n"} +{"Time":"2023-05-31T11:47:50.058013-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:449: (dbg) Run: kubectl --context addons-597000 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version\n"} +{"Time":"2023-05-31T11:47:52.454763-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod\" [a3a7592e-6cbb-4abb-9151-16b4439a7acb] Running\n"} +{"Time":"2023-05-31T11:47:56.445451-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:449: (dbg) Done: kubectl --context addons-597000 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version: (6.387327737s)\n"} +{"Time":"2023-05-31T11:47:56.445477-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:454: kubectl --context addons-597000 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version: unexpected stderr: Unable to use a TTY - input is not a terminal or the right kind of file\n"} +{"Time":"2023-05-31T11:47:56.445482-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" If you don't see a command prompt, try pressing enter.\n"} +{"Time":"2023-05-31T11:47:56.445485-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" warning: couldn't attach to pod/helm-test, falling back to streaming logs: \n"} +{"Time":"2023-05-31T11:47:56.833678-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:449: (dbg) Run: kubectl --context addons-597000 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version\n"} +{"Time":"2023-05-31T11:47:58.451397-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:555: (dbg) TestAddons/parallel/CSI: app=task-pv-pod healthy within 15.008662337s\n"} +{"Time":"2023-05-31T11:47:58.451465-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:560: (dbg) Run: kubectl --context addons-597000 create -f testdata/csi-hostpath-driver/snapshot.yaml\n"} +{"Time":"2023-05-31T11:47:58.861901-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:565: (dbg) TestAddons/parallel/CSI: waiting 6m0s for volume snapshot \"new-snapshot-demo\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:58.862025-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:419: (dbg) Run: kubectl --context addons-597000 get volumesnapshot new-snapshot-demo -o jsonpath={.status.readyToUse} -n default\n"} +{"Time":"2023-05-31T11:47:59.529467-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:449: (dbg) Done: kubectl --context addons-597000 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version: (2.695753044s)\n"} +{"Time":"2023-05-31T11:47:59.529481-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:466: (dbg) Run: out/minikube-darwin-amd64 -p addons-597000 addons disable helm-tiller --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T11:47:59.919898-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:419: (dbg) Run: kubectl --context addons-597000 get volumesnapshot new-snapshot-demo -o jsonpath={.status.readyToUse} -n default\n"} +{"Time":"2023-05-31T11:47:59.969722-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:570: (dbg) Run: kubectl --context addons-597000 delete pod task-pv-pod\n"} +{"Time":"2023-05-31T11:47:59.986402-07:00","Action":"cont","Test":"TestAddons/parallel/InspektorGadget"} +{"Time":"2023-05-31T11:47:59.986422-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":"=== CONT TestAddons/parallel/InspektorGadget\n"} +{"Time":"2023-05-31T11:47:59.987312-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" addons_test.go:814: (dbg) TestAddons/parallel/InspektorGadget: waiting 8m0s for pods matching \"k8s-app=gadget\" in namespace \"gadget\" ...\n"} +{"Time":"2023-05-31T11:47:59.992018-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" helpers_test.go:344: \"gadget-q5cxd\" [594faad1-db5d-4c87-8714-ee7be01ca88d] Running\n"} +{"Time":"2023-05-31T11:48:00.459697-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:576: (dbg) Run: kubectl --context addons-597000 delete pvc hpvc\n"} +{"Time":"2023-05-31T11:48:00.616398-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:582: (dbg) Run: kubectl --context addons-597000 create -f testdata/csi-hostpath-driver/pvc-restore.yaml\n"} +{"Time":"2023-05-31T11:48:00.740204-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:587: (dbg) TestAddons/parallel/CSI: waiting 6m0s for pvc \"hpvc-restore\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:48:00.740301-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:48:01.793418-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:48:02.79266-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:48:03.792377-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:48:04.793729-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:48:04.998117-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" addons_test.go:814: (dbg) TestAddons/parallel/InspektorGadget: k8s-app=gadget healthy within 5.010781569s\n"} +{"Time":"2023-05-31T11:48:04.998131-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" addons_test.go:817: (dbg) Run: out/minikube-darwin-amd64 addons disable inspektor-gadget -p addons-597000\n"} +{"Time":"2023-05-31T11:48:05.792906-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:48:06.792499-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-597000 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T11:48:06.839577-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:592: (dbg) Run: kubectl --context addons-597000 create -f testdata/csi-hostpath-driver/pv-pod-restore.yaml\n"} +{"Time":"2023-05-31T11:48:07.233992-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:597: (dbg) TestAddons/parallel/CSI: waiting 6m0s for pods matching \"app=task-pv-pod-restore\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:48:07.239119-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod-restore\" [dc51f8ad-1b97-44eb-b01d-e0498953c8e5] Pending\n"} +{"Time":"2023-05-31T11:48:08.243848-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod-restore\" [dc51f8ad-1b97-44eb-b01d-e0498953c8e5] Pending / Ready:ContainersNotReady (containers with unready status: [task-pv-container]) / ContainersReady:ContainersNotReady (containers with unready status: [task-pv-container])\n"} +{"Time":"2023-05-31T11:48:10.245782-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod-restore\" [dc51f8ad-1b97-44eb-b01d-e0498953c8e5] Running\n"} +{"Time":"2023-05-31T11:48:10.589387-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" addons_test.go:817: (dbg) Done: out/minikube-darwin-amd64 addons disable inspektor-gadget -p addons-597000: (5.591185817s)\n"} +{"Time":"2023-05-31T11:48:10.589408-07:00","Action":"cont","Test":"TestAddons/parallel/Ingress"} +{"Time":"2023-05-31T11:48:10.589412-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":"=== CONT TestAddons/parallel/Ingress\n"} +{"Time":"2023-05-31T11:48:10.590245-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:183: (dbg) Run: kubectl --context addons-597000 wait --for=condition=ready --namespace=ingress-nginx pod --selector=app.kubernetes.io/component=controller --timeout=90s\n"} +{"Time":"2023-05-31T11:48:10.743151-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:208: (dbg) Run: kubectl --context addons-597000 replace --force -f testdata/nginx-ingress-v1.yaml\n"} +{"Time":"2023-05-31T11:48:10.906005-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:221: (dbg) Run: kubectl --context addons-597000 replace --force -f testdata/nginx-pod-svc.yaml\n"} +{"Time":"2023-05-31T11:48:11.075354-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:226: (dbg) TestAddons/parallel/Ingress: waiting 8m0s for pods matching \"run=nginx\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:48:11.080024-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" helpers_test.go:344: \"nginx\" [4a4cd037-a0de-40de-923f-488b7578dcd1] Pending / Ready:ContainersNotReady (containers with unready status: [nginx]) / ContainersReady:ContainersNotReady (containers with unready status: [nginx])\n"} +{"Time":"2023-05-31T11:48:16.085871-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" helpers_test.go:344: \"nginx\" [4a4cd037-a0de-40de-923f-488b7578dcd1] Running\n"} +{"Time":"2023-05-31T11:48:16.245863-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:597: (dbg) TestAddons/parallel/CSI: app=task-pv-pod-restore healthy within 9.0118385s\n"} +{"Time":"2023-05-31T11:48:16.245918-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:602: (dbg) Run: kubectl --context addons-597000 delete pod task-pv-pod-restore\n"} +{"Time":"2023-05-31T11:48:16.707985-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:606: (dbg) Run: kubectl --context addons-597000 delete pvc hpvc-restore\n"} +{"Time":"2023-05-31T11:48:16.865802-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:610: (dbg) Run: kubectl --context addons-597000 delete volumesnapshot new-snapshot-demo\n"} +{"Time":"2023-05-31T11:48:17.020189-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:614: (dbg) Run: out/minikube-darwin-amd64 -p addons-597000 addons disable csi-hostpath-driver --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T11:48:21.086602-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:226: (dbg) TestAddons/parallel/Ingress: run=nginx healthy within 10.01120226s\n"} +{"Time":"2023-05-31T11:48:21.089174-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:238: (dbg) Run: out/minikube-darwin-amd64 -p addons-597000 ssh \"curl -s http://127.0.0.1/ -H 'Host: nginx.example.com'\"\n"} +{"Time":"2023-05-31T11:48:21.43843-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:258: skipping ingress DNS test for any combination that needs port forwarding\n"} +{"Time":"2023-05-31T11:48:23.52399-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:614: (dbg) Done: out/minikube-darwin-amd64 -p addons-597000 addons disable csi-hostpath-driver --alsologtostderr -v=1: (6.503713887s)\n"} +{"Time":"2023-05-31T11:48:23.524008-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:618: (dbg) Run: out/minikube-darwin-amd64 -p addons-597000 addons disable volumesnapshots --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T11:48:24.220009-07:00","Action":"run","Test":"TestAddons/serial"} +{"Time":"2023-05-31T11:48:24.220022-07:00","Action":"output","Test":"TestAddons/serial","Output":"=== RUN TestAddons/serial\n"} +{"Time":"2023-05-31T11:48:24.220029-07:00","Action":"run","Test":"TestAddons/serial/GCPAuth"} +{"Time":"2023-05-31T11:48:24.220031-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":"=== RUN TestAddons/serial/GCPAuth\n"} +{"Time":"2023-05-31T11:48:24.220051-07:00","Action":"run","Test":"TestAddons/serial/GCPAuth/Namespaces"} +{"Time":"2023-05-31T11:48:24.220059-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth/Namespaces","Output":"=== RUN TestAddons/serial/GCPAuth/Namespaces\n"} +{"Time":"2023-05-31T11:48:24.220189-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth/Namespaces","Output":" addons_test.go:626: (dbg) Run: kubectl --context addons-597000 create ns new-namespace\n"} +{"Time":"2023-05-31T11:48:24.28149-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth/Namespaces","Output":" addons_test.go:640: (dbg) Run: kubectl --context addons-597000 get secret gcp-auth -n new-namespace\n"} +{"Time":"2023-05-31T11:48:24.346329-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:661: (dbg) Run: kubectl --context addons-597000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T11:48:24.469504-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:668: (dbg) Run: kubectl --context addons-597000 create sa gcp-auth-test\n"} +{"Time":"2023-05-31T11:48:24.522084-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:674: (dbg) TestAddons/serial/GCPAuth: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:48:24.525511-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" helpers_test.go:344: \"busybox\" [b3f67328-d306-4ca9-b3a6-7cf2a655d9cd] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T11:48:28.529339-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" helpers_test.go:344: \"busybox\" [b3f67328-d306-4ca9-b3a6-7cf2a655d9cd] Running\n"} +{"Time":"2023-05-31T11:48:33.52944-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:674: (dbg) TestAddons/serial/GCPAuth: integration-test=busybox healthy within 9.007331676s\n"} +{"Time":"2023-05-31T11:48:33.529515-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:680: (dbg) Run: kubectl --context addons-597000 exec busybox -- /bin/sh -c \"printenv GOOGLE_APPLICATION_CREDENTIALS\"\n"} +{"Time":"2023-05-31T11:48:33.640868-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:692: (dbg) Run: kubectl --context addons-597000 describe sa gcp-auth-test\n"} +{"Time":"2023-05-31T11:48:33.699484-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:706: (dbg) Run: kubectl --context addons-597000 exec busybox -- /bin/sh -c \"cat /google-app-creds.json\"\n"} +{"Time":"2023-05-31T11:48:33.810044-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:730: (dbg) Run: kubectl --context addons-597000 exec busybox -- /bin/sh -c \"printenv GOOGLE_CLOUD_PROJECT\"\n"} +{"Time":"2023-05-31T11:48:33.921003-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:743: (dbg) Run: out/minikube-darwin-amd64 -p addons-597000 addons disable gcp-auth --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T11:48:41.790672-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:743: (dbg) Done: out/minikube-darwin-amd64 -p addons-597000 addons disable gcp-auth --alsologtostderr -v=1: (7.869578894s)\n"} +{"Time":"2023-05-31T11:48:41.791479-07:00","Action":"run","Test":"TestAddons/StoppedEnableDisable"} +{"Time":"2023-05-31T11:48:41.791491-07:00","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":"=== RUN TestAddons/StoppedEnableDisable\n"} +{"Time":"2023-05-31T11:48:41.791505-07:00","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:148: (dbg) Run: out/minikube-darwin-amd64 stop -p addons-597000\n"} +{"Time":"2023-05-31T11:48:52.672348-07:00","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:148: (dbg) Done: out/minikube-darwin-amd64 stop -p addons-597000: (10.880717567s)\n"} +{"Time":"2023-05-31T11:48:52.672364-07:00","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:152: (dbg) Run: out/minikube-darwin-amd64 addons enable dashboard -p addons-597000\n"} +{"Time":"2023-05-31T11:48:52.902518-07:00","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:156: (dbg) Run: out/minikube-darwin-amd64 addons disable dashboard -p addons-597000\n"} +{"Time":"2023-05-31T11:48:53.059181-07:00","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:161: (dbg) Run: out/minikube-darwin-amd64 addons disable gvisor -p addons-597000\n"} +{"Time":"2023-05-31T11:48:53.165858-07:00","Action":"output","Test":"TestAddons","Output":" helpers_test.go:175: Cleaning up \"addons-597000\" profile ...\n"} +{"Time":"2023-05-31T11:48:53.165874-07:00","Action":"output","Test":"TestAddons","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p addons-597000\n"} +{"Time":"2023-05-31T11:48:56.574992-07:00","Action":"output","Test":"TestAddons","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p addons-597000: (3.409031189s)\n"} +{"Time":"2023-05-31T11:48:56.575012-07:00","Action":"output","Test":"TestAddons","Output":"--- PASS: TestAddons (316.73s)\n"} +{"Time":"2023-05-31T11:48:56.575016-07:00","Action":"output","Test":"TestAddons/Setup","Output":" --- PASS: TestAddons/Setup (218.57s)\n"} +{"Time":"2023-05-31T11:48:56.57502-07:00","Action":"pass","Test":"TestAddons/Setup","Elapsed":218.57} +{"Time":"2023-05-31T11:48:56.575038-07:00","Action":"output","Test":"TestAddons/parallel","Output":" --- PASS: TestAddons/parallel (0.00s)\n"} +{"Time":"2023-05-31T11:48:56.575048-07:00","Action":"output","Test":"TestAddons/parallel/Olm","Output":" --- SKIP: TestAddons/parallel/Olm (0.00s)\n"} +{"Time":"2023-05-31T11:48:56.575052-07:00","Action":"skip","Test":"TestAddons/parallel/Olm","Elapsed":0} +{"Time":"2023-05-31T11:48:56.575055-07:00","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" --- PASS: TestAddons/parallel/CloudSpanner (5.46s)\n"} +{"Time":"2023-05-31T11:48:56.575058-07:00","Action":"pass","Test":"TestAddons/parallel/CloudSpanner","Elapsed":5.46} +{"Time":"2023-05-31T11:48:56.575061-07:00","Action":"output","Test":"TestAddons/parallel/Registry","Output":" --- SKIP: TestAddons/parallel/Registry (17.63s)\n"} +{"Time":"2023-05-31T11:48:56.575064-07:00","Action":"skip","Test":"TestAddons/parallel/Registry","Elapsed":17.63} +{"Time":"2023-05-31T11:48:56.575067-07:00","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" --- PASS: TestAddons/parallel/Headlamp (15.59s)\n"} +{"Time":"2023-05-31T11:48:56.57507-07:00","Action":"pass","Test":"TestAddons/parallel/Headlamp","Elapsed":15.59} +{"Time":"2023-05-31T11:48:56.575073-07:00","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" --- PASS: TestAddons/parallel/MetricsServer (5.58s)\n"} +{"Time":"2023-05-31T11:48:56.575076-07:00","Action":"pass","Test":"TestAddons/parallel/MetricsServer","Elapsed":5.58} +{"Time":"2023-05-31T11:48:56.575079-07:00","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" --- PASS: TestAddons/parallel/HelmTiller (14.94s)\n"} +{"Time":"2023-05-31T11:48:56.575082-07:00","Action":"pass","Test":"TestAddons/parallel/HelmTiller","Elapsed":14.94} +{"Time":"2023-05-31T11:48:56.575084-07:00","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" --- PASS: TestAddons/parallel/InspektorGadget (10.60s)\n"} +{"Time":"2023-05-31T11:48:56.575087-07:00","Action":"pass","Test":"TestAddons/parallel/InspektorGadget","Elapsed":10.6} +{"Time":"2023-05-31T11:48:56.57509-07:00","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" --- SKIP: TestAddons/parallel/Ingress (10.85s)\n"} +{"Time":"2023-05-31T11:48:56.575093-07:00","Action":"skip","Test":"TestAddons/parallel/Ingress","Elapsed":10.85} +{"Time":"2023-05-31T11:48:56.575096-07:00","Action":"output","Test":"TestAddons/parallel/CSI","Output":" --- PASS: TestAddons/parallel/CSI (48.18s)\n"} +{"Time":"2023-05-31T11:48:56.575099-07:00","Action":"pass","Test":"TestAddons/parallel/CSI","Elapsed":48.18} +{"Time":"2023-05-31T11:48:56.575101-07:00","Action":"pass","Test":"TestAddons/parallel","Elapsed":0} +{"Time":"2023-05-31T11:48:56.575104-07:00","Action":"output","Test":"TestAddons/serial","Output":" --- PASS: TestAddons/serial (17.57s)\n"} +{"Time":"2023-05-31T11:48:56.575107-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" --- PASS: TestAddons/serial/GCPAuth (17.57s)\n"} +{"Time":"2023-05-31T11:48:56.57511-07:00","Action":"output","Test":"TestAddons/serial/GCPAuth/Namespaces","Output":" --- PASS: TestAddons/serial/GCPAuth/Namespaces (0.13s)\n"} +{"Time":"2023-05-31T11:48:56.575113-07:00","Action":"pass","Test":"TestAddons/serial/GCPAuth/Namespaces","Elapsed":0.13} +{"Time":"2023-05-31T11:48:56.575116-07:00","Action":"pass","Test":"TestAddons/serial/GCPAuth","Elapsed":17.57} +{"Time":"2023-05-31T11:48:56.575118-07:00","Action":"pass","Test":"TestAddons/serial","Elapsed":17.57} +{"Time":"2023-05-31T11:48:56.575121-07:00","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" --- PASS: TestAddons/StoppedEnableDisable (11.37s)\n"} +{"Time":"2023-05-31T11:48:56.575126-07:00","Action":"pass","Test":"TestAddons/StoppedEnableDisable","Elapsed":11.37} +{"Time":"2023-05-31T11:48:56.575129-07:00","Action":"pass","Test":"TestAddons","Elapsed":316.73} +{"Time":"2023-05-31T11:48:56.575132-07:00","Action":"run","Test":"TestCertOptions"} +{"Time":"2023-05-31T11:48:56.575134-07:00","Action":"output","Test":"TestCertOptions","Output":"=== RUN TestCertOptions\n"} +{"Time":"2023-05-31T11:48:56.575137-07:00","Action":"output","Test":"TestCertOptions","Output":"=== PAUSE TestCertOptions\n"} +{"Time":"2023-05-31T11:48:56.575141-07:00","Action":"pause","Test":"TestCertOptions"} +{"Time":"2023-05-31T11:48:56.575143-07:00","Action":"run","Test":"TestCertExpiration"} +{"Time":"2023-05-31T11:48:56.575146-07:00","Action":"output","Test":"TestCertExpiration","Output":"=== RUN TestCertExpiration\n"} +{"Time":"2023-05-31T11:48:56.575149-07:00","Action":"output","Test":"TestCertExpiration","Output":"=== PAUSE TestCertExpiration\n"} +{"Time":"2023-05-31T11:48:56.575151-07:00","Action":"pause","Test":"TestCertExpiration"} +{"Time":"2023-05-31T11:48:56.575154-07:00","Action":"run","Test":"TestDockerFlags"} +{"Time":"2023-05-31T11:48:56.575156-07:00","Action":"output","Test":"TestDockerFlags","Output":"=== RUN TestDockerFlags\n"} +{"Time":"2023-05-31T11:48:56.575159-07:00","Action":"output","Test":"TestDockerFlags","Output":"=== PAUSE TestDockerFlags\n"} +{"Time":"2023-05-31T11:48:56.575167-07:00","Action":"pause","Test":"TestDockerFlags"} +{"Time":"2023-05-31T11:48:56.57517-07:00","Action":"run","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T11:48:56.575174-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"=== RUN TestForceSystemdFlag\n"} +{"Time":"2023-05-31T11:48:56.575179-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"=== PAUSE TestForceSystemdFlag\n"} +{"Time":"2023-05-31T11:48:56.575182-07:00","Action":"pause","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T11:48:56.575184-07:00","Action":"run","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T11:48:56.575187-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"=== RUN TestForceSystemdEnv\n"} +{"Time":"2023-05-31T11:48:56.575189-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"=== PAUSE TestForceSystemdEnv\n"} +{"Time":"2023-05-31T11:48:56.575192-07:00","Action":"pause","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T11:48:56.575194-07:00","Action":"run","Test":"TestKVMDriverInstallOrUpdate"} +{"Time":"2023-05-31T11:48:56.575199-07:00","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":"=== RUN TestKVMDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T11:48:56.575203-07:00","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":" driver_install_or_update_test.go:41: Skip if not linux.\n"} +{"Time":"2023-05-31T11:48:56.575237-07:00","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":"--- SKIP: TestKVMDriverInstallOrUpdate (0.00s)\n"} +{"Time":"2023-05-31T11:48:56.57526-07:00","Action":"skip","Test":"TestKVMDriverInstallOrUpdate","Elapsed":0} +{"Time":"2023-05-31T11:48:56.575264-07:00","Action":"run","Test":"TestHyperKitDriverInstallOrUpdate"} +{"Time":"2023-05-31T11:48:56.575267-07:00","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"=== RUN TestHyperKitDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T11:48:56.575277-07:00","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"=== PAUSE TestHyperKitDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T11:48:56.575279-07:00","Action":"pause","Test":"TestHyperKitDriverInstallOrUpdate"} +{"Time":"2023-05-31T11:48:56.575298-07:00","Action":"run","Test":"TestHyperkitDriverSkipUpgrade"} +{"Time":"2023-05-31T11:48:56.575301-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"=== RUN TestHyperkitDriverSkipUpgrade\n"} +{"Time":"2023-05-31T11:48:56.575333-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"=== PAUSE TestHyperkitDriverSkipUpgrade\n"} +{"Time":"2023-05-31T11:48:56.575341-07:00","Action":"pause","Test":"TestHyperkitDriverSkipUpgrade"} +{"Time":"2023-05-31T11:48:56.57536-07:00","Action":"run","Test":"TestErrorSpam"} +{"Time":"2023-05-31T11:48:56.575364-07:00","Action":"output","Test":"TestErrorSpam","Output":"=== RUN TestErrorSpam\n"} +{"Time":"2023-05-31T11:48:56.575637-07:00","Action":"run","Test":"TestErrorSpam/setup"} +{"Time":"2023-05-31T11:48:56.575642-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":"=== RUN TestErrorSpam/setup\n"} +{"Time":"2023-05-31T11:48:56.57569-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":" error_spam_test.go:81: (dbg) Run: out/minikube-darwin-amd64 start -p nospam-343000 -n=1 --memory=2250 --wait=false --log_dir=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 --driver=docker \n"} +{"Time":"2023-05-31T11:49:21.838842-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":" error_spam_test.go:81: (dbg) Done: out/minikube-darwin-amd64 start -p nospam-343000 -n=1 --memory=2250 --wait=false --log_dir=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 --driver=docker : (25.263005129s)\n"} +{"Time":"2023-05-31T11:49:21.838872-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":" error_spam_test.go:91: acceptable stderr: \"! /usr/local/bin/kubectl is version 1.25.9, which may have incompatibilities with Kubernetes 1.27.2.\"\n"} +{"Time":"2023-05-31T11:49:21.838909-07:00","Action":"run","Test":"TestErrorSpam/start"} +{"Time":"2023-05-31T11:49:21.838913-07:00","Action":"output","Test":"TestErrorSpam/start","Output":"=== RUN TestErrorSpam/start\n"} +{"Time":"2023-05-31T11:49:21.839028-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:216: Cleaning up 1 logfile(s) ...\n"} +{"Time":"2023-05-31T11:49:21.83945-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 start --dry-run\n"} +{"Time":"2023-05-31T11:49:22.466343-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 start --dry-run\n"} +{"Time":"2023-05-31T11:49:23.074109-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 start --dry-run\n"} +{"Time":"2023-05-31T11:49:23.706676-07:00","Action":"run","Test":"TestErrorSpam/status"} +{"Time":"2023-05-31T11:49:23.706689-07:00","Action":"output","Test":"TestErrorSpam/status","Output":"=== RUN TestErrorSpam/status\n"} +{"Time":"2023-05-31T11:49:23.706727-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T11:49:23.706771-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 status\n"} +{"Time":"2023-05-31T11:49:24.082982-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 status\n"} +{"Time":"2023-05-31T11:49:24.453617-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 status\n"} +{"Time":"2023-05-31T11:49:24.823774-07:00","Action":"run","Test":"TestErrorSpam/pause"} +{"Time":"2023-05-31T11:49:24.823789-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":"=== RUN TestErrorSpam/pause\n"} +{"Time":"2023-05-31T11:49:24.823852-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T11:49:24.823871-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 pause\n"} +{"Time":"2023-05-31T11:49:25.432985-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 pause\n"} +{"Time":"2023-05-31T11:49:25.947777-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 pause\n"} +{"Time":"2023-05-31T11:49:26.481977-07:00","Action":"run","Test":"TestErrorSpam/unpause"} +{"Time":"2023-05-31T11:49:26.481994-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":"=== RUN TestErrorSpam/unpause\n"} +{"Time":"2023-05-31T11:49:26.482108-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T11:49:26.48212-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 unpause\n"} +{"Time":"2023-05-31T11:49:27.094267-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 unpause\n"} +{"Time":"2023-05-31T11:49:27.688149-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 unpause\n"} +{"Time":"2023-05-31T11:49:28.265803-07:00","Action":"run","Test":"TestErrorSpam/stop"} +{"Time":"2023-05-31T11:49:28.26582-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":"=== RUN TestErrorSpam/stop\n"} +{"Time":"2023-05-31T11:49:28.265938-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T11:49:28.265984-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 stop\n"} +{"Time":"2023-05-31T11:49:39.089431-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Done: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 stop: (10.823355543s)\n"} +{"Time":"2023-05-31T11:49:39.089445-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 stop\n"} +{"Time":"2023-05-31T11:49:39.360161-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-amd64 -p nospam-343000 --log_dir /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/nospam-343000 stop\n"} +{"Time":"2023-05-31T11:49:39.654218-07:00","Action":"output","Test":"TestErrorSpam","Output":" helpers_test.go:175: Cleaning up \"nospam-343000\" profile ...\n"} +{"Time":"2023-05-31T11:49:39.654236-07:00","Action":"output","Test":"TestErrorSpam","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p nospam-343000\n"} +{"Time":"2023-05-31T11:49:41.83665-07:00","Action":"output","Test":"TestErrorSpam","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p nospam-343000: (2.182299206s)\n"} +{"Time":"2023-05-31T11:49:41.836676-07:00","Action":"output","Test":"TestErrorSpam","Output":"--- PASS: TestErrorSpam (45.26s)\n"} +{"Time":"2023-05-31T11:49:41.836682-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":" --- PASS: TestErrorSpam/setup (25.26s)\n"} +{"Time":"2023-05-31T11:49:41.836687-07:00","Action":"pass","Test":"TestErrorSpam/setup","Elapsed":25.26} +{"Time":"2023-05-31T11:49:41.836715-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" --- PASS: TestErrorSpam/start (1.87s)\n"} +{"Time":"2023-05-31T11:49:41.836718-07:00","Action":"pass","Test":"TestErrorSpam/start","Elapsed":1.87} +{"Time":"2023-05-31T11:49:41.83672-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" --- PASS: TestErrorSpam/status (1.12s)\n"} +{"Time":"2023-05-31T11:49:41.836724-07:00","Action":"pass","Test":"TestErrorSpam/status","Elapsed":1.12} +{"Time":"2023-05-31T11:49:41.836733-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" --- PASS: TestErrorSpam/pause (1.66s)\n"} +{"Time":"2023-05-31T11:49:41.836736-07:00","Action":"pass","Test":"TestErrorSpam/pause","Elapsed":1.66} +{"Time":"2023-05-31T11:49:41.836739-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" --- PASS: TestErrorSpam/unpause (1.78s)\n"} +{"Time":"2023-05-31T11:49:41.836742-07:00","Action":"pass","Test":"TestErrorSpam/unpause","Elapsed":1.78} +{"Time":"2023-05-31T11:49:41.836744-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" --- PASS: TestErrorSpam/stop (11.39s)\n"} +{"Time":"2023-05-31T11:49:41.836749-07:00","Action":"pass","Test":"TestErrorSpam/stop","Elapsed":11.39} +{"Time":"2023-05-31T11:49:41.836751-07:00","Action":"pass","Test":"TestErrorSpam","Elapsed":45.26} +{"Time":"2023-05-31T11:49:41.836754-07:00","Action":"run","Test":"TestFunctional"} +{"Time":"2023-05-31T11:49:41.836757-07:00","Action":"output","Test":"TestFunctional","Output":"=== RUN TestFunctional\n"} +{"Time":"2023-05-31T11:49:41.836787-07:00","Action":"run","Test":"TestFunctional/serial"} +{"Time":"2023-05-31T11:49:41.836791-07:00","Action":"output","Test":"TestFunctional/serial","Output":"=== RUN TestFunctional/serial\n"} +{"Time":"2023-05-31T11:49:41.836828-07:00","Action":"run","Test":"TestFunctional/serial/CopySyncFile"} +{"Time":"2023-05-31T11:49:41.836835-07:00","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":"=== RUN TestFunctional/serial/CopySyncFile\n"} +{"Time":"2023-05-31T11:49:41.836869-07:00","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":" functional_test.go:1850: local sync path: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/test/nested/copy/1566/hosts\n"} +{"Time":"2023-05-31T11:49:41.838516-07:00","Action":"run","Test":"TestFunctional/serial/StartWithProxy"} +{"Time":"2023-05-31T11:49:41.838524-07:00","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"=== RUN TestFunctional/serial/StartWithProxy\n"} +{"Time":"2023-05-31T11:49:41.839179-07:00","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" functional_test.go:2229: (dbg) Run: out/minikube-darwin-amd64 start -p functional-753000 --memory=4000 --apiserver-port=8441 --wait=all --driver=docker \n"} +{"Time":"2023-05-31T11:50:59.529688-07:00","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" functional_test.go:2229: (dbg) Done: out/minikube-darwin-amd64 start -p functional-753000 --memory=4000 --apiserver-port=8441 --wait=all --driver=docker : (1m17.690159457s)\n"} +{"Time":"2023-05-31T11:50:59.529732-07:00","Action":"run","Test":"TestFunctional/serial/AuditLog"} +{"Time":"2023-05-31T11:50:59.529737-07:00","Action":"output","Test":"TestFunctional/serial/AuditLog","Output":"=== RUN TestFunctional/serial/AuditLog\n"} +{"Time":"2023-05-31T11:50:59.529881-07:00","Action":"run","Test":"TestFunctional/serial/SoftStart"} +{"Time":"2023-05-31T11:50:59.529888-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":"=== RUN TestFunctional/serial/SoftStart\n"} +{"Time":"2023-05-31T11:50:59.530276-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:654: (dbg) Run: out/minikube-darwin-amd64 start -p functional-753000 --alsologtostderr -v=8\n"} +{"Time":"2023-05-31T11:51:34.320477-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:654: (dbg) Done: out/minikube-darwin-amd64 start -p functional-753000 --alsologtostderr -v=8: (34.789989031s)\n"} +{"Time":"2023-05-31T11:51:34.320508-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:658: soft start took 34.790475768s for \"functional-753000\" cluster.\n"} +{"Time":"2023-05-31T11:51:34.320813-07:00","Action":"run","Test":"TestFunctional/serial/KubeContext"} +{"Time":"2023-05-31T11:51:34.320824-07:00","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":"=== RUN TestFunctional/serial/KubeContext\n"} +{"Time":"2023-05-31T11:51:34.320936-07:00","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":" functional_test.go:676: (dbg) Run: kubectl config current-context\n"} +{"Time":"2023-05-31T11:51:34.358116-07:00","Action":"run","Test":"TestFunctional/serial/KubectlGetPods"} +{"Time":"2023-05-31T11:51:34.358128-07:00","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":"=== RUN TestFunctional/serial/KubectlGetPods\n"} +{"Time":"2023-05-31T11:51:34.358238-07:00","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":" functional_test.go:691: (dbg) Run: kubectl --context functional-753000 get po -A\n"} +{"Time":"2023-05-31T11:51:34.43741-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd"} +{"Time":"2023-05-31T11:51:34.437423-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd","Output":"=== RUN TestFunctional/serial/CacheCmd\n"} +{"Time":"2023-05-31T11:51:34.437435-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache"} +{"Time":"2023-05-31T11:51:34.437437-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache","Output":"=== RUN TestFunctional/serial/CacheCmd/cache\n"} +{"Time":"2023-05-31T11:51:34.437452-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/add_remote"} +{"Time":"2023-05-31T11:51:34.437454-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/add_remote\n"} +{"Time":"2023-05-31T11:51:34.437483-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 cache add registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T11:51:36.888571-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 cache add registry.k8s.io/pause:3.1: (2.450984189s)\n"} +{"Time":"2023-05-31T11:51:36.888603-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 cache add registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T11:51:39.24838-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 cache add registry.k8s.io/pause:3.3: (2.359680367s)\n"} +{"Time":"2023-05-31T11:51:39.248398-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 cache add registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:51:41.188757-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 cache add registry.k8s.io/pause:latest: (1.940282348s)\n"} +{"Time":"2023-05-31T11:51:41.188796-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/add_local"} +{"Time":"2023-05-31T11:51:41.188802-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/add_local\n"} +{"Time":"2023-05-31T11:51:41.189415-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1072: (dbg) Run: docker build -t minikube-local-cache-test:functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalserialCacheCmdcacheadd_local104259359/001\n"} +{"Time":"2023-05-31T11:51:41.529543-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1084: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 cache add minikube-local-cache-test:functional-753000\n"} +{"Time":"2023-05-31T11:51:42.567823-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1084: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 cache add minikube-local-cache-test:functional-753000: (1.038214723s)\n"} +{"Time":"2023-05-31T11:51:42.567838-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1089: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 cache delete minikube-local-cache-test:functional-753000\n"} +{"Time":"2023-05-31T11:51:42.630527-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1078: (dbg) Run: docker rmi minikube-local-cache-test:functional-753000\n"} +{"Time":"2023-05-31T11:51:42.683161-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete"} +{"Time":"2023-05-31T11:51:42.683172-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/CacheDelete\n"} +{"Time":"2023-05-31T11:51:42.683187-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":" functional_test.go:1097: (dbg) Run: out/minikube-darwin-amd64 cache delete registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T11:51:42.768144-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/list"} +{"Time":"2023-05-31T11:51:42.768157-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/list\n"} +{"Time":"2023-05-31T11:51:42.768167-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":" functional_test.go:1105: (dbg) Run: out/minikube-darwin-amd64 cache list\n"} +{"Time":"2023-05-31T11:51:42.831293-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node"} +{"Time":"2023-05-31T11:51:42.831319-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node\n"} +{"Time":"2023-05-31T11:51:42.831325-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":" functional_test.go:1119: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh sudo crictl images\n"} +{"Time":"2023-05-31T11:51:43.279392-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload"} +{"Time":"2023-05-31T11:51:43.279403-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/cache_reload\n"} +{"Time":"2023-05-31T11:51:43.279442-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1142: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh sudo docker rmi registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:51:43.649635-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1148: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh sudo crictl inspecti registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:51:44.011269-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1148: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 ssh sudo crictl inspecti registry.k8s.io/pause:latest: exit status 1 (361.530641ms)\n"} +{"Time":"2023-05-31T11:51:44.011285-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T11:51:44.011288-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:51:44.01129-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \t\u001b[31mFATA\u001b[0m[0000] no such image \"registry.k8s.io/pause:latest\" present \n"} +{"Time":"2023-05-31T11:51:44.011293-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T11:51:44.011295-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:51:44.011297-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:51:44.011304-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:51:44.011306-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T11:51:44.011308-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:51:44.011324-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1153: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 cache reload\n"} +{"Time":"2023-05-31T11:51:45.357731-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1153: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 cache reload: (1.346360478s)\n"} +{"Time":"2023-05-31T11:51:45.357749-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1158: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh sudo crictl inspecti registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:51:45.744025-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/delete"} +{"Time":"2023-05-31T11:51:45.744038-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/delete\n"} +{"Time":"2023-05-31T11:51:45.744068-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" functional_test.go:1167: (dbg) Run: out/minikube-darwin-amd64 cache delete registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T11:51:45.809283-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" functional_test.go:1167: (dbg) Run: out/minikube-darwin-amd64 cache delete registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:51:45.874235-07:00","Action":"run","Test":"TestFunctional/serial/MinikubeKubectlCmd"} +{"Time":"2023-05-31T11:51:45.874249-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":"=== RUN TestFunctional/serial/MinikubeKubectlCmd\n"} +{"Time":"2023-05-31T11:51:45.874268-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":" functional_test.go:711: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 kubectl -- --context functional-753000 get pods\n"} +{"Time":"2023-05-31T11:51:46.419808-07:00","Action":"run","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly"} +{"Time":"2023-05-31T11:51:46.419833-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":"=== RUN TestFunctional/serial/MinikubeKubectlCmdDirectly\n"} +{"Time":"2023-05-31T11:51:46.420261-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":" functional_test.go:736: (dbg) Run: out/kubectl --context functional-753000 get pods\n"} +{"Time":"2023-05-31T11:51:47.150169-07:00","Action":"run","Test":"TestFunctional/serial/ExtraConfig"} +{"Time":"2023-05-31T11:51:47.150181-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"=== RUN TestFunctional/serial/ExtraConfig\n"} +{"Time":"2023-05-31T11:51:47.150234-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:752: (dbg) Run: out/minikube-darwin-amd64 start -p functional-753000 --extra-config=apiserver.enable-admission-plugins=NamespaceAutoProvision --wait=all\n"} +{"Time":"2023-05-31T11:52:18.415222-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:18.415184 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:18.421584-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:18.421494 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:18.433064-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:18.432999 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:18.453235-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:18.453193 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:18.493376-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:18.493333 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:18.573937-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:18.573873 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:18.734331-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:18.734272 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:19.054507-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:19.054448 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:19.694952-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:19.694925 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:20.975073-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:20.975042 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:23.53597-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 11:52:23.535899 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:23.855569-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:752: (dbg) Done: out/minikube-darwin-amd64 start -p functional-753000 --extra-config=apiserver.enable-admission-plugins=NamespaceAutoProvision --wait=all: (36.705150019s)\n"} +{"Time":"2023-05-31T11:52:23.855593-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:756: restart took 36.705271746s for \"functional-753000\" cluster.\n"} +{"Time":"2023-05-31T11:52:23.855791-07:00","Action":"run","Test":"TestFunctional/serial/ComponentHealth"} +{"Time":"2023-05-31T11:52:23.855799-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":"=== RUN TestFunctional/serial/ComponentHealth\n"} +{"Time":"2023-05-31T11:52:23.855841-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:805: (dbg) Run: kubectl --context functional-753000 get po -l tier=control-plane -n kube-system -o=json\n"} +{"Time":"2023-05-31T11:52:23.912693-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: etcd phase: Running\n"} +{"Time":"2023-05-31T11:52:23.912707-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: etcd status: Ready\n"} +{"Time":"2023-05-31T11:52:23.91271-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-apiserver phase: Running\n"} +{"Time":"2023-05-31T11:52:23.912714-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-apiserver status: Ready\n"} +{"Time":"2023-05-31T11:52:23.912716-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-controller-manager phase: Running\n"} +{"Time":"2023-05-31T11:52:23.912718-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-controller-manager status: Ready\n"} +{"Time":"2023-05-31T11:52:23.912722-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-scheduler phase: Running\n"} +{"Time":"2023-05-31T11:52:23.912745-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-scheduler status: Ready\n"} +{"Time":"2023-05-31T11:52:23.912757-07:00","Action":"run","Test":"TestFunctional/serial/LogsCmd"} +{"Time":"2023-05-31T11:52:23.912761-07:00","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":"=== RUN TestFunctional/serial/LogsCmd\n"} +{"Time":"2023-05-31T11:52:23.912798-07:00","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":" functional_test.go:1231: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 logs\n"} +{"Time":"2023-05-31T11:52:26.899547-07:00","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":" functional_test.go:1231: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 logs: (2.986665172s)\n"} +{"Time":"2023-05-31T11:52:26.899681-07:00","Action":"run","Test":"TestFunctional/serial/LogsFileCmd"} +{"Time":"2023-05-31T11:52:26.89969-07:00","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":"=== RUN TestFunctional/serial/LogsFileCmd\n"} +{"Time":"2023-05-31T11:52:26.899966-07:00","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":" functional_test.go:1245: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 logs --file /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalserialLogsFileCmd2074840738/001/logs.txt\n"} +{"Time":"2023-05-31T11:52:28.657779-07:00","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":"E0531 11:52:28.657720 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:30.148115-07:00","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":" functional_test.go:1245: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 logs --file /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalserialLogsFileCmd2074840738/001/logs.txt: (3.248054661s)\n"} +{"Time":"2023-05-31T11:52:30.148858-07:00","Action":"run","Test":"TestFunctional/parallel"} +{"Time":"2023-05-31T11:52:30.14887-07:00","Action":"output","Test":"TestFunctional/parallel","Output":"=== RUN TestFunctional/parallel\n"} +{"Time":"2023-05-31T11:52:30.148875-07:00","Action":"run","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T11:52:30.148884-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== RUN TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T11:52:30.148887-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== PAUSE TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T11:52:30.148889-07:00","Action":"pause","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T11:52:30.148892-07:00","Action":"run","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T11:52:30.148894-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== RUN TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T11:52:30.148916-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== PAUSE TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T11:52:30.148921-07:00","Action":"pause","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T11:52:30.148926-07:00","Action":"run","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T11:52:30.148928-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== RUN TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T11:52:30.148938-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== PAUSE TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T11:52:30.14894-07:00","Action":"pause","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T11:52:30.148943-07:00","Action":"run","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T11:52:30.148946-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== RUN TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T11:52:30.148949-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== PAUSE TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T11:52:30.148951-07:00","Action":"pause","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T11:52:30.148954-07:00","Action":"run","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T11:52:30.148955-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== RUN TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T11:52:30.148977-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== PAUSE TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T11:52:30.148979-07:00","Action":"pause","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T11:52:30.148996-07:00","Action":"run","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T11:52:30.149005-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== RUN TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T11:52:30.149012-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== PAUSE TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T11:52:30.149015-07:00","Action":"pause","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T11:52:30.149018-07:00","Action":"run","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T11:52:30.149028-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== RUN TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T11:52:30.149035-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== PAUSE TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T11:52:30.149037-07:00","Action":"pause","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T11:52:30.149041-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T11:52:30.149046-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== RUN TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T11:52:30.149049-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== PAUSE TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T11:52:30.149051-07:00","Action":"pause","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T11:52:30.149053-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T11:52:30.149055-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== RUN TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T11:52:30.149074-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== PAUSE TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T11:52:30.14908-07:00","Action":"pause","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T11:52:30.149086-07:00","Action":"run","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T11:52:30.149101-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== RUN TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T11:52:30.149129-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== PAUSE TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T11:52:30.149134-07:00","Action":"pause","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T11:52:30.149138-07:00","Action":"run","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T11:52:30.149143-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== RUN TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T11:52:30.149148-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== PAUSE TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T11:52:30.149151-07:00","Action":"pause","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T11:52:30.149155-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T11:52:30.149158-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== RUN TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T11:52:30.149161-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== PAUSE TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T11:52:30.149177-07:00","Action":"pause","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T11:52:30.149193-07:00","Action":"run","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T11:52:30.149199-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== RUN TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T11:52:30.149201-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== PAUSE TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T11:52:30.149203-07:00","Action":"pause","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T11:52:30.149206-07:00","Action":"run","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T11:52:30.149208-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== RUN TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T11:52:30.149212-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== PAUSE TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T11:52:30.149213-07:00","Action":"pause","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T11:52:30.149219-07:00","Action":"run","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T11:52:30.149221-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== RUN TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T11:52:30.149237-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== PAUSE TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T11:52:30.149242-07:00","Action":"pause","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T11:52:30.149256-07:00","Action":"run","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T11:52:30.149263-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== RUN TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T11:52:30.149281-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== PAUSE TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T11:52:30.149286-07:00","Action":"pause","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T11:52:30.149291-07:00","Action":"run","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T11:52:30.149295-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== RUN TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T11:52:30.149298-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== PAUSE TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T11:52:30.149301-07:00","Action":"pause","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T11:52:30.149304-07:00","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T11:52:30.149307-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T11:52:30.149312-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T11:52:30.149315-07:00","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T11:52:30.149318-07:00","Action":"run","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T11:52:30.149321-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== RUN TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T11:52:30.149326-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== PAUSE TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T11:52:30.149334-07:00","Action":"pause","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T11:52:30.149339-07:00","Action":"run","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T11:52:30.149342-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== RUN TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T11:52:30.149345-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== PAUSE TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T11:52:30.149348-07:00","Action":"pause","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T11:52:30.149352-07:00","Action":"run","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T11:52:30.149359-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== RUN TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T11:52:30.149364-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== PAUSE TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T11:52:30.149367-07:00","Action":"pause","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T11:52:30.149371-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T11:52:30.149374-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== RUN TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T11:52:30.14938-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== PAUSE TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T11:52:30.149383-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T11:52:30.149391-07:00","Action":"run","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T11:52:30.149394-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== RUN TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T11:52:30.149402-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== PAUSE TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T11:52:30.149406-07:00","Action":"pause","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T11:52:30.14941-07:00","Action":"run","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T11:52:30.149412-07:00","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== RUN TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T11:52:30.149429-07:00","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== PAUSE TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T11:52:30.149435-07:00","Action":"pause","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T11:52:30.14944-07:00","Action":"run","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T11:52:30.149443-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== RUN TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T11:52:30.149455-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== PAUSE TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T11:52:30.149459-07:00","Action":"pause","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T11:52:30.149463-07:00","Action":"cont","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T11:52:30.149466-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== CONT TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T11:52:30.149471-07:00","Action":"cont","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T11:52:30.149478-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== CONT TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T11:52:30.149503-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 config unset cpus\n"} +{"Time":"2023-05-31T11:52:30.149531-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 cp testdata/cp-test.txt /home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T11:52:30.216122-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 config get cpus\n"} +{"Time":"2023-05-31T11:52:30.258616-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 config get cpus: exit status 14 (42.432338ms)\n"} +{"Time":"2023-05-31T11:52:30.258631-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T11:52:30.258634-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:52:30.258641-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \tError: specified key could not be found in config\n"} +{"Time":"2023-05-31T11:52:30.258643-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T11:52:30.258646-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:52:30.258649-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 config set cpus 2\n"} +{"Time":"2023-05-31T11:52:30.326813-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 config get cpus\n"} +{"Time":"2023-05-31T11:52:30.434719-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 config unset cpus\n"} +{"Time":"2023-05-31T11:52:30.476168-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh -n functional-753000 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T11:52:30.499019-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 config get cpus\n"} +{"Time":"2023-05-31T11:52:30.541026-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 config get cpus: exit status 14 (41.919845ms)\n"} +{"Time":"2023-05-31T11:52:30.541039-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T11:52:30.541043-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:52:30.541045-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \tError: specified key could not be found in config\n"} +{"Time":"2023-05-31T11:52:30.541047-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T11:52:30.541049-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:52:30.541057-07:00","Action":"cont","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T11:52:30.541059-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== CONT TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T11:52:30.541134-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" functional_test.go:1723: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"echo hello\"\n"} +{"Time":"2023-05-31T11:52:30.858837-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 cp functional-753000:/home/docker/cp-test.txt /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelCpCmd1178110671/001/cp-test.txt\n"} +{"Time":"2023-05-31T11:52:30.915795-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" functional_test.go:1740: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"cat /etc/hostname\"\n"} +{"Time":"2023-05-31T11:52:31.246848-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh -n functional-753000 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T11:52:31.288473-07:00","Action":"cont","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T11:52:31.288485-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== CONT TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T11:52:31.288512-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial"} +{"Time":"2023-05-31T11:52:31.288518-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial\n"} +{"Time":"2023-05-31T11:52:31.288534-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel"} +{"Time":"2023-05-31T11:52:31.288536-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel\n"} +{"Time":"2023-05-31T11:52:31.288612-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:154: (dbg) daemon: [out/minikube-darwin-amd64 -p functional-753000 tunnel --alsologtostderr]\n"} +{"Time":"2023-05-31T11:52:31.288659-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:154: (dbg) daemon: [out/minikube-darwin-amd64 -p functional-753000 tunnel --alsologtostderr]\n"} +{"Time":"2023-05-31T11:52:31.664052-07:00","Action":"cont","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T11:52:31.664064-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== CONT TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T11:52:31.665342-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:44: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 4m0s for pods matching \"integration-test=storage-provisioner\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T11:52:31.675677-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"storage-provisioner\" [333d0765-294d-41f8-9d74-580ef4b6cbc6] Running\n"} +{"Time":"2023-05-31T11:52:31.737243-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:194: (dbg) stopping [out/minikube-darwin-amd64 -p functional-753000 tunnel --alsologtostderr] ...\n"} +{"Time":"2023-05-31T11:52:31.853953-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" helpers_test.go:508: unable to kill pid 3105: os: process already finished\n"} +{"Time":"2023-05-31T11:52:31.853974-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:194: (dbg) stopping [out/minikube-darwin-amd64 -p functional-753000 tunnel --alsologtostderr] ...\n"} +{"Time":"2023-05-31T11:52:31.853997-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T11:52:31.854125-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel"} +{"Time":"2023-05-31T11:52:31.854147-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/StartTunnel\n"} +{"Time":"2023-05-31T11:52:31.854179-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":" functional_test_tunnel_test.go:129: (dbg) daemon: [out/minikube-darwin-amd64 -p functional-753000 tunnel --alsologtostderr]\n"} +{"Time":"2023-05-31T11:52:31.858132-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService"} +{"Time":"2023-05-31T11:52:31.85814-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/WaitService\n"} +{"Time":"2023-05-31T11:52:31.858143-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup"} +{"Time":"2023-05-31T11:52:31.858145-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup\n"} +{"Time":"2023-05-31T11:52:31.858898-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" functional_test_tunnel_test.go:212: (dbg) Run: kubectl --context functional-753000 apply -f testdata/testsvc.yaml\n"} +{"Time":"2023-05-31T11:52:32.055729-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" functional_test_tunnel_test.go:216: (dbg) TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup: waiting 4m0s for pods matching \"run=nginx-svc\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:52:32.060405-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" helpers_test.go:344: \"nginx-svc\" [4bf86bab-fc9e-43a6-8ff9-dca42c1021bc] Pending / Ready:ContainersNotReady (containers with unready status: [nginx]) / ContainersReady:ContainersNotReady (containers with unready status: [nginx])\n"} +{"Time":"2023-05-31T11:52:36.681534-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:44: (dbg) TestFunctional/parallel/PersistentVolumeClaim: integration-test=storage-provisioner healthy within 5.016165943s\n"} +{"Time":"2023-05-31T11:52:36.681632-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:49: (dbg) Run: kubectl --context functional-753000 get storageclass -o=json\n"} +{"Time":"2023-05-31T11:52:36.730468-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:69: (dbg) Run: kubectl --context functional-753000 apply -f testdata/storage-provisioner/pvc.yaml\n"} +{"Time":"2023-05-31T11:52:36.847562-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:76: (dbg) Run: kubectl --context functional-753000 get pvc myclaim -o=json\n"} +{"Time":"2023-05-31T11:52:36.899447-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:125: (dbg) Run: kubectl --context functional-753000 apply -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T11:52:37.013724-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 3m0s for pods matching \"test=storage-provisioner\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:52:37.016622-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [f85f2d7e-1498-4682-840b-fd21452cd6b1] Pending\n"} +{"Time":"2023-05-31T11:52:37.063979-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" helpers_test.go:344: \"nginx-svc\" [4bf86bab-fc9e-43a6-8ff9-dca42c1021bc] Running\n"} +{"Time":"2023-05-31T11:52:38.020512-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [f85f2d7e-1498-4682-840b-fd21452cd6b1] Pending / Ready:ContainersNotReady (containers with unready status: [myfrontend]) / ContainersReady:ContainersNotReady (containers with unready status: [myfrontend])\n"} +{"Time":"2023-05-31T11:52:38.898527-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"E0531 11:52:38.898473 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:43.064029-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" functional_test_tunnel_test.go:216: (dbg) TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup: run=nginx-svc healthy within 11.008278292s\n"} +{"Time":"2023-05-31T11:52:43.066582-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP"} +{"Time":"2023-05-31T11:52:43.066592-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP\n"} +{"Time":"2023-05-31T11:52:43.066691-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP","Output":" functional_test_tunnel_test.go:234: (dbg) Run: kubectl --context functional-753000 get svc nginx-svc -o jsonpath={.status.loadBalancer.ingress[0].ip}\n"} +{"Time":"2023-05-31T11:52:43.118051-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect"} +{"Time":"2023-05-31T11:52:43.118064-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/AccessDirect\n"} +{"Time":"2023-05-31T11:52:43.120819-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":" functional_test_tunnel_test.go:299: tunnel at http://127.0.0.1 is working!\n"} +{"Time":"2023-05-31T11:52:43.120839-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig"} +{"Time":"2023-05-31T11:52:43.120844-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig\n"} +{"Time":"2023-05-31T11:52:43.12088-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":" functional_test_tunnel_test.go:99: DNS forwarding is only supported for Hyperkit on Darwin, skipping test DNS forwarding\n"} +{"Time":"2023-05-31T11:52:43.12091-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil"} +{"Time":"2023-05-31T11:52:43.120929-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil\n"} +{"Time":"2023-05-31T11:52:43.120936-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":" functional_test_tunnel_test.go:99: DNS forwarding is only supported for Hyperkit on Darwin, skipping test DNS forwarding\n"} +{"Time":"2023-05-31T11:52:43.120939-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS"} +{"Time":"2023-05-31T11:52:43.12095-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS\n"} +{"Time":"2023-05-31T11:52:43.120956-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":" functional_test_tunnel_test.go:99: DNS forwarding is only supported for Hyperkit on Darwin, skipping test DNS forwarding\n"} +{"Time":"2023-05-31T11:52:43.12096-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel"} +{"Time":"2023-05-31T11:52:43.120962-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel\n"} +{"Time":"2023-05-31T11:52:43.120988-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":" functional_test_tunnel_test.go:434: (dbg) stopping [out/minikube-darwin-amd64 -p functional-753000 tunnel --alsologtostderr] ...\n"} +{"Time":"2023-05-31T11:52:43.136606-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":" helpers_test.go:502: unable to terminate pid 3141: operation not permitted\n"} +{"Time":"2023-05-31T11:52:43.237672-07:00","Action":"cont","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T11:52:43.237689-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== CONT TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T11:52:43.237765-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" functional_test.go:1688: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 addons list\n"} +{"Time":"2023-05-31T11:52:43.362401-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" functional_test.go:1700: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 addons list -o json\n"} +{"Time":"2023-05-31T11:52:43.474029-07:00","Action":"cont","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T11:52:43.474041-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== CONT TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T11:52:43.474148-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1627: (dbg) Run: kubectl --context functional-753000 create deployment hello-node-connect --image=registry.k8s.io/echoserver:1.8\n"} +{"Time":"2023-05-31T11:52:43.551438-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1633: (dbg) Run: kubectl --context functional-753000 expose deployment hello-node-connect --type=NodePort --port=8080\n"} +{"Time":"2023-05-31T11:52:43.668609-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1638: (dbg) TestFunctional/parallel/ServiceCmdConnect: waiting 10m0s for pods matching \"app=hello-node-connect\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:52:43.672157-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:344: \"hello-node-connect-6fb669fc84-9w68c\" [0cd5421a-611c-449f-8f5a-fe6399ec92ac] Pending / Ready:ContainersNotReady (containers with unready status: [echoserver]) / ContainersReady:ContainersNotReady (containers with unready status: [echoserver])\n"} +{"Time":"2023-05-31T11:52:46.020767-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [f85f2d7e-1498-4682-840b-fd21452cd6b1] Running\n"} +{"Time":"2023-05-31T11:52:52.020491-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: test=storage-provisioner healthy within 15.006745987s\n"} +{"Time":"2023-05-31T11:52:52.02056-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:100: (dbg) Run: kubectl --context functional-753000 exec sp-pod -- touch /tmp/mount/foo\n"} +{"Time":"2023-05-31T11:52:52.137239-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:106: (dbg) Run: kubectl --context functional-753000 delete -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T11:52:52.679812-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:344: \"hello-node-connect-6fb669fc84-9w68c\" [0cd5421a-611c-449f-8f5a-fe6399ec92ac] Running\n"} +{"Time":"2023-05-31T11:52:53.058172-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:125: (dbg) Run: kubectl --context functional-753000 apply -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T11:52:53.17211-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 3m0s for pods matching \"test=storage-provisioner\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:52:53.175163-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [1917224e-0c4e-4fb7-b695-f7d69748e5a5] Pending\n"} +{"Time":"2023-05-31T11:52:54.179328-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [1917224e-0c4e-4fb7-b695-f7d69748e5a5] Pending / Ready:ContainersNotReady (containers with unready status: [myfrontend]) / ContainersReady:ContainersNotReady (containers with unready status: [myfrontend])\n"} +{"Time":"2023-05-31T11:52:55.181764-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [1917224e-0c4e-4fb7-b695-f7d69748e5a5] Running\n"} +{"Time":"2023-05-31T11:52:58.677497-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1638: (dbg) TestFunctional/parallel/ServiceCmdConnect: app=hello-node-connect healthy within 15.008850584s\n"} +{"Time":"2023-05-31T11:52:58.677512-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1644: test is broken for port-forwarded drivers: https://github.com/kubernetes/minikube/issues/7383\n"} +{"Time":"2023-05-31T11:52:58.677516-07:00","Action":"cont","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T11:52:58.677519-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== CONT TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T11:52:58.677536-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/DeployApp"} +{"Time":"2023-05-31T11:52:58.677539-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":"=== RUN TestFunctional/parallel/ServiceCmd/DeployApp\n"} +{"Time":"2023-05-31T11:52:58.677675-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1437: (dbg) Run: kubectl --context functional-753000 create deployment hello-node --image=registry.k8s.io/echoserver:1.8\n"} +{"Time":"2023-05-31T11:52:58.727143-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1443: (dbg) Run: kubectl --context functional-753000 expose deployment hello-node --type=NodePort --port=8080\n"} +{"Time":"2023-05-31T11:52:58.793429-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1448: (dbg) TestFunctional/parallel/ServiceCmd/DeployApp: waiting 10m0s for pods matching \"app=hello-node\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:52:58.796343-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" helpers_test.go:344: \"hello-node-775766b4cc-vfsc2\" [ffb3f126-5754-4419-a6a5-ac2f06ffd929] Pending / Ready:ContainersNotReady (containers with unready status: [echoserver]) / ContainersReady:ContainersNotReady (containers with unready status: [echoserver])\n"} +{"Time":"2023-05-31T11:52:59.379287-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":"E0531 11:52:59.379214 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:53:00.800642-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" helpers_test.go:344: \"hello-node-775766b4cc-vfsc2\" [ffb3f126-5754-4419-a6a5-ac2f06ffd929] Running\n"} +{"Time":"2023-05-31T11:53:01.181092-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: test=storage-provisioner healthy within 8.008964636s\n"} +{"Time":"2023-05-31T11:53:01.181126-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:114: (dbg) Run: kubectl --context functional-753000 exec sp-pod -- ls /tmp/mount\n"} +{"Time":"2023-05-31T11:53:01.299975-07:00","Action":"cont","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T11:53:01.299988-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== CONT TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T11:53:01.299996-07:00","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create"} +{"Time":"2023-05-31T11:53:01.299999-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_not_create\n"} +{"Time":"2023-05-31T11:53:01.300061-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" functional_test.go:1268: (dbg) Run: out/minikube-darwin-amd64 profile lis\n"} +{"Time":"2023-05-31T11:53:01.391383-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" functional_test.go:1273: (dbg) Run: out/minikube-darwin-amd64 profile list --output json\n"} +{"Time":"2023-05-31T11:53:01.762166-07:00","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_list"} +{"Time":"2023-05-31T11:53:01.762177-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_list\n"} +{"Time":"2023-05-31T11:53:01.762194-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1308: (dbg) Run: out/minikube-darwin-amd64 profile list\n"} +{"Time":"2023-05-31T11:53:02.133364-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1313: Took \"371.109559ms\" to run \"out/minikube-darwin-amd64 profile list\"\n"} +{"Time":"2023-05-31T11:53:02.133378-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1322: (dbg) Run: out/minikube-darwin-amd64 profile list -l\n"} +{"Time":"2023-05-31T11:53:02.196845-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1327: Took \"63.334866ms\" to run \"out/minikube-darwin-amd64 profile list -l\"\n"} +{"Time":"2023-05-31T11:53:02.196939-07:00","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output"} +{"Time":"2023-05-31T11:53:02.196946-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_json_output\n"} +{"Time":"2023-05-31T11:53:02.197025-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1359: (dbg) Run: out/minikube-darwin-amd64 profile list -o json\n"} +{"Time":"2023-05-31T11:53:02.569018-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1364: Took \"371.977809ms\" to run \"out/minikube-darwin-amd64 profile list -o json\"\n"} +{"Time":"2023-05-31T11:53:02.5692-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1372: (dbg) Run: out/minikube-darwin-amd64 profile list -o json --light\n"} +{"Time":"2023-05-31T11:53:02.631769-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1377: Took \"62.498111ms\" to run \"out/minikube-darwin-amd64 profile list -o json --light\"\n"} +{"Time":"2023-05-31T11:53:02.631949-07:00","Action":"cont","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T11:53:02.631957-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== CONT TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T11:53:02.632006-07:00","Action":"run","Test":"TestFunctional/parallel/MountCmd/any-port"} +{"Time":"2023-05-31T11:53:02.632015-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":"=== RUN TestFunctional/parallel/MountCmd/any-port\n"} +{"Time":"2023-05-31T11:53:02.632401-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:73: (dbg) daemon: [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdany-port4114289213/001:/mount-9p --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:53:02.635942-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685559182635607000\" to /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdany-port4114289213/001/created-by-test\n"} +{"Time":"2023-05-31T11:53:02.636071-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685559182635607000\" to /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdany-port4114289213/001/created-by-test-removed-by-pod\n"} +{"Time":"2023-05-31T11:53:02.636192-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685559182635607000\" to /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdany-port4114289213/001/test-1685559182635607000\n"} +{"Time":"2023-05-31T11:53:02.636248-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T11:53:03.033293-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T /mount-9p | grep 9p\": exit status 1 (396.96339ms)\n"} +{"Time":"2023-05-31T11:53:03.033315-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \n"} +{"Time":"2023-05-31T11:53:03.033318-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:03.033326-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:53:03.033329-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \n"} +{"Time":"2023-05-31T11:53:03.033333-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:03.529154-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T11:53:03.878552-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:129: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh -- ls -la /mount-9p\n"} +{"Time":"2023-05-31T11:53:04.324472-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:133: guest mount directory contents\n"} +{"Time":"2023-05-31T11:53:04.324488-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" total 2\r\n"} +{"Time":"2023-05-31T11:53:04.324492-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:53 created-by-test\r\n"} +{"Time":"2023-05-31T11:53:04.324495-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:53 created-by-test-removed-by-pod\r\n"} +{"Time":"2023-05-31T11:53:04.324498-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:53 test-1685559182635607000\r\n"} +{"Time":"2023-05-31T11:53:04.324501-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:137: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh cat /mount-9p/test-1685559182635607000\n"} +{"Time":"2023-05-31T11:53:04.69023-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:148: (dbg) Run: kubectl --context functional-753000 replace --force -f testdata/busybox-mount-test.yaml\n"} +{"Time":"2023-05-31T11:53:04.821378-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:153: (dbg) TestFunctional/parallel/MountCmd/any-port: waiting 4m0s for pods matching \"integration-test=busybox-mount\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:53:04.825335-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [25ad4a99-8227-4570-819b-e6c4187306a3] Pending\n"} +{"Time":"2023-05-31T11:53:05.800743-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1448: (dbg) TestFunctional/parallel/ServiceCmd/DeployApp: app=hello-node healthy within 7.007297153s\n"} +{"Time":"2023-05-31T11:53:05.800758-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/List"} +{"Time":"2023-05-31T11:53:05.800762-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":"=== RUN TestFunctional/parallel/ServiceCmd/List\n"} +{"Time":"2023-05-31T11:53:05.800791-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":" functional_test.go:1457: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 service list\n"} +{"Time":"2023-05-31T11:53:05.831541-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [25ad4a99-8227-4570-819b-e6c4187306a3] Pending / Ready:ContainersNotReady (containers with unready status: [mount-munger]) / ContainersReady:ContainersNotReady (containers with unready status: [mount-munger])\n"} +{"Time":"2023-05-31T11:53:06.388931-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput"} +{"Time":"2023-05-31T11:53:06.388958-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":"=== RUN TestFunctional/parallel/ServiceCmd/JSONOutput\n"} +{"Time":"2023-05-31T11:53:06.389003-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" functional_test.go:1487: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 service list -o json\n"} +{"Time":"2023-05-31T11:53:06.969662-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" functional_test.go:1492: Took \"580.627565ms\" to run \"out/minikube-darwin-amd64 -p functional-753000 service list -o json\"\n"} +{"Time":"2023-05-31T11:53:06.969746-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/HTTPS"} +{"Time":"2023-05-31T11:53:06.969777-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":"=== RUN TestFunctional/parallel/ServiceCmd/HTTPS\n"} +{"Time":"2023-05-31T11:53:06.969855-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" functional_test.go:1507: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 service --namespace=default --https --url hello-node\n"} +{"Time":"2023-05-31T11:53:08.82925-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [25ad4a99-8227-4570-819b-e6c4187306a3] Pending: Initialized:PodCompleted / Ready:PodCompleted / ContainersReady:PodCompleted\n"} +{"Time":"2023-05-31T11:53:09.831229-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [25ad4a99-8227-4570-819b-e6c4187306a3] Succeeded: Initialized:PodCompleted / Ready:PodCompleted / ContainersReady:PodCompleted\n"} +{"Time":"2023-05-31T11:53:09.831244-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:153: (dbg) TestFunctional/parallel/MountCmd/any-port: integration-test=busybox-mount healthy within 5.009881648s\n"} +{"Time":"2023-05-31T11:53:09.831365-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:169: (dbg) Run: kubectl --context functional-753000 logs busybox-mount\n"} +{"Time":"2023-05-31T11:53:09.893299-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:181: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh stat /mount-9p/created-by-test\n"} +{"Time":"2023-05-31T11:53:10.249311-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:181: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh stat /mount-9p/created-by-pod\n"} +{"Time":"2023-05-31T11:53:10.609599-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:90: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo umount -f /mount-9p\"\n"} +{"Time":"2023-05-31T11:53:10.963947-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:94: (dbg) stopping [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdany-port4114289213/001:/mount-9p --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:53:11.096982-07:00","Action":"run","Test":"TestFunctional/parallel/MountCmd/specific-port"} +{"Time":"2023-05-31T11:53:11.097-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":"=== RUN TestFunctional/parallel/MountCmd/specific-port\n"} +{"Time":"2023-05-31T11:53:11.097317-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:213: (dbg) daemon: [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdspecific-port2986442337/001:/mount-9p --alsologtostderr -v=1 --port 46464]\n"} +{"Time":"2023-05-31T11:53:11.099716-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T11:53:11.461548-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T /mount-9p | grep 9p\": exit status 1 (361.785732ms)\n"} +{"Time":"2023-05-31T11:53:11.461562-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:53:11.461564-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:11.461567-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:53:11.461569-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:53:11.461571-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:12.048622-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T11:53:12.399232-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:257: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh -- ls -la /mount-9p\n"} +{"Time":"2023-05-31T11:53:12.812402-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:261: guest mount directory contents\n"} +{"Time":"2023-05-31T11:53:12.812414-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" total 0\r\n"} +{"Time":"2023-05-31T11:53:12.812418-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:263: (dbg) stopping [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdspecific-port2986442337/001:/mount-9p --alsologtostderr -v=1 --port 46464] ...\n"} +{"Time":"2023-05-31T11:53:12.927506-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:264: reading mount text\n"} +{"Time":"2023-05-31T11:53:12.93007-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:278: done reading mount text\n"} +{"Time":"2023-05-31T11:53:12.930202-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:230: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo umount -f /mount-9p\"\n"} +{"Time":"2023-05-31T11:53:13.260835-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:230: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo umount -f /mount-9p\": exit status 1 (330.535179ms)\n"} +{"Time":"2023-05-31T11:53:13.260848-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:53:13.260851-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:13.260853-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tumount: /mount-9p: not mounted.\n"} +{"Time":"2023-05-31T11:53:13.260855-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:53:13.260857-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:13.260859-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:13.260861-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tssh: Process exited with status 32\n"} +{"Time":"2023-05-31T11:53:13.260863-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:53:13.260874-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:13.26088-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:232: \"out/minikube-darwin-amd64 -p functional-753000 ssh \\\"sudo umount -f /mount-9p\\\"\": exit status 1\n"} +{"Time":"2023-05-31T11:53:13.260889-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:234: (dbg) stopping [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdspecific-port2986442337/001:/mount-9p --alsologtostderr -v=1 --port 46464] ...\n"} +{"Time":"2023-05-31T11:53:13.376267-07:00","Action":"run","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup"} +{"Time":"2023-05-31T11:53:13.376297-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":"=== RUN TestFunctional/parallel/MountCmd/VerifyCleanup\n"} +{"Time":"2023-05-31T11:53:13.376565-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup565649327/001:/mount1 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:53:13.378603-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup565649327/001:/mount2 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:53:13.38048-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup565649327/001:/mount3 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:53:13.382296-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T\" /mount1\n"} +{"Time":"2023-05-31T11:53:13.83546-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T\" /mount1: exit status 1 (453.073775ms)\n"} +{"Time":"2023-05-31T11:53:13.835475-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \n"} +{"Time":"2023-05-31T11:53:13.835479-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:13.835482-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:53:13.835485-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \n"} +{"Time":"2023-05-31T11:53:13.835487-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:14.460201-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T\" /mount1\n"} +{"Time":"2023-05-31T11:53:15.101396-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T\" /mount2\n"} +{"Time":"2023-05-31T11:53:15.450733-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"findmnt -T\" /mount3\n"} +{"Time":"2023-05-31T11:53:15.800859-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:370: (dbg) Run: out/minikube-darwin-amd64 mount -p functional-753000 --kill=true\n"} +{"Time":"2023-05-31T11:53:15.846046-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup565649327/001:/mount1 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:53:15.84607-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T11:53:15.846075-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup565649327/001:/mount2 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:53:15.846102-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T11:53:15.846111-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-darwin-amd64 mount -p functional-753000 /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup565649327/001:/mount3 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:53:15.846117-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T11:53:15.846414-07:00","Action":"cont","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T11:53:15.846423-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== CONT TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T11:53:15.84646-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:849: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 status\n"} +{"Time":"2023-05-31T11:53:16.225218-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:855: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 status -f host:{{.Host}},kublet:{{.Kubelet}},apiserver:{{.APIServer}},kubeconfig:{{.Kubeconfig}}\n"} +{"Time":"2023-05-31T11:53:16.608912-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:867: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 status -o json\n"} +{"Time":"2023-05-31T11:53:16.982407-07:00","Action":"cont","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T11:53:16.982419-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== CONT TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T11:53:16.982523-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" functional_test.go:1015: (dbg) Run: out/minikube-darwin-amd64 start -p functional-753000 --dry-run --memory 250MB --alsologtostderr --driver=docker \n"} +{"Time":"2023-05-31T11:53:17.550834-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" functional_test.go:1015: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p functional-753000 --dry-run --memory 250MB --alsologtostderr --driver=docker : exit status 23 (568.017198ms)\n"} +{"Time":"2023-05-31T11:53:17.550848-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T11:53:17.550852-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:17.550865-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t* [functional-753000] minikube v1.30.1 sur Darwin 13.4\n"} +{"Time":"2023-05-31T11:53:17.550868-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:53:17.550872-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T11:53:17.550879-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T11:53:17.550882-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:53:17.550885-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T11:53:17.550887-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:53:17.55089-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t* Utilisation du pilote docker basé sur le profil existant\n"} +{"Time":"2023-05-31T11:53:17.550893-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t\n"} +{"Time":"2023-05-31T11:53:17.550896-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t\n"} +{"Time":"2023-05-31T11:53:17.550898-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T11:53:17.550901-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:17.550904-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:17.550906-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.032740 3544 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:53:17.550909-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.033043 3544 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:53:17.550912-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.033053 3544 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:53:17.550917-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.033061 3544 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:53:17.55092-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.033300 3544 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:53:17.550923-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.035158 3544 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:53:17.550926-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.054687 3544 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":1365,\"bootTime\":1685557832,\"procs\":407,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T11:53:17.550931-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tW0531 11:53:17.054778 3544 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:53:17.550934-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.076614 3544 out.go:177] * [functional-753000] minikube v1.30.1 sur Darwin 13.4\n"} +{"Time":"2023-05-31T11:53:17.550937-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.098413 3544 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:53:17.55094-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.120448 3544 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:53:17.550943-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.141395 3544 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T11:53:17.550947-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.162211 3544 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T11:53:17.550951-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.183389 3544 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:53:17.550956-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.204612 3544 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T11:53:17.55096-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.225252 3544 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:53:17.550963-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.246701 3544 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:53:17.550967-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.247109 3544 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:53:17.550969-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.302101 3544 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T11:53:17.550972-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.302216 3544 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:53:17.550983-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.396758 3544 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:1 ContainersRunning:1 ContainersPaused:0 ContainersStopped:0 Images:1 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:58 OomKillDisable:false NGoroutines:67 SystemTime:2023-05-31 18:53:17.3839402 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexSer"} +{"Time":"2023-05-31T11:53:17.550992-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"verAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=builtin"} +{"Time":"2023-05-31T11:53:17.550999-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Path:"} +{"Time":"2023-05-31T11:53:17.551007-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003cni"} +{"Time":"2023-05-31T11:53:17.551011-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"l\u003e}}\n"} +{"Time":"2023-05-31T11:53:17.551014-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.418800 3544 out.go:177] * Utilisation du pilote docker basé sur le profil existant\n"} +{"Time":"2023-05-31T11:53:17.551017-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.440118 3544 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T11:53:17.551022-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.440138 3544 start.go:875] validating driver \"docker\" against \u0026{Name:functional-753000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:functional-753000 Namespace:default APIServerName:miniku"} +{"Time":"2023-05-31T11:53:17.551026-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"beCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:apiserver Key:enable-admission-plugins Value:NamespaceAutoProvision}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8441 NodeName:} Nodes:[{Name: IP:192.168.49.2 Port:8441 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L Mou"} +{"Time":"2023-05-31T11:53:17.551035-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"ntGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T11:53:17.551038-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.440246 3544 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:53:17.551046-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.464257 3544 out.go:177] \n"} +{"Time":"2023-05-31T11:53:17.551051-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tW0531 11:53:17.485321 3544 out.go:239] X Fermeture en raison de RSRC_INSUFFICIENT_REQ_MEMORY : L'allocation de mémoire demandée 250 Mio est inférieure au minimum utilisable de 1800 Mo\n"} +{"Time":"2023-05-31T11:53:17.551056-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tX Fermeture en raison de RSRC_INSUFFICIENT_REQ_MEMORY : L'allocation de mémoire demandée 250 Mio est inférieure au minimum utilisable de 1800 Mo\n"} +{"Time":"2023-05-31T11:53:17.551066-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:53:17.506087 3544 out.go:177] \n"} +{"Time":"2023-05-31T11:53:17.551071-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T11:53:17.551075-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:17.551083-07:00","Action":"cont","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T11:53:17.551088-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== CONT TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T11:53:17.551091-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:969: (dbg) Run: out/minikube-darwin-amd64 start -p functional-753000 --dry-run --memory 250MB --alsologtostderr --driver=docker \n"} +{"Time":"2023-05-31T11:53:18.205242-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:969: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p functional-753000 --dry-run --memory 250MB --alsologtostderr --driver=docker : exit status 23 (654.005639ms)\n"} +{"Time":"2023-05-31T11:53:18.205257-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T11:53:18.205261-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:18.205264-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t* [functional-753000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T11:53:18.205278-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:53:18.205282-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T11:53:18.205285-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T11:53:18.205292-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:53:18.205295-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T11:53:18.205302-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:53:18.205305-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t* Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T11:53:18.205308-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t\n"} +{"Time":"2023-05-31T11:53:18.205312-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t\n"} +{"Time":"2023-05-31T11:53:18.205315-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T11:53:18.205317-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:18.205322-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:18.205325-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.588661 3560 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:53:18.205328-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.588826 3560 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:53:18.205331-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.588831 3560 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:53:18.205333-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.588835 3560 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:53:18.205336-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.588946 3560 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:53:18.205339-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.590270 3560 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:53:18.205343-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.609355 3560 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":1365,\"bootTime\":1685557832,\"procs\":407,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T11:53:18.205348-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tW0531 11:53:17.609453 3560 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:53:18.205351-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.631177 3560 out.go:177] * [functional-753000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T11:53:18.205354-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.673191 3560 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:53:18.205357-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.694130 3560 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:53:18.20536-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.736174 3560 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T11:53:18.205362-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.799142 3560 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T11:53:18.205365-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.841219 3560 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:53:18.205368-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.862211 3560 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T11:53:18.205371-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.883045 3560 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:53:18.205374-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.904900 3560 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:53:18.205377-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.905633 3560 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:53:18.20538-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.961543 3560 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T11:53:18.205383-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:17.961684 3560 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:53:18.20539-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:18.056492 3560 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:1 ContainersRunning:1 ContainersPaused:0 ContainersStopped:0 Images:1 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:58 OomKillDisable:false NGoroutines:67 SystemTime:2023-05-31 18:53:18.045498969 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T11:53:18.205396-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T11:53:18.205401-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T11:53:18.205406-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T11:53:18.20541-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T11:53:18.205412-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:18.077754 3560 out.go:177] * Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T11:53:18.205415-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:18.098436 3560 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T11:53:18.205421-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:18.098485 3560 start.go:875] validating driver \"docker\" against \u0026{Name:functional-753000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:functional-753000 Namespace:default APIServerName:miniku"} +{"Time":"2023-05-31T11:53:18.205428-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"beCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:apiserver Key:enable-admission-plugins Value:NamespaceAutoProvision}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8441 NodeName:} Nodes:[{Name: IP:192.168.49.2 Port:8441 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L Mou"} +{"Time":"2023-05-31T11:53:18.205432-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"ntGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T11:53:18.205436-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:18.098563 3560 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:53:18.205439-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:18.122655 3560 out.go:177] \n"} +{"Time":"2023-05-31T11:53:18.205442-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tW0531 11:53:18.144663 3560 out.go:239] X Exiting due to RSRC_INSUFFICIENT_REQ_MEMORY: Requested memory allocation 250MiB is less than the usable minimum of 1800MB\n"} +{"Time":"2023-05-31T11:53:18.205448-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tX Exiting due to RSRC_INSUFFICIENT_REQ_MEMORY: Requested memory allocation 250MiB is less than the usable minimum of 1800MB\n"} +{"Time":"2023-05-31T11:53:18.205452-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:53:18.165499 3560 out.go:177] \n"} +{"Time":"2023-05-31T11:53:18.205454-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T11:53:18.205457-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:18.205462-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:986: (dbg) Run: out/minikube-darwin-amd64 start -p functional-753000 --dry-run --alsologtostderr -v=1 --driver=docker \n"} +{"Time":"2023-05-31T11:53:18.846126-07:00","Action":"cont","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T11:53:18.846142-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== CONT TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T11:53:18.846197-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" functional_test.go:900: (dbg) daemon: [out/minikube-darwin-amd64 dashboard --url --port 36195 -p functional-753000 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:53:21.973684-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" functional_test.go:1507: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 service --namespace=default --https --url hello-node: signal: killed (15.003713716s)\n"} +{"Time":"2023-05-31T11:53:21.973699-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" \n"} +{"Time":"2023-05-31T11:53:21.973703-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:21.973706-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" \thttps://127.0.0.1:50130\n"} +{"Time":"2023-05-31T11:53:21.97371-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" \n"} +{"Time":"2023-05-31T11:53:21.973712-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:21.973713-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:21.973715-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" \t! Because you are using a Docker driver on darwin, the terminal needs to be open to run it.\n"} +{"Time":"2023-05-31T11:53:21.973723-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" \n"} +{"Time":"2023-05-31T11:53:21.973725-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:21.973727-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" functional_test.go:1520: found endpoint: https://127.0.0.1:50130\n"} +{"Time":"2023-05-31T11:53:21.973731-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/Format"} +{"Time":"2023-05-31T11:53:21.973733-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":"=== RUN TestFunctional/parallel/ServiceCmd/Format\n"} +{"Time":"2023-05-31T11:53:21.97379-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" functional_test.go:1538: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 service hello-node --url --format={{.IP}}\n"} +{"Time":"2023-05-31T11:53:36.976197-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" functional_test.go:1538: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 service hello-node --url --format={{.IP}}: signal: killed (15.002199032s)\n"} +{"Time":"2023-05-31T11:53:36.976212-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" \n"} +{"Time":"2023-05-31T11:53:36.976216-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:36.976219-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" \t127.0.0.1\n"} +{"Time":"2023-05-31T11:53:36.976222-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" \n"} +{"Time":"2023-05-31T11:53:36.976224-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:36.976227-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:36.97623-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" \t! Because you are using a Docker driver on darwin, the terminal needs to be open to run it.\n"} +{"Time":"2023-05-31T11:53:36.976233-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" \n"} +{"Time":"2023-05-31T11:53:36.976236-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:36.976254-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/URL"} +{"Time":"2023-05-31T11:53:36.976257-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":"=== RUN TestFunctional/parallel/ServiceCmd/URL\n"} +{"Time":"2023-05-31T11:53:36.97629-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" functional_test.go:1557: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 service hello-node --url\n"} +{"Time":"2023-05-31T11:53:38.393817-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":"2023/05/31 11:53:38 [DEBUG] GET http://127.0.0.1:36195/api/v1/namespaces/kubernetes-dashboard/services/http:kubernetes-dashboard:/proxy/\n"} +{"Time":"2023-05-31T11:53:38.401681-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" functional_test.go:905: (dbg) stopping [out/minikube-darwin-amd64 dashboard --url --port 36195 -p functional-753000 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:53:38.518332-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" helpers_test.go:508: unable to kill pid 3616: os: process already finished\n"} +{"Time":"2023-05-31T11:53:38.618594-07:00","Action":"cont","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T11:53:38.618612-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== CONT TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T11:53:38.618706-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":" functional_test.go:545: only validate podman env with docker container runtime, currently testing docker\n"} +{"Time":"2023-05-31T11:53:38.618723-07:00","Action":"cont","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T11:53:38.618753-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== CONT TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T11:53:38.618764-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":" functional_test.go:2283: (dbg) Run: out/minikube-darwin-amd64 license\n"} +{"Time":"2023-05-31T11:53:39.198621-07:00","Action":"cont","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T11:53:39.198641-07:00","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== CONT TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T11:53:39.198652-07:00","Action":"run","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T11:53:39.198657-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== RUN TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T11:53:39.198731-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== PAUSE TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T11:53:39.198744-07:00","Action":"pause","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T11:53:39.198753-07:00","Action":"run","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T11:53:39.198758-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== RUN TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T11:53:39.198796-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== PAUSE TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T11:53:39.198804-07:00","Action":"pause","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T11:53:39.198812-07:00","Action":"cont","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T11:53:39.198816-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== CONT TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T11:53:39.198961-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" functional_test.go:2022: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo systemctl is-active crio\"\n"} +{"Time":"2023-05-31T11:53:39.674128-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" functional_test.go:2022: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo systemctl is-active crio\": exit status 1 (475.059805ms)\n"} +{"Time":"2023-05-31T11:53:39.67415-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T11:53:39.674159-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:39.674167-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \tinactive\n"} +{"Time":"2023-05-31T11:53:39.674172-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T11:53:39.674186-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:39.674191-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:39.674195-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \tssh: Process exited with status 3\n"} +{"Time":"2023-05-31T11:53:39.674199-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T11:53:39.674202-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:39.67421-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T11:53:39.674213-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== CONT TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T11:53:39.674217-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T11:53:39.674221-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T11:53:39.674227-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T11:53:39.67423-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T11:53:39.674238-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T11:53:39.674241-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T11:53:39.674249-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T11:53:39.674252-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T11:53:39.674276-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T11:53:39.674287-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T11:53:39.674295-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T11:53:39.674302-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T11:53:39.674308-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T11:53:39.674312-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T11:53:39.674332-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T11:53:39.674348-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T11:53:39.674364-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T11:53:39.674369-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T11:53:39.674412-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T11:53:39.674417-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T11:53:39.674423-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/Setup"} +{"Time":"2023-05-31T11:53:39.674426-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":"=== RUN TestFunctional/parallel/ImageCommands/Setup\n"} +{"Time":"2023-05-31T11:53:39.674567-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:340: (dbg) Run: docker pull gcr.io/google-containers/addon-resizer:1.8.8\n"} +{"Time":"2023-05-31T11:53:40.341556-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":"E0531 11:53:40.341520 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:53:42.619943-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:340: (dbg) Done: docker pull gcr.io/google-containers/addon-resizer:1.8.8: (2.945316241s)\n"} +{"Time":"2023-05-31T11:53:42.62002-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:345: (dbg) Run: docker tag gcr.io/google-containers/addon-resizer:1.8.8 gcr.io/google-containers/addon-resizer:functional-753000\n"} +{"Time":"2023-05-31T11:53:42.677827-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon"} +{"Time":"2023-05-31T11:53:42.677841-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageLoadDaemon\n"} +{"Time":"2023-05-31T11:53:42.677947-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:353: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image load --daemon gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:53:46.405434-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:353: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 image load --daemon gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr: (3.727423079s)\n"} +{"Time":"2023-05-31T11:53:46.40545-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls\n"} +{"Time":"2023-05-31T11:53:46.677932-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon"} +{"Time":"2023-05-31T11:53:46.677945-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageReloadDaemon\n"} +{"Time":"2023-05-31T11:53:46.677952-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:363: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image load --daemon gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:53:48.816628-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:363: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 image load --daemon gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr: (2.138596108s)\n"} +{"Time":"2023-05-31T11:53:48.816641-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls\n"} +{"Time":"2023-05-31T11:53:49.092622-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon"} +{"Time":"2023-05-31T11:53:49.092636-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon\n"} +{"Time":"2023-05-31T11:53:49.092737-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:233: (dbg) Run: docker pull gcr.io/google-containers/addon-resizer:1.8.9\n"} +{"Time":"2023-05-31T11:53:51.624467-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:233: (dbg) Done: docker pull gcr.io/google-containers/addon-resizer:1.8.9: (2.53165239s)\n"} +{"Time":"2023-05-31T11:53:51.624593-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:238: (dbg) Run: docker tag gcr.io/google-containers/addon-resizer:1.8.9 gcr.io/google-containers/addon-resizer:functional-753000\n"} +{"Time":"2023-05-31T11:53:51.681915-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:243: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image load --daemon gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:53:51.978197-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" functional_test.go:1557: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 service hello-node --url: signal: killed (15.001755726s)\n"} +{"Time":"2023-05-31T11:53:51.97821-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" \n"} +{"Time":"2023-05-31T11:53:51.978213-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:51.978215-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" \thttp://127.0.0.1:50228\n"} +{"Time":"2023-05-31T11:53:51.978217-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" \n"} +{"Time":"2023-05-31T11:53:51.978219-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:51.978226-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:51.978228-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" \t! Because you are using a Docker driver on darwin, the terminal needs to be open to run it.\n"} +{"Time":"2023-05-31T11:53:51.97823-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" \n"} +{"Time":"2023-05-31T11:53:51.978234-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:51.978236-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" functional_test.go:1563: found endpoint for hello-node: http://127.0.0.1:50228\n"} +{"Time":"2023-05-31T11:53:51.978244-07:00","Action":"cont","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T11:53:51.978246-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== CONT TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T11:53:51.978406-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":" functional_test.go:217: (dbg) Run: kubectl --context functional-753000 get nodes --output=go-template \"--template='{{range $k, $v := (index .items 0).metadata.labels}}{{$k}} {{end}}'\"\n"} +{"Time":"2023-05-31T11:53:52.036568-07:00","Action":"cont","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T11:53:52.03659-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== CONT TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T11:53:52.036722-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /etc/ssl/certs/1566.pem within VM\n"} +{"Time":"2023-05-31T11:53:52.036769-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo cat /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T11:53:52.509355-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /usr/share/ca-certificates/1566.pem within VM\n"} +{"Time":"2023-05-31T11:53:52.509382-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo cat /usr/share/ca-certificates/1566.pem\"\n"} +{"Time":"2023-05-31T11:53:52.893034-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /etc/ssl/certs/51391683.0 within VM\n"} +{"Time":"2023-05-31T11:53:52.893065-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo cat /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T11:53:53.283557-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /etc/ssl/certs/15662.pem within VM\n"} +{"Time":"2023-05-31T11:53:53.283571-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo cat /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T11:53:53.664237-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /usr/share/ca-certificates/15662.pem within VM\n"} +{"Time":"2023-05-31T11:53:53.664253-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo cat /usr/share/ca-certificates/15662.pem\"\n"} +{"Time":"2023-05-31T11:53:54.128236-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /etc/ssl/certs/3ec20f2e.0 within VM\n"} +{"Time":"2023-05-31T11:53:54.128254-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo cat /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T11:53:54.571451-07:00","Action":"cont","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T11:53:54.571471-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== CONT TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T11:53:54.57148-07:00","Action":"run","Test":"TestFunctional/parallel/DockerEnv/bash"} +{"Time":"2023-05-31T11:53:54.571483-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":"=== RUN TestFunctional/parallel/DockerEnv/bash\n"} +{"Time":"2023-05-31T11:53:54.571572-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":" functional_test.go:494: (dbg) Run: /bin/bash -c \"eval $(out/minikube-darwin-amd64 -p functional-753000 docker-env) \u0026\u0026 out/minikube-darwin-amd64 status -p functional-753000\"\n"} +{"Time":"2023-05-31T11:53:55.699564-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":" functional_test.go:494: (dbg) Done: /bin/bash -c \"eval $(out/minikube-darwin-amd64 -p functional-753000 docker-env) \u0026\u0026 out/minikube-darwin-amd64 status -p functional-753000\": (1.127937333s)\n"} +{"Time":"2023-05-31T11:53:55.699604-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":" functional_test.go:517: (dbg) Run: /bin/bash -c \"eval $(out/minikube-darwin-amd64 -p functional-753000 docker-env) \u0026\u0026 docker images\"\n"} +{"Time":"2023-05-31T11:53:55.704043-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:243: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 image load --daemon gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr: (4.022040307s)\n"} +{"Time":"2023-05-31T11:53:55.704096-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls\n"} +{"Time":"2023-05-31T11:53:56.000373-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile"} +{"Time":"2023-05-31T11:53:56.00039-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageSaveToFile\n"} +{"Time":"2023-05-31T11:53:56.000415-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":" functional_test.go:378: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image save gcr.io/google-containers/addon-resizer:functional-753000 /Users/jenkins/workspace/addon-resizer-save.tar --alsologtostderr\n"} +{"Time":"2023-05-31T11:53:56.281654-07:00","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T11:53:56.281667-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T11:53:56.281673-07:00","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T11:53:56.281676-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T11:53:56.281698-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T11:53:56.281701-07:00","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T11:53:56.281714-07:00","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T11:53:56.281718-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T11:53:56.281727-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T11:53:56.281729-07:00","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T11:53:56.281733-07:00","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T11:53:56.281736-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T11:53:56.281743-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T11:53:56.281745-07:00","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T11:53:56.28176-07:00","Action":"cont","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T11:53:56.281769-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== CONT TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T11:53:56.281774-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1924: Checking for existence of /etc/test/nested/copy/1566/hosts within VM\n"} +{"Time":"2023-05-31T11:53:56.281812-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1926: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh \"sudo cat /etc/test/nested/copy/1566/hosts\"\n"} +{"Time":"2023-05-31T11:53:56.672231-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1931: file sync test content: Test file for checking file sync process\n"} +{"Time":"2023-05-31T11:53:56.672337-07:00","Action":"cont","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T11:53:56.67235-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== CONT TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T11:53:56.672477-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1788: (dbg) Run: kubectl --context functional-753000 replace --force -f testdata/mysql.yaml\n"} +{"Time":"2023-05-31T11:53:56.848244-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1794: (dbg) TestFunctional/parallel/MySQL: waiting 10m0s for pods matching \"app=mysql\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:53:57.352741-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":" functional_test.go:378: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 image save gcr.io/google-containers/addon-resizer:functional-753000 /Users/jenkins/workspace/addon-resizer-save.tar --alsologtostderr: (1.352270446s)\n"} +{"Time":"2023-05-31T11:53:57.352776-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageRemove"} +{"Time":"2023-05-31T11:53:57.352779-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageRemove\n"} +{"Time":"2023-05-31T11:53:57.352816-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" functional_test.go:390: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image rm gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:53:57.687227-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls\n"} +{"Time":"2023-05-31T11:53:57.859589-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" helpers_test.go:344: \"mysql-7db894d786-4c278\" [7d22eb7c-6c3d-46dc-b863-4024b49d4cf0] Pending / Ready:ContainersNotReady (containers with unready status: [mysql]) / ContainersReady:ContainersNotReady (containers with unready status: [mysql])\n"} +{"Time":"2023-05-31T11:53:57.97936-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile"} +{"Time":"2023-05-31T11:53:57.979373-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageLoadFromFile\n"} +{"Time":"2023-05-31T11:53:57.979417-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" functional_test.go:407: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image load /Users/jenkins/workspace/addon-resizer-save.tar --alsologtostderr\n"} +{"Time":"2023-05-31T11:54:00.298778-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" functional_test.go:407: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 image load /Users/jenkins/workspace/addon-resizer-save.tar --alsologtostderr: (2.319303762s)\n"} +{"Time":"2023-05-31T11:54:00.298908-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls\n"} +{"Time":"2023-05-31T11:54:00.700186-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon"} +{"Time":"2023-05-31T11:54:00.700214-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageSaveDaemon\n"} +{"Time":"2023-05-31T11:54:00.700297-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:417: (dbg) Run: docker rmi gcr.io/google-containers/addon-resizer:functional-753000\n"} +{"Time":"2023-05-31T11:54:00.761786-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:422: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image save --daemon gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:54:03.894081-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:422: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 image save --daemon gcr.io/google-containers/addon-resizer:functional-753000 --alsologtostderr: (3.132229687s)\n"} +{"Time":"2023-05-31T11:54:03.894166-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:427: (dbg) Run: docker image inspect gcr.io/google-containers/addon-resizer:functional-753000\n"} +{"Time":"2023-05-31T11:54:03.956813-07:00","Action":"cont","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T11:54:03.956826-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== CONT TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T11:54:03.956896-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":" functional_test.go:2251: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 version --short\n"} +{"Time":"2023-05-31T11:54:04.052369-07:00","Action":"cont","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T11:54:04.052385-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== CONT TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T11:54:04.052421-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":" functional_test.go:2265: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 version -o=json --components\n"} +{"Time":"2023-05-31T11:54:05.035715-07:00","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T11:54:05.03574-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T11:54:05.035748-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":" functional_test.go:2114: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T11:54:05.310398-07:00","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T11:54:05.310416-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T11:54:05.310721-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":" functional_test.go:2114: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T11:54:05.574198-07:00","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T11:54:05.574212-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T11:54:05.574487-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":" functional_test.go:2114: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T11:54:05.843301-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T11:54:05.843315-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T11:54:05.843373-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:259: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls --format yaml --alsologtostderr\n"} +{"Time":"2023-05-31T11:54:06.187735-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-darwin-amd64 -p functional-753000 image ls --format yaml --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:06.187751-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: fe7edaf8a8dcf9af72f49cf0a0219e3ace17667bafc537f0d4a0ab1bd7f10467\n"} +{"Time":"2023-05-31T11:54:06.187756-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187759-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187762-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/nginx:alpine\n"} +{"Time":"2023-05-31T11:54:06.187764-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"41400000\"\n"} +{"Time":"2023-05-31T11:54:06.187766-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 115053965e86b2df4d78af78d7951b8644839d20a03820c6df59a261103315f7\n"} +{"Time":"2023-05-31T11:54:06.187769-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187772-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187775-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/kubernetesui/metrics-scraper:\u003cnone\u003e\n"} +{"Time":"2023-05-31T11:54:06.187778-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"43800000\"\n"} +{"Time":"2023-05-31T11:54:06.187781-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 6e38f40d628db3002f5617342c8872c935de530d867d0f709a2fbda1a302a562\n"} +{"Time":"2023-05-31T11:54:06.187784-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187786-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187788-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:54:06.18779-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"31500000\"\n"} +{"Time":"2023-05-31T11:54:06.187792-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 82e4c8a736a4fcf22b5ef9f6a4ff6207064c7187d7694bf97bd561605a538410\n"} +{"Time":"2023-05-31T11:54:06.187794-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187801-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187803-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/echoserver:1.8\n"} +{"Time":"2023-05-31T11:54:06.187805-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"95400000\"\n"} +{"Time":"2023-05-31T11:54:06.187807-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 350b164e7ae1dcddeffadd65c76226c9b6dc5553f5179153fb0e36b78f2a5e06\n"} +{"Time":"2023-05-31T11:54:06.187809-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187812-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187815-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:54:06.187818-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"240000\"\n"} +{"Time":"2023-05-31T11:54:06.187824-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: ac2b7465ebba99362b6ea11fca1357b90ae6854b4464a25c55e6eef622103e12\n"} +{"Time":"2023-05-31T11:54:06.187828-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187831-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187834-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.187837-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"112000000\"\n"} +{"Time":"2023-05-31T11:54:06.18784-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\n"} +{"Time":"2023-05-31T11:54:06.187843-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187845-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187848-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T11:54:06.18786-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"53600000\"\n"} +{"Time":"2023-05-31T11:54:06.187864-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\n"} +{"Time":"2023-05-31T11:54:06.187867-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.18787-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187872-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T11:54:06.187876-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"744000\"\n"} +{"Time":"2023-05-31T11:54:06.187878-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 07655ddf2eebe5d250f7a72c25f638b27126805d61779741b4e62e69ba080558\n"} +{"Time":"2023-05-31T11:54:06.18788-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187882-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187884-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/kubernetesui/dashboard:\u003cnone\u003e\n"} +{"Time":"2023-05-31T11:54:06.187886-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"246000000\"\n"} +{"Time":"2023-05-31T11:54:06.187889-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: ffd4cfbbe753e62419e129ee2ac618beb94e51baa7471df5038b0b516b59cf91\n"} +{"Time":"2023-05-31T11:54:06.187892-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187895-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187898-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/google-containers/addon-resizer:functional-753000\n"} +{"Time":"2023-05-31T11:54:06.1879-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"32900000\"\n"} +{"Time":"2023-05-31T11:54:06.187902-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 0184c1613d92931126feb4c548e5da11015513b9e4c104e7305ee8b53b50a9da\n"} +{"Time":"2023-05-31T11:54:06.187904-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187906-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187909-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T11:54:06.187912-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"683000\"\n"} +{"Time":"2023-05-31T11:54:06.187915-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: aa51f21add38a68550dd0c02efbded1e0a00e02130eea1aa68bc55dc2b482be0\n"} +{"Time":"2023-05-31T11:54:06.187917-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187919-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187921-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/minikube-local-cache-test:functional-753000\n"} +{"Time":"2023-05-31T11:54:06.187923-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"30\"\n"} +{"Time":"2023-05-31T11:54:06.187928-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: f9c14fe76d502861ba0939bc3189e642c02e257f06f4c0214b1f8ca329326cda\n"} +{"Time":"2023-05-31T11:54:06.187936-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.18794-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187943-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/nginx:latest\n"} +{"Time":"2023-05-31T11:54:06.187946-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"143000000\"\n"} +{"Time":"2023-05-31T11:54:06.187948-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: c5b13e4f7806de1dcc1c1146c7ec7c89d77ac340c3695118cf84bb0b5f989370\n"} +{"Time":"2023-05-31T11:54:06.18795-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187952-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187954-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.187956-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"121000000\"\n"} +{"Time":"2023-05-31T11:54:06.187959-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: b8aa50768fd675409bd7edcc4f6a18290dad5d9c2515aad12d32174dc13e7dee\n"} +{"Time":"2023-05-31T11:54:06.187962-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.187979-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.187983-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.187988-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"71100000\"\n"} +{"Time":"2023-05-31T11:54:06.188-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\n"} +{"Time":"2023-05-31T11:54:06.188007-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.188013-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.188019-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T11:54:06.188028-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"296000000\"\n"} +{"Time":"2023-05-31T11:54:06.188033-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 89e70da428d29a45b89f5daa196229ceddea947f4708b3a61669e0069cb6b8b0\n"} +{"Time":"2023-05-31T11:54:06.188037-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.18804-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.188043-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.188047-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"58400000\"\n"} +{"Time":"2023-05-31T11:54:06.18805-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 56cc512116c8f894f11ce1995460aef1ee0972d48bc2a3bdb1faaac7c020289c\n"} +{"Time":"2023-05-31T11:54:06.188053-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.188059-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.18807-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T11:54:06.188075-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"4400000\"\n"} +{"Time":"2023-05-31T11:54:06.188084-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: da86e6ba6ca197bf6bc5e9d900febd906b133eaa4750e6bed647b0fbe50ed43e\n"} +{"Time":"2023-05-31T11:54:06.188087-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:54:06.188089-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:54:06.188092-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T11:54:06.188095-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"742000\"\n"} +{"Time":"2023-05-31T11:54:06.188097-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" \n"} +{"Time":"2023-05-31T11:54:06.188101-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-darwin-amd64 -p functional-753000 image ls --format yaml --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:06.188105-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.886092 3940 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:54:06.188112-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.886333 3940 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:06.188117-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.886338 3940 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:54:06.188124-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.886342 3940 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:06.188128-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.886458 3940 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:54:06.188131-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.887981 3940 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.188135-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.888117 3940 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.188139-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.888524 3940 cli_runner.go:164] Run: docker container inspect functional-753000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T11:54:06.188152-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.942636 3940 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:54:06.188157-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.942718 3940 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" functional-753000\n"} +{"Time":"2023-05-31T11:54:06.18816-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:05.996535 3940 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:49887 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/functional-753000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:54:06.188165-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:54:06.098364 3940 ssh_runner.go:195] Run: docker images --no-trunc --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:54:06.188172-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T11:54:06.188175-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T11:54:06.188183-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:259: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls --format short --alsologtostderr\n"} +{"Time":"2023-05-31T11:54:06.509089-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-darwin-amd64 -p functional-753000 image ls --format short --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:06.509104-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:54:06.509106-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T11:54:06.509109-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T11:54:06.509111-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T11:54:06.509113-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.509115-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.509117-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.509119-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.509122-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T11:54:06.509124-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/echoserver:1.8\n"} +{"Time":"2023-05-31T11:54:06.509126-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T11:54:06.509128-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:54:06.50913-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T11:54:06.509132-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/google-containers/addon-resizer:functional-753000\n"} +{"Time":"2023-05-31T11:54:06.509144-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/nginx:latest\n"} +{"Time":"2023-05-31T11:54:06.509146-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/nginx:alpine\n"} +{"Time":"2023-05-31T11:54:06.509148-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/minikube-local-cache-test:functional-753000\n"} +{"Time":"2023-05-31T11:54:06.50915-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/kubernetesui/metrics-scraper:\u003cnone\u003e\n"} +{"Time":"2023-05-31T11:54:06.509153-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/kubernetesui/dashboard:\u003cnone\u003e\n"} +{"Time":"2023-05-31T11:54:06.509156-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-darwin-amd64 -p functional-753000 image ls --format short --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:06.509159-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.230762 3946 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:54:06.509162-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.230957 3946 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:06.509165-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.230962 3946 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:54:06.509169-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.230967 3946 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:06.509172-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.231093 3946 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:54:06.509174-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.231701 3946 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.509177-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.231791 3946 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.509179-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.233242 3946 cli_runner.go:164] Run: docker container inspect functional-753000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T11:54:06.509183-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.287599 3946 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:54:06.509186-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.287673 3946 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" functional-753000\n"} +{"Time":"2023-05-31T11:54:06.509188-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.340235 3946 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:49887 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/functional-753000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:54:06.509191-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:54:06.442172 3946 ssh_runner.go:195] Run: docker images --no-trunc --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:54:06.509195-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T11:54:06.509198-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T11:54:06.509236-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:259: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls --format json --alsologtostderr\n"} +{"Time":"2023-05-31T11:54:06.800023-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-darwin-amd64 -p functional-753000 image ls --format json --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:06.800041-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" [{\"id\":\"ffd4cfbbe753e62419e129ee2ac618beb94e51baa7471df5038b0b516b59cf91\",\"repoDigests\":[],\"repoTags\":[\"gcr.io/google-containers/addon-resizer:functional-753000\"],\"size\":\"32900000\"},{\"id\":\"aa51f21add38a68550dd0c02efbded1e0a00e02130eea1aa68bc55dc2b482be0\",\"repoDigests\":[],\"repoTags\":[\"docker.io/library/minikube-local-cache-test:functional-753000\"],\"size\":\"30\"},{\"id\":\"fe7edaf8a8dcf9af72f49cf0a0219e3ace17667bafc537f0d4a0ab1bd7f10467\",\"repoDigests\":[],\"repoTags\":[\"docker.io/library/nginx:alpine\"],\"size\":\"41400000\"},{\"id\":\"115053965e86b2df4d78af78d7951b8644839d20a03820c6df59a261103315f7\",\"repoDigests\":[],\"repoTags\":[\"docker.io/kubernetesui/metrics-scraper:\\u003cnone\\u003e\"],\"size\":\"43800000\"},{\"id\":\"56cc512116c8f894f11ce1995460aef1ee0972d48bc2a3bdb1faaac7c020289c\",\"repoDigests\":[],\"repoTags\":[\"gcr.io/k8s-minikube/busybox:1.28.4-glibc\"],\"size\":\"4400000\"},{\"id\":\"350b164e7ae1dcddeffadd65c76226c9b6dc5553f5179153fb0e36b78f2a5e06\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:latest\"],\"size\":\"240000\"},{\"id"} +{"Time":"2023-05-31T11:54:06.800055-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"\":\"f9c14fe76d502861ba0939bc3189e642c02e257f06f4c0214b1f8ca329326cda\",\"repoDigests\":[],\"repoTags\":[\"docker.io/library/nginx:latest\"],\"size\":\"143000000\"},{\"id\":\"86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/etcd:3.5.7-0\"],\"size\":\"296000000\"},{\"id\":\"07655ddf2eebe5d250f7a72c25f638b27126805d61779741b4e62e69ba080558\",\"repoDigests\":[],\"repoTags\":[\"docker.io/kubernetesui/dashboard:\\u003cnone\\u003e\"],\"size\":\"246000000\"},{\"id\":\"ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/coredns/coredns:v1.10.1\"],\"size\":\"53600000\"},{\"id\":\"e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:3.9\"],\"size\":\"744000\"},{\"id\":\"6e38f40d628db3002f5617342c8872c935de530d867d0f709a2fbda1a302a562\",\"repoDigests\":[],\"repoTags\":[\"gcr.io/k8s-minikube/storage-provisioner:v5\"],\"size\":\"31500000\"},{\"id\":\"82e4c8a736a4fcf22b5ef9f6a4ff6207064c7187d7694bf97bd561605"} +{"Time":"2023-05-31T11:54:06.800061-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"a538410\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/echoserver:1.8\"],\"size\":\"95400000\"},{\"id\":\"89e70da428d29a45b89f5daa196229ceddea947f4708b3a61669e0069cb6b8b0\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/kube-scheduler:v1.27.2\"],\"size\":\"58400000\"},{\"id\":\"ac2b7465ebba99362b6ea11fca1357b90ae6854b4464a25c55e6eef622103e12\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/kube-controller-manager:v1.27.2\"],\"size\":\"112000000\"},{\"id\":\"b8aa50768fd675409bd7edcc4f6a18290dad5d9c2515aad12d32174dc13e7dee\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/kube-proxy:v1.27.2\"],\"size\":\"71100000\"},{\"id\":\"c5b13e4f7806de1dcc1c1146c7ec7c89d77ac340c3695118cf84bb0b5f989370\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/kube-apiserver:v1.27.2\"],\"size\":\"121000000\"},{\"id\":\"0184c1613d92931126feb4c548e5da11015513b9e4c104e7305ee8b53b50a9da\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:3.3\"],\"size\":\"683000\"},{\"id\":\"da86e6ba6ca197bf6bc5e9d900febd906b133eaa4750e6bed647b0fbe50ed43e\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:3"} +{"Time":"2023-05-31T11:54:06.800067-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":".1\"],\"size\":\"742000\"}]\n"} +{"Time":"2023-05-31T11:54:06.800072-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-darwin-amd64 -p functional-753000 image ls --format json --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:06.800075-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.552852 3952 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:54:06.800077-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.553048 3952 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:06.80008-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.553053 3952 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:54:06.800089-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.553058 3952 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:06.800091-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.553178 3952 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:54:06.800094-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.553759 3952 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.800096-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.553849 3952 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:06.800102-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.554223 3952 cli_runner.go:164] Run: docker container inspect functional-753000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T11:54:06.800104-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.610640 3952 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:54:06.800106-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.610720 3952 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" functional-753000\n"} +{"Time":"2023-05-31T11:54:06.800109-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.664161 3952 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:49887 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/functional-753000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:54:06.800111-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:54:06.749433 3952 ssh_runner.go:195] Run: docker images --no-trunc --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:54:06.800118-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T11:54:06.800121-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T11:54:06.800209-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:259: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls --format table --alsologtostderr\n"} +{"Time":"2023-05-31T11:54:07.096712-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-darwin-amd64 -p functional-753000 image ls --format table --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:07.096726-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|-------------------|---------------|--------|\n"} +{"Time":"2023-05-31T11:54:07.096729-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | Image | Tag | Image ID | Size |\n"} +{"Time":"2023-05-31T11:54:07.096731-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|-------------------|---------------|--------|\n"} +{"Time":"2023-05-31T11:54:07.096733-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/k8s-minikube/storage-provisioner | v5 | 6e38f40d628db | 31.5MB |\n"} +{"Time":"2023-05-31T11:54:07.096736-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/echoserver | 1.8 | 82e4c8a736a4f | 95.4MB |\n"} +{"Time":"2023-05-31T11:54:07.096751-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | latest | 350b164e7ae1d | 240kB |\n"} +{"Time":"2023-05-31T11:54:07.096754-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-controller-manager | v1.27.2 | ac2b7465ebba9 | 112MB |\n"} +{"Time":"2023-05-31T11:54:07.096756-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/kubernetesui/metrics-scraper | \u003cnone\u003e | 115053965e86b | 43.8MB |\n"} +{"Time":"2023-05-31T11:54:07.096759-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/minikube-local-cache-test | functional-753000 | aa51f21add38a | 30B |\n"} +{"Time":"2023-05-31T11:54:07.096762-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-apiserver | v1.27.2 | c5b13e4f7806d | 121MB |\n"} +{"Time":"2023-05-31T11:54:07.096765-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-scheduler | v1.27.2 | 89e70da428d29 | 58.4MB |\n"} +{"Time":"2023-05-31T11:54:07.096771-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/coredns/coredns | v1.10.1 | ead0a4a53df89 | 53.6MB |\n"} +{"Time":"2023-05-31T11:54:07.096784-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/google-containers/addon-resizer | functional-753000 | ffd4cfbbe753e | 32.9MB |\n"} +{"Time":"2023-05-31T11:54:07.096789-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/nginx | alpine | fe7edaf8a8dcf | 41.4MB |\n"} +{"Time":"2023-05-31T11:54:07.096792-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-proxy | v1.27.2 | b8aa50768fd67 | 71.1MB |\n"} +{"Time":"2023-05-31T11:54:07.096796-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/etcd | 3.5.7-0 | 86b6af7dd652c | 296MB |\n"} +{"Time":"2023-05-31T11:54:07.096803-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.9 | e6f1816883972 | 744kB |\n"} +{"Time":"2023-05-31T11:54:07.09681-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/kubernetesui/dashboard | \u003cnone\u003e | 07655ddf2eebe | 246MB |\n"} +{"Time":"2023-05-31T11:54:07.096815-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.3 | 0184c1613d929 | 683kB |\n"} +{"Time":"2023-05-31T11:54:07.096817-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/k8s-minikube/busybox | 1.28.4-glibc | 56cc512116c8f | 4.4MB |\n"} +{"Time":"2023-05-31T11:54:07.096819-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.1 | da86e6ba6ca19 | 742kB |\n"} +{"Time":"2023-05-31T11:54:07.096821-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/nginx | latest | f9c14fe76d502 | 143MB |\n"} +{"Time":"2023-05-31T11:54:07.096831-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|-------------------|---------------|--------|\n"} +{"Time":"2023-05-31T11:54:07.096836-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-darwin-amd64 -p functional-753000 image ls --format table --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:07.096843-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.846087 3958 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:54:07.096848-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.846452 3958 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:07.096851-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.846460 3958 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:54:07.09686-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.846465 3958 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:07.096866-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.846594 3958 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:54:07.096872-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.847290 3958 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:07.096876-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.847400 3958 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:07.096878-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.847850 3958 cli_runner.go:164] Run: docker container inspect functional-753000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T11:54:07.096881-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.908083 3958 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:54:07.096887-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.908157 3958 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" functional-753000\n"} +{"Time":"2023-05-31T11:54:07.09689-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:06.962713 3958 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:49887 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/functional-753000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:54:07.096893-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:54:07.046095 3958 ssh_runner.go:195] Run: docker images --no-trunc --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:54:07.09691-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T11:54:07.096933-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T11:54:07.096941-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:306: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 ssh pgrep buildkitd\n"} +{"Time":"2023-05-31T11:54:07.449253-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:306: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p functional-753000 ssh pgrep buildkitd: exit status 1 (352.290123ms)\n"} +{"Time":"2023-05-31T11:54:07.449267-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:07.44927-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:54:07.449273-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:54:07.449275-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:07.449277-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:54:07.449281-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:313: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image build -t localhost/my-image:functional-753000 testdata/build --alsologtostderr\n"} +{"Time":"2023-05-31T11:54:10.478173-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:313: (dbg) Done: out/minikube-darwin-amd64 -p functional-753000 image build -t localhost/my-image:functional-753000 testdata/build --alsologtostderr: (3.028845778s)\n"} +{"Time":"2023-05-31T11:54:10.47823-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:321: (dbg) Stderr: out/minikube-darwin-amd64 -p functional-753000 image build -t localhost/my-image:functional-753000 testdata/build --alsologtostderr:\n"} +{"Time":"2023-05-31T11:54:10.478239-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.492067 3974 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:54:10.478244-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.492363 3974 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:10.478248-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.492369 3974 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:54:10.478251-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.492373 3974 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:54:10.478255-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.492533 3974 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:54:10.478258-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.493201 3974 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:10.478262-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.493859 3974 config.go:182] Loaded profile config \"functional-753000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:54:10.478265-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.494344 3974 cli_runner.go:164] Run: docker container inspect functional-753000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T11:54:10.478269-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.548860 3974 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:54:10.478272-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.548935 3974 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" functional-753000\n"} +{"Time":"2023-05-31T11:54:10.478276-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.603795 3974 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:49887 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/functional-753000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:54:10.47828-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.700527 3974 build_images.go:151] Building image from path: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/build.2488380155.tar\n"} +{"Time":"2023-05-31T11:54:10.478283-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.700621 3974 ssh_runner.go:195] Run: sudo mkdir -p /var/lib/minikube/build\n"} +{"Time":"2023-05-31T11:54:10.478287-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.711076 3974 ssh_runner.go:195] Run: stat -c \"%s %y\" /var/lib/minikube/build/build.2488380155.tar\n"} +{"Time":"2023-05-31T11:54:10.47829-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.715969 3974 ssh_runner.go:352] existence check for /var/lib/minikube/build/build.2488380155.tar: stat -c \"%s %y\" /var/lib/minikube/build/build.2488380155.tar: Process exited with status 1\n"} +{"Time":"2023-05-31T11:54:10.478294-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stdout:\n"} +{"Time":"2023-05-31T11:54:10.478297-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:10.478301-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stderr:\n"} +{"Time":"2023-05-31T11:54:10.478304-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stat: cannot statx '/var/lib/minikube/build/build.2488380155.tar': No such file or directory\n"} +{"Time":"2023-05-31T11:54:10.478307-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.716009 3974 ssh_runner.go:362] scp /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/build.2488380155.tar --\u003e /var/lib/minikube/build/build.2488380155.tar (3072 bytes)\n"} +{"Time":"2023-05-31T11:54:10.478311-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.756797 3974 ssh_runner.go:195] Run: sudo mkdir -p /var/lib/minikube/build/build.2488380155\n"} +{"Time":"2023-05-31T11:54:10.478315-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.767110 3974 ssh_runner.go:195] Run: sudo tar -C /var/lib/minikube/build/build.2488380155 -xf /var/lib/minikube/build/build.2488380155.tar\n"} +{"Time":"2023-05-31T11:54:10.478319-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.778470 3974 docker.go:336] Building image: /var/lib/minikube/build/build.2488380155\n"} +{"Time":"2023-05-31T11:54:10.478323-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:07.778613 3974 ssh_runner.go:195] Run: docker build -t localhost/my-image:functional-753000 /var/lib/minikube/build/build.2488380155\n"} +{"Time":"2023-05-31T11:54:10.478334-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #1 [internal] load .dockerignore\n"} +{"Time":"2023-05-31T11:54:10.478339-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #1 transferring context: 2B done\n"} +{"Time":"2023-05-31T11:54:10.478343-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #1 DONE 0.0s\n"} +{"Time":"2023-05-31T11:54:10.478346-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:10.478349-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #2 [internal] load build definition from Dockerfile\n"} +{"Time":"2023-05-31T11:54:10.478353-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #2 transferring dockerfile: 97B done\n"} +{"Time":"2023-05-31T11:54:10.478356-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #2 DONE 0.0s\n"} +{"Time":"2023-05-31T11:54:10.478359-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:10.478362-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #3 [internal] load metadata for gcr.io/k8s-minikube/busybox:latest\n"} +{"Time":"2023-05-31T11:54:10.478377-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #3 DONE 1.1s\n"} +{"Time":"2023-05-31T11:54:10.478386-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:10.47839-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #4 [internal] load build context\n"} +{"Time":"2023-05-31T11:54:10.478403-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #4 transferring context: 62B done\n"} +{"Time":"2023-05-31T11:54:10.478407-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #4 DONE 0.0s\n"} +{"Time":"2023-05-31T11:54:10.47841-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:10.478421-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 [1/3] FROM gcr.io/k8s-minikube/busybox@sha256:ca5ae90100d50772da31f3b5016209e25ad61972404e2ccd83d44f10dee7e79b\n"} +{"Time":"2023-05-31T11:54:10.478425-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 resolve gcr.io/k8s-minikube/busybox@sha256:ca5ae90100d50772da31f3b5016209e25ad61972404e2ccd83d44f10dee7e79b 0.0s done\n"} +{"Time":"2023-05-31T11:54:10.478429-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 sha256:beae173ccac6ad749f76713cf4440fe3d21d1043fe616dfbe30775815d1d0f6a 1.46kB / 1.46kB done\n"} +{"Time":"2023-05-31T11:54:10.478432-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 sha256:5cc84ad355aaa64f46ea9c7bbcc319a9d808ab15088a27209c9e70ef86e5a2aa 0B / 772.79kB 0.2s\n"} +{"Time":"2023-05-31T11:54:10.478435-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 sha256:ca5ae90100d50772da31f3b5016209e25ad61972404e2ccd83d44f10dee7e79b 770B / 770B done\n"} +{"Time":"2023-05-31T11:54:10.478441-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 sha256:62ffc2ed7554e4c6d360bce40bbcf196573dd27c4ce080641a2c59867e732dee 527B / 527B done\n"} +{"Time":"2023-05-31T11:54:10.478445-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 sha256:5cc84ad355aaa64f46ea9c7bbcc319a9d808ab15088a27209c9e70ef86e5a2aa 772.79kB / 772.79kB 0.4s done\n"} +{"Time":"2023-05-31T11:54:10.478448-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 extracting sha256:5cc84ad355aaa64f46ea9c7bbcc319a9d808ab15088a27209c9e70ef86e5a2aa done\n"} +{"Time":"2023-05-31T11:54:10.478452-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 DONE 0.6s\n"} +{"Time":"2023-05-31T11:54:10.478455-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:10.478458-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #6 [2/3] RUN true\n"} +{"Time":"2023-05-31T11:54:10.478461-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #6 DONE 0.4s\n"} +{"Time":"2023-05-31T11:54:10.478464-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:10.478467-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #7 [3/3] ADD content.txt /\n"} +{"Time":"2023-05-31T11:54:10.478471-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #7 DONE 0.0s\n"} +{"Time":"2023-05-31T11:54:10.478474-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:54:10.478477-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting to image\n"} +{"Time":"2023-05-31T11:54:10.47848-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting layers\n"} +{"Time":"2023-05-31T11:54:10.478483-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting layers 0.1s done\n"} +{"Time":"2023-05-31T11:54:10.478486-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 writing image sha256:8644117cb74fa1d5be4d0125acdd2df468c93f67912338dd309b27412d1cf311 done\n"} +{"Time":"2023-05-31T11:54:10.47849-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 naming to localhost/my-image:functional-753000 done\n"} +{"Time":"2023-05-31T11:54:10.478493-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 DONE 0.1s\n"} +{"Time":"2023-05-31T11:54:10.478496-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:10.373515 3974 ssh_runner.go:235] Completed: docker build -t localhost/my-image:functional-753000 /var/lib/minikube/build/build.2488380155: (2.594877413s)\n"} +{"Time":"2023-05-31T11:54:10.478503-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:10.373579 3974 ssh_runner.go:195] Run: sudo rm -rf /var/lib/minikube/build/build.2488380155\n"} +{"Time":"2023-05-31T11:54:10.478507-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:10.383700 3974 ssh_runner.go:195] Run: sudo rm -f /var/lib/minikube/build/build.2488380155.tar\n"} +{"Time":"2023-05-31T11:54:10.47851-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:10.439888 3974 build_images.go:207] Built localhost/my-image:functional-753000 from /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/build.2488380155.tar\n"} +{"Time":"2023-05-31T11:54:10.478519-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:10.439911 3974 build_images.go:123] succeeded building to: functional-753000\n"} +{"Time":"2023-05-31T11:54:10.478525-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:54:10.439916 3974 build_images.go:124] failed building to: \n"} +{"Time":"2023-05-31T11:54:10.478533-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-amd64 -p functional-753000 image ls\n"} +{"Time":"2023-05-31T11:54:24.858704-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" helpers_test.go:344: \"mysql-7db894d786-4c278\" [7d22eb7c-6c3d-46dc-b863-4024b49d4cf0] Running\n"} +{"Time":"2023-05-31T11:54:29.858843-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1794: (dbg) TestFunctional/parallel/MySQL: app=mysql healthy within 33.010609979s\n"} +{"Time":"2023-05-31T11:54:29.858904-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-753000 exec mysql-7db894d786-4c278 -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T11:54:29.974942-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Non-zero exit: kubectl --context functional-753000 exec mysql-7db894d786-4c278 -- mysql -ppassword -e \"show databases;\": exit status 1 (115.962968ms)\n"} +{"Time":"2023-05-31T11:54:29.974955-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T11:54:29.974958-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:54:29.974961-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tmysql: [Warning] Using a password on the command line interface can be insecure.\n"} +{"Time":"2023-05-31T11:54:29.974972-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: YES)\n"} +{"Time":"2023-05-31T11:54:29.974975-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tcommand terminated with exit code 1\n"} +{"Time":"2023-05-31T11:54:29.974978-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T11:54:29.97498-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:54:31.424179-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-753000 exec mysql-7db894d786-4c278 -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T11:54:31.55122-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Non-zero exit: kubectl --context functional-753000 exec mysql-7db894d786-4c278 -- mysql -ppassword -e \"show databases;\": exit status 1 (126.936216ms)\n"} +{"Time":"2023-05-31T11:54:31.551241-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T11:54:31.551245-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:54:31.551247-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tmysql: [Warning] Using a password on the command line interface can be insecure.\n"} +{"Time":"2023-05-31T11:54:31.551249-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: YES)\n"} +{"Time":"2023-05-31T11:54:31.551251-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tcommand terminated with exit code 1\n"} +{"Time":"2023-05-31T11:54:31.551253-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T11:54:31.551256-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:54:33.240192-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-753000 exec mysql-7db894d786-4c278 -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T11:54:33.363992-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Non-zero exit: kubectl --context functional-753000 exec mysql-7db894d786-4c278 -- mysql -ppassword -e \"show databases;\": exit status 1 (123.73832ms)\n"} +{"Time":"2023-05-31T11:54:33.364005-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T11:54:33.364008-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:54:33.364011-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tmysql: [Warning] Using a password on the command line interface can be insecure.\n"} +{"Time":"2023-05-31T11:54:33.364013-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tERROR 2002 (HY000): Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (2)\n"} +{"Time":"2023-05-31T11:54:33.364015-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tcommand terminated with exit code 1\n"} +{"Time":"2023-05-31T11:54:33.364017-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T11:54:33.36402-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:54:35.984812-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-753000 exec mysql-7db894d786-4c278 -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T11:54:36.097847-07:00","Action":"run","Test":"TestFunctional/delete_addon-resizer_images"} +{"Time":"2023-05-31T11:54:36.09786-07:00","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":"=== RUN TestFunctional/delete_addon-resizer_images\n"} +{"Time":"2023-05-31T11:54:36.097904-07:00","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" functional_test.go:188: (dbg) Run: docker rmi -f gcr.io/google-containers/addon-resizer:1.8.8\n"} +{"Time":"2023-05-31T11:54:36.180858-07:00","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" functional_test.go:188: (dbg) Run: docker rmi -f gcr.io/google-containers/addon-resizer:functional-753000\n"} +{"Time":"2023-05-31T11:54:36.233613-07:00","Action":"run","Test":"TestFunctional/delete_my-image_image"} +{"Time":"2023-05-31T11:54:36.233625-07:00","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":"=== RUN TestFunctional/delete_my-image_image\n"} +{"Time":"2023-05-31T11:54:36.2337-07:00","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":" functional_test.go:196: (dbg) Run: docker rmi -f localhost/my-image:functional-753000\n"} +{"Time":"2023-05-31T11:54:36.282908-07:00","Action":"run","Test":"TestFunctional/delete_minikube_cached_images"} +{"Time":"2023-05-31T11:54:36.282928-07:00","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":"=== RUN TestFunctional/delete_minikube_cached_images\n"} +{"Time":"2023-05-31T11:54:36.283003-07:00","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":" functional_test.go:204: (dbg) Run: docker rmi -f minikube-local-cache-test:functional-753000\n"} +{"Time":"2023-05-31T11:54:36.332643-07:00","Action":"output","Test":"TestFunctional","Output":" helpers_test.go:175: Cleaning up \"functional-753000\" profile ...\n"} +{"Time":"2023-05-31T11:54:36.332666-07:00","Action":"output","Test":"TestFunctional","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p functional-753000\n"} +{"Time":"2023-05-31T11:54:39.725131-07:00","Action":"output","Test":"TestFunctional","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p functional-753000: (3.392368797s)\n"} +{"Time":"2023-05-31T11:54:39.725149-07:00","Action":"output","Test":"TestFunctional","Output":"--- PASS: TestFunctional (297.89s)\n"} +{"Time":"2023-05-31T11:54:39.725153-07:00","Action":"output","Test":"TestFunctional/serial","Output":" --- PASS: TestFunctional/serial (168.31s)\n"} +{"Time":"2023-05-31T11:54:39.725167-07:00","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":" --- PASS: TestFunctional/serial/CopySyncFile (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725171-07:00","Action":"pass","Test":"TestFunctional/serial/CopySyncFile","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725176-07:00","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" --- PASS: TestFunctional/serial/StartWithProxy (77.69s)\n"} +{"Time":"2023-05-31T11:54:39.725179-07:00","Action":"pass","Test":"TestFunctional/serial/StartWithProxy","Elapsed":77.69} +{"Time":"2023-05-31T11:54:39.725182-07:00","Action":"output","Test":"TestFunctional/serial/AuditLog","Output":" --- PASS: TestFunctional/serial/AuditLog (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725185-07:00","Action":"pass","Test":"TestFunctional/serial/AuditLog","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725188-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" --- PASS: TestFunctional/serial/SoftStart (34.79s)\n"} +{"Time":"2023-05-31T11:54:39.725191-07:00","Action":"pass","Test":"TestFunctional/serial/SoftStart","Elapsed":34.79} +{"Time":"2023-05-31T11:54:39.725194-07:00","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":" --- PASS: TestFunctional/serial/KubeContext (0.04s)\n"} +{"Time":"2023-05-31T11:54:39.725201-07:00","Action":"pass","Test":"TestFunctional/serial/KubeContext","Elapsed":0.04} +{"Time":"2023-05-31T11:54:39.725204-07:00","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":" --- PASS: TestFunctional/serial/KubectlGetPods (0.08s)\n"} +{"Time":"2023-05-31T11:54:39.725207-07:00","Action":"pass","Test":"TestFunctional/serial/KubectlGetPods","Elapsed":0.08} +{"Time":"2023-05-31T11:54:39.725209-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd","Output":" --- PASS: TestFunctional/serial/CacheCmd (11.44s)\n"} +{"Time":"2023-05-31T11:54:39.725213-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache (11.44s)\n"} +{"Time":"2023-05-31T11:54:39.725216-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/add_remote (6.75s)\n"} +{"Time":"2023-05-31T11:54:39.725219-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Elapsed":6.75} +{"Time":"2023-05-31T11:54:39.725222-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/add_local (1.49s)\n"} +{"Time":"2023-05-31T11:54:39.725225-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Elapsed":1.49} +{"Time":"2023-05-31T11:54:39.725228-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/CacheDelete (0.08s)\n"} +{"Time":"2023-05-31T11:54:39.725231-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Elapsed":0.08} +{"Time":"2023-05-31T11:54:39.725234-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/list (0.06s)\n"} +{"Time":"2023-05-31T11:54:39.725237-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/list","Elapsed":0.06} +{"Time":"2023-05-31T11:54:39.72524-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node (0.45s)\n"} +{"Time":"2023-05-31T11:54:39.725252-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Elapsed":0.45} +{"Time":"2023-05-31T11:54:39.725258-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/cache_reload (2.46s)\n"} +{"Time":"2023-05-31T11:54:39.725262-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Elapsed":2.46} +{"Time":"2023-05-31T11:54:39.725265-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/delete (0.13s)\n"} +{"Time":"2023-05-31T11:54:39.725268-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/delete","Elapsed":0.13} +{"Time":"2023-05-31T11:54:39.725271-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache","Elapsed":11.44} +{"Time":"2023-05-31T11:54:39.725273-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd","Elapsed":11.44} +{"Time":"2023-05-31T11:54:39.725275-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":" --- PASS: TestFunctional/serial/MinikubeKubectlCmd (0.55s)\n"} +{"Time":"2023-05-31T11:54:39.725278-07:00","Action":"pass","Test":"TestFunctional/serial/MinikubeKubectlCmd","Elapsed":0.55} +{"Time":"2023-05-31T11:54:39.725281-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":" --- PASS: TestFunctional/serial/MinikubeKubectlCmdDirectly (0.73s)\n"} +{"Time":"2023-05-31T11:54:39.725284-07:00","Action":"pass","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Elapsed":0.73} +{"Time":"2023-05-31T11:54:39.725287-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" --- PASS: TestFunctional/serial/ExtraConfig (36.71s)\n"} +{"Time":"2023-05-31T11:54:39.72529-07:00","Action":"pass","Test":"TestFunctional/serial/ExtraConfig","Elapsed":36.71} +{"Time":"2023-05-31T11:54:39.725292-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" --- PASS: TestFunctional/serial/ComponentHealth (0.06s)\n"} +{"Time":"2023-05-31T11:54:39.725295-07:00","Action":"pass","Test":"TestFunctional/serial/ComponentHealth","Elapsed":0.06} +{"Time":"2023-05-31T11:54:39.725298-07:00","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":" --- PASS: TestFunctional/serial/LogsCmd (2.99s)\n"} +{"Time":"2023-05-31T11:54:39.725301-07:00","Action":"pass","Test":"TestFunctional/serial/LogsCmd","Elapsed":2.99} +{"Time":"2023-05-31T11:54:39.725303-07:00","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":" --- PASS: TestFunctional/serial/LogsFileCmd (3.25s)\n"} +{"Time":"2023-05-31T11:54:39.725307-07:00","Action":"pass","Test":"TestFunctional/serial/LogsFileCmd","Elapsed":3.25} +{"Time":"2023-05-31T11:54:39.725309-07:00","Action":"pass","Test":"TestFunctional/serial","Elapsed":168.31} +{"Time":"2023-05-31T11:54:39.725312-07:00","Action":"output","Test":"TestFunctional/parallel","Output":" --- PASS: TestFunctional/parallel (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725315-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" --- PASS: TestFunctional/parallel/ConfigCmd (0.39s)\n"} +{"Time":"2023-05-31T11:54:39.725318-07:00","Action":"pass","Test":"TestFunctional/parallel/ConfigCmd","Elapsed":0.39} +{"Time":"2023-05-31T11:54:39.72532-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" --- PASS: TestFunctional/parallel/SSHCmd (0.75s)\n"} +{"Time":"2023-05-31T11:54:39.725323-07:00","Action":"pass","Test":"TestFunctional/parallel/SSHCmd","Elapsed":0.75} +{"Time":"2023-05-31T11:54:39.725326-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" --- PASS: TestFunctional/parallel/CpCmd (1.51s)\n"} +{"Time":"2023-05-31T11:54:39.725329-07:00","Action":"pass","Test":"TestFunctional/parallel/CpCmd","Elapsed":1.51} +{"Time":"2023-05-31T11:54:39.725331-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":" --- PASS: TestFunctional/parallel/TunnelCmd (11.95s)\n"} +{"Time":"2023-05-31T11:54:39.725337-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial (11.95s)\n"} +{"Time":"2023-05-31T11:54:39.725341-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel (0.57s)\n"} +{"Time":"2023-05-31T11:54:39.725344-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Elapsed":0.57} +{"Time":"2023-05-31T11:54:39.725346-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/StartTunnel (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725349-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725352-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/WaitService (11.26s)\n"} +{"Time":"2023-05-31T11:54:39.725361-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup (11.21s)\n"} +{"Time":"2023-05-31T11:54:39.725365-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Elapsed":11.21} +{"Time":"2023-05-31T11:54:39.725368-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP (0.05s)\n"} +{"Time":"2023-05-31T11:54:39.725374-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP","Elapsed":0.05} +{"Time":"2023-05-31T11:54:39.725377-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Elapsed":11.26} +{"Time":"2023-05-31T11:54:39.72538-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/AccessDirect (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725383-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725385-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725388-07:00","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725391-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725394-07:00","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725397-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.7254-07:00","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725402-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel (0.12s)\n"} +{"Time":"2023-05-31T11:54:39.725405-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Elapsed":0.12} +{"Time":"2023-05-31T11:54:39.725408-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial","Elapsed":11.95} +{"Time":"2023-05-31T11:54:39.72541-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd","Elapsed":11.95} +{"Time":"2023-05-31T11:54:39.725413-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" --- PASS: TestFunctional/parallel/AddonsCmd (0.24s)\n"} +{"Time":"2023-05-31T11:54:39.725418-07:00","Action":"pass","Test":"TestFunctional/parallel/AddonsCmd","Elapsed":0.24} +{"Time":"2023-05-31T11:54:39.725423-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" --- SKIP: TestFunctional/parallel/ServiceCmdConnect (15.20s)\n"} +{"Time":"2023-05-31T11:54:39.725428-07:00","Action":"skip","Test":"TestFunctional/parallel/ServiceCmdConnect","Elapsed":15.2} +{"Time":"2023-05-31T11:54:39.725438-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" --- PASS: TestFunctional/parallel/PersistentVolumeClaim (29.64s)\n"} +{"Time":"2023-05-31T11:54:39.725447-07:00","Action":"pass","Test":"TestFunctional/parallel/PersistentVolumeClaim","Elapsed":29.64} +{"Time":"2023-05-31T11:54:39.725451-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":" --- PASS: TestFunctional/parallel/ProfileCmd (1.33s)\n"} +{"Time":"2023-05-31T11:54:39.725455-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_not_create (0.46s)\n"} +{"Time":"2023-05-31T11:54:39.725458-07:00","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Elapsed":0.46} +{"Time":"2023-05-31T11:54:39.725461-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_list (0.43s)\n"} +{"Time":"2023-05-31T11:54:39.725464-07:00","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Elapsed":0.43} +{"Time":"2023-05-31T11:54:39.725466-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_json_output (0.43s)\n"} +{"Time":"2023-05-31T11:54:39.725474-07:00","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Elapsed":0.43} +{"Time":"2023-05-31T11:54:39.725476-07:00","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd","Elapsed":1.33} +{"Time":"2023-05-31T11:54:39.725479-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":" --- PASS: TestFunctional/parallel/MountCmd (13.21s)\n"} +{"Time":"2023-05-31T11:54:39.725482-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" --- PASS: TestFunctional/parallel/MountCmd/any-port (8.46s)\n"} +{"Time":"2023-05-31T11:54:39.725485-07:00","Action":"pass","Test":"TestFunctional/parallel/MountCmd/any-port","Elapsed":8.46} +{"Time":"2023-05-31T11:54:39.725493-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" --- PASS: TestFunctional/parallel/MountCmd/specific-port (2.28s)\n"} +{"Time":"2023-05-31T11:54:39.725497-07:00","Action":"pass","Test":"TestFunctional/parallel/MountCmd/specific-port","Elapsed":2.28} +{"Time":"2023-05-31T11:54:39.725503-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" --- PASS: TestFunctional/parallel/MountCmd/VerifyCleanup (2.47s)\n"} +{"Time":"2023-05-31T11:54:39.725506-07:00","Action":"pass","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Elapsed":2.47} +{"Time":"2023-05-31T11:54:39.725508-07:00","Action":"pass","Test":"TestFunctional/parallel/MountCmd","Elapsed":13.21} +{"Time":"2023-05-31T11:54:39.725511-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" --- PASS: TestFunctional/parallel/StatusCmd (1.14s)\n"} +{"Time":"2023-05-31T11:54:39.725514-07:00","Action":"pass","Test":"TestFunctional/parallel/StatusCmd","Elapsed":1.14} +{"Time":"2023-05-31T11:54:39.725517-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" --- PASS: TestFunctional/parallel/InternationalLanguage (0.57s)\n"} +{"Time":"2023-05-31T11:54:39.72552-07:00","Action":"pass","Test":"TestFunctional/parallel/InternationalLanguage","Elapsed":0.57} +{"Time":"2023-05-31T11:54:39.725522-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" --- PASS: TestFunctional/parallel/DryRun (1.30s)\n"} +{"Time":"2023-05-31T11:54:39.725525-07:00","Action":"pass","Test":"TestFunctional/parallel/DryRun","Elapsed":1.3} +{"Time":"2023-05-31T11:54:39.725528-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" --- PASS: TestFunctional/parallel/DashboardCmd (19.77s)\n"} +{"Time":"2023-05-31T11:54:39.725533-07:00","Action":"pass","Test":"TestFunctional/parallel/DashboardCmd","Elapsed":19.77} +{"Time":"2023-05-31T11:54:39.725535-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":" --- SKIP: TestFunctional/parallel/PodmanEnv (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725538-07:00","Action":"skip","Test":"TestFunctional/parallel/PodmanEnv","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725541-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":" --- PASS: TestFunctional/parallel/License (0.58s)\n"} +{"Time":"2023-05-31T11:54:39.725544-07:00","Action":"pass","Test":"TestFunctional/parallel/License","Elapsed":0.58} +{"Time":"2023-05-31T11:54:39.725547-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" --- PASS: TestFunctional/parallel/NonActiveRuntimeDisabled (0.48s)\n"} +{"Time":"2023-05-31T11:54:39.72555-07:00","Action":"pass","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Elapsed":0.48} +{"Time":"2023-05-31T11:54:39.725552-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":" --- PASS: TestFunctional/parallel/ServiceCmd (53.30s)\n"} +{"Time":"2023-05-31T11:54:39.725558-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/DeployApp (7.12s)\n"} +{"Time":"2023-05-31T11:54:39.725561-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Elapsed":7.12} +{"Time":"2023-05-31T11:54:39.725564-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/List (0.59s)\n"} +{"Time":"2023-05-31T11:54:39.725567-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/List","Elapsed":0.59} +{"Time":"2023-05-31T11:54:39.725569-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/JSONOutput (0.58s)\n"} +{"Time":"2023-05-31T11:54:39.725572-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Elapsed":0.58} +{"Time":"2023-05-31T11:54:39.725575-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/HTTPS (15.00s)\n"} +{"Time":"2023-05-31T11:54:39.725578-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Elapsed":15} +{"Time":"2023-05-31T11:54:39.725581-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/Format (15.00s)\n"} +{"Time":"2023-05-31T11:54:39.725584-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/Format","Elapsed":15} +{"Time":"2023-05-31T11:54:39.725587-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/URL (15.00s)\n"} +{"Time":"2023-05-31T11:54:39.72559-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/URL","Elapsed":15} +{"Time":"2023-05-31T11:54:39.725592-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd","Elapsed":53.3} +{"Time":"2023-05-31T11:54:39.725595-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":" --- PASS: TestFunctional/parallel/NodeLabels (0.06s)\n"} +{"Time":"2023-05-31T11:54:39.725598-07:00","Action":"pass","Test":"TestFunctional/parallel/NodeLabels","Elapsed":0.06} +{"Time":"2023-05-31T11:54:39.725601-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" --- PASS: TestFunctional/parallel/CertSync (2.53s)\n"} +{"Time":"2023-05-31T11:54:39.725604-07:00","Action":"pass","Test":"TestFunctional/parallel/CertSync","Elapsed":2.53} +{"Time":"2023-05-31T11:54:39.725606-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":" --- PASS: TestFunctional/parallel/DockerEnv (1.71s)\n"} +{"Time":"2023-05-31T11:54:39.72561-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":" --- PASS: TestFunctional/parallel/DockerEnv/bash (1.71s)\n"} +{"Time":"2023-05-31T11:54:39.725613-07:00","Action":"pass","Test":"TestFunctional/parallel/DockerEnv/bash","Elapsed":1.71} +{"Time":"2023-05-31T11:54:39.725619-07:00","Action":"pass","Test":"TestFunctional/parallel/DockerEnv","Elapsed":1.71} +{"Time":"2023-05-31T11:54:39.725622-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" --- PASS: TestFunctional/parallel/FileSync (0.39s)\n"} +{"Time":"2023-05-31T11:54:39.725625-07:00","Action":"pass","Test":"TestFunctional/parallel/FileSync","Elapsed":0.39} +{"Time":"2023-05-31T11:54:39.725628-07:00","Action":"output","Test":"TestFunctional/parallel/Version","Output":" --- PASS: TestFunctional/parallel/Version (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725631-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":" --- PASS: TestFunctional/parallel/Version/short (0.10s)\n"} +{"Time":"2023-05-31T11:54:39.725634-07:00","Action":"pass","Test":"TestFunctional/parallel/Version/short","Elapsed":0.1} +{"Time":"2023-05-31T11:54:39.725637-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":" --- PASS: TestFunctional/parallel/Version/components (0.98s)\n"} +{"Time":"2023-05-31T11:54:39.72564-07:00","Action":"pass","Test":"TestFunctional/parallel/Version/components","Elapsed":0.98} +{"Time":"2023-05-31T11:54:39.725642-07:00","Action":"pass","Test":"TestFunctional/parallel/Version","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725645-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.725648-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_changes (0.27s)\n"} +{"Time":"2023-05-31T11:54:39.725651-07:00","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Elapsed":0.27} +{"Time":"2023-05-31T11:54:39.725654-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_clusters (0.26s)\n"} +{"Time":"2023-05-31T11:54:39.725657-07:00","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Elapsed":0.26} +{"Time":"2023-05-31T11:54:39.72566-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster (0.27s)\n"} +{"Time":"2023-05-31T11:54:39.725684-07:00","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Elapsed":0.27} +{"Time":"2023-05-31T11:54:39.725691-07:00","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725696-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":" --- PASS: TestFunctional/parallel/ImageCommands (24.28s)\n"} +{"Time":"2023-05-31T11:54:39.725711-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" --- PASS: TestFunctional/parallel/ImageCommands/Setup (3.00s)\n"} +{"Time":"2023-05-31T11:54:39.725717-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/Setup","Elapsed":3} +{"Time":"2023-05-31T11:54:39.725722-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageLoadDaemon (4.00s)\n"} +{"Time":"2023-05-31T11:54:39.725728-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Elapsed":4} +{"Time":"2023-05-31T11:54:39.725757-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageReloadDaemon (2.41s)\n"} +{"Time":"2023-05-31T11:54:39.725766-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Elapsed":2.41} +{"Time":"2023-05-31T11:54:39.725771-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon (6.91s)\n"} +{"Time":"2023-05-31T11:54:39.725793-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Elapsed":6.91} +{"Time":"2023-05-31T11:54:39.725805-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageSaveToFile (1.35s)\n"} +{"Time":"2023-05-31T11:54:39.725813-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Elapsed":1.35} +{"Time":"2023-05-31T11:54:39.725816-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageRemove (0.63s)\n"} +{"Time":"2023-05-31T11:54:39.72582-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Elapsed":0.63} +{"Time":"2023-05-31T11:54:39.72583-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageLoadFromFile (2.72s)\n"} +{"Time":"2023-05-31T11:54:39.725836-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Elapsed":2.72} +{"Time":"2023-05-31T11:54:39.72584-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageSaveDaemon (3.26s)\n"} +{"Time":"2023-05-31T11:54:39.725845-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Elapsed":3.26} +{"Time":"2023-05-31T11:54:39.72588-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListYaml (0.34s)\n"} +{"Time":"2023-05-31T11:54:39.725893-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Elapsed":0.34} +{"Time":"2023-05-31T11:54:39.7259-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListShort (0.32s)\n"} +{"Time":"2023-05-31T11:54:39.725905-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Elapsed":0.32} +{"Time":"2023-05-31T11:54:39.725909-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListJson (0.29s)\n"} +{"Time":"2023-05-31T11:54:39.725913-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Elapsed":0.29} +{"Time":"2023-05-31T11:54:39.725916-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListTable (0.30s)\n"} +{"Time":"2023-05-31T11:54:39.72592-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Elapsed":0.3} +{"Time":"2023-05-31T11:54:39.725924-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageBuild (3.70s)\n"} +{"Time":"2023-05-31T11:54:39.725929-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Elapsed":3.7} +{"Time":"2023-05-31T11:54:39.725934-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands","Elapsed":24.28} +{"Time":"2023-05-31T11:54:39.725938-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" --- PASS: TestFunctional/parallel/MySQL (39.43s)\n"} +{"Time":"2023-05-31T11:54:39.725944-07:00","Action":"pass","Test":"TestFunctional/parallel/MySQL","Elapsed":39.43} +{"Time":"2023-05-31T11:54:39.725948-07:00","Action":"pass","Test":"TestFunctional/parallel","Elapsed":0} +{"Time":"2023-05-31T11:54:39.725952-07:00","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" --- PASS: TestFunctional/delete_addon-resizer_images (0.14s)\n"} +{"Time":"2023-05-31T11:54:39.725956-07:00","Action":"pass","Test":"TestFunctional/delete_addon-resizer_images","Elapsed":0.14} +{"Time":"2023-05-31T11:54:39.725959-07:00","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":" --- PASS: TestFunctional/delete_my-image_image (0.05s)\n"} +{"Time":"2023-05-31T11:54:39.725962-07:00","Action":"pass","Test":"TestFunctional/delete_my-image_image","Elapsed":0.05} +{"Time":"2023-05-31T11:54:39.725966-07:00","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":" --- PASS: TestFunctional/delete_minikube_cached_images (0.05s)\n"} +{"Time":"2023-05-31T11:54:39.725974-07:00","Action":"pass","Test":"TestFunctional/delete_minikube_cached_images","Elapsed":0.05} +{"Time":"2023-05-31T11:54:39.725986-07:00","Action":"pass","Test":"TestFunctional","Elapsed":297.89} +{"Time":"2023-05-31T11:54:39.72599-07:00","Action":"run","Test":"TestGvisorAddon"} +{"Time":"2023-05-31T11:54:39.725993-07:00","Action":"output","Test":"TestGvisorAddon","Output":"=== RUN TestGvisorAddon\n"} +{"Time":"2023-05-31T11:54:39.725996-07:00","Action":"output","Test":"TestGvisorAddon","Output":" gvisor_addon_test.go:34: skipping test because --gvisor=false\n"} +{"Time":"2023-05-31T11:54:39.726-07:00","Action":"output","Test":"TestGvisorAddon","Output":"--- SKIP: TestGvisorAddon (0.00s)\n"} +{"Time":"2023-05-31T11:54:39.726004-07:00","Action":"skip","Test":"TestGvisorAddon","Elapsed":0} +{"Time":"2023-05-31T11:54:39.726007-07:00","Action":"run","Test":"TestImageBuild"} +{"Time":"2023-05-31T11:54:39.726009-07:00","Action":"output","Test":"TestImageBuild","Output":"=== RUN TestImageBuild\n"} +{"Time":"2023-05-31T11:54:39.726012-07:00","Action":"run","Test":"TestImageBuild/serial"} +{"Time":"2023-05-31T11:54:39.726015-07:00","Action":"output","Test":"TestImageBuild/serial","Output":"=== RUN TestImageBuild/serial\n"} +{"Time":"2023-05-31T11:54:39.726018-07:00","Action":"run","Test":"TestImageBuild/serial/Setup"} +{"Time":"2023-05-31T11:54:39.726022-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":"=== RUN TestImageBuild/serial/Setup\n"} +{"Time":"2023-05-31T11:54:39.726026-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":" image_test.go:69: (dbg) Run: out/minikube-darwin-amd64 start -p image-266000 --driver=docker \n"} +{"Time":"2023-05-31T11:55:02.263775-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":"E0531 11:55:02.263731 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:04.552536-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":" image_test.go:69: (dbg) Done: out/minikube-darwin-amd64 start -p image-266000 --driver=docker : (24.827045739s)\n"} +{"Time":"2023-05-31T11:55:04.552552-07:00","Action":"run","Test":"TestImageBuild/serial/NormalBuild"} +{"Time":"2023-05-31T11:55:04.552554-07:00","Action":"output","Test":"TestImageBuild/serial/NormalBuild","Output":"=== RUN TestImageBuild/serial/NormalBuild\n"} +{"Time":"2023-05-31T11:55:04.552585-07:00","Action":"output","Test":"TestImageBuild/serial/NormalBuild","Output":" image_test.go:78: (dbg) Run: out/minikube-darwin-amd64 image build -t aaa:latest ./testdata/image-build/test-normal -p image-266000\n"} +{"Time":"2023-05-31T11:55:06.557229-07:00","Action":"output","Test":"TestImageBuild/serial/NormalBuild","Output":" image_test.go:78: (dbg) Done: out/minikube-darwin-amd64 image build -t aaa:latest ./testdata/image-build/test-normal -p image-266000: (2.004564022s)\n"} +{"Time":"2023-05-31T11:55:06.557253-07:00","Action":"run","Test":"TestImageBuild/serial/BuildWithBuildArg"} +{"Time":"2023-05-31T11:55:06.557257-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":"=== RUN TestImageBuild/serial/BuildWithBuildArg\n"} +{"Time":"2023-05-31T11:55:06.557338-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" image_test.go:99: (dbg) Run: out/minikube-darwin-amd64 image build -t aaa:latest --build-opt=build-arg=ENV_A=test_env_str --build-opt=no-cache ./testdata/image-build/test-arg -p image-266000\n"} +{"Time":"2023-05-31T11:55:07.389354-07:00","Action":"run","Test":"TestImageBuild/serial/BuildWithDockerIgnore"} +{"Time":"2023-05-31T11:55:07.389384-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithDockerIgnore","Output":"=== RUN TestImageBuild/serial/BuildWithDockerIgnore\n"} +{"Time":"2023-05-31T11:55:07.389444-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithDockerIgnore","Output":" image_test.go:133: (dbg) Run: out/minikube-darwin-amd64 image build -t aaa:latest ./testdata/image-build/test-normal --build-opt=no-cache -p image-266000\n"} +{"Time":"2023-05-31T11:55:08.050953-07:00","Action":"run","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile"} +{"Time":"2023-05-31T11:55:08.05097-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile","Output":"=== RUN TestImageBuild/serial/BuildWithSpecifiedDockerfile\n"} +{"Time":"2023-05-31T11:55:08.051006-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile","Output":" image_test.go:88: (dbg) Run: out/minikube-darwin-amd64 image build -t aaa:latest -f inner/Dockerfile ./testdata/image-build/test-f -p image-266000\n"} +{"Time":"2023-05-31T11:55:08.716448-07:00","Action":"run","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv"} +{"Time":"2023-05-31T11:55:08.716467-07:00","Action":"output","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv","Output":"=== RUN TestImageBuild/serial/validateImageBuildWithBuildEnv\n"} +{"Time":"2023-05-31T11:55:08.716478-07:00","Action":"output","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv","Output":" image_test.go:114: skipping due to https://github.com/kubernetes/minikube/issues/12431\n"} +{"Time":"2023-05-31T11:55:08.716593-07:00","Action":"output","Test":"TestImageBuild","Output":" helpers_test.go:175: Cleaning up \"image-266000\" profile ...\n"} +{"Time":"2023-05-31T11:55:08.716614-07:00","Action":"output","Test":"TestImageBuild","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p image-266000\n"} +{"Time":"2023-05-31T11:55:11.187443-07:00","Action":"output","Test":"TestImageBuild","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p image-266000: (2.470759556s)\n"} +{"Time":"2023-05-31T11:55:11.187461-07:00","Action":"output","Test":"TestImageBuild","Output":"--- PASS: TestImageBuild (31.46s)\n"} +{"Time":"2023-05-31T11:55:11.187465-07:00","Action":"output","Test":"TestImageBuild/serial","Output":" --- PASS: TestImageBuild/serial (28.99s)\n"} +{"Time":"2023-05-31T11:55:11.187468-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":" --- PASS: TestImageBuild/serial/Setup (24.83s)\n"} +{"Time":"2023-05-31T11:55:11.187471-07:00","Action":"pass","Test":"TestImageBuild/serial/Setup","Elapsed":24.83} +{"Time":"2023-05-31T11:55:11.187476-07:00","Action":"output","Test":"TestImageBuild/serial/NormalBuild","Output":" --- PASS: TestImageBuild/serial/NormalBuild (2.00s)\n"} +{"Time":"2023-05-31T11:55:11.187479-07:00","Action":"pass","Test":"TestImageBuild/serial/NormalBuild","Elapsed":2} +{"Time":"2023-05-31T11:55:11.187482-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" --- PASS: TestImageBuild/serial/BuildWithBuildArg (0.83s)\n"} +{"Time":"2023-05-31T11:55:11.187485-07:00","Action":"pass","Test":"TestImageBuild/serial/BuildWithBuildArg","Elapsed":0.83} +{"Time":"2023-05-31T11:55:11.187488-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithDockerIgnore","Output":" --- PASS: TestImageBuild/serial/BuildWithDockerIgnore (0.66s)\n"} +{"Time":"2023-05-31T11:55:11.187507-07:00","Action":"pass","Test":"TestImageBuild/serial/BuildWithDockerIgnore","Elapsed":0.66} +{"Time":"2023-05-31T11:55:11.187516-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile","Output":" --- PASS: TestImageBuild/serial/BuildWithSpecifiedDockerfile (0.67s)\n"} +{"Time":"2023-05-31T11:55:11.18752-07:00","Action":"pass","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile","Elapsed":0.67} +{"Time":"2023-05-31T11:55:11.187523-07:00","Action":"output","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv","Output":" --- SKIP: TestImageBuild/serial/validateImageBuildWithBuildEnv (0.00s)\n"} +{"Time":"2023-05-31T11:55:11.187546-07:00","Action":"skip","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv","Elapsed":0} +{"Time":"2023-05-31T11:55:11.187549-07:00","Action":"pass","Test":"TestImageBuild/serial","Elapsed":28.99} +{"Time":"2023-05-31T11:55:11.187552-07:00","Action":"pass","Test":"TestImageBuild","Elapsed":31.46} +{"Time":"2023-05-31T11:55:11.187554-07:00","Action":"run","Test":"TestIngressAddonLegacy"} +{"Time":"2023-05-31T11:55:11.187557-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":"=== RUN TestIngressAddonLegacy\n"} +{"Time":"2023-05-31T11:55:11.18756-07:00","Action":"run","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster"} +{"Time":"2023-05-31T11:55:11.187563-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"=== RUN TestIngressAddonLegacy/StartLegacyK8sCluster\n"} +{"Time":"2023-05-31T11:55:11.187568-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ingress_addon_legacy_test.go:39: (dbg) Run: out/minikube-darwin-amd64 start -p ingress-addon-legacy-478000 --kubernetes-version=v1.18.20 --memory=4096 --wait=true --alsologtostderr -v=5 --driver=docker \n"} +{"Time":"2023-05-31T11:57:18.415734-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:18.415701 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:31.66778-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:31.667731 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:31.674235-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:31.674143 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:31.686361-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:31.686295 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:31.706468-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:31.706434 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:31.747209-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:31.747144 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:31.827785-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:31.827724 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:31.988305-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:31.988241 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:32.309937-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:32.309895 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:32.950505-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:32.950461 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:34.23073-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:34.230695 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:36.790918-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:36.790882 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:41.913192-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:41.913128 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:46.104551-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:46.104464 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:52.153392-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:57:52.153364 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:58:12.635088-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:58:12.635019 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:58:53.595575-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 11:58:53.595511 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:59:47.870803-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ingress_addon_legacy_test.go:39: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p ingress-addon-legacy-478000 --kubernetes-version=v1.18.20 --memory=4096 --wait=true --alsologtostderr -v=5 --driver=docker : exit status 109 (4m36.648341248s)\n"} +{"Time":"2023-05-31T11:59:47.870819-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \n"} +{"Time":"2023-05-31T11:59:47.870821-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:59:47.870824-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* [ingress-addon-legacy-478000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T11:59:47.870826-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:59:47.870828-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T11:59:47.870832-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T11:59:47.870835-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:59:47.870837-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T11:59:47.870846-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:59:47.870849-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T11:59:47.870851-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Using Docker Desktop driver with root privileges\n"} +{"Time":"2023-05-31T11:59:47.870853-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Starting control plane node ingress-addon-legacy-478000 in cluster ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.870855-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T11:59:47.870857-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Downloading Kubernetes v1.18.20 preload ...\n"} +{"Time":"2023-05-31T11:59:47.870859-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Creating docker container (CPUs=2, Memory=4096MB) ...\n"} +{"Time":"2023-05-31T11:59:47.870861-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Preparing Kubernetes v1.18.20 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T11:59:47.870863-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T11:59:47.870865-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T11:59:47.870867-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T11:59:47.870869-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T11:59:47.870871-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.870873-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.870875-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \n"} +{"Time":"2023-05-31T11:59:47.87088-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:59:47.870882-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:59:47.870884-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.226096 4203 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:59:47.870889-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.226269 4203 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:59:47.870891-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.226273 4203 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:59:47.870893-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.226277 4203 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:59:47.870896-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.226390 4203 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T11:59:47.870898-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.227785 4203 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:59:47.8709-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.246882 4203 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":1479,\"bootTime\":1685557832,\"procs\":395,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T11:59:47.870907-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:55:11.246959 4203 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:59:47.87091-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.268561 4203 out.go:177] * [ingress-addon-legacy-478000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T11:59:47.870914-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.311220 4203 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:59:47.870934-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.311228 4203 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:59:47.870936-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.354409 4203 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T11:59:47.870938-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.376268 4203 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T11:59:47.870941-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.397329 4203 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:59:47.870943-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.439036 4203 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T11:59:47.870946-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.460790 4203 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:59:47.870949-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.482442 4203 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:59:47.870952-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.536759 4203 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T11:59:47.870956-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.536900 4203 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:59:47.870964-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.630108 4203 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:0 ContainersRunning:0 ContainersPaused:0 ContainersStopped:0 Images:2 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:41 OomKillDisable:false NGoroutines:61 SystemTime:2023-05-31 18:55:11.618737192 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T11:59:47.870976-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T11:59:47.870982-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T11:59:47.870985-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T11:59:47.87099-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T11:59:47.870992-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.651928 4203 out.go:177] * Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T11:59:47.870996-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.673811 4203 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T11:59:47.870998-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.673839 4203 start.go:875] validating driver \"docker\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:59:47.871-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.673856 4203 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:59:47.871002-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.677976 4203 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:59:47.871009-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.772962 4203 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:0 ContainersRunning:0 ContainersPaused:0 ContainersStopped:0 Images:2 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:41 OomKillDisable:false NGoroutines:61 SystemTime:2023-05-31 18:55:11.762430427 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T11:59:47.871012-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T11:59:47.871015-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T11:59:47.871023-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T11:59:47.871028-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T11:59:47.871033-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.773148 4203 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:59:47.871037-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.773342 4203 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T11:59:47.87104-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.795477 4203 out.go:177] * Using Docker Desktop driver with root privileges\n"} +{"Time":"2023-05-31T11:59:47.871044-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.818639 4203 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:59:47.871047-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.818675 4203 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T11:59:47.871051-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.818688 4203 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:59:47.871056-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t{Name:ingress-addon-legacy-478000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4096 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.18.20 ClusterName:ingress-addon-legacy-478000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.lo"} +{"Time":"2023-05-31T11:59:47.871062-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"cal ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T11:59:47.871065-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.840745 4203 out.go:177] * Starting control plane node ingress-addon-legacy-478000 in cluster ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871067-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.883584 4203 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T11:59:47.87107-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.904741 4203 out.go:177] * Pulling base image ...\n"} +{"Time":"2023-05-31T11:59:47.871072-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.946953 4203 preload.go:132] Checking if preload exists for k8s version v1.18.20 and runtime docker\n"} +{"Time":"2023-05-31T11:59:47.871074-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.947006 4203 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T11:59:47.871076-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.996925 4203 image.go:83] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon, skipping pull\n"} +{"Time":"2023-05-31T11:59:47.871079-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:11.996961 4203 cache.go:145] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in daemon, skipping load\n"} +{"Time":"2023-05-31T11:59:47.871081-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:12.001646 4203 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.18.20/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T11:59:47.871084-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:12.001657 4203 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:59:47.871086-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:12.001860 4203 preload.go:132] Checking if preload exists for k8s version v1.18.20 and runtime docker\n"} +{"Time":"2023-05-31T11:59:47.871088-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:12.023572 4203 out.go:177] * Downloading Kubernetes v1.18.20 preload ...\n"} +{"Time":"2023-05-31T11:59:47.87109-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:12.066423 4203 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:59:47.871094-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:12.194579 4203 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.18.20/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4?checksum=md5:ff35f06d4f6c0bac9297b8f85d8ebf70 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T11:59:47.871096-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.095331 4203 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:59:47.871099-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.095477 4203 preload.go:256] verifying checksum of /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:59:47.871102-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.722994 4203 cache.go:60] Finished verifying existence of preloaded tar for v1.18.20 on docker\n"} +{"Time":"2023-05-31T11:59:47.871106-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.723222 4203 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/config.json ...\n"} +{"Time":"2023-05-31T11:59:47.871109-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.723248 4203 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/config.json: {Name:mkbe3697ecf9da125f397c8ddacb605d5a4b3402 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.871113-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.723543 4203 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:59:47.871117-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.723570 4203 start.go:364] acquiring machines lock for ingress-addon-legacy-478000: {Name:mk23368787d1d58af72a836047a278aee820418c Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.871121-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.723669 4203 start.go:368] acquired machines lock for \"ingress-addon-legacy-478000\" in 91.004µs\n"} +{"Time":"2023-05-31T11:59:47.871129-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.723691 4203 start.go:93] Provisioning new machine with config: \u0026{Name:ingress-addon-legacy-478000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4096 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.18.20 ClusterName:ingress-addon-legacy-478000 Namespace:defau"} +{"Time":"2023-05-31T11:59:47.871134-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"lt APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.18.20 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOp"} +{"Time":"2023-05-31T11:59:47.871141-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"timizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.18.20 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:59:47.871146-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.723740 4203 start.go:125] createHost starting for \"\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T11:59:47.871148-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.743687 4203 out.go:204] * Creating docker container (CPUs=2, Memory=4096MB) ...\n"} +{"Time":"2023-05-31T11:59:47.871152-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.743985 4203 start.go:159] libmachine.API.Create for \"ingress-addon-legacy-478000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T11:59:47.87117-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.744053 4203 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:59:47.871173-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.744196 4203 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:59:47.871176-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.744261 4203 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:59:47.871178-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.744285 4203 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:59:47.871181-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.744400 4203 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:59:47.871183-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.744450 4203 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:59:47.871185-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.744467 4203 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:59:47.871187-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.765148 4203 cli_runner.go:164] Run: docker network inspect ingress-addon-legacy-478000 --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\"\n"} +{"Time":"2023-05-31T11:59:47.871197-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:55:26.816635 4203 cli_runner.go:211] docker network inspect ingress-addon-legacy-478000 --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\" returned with exit code 1\n"} +{"Time":"2023-05-31T11:59:47.8712-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.816753 4203 network_create.go:281] running [docker network inspect ingress-addon-legacy-478000] to gather additional debugging logs...\n"} +{"Time":"2023-05-31T11:59:47.871203-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.816775 4203 cli_runner.go:164] Run: docker network inspect ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871205-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:55:26.865338 4203 cli_runner.go:211] docker network inspect ingress-addon-legacy-478000 returned with exit code 1\n"} +{"Time":"2023-05-31T11:59:47.871208-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.865371 4203 network_create.go:284] error running [docker network inspect ingress-addon-legacy-478000]: docker network inspect ingress-addon-legacy-478000: exit status 1\n"} +{"Time":"2023-05-31T11:59:47.87121-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.871212-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[]\n"} +{"Time":"2023-05-31T11:59:47.871214-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871219-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.871221-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tError response from daemon: network ingress-addon-legacy-478000 not found\n"} +{"Time":"2023-05-31T11:59:47.871223-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.865392 4203 network_create.go:286] output of [docker network inspect ingress-addon-legacy-478000]: -- stdout --\n"} +{"Time":"2023-05-31T11:59:47.871225-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[]\n"} +{"Time":"2023-05-31T11:59:47.871228-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871229-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:59:47.871231-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T11:59:47.871235-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tError response from daemon: network ingress-addon-legacy-478000 not found\n"} +{"Time":"2023-05-31T11:59:47.871237-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871239-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T11:59:47.871241-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.865506 4203 cli_runner.go:164] Run: docker network inspect bridge --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\"\n"} +{"Time":"2023-05-31T11:59:47.871245-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.914491 4203 network.go:209] using free private subnet 192.168.49.0/24: \u0026{IP:192.168.49.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.49.0/24 Gateway:192.168.49.1 ClientMin:192.168.49.2 ClientMax:192.168.49.254 Broadcast:192.168.49.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:0xc000836230}\n"} +{"Time":"2023-05-31T11:59:47.871247-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.914528 4203 network_create.go:123] attempt to create docker network ingress-addon-legacy-478000 192.168.49.0/24 with gateway 192.168.49.1 and MTU of 65535 ...\n"} +{"Time":"2023-05-31T11:59:47.87125-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.914602 4203 cli_runner.go:164] Run: docker network create --driver=bridge --subnet=192.168.49.0/24 --gateway=192.168.49.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=ingress-addon-legacy-478000 ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871252-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.997844 4203 network_create.go:107] docker network ingress-addon-legacy-478000 192.168.49.0/24 created\n"} +{"Time":"2023-05-31T11:59:47.871255-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.997880 4203 kic.go:117] calculated static IP \"192.168.49.2\" for the \"ingress-addon-legacy-478000\" container\n"} +{"Time":"2023-05-31T11:59:47.871257-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:26.997991 4203 cli_runner.go:164] Run: docker ps -a --format {{.Names}}\n"} +{"Time":"2023-05-31T11:59:47.871259-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:27.045758 4203 cli_runner.go:164] Run: docker volume create ingress-addon-legacy-478000 --label name.minikube.sigs.k8s.io=ingress-addon-legacy-478000 --label created_by.minikube.sigs.k8s.io=true\n"} +{"Time":"2023-05-31T11:59:47.871262-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:27.095542 4203 oci.go:103] Successfully created a docker volume ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871264-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:27.095689 4203 cli_runner.go:164] Run: docker run --rm --name ingress-addon-legacy-478000-preload-sidecar --label created_by.minikube.sigs.k8s.io=true --label name.minikube.sigs.k8s.io=ingress-addon-legacy-478000 --entrypoint /usr/bin/test -v ingress-addon-legacy-478000:/var gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -d /var/lib\n"} +{"Time":"2023-05-31T11:59:47.871267-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:27.470568 4203 oci.go:107] Successfully prepared a docker volume ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871269-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:27.470608 4203 preload.go:132] Checking if preload exists for k8s version v1.18.20 and runtime docker\n"} +{"Time":"2023-05-31T11:59:47.871272-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:27.470622 4203 kic.go:190] Starting extracting preloaded images to volume ...\n"} +{"Time":"2023-05-31T11:59:47.871274-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:27.470726 4203 cli_runner.go:164] Run: docker run --rm --entrypoint /usr/bin/tar -v /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4:/preloaded.tar:ro -v ingress-addon-legacy-478000:/extractDir gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -I lz4 -xf /preloaded.tar -C /extractDir\n"} +{"Time":"2023-05-31T11:59:47.871279-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:33.404655 4203 cli_runner.go:217] Completed: docker run --rm --entrypoint /usr/bin/tar -v /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4:/preloaded.tar:ro -v ingress-addon-legacy-478000:/extractDir gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -I lz4 -xf /preloaded.tar -C /extractDir: (5.933838329s)\n"} +{"Time":"2023-05-31T11:59:47.871281-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:33.404678 4203 kic.go:199] duration metric: took 5.934038 seconds to extract preloaded images to volume\n"} +{"Time":"2023-05-31T11:59:47.871283-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:33.404799 4203 cli_runner.go:164] Run: docker info --format \"'{{json .SecurityOptions}}'\"\n"} +{"Time":"2023-05-31T11:59:47.871288-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:33.505739 4203 cli_runner.go:164] Run: docker run -d -t --privileged --security-opt seccomp=unconfined --tmpfs /tmp --tmpfs /run -v /lib/modules:/lib/modules:ro --hostname ingress-addon-legacy-478000 --name ingress-addon-legacy-478000 --label created_by.minikube.sigs.k8s.io=true --label name.minikube.sigs.k8s.io=ingress-addon-legacy-478000 --label role.minikube.sigs.k8s.io= --label mode.minikube.sigs.k8s.io=ingress-addon-legacy-478000 --network ingress-addon-legacy-478000 --ip 192.168.49.2 --volume ingress-addon-legacy-478000:/var --security-opt apparmor=unconfined --memory=4096mb --memory-swap=4096mb --cpus=2 -e container=docker --expose 8443 --publish=127.0.0.1::8443 --publish=127.0.0.1::22 --publish=127.0.0.1::2376 --publish=127.0.0.1::5000 --publish=127.0.0.1::32443 gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\n"} +{"Time":"2023-05-31T11:59:47.871294-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:33.792537 4203 cli_runner.go:164] Run: docker container inspect ingress-addon-legacy-478000 --format={{.State.Running}}\n"} +{"Time":"2023-05-31T11:59:47.871298-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:33.846838 4203 cli_runner.go:164] Run: docker container inspect ingress-addon-legacy-478000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T11:59:47.8713-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:33.905310 4203 cli_runner.go:164] Run: docker exec ingress-addon-legacy-478000 stat /var/lib/dpkg/alternatives/iptables\n"} +{"Time":"2023-05-31T11:59:47.871302-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.051781 4203 oci.go:144] the created container \"ingress-addon-legacy-478000\" has a running status.\n"} +{"Time":"2023-05-31T11:59:47.871305-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.051830 4203 kic.go:221] Creating ssh key for kic: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa...\n"} +{"Time":"2023-05-31T11:59:47.871312-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.208596 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa.pub -\u003e /home/docker/.ssh/authorized_keys\n"} +{"Time":"2023-05-31T11:59:47.871314-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.208665 4203 kic_runner.go:191] docker (temp): /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa.pub --\u003e /home/docker/.ssh/authorized_keys (381 bytes)\n"} +{"Time":"2023-05-31T11:59:47.871317-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.268462 4203 cli_runner.go:164] Run: docker container inspect ingress-addon-legacy-478000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T11:59:47.871319-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.320624 4203 kic_runner.go:93] Run: chown docker:docker /home/docker/.ssh/authorized_keys\n"} +{"Time":"2023-05-31T11:59:47.871321-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.320647 4203 kic_runner.go:114] Args: [docker exec --privileged ingress-addon-legacy-478000 chown docker:docker /home/docker/.ssh/authorized_keys]\n"} +{"Time":"2023-05-31T11:59:47.871324-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.421402 4203 cli_runner.go:164] Run: docker container inspect ingress-addon-legacy-478000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T11:59:47.871326-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.473171 4203 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T11:59:47.871328-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.473215 4203 ubuntu.go:169] provisioning hostname \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T11:59:47.871331-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.473313 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871333-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.524164 4203 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:59:47.871335-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.524571 4203 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 50371 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.871338-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.524585 4203 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:59:47.87134-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tsudo hostname ingress-addon-legacy-478000 \u0026\u0026 echo \"ingress-addon-legacy-478000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T11:59:47.871342-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.647882 4203 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871344-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871346-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.647962 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871348-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.698539 4203 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:59:47.871351-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.698905 4203 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 50371 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.871355-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.698923 4203 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:59:47.871356-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871358-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tif ! grep -xq '.*\\singress-addon-legacy-478000' /etc/hosts; then\n"} +{"Time":"2023-05-31T11:59:47.871361-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T11:59:47.871363-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 ingress-addon-legacy-478000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T11:59:47.871365-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T11:59:47.871367-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t\t\techo '127.0.1.1 ingress-addon-legacy-478000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T11:59:47.871372-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T11:59:47.871374-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T11:59:47.871377-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.813260 4203 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T11:59:47.871385-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.813293 4203 ubuntu.go:175] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1078/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1078/.minikube}\n"} +{"Time":"2023-05-31T11:59:47.871388-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.813320 4203 ubuntu.go:177] setting up certificates\n"} +{"Time":"2023-05-31T11:59:47.87139-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.813328 4203 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T11:59:47.871392-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.813410 4203 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871394-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.862850 4203 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T11:59:47.871397-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.862907 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T11:59:47.871399-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.862971 4203 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T11:59:47.871401-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.862977 4203 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T11:59:47.871405-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863101 4203 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:59:47.871408-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863280 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T11:59:47.87141-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863317 4203 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T11:59:47.871413-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863322 4203 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T11:59:47.871415-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863382 4203 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T11:59:47.871417-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863553 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T11:59:47.87142-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863600 4203 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T11:59:47.871422-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863604 4203 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T11:59:47.871424-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863661 4203 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:59:47.871429-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.863797 4203 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem org=jenkins.ingress-addon-legacy-478000 san=[192.168.49.2 127.0.0.1 localhost 127.0.0.1 minikube ingress-addon-legacy-478000]\n"} +{"Time":"2023-05-31T11:59:47.871434-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.996903 4203 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T11:59:47.871436-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.996975 4203 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T11:59:47.871438-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:34.997032 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871441-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.046903 4203 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50371 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:59:47.871443-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.133328 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem -\u003e /etc/docker/ca.pem\n"} +{"Time":"2023-05-31T11:59:47.871445-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.133403 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:59:47.871448-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.154705 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem -\u003e /etc/docker/server.pem\n"} +{"Time":"2023-05-31T11:59:47.87145-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.154783 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1257 bytes)\n"} +{"Time":"2023-05-31T11:59:47.871452-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.176795 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem -\u003e /etc/docker/server-key.pem\n"} +{"Time":"2023-05-31T11:59:47.871455-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.176878 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1679 bytes)\n"} +{"Time":"2023-05-31T11:59:47.871457-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.198576 4203 provision.go:86] duration metric: configureAuth took 385.232719ms\n"} +{"Time":"2023-05-31T11:59:47.871459-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.198589 4203 ubuntu.go:193] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T11:59:47.871461-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.198742 4203 config.go:182] Loaded profile config \"ingress-addon-legacy-478000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.871467-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.198806 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871469-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.247639 4203 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:59:47.871471-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.248001 4203 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 50371 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.871473-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.248017 4203 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:59:47.871475-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T11:59:47.871478-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.363795 4203 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: overlay\n"} +{"Time":"2023-05-31T11:59:47.87148-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871482-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.363823 4203 ubuntu.go:71] root file system type: overlay\n"} +{"Time":"2023-05-31T11:59:47.871484-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.363944 4203 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T11:59:47.871486-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.364047 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871492-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.414197 4203 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:59:47.871494-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.415113 4203 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 50371 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.871497-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.415163 4203 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:59:47.871499-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %s \"[Unit]\n"} +{"Time":"2023-05-31T11:59:47.871501-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:59:47.871503-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:59:47.871505-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T11:59:47.871507-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T11:59:47.871509-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T11:59:47.871511-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T11:59:47.871513-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T11:59:47.871515-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:59:47.871517-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871518-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:59:47.87152-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tType=notify\n"} +{"Time":"2023-05-31T11:59:47.871522-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T11:59:47.871524-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871526-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871528-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.87153-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:59:47.871532-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:59:47.871537-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:59:47.871539-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:59:47.871541-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:59:47.871543-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:59:47.871545-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:59:47.871547-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871549-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:59:47.871551-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:59:47.871553-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:59:47.871555-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:59:47.871558-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T11:59:47.87156-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871562-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:59:47.871564-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:59:47.871566-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T11:59:47.871568-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:59:47.87157-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T11:59:47.871573-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871576-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:59:47.871578-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:59:47.871579-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T11:59:47.871581-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:59:47.871583-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871585-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:59:47.871587-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T11:59:47.871589-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871591-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:59:47.871593-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T11:59:47.871595-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871597-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:59:47.8716-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:59:47.871605-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T11:59:47.871608-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.541113 4203 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T11:59:47.87161-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:59:47.871612-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:59:47.871614-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T11:59:47.871617-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T11:59:47.871619-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T11:59:47.87162-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T11:59:47.871622-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T11:59:47.871624-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:59:47.871626-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871628-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:59:47.87163-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tType=notify\n"} +{"Time":"2023-05-31T11:59:47.871632-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T11:59:47.871634-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871636-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871638-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.87164-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:59:47.871642-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:59:47.871644-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:59:47.871646-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:59:47.871648-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:59:47.87165-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:59:47.871654-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:59:47.871656-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871658-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:59:47.87166-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:59:47.87169-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:59:47.871697-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:59:47.871702-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T11:59:47.871704-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871706-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:59:47.871708-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:59:47.87171-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T11:59:47.871712-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:59:47.871714-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T11:59:47.871716-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871718-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:59:47.871724-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:59:47.871726-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T11:59:47.871728-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:59:47.87173-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871734-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:59:47.871736-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T11:59:47.871738-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.87174-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:59:47.871749-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T11:59:47.871769-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871772-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:59:47.871776-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:59:47.871784-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.871786-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.541218 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.871789-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.591168 4203 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:59:47.871791-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.591650 4203 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 50371 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.871794-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:35.591666 4203 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:59:47.871796-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T11:59:47.871799-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.229636 4203 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: --- /lib/systemd/system/docker.service\t2023-05-19 18:06:21.000000000 +0000\n"} +{"Time":"2023-05-31T11:59:47.871801-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 18:55:35.538986486 +0000\n"} +{"Time":"2023-05-31T11:59:47.871805-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t@@ -1,30 +1,32 @@\n"} +{"Time":"2023-05-31T11:59:47.871807-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t [Unit]\n"} +{"Time":"2023-05-31T11:59:47.871809-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t Description=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:59:47.871811-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t Documentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:59:47.871813-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-After=network-online.target docker.socket firewalld.service containerd.service time-set.target\n"} +{"Time":"2023-05-31T11:59:47.871815-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-Wants=network-online.target containerd.service\n"} +{"Time":"2023-05-31T11:59:47.871817-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+BindsTo=containerd.service\n"} +{"Time":"2023-05-31T11:59:47.871889-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+After=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T11:59:47.871893-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+Wants=network-online.target\n"} +{"Time":"2023-05-31T11:59:47.871895-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t Requires=docker.socket\n"} +{"Time":"2023-05-31T11:59:47.871897-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+StartLimitBurst=3\n"} +{"Time":"2023-05-31T11:59:47.8719-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+StartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:59:47.871904-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t \n"} +{"Time":"2023-05-31T11:59:47.871906-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t [Service]\n"} +{"Time":"2023-05-31T11:59:47.871908-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T11:59:47.87191-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T11:59:47.871912-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T11:59:47.871914-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T11:59:47.871916-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T11:59:47.871918-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T11:59:47.87192-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-TimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:59:47.871922-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T11:59:47.871928-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T11:59:47.87193-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+Restart=on-failure\n"} +{"Time":"2023-05-31T11:59:47.871932-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t \n"} +{"Time":"2023-05-31T11:59:47.871934-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T11:59:47.871936-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T11:59:47.87194-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T11:59:47.871942-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T11:59:47.871944-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t \n"} +{"Time":"2023-05-31T11:59:47.87205-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T11:59:47.872057-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T11:59:47.872065-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T11:59:47.872069-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T11:59:47.872075-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+\n"} +{"Time":"2023-05-31T11:59:47.872078-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:59:47.872081-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:59:47.872084-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:59:47.872086-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:59:47.872089-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:59:47.872091-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:59:47.872093-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:59:47.872095-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+\n"} +{"Time":"2023-05-31T11:59:47.872099-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:59:47.872101-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:59:47.872103-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T11:59:47.872105-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:59:47.872108-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T11:59:47.872136-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t \n"} +{"Time":"2023-05-31T11:59:47.872141-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:59:47.872151-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:59:47.872166-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t@@ -32,16 +34,16 @@\n"} +{"Time":"2023-05-31T11:59:47.872169-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:59:47.872171-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T11:59:47.872173-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t \n"} +{"Time":"2023-05-31T11:59:47.872175-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T11:59:47.872177-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T11:59:47.872179-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:59:47.872182-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:59:47.872184-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T11:59:47.872185-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:59:47.872187-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t \n"} +{"Time":"2023-05-31T11:59:47.872189-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:59:47.872192-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T11:59:47.872193-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t \n"} +{"Time":"2023-05-31T11:59:47.872195-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t # kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:59:47.872284-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t KillMode=process\n"} +{"Time":"2023-05-31T11:59:47.872291-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-OOMScoreAdjust=-500\n"} +{"Time":"2023-05-31T11:59:47.872295-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t \n"} +{"Time":"2023-05-31T11:59:47.872298-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t [Install]\n"} +{"Time":"2023-05-31T11:59:47.872302-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t WantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:59:47.872305-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tSynchronizing state of docker.service with SysV service script with /lib/systemd/systemd-sysv-install.\n"} +{"Time":"2023-05-31T11:59:47.872307-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecuting: /lib/systemd/systemd-sysv-install enable docker\n"} +{"Time":"2023-05-31T11:59:47.872311-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.872313-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.249742 4203 machine.go:91] provisioned docker machine in 1.776538954s\n"} +{"Time":"2023-05-31T11:59:47.872315-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.249753 4203 client.go:171] LocalClient.Create took 9.505663181s\n"} +{"Time":"2023-05-31T11:59:47.872317-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.249778 4203 start.go:167] duration metric: libmachine.API.Create for \"ingress-addon-legacy-478000\" took 9.505764693s\n"} +{"Time":"2023-05-31T11:59:47.872319-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.249789 4203 start.go:300] post-start starting for \"ingress-addon-legacy-478000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T11:59:47.872322-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.249797 4203 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T11:59:47.872324-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.249879 4203 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:59:47.872336-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.249958 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.872339-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.301556 4203 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50371 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:59:47.872475-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.390016 4203 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T11:59:47.872481-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394076 4203 main.go:141] libmachine: Couldn't set key VERSION_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T11:59:47.872484-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394100 4203 main.go:141] libmachine: Couldn't set key PRIVACY_POLICY_URL, no corresponding struct field found\n"} +{"Time":"2023-05-31T11:59:47.872517-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394110 4203 main.go:141] libmachine: Couldn't set key UBUNTU_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T11:59:47.872521-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394117 4203 info.go:137] Remote host: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T11:59:47.872523-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394126 4203 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T11:59:47.872526-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394228 4203 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T11:59:47.872528-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394429 4203 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e 15662.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:59:47.872531-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394436 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e /etc/ssl/certs/15662.pem\n"} +{"Time":"2023-05-31T11:59:47.872533-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.394632 4203 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:59:47.872536-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.403616 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:59:47.872538-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.425147 4203 start.go:303] post-start completed in 175.345518ms\n"} +{"Time":"2023-05-31T11:59:47.872543-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.425724 4203 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.872547-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.475184 4203 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/config.json ...\n"} +{"Time":"2023-05-31T11:59:47.872549-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.475615 4203 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T11:59:47.872649-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.475684 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.872655-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.525765 4203 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50371 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:59:47.872657-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.609247 4203 ssh_runner.go:195] Run: sh -c \"df -BG /var | awk 'NR==2{print $4}'\"\n"} +{"Time":"2023-05-31T11:59:47.87266-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.614457 4203 start.go:128] duration metric: createHost completed in 9.890678453s\n"} +{"Time":"2023-05-31T11:59:47.872662-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.614472 4203 start.go:83] releasing machines lock for \"ingress-addon-legacy-478000\", held for 9.890765697s\n"} +{"Time":"2023-05-31T11:59:47.872664-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.614560 4203 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.872666-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.664821 4203 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T11:59:47.872668-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.664879 4203 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T11:59:47.872673-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.664890 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.872675-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.664959 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.872678-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.717991 4203 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50371 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:59:47.87268-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.718256 4203 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50371 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:59:47.872682-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.906660 4203 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:59:47.872738-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.911958 4203 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T11:59:47.872744-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.917249 4203 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *loopback.conf* -not -name *.mk_disabled -exec sh -c \"grep -q loopback {} \u0026\u0026 ( grep -q name {} || sudo sed -i '/\"type\": \"loopback\"/i \\ \\ \\ \\ \"name\": \"loopback\",' {} ) \u0026\u0026 sudo sed -i 's|\"cniVersion\": \".*\"|\"cniVersion\": \"1.0.0\"|g' {}\" ;\n"} +{"Time":"2023-05-31T11:59:47.872749-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.940679 4203 cni.go:229] loopback cni configuration patched: \"/etc/cni/net.d/*loopback.conf*\" found\n"} +{"Time":"2023-05-31T11:59:47.872755-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.940741 4203 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *bridge* -not -name *podman* -not -name *.mk_disabled -printf \"%p, \" -exec sh -c \"sudo sed -i -r -e '/\"dst\": \".*:.*\"/d' -e 's|^(.*)\"dst\": (.*)[,*]$|\\1\"dst\": \\2|g' -e '/\"subnet\": \".*:.*\"/d' -e 's|^(.*)\"subnet\": \".*\"(.*)[,*]$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T11:59:47.872759-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.956787 4203 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *podman* -not -name *.mk_disabled -printf \"%p, \" -exec sh -c \"sudo sed -i -r -e 's|^(.*)\"subnet\": \".*\"(.*)$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' -e 's|^(.*)\"gateway\": \".*\"(.*)$|\\1\"gateway\": \"10.244.0.1\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T11:59:47.872762-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.973166 4203 cni.go:307] configured [/etc/cni/net.d/100-crio-bridge.conf, /etc/cni/net.d/87-podman-bridge.conflist] bridge cni config(s)\n"} +{"Time":"2023-05-31T11:59:47.872764-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.973180 4203 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T11:59:47.872766-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.973193 4203 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T11:59:47.872768-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.973306 4203 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T11:59:47.872834-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.87284-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.989193 4203 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.2\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:59:47.872843-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:36.999090 4203 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:59:47.872845-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.009169 4203 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T11:59:47.872848-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.009230 4203 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:59:47.872855-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.019363 4203 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:59:47.872857-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.029297 4203 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:59:47.872859-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.039172 4203 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:59:47.872862-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.049355 4203 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T11:59:47.872864-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.059000 4203 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:59:47.872866-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.069096 4203 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T11:59:47.872868-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.077768 4203 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T11:59:47.872871-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.086558 4203 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:59:47.872879-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.156071 4203 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T11:59:47.872884-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.232175 4203 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T11:59:47.872979-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.232200 4203 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T11:59:47.872983-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.232292 4203 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T11:59:47.872985-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.244394 4203 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T11:59:47.872987-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.244499 4203 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T11:59:47.87299-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.257252 4203 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///var/run/dockershim.sock\n"} +{"Time":"2023-05-31T11:59:47.872992-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.872994-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.276429 4203 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T11:59:47.872996-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.281550 4203 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T11:59:47.872998-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.291545 4203 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T11:59:47.873001-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.311564 4203 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T11:59:47.873003-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.404241 4203 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T11:59:47.873006-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.500117 4203 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T11:59:47.873009-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.500136 4203 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T11:59:47.873011-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.518042 4203 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:59:47.873013-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.607655 4203 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:59:47.873015-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.858508 4203 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T11:59:47.873017-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.885292 4203 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T11:59:47.873112-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.955868 4203 out.go:204] * Preparing Kubernetes v1.18.20 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T11:59:47.873115-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:37.956077 4203 cli_runner.go:164] Run: docker exec -t ingress-addon-legacy-478000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T11:59:47.873117-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.068713 4203 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T11:59:47.87312-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.068826 4203 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T11:59:47.873122-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.073727 4203 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.65.254\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T11:59:47.873125-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.085545 4203 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T11:59:47.873127-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.134705 4203 preload.go:132] Checking if preload exists for k8s version v1.18.20 and runtime docker\n"} +{"Time":"2023-05-31T11:59:47.873133-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.134788 4203 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:59:47.873136-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.157115 4203 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T11:59:47.873138-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.87314-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873142-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873144-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873146-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:59:47.873149-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/pause:3.2\n"} +{"Time":"2023-05-31T11:59:47.873151-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:59:47.873152-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:59:47.873252-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.873257-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:59:47.87326-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.157130 4203 docker.go:639] registry.k8s.io/kube-apiserver:v1.18.20 wasn't preloaded\n"} +{"Time":"2023-05-31T11:59:47.873262-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.157195 4203 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:59:47.873264-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.166406 4203 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T11:59:47.873267-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.171324 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4 -\u003e /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:59:47.873274-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.171472 4203 ssh_runner.go:195] Run: stat -c \"%s %y\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:59:47.873276-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.176032 4203 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%s %y\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.873279-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.873281-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.873283-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.873285-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.873287-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:38.176059 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-amd64.tar.lz4 --\u003e /preloaded.tar.lz4 (424164442 bytes)\n"} +{"Time":"2023-05-31T11:59:47.873289-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:44.067776 4203 docker.go:597] Took 5.896359 seconds to copy over tarball\n"} +{"Time":"2023-05-31T11:59:47.873291-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:44.067858 4203 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:59:47.873293-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:46.541716 4203 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (2.473833591s)\n"} +{"Time":"2023-05-31T11:59:47.873296-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:46.541745 4203 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:59:47.873298-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:46.622575 4203 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:59:47.873375-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:46.632079 4203 ssh_runner.go:362] scp memory --\u003e /var/lib/docker/image/overlay2/repositories.json (2502 bytes)\n"} +{"Time":"2023-05-31T11:59:47.873379-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:46.648624 4203 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:59:47.873381-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:46.714986 4203 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:59:47.873383-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.015733 4203 ssh_runner.go:235] Completed: sudo systemctl restart docker: (1.30072119s)\n"} +{"Time":"2023-05-31T11:59:47.873386-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.015829 4203 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:59:47.873388-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.036577 4203 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T11:59:47.87339-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873392-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873399-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873401-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873407-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:59:47.873409-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/pause:3.2\n"} +{"Time":"2023-05-31T11:59:47.873413-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:59:47.873415-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tk8s.gcr.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:59:47.873417-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.873419-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:59:47.873421-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.036593 4203 docker.go:639] registry.k8s.io/kube-apiserver:v1.18.20 wasn't preloaded\n"} +{"Time":"2023-05-31T11:59:47.873424-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.036605 4203 cache_images.go:88] LoadImages start: [registry.k8s.io/kube-apiserver:v1.18.20 registry.k8s.io/kube-controller-manager:v1.18.20 registry.k8s.io/kube-scheduler:v1.18.20 registry.k8s.io/kube-proxy:v1.18.20 registry.k8s.io/pause:3.2 registry.k8s.io/etcd:3.4.3-0 registry.k8s.io/coredns:1.6.7 gcr.io/k8s-minikube/storage-provisioner:v5]\n"} +{"Time":"2023-05-31T11:59:47.87355-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.043248 4203 image.go:134] retrieving image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:59:47.873553-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.043265 4203 image.go:134] retrieving image: registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873556-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.043270 4203 image.go:134] retrieving image: registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873558-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.043297 4203 image.go:134] retrieving image: registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873562-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.043289 4203 image.go:134] retrieving image: registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:59:47.873564-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.043302 4203 image.go:134] retrieving image: registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873566-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.043331 4203 image.go:134] retrieving image: registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:59:47.873569-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.043350 4203 image.go:134] retrieving image: registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:59:47.873571-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.050140 4203 image.go:177] daemon lookup for registry.k8s.io/kube-apiserver:v1.18.20: Error response from daemon: No such image: registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873573-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.051555 4203 image.go:177] daemon lookup for registry.k8s.io/kube-proxy:v1.18.20: Error response from daemon: No such image: registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873575-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.052226 4203 image.go:177] daemon lookup for registry.k8s.io/kube-controller-manager:v1.18.20: Error response from daemon: No such image: registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873578-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.052240 4203 image.go:177] daemon lookup for registry.k8s.io/coredns:1.6.7: Error response from daemon: No such image: registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:59:47.87358-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.052303 4203 image.go:177] daemon lookup for registry.k8s.io/kube-scheduler:v1.18.20: Error response from daemon: No such image: registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873582-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.052386 4203 image.go:177] daemon lookup for registry.k8s.io/pause:3.2: Error response from daemon: No such image: registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:59:47.873584-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.052372 4203 image.go:177] daemon lookup for gcr.io/k8s-minikube/storage-provisioner:v5: Error response from daemon: No such image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:59:47.873739-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:48.052477 4203 image.go:177] daemon lookup for registry.k8s.io/etcd:3.4.3-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:59:47.873748-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.182345 4203 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873751-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.204503 4203 cache_images.go:116] \"registry.k8s.io/kube-proxy:v1.18.20\" needs transfer: \"registry.k8s.io/kube-proxy:v1.18.20\" does not exist at hash \"27f8b8d51985f755cfb3ffea424fa34865cc0da63e99378d8202f923c3c5a8ba\" in container runtime\n"} +{"Time":"2023-05-31T11:59:47.873753-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.204551 4203 docker.go:313] Removing image: registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873755-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.204614 4203 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873758-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.226678 4203 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-proxy_v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.87376-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.379560 4203 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873763-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.402895 4203 cache_images.go:116] \"registry.k8s.io/kube-apiserver:v1.18.20\" needs transfer: \"registry.k8s.io/kube-apiserver:v1.18.20\" does not exist at hash \"7d8d2960de69688eab5698081441539a1662f47e092488973e455a8334955cb1\" in container runtime\n"} +{"Time":"2023-05-31T11:59:47.873765-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.402924 4203 docker.go:313] Removing image: registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873767-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.402987 4203 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873769-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.424627 4203 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-apiserver_v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873772-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.545322 4203 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873774-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.567582 4203 cache_images.go:116] \"registry.k8s.io/kube-controller-manager:v1.18.20\" needs transfer: \"registry.k8s.io/kube-controller-manager:v1.18.20\" does not exist at hash \"e7c545a60706cf009a893afdc7dba900cc2e342b8042b9c421d607ca41e8b290\" in container runtime\n"} +{"Time":"2023-05-31T11:59:47.873945-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.567614 4203 docker.go:313] Removing image: registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873951-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.567668 4203 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873955-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.590031 4203 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-controller-manager_v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873958-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.599220 4203 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:59:47.873963-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.621662 4203 cache_images.go:116] \"registry.k8s.io/coredns:1.6.7\" needs transfer: \"registry.k8s.io/coredns:1.6.7\" does not exist at hash \"67da37a9a360e600e74464da48437257b00a754c77c40f60c65e4cb327c34bd5\" in container runtime\n"} +{"Time":"2023-05-31T11:59:47.873965-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.621691 4203 docker.go:313] Removing image: registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:59:47.873967-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.621761 4203 ssh_runner.go:195] Run: docker rmi registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:59:47.87397-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.643652 4203 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/coredns_1.6.7\n"} +{"Time":"2023-05-31T11:59:47.873972-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.836967 4203 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873975-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.858717 4203 cache_images.go:116] \"registry.k8s.io/kube-scheduler:v1.18.20\" needs transfer: \"registry.k8s.io/kube-scheduler:v1.18.20\" does not exist at hash \"a05a1a79adaad058478b7638d2e73cf408b283305081516fbe02706b0e205346\" in container runtime\n"} +{"Time":"2023-05-31T11:59:47.873979-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.858750 4203 docker.go:313] Removing image: registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873981-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.858820 4203 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873983-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:49.881802 4203 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-scheduler_v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.873986-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.112315 4203 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:59:47.874147-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.135241 4203 cache_images.go:116] \"registry.k8s.io/pause:3.2\" needs transfer: \"registry.k8s.io/pause:3.2\" does not exist at hash \"80d28bedfe5dec59da9ebf8e6260224ac9008ab5c11dbbe16ee3ba3e4439ac2c\" in container runtime\n"} +{"Time":"2023-05-31T11:59:47.874156-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.135268 4203 docker.go:313] Removing image: registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:59:47.874159-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.135338 4203 ssh_runner.go:195] Run: docker rmi registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:59:47.874161-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.156997 4203 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/pause_3.2\n"} +{"Time":"2023-05-31T11:59:47.874163-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.694469 4203 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:59:47.874166-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.716924 4203 cache_images.go:116] \"registry.k8s.io/etcd:3.4.3-0\" needs transfer: \"registry.k8s.io/etcd:3.4.3-0\" does not exist at hash \"303ce5db0e90dab1c5728ec70d21091201a23cdf8aeca70ab54943bbaaf0833f\" in container runtime\n"} +{"Time":"2023-05-31T11:59:47.874169-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.716948 4203 docker.go:313] Removing image: registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:59:47.874171-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.717013 4203 ssh_runner.go:195] Run: docker rmi registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:59:47.874173-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:50.737578 4203 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/etcd_3.4.3-0\n"} +{"Time":"2023-05-31T11:59:47.874178-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.838479 4203 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:59:47.87418-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.860121 4203 cache_images.go:92] LoadImages completed in 3.823491018s\n"} +{"Time":"2023-05-31T11:59:47.874183-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:55:51.860177 4203 out.go:239] X Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-proxy_v1.18.20: no such file or directory\n"} +{"Time":"2023-05-31T11:59:47.874185-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tX Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-proxy_v1.18.20: no such file or directory\n"} +{"Time":"2023-05-31T11:59:47.874198-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.860256 4203 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T11:59:47.874326-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.912871 4203 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:59:47.874331-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.912890 4203 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T11:59:47.874334-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.912904 4203 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T11:59:47.874339-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.912944 4203 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.49.2 APIServerPort:8443 KubernetesVersion:v1.18.20 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:ingress-addon-legacy-478000 NodeName:ingress-addon-legacy-478000 DNSDomain:cluster.local CRISocket:/var/run/dockershim.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.49.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.49.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca."} +{"Time":"2023-05-31T11:59:47.874343-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"crt StaticPodPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:false}\n"} +{"Time":"2023-05-31T11:59:47.874345-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.913050 4203 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T11:59:47.874347-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tapiVersion: kubeadm.k8s.io/v1beta2\n"} +{"Time":"2023-05-31T11:59:47.874349-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T11:59:47.874351-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T11:59:47.874353-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t advertiseAddress: 192.168.49.2\n"} +{"Time":"2023-05-31T11:59:47.874355-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T11:59:47.874358-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T11:59:47.874361-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - groups:\n"} +{"Time":"2023-05-31T11:59:47.874363-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T11:59:47.874365-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T11:59:47.874367-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t usages:\n"} +{"Time":"2023-05-31T11:59:47.874517-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - signing\n"} +{"Time":"2023-05-31T11:59:47.874522-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t - authentication\n"} +{"Time":"2023-05-31T11:59:47.874525-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T11:59:47.874528-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t criSocket: /var/run/dockershim.sock\n"} +{"Time":"2023-05-31T11:59:47.87453-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t name: \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T11:59:47.874532-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T11:59:47.874534-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t node-ip: 192.168.49.2\n"} +{"Time":"2023-05-31T11:59:47.874544-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t taints: []\n"} +{"Time":"2023-05-31T11:59:47.874547-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t---\n"} +{"Time":"2023-05-31T11:59:47.874549-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tapiVersion: kubeadm.k8s.io/v1beta2\n"} +{"Time":"2023-05-31T11:59:47.874551-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T11:59:47.874553-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T11:59:47.874555-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.49.2\"]\n"} +{"Time":"2023-05-31T11:59:47.874557-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:59:47.874559-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T11:59:47.874561-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T11:59:47.874563-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:59:47.874565-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T11:59:47.874567-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T11:59:47.874569-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T11:59:47.874571-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:59:47.874573-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T11:59:47.874578-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T11:59:47.87458-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T11:59:47.874739-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T11:59:47.874744-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tdns:\n"} +{"Time":"2023-05-31T11:59:47.874746-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t type: CoreDNS\n"} +{"Time":"2023-05-31T11:59:47.874748-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tetcd:\n"} +{"Time":"2023-05-31T11:59:47.87475-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t local:\n"} +{"Time":"2023-05-31T11:59:47.874755-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T11:59:47.874757-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:59:47.874759-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T11:59:47.874761-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tkubernetesVersion: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.874763-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T11:59:47.874765-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T11:59:47.874767-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T11:59:47.874769-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T11:59:47.874771-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t---\n"} +{"Time":"2023-05-31T11:59:47.874773-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T11:59:47.874775-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T11:59:47.874777-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T11:59:47.874779-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t x509:\n"} +{"Time":"2023-05-31T11:59:47.874781-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T11:59:47.874783-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T11:59:47.874785-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T11:59:47.874787-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T11:59:47.874789-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T11:59:47.874791-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T11:59:47.87492-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T11:59:47.874925-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T11:59:47.874928-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t nodefs.available: \"0%\"\n"} +{"Time":"2023-05-31T11:59:47.874939-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t nodefs.inodesFree: \"0%\"\n"} +{"Time":"2023-05-31T11:59:47.874942-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t imagefs.available: \"0%\"\n"} +{"Time":"2023-05-31T11:59:47.874955-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T11:59:47.874958-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T11:59:47.87496-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t---\n"} +{"Time":"2023-05-31T11:59:47.874971-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T11:59:47.874987-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T11:59:47.874992-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T11:59:47.874995-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T11:59:47.874998-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T11:59:47.875-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T11:59:47.875002-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T11:59:47.875004-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T11:59:47.875009-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T11:59:47.875012-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T11:59:47.875014-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.875016-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.913119 4203 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T11:59:47.875018-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T11:59:47.87502-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.875022-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:59:47.875024-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:59:47.87512-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tExecStart=/var/lib/minikube/binaries/v1.18.20/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime=docker --hostname-override=ingress-addon-legacy-478000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.49.2\n"} +{"Time":"2023-05-31T11:59:47.87513-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.875133-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:59:47.875135-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t config:\n"} +{"Time":"2023-05-31T11:59:47.875141-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t{KubernetesVersion:v1.18.20 ClusterName:ingress-addon-legacy-478000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T11:59:47.875144-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.913186 4203 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.875149-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.922471 4203 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T11:59:47.875151-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.922536 4203 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T11:59:47.875153-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.931411 4203 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (354 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875156-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.947765 4203 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (353 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875158-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.964457 4203 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2124 bytes)\n"} +{"Time":"2023-05-31T11:59:47.87516-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.980961 4203 ssh_runner.go:195] Run: grep 192.168.49.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T11:59:47.875162-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.985365 4203 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.49.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T11:59:47.875165-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.996338 4203 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000 for IP: 192.168.49.2\n"} +{"Time":"2023-05-31T11:59:47.875168-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.996359 4203 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.875262-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.996530 4203 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T11:59:47.875268-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.996594 4203 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T11:59:47.875271-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.996639 4203 certs.go:319] generating minikube-user signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/client.key\n"} +{"Time":"2023-05-31T11:59:47.875273-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:51.996651 4203 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/client.crt with IP's: []\n"} +{"Time":"2023-05-31T11:59:47.875275-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.096962 4203 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/client.crt ...\n"} +{"Time":"2023-05-31T11:59:47.875282-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.096975 4203 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/client.crt: {Name:mkf27d70a7bd592fdd24a8db81d2017be84f299f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.875286-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.097269 4203 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/client.key ...\n"} +{"Time":"2023-05-31T11:59:47.875289-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.097277 4203 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/client.key: {Name:mkaec29d36a40304c19743d3d5af2b86ffe79836 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.875292-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.097516 4203 certs.go:319] generating minikube signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.key.dd3b5fb2\n"} +{"Time":"2023-05-31T11:59:47.875294-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.097529 4203 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.crt.dd3b5fb2 with IP's: [192.168.49.2 10.96.0.1 127.0.0.1 10.0.0.1]\n"} +{"Time":"2023-05-31T11:59:47.875296-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.193627 4203 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.crt.dd3b5fb2 ...\n"} +{"Time":"2023-05-31T11:59:47.875299-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.193640 4203 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.crt.dd3b5fb2: {Name:mkb13c7057c4ec51f669c0b44963b4d455d47e10 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.875403-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.193935 4203 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.key.dd3b5fb2 ...\n"} +{"Time":"2023-05-31T11:59:47.875407-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.193947 4203 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.key.dd3b5fb2: {Name:mk7931d6dc46b11e6b8b96a9e4dacefaeb604b19 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.87541-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.194172 4203 certs.go:337] copying /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.crt.dd3b5fb2 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.crt\n"} +{"Time":"2023-05-31T11:59:47.875413-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.194349 4203 certs.go:341] copying /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.key.dd3b5fb2 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.key\n"} +{"Time":"2023-05-31T11:59:47.875415-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.194522 4203 certs.go:319] generating aggregator signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.key\n"} +{"Time":"2023-05-31T11:59:47.875418-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.194537 4203 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.crt with IP's: []\n"} +{"Time":"2023-05-31T11:59:47.87542-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368361 4203 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.crt ...\n"} +{"Time":"2023-05-31T11:59:47.875423-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368379 4203 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.crt: {Name:mk88446a2d0dae38348d7fc1b80112902bcf4a70 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.875425-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368655 4203 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.key ...\n"} +{"Time":"2023-05-31T11:59:47.875427-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368663 4203 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.key: {Name:mk9b746b4e4dfdde390b03e869e180d73dfe7d31 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:59:47.875432-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368847 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.crt -\u003e /var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T11:59:47.875519-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368876 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.key -\u003e /var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T11:59:47.875521-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368900 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.crt -\u003e /var/lib/minikube/certs/proxy-client.crt\n"} +{"Time":"2023-05-31T11:59:47.875526-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368921 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.key -\u003e /var/lib/minikube/certs/proxy-client.key\n"} +{"Time":"2023-05-31T11:59:47.875528-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368943 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt -\u003e /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T11:59:47.875535-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368961 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key -\u003e /var/lib/minikube/certs/ca.key\n"} +{"Time":"2023-05-31T11:59:47.875538-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.368986 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt -\u003e /var/lib/minikube/certs/proxy-client-ca.crt\n"} +{"Time":"2023-05-31T11:59:47.87554-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369006 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key -\u003e /var/lib/minikube/certs/proxy-client-ca.key\n"} +{"Time":"2023-05-31T11:59:47.875542-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369099 4203 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875545-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:55:52.369145 4203 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T11:59:47.875547-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369156 4203 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875648-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369191 4203 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875651-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369221 4203 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875654-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369254 4203 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875656-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369320 4203 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875662-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369354 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem -\u003e /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T11:59:47.875665-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369378 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T11:59:47.875668-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369401 4203 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt -\u003e /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:59:47.875673-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.369889 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875675-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.392830 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875678-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.415349 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T11:59:47.87568-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.437552 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/ingress-addon-legacy-478000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875682-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.460069 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875793-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.482362 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875795-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.504516 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875798-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.526229 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:59:47.8758-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.548383 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875803-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.570238 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875805-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.592126 4203 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875807-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.614276 4203 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T11:59:47.875809-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.630822 4203 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T11:59:47.875812-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.637069 4203 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T11:59:47.875814-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.646913 4203 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T11:59:47.875816-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.651965 4203 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T11:59:47.875819-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.652024 4203 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T11:59:47.875821-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.659314 4203 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T11:59:47.875944-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.669085 4203 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T11:59:47.875949-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.679131 4203 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:59:47.875951-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.683405 4203 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:59:47.875954-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.683450 4203 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:59:47.875956-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.690603 4203 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T11:59:47.875958-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.700323 4203 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T11:59:47.875961-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.709928 4203 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T11:59:47.875963-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.714300 4203 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T11:59:47.875965-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.714357 4203 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T11:59:47.875967-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.721379 4203 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T11:59:47.87597-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.731119 4203 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T11:59:47.875972-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.735745 4203 certs.go:353] certs directory doesn't exist, likely first start: ls /var/lib/minikube/certs/etcd: Process exited with status 2\n"} +{"Time":"2023-05-31T11:59:47.875974-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.875976-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.875978-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.87598-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/var/lib/minikube/certs/etcd': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.876133-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.735792 4203 kubeadm.go:404] StartCluster: {Name:ingress-addon-legacy-478000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4096 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.18.20 ClusterName:ingress-addon-legacy-478000 Namespace:default APIServerName:minik"} +{"Time":"2023-05-31T11:59:47.876144-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"ubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.49.2 Port:8443 KubernetesVersion:v1.18.20 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimization"} +{"Time":"2023-05-31T11:59:47.876147-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"s:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T11:59:47.876149-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.735891 4203 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T11:59:47.876155-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.757767 4203 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T11:59:47.876158-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.767349 4203 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T11:59:47.876164-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.776538 4203 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T11:59:47.876168-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.776592 4203 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T11:59:47.876297-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.785996 4203 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T11:59:47.876304-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.876319-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.876323-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.876327-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.87633-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.876337-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.876341-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.87635-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.786020 4203 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T11:59:47.876361-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.838954 4203 kubeadm.go:322] [init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.876366-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:52.839007 4203 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.876369-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.085124 4203 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.876373-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.085224 4203 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.876377-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.085337 4203 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.876381-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.274065 4203 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.876453-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.274695 4203 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.876458-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.274884 4203 kubeadm.go:322] [kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.87646-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.350025 4203 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.876463-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.371801 4203 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T11:59:47.876465-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.371880 4203 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.876467-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.371948 4203 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.876469-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.441887 4203 kubeadm.go:322] [certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.876471-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.516664 4203 kubeadm.go:322] [certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.876473-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.629772 4203 kubeadm.go:322] [certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.876476-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:53.893718 4203 kubeadm.go:322] [certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.876478-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:54.128879 4203 kubeadm.go:322] [certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.87648-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:54.129033 4203 kubeadm.go:322] [certs] etcd/server serving cert is signed for DNS names [ingress-addon-legacy-478000 localhost] and IPs [192.168.49.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:59:47.876483-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:54.177855 4203 kubeadm.go:322] [certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.876485-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:54.178060 4203 kubeadm.go:322] [certs] etcd/peer serving cert is signed for DNS names [ingress-addon-legacy-478000 localhost] and IPs [192.168.49.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:59:47.876488-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:54.381962 4203 kubeadm.go:322] [certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.876493-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:54.589982 4203 kubeadm.go:322] [certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.876575-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:54.738870 4203 kubeadm.go:322] [certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T11:59:47.876581-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:54.738932 4203 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.876584-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.014859 4203 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.876586-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.271442 4203 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.876589-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.600828 4203 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.876591-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.773278 4203 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.876593-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.773804 4203 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.876595-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.795306 4203 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T11:59:47.876598-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.795507 4203 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.8766-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.795689 4203 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.876609-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.795837 4203 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.876616-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.795971 4203 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.876618-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:55:55.796241 4203 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.876621-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:56:35.783280 4203 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.876623-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:56:35.784618 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.8767-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:56:35.784844 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.876704-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:56:40.786659 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.876706-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:56:40.786888 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.876708-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:56:50.788452 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.876715-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:56:50.788688 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.87672-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:10.790541 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.876723-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:10.790761 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.876726-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.792426 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.876728-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.792680 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.87673-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.792708 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.876733-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.792785 4203 kubeadm.go:322] \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.876738-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.792855 4203 kubeadm.go:322] \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.87674-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.792868 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.876742-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.792905 4203 kubeadm.go:322] \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.876832-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.792952 4203 kubeadm.go:322] \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.876837-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793123 4203 kubeadm.go:322] \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.876842-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793140 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.876845-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793321 4203 kubeadm.go:322] \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.876847-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793366 4203 kubeadm.go:322] \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.876849-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793400 4203 kubeadm.go:322] \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.876851-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793407 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.876853-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793524 4203 kubeadm.go:322] \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.876855-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793597 4203 kubeadm.go:322] \tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.876858-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793607 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.87686-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793672 4203 kubeadm.go:322] \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.876862-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793731 4203 kubeadm.go:322] \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.876864-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793792 4203 kubeadm.go:322] \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.876867-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793820 4203 kubeadm.go:322] \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.876869-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.793826 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.876871-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.796578 4203 kubeadm.go:322] W0531 18:55:52.838169 1673 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.876877-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.796744 4203 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.876942-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.796799 4203 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.876945-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.796896 4203 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.876948-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.796979 4203 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.87695-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.797077 4203 kubeadm.go:322] W0531 18:55:55.778815 1673 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.876952-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.797182 4203 kubeadm.go:322] W0531 18:55:55.779568 1673 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.876955-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.797255 4203 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.876957-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.797330 4203 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.87696-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:57:50.797433 4203 out.go:239] ! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.876963-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.876966-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.876968-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.87697-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.877156-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.877161-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.877166-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.877168-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.87717-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.877174-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.877176-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.877178-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.87718-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877182-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877188-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.87719-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877193-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877195-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] etcd/server serving cert is signed for DNS names [ingress-addon-legacy-478000 localhost] and IPs [192.168.49.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:59:47.877197-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877199-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] etcd/peer serving cert is signed for DNS names [ingress-addon-legacy-478000 localhost] and IPs [192.168.49.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:59:47.877203-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877205-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877207-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T11:59:47.877368-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.877376-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.87738-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.877383-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.877398-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.877401-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.877403-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.87741-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.877412-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.877415-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.877417-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.877419-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.877421-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.877423-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.877426-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.877428-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.87743-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.877432-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.877585-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.877589-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.877592-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.877594-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.877596-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.877602-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.877604-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.877606-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.877608-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.87761-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.877613-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.877615-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.877617-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.877619-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.877621-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.877623-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.877625-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.877627-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.877629-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.877631-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.877758-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.877763-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.877766-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.877768-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.87777-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.877772-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.877774-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:55:52.838169 1673 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.877777-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.877779-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.877787-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.87779-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.877792-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:55:55.778815 1673 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.877794-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:55:55.779568 1673 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.877809-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.877815-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.877817-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.87782-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.877881-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.877893-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.877908-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.87791-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.877913-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.877915-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.877917-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.877919-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.877922-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.877925-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.877928-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.877931-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.877934-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877941-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877943-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877945-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877964-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.877968-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] etcd/server serving cert is signed for DNS names [ingress-addon-legacy-478000 localhost] and IPs [192.168.49.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:59:47.878029-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.87804-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] etcd/peer serving cert is signed for DNS names [ingress-addon-legacy-478000 localhost] and IPs [192.168.49.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:59:47.878045-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.878061-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T11:59:47.878064-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T11:59:47.878068-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.878072-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.878075-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.87808-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.878083-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.878085-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.878087-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.878089-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.878091-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.878094-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.878096-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.878098-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.8781-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878184-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.878191-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878194-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.878196-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878198-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.878202-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878204-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.878206-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878208-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.87821-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.878213-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.878216-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.878218-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.87822-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.878222-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.878224-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.878226-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.878331-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.878336-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.878339-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.878341-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.878343-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.878345-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.878347-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.878349-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.878351-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.878353-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.878355-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.878357-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.878359-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.878361-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.878363-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:55:52.838169 1673 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.878366-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.878368-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.87837-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.878373-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.878375-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:55:55.778815 1673 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.878469-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:55:55.779568 1673 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.878473-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.878476-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.878478-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.87848-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:50.797476 4203 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm reset --cri-socket /var/run/dockershim.sock --force\"\n"} +{"Time":"2023-05-31T11:59:47.878483-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.212759 4203 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T11:59:47.878486-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.223987 4203 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T11:59:47.878489-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.224055 4203 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T11:59:47.878493-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.233396 4203 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T11:59:47.878496-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.878499-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.878501-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.878503-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.878505-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.878507-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.87851-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:59:47.878513-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.248356 4203 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T11:59:47.878675-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.300260 4203 kubeadm.go:322] [init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.878679-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.300311 4203 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.878682-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.538943 4203 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.878687-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.539095 4203 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.87869-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.539235 4203 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.878692-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.723171 4203 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.878694-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.723927 4203 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.878696-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.723972 4203 kubeadm.go:322] [kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.878702-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.796643 4203 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.878704-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818178 4203 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T11:59:47.878706-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818308 4203 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.87871-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818413 4203 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.878712-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818533 4203 kubeadm.go:322] [certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.878714-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818615 4203 kubeadm.go:322] [certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.878814-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818698 4203 kubeadm.go:322] [certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.878818-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818771 4203 kubeadm.go:322] [certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.87882-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818840 4203 kubeadm.go:322] [certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.878822-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818910 4203 kubeadm.go:322] [certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.878824-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.818994 4203 kubeadm.go:322] [certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.878827-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.819065 4203 kubeadm.go:322] [certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.878833-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.819120 4203 kubeadm.go:322] [certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T11:59:47.878836-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.819187 4203 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.878838-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.846887 4203 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.87884-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:51.948141 4203 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.878842-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.017638 4203 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.878844-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.265607 4203 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.878846-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.266085 4203 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.878951-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.287846 4203 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T11:59:47.878955-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.288023 4203 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.878957-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.288242 4203 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.878959-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.288400 4203 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.878961-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.288576 4203 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.878969-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:57:52.288931 4203 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.878972-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:58:32.274254 4203 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.878974-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:58:32.274872 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878977-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:58:32.275032 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.878979-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:58:37.275674 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878981-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:58:37.275877 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.878984-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:58:47.277294 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878986-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:58:47.277531 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.878988-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:07.279252 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.878995-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:07.279468 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.879089-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.280657 4203 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.879104-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.280953 4203 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.879107-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.280974 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.879109-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281036 4203 kubeadm.go:322] \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.879113-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281094 4203 kubeadm.go:322] \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.879115-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281105 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.879117-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281145 4203 kubeadm.go:322] \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.879119-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281187 4203 kubeadm.go:322] \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.879121-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281274 4203 kubeadm.go:322] \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.879124-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281282 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.879126-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281370 4203 kubeadm.go:322] \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.879131-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281400 4203 kubeadm.go:322] \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.879143-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281424 4203 kubeadm.go:322] \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.879146-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281431 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.879148-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281518 4203 kubeadm.go:322] \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.879151-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281584 4203 kubeadm.go:322] \tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.879253-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281592 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.879259-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281680 4203 kubeadm.go:322] \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.879262-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281741 4203 kubeadm.go:322] \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.879264-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281812 4203 kubeadm.go:322] \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.879266-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281841 4203 kubeadm.go:322] \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.879268-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.281848 4203 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:59:47.87927-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.284599 4203 kubeadm.go:322] W0531 18:57:51.299585 4176 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.879273-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.284763 4203 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.879277-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.284835 4203 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.879279-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.284965 4203 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.879282-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.285053 4203 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.879284-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.285152 4203 kubeadm.go:322] W0531 18:57:52.270609 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.879286-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.285252 4203 kubeadm.go:322] W0531 18:57:52.271359 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.879289-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.285318 4203 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.879291-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.285372 4203 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.879384-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.285401 4203 kubeadm.go:406] StartCluster complete in 3m54.548897685s\n"} +{"Time":"2023-05-31T11:59:47.879388-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.285482 4203 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T11:59:47.87939-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.306407 4203 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T11:59:47.879393-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.306421 4203 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.879395-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.306498 4203 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T11:59:47.879397-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.326458 4203 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T11:59:47.879399-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.326471 4203 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T11:59:47.879401-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.326555 4203 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T11:59:47.879404-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.347350 4203 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T11:59:47.87941-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.347364 4203 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T11:59:47.879413-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.347431 4203 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T11:59:47.879415-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.368237 4203 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T11:59:47.879417-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.368252 4203 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.879419-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.368314 4203 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T11:59:47.879421-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.388267 4203 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T11:59:47.879423-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.388283 4203 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T11:59:47.879428-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.388354 4203 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T11:59:47.879543-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.410052 4203 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T11:59:47.879556-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.410067 4203 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.879561-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.410126 4203 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T11:59:47.879564-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.431215 4203 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T11:59:47.879568-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.431229 4203 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T11:59:47.87957-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.431237 4203 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T11:59:47.879574-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.431245 4203 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T11:59:47.879579-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.471837 4203 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T11:59:47.879581-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.471852 4203 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T11:59:47.879583-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.486716 4203 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T11:59:47.879585-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.486729 4203 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.18.20/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T11:59:47.879588-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.541840 4203 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.18.20/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.18.20/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.87959-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.879593-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.879595-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.879597-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T11:59:47.879685-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t output: \n"} +{"Time":"2023-05-31T11:59:47.879691-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T11:59:47.879694-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T11:59:47.879696-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.879705-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T11:59:47.879707-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.541853 4203 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T11:59:47.87971-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.541861 4203 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T11:59:47.879712-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.558627 4203 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T11:59:47.879714-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.558640 4203 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T11:59:47.879717-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.611424 4203 out.go:369] Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.879721-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.879725-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.879727-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.879729-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.879731-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.879734-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.879842-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.879848-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.879854-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.879856-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.879858-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.879861-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.879863-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.879865-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.879867-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.879869-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.879871-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.879873-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.879875-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.879877-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.87988-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T11:59:47.879884-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.879886-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.879888-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.87989-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.879892-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.880015-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.880019-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.880021-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.880028-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.88003-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.880032-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.880035-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.880037-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880039-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880041-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880044-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880046-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.88005-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880052-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880055-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.88006-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880063-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880201-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880207-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.880221-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.880235-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880241-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.880245-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.880248-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.880251-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880255-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.880258-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.880261-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.880264-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880267-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.880271-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.880274-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880277-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.88028-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.880284-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.880286-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.880292-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880294-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880296-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.880408-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:51.299585 4176 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.880416-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.880427-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.880431-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.880434-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.880436-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.270609 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.880438-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.271359 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.880441-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.880443-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.880445-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.611450 4203 out.go:239] * \n"} +{"Time":"2023-05-31T11:59:47.880447-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* \n"} +{"Time":"2023-05-31T11:59:47.88045-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.611495 4203 out.go:239] X Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.880452-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.880454-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.880563-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.880567-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.880569-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.880572-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.880574-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.880578-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.880583-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.880588-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.880591-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.880593-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.880595-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.880597-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.880599-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.880601-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.880603-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.880605-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.880607-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.880612-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.880614-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T11:59:47.880739-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.880744-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.880756-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.880759-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.880761-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.880763-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.880765-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.880767-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.880769-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.880772-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.880774-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.880776-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.880778-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880781-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880783-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880785-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880787-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880789-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880899-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880903-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880906-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.880912-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.880914-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880916-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.880918-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.88092-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880924-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.880926-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.880928-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.88093-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.880932-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.880934-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.880936-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.880938-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.88094-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.880942-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.881062-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881065-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.881068-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.88107-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.881072-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.881074-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881076-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881077-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.88108-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:51.299585 4176 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.881082-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.881084-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.881087-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.881091-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.881095-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.270609 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.881097-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.271359 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.8811-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.881102-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.881107-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881109-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tX Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.881241-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.881245-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.881247-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.881251-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.881255-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.881257-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.88126-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.881262-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.881264-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.881266-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.881268-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.88127-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.881272-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.881274-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.881276-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.881278-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.881371-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.881375-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.881382-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.881385-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.881387-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T11:59:47.881389-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.881391-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.881393-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.881397-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.8814-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.881403-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.881406-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.881416-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.881421-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.881423-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.881425-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.881428-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.88143-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.881432-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.881549-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.881553-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.881556-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.881558-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.88156-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.881562-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.881564-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.881566-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.881569-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881571-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.881577-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.88158-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881582-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.881584-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.881586-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.881588-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.88159-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.881679-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.881682-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.881684-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881686-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.881688-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.88169-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881692-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.881694-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.881699-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.881701-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.881703-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881704-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881706-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.881709-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:51.299585 4176 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.881712-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.881715-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.881717-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.881719-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.881722-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.270609 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.881724-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.271359 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.88182-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.881826-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.881829-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.881833-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.611517 4203 out.go:239] * \n"} +{"Time":"2023-05-31T11:59:47.881836-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* \n"} +{"Time":"2023-05-31T11:59:47.88184-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.612237 4203 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:59:47.881845-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:59:47.881848-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:59:47.881852-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:59:47.881855-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:59:47.881858-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:59:47.881864-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:59:47.881867-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:59:47.88187-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:59:47.881872-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:59:47.881989-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:59:47.881994-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:59:47.881996-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:59:47.881998-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:59:47.882001-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:59:47.882004-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:59:47.882007-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.674849 4203 out.go:177] \n"} +{"Time":"2023-05-31T11:59:47.882012-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.716968 4203 out.go:239] X Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.882016-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.882024-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.882028-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.882031-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.882034-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.882038-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.882041-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.882138-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.882147-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.882149-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.882153-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.882155-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882157-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882159-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.882161-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882164-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.882169-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882171-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882173-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882175-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882177-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T11:59:47.882179-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.882181-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.882183-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.882186-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.882188-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.882295-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.882309-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.882313-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.882316-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.882318-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.88232-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.882322-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.882324-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.882326-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.882329-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.882331-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.88234-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.882345-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.882352-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.882354-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.882356-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.882358-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.882464-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.882469-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.88248-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.882488-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.882492-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.882496-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.882499-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.882503-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.882514-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.882522-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.882524-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.882527-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.882537-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.88255-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.882553-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.882555-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.882562-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.882564-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.882566-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.882568-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.88257-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.882643-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.882649-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:51.299585 4176 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.882652-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.882654-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.882657-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.882661-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.882664-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.270609 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.882668-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.271359 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.882672-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.882685-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.882692-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.882695-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tX Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T11:59:47.882697-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:59:47.8827-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:59:47.882702-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:59:47.882808-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.882814-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:59:47.882818-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:59:47.882822-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:59:47.882826-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:59:47.882829-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:59:47.882832-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:59:47.882834-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.882836-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882838-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.88284-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.882847-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882849-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T11:59:47.882851-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882855-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882857-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882859-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T11:59:47.882861-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T11:59:47.882863-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:59:47.882976-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.88298-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.882982-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.882984-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:59:47.882986-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.882991-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:59:47.882993-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:59:47.882995-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:59:47.882997-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:59:47.882999-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:59:47.883002-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T11:59:47.883004-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.883006-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.883009-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.883011-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.883013-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.883015-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.883017-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.883135-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.88314-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T11:59:47.883143-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T11:59:47.883145-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.883148-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T11:59:47.883151-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T11:59:47.883153-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.883155-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tThis error is likely caused by:\n"} +{"Time":"2023-05-31T11:59:47.883157-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T11:59:47.88316-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T11:59:47.883167-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.883169-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T11:59:47.883171-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T11:59:47.883173-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T11:59:47.883175-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.883177-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T11:59:47.883179-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tTo troubleshoot, list all containers using your preferred container runtimes CLI.\n"} +{"Time":"2023-05-31T11:59:47.883181-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.883186-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T11:59:47.883283-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T11:59:47.883287-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T11:59:47.883289-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T11:59:47.883291-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.883293-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.883295-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:59:47.883299-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:51.299585 4176 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:59:47.883302-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:59:47.883306-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T11:59:47.883308-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:59:47.88331-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:59:47.883312-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.270609 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.883314-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 18:57:52.271359 4176 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:59:47.883317-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:59:47.883319-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T11:59:47.883321-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t\n"} +{"Time":"2023-05-31T11:59:47.883323-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.717005 4203 out.go:239] * Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T11:59:47.883325-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T11:59:47.883463-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tW0531 11:59:47.717026 4203 out.go:239] * Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T11:59:47.883476-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \t* Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T11:59:47.88348-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \tI0531 11:59:47.780031 4203 out.go:177] \n"} +{"Time":"2023-05-31T11:59:47.883486-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" \n"} +{"Time":"2023-05-31T11:59:47.883501-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:59:47.883504-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ingress_addon_legacy_test.go:41: failed to start minikube with args: \"out/minikube-darwin-amd64 start -p ingress-addon-legacy-478000 --kubernetes-version=v1.18.20 --memory=4096 --wait=true --alsologtostderr -v=5 --driver=docker \" : exit status 109\n"} +{"Time":"2023-05-31T11:59:47.883513-07:00","Action":"run","Test":"TestIngressAddonLegacy/serial"} +{"Time":"2023-05-31T11:59:47.883516-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial","Output":"=== RUN TestIngressAddonLegacy/serial\n"} +{"Time":"2023-05-31T11:59:47.883519-07:00","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation"} +{"Time":"2023-05-31T11:59:47.883521-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressAddonActivation\n"} +{"Time":"2023-05-31T11:59:47.883523-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ingress_addon_legacy_test.go:70: (dbg) Run: out/minikube-darwin-amd64 -p ingress-addon-legacy-478000 addons enable ingress --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T12:00:15.518118-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":"E0531 12:00:15.518064 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:01:25.810521-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ingress_addon_legacy_test.go:70: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p ingress-addon-legacy-478000 addons enable ingress --alsologtostderr -v=5: exit status 10 (1m37.914344435s)\n"} +{"Time":"2023-05-31T12:01:25.810543-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:01:25.810547-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:25.810551-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t* ingress is an addon maintained by Kubernetes. For any concerns contact minikube on GitHub.\n"} +{"Time":"2023-05-31T12:01:25.810554-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tYou can view the list of minikube maintainers at: https://github.com/kubernetes/minikube/blob/master/OWNERS\n"} +{"Time":"2023-05-31T12:01:25.810558-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t* After the addon is enabled, please run \"minikube tunnel\" and your ingress resources would be available at \"127.0.0.1\"\n"} +{"Time":"2023-05-31T12:01:25.810574-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t - Using image registry.k8s.io/ingress-nginx/controller:v0.49.3\n"} +{"Time":"2023-05-31T12:01:25.810578-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t - Using image docker.io/jettech/kube-webhook-certgen:v1.5.1\n"} +{"Time":"2023-05-31T12:01:25.810581-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t - Using image docker.io/jettech/kube-webhook-certgen:v1.5.1\n"} +{"Time":"2023-05-31T12:01:25.810587-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t* Verifying ingress addon...\n"} +{"Time":"2023-05-31T12:01:25.81059-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810593-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810596-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:01:25.810604-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:25.810607-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:01:25.81061-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.916709 4450 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:01:25.810613-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.916988 4450 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:25.810615-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.916993 4450 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:01:25.810617-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.916997 4450 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:25.810619-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.917114 4450 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:01:25.810622-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.939083 4450 out.go:177] * ingress is an addon maintained by Kubernetes. For any concerns contact minikube on GitHub.\n"} +{"Time":"2023-05-31T12:01:25.810624-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tYou can view the list of minikube maintainers at: https://github.com/kubernetes/minikube/blob/master/OWNERS\n"} +{"Time":"2023-05-31T12:01:25.810626-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.961378 4450 config.go:182] Loaded profile config \"ingress-addon-legacy-478000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.18.20\n"} +{"Time":"2023-05-31T12:01:25.81063-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.961402 4450 addons.go:66] Setting ingress=true in profile \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T12:01:25.810632-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.961413 4450 addons.go:228] Setting addon ingress=true in \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T12:01:25.810634-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.961465 4450 host.go:66] Checking if \"ingress-addon-legacy-478000\" exists ...\n"} +{"Time":"2023-05-31T12:01:25.810636-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:47.962157 4450 cli_runner.go:164] Run: docker container inspect ingress-addon-legacy-478000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:01:25.810645-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.032932 4450 out.go:177] * After the addon is enabled, please run \"minikube tunnel\" and your ingress resources would be available at \"127.0.0.1\"\n"} +{"Time":"2023-05-31T12:01:25.810655-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.054924 4450 out.go:177] - Using image registry.k8s.io/ingress-nginx/controller:v0.49.3\n"} +{"Time":"2023-05-31T12:01:25.810659-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.075911 4450 out.go:177] - Using image docker.io/jettech/kube-webhook-certgen:v1.5.1\n"} +{"Time":"2023-05-31T12:01:25.810662-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.096707 4450 out.go:177] - Using image docker.io/jettech/kube-webhook-certgen:v1.5.1\n"} +{"Time":"2023-05-31T12:01:25.810665-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.118483 4450 addons.go:420] installing /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.810669-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.118526 4450 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/ingress-deploy.yaml (15618 bytes)\n"} +{"Time":"2023-05-31T12:01:25.810672-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.118674 4450 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:01:25.810676-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.169172 4450 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50371 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:01:25.81068-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.263179 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.810684-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:48.317812 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810692-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810695-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810698-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810704-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810708-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.317836 4450 retry.go:31] will retry after 137.01776ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.81071-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810712-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810714-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810716-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810718-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.454983 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.810735-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:48.509473 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810739-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810741-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810743-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810746-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810748-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.509496 4450 retry.go:31] will retry after 430.637592ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810751-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810753-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810755-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810757-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810759-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.940378 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.810763-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:48.995907 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810765-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810767-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.81077-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810773-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810777-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:48.995939 4450 retry.go:31] will retry after 289.380867ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.81078-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810791-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810795-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810798-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810805-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:49.286469 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.810809-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:49.342367 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810812-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810815-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810819-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810822-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810825-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:49.342386 4450 retry.go:31] will retry after 563.853832ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810829-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810832-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810836-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810839-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810845-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:49.906436 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.810863-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:49.962838 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810868-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810871-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810874-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810878-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810882-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:49.962858 4450 retry.go:31] will retry after 1.135323584s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810888-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810891-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810894-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810897-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.8109-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:51.100486 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.810908-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:51.157976 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810911-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810913-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810915-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810917-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.81092-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:51.157996 4450 retry.go:31] will retry after 1.747906167s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810922-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810939-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810943-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810946-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.81095-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:52.907025 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.810955-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:52.963882 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.810959-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.810962-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.810965-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.810968-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.810984-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:52.963901 4450 retry.go:31] will retry after 2.987877164s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811004-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811006-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811008-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.81101-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:55.951950 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.811014-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:56.008886 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811017-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.81102-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811026-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811029-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811033-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:56.008906 4450 retry.go:31] will retry after 2.329994107s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811037-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.81104-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811043-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811046-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.81105-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:58.339196 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.811054-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 11:59:58.395206 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811057-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811061-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811064-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811066-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811068-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 11:59:58.395225 4450 retry.go:31] will retry after 5.778864982s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811071-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811076-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811078-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.81108-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811083-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:00:04.174250 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.811087-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 12:00:04.228901 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.81109-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811093-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811099-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811101-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811104-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:00:04.228921 4450 retry.go:31] will retry after 6.566729914s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811124-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811133-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811138-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811141-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811145-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:00:10.797784 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.811149-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 12:00:10.852967 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811152-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811154-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811157-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.81116-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811164-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:00:10.852987 4450 retry.go:31] will retry after 9.687751153s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811167-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.81117-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811173-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811177-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811186-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:00:20.541196 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.81119-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 12:00:20.597674 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811194-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811197-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.8112-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811203-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811207-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:00:20.597691 4450 retry.go:31] will retry after 31.26152842s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.81121-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811214-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811219-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811223-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811226-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:00:51.861634 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.811231-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 12:00:51.917768 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811235-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811238-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811241-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811244-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811247-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:00:51.917789 4450 retry.go:31] will retry after 33.703049456s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811251-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811254-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811257-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.81126-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811263-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:01:25.639558 4450 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T12:01:25.811267-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 12:01:25.695067 4450 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.81127-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811273-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811276-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811285-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811288-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:01:25.695101 4450 addons.go:464] Verifying addon ingress=true in \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T12:01:25.811292-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:01:25.716590 4450 out.go:177] * Verifying ingress addon...\n"} +{"Time":"2023-05-31T12:01:25.811295-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:01:25.739288 4450 out.go:177] \n"} +{"Time":"2023-05-31T12:01:25.811299-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 12:01:25.760271 4450 out.go:239] X Exiting due to MK_ADDON_ENABLE: enable failed: run callbacks: running callbacks: [sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811303-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811306-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.811309-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811312-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811316-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t get kube-client to validate ingress addon: client config: context \"ingress-addon-legacy-478000\" does not exist: client config: context \"ingress-addon-legacy-478000\" does not exist]\n"} +{"Time":"2023-05-31T12:01:25.811325-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tX Exiting due to MK_ADDON_ENABLE: enable failed: run callbacks: running callbacks: [sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-deploy.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:01:25.811333-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:01:25.811337-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:01:25.81134-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:01:25.811343-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:01:25.811347-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t get kube-client to validate ingress addon: client config: context \"ingress-addon-legacy-478000\" does not exist: client config: context \"ingress-addon-legacy-478000\" does not exist]\n"} +{"Time":"2023-05-31T12:01:25.811351-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 12:01:25.760284 4450 out.go:239] * \n"} +{"Time":"2023-05-31T12:01:25.811354-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t* \n"} +{"Time":"2023-05-31T12:01:25.811358-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tW0531 12:01:25.763104 4450 out.go:239] ╭───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:25.811363-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:25.811367-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:25.811371-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:25.811374-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:25.8114-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:25.811406-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T12:01:25.811409-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ * - /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube_addons_ecab7b1157b569c129811d3c2b680fbca2a6f3d2_0.log │\n"} +{"Time":"2023-05-31T12:01:25.811413-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:25.811417-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t╰───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:25.811421-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t╭───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:25.811426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:25.811429-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:25.811433-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:25.811436-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:25.811439-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:25.811443-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T12:01:25.811447-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ * - /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube_addons_ecab7b1157b569c129811d3c2b680fbca2a6f3d2_0.log │\n"} +{"Time":"2023-05-31T12:01:25.811452-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:25.811456-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t╰───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:25.811461-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tI0531 12:01:25.784418 4450 out.go:177] \n"} +{"Time":"2023-05-31T12:01:25.811467-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:01:25.811471-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:01:25.811479-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ingress_addon_legacy_test.go:71: failed to enable ingress addon: exit status 10\n"} +{"Time":"2023-05-31T12:01:25.811486-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:01:25.81149-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" helpers_test.go:230: ======\u003e post-mortem[TestIngressAddonLegacy/serial/ValidateIngressAddonActivation]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:01:25.811494-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" helpers_test.go:231: (dbg) Run: docker inspect ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:01:25.863865-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" helpers_test.go:235: (dbg) docker inspect ingress-addon-legacy-478000:\n"} +{"Time":"2023-05-31T12:01:25.86388-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:01:25.863884-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:25.8639-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t[\n"} +{"Time":"2023-05-31T12:01:25.863908-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.863913-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Id\": \"231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0\",\n"} +{"Time":"2023-05-31T12:01:25.863933-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Created\": \"2023-05-31T18:55:33.554864258Z\",\n"} +{"Time":"2023-05-31T12:01:25.863938-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:01:25.863941-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:01:25.863944-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:01:25.863948-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.863951-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:01:25.863954-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:01:25.863958-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:01:25.863962-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:01:25.863965-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:01:25.863971-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:01:25.863975-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:01:25.863978-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Pid\": 49714,\n"} +{"Time":"2023-05-31T12:01:25.863982-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:01:25.863985-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.863988-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"StartedAt\": \"2023-05-31T18:55:33.784826833Z\",\n"} +{"Time":"2023-05-31T12:01:25.863994-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:01:25.864-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864003-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:01:25.864007-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/resolv.conf\",\n"} +{"Time":"2023-05-31T12:01:25.864011-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/hostname\",\n"} +{"Time":"2023-05-31T12:01:25.864019-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/hosts\",\n"} +{"Time":"2023-05-31T12:01:25.864023-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"LogPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0-json.log\",\n"} +{"Time":"2023-05-31T12:01:25.864027-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Name\": \"/ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:01:25.86403-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864033-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:01:25.864037-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:01:25.86404-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864043-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864046-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864049-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:01:25.864051-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:01:25.864054-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:01:25.864057-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:01:25.864063-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ingress-addon-legacy-478000:/var\"\n"} +{"Time":"2023-05-31T12:01:25.864076-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864083-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864087-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:01:25.864094-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:01:25.864097-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:01:25.864103-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864107-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"NetworkMode\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:01:25.86411-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:01:25.864113-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.864116-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.86412-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864124-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:01:25.864127-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.86413-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864134-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.864137-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.86414-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864144-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:01:25.864147-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.86416-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864164-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.864167-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.86417-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864173-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:01:25.864176-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864179-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864186-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.86419-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864193-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864196-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:01:25.864199-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864203-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864205-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.864208-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864211-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864214-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:01:25.864217-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864221-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ]\n"} +{"Time":"2023-05-31T12:01:25.864224-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864229-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:01:25.864232-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:01:25.864236-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:01:25.864239-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864242-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:01:25.864245-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864248-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:01:25.864251-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:01:25.864254-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:01:25.864258-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t 0\n"} +{"Time":"2023-05-31T12:01:25.864261-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864263-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:01:25.864266-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:01:25.864268-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:01:25.864271-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:01:25.864274-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:01:25.864277-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:01:25.86428-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:01:25.864283-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:01:25.864286-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:01:25.864297-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.8643-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:01:25.864303-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864306-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864309-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:01:25.864312-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:01:25.864322-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:01:25.864326-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:01:25.864331-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:01:25.864335-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:01:25.864338-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:01:25.864341-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864344-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:01:25.864347-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864351-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:01:25.864354-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864357-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.86436-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864368-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:01:25.864371-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:01:25.864375-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864378-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864382-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Memory\": 4294967296,\n"} +{"Time":"2023-05-31T12:01:25.864386-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:01:25.864389-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864398-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864401-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:01:25.864404-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:01:25.864406-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:01:25.864408-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:01:25.86441-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:01:25.864412-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864415-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864418-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:01:25.86442-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864422-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864424-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:01:25.864428-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:01:25.86443-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:01:25.864433-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864436-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MemorySwap\": 4294967296,\n"} +{"Time":"2023-05-31T12:01:25.86444-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:01:25.864443-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:01:25.864446-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:01:25.864449-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:01:25.864452-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864455-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864459-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864462-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864465-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:01:25.864469-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:01:25.864472-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864475-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:01:25.864478-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:01:25.864482-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:01:25.864487-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/merged\",\n"} +{"Time":"2023-05-31T12:01:25.864491-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/diff\",\n"} +{"Time":"2023-05-31T12:01:25.864494-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/work\"\n"} +{"Time":"2023-05-31T12:01:25.864498-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864501-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:01:25.864505-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864508-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:01:25.86451-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864512-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:01:25.864515-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:01:25.864517-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:01:25.86452-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:01:25.864528-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:01:25.864536-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:01:25.864539-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864543-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864546-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:01:25.86455-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Name\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:01:25.864553-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Source\": \"/var/lib/docker/volumes/ingress-addon-legacy-478000/_data\",\n"} +{"Time":"2023-05-31T12:01:25.864557-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:01:25.864561-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:01:25.864564-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:01:25.864568-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:01:25.864571-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:01:25.864574-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864577-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864581-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:01:25.864585-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Hostname\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:01:25.864588-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864592-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864595-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:01:25.864599-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:01:25.864602-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:01:25.864606-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:01:25.864609-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:01:25.864612-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:01:25.864616-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:01:25.864626-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:01:25.86463-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:01:25.864634-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864637-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:01:25.86464-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:01:25.864644-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:01:25.864647-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:01:25.86465-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:01:25.864655-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:01:25.864659-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864662-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:01:25.864665-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:01:25.864669-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:01:25.864672-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:01:25.864675-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:01:25.864679-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:01:25.864682-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:01:25.864688-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864691-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:01:25.864694-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:01:25.864697-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:01:25.864701-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"mode.minikube.sigs.k8s.io\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:01:25.864704-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"name.minikube.sigs.k8s.io\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:01:25.864708-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:01:25.864713-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864716-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:01:25.864719-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864724-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:01:25.864727-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864731-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"SandboxID\": \"5b648a5515da38be83f720b8a420df170218806a83e3f2c121ad72a8c0a259a4\",\n"} +{"Time":"2023-05-31T12:01:25.864734-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:01:25.864737-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864741-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864744-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:01:25.864747-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.86475-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864754-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864757-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"50371\"\n"} +{"Time":"2023-05-31T12:01:25.86476-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864768-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864771-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.864774-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864777-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864781-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"50372\"\n"} +{"Time":"2023-05-31T12:01:25.864784-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864787-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.86479-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.864793-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864796-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864799-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"50373\"\n"} +{"Time":"2023-05-31T12:01:25.864802-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864808-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864811-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.864814-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864817-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864819-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"50374\"\n"} +{"Time":"2023-05-31T12:01:25.864821-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864823-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864825-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:01:25.864827-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:01:25.864829-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:01:25.864831-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"HostPort\": \"50375\"\n"} +{"Time":"2023-05-31T12:01:25.864833-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864835-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ]\n"} +{"Time":"2023-05-31T12:01:25.864844-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864846-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/5b648a5515da\",\n"} +{"Time":"2023-05-31T12:01:25.864848-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:01:25.86485-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:01:25.864852-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864854-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864856-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864858-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:01:25.86486-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864862-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864864-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.86487-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864872-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:01:25.864874-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ingress-addon-legacy-478000\": {\n"} +{"Time":"2023-05-31T12:01:25.864878-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:01:25.864881-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IPv4Address\": \"192.168.49.2\"\n"} +{"Time":"2023-05-31T12:01:25.864883-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:01:25.864885-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:01:25.864887-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:01:25.864889-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"231003869bd1\",\n"} +{"Time":"2023-05-31T12:01:25.864891-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T12:01:25.864895-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:01:25.864897-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"NetworkID\": \"57d22546bb657e3c8aa8c6700e8e8e377e86f4f5469f99cfbbf804e5dc9cbc23\",\n"} +{"Time":"2023-05-31T12:01:25.864899-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"EndpointID\": \"44284079ee6acbee4051a6c9eb410f3c95ef294d6677ed17557355a235c43ee7\",\n"} +{"Time":"2023-05-31T12:01:25.864901-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"Gateway\": \"192.168.49.1\",\n"} +{"Time":"2023-05-31T12:01:25.864907-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IPAddress\": \"192.168.49.2\",\n"} +{"Time":"2023-05-31T12:01:25.864909-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:01:25.864911-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864913-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:01:25.864915-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:01:25.864917-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"MacAddress\": \"02:42:c0:a8:31:02\",\n"} +{"Time":"2023-05-31T12:01:25.864919-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:01:25.864921-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864923-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864925-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864927-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:01:25.864932-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \t]\n"} +{"Time":"2023-05-31T12:01:25.864934-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:01:25.864939-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:25.864943-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p ingress-addon-legacy-478000 -n ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:01:26.231776-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p ingress-addon-legacy-478000 -n ingress-addon-legacy-478000: exit status 6 (367.678043ms)\n"} +{"Time":"2023-05-31T12:01:26.231797-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:01:26.231804-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:26.231824-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:01:26.23183-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:01:26.231834-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:01:26.231837-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:01:26.23184-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:26.231843-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:01:26.231846-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \tE0531 12:01:26.219776 4488 status.go:415] kubeconfig endpoint: extract IP: \"ingress-addon-legacy-478000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:01:26.23185-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:01:26.231853-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:01:26.231861-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:01:26.231865-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" helpers_test.go:241: \"ingress-addon-legacy-478000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:01:26.231872-07:00","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation"} +{"Time":"2023-05-31T12:01:26.231875-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation\n"} +{"Time":"2023-05-31T12:01:26.231886-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ingress_addon_legacy_test.go:79: (dbg) Run: out/minikube-darwin-amd64 -p ingress-addon-legacy-478000 addons enable ingress-dns --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T12:02:18.437839-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":"E0531 12:02:18.437806 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:02:31.690654-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":"E0531 12:02:31.690593 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:02:59.380715-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":"E0531 12:02:59.380665 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:03:25.583902-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ingress_addon_legacy_test.go:79: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p ingress-addon-legacy-478000 addons enable ingress-dns --alsologtostderr -v=5: exit status 10 (1m59.347367974s)\n"} +{"Time":"2023-05-31T12:03:25.583918-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:03:25.583922-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:25.583925-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t* ingress-dns is an addon maintained by Google. For any concerns contact minikube on GitHub.\n"} +{"Time":"2023-05-31T12:03:25.583929-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tYou can view the list of minikube maintainers at: https://github.com/kubernetes/minikube/blob/master/OWNERS\n"} +{"Time":"2023-05-31T12:03:25.583941-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t* After the addon is enabled, please run \"minikube tunnel\" and your ingress resources would be available at \"127.0.0.1\"\n"} +{"Time":"2023-05-31T12:03:25.583945-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t - Using image cryptexlabs/minikube-ingress-dns:0.3.0\n"} +{"Time":"2023-05-31T12:03:25.583948-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.583951-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.583957-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:03:25.583961-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:25.583965-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:25.583969-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.271403 4498 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:25.583974-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.271662 4498 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:25.583978-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.271668 4498 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:25.583981-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.271672 4498 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:25.583983-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.271794 4498 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:25.583987-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.295779 4498 out.go:177] * ingress-dns is an addon maintained by Google. For any concerns contact minikube on GitHub.\n"} +{"Time":"2023-05-31T12:03:25.58399-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tYou can view the list of minikube maintainers at: https://github.com/kubernetes/minikube/blob/master/OWNERS\n"} +{"Time":"2023-05-31T12:03:25.583993-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.317323 4498 config.go:182] Loaded profile config \"ingress-addon-legacy-478000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.18.20\n"} +{"Time":"2023-05-31T12:03:25.583996-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.317361 4498 addons.go:66] Setting ingress-dns=true in profile \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T12:03:25.583999-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.317378 4498 addons.go:228] Setting addon ingress-dns=true in \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T12:03:25.584002-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.317458 4498 host.go:66] Checking if \"ingress-addon-legacy-478000\" exists ...\n"} +{"Time":"2023-05-31T12:03:25.584005-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.318496 4498 cli_runner.go:164] Run: docker container inspect ingress-addon-legacy-478000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:03:25.584008-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.389859 4498 out.go:177] * After the addon is enabled, please run \"minikube tunnel\" and your ingress resources would be available at \"127.0.0.1\"\n"} +{"Time":"2023-05-31T12:03:25.584018-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.411817 4498 out.go:177] - Using image cryptexlabs/minikube-ingress-dns:0.3.0\n"} +{"Time":"2023-05-31T12:03:25.584022-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.432699 4498 addons.go:420] installing /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584025-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.432729 4498 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/ingress-dns-pod.yaml (2434 bytes)\n"} +{"Time":"2023-05-31T12:03:25.584031-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.432850 4498 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:03:25.584035-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.482311 4498 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50371 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/ingress-addon-legacy-478000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:03:25.584042-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.575830 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584047-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:26.629814 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584052-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584056-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584061-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584065-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584071-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.629843 4498 retry.go:31] will retry after 148.039768ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584076-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584079-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584081-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584084-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584088-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.778146 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584091-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:26.834441 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584094-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584097-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584099-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584102-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.58411-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:26.834462 4498 retry.go:31] will retry after 307.689315ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584115-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584119-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584123-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584126-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584129-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:27.142620 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584132-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:27.200211 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584135-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584138-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584144-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584147-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584152-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:27.200239 4498 retry.go:31] will retry after 752.35832ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584157-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584161-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584165-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584169-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584176-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:27.955020 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584179-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:28.012004 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584182-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584185-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584188-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584191-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584194-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:28.012023 4498 retry.go:31] will retry after 761.695114ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584197-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584201-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584205-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584208-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584211-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:28.775665 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584214-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:28.831029 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584217-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.58422-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584223-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584226-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.58423-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:28.831050 4498 retry.go:31] will retry after 1.773997205s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584234-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584237-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584239-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584251-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584254-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:30.607552 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584257-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:30.663756 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.58426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584263-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584266-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584268-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584272-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:30.663777 4498 retry.go:31] will retry after 958.026476ms: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584282-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584286-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584289-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584292-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584295-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:31.623420 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584299-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:31.679022 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584302-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584304-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584307-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584311-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584315-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:31.679053 4498 retry.go:31] will retry after 3.03164674s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.58432-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584324-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584328-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584331-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584337-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:34.711298 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584355-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:34.767888 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584366-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584371-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584375-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.58438-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584385-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:34.767904 4498 retry.go:31] will retry after 5.059481813s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584405-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584415-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584421-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584431-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:39.828089 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584437-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:39.882478 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584442-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584462-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584472-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584477-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.58449-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:39.882497 4498 retry.go:31] will retry after 8.376080664s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584497-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.5845-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584505-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584509-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584512-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:48.260806 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584531-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:48.317519 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584534-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584537-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584539-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584541-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584543-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:48.317537 4498 retry.go:31] will retry after 5.696209129s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584546-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584547-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584549-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584551-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584554-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:54.014149 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584556-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:01:54.070080 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.58456-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584562-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584564-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584566-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584569-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:01:54.070105 4498 retry.go:31] will retry after 14.275937759s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584571-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584577-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584579-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584582-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584585-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:02:08.348411 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584589-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:02:08.405532 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584596-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584601-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584608-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584614-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584621-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:02:08.405552 4498 retry.go:31] will retry after 32.045006917s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584633-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584641-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584646-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584648-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.58465-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:02:40.451172 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584653-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:02:40.507916 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584655-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584657-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584663-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584665-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584668-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:02:40.507947 4498 retry.go:31] will retry after 19.46720134s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.58467-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584672-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584674-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584676-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.58468-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:02:59.977058 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584684-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:03:00.034123 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584687-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.58469-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584693-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584695-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584697-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:03:00.034139 4498 retry.go:31] will retry after 25.399505872s: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.5847-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584702-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584703-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584706-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584709-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:03:25.434491 4498 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml\n"} +{"Time":"2023-05-31T12:03:25.584712-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:03:25.492012 4498 addons.go:446] apply failed, will retry: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584714-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584716-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584718-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.58472-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584722-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:03:25.513920 4498 out.go:177] \n"} +{"Time":"2023-05-31T12:03:25.584725-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:03:25.534474 4498 out.go:239] X Exiting due to MK_ADDON_ENABLE: enable failed: run callbacks: running callbacks: [sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584727-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584729-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584731-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584733-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584735-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t]\n"} +{"Time":"2023-05-31T12:03:25.584738-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tX Exiting due to MK_ADDON_ENABLE: enable failed: run callbacks: running callbacks: [sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply --force -f /etc/kubernetes/addons/ingress-dns-pod.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:03:25.584742-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:03:25.584745-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t\n"} +{"Time":"2023-05-31T12:03:25.584748-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:03:25.584751-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:03:25.584755-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t]\n"} +{"Time":"2023-05-31T12:03:25.584758-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:03:25.534494 4498 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:25.584761-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:25.584765-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tW0531 12:03:25.537732 4498 out.go:239] ╭───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:25.584771-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:25.584775-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:25.584779-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:25.584786-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:25.58479-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:25.584794-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T12:03:25.584798-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ * - /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube_addons_26091442b04c5e26589fdfa18b5031c2ff11dd6b_0.log │\n"} +{"Time":"2023-05-31T12:03:25.584801-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:25.584805-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t╰───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:25.58481-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t╭───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:25.584817-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:25.584823-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:25.58483-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:25.584833-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:25.584837-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:25.584841-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T12:03:25.584849-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ * - /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube_addons_26091442b04c5e26589fdfa18b5031c2ff11dd6b_0.log │\n"} +{"Time":"2023-05-31T12:03:25.584854-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:25.584858-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t╰───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:25.584862-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tI0531 12:03:25.558815 4498 out.go:177] \n"} +{"Time":"2023-05-31T12:03:25.584866-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:03:25.584869-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:25.584873-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ingress_addon_legacy_test.go:80: failed to enable ingress-dns addon: exit status 10\n"} +{"Time":"2023-05-31T12:03:25.584879-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:25.584883-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" helpers_test.go:230: ======\u003e post-mortem[TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:03:25.584886-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" helpers_test.go:231: (dbg) Run: docker inspect ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:03:25.637152-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" helpers_test.go:235: (dbg) docker inspect ingress-addon-legacy-478000:\n"} +{"Time":"2023-05-31T12:03:25.637169-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:03:25.637172-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:25.637175-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t[\n"} +{"Time":"2023-05-31T12:03:25.637177-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637179-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Id\": \"231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0\",\n"} +{"Time":"2023-05-31T12:03:25.637181-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Created\": \"2023-05-31T18:55:33.554864258Z\",\n"} +{"Time":"2023-05-31T12:03:25.637183-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:03:25.637186-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:03:25.637188-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:03:25.63719-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637198-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:03:25.6372-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:03:25.637202-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:03:25.637204-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:03:25.637206-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:03:25.637208-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:03:25.637211-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:03:25.637213-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Pid\": 49714,\n"} +{"Time":"2023-05-31T12:03:25.637215-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637217-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637219-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"StartedAt\": \"2023-05-31T18:55:33.784826833Z\",\n"} +{"Time":"2023-05-31T12:03:25.637221-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:03:25.637223-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637225-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:03:25.637229-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/resolv.conf\",\n"} +{"Time":"2023-05-31T12:03:25.637231-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/hostname\",\n"} +{"Time":"2023-05-31T12:03:25.637234-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/hosts\",\n"} +{"Time":"2023-05-31T12:03:25.637239-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"LogPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0-json.log\",\n"} +{"Time":"2023-05-31T12:03:25.637241-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Name\": \"/ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:25.637243-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637245-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:03:25.637249-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:03:25.637251-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637253-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637255-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637257-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:03:25.637259-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:03:25.637261-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:03:25.637263-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:03:25.637265-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ingress-addon-legacy-478000:/var\"\n"} +{"Time":"2023-05-31T12:03:25.637267-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637269-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637271-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:03:25.637273-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:03:25.637276-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:03:25.637278-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.63728-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"NetworkMode\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:25.637282-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:03:25.637284-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637286-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637288-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.63729-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:25.637292-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637294-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637296-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637298-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637324-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637337-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:25.63734-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637343-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637346-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637349-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637352-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637355-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:25.637359-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637361-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637363-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637365-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.63737-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637373-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:25.637376-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637378-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637381-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637384-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637386-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637388-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:25.63739-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637392-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ]\n"} +{"Time":"2023-05-31T12:03:25.637396-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637398-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:03:25.6374-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:03:25.637402-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:03:25.637404-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637406-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:03:25.637408-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637414-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:03:25.637416-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:03:25.637418-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:03:25.63742-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t 0\n"} +{"Time":"2023-05-31T12:03:25.637422-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637424-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:03:25.637427-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:03:25.637429-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:03:25.637431-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:03:25.637433-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:03:25.637436-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:03:25.637439-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:03:25.637442-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:03:25.637445-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:03:25.637448-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637451-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:03:25.637454-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637457-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.63746-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:03:25.637465-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:03:25.637468-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:03:25.637471-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:03:25.637474-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:03:25.637477-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:03:25.63748-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:03:25.637483-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637486-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:03:25.637489-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637492-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:03:25.637495-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637499-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637502-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637505-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:03:25.637514-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:03:25.637517-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637521-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637524-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Memory\": 4294967296,\n"} +{"Time":"2023-05-31T12:03:25.637527-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:03:25.637531-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637534-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637537-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:03:25.63754-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:03:25.637542-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:03:25.637544-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:03:25.637555-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:03:25.63756-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637562-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637564-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637566-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637568-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.63757-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637572-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:03:25.637574-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:03:25.637577-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:03:25.637579-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637581-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MemorySwap\": 4294967296,\n"} +{"Time":"2023-05-31T12:03:25.637583-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:03:25.637585-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:03:25.637587-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:03:25.637589-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:03:25.637591-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637593-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637598-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:03:25.6376-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637602-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:03:25.637604-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:03:25.637607-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637608-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:03:25.637626-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:03:25.637631-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:03:25.637645-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/merged\",\n"} +{"Time":"2023-05-31T12:03:25.637648-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/diff\",\n"} +{"Time":"2023-05-31T12:03:25.637652-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/work\"\n"} +{"Time":"2023-05-31T12:03:25.637655-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637657-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:03:25.637659-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637661-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:03:25.637663-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637665-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:03:25.637667-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:03:25.637669-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:03:25.637671-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:03:25.637673-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:03:25.637675-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:03:25.637677-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637681-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637683-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:03:25.637685-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Name\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:25.637687-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Source\": \"/var/lib/docker/volumes/ingress-addon-legacy-478000/_data\",\n"} +{"Time":"2023-05-31T12:03:25.637689-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:03:25.637691-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:03:25.637694-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:03:25.637696-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:03:25.637698-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:03:25.6377-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637703-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637707-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:03:25.637709-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Hostname\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:25.637711-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637713-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637715-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:03:25.637719-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:03:25.637721-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:03:25.637723-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:03:25.637725-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:03:25.637727-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:03:25.637729-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:03:25.637731-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:03:25.637733-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:03:25.637735-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637737-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:03:25.637739-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:03:25.637742-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:03:25.637744-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:03:25.637746-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:03:25.637749-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:03:25.637752-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637755-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:03:25.637758-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:03:25.637762-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:03:25.637765-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:03:25.637768-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:03:25.637772-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:03:25.637775-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:03:25.637779-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637781-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:03:25.637783-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:03:25.637786-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:03:25.637788-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"mode.minikube.sigs.k8s.io\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:25.63779-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"name.minikube.sigs.k8s.io\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:25.637793-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:03:25.637795-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637797-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:03:25.637799-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637801-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:03:25.637804-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637807-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"SandboxID\": \"5b648a5515da38be83f720b8a420df170218806a83e3f2c121ad72a8c0a259a4\",\n"} +{"Time":"2023-05-31T12:03:25.63781-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:03:25.637813-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637817-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:03:25.63782-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:03:25.637823-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637826-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637829-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637832-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"50371\"\n"} +{"Time":"2023-05-31T12:03:25.637834-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.63784-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637842-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637844-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637846-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637848-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"50372\"\n"} +{"Time":"2023-05-31T12:03:25.63785-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637852-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637855-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637859-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637867-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637871-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"50373\"\n"} +{"Time":"2023-05-31T12:03:25.637875-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637878-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637881-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637885-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637888-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637891-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"50374\"\n"} +{"Time":"2023-05-31T12:03:25.637895-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637898-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637902-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:03:25.637905-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:25.637908-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:25.637914-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"HostPort\": \"50375\"\n"} +{"Time":"2023-05-31T12:03:25.637918-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.637924-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ]\n"} +{"Time":"2023-05-31T12:03:25.637926-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637928-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/5b648a5515da\",\n"} +{"Time":"2023-05-31T12:03:25.63793-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:03:25.637933-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:03:25.637935-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637938-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637941-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637947-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637949-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637951-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:03:25.637953-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637956-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637958-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:03:25.63796-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ingress-addon-legacy-478000\": {\n"} +{"Time":"2023-05-31T12:03:25.637962-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:03:25.637964-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IPv4Address\": \"192.168.49.2\"\n"} +{"Time":"2023-05-31T12:03:25.637966-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:25.637969-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:03:25.637971-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:03:25.637974-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"231003869bd1\",\n"} +{"Time":"2023-05-31T12:03:25.637977-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T12:03:25.637979-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:25.637982-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"NetworkID\": \"57d22546bb657e3c8aa8c6700e8e8e377e86f4f5469f99cfbbf804e5dc9cbc23\",\n"} +{"Time":"2023-05-31T12:03:25.637984-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"EndpointID\": \"44284079ee6acbee4051a6c9eb410f3c95ef294d6677ed17557355a235c43ee7\",\n"} +{"Time":"2023-05-31T12:03:25.637986-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"Gateway\": \"192.168.49.1\",\n"} +{"Time":"2023-05-31T12:03:25.637988-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IPAddress\": \"192.168.49.2\",\n"} +{"Time":"2023-05-31T12:03:25.637992-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:03:25.637995-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.637998-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:03:25.638001-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:03:25.638004-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"MacAddress\": \"02:42:c0:a8:31:02\",\n"} +{"Time":"2023-05-31T12:03:25.638006-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:03:25.638008-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.63801-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.638012-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.638014-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:25.638016-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \t]\n"} +{"Time":"2023-05-31T12:03:25.638018-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:03:25.63802-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:25.638025-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p ingress-addon-legacy-478000 -n ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:03:25.98858-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p ingress-addon-legacy-478000 -n ingress-addon-legacy-478000: exit status 6 (351.275848ms)\n"} +{"Time":"2023-05-31T12:03:25.988602-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:03:25.988607-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:25.98861-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:03:25.988612-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:03:25.988616-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:03:25.988621-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:03:25.988624-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:25.988627-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:25.98863-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \tE0531 12:03:25.976142 4525 status.go:415] kubeconfig endpoint: extract IP: \"ingress-addon-legacy-478000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:03:25.988633-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" \n"} +{"Time":"2023-05-31T12:03:25.988636-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:25.988638-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:03:25.988643-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" helpers_test.go:241: \"ingress-addon-legacy-478000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:03:25.988649-07:00","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons"} +{"Time":"2023-05-31T12:03:25.988652-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressAddons\n"} +{"Time":"2023-05-31T12:03:25.988969-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:177: failed to get Kubernetes client: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:25.988978-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:25.988982-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:230: ======\u003e post-mortem[TestIngressAddonLegacy/serial/ValidateIngressAddons]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:03:25.989042-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:231: (dbg) Run: docker inspect ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:03:26.039951-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:235: (dbg) docker inspect ingress-addon-legacy-478000:\n"} +{"Time":"2023-05-31T12:03:26.039965-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T12:03:26.039968-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:26.03997-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[\n"} +{"Time":"2023-05-31T12:03:26.039978-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.03998-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Id\": \"231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0\",\n"} +{"Time":"2023-05-31T12:03:26.039982-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Created\": \"2023-05-31T18:55:33.554864258Z\",\n"} +{"Time":"2023-05-31T12:03:26.039985-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:03:26.039987-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:03:26.039989-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:03:26.040003-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040006-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:03:26.040008-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:03:26.04001-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:03:26.040012-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:03:26.040015-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:03:26.040017-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:03:26.040021-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:03:26.040023-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Pid\": 49714,\n"} +{"Time":"2023-05-31T12:03:26.040025-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040027-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.04003-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"StartedAt\": \"2023-05-31T18:55:33.784826833Z\",\n"} +{"Time":"2023-05-31T12:03:26.040034-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:03:26.040039-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040049-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:03:26.040057-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/resolv.conf\",\n"} +{"Time":"2023-05-31T12:03:26.040061-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/hostname\",\n"} +{"Time":"2023-05-31T12:03:26.040064-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/hosts\",\n"} +{"Time":"2023-05-31T12:03:26.040072-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"LogPath\": \"/var/lib/docker/containers/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0/231003869bd1a56ba7ebe41053b7d2d28d9678843c1367498f2b3af744504cf0-json.log\",\n"} +{"Time":"2023-05-31T12:03:26.040076-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Name\": \"/ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:26.04008-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040083-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:03:26.04009-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:03:26.040093-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040096-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040098-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.0401-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:03:26.040102-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:03:26.040104-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:03:26.040106-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:03:26.04011-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ingress-addon-legacy-478000:/var\"\n"} +{"Time":"2023-05-31T12:03:26.040112-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040116-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040118-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:03:26.04012-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:03:26.040122-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:03:26.040124-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040126-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"NetworkMode\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:26.040128-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:03:26.04013-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.040132-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040135-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040138-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:26.040141-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040144-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040146-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.040148-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.04015-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040152-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:26.040154-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040156-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040158-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.04016-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040162-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040164-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:26.040166-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.04017-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040174-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.040178-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040181-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040183-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:26.040185-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040187-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040189-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.040191-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040193-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040195-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:03:26.040197-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040199-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ]\n"} +{"Time":"2023-05-31T12:03:26.040201-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040205-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:03:26.040207-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:03:26.040209-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:03:26.040211-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040214-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:03:26.040216-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040218-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:03:26.040223-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:03:26.040225-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:03:26.040227-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t 0\n"} +{"Time":"2023-05-31T12:03:26.040229-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040231-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:03:26.040234-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:03:26.040236-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:03:26.040238-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:03:26.040241-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:03:26.040244-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:03:26.040246-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:03:26.040248-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:03:26.04025-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:03:26.040252-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040254-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:03:26.040256-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040258-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040261-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:03:26.040263-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:03:26.040265-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:03:26.040266-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:03:26.040269-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:03:26.040274-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:03:26.040276-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:03:26.040278-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040281-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:03:26.040284-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040287-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:03:26.04029-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040292-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040294-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040296-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:03:26.040302-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:03:26.040304-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040306-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040308-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Memory\": 4294967296,\n"} +{"Time":"2023-05-31T12:03:26.04031-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:03:26.040312-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040314-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040317-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:03:26.040319-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:03:26.040321-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:03:26.040323-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:03:26.040325-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:03:26.040328-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040337-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040343-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040346-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040348-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.04035-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040353-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:03:26.040356-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:03:26.040359-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:03:26.040364-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:03:26.04037-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MemorySwap\": 4294967296,\n"} +{"Time":"2023-05-31T12:03:26.040374-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:03:26.040378-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:03:26.040381-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:03:26.040384-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:03:26.040394-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040398-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:03:26.0404-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040404-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040407-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:03:26.040411-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:03:26.040418-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040425-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:03:26.04043-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:03:26.040434-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:03:26.040449-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/merged\",\n"} +{"Time":"2023-05-31T12:03:26.040456-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/diff\",\n"} +{"Time":"2023-05-31T12:03:26.040465-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/cee87ad0caf988fd2e32a996c17c1d37dff9a99d7a1d3473d9d2e5168ff2d012/work\"\n"} +{"Time":"2023-05-31T12:03:26.040469-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040472-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:03:26.040478-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.04048-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:03:26.040482-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040485-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:03:26.040487-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:03:26.040489-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:03:26.040491-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:03:26.040493-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:03:26.040495-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:03:26.040499-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040501-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040503-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:03:26.040505-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Name\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:26.040507-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Source\": \"/var/lib/docker/volumes/ingress-addon-legacy-478000/_data\",\n"} +{"Time":"2023-05-31T12:03:26.040509-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:03:26.040511-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:03:26.040513-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:03:26.040515-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:03:26.040517-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:03:26.040522-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040528-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040532-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:03:26.040535-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Hostname\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:26.040539-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040542-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040544-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:03:26.040546-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:03:26.040548-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:03:26.040551-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:03:26.040553-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:03:26.040555-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:03:26.040557-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:03:26.040559-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:03:26.040562-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:03:26.040565-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040568-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:03:26.04057-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:03:26.040572-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:03:26.040575-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:03:26.040577-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:03:26.04058-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:03:26.040582-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040584-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:03:26.040586-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:03:26.040588-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:03:26.04059-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:03:26.040592-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:03:26.040594-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:03:26.040599-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:03:26.040602-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040605-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:03:26.040608-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:03:26.040612-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:03:26.040615-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"mode.minikube.sigs.k8s.io\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:26.040633-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"name.minikube.sigs.k8s.io\": \"ingress-addon-legacy-478000\",\n"} +{"Time":"2023-05-31T12:03:26.040641-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:03:26.040645-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040649-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:03:26.040652-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040655-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:03:26.040668-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040673-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"SandboxID\": \"5b648a5515da38be83f720b8a420df170218806a83e3f2c121ad72a8c0a259a4\",\n"} +{"Time":"2023-05-31T12:03:26.040676-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:03:26.040679-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040683-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040686-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:03:26.040691-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.040695-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040698-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040701-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"50371\"\n"} +{"Time":"2023-05-31T12:03:26.040704-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040707-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.04071-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.040713-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040716-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.04072-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"50372\"\n"} +{"Time":"2023-05-31T12:03:26.040739-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040743-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040745-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.040747-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040749-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040752-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"50373\"\n"} +{"Time":"2023-05-31T12:03:26.040754-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040756-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.040758-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.04076-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040762-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040764-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"50374\"\n"} +{"Time":"2023-05-31T12:03:26.040766-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040768-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.04077-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:03:26.040772-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t {\n"} +{"Time":"2023-05-31T12:03:26.040774-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:03:26.040781-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"HostPort\": \"50375\"\n"} +{"Time":"2023-05-31T12:03:26.040783-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040785-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ]\n"} +{"Time":"2023-05-31T12:03:26.040787-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040792-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/5b648a5515da\",\n"} +{"Time":"2023-05-31T12:03:26.040794-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:03:26.040796-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:03:26.040799-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040801-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040803-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040806-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040809-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040813-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040815-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040817-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040819-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:03:26.040821-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ingress-addon-legacy-478000\": {\n"} +{"Time":"2023-05-31T12:03:26.040823-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:03:26.040828-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IPv4Address\": \"192.168.49.2\"\n"} +{"Time":"2023-05-31T12:03:26.040831-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t },\n"} +{"Time":"2023-05-31T12:03:26.040835-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:03:26.040839-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:03:26.040842-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"231003869bd1\",\n"} +{"Time":"2023-05-31T12:03:26.040844-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"ingress-addon-legacy-478000\"\n"} +{"Time":"2023-05-31T12:03:26.040846-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ],\n"} +{"Time":"2023-05-31T12:03:26.04085-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"NetworkID\": \"57d22546bb657e3c8aa8c6700e8e8e377e86f4f5469f99cfbbf804e5dc9cbc23\",\n"} +{"Time":"2023-05-31T12:03:26.040853-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"EndpointID\": \"44284079ee6acbee4051a6c9eb410f3c95ef294d6677ed17557355a235c43ee7\",\n"} +{"Time":"2023-05-31T12:03:26.040855-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"Gateway\": \"192.168.49.1\",\n"} +{"Time":"2023-05-31T12:03:26.040857-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IPAddress\": \"192.168.49.2\",\n"} +{"Time":"2023-05-31T12:03:26.040859-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:03:26.040862-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040865-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:03:26.040868-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:03:26.040872-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"MacAddress\": \"02:42:c0:a8:31:02\",\n"} +{"Time":"2023-05-31T12:03:26.040874-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:03:26.040876-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040881-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040883-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040885-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t }\n"} +{"Time":"2023-05-31T12:03:26.040887-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t]\n"} +{"Time":"2023-05-31T12:03:26.040889-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T12:03:26.040891-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:26.040895-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p ingress-addon-legacy-478000 -n ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:03:26.391948-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p ingress-addon-legacy-478000 -n ingress-addon-legacy-478000: exit status 6 (351.884653ms)\n"} +{"Time":"2023-05-31T12:03:26.391961-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T12:03:26.391964-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:26.391967-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:03:26.391969-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:03:26.391971-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:03:26.391973-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T12:03:26.391975-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:26.391986-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:26.391988-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 12:03:26.379875 4537 status.go:415] kubeconfig endpoint: extract IP: \"ingress-addon-legacy-478000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:03:26.391992-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T12:03:26.391994-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:26.391996-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:03:26.391999-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:241: \"ingress-addon-legacy-478000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:03:26.39202-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":" helpers_test.go:175: Cleaning up \"ingress-addon-legacy-478000\" profile ...\n"} +{"Time":"2023-05-31T12:03:26.392046-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p ingress-addon-legacy-478000\n"} +{"Time":"2023-05-31T12:03:28.629424-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p ingress-addon-legacy-478000: (2.237270639s)\n"} +{"Time":"2023-05-31T12:03:28.629442-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":"--- FAIL: TestIngressAddonLegacy (497.42s)\n"} +{"Time":"2023-05-31T12:03:28.629446-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" --- FAIL: TestIngressAddonLegacy/StartLegacyK8sCluster (276.69s)\n"} +{"Time":"2023-05-31T12:03:28.629449-07:00","Action":"fail","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Elapsed":276.69} +{"Time":"2023-05-31T12:03:28.629454-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial","Output":" --- FAIL: TestIngressAddonLegacy/serial (218.49s)\n"} +{"Time":"2023-05-31T12:03:28.629457-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" --- FAIL: TestIngressAddonLegacy/serial/ValidateIngressAddonActivation (98.34s)\n"} +{"Time":"2023-05-31T12:03:28.629475-07:00","Action":"fail","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Elapsed":98.34} +{"Time":"2023-05-31T12:03:28.629479-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" --- FAIL: TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation (119.75s)\n"} +{"Time":"2023-05-31T12:03:28.629482-07:00","Action":"fail","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Elapsed":119.75} +{"Time":"2023-05-31T12:03:28.629485-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" --- FAIL: TestIngressAddonLegacy/serial/ValidateIngressAddons (0.40s)\n"} +{"Time":"2023-05-31T12:03:28.62949-07:00","Action":"fail","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Elapsed":0.4} +{"Time":"2023-05-31T12:03:28.629493-07:00","Action":"fail","Test":"TestIngressAddonLegacy/serial","Elapsed":218.49} +{"Time":"2023-05-31T12:03:28.629496-07:00","Action":"fail","Test":"TestIngressAddonLegacy","Elapsed":497.42} +{"Time":"2023-05-31T12:03:28.629499-07:00","Action":"run","Test":"TestJSONOutput"} +{"Time":"2023-05-31T12:03:28.629501-07:00","Action":"output","Test":"TestJSONOutput","Output":"=== RUN TestJSONOutput\n"} +{"Time":"2023-05-31T12:03:28.629504-07:00","Action":"run","Test":"TestJSONOutput/start"} +{"Time":"2023-05-31T12:03:28.629506-07:00","Action":"output","Test":"TestJSONOutput/start","Output":"=== RUN TestJSONOutput/start\n"} +{"Time":"2023-05-31T12:03:28.629511-07:00","Action":"run","Test":"TestJSONOutput/start/Command"} +{"Time":"2023-05-31T12:03:28.629513-07:00","Action":"output","Test":"TestJSONOutput/start/Command","Output":"=== RUN TestJSONOutput/start/Command\n"} +{"Time":"2023-05-31T12:03:28.629578-07:00","Action":"output","Test":"TestJSONOutput/start/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-darwin-amd64 start -p json-output-454000 --output=json --user=testUser --memory=2200 --wait=true --driver=docker \n"} +{"Time":"2023-05-31T12:04:16.593992-07:00","Action":"output","Test":"TestJSONOutput/start/Command","Output":" json_output_test.go:63: (dbg) Done: out/minikube-darwin-amd64 start -p json-output-454000 --output=json --user=testUser --memory=2200 --wait=true --driver=docker : (47.964031381s)\n"} +{"Time":"2023-05-31T12:04:16.594296-07:00","Action":"run","Test":"TestJSONOutput/start/Audit"} +{"Time":"2023-05-31T12:04:16.594305-07:00","Action":"output","Test":"TestJSONOutput/start/Audit","Output":"=== RUN TestJSONOutput/start/Audit\n"} +{"Time":"2023-05-31T12:04:16.594495-07:00","Action":"run","Test":"TestJSONOutput/start/parallel"} +{"Time":"2023-05-31T12:04:16.594503-07:00","Action":"output","Test":"TestJSONOutput/start/parallel","Output":"=== RUN TestJSONOutput/start/parallel\n"} +{"Time":"2023-05-31T12:04:16.594506-07:00","Action":"run","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:16.594508-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:16.594511-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:16.594513-07:00","Action":"pause","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:16.594515-07:00","Action":"run","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:16.594517-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:16.594522-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:16.594524-07:00","Action":"pause","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:16.594526-07:00","Action":"cont","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:16.594528-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:16.594535-07:00","Action":"cont","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:16.594537-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:16.594574-07:00","Action":"run","Test":"TestJSONOutput/pause"} +{"Time":"2023-05-31T12:04:16.594583-07:00","Action":"output","Test":"TestJSONOutput/pause","Output":"=== RUN TestJSONOutput/pause\n"} +{"Time":"2023-05-31T12:04:16.594593-07:00","Action":"run","Test":"TestJSONOutput/pause/Command"} +{"Time":"2023-05-31T12:04:16.5946-07:00","Action":"output","Test":"TestJSONOutput/pause/Command","Output":"=== RUN TestJSONOutput/pause/Command\n"} +{"Time":"2023-05-31T12:04:16.594613-07:00","Action":"output","Test":"TestJSONOutput/pause/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-darwin-amd64 pause -p json-output-454000 --output=json --user=testUser\n"} +{"Time":"2023-05-31T12:04:17.154115-07:00","Action":"run","Test":"TestJSONOutput/pause/Audit"} +{"Time":"2023-05-31T12:04:17.154133-07:00","Action":"output","Test":"TestJSONOutput/pause/Audit","Output":"=== RUN TestJSONOutput/pause/Audit\n"} +{"Time":"2023-05-31T12:04:17.154373-07:00","Action":"run","Test":"TestJSONOutput/pause/parallel"} +{"Time":"2023-05-31T12:04:17.154384-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel","Output":"=== RUN TestJSONOutput/pause/parallel\n"} +{"Time":"2023-05-31T12:04:17.154392-07:00","Action":"run","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:17.154396-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.154402-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.154422-07:00","Action":"pause","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:17.154446-07:00","Action":"run","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:17.154453-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.154457-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.154465-07:00","Action":"pause","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:17.154469-07:00","Action":"cont","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:17.154471-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.154474-07:00","Action":"cont","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:17.154477-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.154615-07:00","Action":"run","Test":"TestJSONOutput/unpause"} +{"Time":"2023-05-31T12:04:17.15462-07:00","Action":"output","Test":"TestJSONOutput/unpause","Output":"=== RUN TestJSONOutput/unpause\n"} +{"Time":"2023-05-31T12:04:17.154655-07:00","Action":"run","Test":"TestJSONOutput/unpause/Command"} +{"Time":"2023-05-31T12:04:17.154664-07:00","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":"=== RUN TestJSONOutput/unpause/Command\n"} +{"Time":"2023-05-31T12:04:17.154713-07:00","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-darwin-amd64 unpause -p json-output-454000 --output=json --user=testUser\n"} +{"Time":"2023-05-31T12:04:17.747955-07:00","Action":"run","Test":"TestJSONOutput/unpause/Audit"} +{"Time":"2023-05-31T12:04:17.747969-07:00","Action":"output","Test":"TestJSONOutput/unpause/Audit","Output":"=== RUN TestJSONOutput/unpause/Audit\n"} +{"Time":"2023-05-31T12:04:17.748178-07:00","Action":"run","Test":"TestJSONOutput/unpause/parallel"} +{"Time":"2023-05-31T12:04:17.748186-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel","Output":"=== RUN TestJSONOutput/unpause/parallel\n"} +{"Time":"2023-05-31T12:04:17.748206-07:00","Action":"run","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:17.748211-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.748216-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.748219-07:00","Action":"pause","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:17.748224-07:00","Action":"run","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:17.748227-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.748235-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.748239-07:00","Action":"pause","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:17.748243-07:00","Action":"cont","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:17.748246-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.748265-07:00","Action":"cont","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:17.748269-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:17.748324-07:00","Action":"run","Test":"TestJSONOutput/stop"} +{"Time":"2023-05-31T12:04:17.748329-07:00","Action":"output","Test":"TestJSONOutput/stop","Output":"=== RUN TestJSONOutput/stop\n"} +{"Time":"2023-05-31T12:04:17.748355-07:00","Action":"run","Test":"TestJSONOutput/stop/Command"} +{"Time":"2023-05-31T12:04:17.748364-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"=== RUN TestJSONOutput/stop/Command\n"} +{"Time":"2023-05-31T12:04:17.748385-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-darwin-amd64 stop -p json-output-454000 --output=json --user=testUser\n"} +{"Time":"2023-05-31T12:04:28.640089-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" json_output_test.go:63: (dbg) Done: out/minikube-darwin-amd64 stop -p json-output-454000 --output=json --user=testUser: (10.891519526s)\n"} +{"Time":"2023-05-31T12:04:28.640217-07:00","Action":"run","Test":"TestJSONOutput/stop/Audit"} +{"Time":"2023-05-31T12:04:28.640222-07:00","Action":"output","Test":"TestJSONOutput/stop/Audit","Output":"=== RUN TestJSONOutput/stop/Audit\n"} +{"Time":"2023-05-31T12:04:28.640387-07:00","Action":"run","Test":"TestJSONOutput/stop/parallel"} +{"Time":"2023-05-31T12:04:28.640393-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel","Output":"=== RUN TestJSONOutput/stop/parallel\n"} +{"Time":"2023-05-31T12:04:28.640397-07:00","Action":"run","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:28.640399-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:28.640405-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:28.640407-07:00","Action":"pause","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:28.640421-07:00","Action":"run","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:28.640424-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:28.640427-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:28.640429-07:00","Action":"pause","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:28.640457-07:00","Action":"cont","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T12:04:28.640466-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T12:04:28.640474-07:00","Action":"cont","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T12:04:28.640489-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T12:04:28.640516-07:00","Action":"output","Test":"TestJSONOutput","Output":" helpers_test.go:175: Cleaning up \"json-output-454000\" profile ...\n"} +{"Time":"2023-05-31T12:04:28.640563-07:00","Action":"output","Test":"TestJSONOutput","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p json-output-454000\n"} +{"Time":"2023-05-31T12:04:30.842938-07:00","Action":"output","Test":"TestJSONOutput","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p json-output-454000: (2.202301421s)\n"} +{"Time":"2023-05-31T12:04:30.842962-07:00","Action":"output","Test":"TestJSONOutput","Output":"--- PASS: TestJSONOutput (62.21s)\n"} +{"Time":"2023-05-31T12:04:30.842966-07:00","Action":"output","Test":"TestJSONOutput/start","Output":" --- PASS: TestJSONOutput/start (47.96s)\n"} +{"Time":"2023-05-31T12:04:30.842968-07:00","Action":"output","Test":"TestJSONOutput/start/Command","Output":" --- PASS: TestJSONOutput/start/Command (47.96s)\n"} +{"Time":"2023-05-31T12:04:30.842974-07:00","Action":"pass","Test":"TestJSONOutput/start/Command","Elapsed":47.96} +{"Time":"2023-05-31T12:04:30.842977-07:00","Action":"output","Test":"TestJSONOutput/start/Audit","Output":" --- PASS: TestJSONOutput/start/Audit (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.84298-07:00","Action":"pass","Test":"TestJSONOutput/start/Audit","Elapsed":0} +{"Time":"2023-05-31T12:04:30.842982-07:00","Action":"output","Test":"TestJSONOutput/start/parallel","Output":" --- PASS: TestJSONOutput/start/parallel (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.842984-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/start/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.842987-07:00","Action":"pass","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T12:04:30.842989-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/start/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.842993-07:00","Action":"pass","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T12:04:30.842995-07:00","Action":"pass","Test":"TestJSONOutput/start/parallel","Elapsed":0} +{"Time":"2023-05-31T12:04:30.842998-07:00","Action":"pass","Test":"TestJSONOutput/start","Elapsed":47.96} +{"Time":"2023-05-31T12:04:30.843-07:00","Action":"output","Test":"TestJSONOutput/pause","Output":" --- PASS: TestJSONOutput/pause (0.56s)\n"} +{"Time":"2023-05-31T12:04:30.843004-07:00","Action":"output","Test":"TestJSONOutput/pause/Command","Output":" --- PASS: TestJSONOutput/pause/Command (0.56s)\n"} +{"Time":"2023-05-31T12:04:30.843006-07:00","Action":"pass","Test":"TestJSONOutput/pause/Command","Elapsed":0.56} +{"Time":"2023-05-31T12:04:30.843008-07:00","Action":"output","Test":"TestJSONOutput/pause/Audit","Output":" --- PASS: TestJSONOutput/pause/Audit (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.84301-07:00","Action":"pass","Test":"TestJSONOutput/pause/Audit","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843012-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel","Output":" --- PASS: TestJSONOutput/pause/parallel (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843014-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/pause/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843016-07:00","Action":"pass","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843018-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/pause/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.84302-07:00","Action":"pass","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843023-07:00","Action":"pass","Test":"TestJSONOutput/pause/parallel","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843037-07:00","Action":"pass","Test":"TestJSONOutput/pause","Elapsed":0.56} +{"Time":"2023-05-31T12:04:30.843039-07:00","Action":"output","Test":"TestJSONOutput/unpause","Output":" --- PASS: TestJSONOutput/unpause (0.59s)\n"} +{"Time":"2023-05-31T12:04:30.843042-07:00","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":" --- PASS: TestJSONOutput/unpause/Command (0.59s)\n"} +{"Time":"2023-05-31T12:04:30.843044-07:00","Action":"pass","Test":"TestJSONOutput/unpause/Command","Elapsed":0.59} +{"Time":"2023-05-31T12:04:30.843046-07:00","Action":"output","Test":"TestJSONOutput/unpause/Audit","Output":" --- PASS: TestJSONOutput/unpause/Audit (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843048-07:00","Action":"pass","Test":"TestJSONOutput/unpause/Audit","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843051-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel","Output":" --- PASS: TestJSONOutput/unpause/parallel (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843054-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/unpause/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843056-07:00","Action":"pass","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843058-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/unpause/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843061-07:00","Action":"pass","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843063-07:00","Action":"pass","Test":"TestJSONOutput/unpause/parallel","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843066-07:00","Action":"pass","Test":"TestJSONOutput/unpause","Elapsed":0.59} +{"Time":"2023-05-31T12:04:30.843069-07:00","Action":"output","Test":"TestJSONOutput/stop","Output":" --- PASS: TestJSONOutput/stop (10.89s)\n"} +{"Time":"2023-05-31T12:04:30.843072-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" --- PASS: TestJSONOutput/stop/Command (10.89s)\n"} +{"Time":"2023-05-31T12:04:30.843076-07:00","Action":"pass","Test":"TestJSONOutput/stop/Command","Elapsed":10.89} +{"Time":"2023-05-31T12:04:30.843079-07:00","Action":"output","Test":"TestJSONOutput/stop/Audit","Output":" --- PASS: TestJSONOutput/stop/Audit (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843087-07:00","Action":"pass","Test":"TestJSONOutput/stop/Audit","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843089-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel","Output":" --- PASS: TestJSONOutput/stop/parallel (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843091-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/stop/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843093-07:00","Action":"pass","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843096-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/stop/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T12:04:30.843101-07:00","Action":"pass","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843104-07:00","Action":"pass","Test":"TestJSONOutput/stop/parallel","Elapsed":0} +{"Time":"2023-05-31T12:04:30.843107-07:00","Action":"pass","Test":"TestJSONOutput/stop","Elapsed":10.89} +{"Time":"2023-05-31T12:04:30.843109-07:00","Action":"pass","Test":"TestJSONOutput","Elapsed":62.21} +{"Time":"2023-05-31T12:04:30.843112-07:00","Action":"run","Test":"TestErrorJSONOutput"} +{"Time":"2023-05-31T12:04:30.843115-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":"=== RUN TestErrorJSONOutput\n"} +{"Time":"2023-05-31T12:04:30.843117-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" json_output_test.go:160: (dbg) Run: out/minikube-darwin-amd64 start -p json-output-error-976000 --memory=2200 --output=json --wait=true --driver=fail\n"} +{"Time":"2023-05-31T12:04:31.180048-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" json_output_test.go:160: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p json-output-error-976000 --memory=2200 --output=json --wait=true --driver=fail: exit status 56 (336.834667ms)\n"} +{"Time":"2023-05-31T12:04:31.180063-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \n"} +{"Time":"2023-05-31T12:04:31.180078-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:04:31.180084-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"b3ae347a-9ca2-49ee-8caa-668b2fd16355\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"0\",\"message\":\"[json-output-error-976000] minikube v1.30.1 on Darwin 13.4\",\"name\":\"Initial Minikube Setup\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T12:04:31.180091-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"53744ef4-577a-42fa-834c-a10d6f1ac0ff\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_LOCATION=16569\"}}\n"} +{"Time":"2023-05-31T12:04:31.180095-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"c7d763db-fb03-43a3-9660-41a3e7a0ef0a\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\"}}\n"} +{"Time":"2023-05-31T12:04:31.180099-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"db950750-da98-435e-b0f7-8bff598bd474\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_BIN=out/minikube-darwin-amd64\"}}\n"} +{"Time":"2023-05-31T12:04:31.180103-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"08bc5adb-2d0d-4452-8674-584a7e50b2d3\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\"}}\n"} +{"Time":"2023-05-31T12:04:31.180107-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"6e3dd374-a1bd-4382-8425-c53c23be4f9c\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\"}}\n"} +{"Time":"2023-05-31T12:04:31.180111-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"6aef59ff-f128-49d7-9f7d-8baf876952f5\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_FORCE_SYSTEMD=\"}}\n"} +{"Time":"2023-05-31T12:04:31.180115-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"8c25c1b6-6ead-4a34-9150-0fb86429e6bf\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.error\",\"datacontenttype\":\"application/json\",\"data\":{\"advice\":\"\",\"exitcode\":\"56\",\"issues\":\"\",\"message\":\"The driver 'fail' is not supported on darwin/amd64\",\"name\":\"DRV_UNSUPPORTED_OS\",\"url\":\"\"}}\n"} +{"Time":"2023-05-31T12:04:31.180119-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \n"} +{"Time":"2023-05-31T12:04:31.180122-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:04:31.18016-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" helpers_test.go:175: Cleaning up \"json-output-error-976000\" profile ...\n"} +{"Time":"2023-05-31T12:04:31.180197-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p json-output-error-976000\n"} +{"Time":"2023-05-31T12:04:31.533835-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":"--- PASS: TestErrorJSONOutput (0.69s)\n"} +{"Time":"2023-05-31T12:04:31.533853-07:00","Action":"pass","Test":"TestErrorJSONOutput","Elapsed":0.69} +{"Time":"2023-05-31T12:04:31.533857-07:00","Action":"run","Test":"TestKicCustomNetwork"} +{"Time":"2023-05-31T12:04:31.533859-07:00","Action":"output","Test":"TestKicCustomNetwork","Output":"=== RUN TestKicCustomNetwork\n"} +{"Time":"2023-05-31T12:04:31.533893-07:00","Action":"run","Test":"TestKicCustomNetwork/create_custom_network"} +{"Time":"2023-05-31T12:04:31.533899-07:00","Action":"output","Test":"TestKicCustomNetwork/create_custom_network","Output":"=== RUN TestKicCustomNetwork/create_custom_network\n"} +{"Time":"2023-05-31T12:04:31.533942-07:00","Action":"output","Test":"TestKicCustomNetwork/create_custom_network","Output":" kic_custom_network_test.go:57: (dbg) Run: out/minikube-darwin-amd64 start -p docker-network-889000 --network=\n"} +{"Time":"2023-05-31T12:04:56.912411-07:00","Action":"output","Test":"TestKicCustomNetwork/create_custom_network","Output":" kic_custom_network_test.go:57: (dbg) Done: out/minikube-darwin-amd64 start -p docker-network-889000 --network=: (25.378202793s)\n"} +{"Time":"2023-05-31T12:04:56.912498-07:00","Action":"output","Test":"TestKicCustomNetwork/create_custom_network","Output":" kic_custom_network_test.go:150: (dbg) Run: docker network ls --format {{.Name}}\n"} +{"Time":"2023-05-31T12:04:56.96355-07:00","Action":"output","Test":"TestKicCustomNetwork/create_custom_network","Output":" helpers_test.go:175: Cleaning up \"docker-network-889000\" profile ...\n"} +{"Time":"2023-05-31T12:04:56.963565-07:00","Action":"output","Test":"TestKicCustomNetwork/create_custom_network","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p docker-network-889000\n"} +{"Time":"2023-05-31T12:04:59.440204-07:00","Action":"output","Test":"TestKicCustomNetwork/create_custom_network","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p docker-network-889000: (2.47653385s)\n"} +{"Time":"2023-05-31T12:04:59.440247-07:00","Action":"run","Test":"TestKicCustomNetwork/use_default_bridge_network"} +{"Time":"2023-05-31T12:04:59.440259-07:00","Action":"output","Test":"TestKicCustomNetwork/use_default_bridge_network","Output":"=== RUN TestKicCustomNetwork/use_default_bridge_network\n"} +{"Time":"2023-05-31T12:04:59.440313-07:00","Action":"output","Test":"TestKicCustomNetwork/use_default_bridge_network","Output":" kic_custom_network_test.go:57: (dbg) Run: out/minikube-darwin-amd64 start -p docker-network-244000 --network=bridge\n"} +{"Time":"2023-05-31T12:05:23.551213-07:00","Action":"output","Test":"TestKicCustomNetwork/use_default_bridge_network","Output":" kic_custom_network_test.go:57: (dbg) Done: out/minikube-darwin-amd64 start -p docker-network-244000 --network=bridge: (24.110605983s)\n"} +{"Time":"2023-05-31T12:05:23.551295-07:00","Action":"output","Test":"TestKicCustomNetwork/use_default_bridge_network","Output":" kic_custom_network_test.go:150: (dbg) Run: docker network ls --format {{.Name}}\n"} +{"Time":"2023-05-31T12:05:23.602332-07:00","Action":"output","Test":"TestKicCustomNetwork/use_default_bridge_network","Output":" helpers_test.go:175: Cleaning up \"docker-network-244000\" profile ...\n"} +{"Time":"2023-05-31T12:05:23.602347-07:00","Action":"output","Test":"TestKicCustomNetwork/use_default_bridge_network","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p docker-network-244000\n"} +{"Time":"2023-05-31T12:05:25.919936-07:00","Action":"output","Test":"TestKicCustomNetwork/use_default_bridge_network","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p docker-network-244000: (2.317476546s)\n"} +{"Time":"2023-05-31T12:05:25.919996-07:00","Action":"output","Test":"TestKicCustomNetwork","Output":"--- PASS: TestKicCustomNetwork (54.39s)\n"} +{"Time":"2023-05-31T12:05:25.920003-07:00","Action":"output","Test":"TestKicCustomNetwork/create_custom_network","Output":" --- PASS: TestKicCustomNetwork/create_custom_network (27.91s)\n"} +{"Time":"2023-05-31T12:05:25.920007-07:00","Action":"pass","Test":"TestKicCustomNetwork/create_custom_network","Elapsed":27.91} +{"Time":"2023-05-31T12:05:25.920011-07:00","Action":"output","Test":"TestKicCustomNetwork/use_default_bridge_network","Output":" --- PASS: TestKicCustomNetwork/use_default_bridge_network (26.48s)\n"} +{"Time":"2023-05-31T12:05:25.920016-07:00","Action":"pass","Test":"TestKicCustomNetwork/use_default_bridge_network","Elapsed":26.48} +{"Time":"2023-05-31T12:05:25.920018-07:00","Action":"pass","Test":"TestKicCustomNetwork","Elapsed":54.39} +{"Time":"2023-05-31T12:05:25.920021-07:00","Action":"run","Test":"TestKicExistingNetwork"} +{"Time":"2023-05-31T12:05:25.920024-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":"=== RUN TestKicExistingNetwork\n"} +{"Time":"2023-05-31T12:05:26.151699-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":" kic_custom_network_test.go:150: (dbg) Run: docker network ls --format {{.Name}}\n"} +{"Time":"2023-05-31T12:05:26.201038-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":" kic_custom_network_test.go:93: (dbg) Run: out/minikube-darwin-amd64 start -p existing-network-574000 --network=existing-network\n"} +{"Time":"2023-05-31T12:05:50.955992-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":" kic_custom_network_test.go:93: (dbg) Done: out/minikube-darwin-amd64 start -p existing-network-574000 --network=existing-network: (24.754680374s)\n"} +{"Time":"2023-05-31T12:05:50.956011-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":" helpers_test.go:175: Cleaning up \"existing-network-574000\" profile ...\n"} +{"Time":"2023-05-31T12:05:50.956058-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p existing-network-574000\n"} +{"Time":"2023-05-31T12:05:53.335111-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p existing-network-574000: (2.378953802s)\n"} +{"Time":"2023-05-31T12:05:53.384117-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":"--- PASS: TestKicExistingNetwork (27.46s)\n"} +{"Time":"2023-05-31T12:05:53.384136-07:00","Action":"pass","Test":"TestKicExistingNetwork","Elapsed":27.46} +{"Time":"2023-05-31T12:05:53.384141-07:00","Action":"run","Test":"TestKicCustomSubnet"} +{"Time":"2023-05-31T12:05:53.384144-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":"=== RUN TestKicCustomSubnet\n"} +{"Time":"2023-05-31T12:05:53.384213-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":" kic_custom_network_test.go:112: (dbg) Run: out/minikube-darwin-amd64 start -p custom-subnet-148000 --subnet=192.168.60.0/24\n"} +{"Time":"2023-05-31T12:06:17.697861-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":" kic_custom_network_test.go:112: (dbg) Done: out/minikube-darwin-amd64 start -p custom-subnet-148000 --subnet=192.168.60.0/24: (24.313345468s)\n"} +{"Time":"2023-05-31T12:06:17.698009-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":" kic_custom_network_test.go:161: (dbg) Run: docker network inspect custom-subnet-148000 --format \"{{(index .IPAM.Config 0).Subnet}}\"\n"} +{"Time":"2023-05-31T12:06:17.800637-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":" helpers_test.go:175: Cleaning up \"custom-subnet-148000\" profile ...\n"} +{"Time":"2023-05-31T12:06:17.800659-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p custom-subnet-148000\n"} +{"Time":"2023-05-31T12:06:20.267914-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p custom-subnet-148000: (2.467160616s)\n"} +{"Time":"2023-05-31T12:06:20.267936-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":"--- PASS: TestKicCustomSubnet (26.88s)\n"} +{"Time":"2023-05-31T12:06:20.267943-07:00","Action":"pass","Test":"TestKicCustomSubnet","Elapsed":26.88} +{"Time":"2023-05-31T12:06:20.267948-07:00","Action":"run","Test":"TestKicStaticIP"} +{"Time":"2023-05-31T12:06:20.267951-07:00","Action":"output","Test":"TestKicStaticIP","Output":"=== RUN TestKicStaticIP\n"} +{"Time":"2023-05-31T12:06:20.268057-07:00","Action":"output","Test":"TestKicStaticIP","Output":" kic_custom_network_test.go:132: (dbg) Run: out/minikube-darwin-amd64 start -p static-ip-983000 --static-ip=192.168.200.200\n"} +{"Time":"2023-05-31T12:06:44.740698-07:00","Action":"output","Test":"TestKicStaticIP","Output":" kic_custom_network_test.go:132: (dbg) Done: out/minikube-darwin-amd64 start -p static-ip-983000 --static-ip=192.168.200.200: (24.472370166s)\n"} +{"Time":"2023-05-31T12:06:44.740722-07:00","Action":"output","Test":"TestKicStaticIP","Output":" kic_custom_network_test.go:138: (dbg) Run: out/minikube-darwin-amd64 -p static-ip-983000 ip\n"} +{"Time":"2023-05-31T12:06:44.951077-07:00","Action":"output","Test":"TestKicStaticIP","Output":" helpers_test.go:175: Cleaning up \"static-ip-983000\" profile ...\n"} +{"Time":"2023-05-31T12:06:44.951099-07:00","Action":"output","Test":"TestKicStaticIP","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p static-ip-983000\n"} +{"Time":"2023-05-31T12:06:47.394083-07:00","Action":"output","Test":"TestKicStaticIP","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p static-ip-983000: (2.442901859s)\n"} +{"Time":"2023-05-31T12:06:47.394102-07:00","Action":"output","Test":"TestKicStaticIP","Output":"--- PASS: TestKicStaticIP (27.13s)\n"} +{"Time":"2023-05-31T12:06:47.394138-07:00","Action":"pass","Test":"TestKicStaticIP","Elapsed":27.13} +{"Time":"2023-05-31T12:06:47.394156-07:00","Action":"run","Test":"TestMainNoArgs"} +{"Time":"2023-05-31T12:06:47.394164-07:00","Action":"output","Test":"TestMainNoArgs","Output":"=== RUN TestMainNoArgs\n"} +{"Time":"2023-05-31T12:06:47.394184-07:00","Action":"output","Test":"TestMainNoArgs","Output":" main_test.go:68: (dbg) Run: out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:06:47.45802-07:00","Action":"output","Test":"TestMainNoArgs","Output":"--- PASS: TestMainNoArgs (0.06s)\n"} +{"Time":"2023-05-31T12:06:47.458042-07:00","Action":"pass","Test":"TestMainNoArgs","Elapsed":0.06} +{"Time":"2023-05-31T12:06:47.458048-07:00","Action":"run","Test":"TestMinikubeProfile"} +{"Time":"2023-05-31T12:06:47.458052-07:00","Action":"output","Test":"TestMinikubeProfile","Output":"=== RUN TestMinikubeProfile\n"} +{"Time":"2023-05-31T12:06:47.458184-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Run: out/minikube-darwin-amd64 start -p first-065000 --driver=docker \n"} +{"Time":"2023-05-31T12:07:12.110063-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Done: out/minikube-darwin-amd64 start -p first-065000 --driver=docker : (24.651656811s)\n"} +{"Time":"2023-05-31T12:07:12.11008-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Run: out/minikube-darwin-amd64 start -p second-068000 --driver=docker \n"} +{"Time":"2023-05-31T12:07:18.440469-07:00","Action":"output","Test":"TestMinikubeProfile","Output":"E0531 12:07:18.440416 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:07:31.690764-07:00","Action":"output","Test":"TestMinikubeProfile","Output":"E0531 12:07:31.690701 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:07:37.209869-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Done: out/minikube-darwin-amd64 start -p second-068000 --driver=docker : (25.099548714s)\n"} +{"Time":"2023-05-31T12:07:37.20989-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:51: (dbg) Run: out/minikube-darwin-amd64 profile first-065000\n"} +{"Time":"2023-05-31T12:07:37.347652-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:55: (dbg) Run: out/minikube-darwin-amd64 profile list -ojson\n"} +{"Time":"2023-05-31T12:07:37.977186-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:51: (dbg) Run: out/minikube-darwin-amd64 profile second-068000\n"} +{"Time":"2023-05-31T12:07:38.111985-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:55: (dbg) Run: out/minikube-darwin-amd64 profile list -ojson\n"} +{"Time":"2023-05-31T12:07:38.737501-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:175: Cleaning up \"second-068000\" profile ...\n"} +{"Time":"2023-05-31T12:07:38.737514-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p second-068000\n"} +{"Time":"2023-05-31T12:07:41.188291-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p second-068000: (2.450696712s)\n"} +{"Time":"2023-05-31T12:07:41.188307-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:175: Cleaning up \"first-065000\" profile ...\n"} +{"Time":"2023-05-31T12:07:41.188313-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p first-065000\n"} +{"Time":"2023-05-31T12:07:43.661059-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p first-065000: (2.472627996s)\n"} +{"Time":"2023-05-31T12:07:43.661077-07:00","Action":"output","Test":"TestMinikubeProfile","Output":"--- PASS: TestMinikubeProfile (56.20s)\n"} +{"Time":"2023-05-31T12:07:43.661083-07:00","Action":"pass","Test":"TestMinikubeProfile","Elapsed":56.2} +{"Time":"2023-05-31T12:07:43.661087-07:00","Action":"run","Test":"TestMountStart"} +{"Time":"2023-05-31T12:07:43.66109-07:00","Action":"output","Test":"TestMountStart","Output":"=== RUN TestMountStart\n"} +{"Time":"2023-05-31T12:07:43.661122-07:00","Action":"run","Test":"TestMountStart/serial"} +{"Time":"2023-05-31T12:07:43.661126-07:00","Action":"output","Test":"TestMountStart/serial","Output":"=== RUN TestMountStart/serial\n"} +{"Time":"2023-05-31T12:07:43.66115-07:00","Action":"run","Test":"TestMountStart/serial/StartWithMountFirst"} +{"Time":"2023-05-31T12:07:43.661157-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":"=== RUN TestMountStart/serial/StartWithMountFirst\n"} +{"Time":"2023-05-31T12:07:43.661235-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" mount_start_test.go:98: (dbg) Run: out/minikube-darwin-amd64 start -p mount-start-1-074000 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46464 --mount-uid 0 --no-kubernetes --driver=docker \n"} +{"Time":"2023-05-31T12:07:50.690102-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" mount_start_test.go:98: (dbg) Done: out/minikube-darwin-amd64 start -p mount-start-1-074000 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46464 --mount-uid 0 --no-kubernetes --driver=docker : (7.02875963s)\n"} +{"Time":"2023-05-31T12:07:51.691491-07:00","Action":"run","Test":"TestMountStart/serial/VerifyMountFirst"} +{"Time":"2023-05-31T12:07:51.691505-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountFirst","Output":"=== RUN TestMountStart/serial/VerifyMountFirst\n"} +{"Time":"2023-05-31T12:07:51.691511-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountFirst","Output":" mount_start_test.go:114: (dbg) Run: out/minikube-darwin-amd64 -p mount-start-1-074000 ssh -- ls /minikube-host\n"} +{"Time":"2023-05-31T12:07:52.040244-07:00","Action":"run","Test":"TestMountStart/serial/StartWithMountSecond"} +{"Time":"2023-05-31T12:07:52.040256-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":"=== RUN TestMountStart/serial/StartWithMountSecond\n"} +{"Time":"2023-05-31T12:07:52.040338-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":" mount_start_test.go:98: (dbg) Run: out/minikube-darwin-amd64 start -p mount-start-2-087000 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46465 --mount-uid 0 --no-kubernetes --driver=docker \n"} +{"Time":"2023-05-31T12:07:58.91294-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":" mount_start_test.go:98: (dbg) Done: out/minikube-darwin-amd64 start -p mount-start-2-087000 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46465 --mount-uid 0 --no-kubernetes --driver=docker : (6.872475178s)\n"} +{"Time":"2023-05-31T12:07:59.913304-07:00","Action":"run","Test":"TestMountStart/serial/VerifyMountSecond"} +{"Time":"2023-05-31T12:07:59.913324-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountSecond","Output":"=== RUN TestMountStart/serial/VerifyMountSecond\n"} +{"Time":"2023-05-31T12:07:59.913362-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountSecond","Output":" mount_start_test.go:114: (dbg) Run: out/minikube-darwin-amd64 -p mount-start-2-087000 ssh -- ls /minikube-host\n"} +{"Time":"2023-05-31T12:08:00.262743-07:00","Action":"run","Test":"TestMountStart/serial/DeleteFirst"} +{"Time":"2023-05-31T12:08:00.262757-07:00","Action":"output","Test":"TestMountStart/serial/DeleteFirst","Output":"=== RUN TestMountStart/serial/DeleteFirst\n"} +{"Time":"2023-05-31T12:08:00.262773-07:00","Action":"output","Test":"TestMountStart/serial/DeleteFirst","Output":" pause_test.go:132: (dbg) Run: out/minikube-darwin-amd64 delete -p mount-start-1-074000 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T12:08:02.287256-07:00","Action":"output","Test":"TestMountStart/serial/DeleteFirst","Output":" pause_test.go:132: (dbg) Done: out/minikube-darwin-amd64 delete -p mount-start-1-074000 --alsologtostderr -v=5: (2.024399826s)\n"} +{"Time":"2023-05-31T12:08:02.287281-07:00","Action":"run","Test":"TestMountStart/serial/VerifyMountPostDelete"} +{"Time":"2023-05-31T12:08:02.287283-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountPostDelete","Output":"=== RUN TestMountStart/serial/VerifyMountPostDelete\n"} +{"Time":"2023-05-31T12:08:02.287337-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountPostDelete","Output":" mount_start_test.go:114: (dbg) Run: out/minikube-darwin-amd64 -p mount-start-2-087000 ssh -- ls /minikube-host\n"} +{"Time":"2023-05-31T12:08:02.635299-07:00","Action":"run","Test":"TestMountStart/serial/Stop"} +{"Time":"2023-05-31T12:08:02.63531-07:00","Action":"output","Test":"TestMountStart/serial/Stop","Output":"=== RUN TestMountStart/serial/Stop\n"} +{"Time":"2023-05-31T12:08:02.635339-07:00","Action":"output","Test":"TestMountStart/serial/Stop","Output":" mount_start_test.go:155: (dbg) Run: out/minikube-darwin-amd64 stop -p mount-start-2-087000\n"} +{"Time":"2023-05-31T12:08:04.163079-07:00","Action":"output","Test":"TestMountStart/serial/Stop","Output":" mount_start_test.go:155: (dbg) Done: out/minikube-darwin-amd64 stop -p mount-start-2-087000: (1.527637736s)\n"} +{"Time":"2023-05-31T12:08:04.163124-07:00","Action":"run","Test":"TestMountStart/serial/RestartStopped"} +{"Time":"2023-05-31T12:08:04.16313-07:00","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"=== RUN TestMountStart/serial/RestartStopped\n"} +{"Time":"2023-05-31T12:08:04.163142-07:00","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":" mount_start_test.go:166: (dbg) Run: out/minikube-darwin-amd64 start -p mount-start-2-087000\n"} +{"Time":"2023-05-31T12:08:12.06993-07:00","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":" mount_start_test.go:166: (dbg) Done: out/minikube-darwin-amd64 start -p mount-start-2-087000: (7.90666642s)\n"} +{"Time":"2023-05-31T12:08:13.070105-07:00","Action":"run","Test":"TestMountStart/serial/VerifyMountPostStop"} +{"Time":"2023-05-31T12:08:13.070116-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountPostStop","Output":"=== RUN TestMountStart/serial/VerifyMountPostStop\n"} +{"Time":"2023-05-31T12:08:13.070149-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountPostStop","Output":" mount_start_test.go:114: (dbg) Run: out/minikube-darwin-amd64 -p mount-start-2-087000 ssh -- ls /minikube-host\n"} +{"Time":"2023-05-31T12:08:13.420841-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:175: Cleaning up \"mount-start-2-087000\" profile ...\n"} +{"Time":"2023-05-31T12:08:13.420855-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p mount-start-2-087000\n"} +{"Time":"2023-05-31T12:08:15.435846-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p mount-start-2-087000: (2.014862141s)\n"} +{"Time":"2023-05-31T12:08:15.435861-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:175: Cleaning up \"mount-start-1-074000\" profile ...\n"} +{"Time":"2023-05-31T12:08:15.435867-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p mount-start-1-074000\n"} +{"Time":"2023-05-31T12:08:15.787788-07:00","Action":"output","Test":"TestMountStart","Output":"--- PASS: TestMountStart (32.13s)\n"} +{"Time":"2023-05-31T12:08:15.787803-07:00","Action":"output","Test":"TestMountStart/serial","Output":" --- PASS: TestMountStart/serial (29.76s)\n"} +{"Time":"2023-05-31T12:08:15.787807-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" --- PASS: TestMountStart/serial/StartWithMountFirst (8.03s)\n"} +{"Time":"2023-05-31T12:08:15.787811-07:00","Action":"pass","Test":"TestMountStart/serial/StartWithMountFirst","Elapsed":8.03} +{"Time":"2023-05-31T12:08:15.787815-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountFirst","Output":" --- PASS: TestMountStart/serial/VerifyMountFirst (0.35s)\n"} +{"Time":"2023-05-31T12:08:15.787825-07:00","Action":"pass","Test":"TestMountStart/serial/VerifyMountFirst","Elapsed":0.35} +{"Time":"2023-05-31T12:08:15.787828-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":" --- PASS: TestMountStart/serial/StartWithMountSecond (7.87s)\n"} +{"Time":"2023-05-31T12:08:15.787831-07:00","Action":"pass","Test":"TestMountStart/serial/StartWithMountSecond","Elapsed":7.87} +{"Time":"2023-05-31T12:08:15.787834-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountSecond","Output":" --- PASS: TestMountStart/serial/VerifyMountSecond (0.35s)\n"} +{"Time":"2023-05-31T12:08:15.787837-07:00","Action":"pass","Test":"TestMountStart/serial/VerifyMountSecond","Elapsed":0.35} +{"Time":"2023-05-31T12:08:15.787839-07:00","Action":"output","Test":"TestMountStart/serial/DeleteFirst","Output":" --- PASS: TestMountStart/serial/DeleteFirst (2.02s)\n"} +{"Time":"2023-05-31T12:08:15.787842-07:00","Action":"pass","Test":"TestMountStart/serial/DeleteFirst","Elapsed":2.02} +{"Time":"2023-05-31T12:08:15.787845-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountPostDelete","Output":" --- PASS: TestMountStart/serial/VerifyMountPostDelete (0.35s)\n"} +{"Time":"2023-05-31T12:08:15.787848-07:00","Action":"pass","Test":"TestMountStart/serial/VerifyMountPostDelete","Elapsed":0.35} +{"Time":"2023-05-31T12:08:15.78785-07:00","Action":"output","Test":"TestMountStart/serial/Stop","Output":" --- PASS: TestMountStart/serial/Stop (1.53s)\n"} +{"Time":"2023-05-31T12:08:15.787853-07:00","Action":"pass","Test":"TestMountStart/serial/Stop","Elapsed":1.53} +{"Time":"2023-05-31T12:08:15.787856-07:00","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":" --- PASS: TestMountStart/serial/RestartStopped (8.91s)\n"} +{"Time":"2023-05-31T12:08:15.787859-07:00","Action":"pass","Test":"TestMountStart/serial/RestartStopped","Elapsed":8.91} +{"Time":"2023-05-31T12:08:15.787862-07:00","Action":"output","Test":"TestMountStart/serial/VerifyMountPostStop","Output":" --- PASS: TestMountStart/serial/VerifyMountPostStop (0.35s)\n"} +{"Time":"2023-05-31T12:08:15.787867-07:00","Action":"pass","Test":"TestMountStart/serial/VerifyMountPostStop","Elapsed":0.35} +{"Time":"2023-05-31T12:08:15.787869-07:00","Action":"pass","Test":"TestMountStart/serial","Elapsed":29.76} +{"Time":"2023-05-31T12:08:15.787872-07:00","Action":"pass","Test":"TestMountStart","Elapsed":32.13} +{"Time":"2023-05-31T12:08:15.787874-07:00","Action":"run","Test":"TestMultiNode"} +{"Time":"2023-05-31T12:08:15.787877-07:00","Action":"output","Test":"TestMultiNode","Output":"=== RUN TestMultiNode\n"} +{"Time":"2023-05-31T12:08:15.787885-07:00","Action":"run","Test":"TestMultiNode/serial"} +{"Time":"2023-05-31T12:08:15.787888-07:00","Action":"output","Test":"TestMultiNode/serial","Output":"=== RUN TestMultiNode/serial\n"} +{"Time":"2023-05-31T12:08:15.787929-07:00","Action":"run","Test":"TestMultiNode/serial/FreshStart2Nodes"} +{"Time":"2023-05-31T12:08:15.787933-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"=== RUN TestMultiNode/serial/FreshStart2Nodes\n"} +{"Time":"2023-05-31T12:08:15.788039-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:85: (dbg) Run: out/minikube-darwin-amd64 start -p multinode-839000 --wait=true --memory=2200 --nodes=2 -v=8 --alsologtostderr --driver=docker \n"} +{"Time":"2023-05-31T12:08:41.491446-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"E0531 12:08:41.491379 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:09:26.057035-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:85: (dbg) Done: out/minikube-darwin-amd64 start -p multinode-839000 --wait=true --memory=2200 --nodes=2 -v=8 --alsologtostderr --driver=docker : (1m10.268479934s)\n"} +{"Time":"2023-05-31T12:09:26.057052-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:91: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status --alsologtostderr\n"} +{"Time":"2023-05-31T12:09:26.783008-07:00","Action":"run","Test":"TestMultiNode/serial/DeployApp2Nodes"} +{"Time":"2023-05-31T12:09:26.783021-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"=== RUN TestMultiNode/serial/DeployApp2Nodes\n"} +{"Time":"2023-05-31T12:09:26.783075-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:481: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- apply -f ./testdata/multinodes/multinode-pod-dns-test.yaml\n"} +{"Time":"2023-05-31T12:09:27.085543-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:486: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- rollout status deployment/busybox\n"} +{"Time":"2023-05-31T12:09:30.70005-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:486: (dbg) Done: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- rollout status deployment/busybox: (3.614410788s)\n"} +{"Time":"2023-05-31T12:09:30.700082-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:09:30.816375-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:502: expected 2 Pod IPs but got 1 (may be temporary), output: \"\\n-- stdout --\\n\\t'10.244.0.3'\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T12:09:31.502597-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:09:31.619961-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:502: expected 2 Pod IPs but got 1 (may be temporary), output: \"\\n-- stdout --\\n\\t'10.244.0.3'\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T12:09:33.787437-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:09:33.903914-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:502: expected 2 Pod IPs but got 1 (may be temporary), output: \"\\n-- stdout --\\n\\t'10.244.0.3'\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T12:09:36.147732-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:09:36.264467-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:502: expected 2 Pod IPs but got 1 (may be temporary), output: \"\\n-- stdout --\\n\\t'10.244.0.3'\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T12:09:39.710075-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:09:39.827299-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:502: expected 2 Pod IPs but got 1 (may be temporary), output: \"\\n-- stdout --\\n\\t'10.244.0.3'\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T12:09:47.277883-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:09:47.412828-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:502: expected 2 Pod IPs but got 1 (may be temporary), output: \"\\n-- stdout --\\n\\t'10.244.0.3'\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T12:09:54.958737-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:09:55.061595-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:502: expected 2 Pod IPs but got 1 (may be temporary), output: \"\\n-- stdout --\\n\\t'10.244.0.3'\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T12:10:01.494175-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:10:01.616217-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:502: expected 2 Pod IPs but got 1 (may be temporary), output: \"\\n-- stdout --\\n\\t'10.244.0.3'\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T12:10:15.374403-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T12:10:15.491762-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:516: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].metadata.name}'\n"} +{"Time":"2023-05-31T12:10:15.608913-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:524: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-qwq66 -- nslookup kubernetes.io\n"} +{"Time":"2023-05-31T12:10:15.845439-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:524: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-rgmdl -- nslookup kubernetes.io\n"} +{"Time":"2023-05-31T12:10:16.028023-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:534: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-qwq66 -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:10:16.220981-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:534: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-rgmdl -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:10:16.40366-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:542: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-qwq66 -- nslookup kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:10:16.579119-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:542: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-rgmdl -- nslookup kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:10:16.752827-07:00","Action":"run","Test":"TestMultiNode/serial/PingHostFrom2Pods"} +{"Time":"2023-05-31T12:10:16.75284-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":"=== RUN TestMultiNode/serial/PingHostFrom2Pods\n"} +{"Time":"2023-05-31T12:10:16.752893-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:552: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- get pods -o jsonpath='{.items[*].metadata.name}'\n"} +{"Time":"2023-05-31T12:10:16.872563-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:560: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-qwq66 -- sh -c \"nslookup host.minikube.internal | awk 'NR==5' | cut -d' ' -f3\"\n"} +{"Time":"2023-05-31T12:10:17.04948-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:571: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-qwq66 -- sh -c \"ping -c 1 192.168.65.254\"\n"} +{"Time":"2023-05-31T12:10:17.229101-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:560: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-rgmdl -- sh -c \"nslookup host.minikube.internal | awk 'NR==5' | cut -d' ' -f3\"\n"} +{"Time":"2023-05-31T12:10:17.413904-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:571: (dbg) Run: out/minikube-darwin-amd64 kubectl -p multinode-839000 -- exec busybox-67b7f59bb-rgmdl -- sh -c \"ping -c 1 192.168.65.254\"\n"} +{"Time":"2023-05-31T12:10:17.591132-07:00","Action":"run","Test":"TestMultiNode/serial/AddNode"} +{"Time":"2023-05-31T12:10:17.591146-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":"=== RUN TestMultiNode/serial/AddNode\n"} +{"Time":"2023-05-31T12:10:17.591207-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:110: (dbg) Run: out/minikube-darwin-amd64 node add -p multinode-839000 -v 3 --alsologtostderr\n"} +{"Time":"2023-05-31T12:10:35.230938-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:110: (dbg) Done: out/minikube-darwin-amd64 node add -p multinode-839000 -v 3 --alsologtostderr: (17.639528755s)\n"} +{"Time":"2023-05-31T12:10:35.230953-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:116: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status --alsologtostderr\n"} +{"Time":"2023-05-31T12:10:36.154088-07:00","Action":"run","Test":"TestMultiNode/serial/ProfileList"} +{"Time":"2023-05-31T12:10:36.154101-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":"=== RUN TestMultiNode/serial/ProfileList\n"} +{"Time":"2023-05-31T12:10:36.154146-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" multinode_test.go:132: (dbg) Run: out/minikube-darwin-amd64 profile list --output json\n"} +{"Time":"2023-05-31T12:10:36.545205-07:00","Action":"run","Test":"TestMultiNode/serial/CopyFile"} +{"Time":"2023-05-31T12:10:36.545217-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":"=== RUN TestMultiNode/serial/CopyFile\n"} +{"Time":"2023-05-31T12:10:36.545222-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" multinode_test.go:173: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status --output json --alsologtostderr\n"} +{"Time":"2023-05-31T12:10:37.417339-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp testdata/cp-test.txt multinode-839000:/home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T12:10:37.839729-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:38.194928-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000:/home/docker/cp-test.txt /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestMultiNodeserialCopyFile1914999193/001/cp-test_multinode-839000.txt\n"} +{"Time":"2023-05-31T12:10:38.551106-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:38.908456-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000:/home/docker/cp-test.txt multinode-839000-m02:/home/docker/cp-test_multinode-839000_multinode-839000-m02.txt\n"} +{"Time":"2023-05-31T12:10:39.46365-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:39.822804-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m02 \"sudo cat /home/docker/cp-test_multinode-839000_multinode-839000-m02.txt\"\n"} +{"Time":"2023-05-31T12:10:40.198078-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000:/home/docker/cp-test.txt multinode-839000-m03:/home/docker/cp-test_multinode-839000_multinode-839000-m03.txt\n"} +{"Time":"2023-05-31T12:10:40.750897-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:41.109164-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m03 \"sudo cat /home/docker/cp-test_multinode-839000_multinode-839000-m03.txt\"\n"} +{"Time":"2023-05-31T12:10:41.478625-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp testdata/cp-test.txt multinode-839000-m02:/home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T12:10:41.854104-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m02 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:42.216903-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000-m02:/home/docker/cp-test.txt /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestMultiNodeserialCopyFile1914999193/001/cp-test_multinode-839000-m02.txt\n"} +{"Time":"2023-05-31T12:10:42.571767-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m02 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:42.98682-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000-m02:/home/docker/cp-test.txt multinode-839000:/home/docker/cp-test_multinode-839000-m02_multinode-839000.txt\n"} +{"Time":"2023-05-31T12:10:43.542261-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m02 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:43.900314-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000 \"sudo cat /home/docker/cp-test_multinode-839000-m02_multinode-839000.txt\"\n"} +{"Time":"2023-05-31T12:10:44.258147-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000-m02:/home/docker/cp-test.txt multinode-839000-m03:/home/docker/cp-test_multinode-839000-m02_multinode-839000-m03.txt\n"} +{"Time":"2023-05-31T12:10:44.815919-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m02 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:45.173727-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m03 \"sudo cat /home/docker/cp-test_multinode-839000-m02_multinode-839000-m03.txt\"\n"} +{"Time":"2023-05-31T12:10:45.531524-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp testdata/cp-test.txt multinode-839000-m03:/home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T12:10:45.900748-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m03 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:46.262615-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000-m03:/home/docker/cp-test.txt /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestMultiNodeserialCopyFile1914999193/001/cp-test_multinode-839000-m03.txt\n"} +{"Time":"2023-05-31T12:10:46.617331-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m03 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:46.977042-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000-m03:/home/docker/cp-test.txt multinode-839000:/home/docker/cp-test_multinode-839000-m03_multinode-839000.txt\n"} +{"Time":"2023-05-31T12:10:47.530648-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m03 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:47.933021-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000 \"sudo cat /home/docker/cp-test_multinode-839000-m03_multinode-839000.txt\"\n"} +{"Time":"2023-05-31T12:10:48.290871-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 cp multinode-839000-m03:/home/docker/cp-test.txt multinode-839000-m02:/home/docker/cp-test_multinode-839000-m03_multinode-839000-m02.txt\n"} +{"Time":"2023-05-31T12:10:48.843406-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m03 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T12:10:49.197164-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 ssh -n multinode-839000-m02 \"sudo cat /home/docker/cp-test_multinode-839000-m03_multinode-839000-m02.txt\"\n"} +{"Time":"2023-05-31T12:10:49.556103-07:00","Action":"run","Test":"TestMultiNode/serial/StopNode"} +{"Time":"2023-05-31T12:10:49.556117-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":"=== RUN TestMultiNode/serial/StopNode\n"} +{"Time":"2023-05-31T12:10:49.556131-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:210: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 node stop m03\n"} +{"Time":"2023-05-31T12:10:51.011302-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:210: (dbg) Done: out/minikube-darwin-amd64 -p multinode-839000 node stop m03: (1.455073938s)\n"} +{"Time":"2023-05-31T12:10:51.011319-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:216: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status\n"} +{"Time":"2023-05-31T12:10:51.681041-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:216: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p multinode-839000 status: exit status 7 (669.5855ms)\n"} +{"Time":"2023-05-31T12:10:51.681063-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T12:10:51.681067-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:10:51.681069-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-839000\n"} +{"Time":"2023-05-31T12:10:51.681071-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T12:10:51.681073-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Running\n"} +{"Time":"2023-05-31T12:10:51.681075-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Running\n"} +{"Time":"2023-05-31T12:10:51.681095-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tapiserver: Running\n"} +{"Time":"2023-05-31T12:10:51.681103-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubeconfig: Configured\n"} +{"Time":"2023-05-31T12:10:51.681107-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T12:10:51.68111-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-839000-m02\n"} +{"Time":"2023-05-31T12:10:51.681113-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T12:10:51.681116-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Running\n"} +{"Time":"2023-05-31T12:10:51.681119-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Running\n"} +{"Time":"2023-05-31T12:10:51.681123-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T12:10:51.68113-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-839000-m03\n"} +{"Time":"2023-05-31T12:10:51.681133-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T12:10:51.681136-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T12:10:51.681139-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T12:10:51.681142-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T12:10:51.681145-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T12:10:51.681148-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:10:51.681153-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:223: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status --alsologtostderr\n"} +{"Time":"2023-05-31T12:10:52.356786-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:223: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p multinode-839000 status --alsologtostderr: exit status 7 (675.47413ms)\n"} +{"Time":"2023-05-31T12:10:52.356806-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T12:10:52.35681-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:10:52.356812-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-839000\n"} +{"Time":"2023-05-31T12:10:52.356814-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T12:10:52.356816-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Running\n"} +{"Time":"2023-05-31T12:10:52.356818-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Running\n"} +{"Time":"2023-05-31T12:10:52.356821-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tapiserver: Running\n"} +{"Time":"2023-05-31T12:10:52.356824-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubeconfig: Configured\n"} +{"Time":"2023-05-31T12:10:52.356826-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T12:10:52.356828-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-839000-m02\n"} +{"Time":"2023-05-31T12:10:52.356837-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T12:10:52.356841-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Running\n"} +{"Time":"2023-05-31T12:10:52.356843-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Running\n"} +{"Time":"2023-05-31T12:10:52.356845-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T12:10:52.356846-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-839000-m03\n"} +{"Time":"2023-05-31T12:10:52.356848-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T12:10:52.35685-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T12:10:52.356852-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T12:10:52.356854-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T12:10:52.356856-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T12:10:52.356858-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:10:52.35686-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:10:52.356863-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.720921 7065 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:10:52.356866-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721132 7065 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:10:52.356869-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721138 7065 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:10:52.356873-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721142 7065 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:10:52.356875-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721252 7065 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:10:52.356877-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721443 7065 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:10:52.356879-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721467 7065 mustload.go:65] Loading cluster: multinode-839000\n"} +{"Time":"2023-05-31T12:10:52.356881-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721525 7065 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:10:52.356883-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721758 7065 config.go:182] Loaded profile config \"multinode-839000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:10:52.356886-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.721774 7065 status.go:255] checking status of multinode-839000 ...\n"} +{"Time":"2023-05-31T12:10:52.356888-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.722272 7065 cli_runner.go:164] Run: docker container inspect multinode-839000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:10:52.35689-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.772646 7065 status.go:330] multinode-839000 host status = \"Running\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T12:10:52.356893-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.772671 7065 host.go:66] Checking if \"multinode-839000\" exists ...\n"} +{"Time":"2023-05-31T12:10:52.356897-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.772910 7065 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" multinode-839000\n"} +{"Time":"2023-05-31T12:10:52.3569-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.824407 7065 host.go:66] Checking if \"multinode-839000\" exists ...\n"} +{"Time":"2023-05-31T12:10:52.356903-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.824672 7065 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T12:10:52.356906-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.824737 7065 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" multinode-839000\n"} +{"Time":"2023-05-31T12:10:52.356909-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.873947 7065 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50710 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/multinode-839000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:10:52.356912-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.955894 7065 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T12:10:52.356915-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.961119 7065 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:10:52.356917-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:51.972247 7065 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" multinode-839000\n"} +{"Time":"2023-05-31T12:10:52.35692-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.021958 7065 kubeconfig.go:92] found \"multinode-839000\" server: \"https://127.0.0.1:50709\"\n"} +{"Time":"2023-05-31T12:10:52.356923-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.021985 7065 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:10:52.356926-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.022034 7065 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:10:52.356929-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.033605 7065 ssh_runner.go:195] Run: sudo egrep ^[0-9]+:freezer: /proc/2204/cgroup\n"} +{"Time":"2023-05-31T12:10:52.356933-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tW0531 12:10:52.043425 7065 api_server.go:177] unable to find freezer cgroup: sudo egrep ^[0-9]+:freezer: /proc/2204/cgroup: Process exited with status 1\n"} +{"Time":"2023-05-31T12:10:52.356937-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:10:52.35694-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T12:10:52.356943-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:10:52.356946-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.043487 7065 ssh_runner.go:195] Run: ls\n"} +{"Time":"2023-05-31T12:10:52.356949-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.048511 7065 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:50709/healthz ...\n"} +{"Time":"2023-05-31T12:10:52.356958-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.053786 7065 api_server.go:279] https://127.0.0.1:50709/healthz returned 200:\n"} +{"Time":"2023-05-31T12:10:52.356961-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tok\n"} +{"Time":"2023-05-31T12:10:52.356965-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.053807 7065 status.go:421] multinode-839000 apiserver status = Running (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T12:10:52.35697-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.053818 7065 status.go:257] multinode-839000 status: \u0026{Name:multinode-839000 Host:Running Kubelet:Running APIServer:Running Kubeconfig:Configured Worker:false TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T12:10:52.356973-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.053829 7065 status.go:255] checking status of multinode-839000-m02 ...\n"} +{"Time":"2023-05-31T12:10:52.356976-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.054064 7065 cli_runner.go:164] Run: docker container inspect multinode-839000-m02 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:10:52.35698-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.103299 7065 status.go:330] multinode-839000-m02 host status = \"Running\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T12:10:52.356983-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.103326 7065 host.go:66] Checking if \"multinode-839000-m02\" exists ...\n"} +{"Time":"2023-05-31T12:10:52.356991-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.103588 7065 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" multinode-839000-m02\n"} +{"Time":"2023-05-31T12:10:52.356995-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.152865 7065 host.go:66] Checking if \"multinode-839000-m02\" exists ...\n"} +{"Time":"2023-05-31T12:10:52.357-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.153122 7065 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T12:10:52.357003-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.153179 7065 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" multinode-839000-m02\n"} +{"Time":"2023-05-31T12:10:52.357007-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.204041 7065 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:50748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/multinode-839000-m02/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:10:52.357011-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.294045 7065 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:10:52.357014-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.305413 7065 status.go:257] multinode-839000-m02 status: \u0026{Name:multinode-839000-m02 Host:Running Kubelet:Running APIServer:Irrelevant Kubeconfig:Irrelevant Worker:true TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T12:10:52.357021-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.305440 7065 status.go:255] checking status of multinode-839000-m03 ...\n"} +{"Time":"2023-05-31T12:10:52.357023-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.305708 7065 cli_runner.go:164] Run: docker container inspect multinode-839000-m03 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:10:52.357026-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.354960 7065 status.go:330] multinode-839000-m03 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T12:10:52.357028-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.354982 7065 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T12:10:52.35703-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 12:10:52.354988 7065 status.go:257] multinode-839000-m03 status: \u0026{Name:multinode-839000-m03 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:true TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T12:10:52.357033-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T12:10:52.357035-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:10:52.357042-07:00","Action":"run","Test":"TestMultiNode/serial/StartAfterStop"} +{"Time":"2023-05-31T12:10:52.357048-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":"=== RUN TestMultiNode/serial/StartAfterStop\n"} +{"Time":"2023-05-31T12:10:52.357061-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:244: (dbg) Run: docker version -f {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:10:52.414076-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:254: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 node start m03 --alsologtostderr\n"} +{"Time":"2023-05-31T12:11:04.493661-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:254: (dbg) Done: out/minikube-darwin-amd64 -p multinode-839000 node start m03 --alsologtostderr: (12.079391695s)\n"} +{"Time":"2023-05-31T12:11:04.49368-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:261: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status\n"} +{"Time":"2023-05-31T12:11:05.353869-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:275: (dbg) Run: kubectl get nodes\n"} +{"Time":"2023-05-31T12:11:05.403223-07:00","Action":"run","Test":"TestMultiNode/serial/RestartKeepsNodes"} +{"Time":"2023-05-31T12:11:05.403235-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"=== RUN TestMultiNode/serial/RestartKeepsNodes\n"} +{"Time":"2023-05-31T12:11:05.403284-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:283: (dbg) Run: out/minikube-darwin-amd64 node list -p multinode-839000\n"} +{"Time":"2023-05-31T12:11:05.445434-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:290: (dbg) Run: out/minikube-darwin-amd64 stop -p multinode-839000\n"} +{"Time":"2023-05-31T12:11:28.367748-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:290: (dbg) Done: out/minikube-darwin-amd64 stop -p multinode-839000: (22.922106263s)\n"} +{"Time":"2023-05-31T12:11:28.367765-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:295: (dbg) Run: out/minikube-darwin-amd64 start -p multinode-839000 --wait=true -v=8 --alsologtostderr\n"} +{"Time":"2023-05-31T12:12:18.441769-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 12:12:18.441737 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:12:31.692885-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 12:12:31.692856 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:12:41.584099-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:295: (dbg) Done: out/minikube-darwin-amd64 start -p multinode-839000 --wait=true -v=8 --alsologtostderr: (1m13.215782261s)\n"} +{"Time":"2023-05-31T12:12:41.58414-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:300: (dbg) Run: out/minikube-darwin-amd64 node list -p multinode-839000\n"} +{"Time":"2023-05-31T12:12:41.62961-07:00","Action":"run","Test":"TestMultiNode/serial/DeleteNode"} +{"Time":"2023-05-31T12:12:41.629622-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":"=== RUN TestMultiNode/serial/DeleteNode\n"} +{"Time":"2023-05-31T12:12:41.629659-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:394: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 node delete m03\n"} +{"Time":"2023-05-31T12:12:46.657157-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:394: (dbg) Done: out/minikube-darwin-amd64 -p multinode-839000 node delete m03: (5.027370453s)\n"} +{"Time":"2023-05-31T12:12:46.657174-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:400: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status --alsologtostderr\n"} +{"Time":"2023-05-31T12:12:47.279026-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:414: (dbg) Run: docker volume ls\n"} +{"Time":"2023-05-31T12:12:47.328062-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:424: (dbg) Run: kubectl get nodes\n"} +{"Time":"2023-05-31T12:12:47.405604-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:432: (dbg) Run: kubectl get nodes -o \"go-template='{{range .items}}{{range .status.conditions}}{{if eq .type \"Ready\"}} {{.status}}{{\"\\n\"}}{{end}}{{end}}{{end}}'\"\n"} +{"Time":"2023-05-31T12:12:47.467273-07:00","Action":"run","Test":"TestMultiNode/serial/StopMultiNode"} +{"Time":"2023-05-31T12:12:47.467285-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":"=== RUN TestMultiNode/serial/StopMultiNode\n"} +{"Time":"2023-05-31T12:12:47.467353-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:314: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 stop\n"} +{"Time":"2023-05-31T12:13:09.024066-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:314: (dbg) Done: out/minikube-darwin-amd64 -p multinode-839000 stop: (21.556486665s)\n"} +{"Time":"2023-05-31T12:13:09.024084-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:320: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status\n"} +{"Time":"2023-05-31T12:13:09.16497-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:320: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p multinode-839000 status: exit status 7 (140.778061ms)\n"} +{"Time":"2023-05-31T12:13:09.164982-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T12:13:09.164985-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:13:09.164987-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-839000\n"} +{"Time":"2023-05-31T12:13:09.164989-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T12:13:09.164992-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T12:13:09.164994-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T12:13:09.165-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T12:13:09.165003-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T12:13:09.165006-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T12:13:09.165009-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-839000-m02\n"} +{"Time":"2023-05-31T12:13:09.165012-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T12:13:09.165014-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T12:13:09.165016-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T12:13:09.165018-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T12:13:09.165019-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T12:13:09.165021-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:13:09.165025-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:327: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status --alsologtostderr\n"} +{"Time":"2023-05-31T12:13:09.305055-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:327: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p multinode-839000 status --alsologtostderr: exit status 7 (139.902355ms)\n"} +{"Time":"2023-05-31T12:13:09.305068-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T12:13:09.305071-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:13:09.305073-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-839000\n"} +{"Time":"2023-05-31T12:13:09.305077-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T12:13:09.305079-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T12:13:09.305081-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T12:13:09.305083-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T12:13:09.305086-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T12:13:09.305089-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T12:13:09.305092-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-839000-m02\n"} +{"Time":"2023-05-31T12:13:09.305095-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T12:13:09.305097-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T12:13:09.305099-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T12:13:09.305101-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T12:13:09.305102-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T12:13:09.305109-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:13:09.305111-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:13:09.305114-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204047 7498 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:13:09.305117-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204232 7498 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:13:09.305119-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204237 7498 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:13:09.305121-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204241 7498 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:13:09.305123-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204361 7498 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:13:09.305125-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204554 7498 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:13:09.305128-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204585 7498 mustload.go:65] Loading cluster: multinode-839000\n"} +{"Time":"2023-05-31T12:13:09.305131-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204621 7498 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:13:09.305134-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204869 7498 config.go:182] Loaded profile config \"multinode-839000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:13:09.305138-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.204885 7498 status.go:255] checking status of multinode-839000 ...\n"} +{"Time":"2023-05-31T12:13:09.30514-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.205306 7498 cli_runner.go:164] Run: docker container inspect multinode-839000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:13:09.305142-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.254024 7498 status.go:330] multinode-839000 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T12:13:09.305145-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.254052 7498 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T12:13:09.305147-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.254064 7498 status.go:257] multinode-839000 status: \u0026{Name:multinode-839000 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:false TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T12:13:09.305149-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.254094 7498 status.go:255] checking status of multinode-839000-m02 ...\n"} +{"Time":"2023-05-31T12:13:09.305152-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.254362 7498 cli_runner.go:164] Run: docker container inspect multinode-839000-m02 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:13:09.305154-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.303357 7498 status.go:330] multinode-839000-m02 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T12:13:09.305156-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.303380 7498 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T12:13:09.305158-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 12:13:09.303386 7498 status.go:257] multinode-839000-m02 status: \u0026{Name:multinode-839000-m02 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:true TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T12:13:09.305161-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T12:13:09.305162-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:13:09.305167-07:00","Action":"run","Test":"TestMultiNode/serial/RestartMultiNode"} +{"Time":"2023-05-31T12:13:09.305175-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"=== RUN TestMultiNode/serial/RestartMultiNode\n"} +{"Time":"2023-05-31T12:13:09.305201-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:344: (dbg) Run: docker version -f {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:13:09.359763-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:354: (dbg) Run: out/minikube-darwin-amd64 start -p multinode-839000 --wait=true -v=8 --alsologtostderr --driver=docker \n"} +{"Time":"2023-05-31T12:13:54.745708-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"E0531 12:13:54.745643 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:14:29.094087-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:354: (dbg) Done: out/minikube-darwin-amd64 start -p multinode-839000 --wait=true -v=8 --alsologtostderr --driver=docker : (1m19.733752414s)\n"} +{"Time":"2023-05-31T12:14:29.094103-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:360: (dbg) Run: out/minikube-darwin-amd64 -p multinode-839000 status --alsologtostderr\n"} +{"Time":"2023-05-31T12:14:29.720886-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:374: (dbg) Run: kubectl get nodes\n"} +{"Time":"2023-05-31T12:14:29.798171-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:382: (dbg) Run: kubectl get nodes -o \"go-template='{{range .items}}{{range .status.conditions}}{{if eq .type \"Ready\"}} {{.status}}{{\"\\n\"}}{{end}}{{end}}{{end}}'\"\n"} +{"Time":"2023-05-31T12:14:29.84978-07:00","Action":"run","Test":"TestMultiNode/serial/ValidateNameConflict"} +{"Time":"2023-05-31T12:14:29.849793-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":"=== RUN TestMultiNode/serial/ValidateNameConflict\n"} +{"Time":"2023-05-31T12:14:29.849824-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:443: (dbg) Run: out/minikube-darwin-amd64 node list -p multinode-839000\n"} +{"Time":"2023-05-31T12:14:29.89205-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:452: (dbg) Run: out/minikube-darwin-amd64 start -p multinode-839000-m02 --driver=docker \n"} +{"Time":"2023-05-31T12:14:30.237304-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:452: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p multinode-839000-m02 --driver=docker : exit status 14 (345.052196ms)\n"} +{"Time":"2023-05-31T12:14:30.237325-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T12:14:30.237329-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:14:30.237332-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* [multinode-839000-m02] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:14:30.237335-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:14:30.237338-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:14:30.237341-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:14:30.237344-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:14:30.237347-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:14:30.237351-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:14:30.237354-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T12:14:30.237358-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T12:14:30.23736-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T12:14:30.237363-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:14:30.237366-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:14:30.237369-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t! Profile name 'multinode-839000-m02' is duplicated with machine name 'multinode-839000-m02' in profile 'multinode-839000'\n"} +{"Time":"2023-05-31T12:14:30.237372-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tX Exiting due to MK_USAGE: Profile name should be unique\n"} +{"Time":"2023-05-31T12:14:30.237374-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T12:14:30.237377-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:14:30.23738-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:460: (dbg) Run: out/minikube-darwin-amd64 start -p multinode-839000-m03 --driver=docker \n"} +{"Time":"2023-05-31T12:14:56.450568-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:460: (dbg) Done: out/minikube-darwin-amd64 start -p multinode-839000-m03 --driver=docker : (26.212990125s)\n"} +{"Time":"2023-05-31T12:14:56.450592-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:467: (dbg) Run: out/minikube-darwin-amd64 node add -p multinode-839000\n"} +{"Time":"2023-05-31T12:14:56.88957-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:467: (dbg) Non-zero exit: out/minikube-darwin-amd64 node add -p multinode-839000: exit status 80 (438.844547ms)\n"} +{"Time":"2023-05-31T12:14:56.889583-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T12:14:56.889586-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:14:56.889588-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Adding node m03 to cluster multinode-839000\n"} +{"Time":"2023-05-31T12:14:56.889591-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T12:14:56.889593-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T12:14:56.889595-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T12:14:56.889597-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:14:56.889599-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:14:56.889601-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tX Exiting due to GUEST_NODE_ADD: failed to add node: Node multinode-839000-m03 already exists in multinode-839000-m03 profile\n"} +{"Time":"2023-05-31T12:14:56.889612-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* \n"} +{"Time":"2023-05-31T12:14:56.889615-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:14:56.889618-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:14:56.88962-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:14:56.889622-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:14:56.889625-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:14:56.889627-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:14:56.889631-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T12:14:56.889633-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * - /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube_node_040ea7097fd6ed71e65be9a474587f81f0ccd21d_0.log │\n"} +{"Time":"2023-05-31T12:14:56.889635-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:14:56.889638-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:14:56.889648-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T12:14:56.889651-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:14:56.889654-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:472: (dbg) Run: out/minikube-darwin-amd64 delete -p multinode-839000-m03\n"} +{"Time":"2023-05-31T12:14:59.358503-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:472: (dbg) Done: out/minikube-darwin-amd64 delete -p multinode-839000-m03: (2.46883344s)\n"} +{"Time":"2023-05-31T12:14:59.35857-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:175: Cleaning up \"multinode-839000\" profile ...\n"} +{"Time":"2023-05-31T12:14:59.358595-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p multinode-839000\n"} +{"Time":"2023-05-31T12:15:03.883943-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p multinode-839000: (4.525236669s)\n"} +{"Time":"2023-05-31T12:15:03.883967-07:00","Action":"output","Test":"TestMultiNode","Output":"--- PASS: TestMultiNode (408.09s)\n"} +{"Time":"2023-05-31T12:15:03.883973-07:00","Action":"output","Test":"TestMultiNode/serial","Output":" --- PASS: TestMultiNode/serial (403.57s)\n"} +{"Time":"2023-05-31T12:15:03.883993-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" --- PASS: TestMultiNode/serial/FreshStart2Nodes (70.99s)\n"} +{"Time":"2023-05-31T12:15:03.883998-07:00","Action":"pass","Test":"TestMultiNode/serial/FreshStart2Nodes","Elapsed":70.99} +{"Time":"2023-05-31T12:15:03.884004-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" --- PASS: TestMultiNode/serial/DeployApp2Nodes (49.97s)\n"} +{"Time":"2023-05-31T12:15:03.884009-07:00","Action":"pass","Test":"TestMultiNode/serial/DeployApp2Nodes","Elapsed":49.97} +{"Time":"2023-05-31T12:15:03.884013-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" --- PASS: TestMultiNode/serial/PingHostFrom2Pods (0.84s)\n"} +{"Time":"2023-05-31T12:15:03.884017-07:00","Action":"pass","Test":"TestMultiNode/serial/PingHostFrom2Pods","Elapsed":0.84} +{"Time":"2023-05-31T12:15:03.884021-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" --- PASS: TestMultiNode/serial/AddNode (18.56s)\n"} +{"Time":"2023-05-31T12:15:03.884025-07:00","Action":"pass","Test":"TestMultiNode/serial/AddNode","Elapsed":18.56} +{"Time":"2023-05-31T12:15:03.884029-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" --- PASS: TestMultiNode/serial/ProfileList (0.39s)\n"} +{"Time":"2023-05-31T12:15:03.884033-07:00","Action":"pass","Test":"TestMultiNode/serial/ProfileList","Elapsed":0.39} +{"Time":"2023-05-31T12:15:03.884037-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" --- PASS: TestMultiNode/serial/CopyFile (13.01s)\n"} +{"Time":"2023-05-31T12:15:03.884041-07:00","Action":"pass","Test":"TestMultiNode/serial/CopyFile","Elapsed":13.01} +{"Time":"2023-05-31T12:15:03.884045-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" --- PASS: TestMultiNode/serial/StopNode (2.80s)\n"} +{"Time":"2023-05-31T12:15:03.88405-07:00","Action":"pass","Test":"TestMultiNode/serial/StopNode","Elapsed":2.8} +{"Time":"2023-05-31T12:15:03.884054-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" --- PASS: TestMultiNode/serial/StartAfterStop (13.05s)\n"} +{"Time":"2023-05-31T12:15:03.884069-07:00","Action":"pass","Test":"TestMultiNode/serial/StartAfterStop","Elapsed":13.05} +{"Time":"2023-05-31T12:15:03.884073-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" --- PASS: TestMultiNode/serial/RestartKeepsNodes (96.23s)\n"} +{"Time":"2023-05-31T12:15:03.884078-07:00","Action":"pass","Test":"TestMultiNode/serial/RestartKeepsNodes","Elapsed":96.23} +{"Time":"2023-05-31T12:15:03.884082-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" --- PASS: TestMultiNode/serial/DeleteNode (5.84s)\n"} +{"Time":"2023-05-31T12:15:03.884086-07:00","Action":"pass","Test":"TestMultiNode/serial/DeleteNode","Elapsed":5.84} +{"Time":"2023-05-31T12:15:03.88409-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" --- PASS: TestMultiNode/serial/StopMultiNode (21.84s)\n"} +{"Time":"2023-05-31T12:15:03.884095-07:00","Action":"pass","Test":"TestMultiNode/serial/StopMultiNode","Elapsed":21.84} +{"Time":"2023-05-31T12:15:03.884099-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" --- PASS: TestMultiNode/serial/RestartMultiNode (80.54s)\n"} +{"Time":"2023-05-31T12:15:03.884108-07:00","Action":"pass","Test":"TestMultiNode/serial/RestartMultiNode","Elapsed":80.54} +{"Time":"2023-05-31T12:15:03.884113-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" --- PASS: TestMultiNode/serial/ValidateNameConflict (29.51s)\n"} +{"Time":"2023-05-31T12:15:03.884119-07:00","Action":"pass","Test":"TestMultiNode/serial/ValidateNameConflict","Elapsed":29.51} +{"Time":"2023-05-31T12:15:03.884123-07:00","Action":"pass","Test":"TestMultiNode/serial","Elapsed":403.57} +{"Time":"2023-05-31T12:15:03.884126-07:00","Action":"pass","Test":"TestMultiNode","Elapsed":408.09} +{"Time":"2023-05-31T12:15:03.884129-07:00","Action":"run","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T12:15:03.884132-07:00","Action":"output","Test":"TestNetworkPlugins","Output":"=== RUN TestNetworkPlugins\n"} +{"Time":"2023-05-31T12:15:03.884135-07:00","Action":"output","Test":"TestNetworkPlugins","Output":"=== PAUSE TestNetworkPlugins\n"} +{"Time":"2023-05-31T12:15:03.884141-07:00","Action":"pause","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T12:15:03.884144-07:00","Action":"run","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T12:15:03.884147-07:00","Action":"output","Test":"TestNoKubernetes","Output":"=== RUN TestNoKubernetes\n"} +{"Time":"2023-05-31T12:15:03.884151-07:00","Action":"output","Test":"TestNoKubernetes","Output":"=== PAUSE TestNoKubernetes\n"} +{"Time":"2023-05-31T12:15:03.884154-07:00","Action":"pause","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T12:15:03.884158-07:00","Action":"run","Test":"TestPause"} +{"Time":"2023-05-31T12:15:03.884166-07:00","Action":"output","Test":"TestPause","Output":"=== RUN TestPause\n"} +{"Time":"2023-05-31T12:15:03.884171-07:00","Action":"output","Test":"TestPause","Output":"=== PAUSE TestPause\n"} +{"Time":"2023-05-31T12:15:03.884174-07:00","Action":"pause","Test":"TestPause"} +{"Time":"2023-05-31T12:15:03.884177-07:00","Action":"run","Test":"TestPreload"} +{"Time":"2023-05-31T12:15:03.884181-07:00","Action":"output","Test":"TestPreload","Output":"=== RUN TestPreload\n"} +{"Time":"2023-05-31T12:15:03.884236-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:44: (dbg) Run: out/minikube-darwin-amd64 start -p test-preload-149000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=docker --kubernetes-version=v1.24.4\n"} +{"Time":"2023-05-31T12:16:23.221897-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:44: (dbg) Done: out/minikube-darwin-amd64 start -p test-preload-149000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=docker --kubernetes-version=v1.24.4: (1m19.337080356s)\n"} +{"Time":"2023-05-31T12:16:23.221919-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:57: (dbg) Run: out/minikube-darwin-amd64 ssh -p test-preload-149000 -- docker pull gcr.io/k8s-minikube/busybox\n"} +{"Time":"2023-05-31T12:16:25.51942-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:57: (dbg) Done: out/minikube-darwin-amd64 ssh -p test-preload-149000 -- docker pull gcr.io/k8s-minikube/busybox: (2.297427082s)\n"} +{"Time":"2023-05-31T12:16:25.519435-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:63: (dbg) Run: out/minikube-darwin-amd64 stop -p test-preload-149000\n"} +{"Time":"2023-05-31T12:16:36.415404-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:63: (dbg) Done: out/minikube-darwin-amd64 stop -p test-preload-149000: (10.895801267s)\n"} +{"Time":"2023-05-31T12:16:36.415422-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:71: (dbg) Run: out/minikube-darwin-amd64 start -p test-preload-149000 --memory=2200 --alsologtostderr -v=1 --wait=true --driver=docker \n"} +{"Time":"2023-05-31T12:17:18.445369-07:00","Action":"output","Test":"TestPreload","Output":"E0531 12:17:18.445311 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:17:31.695247-07:00","Action":"output","Test":"TestPreload","Output":"E0531 12:17:31.695198 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:17:33.86328-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:71: (dbg) Done: out/minikube-darwin-amd64 start -p test-preload-149000 --memory=2200 --alsologtostderr -v=1 --wait=true --driver=docker : (57.44740299s)\n"} +{"Time":"2023-05-31T12:17:33.863303-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:80: (dbg) Run: out/minikube-darwin-amd64 ssh -p test-preload-149000 -- docker images\n"} +{"Time":"2023-05-31T12:17:34.233335-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:175: Cleaning up \"test-preload-149000\" profile ...\n"} +{"Time":"2023-05-31T12:17:34.233349-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p test-preload-149000\n"} +{"Time":"2023-05-31T12:17:36.816845-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p test-preload-149000: (2.5833715s)\n"} +{"Time":"2023-05-31T12:17:36.816863-07:00","Action":"output","Test":"TestPreload","Output":"--- PASS: TestPreload (152.93s)\n"} +{"Time":"2023-05-31T12:17:36.816887-07:00","Action":"pass","Test":"TestPreload","Elapsed":152.93} +{"Time":"2023-05-31T12:17:36.816893-07:00","Action":"run","Test":"TestScheduledStopWindows"} +{"Time":"2023-05-31T12:17:36.816903-07:00","Action":"output","Test":"TestScheduledStopWindows","Output":"=== RUN TestScheduledStopWindows\n"} +{"Time":"2023-05-31T12:17:36.816908-07:00","Action":"output","Test":"TestScheduledStopWindows","Output":" scheduled_stop_test.go:42: test only runs on windows\n"} +{"Time":"2023-05-31T12:17:36.816941-07:00","Action":"output","Test":"TestScheduledStopWindows","Output":"--- SKIP: TestScheduledStopWindows (0.00s)\n"} +{"Time":"2023-05-31T12:17:36.816966-07:00","Action":"skip","Test":"TestScheduledStopWindows","Elapsed":0} +{"Time":"2023-05-31T12:17:36.816969-07:00","Action":"run","Test":"TestScheduledStopUnix"} +{"Time":"2023-05-31T12:17:36.816972-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":"=== RUN TestScheduledStopUnix\n"} +{"Time":"2023-05-31T12:17:36.817033-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:128: (dbg) Run: out/minikube-darwin-amd64 start -p scheduled-stop-943000 --memory=2048 --driver=docker \n"} +{"Time":"2023-05-31T12:18:02.379968-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:128: (dbg) Done: out/minikube-darwin-amd64 start -p scheduled-stop-943000 --memory=2048 --driver=docker : (25.562696693s)\n"} +{"Time":"2023-05-31T12:18:02.379983-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:137: (dbg) Run: out/minikube-darwin-amd64 stop -p scheduled-stop-943000 --schedule 5m\n"} +{"Time":"2023-05-31T12:18:02.426232-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:191: (dbg) Run: out/minikube-darwin-amd64 status --format={{.TimeToStop}} -p scheduled-stop-943000 -n scheduled-stop-943000\n"} +{"Time":"2023-05-31T12:18:02.887659-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:169: signal error was: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:18:02.887674-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:137: (dbg) Run: out/minikube-darwin-amd64 stop -p scheduled-stop-943000 --schedule 15s\n"} +{"Time":"2023-05-31T12:18:02.930679-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:169: signal error was: os: process already finished\n"} +{"Time":"2023-05-31T12:18:03.027423-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:137: (dbg) Run: out/minikube-darwin-amd64 stop -p scheduled-stop-943000 --cancel-scheduled\n"} +{"Time":"2023-05-31T12:18:28.163264-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:176: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p scheduled-stop-943000 -n scheduled-stop-943000\n"} +{"Time":"2023-05-31T12:18:28.534206-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:205: (dbg) Run: out/minikube-darwin-amd64 status -p scheduled-stop-943000\n"} +{"Time":"2023-05-31T12:18:28.9078-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:137: (dbg) Run: out/minikube-darwin-amd64 stop -p scheduled-stop-943000 --schedule 15s\n"} +{"Time":"2023-05-31T12:18:43.953735-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:169: signal error was: os: process already finished\n"} +{"Time":"2023-05-31T12:19:13.955097-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:205: (dbg) Run: out/minikube-darwin-amd64 status -p scheduled-stop-943000\n"} +{"Time":"2023-05-31T12:19:14.047018-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:205: (dbg) Non-zero exit: out/minikube-darwin-amd64 status -p scheduled-stop-943000: exit status 7 (91.848905ms)\n"} +{"Time":"2023-05-31T12:19:14.047031-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T12:19:14.047034-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:19:14.047036-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tscheduled-stop-943000\n"} +{"Time":"2023-05-31T12:19:14.047038-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T12:19:14.04704-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T12:19:14.047042-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T12:19:14.047045-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T12:19:14.047047-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T12:19:14.047049-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T12:19:14.047055-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T12:19:14.047057-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:19:14.04706-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:176: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p scheduled-stop-943000 -n scheduled-stop-943000\n"} +{"Time":"2023-05-31T12:19:14.137272-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:176: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p scheduled-stop-943000 -n scheduled-stop-943000: exit status 7 (90.144768ms)\n"} +{"Time":"2023-05-31T12:19:14.137284-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T12:19:14.137287-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:19:14.137289-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:19:14.137291-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T12:19:14.137293-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:19:14.137295-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:176: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:19:14.137299-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:175: Cleaning up \"scheduled-stop-943000\" profile ...\n"} +{"Time":"2023-05-31T12:19:14.137312-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p scheduled-stop-943000\n"} +{"Time":"2023-05-31T12:19:16.355091-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p scheduled-stop-943000: (2.217635034s)\n"} +{"Time":"2023-05-31T12:19:16.355107-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":"--- PASS: TestScheduledStopUnix (99.54s)\n"} +{"Time":"2023-05-31T12:19:16.355113-07:00","Action":"pass","Test":"TestScheduledStopUnix","Elapsed":99.54} +{"Time":"2023-05-31T12:19:16.355117-07:00","Action":"run","Test":"TestSkaffold"} +{"Time":"2023-05-31T12:19:16.35512-07:00","Action":"output","Test":"TestSkaffold","Output":"=== RUN TestSkaffold\n"} +{"Time":"2023-05-31T12:19:19.647364-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:59: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/skaffold.exe124174378 version\n"} +{"Time":"2023-05-31T12:19:20.454973-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:63: skaffold version: v2.5.0\n"} +{"Time":"2023-05-31T12:19:20.454994-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:66: (dbg) Run: out/minikube-darwin-amd64 start -p skaffold-128000 --memory=2600 --driver=docker \n"} +{"Time":"2023-05-31T12:19:45.225724-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:66: (dbg) Done: out/minikube-darwin-amd64 start -p skaffold-128000 --memory=2600 --driver=docker : (24.770471295s)\n"} +{"Time":"2023-05-31T12:19:45.225778-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:86: copying out/minikube-darwin-amd64 to /Users/jenkins/workspace/out/minikube\n"} +{"Time":"2023-05-31T12:19:45.282314-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:105: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/skaffold.exe124174378 run --minikube-profile skaffold-128000 --kube-context skaffold-128000 --status-check=true --port-forward=false --interactive=false\n"} +{"Time":"2023-05-31T12:21:02.810613-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:105: (dbg) Done: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/skaffold.exe124174378 run --minikube-profile skaffold-128000 --kube-context skaffold-128000 --status-check=true --port-forward=false --interactive=false: (1m17.527713866s)\n"} +{"Time":"2023-05-31T12:21:02.81206-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:111: (dbg) TestSkaffold: waiting 1m0s for pods matching \"app=leeroy-app\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:21:02.820888-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:344: \"leeroy-app-b7cc55f7-s84cc\" [6a69db95-b7bc-4c57-9098-239002183d22] Running\n"} +{"Time":"2023-05-31T12:21:07.826359-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:111: (dbg) TestSkaffold: app=leeroy-app healthy within 5.014264211s\n"} +{"Time":"2023-05-31T12:21:07.82693-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:114: (dbg) TestSkaffold: waiting 1m0s for pods matching \"app=leeroy-web\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:21:07.829964-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:344: \"leeroy-web-5794db78df-m44rg\" [28a5b3d5-f736-4d09-930e-c250175358c7] Running\n"} +{"Time":"2023-05-31T12:21:12.83455-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:114: (dbg) TestSkaffold: app=leeroy-web healthy within 5.007559867s\n"} +{"Time":"2023-05-31T12:21:12.838191-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:175: Cleaning up \"skaffold-128000\" profile ...\n"} +{"Time":"2023-05-31T12:21:12.838204-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p skaffold-128000\n"} +{"Time":"2023-05-31T12:21:16.009769-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p skaffold-128000: (3.171447225s)\n"} +{"Time":"2023-05-31T12:21:16.009801-07:00","Action":"output","Test":"TestSkaffold","Output":"--- PASS: TestSkaffold (119.65s)\n"} +{"Time":"2023-05-31T12:21:16.009834-07:00","Action":"pass","Test":"TestSkaffold","Elapsed":119.65} +{"Time":"2023-05-31T12:21:16.009838-07:00","Action":"run","Test":"TestStartStop"} +{"Time":"2023-05-31T12:21:16.00984-07:00","Action":"output","Test":"TestStartStop","Output":"=== RUN TestStartStop\n"} +{"Time":"2023-05-31T12:21:16.00985-07:00","Action":"output","Test":"TestStartStop","Output":"=== PAUSE TestStartStop\n"} +{"Time":"2023-05-31T12:21:16.009852-07:00","Action":"pause","Test":"TestStartStop"} +{"Time":"2023-05-31T12:21:16.009855-07:00","Action":"run","Test":"TestInsufficientStorage"} +{"Time":"2023-05-31T12:21:16.009857-07:00","Action":"output","Test":"TestInsufficientStorage","Output":"=== RUN TestInsufficientStorage\n"} +{"Time":"2023-05-31T12:21:16.009925-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" status_test.go:50: (dbg) Run: out/minikube-darwin-amd64 start -p insufficient-storage-862000 --memory=2048 --output=json --wait=true --driver=docker \n"} +{"Time":"2023-05-31T12:21:26.81881-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" status_test.go:50: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p insufficient-storage-862000 --memory=2048 --output=json --wait=true --driver=docker : exit status 26 (10.808597251s)\n"} +{"Time":"2023-05-31T12:21:26.818831-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \n"} +{"Time":"2023-05-31T12:21:26.818839-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:21:26.818848-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"48273a27-7517-4810-98ab-edbece528e71\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"0\",\"message\":\"[insufficient-storage-862000] minikube v1.30.1 on Darwin 13.4\",\"name\":\"Initial Minikube Setup\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T12:21:26.818854-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"7c6907d7-eecd-4fba-bdbe-5bb200f4c70b\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_LOCATION=16569\"}}\n"} +{"Time":"2023-05-31T12:21:26.818859-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"618da512-1af4-41fe-a06f-6121be248a89\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\"}}\n"} +{"Time":"2023-05-31T12:21:26.818863-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"5ed0b3b5-b536-448d-afc6-e2887f5918bf\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_BIN=out/minikube-darwin-amd64\"}}\n"} +{"Time":"2023-05-31T12:21:26.818868-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"a626d825-f343-4500-8ef3-328183a7a99d\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\"}}\n"} +{"Time":"2023-05-31T12:21:26.818874-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"2f3c2d8e-8c35-465b-b830-2e5a02153584\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\"}}\n"} +{"Time":"2023-05-31T12:21:26.818892-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"5fd5120b-c4fc-4fae-a1e9-aaf444f91f76\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_FORCE_SYSTEMD=\"}}\n"} +{"Time":"2023-05-31T12:21:26.818902-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"5f2941e8-b8f1-41f3-8617-cad617317ea4\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_TEST_STORAGE_CAPACITY=100\"}}\n"} +{"Time":"2023-05-31T12:21:26.818907-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"294b4278-b864-4164-8b44-9b9790a0802c\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_TEST_AVAILABLE_STORAGE=19\"}}\n"} +{"Time":"2023-05-31T12:21:26.818911-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"cb9498c7-8a6c-4493-8fc6-06e8a2ae2107\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"1\",\"message\":\"Using the docker driver based on user configuration\",\"name\":\"Selecting Driver\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T12:21:26.818915-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"95a16873-1fbe-4e2c-8a94-a4ceb00a43ca\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"Using Docker Desktop driver with root privileges\"}}\n"} +{"Time":"2023-05-31T12:21:26.818919-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"64f78e0e-9f1b-47b8-bfda-841521ec6fc3\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"3\",\"message\":\"Starting control plane node insufficient-storage-862000 in cluster insufficient-storage-862000\",\"name\":\"Starting Node\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T12:21:26.818924-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"bac345ba-268f-4975-9cef-53a88bc52287\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"5\",\"message\":\"Pulling base image ...\",\"name\":\"Pulling Base Image\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T12:21:26.818928-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"69bb1242-8308-4909-b719-556e016492d6\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"8\",\"message\":\"Creating docker container (CPUs=2, Memory=2048MB) ...\",\"name\":\"Creating Container\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T12:21:26.818933-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"specversion\":\"1.0\",\"id\":\"f82af894-2696-4bba-bb71-65cad714a6b4\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.error\",\"datacontenttype\":\"application/json\",\"data\":{\"advice\":\"Try one or more of the following to free up space on the device:\\n\\t\\n\\t\\t\\t1. Run \\\"docker system prune\\\" to remove unused Docker data (optionally with \\\"-a\\\")\\n\\t\\t\\t2. Increase the storage allocated to Docker for Desktop by clicking on:\\n\\t\\t\\t\\tDocker icon \\u003e Preferences \\u003e Resources \\u003e Disk Image Size\\n\\t\\t\\t3. Run \\\"minikube ssh -- docker system prune\\\" if using the Docker container runtime\",\"exitcode\":\"26\",\"issues\":\"https://github.com/kubernetes/minikube/issues/9024\",\"message\":\"Docker is out of disk space! (/var is at 100%% of capacity). You can pass '--force' to skip this check.\",\"name\":\"RSRC_DOCKER_STORAGE\",\"url\":\"\"}}\n"} +{"Time":"2023-05-31T12:21:26.818939-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \n"} +{"Time":"2023-05-31T12:21:26.818943-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:21:26.818947-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" status_test.go:76: (dbg) Run: out/minikube-darwin-amd64 status -p insufficient-storage-862000 --output=json --layout=cluster\n"} +{"Time":"2023-05-31T12:21:27.165127-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" status_test.go:76: (dbg) Non-zero exit: out/minikube-darwin-amd64 status -p insufficient-storage-862000 --output=json --layout=cluster: exit status 7 (346.219548ms)\n"} +{"Time":"2023-05-31T12:21:27.16514-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \n"} +{"Time":"2023-05-31T12:21:27.165142-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:21:27.165146-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"Name\":\"insufficient-storage-862000\",\"StatusCode\":507,\"StatusName\":\"InsufficientStorage\",\"StatusDetail\":\"/var is almost out of disk space\",\"Step\":\"Creating Container\",\"StepDetail\":\"Creating docker container (CPUs=2, Memory=2048MB) ...\",\"BinaryVersion\":\"v1.30.1\",\"Components\":{\"kubeconfig\":{\"Name\":\"kubeconfig\",\"StatusCode\":500,\"StatusName\":\"Error\"}},\"Nodes\":[{\"Name\":\"insufficient-storage-862000\",\"StatusCode\":507,\"StatusName\":\"InsufficientStorage\",\"Components\":{\"apiserver\":{\"Name\":\"apiserver\",\"StatusCode\":405,\"StatusName\":\"Stopped\"},\"kubelet\":{\"Name\":\"kubelet\",\"StatusCode\":405,\"StatusName\":\"Stopped\"}}}]}\n"} +{"Time":"2023-05-31T12:21:27.165163-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \n"} +{"Time":"2023-05-31T12:21:27.165165-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:21:27.165167-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:21:27.165169-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \tE0531 12:21:27.152546 9027 status.go:415] kubeconfig endpoint: extract IP: \"insufficient-storage-862000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:21:27.165172-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \n"} +{"Time":"2023-05-31T12:21:27.165174-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:21:27.165423-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" status_test.go:76: (dbg) Run: out/minikube-darwin-amd64 status -p insufficient-storage-862000 --output=json --layout=cluster\n"} +{"Time":"2023-05-31T12:21:27.513971-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" status_test.go:76: (dbg) Non-zero exit: out/minikube-darwin-amd64 status -p insufficient-storage-862000 --output=json --layout=cluster: exit status 7 (348.443299ms)\n"} +{"Time":"2023-05-31T12:21:27.513987-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \n"} +{"Time":"2023-05-31T12:21:27.51399-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:21:27.513993-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \t{\"Name\":\"insufficient-storage-862000\",\"StatusCode\":507,\"StatusName\":\"InsufficientStorage\",\"StatusDetail\":\"/var is almost out of disk space\",\"BinaryVersion\":\"v1.30.1\",\"Components\":{\"kubeconfig\":{\"Name\":\"kubeconfig\",\"StatusCode\":500,\"StatusName\":\"Error\"}},\"Nodes\":[{\"Name\":\"insufficient-storage-862000\",\"StatusCode\":507,\"StatusName\":\"InsufficientStorage\",\"Components\":{\"apiserver\":{\"Name\":\"apiserver\",\"StatusCode\":405,\"StatusName\":\"Stopped\"},\"kubelet\":{\"Name\":\"kubelet\",\"StatusCode\":405,\"StatusName\":\"Stopped\"}}}]}\n"} +{"Time":"2023-05-31T12:21:27.513997-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \n"} +{"Time":"2023-05-31T12:21:27.513999-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:21:27.514007-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:21:27.514009-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \tE0531 12:21:27.501677 9037 status.go:415] kubeconfig endpoint: extract IP: \"insufficient-storage-862000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:21:27.514011-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \tE0531 12:21:27.512270 9037 status.go:559] unable to read event log: stat: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/insufficient-storage-862000/events.json: no such file or directory\n"} +{"Time":"2023-05-31T12:21:27.514014-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" \n"} +{"Time":"2023-05-31T12:21:27.514015-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:21:27.514053-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" helpers_test.go:175: Cleaning up \"insufficient-storage-862000\" profile ...\n"} +{"Time":"2023-05-31T12:21:27.514073-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p insufficient-storage-862000\n"} +{"Time":"2023-05-31T12:21:29.785005-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p insufficient-storage-862000: (2.270806683s)\n"} +{"Time":"2023-05-31T12:21:29.785023-07:00","Action":"output","Test":"TestInsufficientStorage","Output":"--- PASS: TestInsufficientStorage (13.78s)\n"} +{"Time":"2023-05-31T12:21:29.785029-07:00","Action":"pass","Test":"TestInsufficientStorage","Elapsed":13.78} +{"Time":"2023-05-31T12:21:29.785046-07:00","Action":"run","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T12:21:29.78505-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== RUN TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T12:21:29.785057-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== PAUSE TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T12:21:29.785061-07:00","Action":"pause","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T12:21:29.785065-07:00","Action":"run","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T12:21:29.785068-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== RUN TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T12:21:29.78508-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== PAUSE TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T12:21:29.785083-07:00","Action":"pause","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T12:21:29.785086-07:00","Action":"run","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T12:21:29.785088-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== RUN TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T12:21:29.785097-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== PAUSE TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T12:21:29.785099-07:00","Action":"pause","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T12:21:29.785106-07:00","Action":"run","Test":"TestMissingContainerUpgrade"} +{"Time":"2023-05-31T12:21:29.785113-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"=== RUN TestMissingContainerUpgrade\n"} +{"Time":"2023-05-31T12:21:29.785156-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"=== PAUSE TestMissingContainerUpgrade\n"} +{"Time":"2023-05-31T12:21:29.785163-07:00","Action":"pause","Test":"TestMissingContainerUpgrade"} +{"Time":"2023-05-31T12:21:29.785168-07:00","Action":"cont","Test":"TestOffline"} +{"Time":"2023-05-31T12:21:29.785171-07:00","Action":"output","Test":"TestOffline","Output":"=== CONT TestOffline\n"} +{"Time":"2023-05-31T12:21:29.785189-07:00","Action":"cont","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T12:21:29.785193-07:00","Action":"output","Test":"TestNetworkPlugins","Output":"=== CONT TestNetworkPlugins\n"} +{"Time":"2023-05-31T12:21:29.785242-07:00","Action":"run","Test":"TestNetworkPlugins/group"} +{"Time":"2023-05-31T12:21:29.785277-07:00","Action":"output","Test":"TestNetworkPlugins/group","Output":"=== RUN TestNetworkPlugins/group\n"} +{"Time":"2023-05-31T12:21:29.785287-07:00","Action":"output","Test":"TestOffline","Output":" aab_offline_test.go:55: (dbg) Run: out/minikube-darwin-amd64 start -p offline-docker-175000 --alsologtostderr -v=1 --memory=2048 --wait=true --driver=docker \n"} +{"Time":"2023-05-31T12:21:29.785305-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T12:21:29.785309-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== RUN TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T12:21:29.785316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== PAUSE TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T12:21:29.78532-07:00","Action":"pause","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T12:21:29.785324-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet"} +{"Time":"2023-05-31T12:21:29.785328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"=== RUN TestNetworkPlugins/group/kubenet\n"} +{"Time":"2023-05-31T12:21:29.785334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"=== PAUSE TestNetworkPlugins/group/kubenet\n"} +{"Time":"2023-05-31T12:21:29.785337-07:00","Action":"pause","Test":"TestNetworkPlugins/group/kubenet"} +{"Time":"2023-05-31T12:21:29.78534-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T12:21:29.785343-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== RUN TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T12:21:29.78535-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== PAUSE TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T12:21:29.785356-07:00","Action":"pause","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T12:21:29.785362-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T12:21:29.785366-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T12:21:29.785397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== PAUSE TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T12:21:29.785401-07:00","Action":"pause","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T12:21:29.785409-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T12:21:29.785413-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== RUN TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T12:21:29.785454-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== PAUSE TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T12:21:29.785468-07:00","Action":"pause","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T12:21:29.785474-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T12:21:29.785476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== RUN TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T12:21:29.785491-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== PAUSE TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T12:21:29.785496-07:00","Action":"pause","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T12:21:29.786307-07:00","Action":"run","Test":"TestNetworkPlugins/group/false"} +{"Time":"2023-05-31T12:21:29.786315-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"=== RUN TestNetworkPlugins/group/false\n"} +{"Time":"2023-05-31T12:21:29.786551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"=== PAUSE TestNetworkPlugins/group/false\n"} +{"Time":"2023-05-31T12:21:29.786562-07:00","Action":"pause","Test":"TestNetworkPlugins/group/false"} +{"Time":"2023-05-31T12:21:29.786606-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T12:21:29.786613-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== RUN TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T12:21:29.786668-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== PAUSE TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T12:21:29.786676-07:00","Action":"pause","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T12:21:29.786684-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T12:21:29.786687-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== RUN TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T12:21:29.786733-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== PAUSE TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T12:21:29.786749-07:00","Action":"pause","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T12:21:29.786754-07:00","Action":"run","Test":"TestNetworkPlugins/group/cilium"} +{"Time":"2023-05-31T12:21:29.786757-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":"=== RUN TestNetworkPlugins/group/cilium\n"} +{"Time":"2023-05-31T12:21:29.786806-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" net_test.go:101: Skipping the test as it's interfering with other tests and is outdated\n"} +{"Time":"2023-05-31T12:21:35.407679-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" panic.go:522: \n"} +{"Time":"2023-05-31T12:21:35.407713-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" ----------------------- debugLogs start: cilium-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:21:35.40772-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:21:35.407726-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407732-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407737-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407741-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:21:35.407746-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407751-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407755-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407759-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:21:35.407764-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407769-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407773-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407779-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:21:35.407784-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407789-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407794-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407798-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:21:35.407803-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407808-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407813-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407817-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:21:35.407822-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407826-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407831-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407842-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:21:35.407848-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407852-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407856-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407861-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:21:35.407865-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.40787-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407874-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407879-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:21:35.407906-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407911-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407915-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407922-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:21:35.407926-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.407958-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407969-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.407973-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:21:35.407978-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.407982-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408002-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408013-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408018-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:21:35.408027-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408032-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408036-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408047-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408052-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:21:35.408056-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.40806-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408065-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408068-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408072-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:21:35.408089-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.408093-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408097-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408101-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:21:35.408105-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.40811-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408155-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408162-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408166-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:21:35.408171-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.40818-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.40821-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408218-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408222-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:21:35.408238-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408248-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408253-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408257-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:21:35.408261-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408266-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408269-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408273-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:21:35.408278-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408283-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408321-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408329-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:21:35.408333-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408337-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.40834-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408344-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:21:35.408348-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408352-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408355-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408359-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:21:35.408362-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408366-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408369-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408372-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:21:35.408376-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408379-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408383-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408386-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:21:35.40839-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408438-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408453-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408458-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:21:35.408464-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408468-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408473-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408477-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408485-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:21:35.408489-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408493-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408501-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408505-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408508-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:21:35.408511-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408515-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408519-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408522-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408525-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:21:35.408585-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408593-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408598-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408601-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408605-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:21:35.408609-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408613-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408616-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408619-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408623-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium daemon set:\n"} +{"Time":"2023-05-31T12:21:35.408631-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.408635-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408638-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408642-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium daemon set pod(s):\n"} +{"Time":"2023-05-31T12:21:35.408645-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.408649-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408652-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408655-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium daemon set container(s) logs (current):\n"} +{"Time":"2023-05-31T12:21:35.408658-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408662-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408665-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408669-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium daemon set container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:21:35.408674-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408678-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408681-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408686-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium deployment:\n"} +{"Time":"2023-05-31T12:21:35.408691-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.408695-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408699-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408703-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium deployment pod(s):\n"} +{"Time":"2023-05-31T12:21:35.408707-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.408711-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408715-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408719-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium deployment container(s) logs (current):\n"} +{"Time":"2023-05-31T12:21:35.408731-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408735-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408748-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408754-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium deployment container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:21:35.408758-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408762-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408765-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408769-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:21:35.408775-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408782-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408786-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408802-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:21:35.408813-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408817-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408821-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408825-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:21:35.40883-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-996000\" does not exist\n"} +{"Time":"2023-05-31T12:21:35.408854-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408861-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408865-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:21:35.40887-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408874-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408878-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408882-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408925-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:21:35.408931-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408936-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.40894-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408944-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408947-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:21:35.408951-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408955-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.408959-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408962-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.408966-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:21:35.40897-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.408974-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409034-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409042-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409047-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:21:35.40907-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409096-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409101-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409111-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409115-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:21:35.40912-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:21:35.409124-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:21:35.409128-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:21:35.409132-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:21:35.409136-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:21:35.40914-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:21:35.409151-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" users: null\n"} +{"Time":"2023-05-31T12:21:35.409156-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.40916-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409164-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:21:35.409168-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.409173-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409192-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.4092-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:21:35.409206-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.40921-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409214-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409252-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409263-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:21:35.409271-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409277-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409281-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.4093-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409309-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:21:35.409315-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.40932-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409325-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409329-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409334-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:21:35.409338-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409343-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409348-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409352-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409356-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:21:35.409361-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409367-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409383-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409387-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409392-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:21:35.409396-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409401-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409405-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409413-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409418-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:21:35.409422-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409427-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409431-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409435-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.40944-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:21:35.409444-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409455-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409459-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409463-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409467-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:21:35.409472-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409476-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.40948-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409487-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409492-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:21:35.409496-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.4095-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409504-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409508-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.40952-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:21:35.40953-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409535-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409542-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409547-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409551-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:21:35.409555-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409559-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409563-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409567-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409571-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:21:35.409575-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409579-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409583-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409586-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.40959-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:21:35.409594-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409597-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409601-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409604-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409615-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:21:35.40962-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409624-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409627-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.40963-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409634-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:21:35.409638-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409644-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409648-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409651-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409653-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:21:35.409657-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.40966-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.409665-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409668-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409676-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:21:35.409711-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-996000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:21:35.409716-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-996000\"\n"} +{"Time":"2023-05-31T12:21:35.40972-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T12:21:35.409724-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" ----------------------- debugLogs end: cilium-996000 [took: 5.620387015s] --------------------------------\n"} +{"Time":"2023-05-31T12:21:35.409751-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" helpers_test.go:175: Cleaning up \"cilium-996000\" profile ...\n"} +{"Time":"2023-05-31T12:21:35.409756-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p cilium-996000\n"} +{"Time":"2023-05-31T12:21:35.863897-07:00","Action":"cont","Test":"TestHyperkitDriverSkipUpgrade"} +{"Time":"2023-05-31T12:21:35.86391-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"=== CONT TestHyperkitDriverSkipUpgrade\n"} +{"Time":"2023-05-31T12:21:35.864042-07:00","Action":"run","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current"} +{"Time":"2023-05-31T12:21:35.864067-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"=== RUN TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current\n"} +{"Time":"2023-05-31T12:21:38.591917-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"* minikube v1.30.1 on darwin\n"} +{"Time":"2023-05-31T12:21:38.658065-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:21:38.703029-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:21:38.746055-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:21:38.787949-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:21:38.831-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:21:38.873241-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_HOME=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.11.0-to-current1500520827/001\n"} +{"Time":"2023-05-31T12:21:38.918125-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"* Using the hyperkit driver based on user configuration\n"} +{"Time":"2023-05-31T12:21:39.151638-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"* The 'hyperkit' driver requires elevated permissions. The following commands will be executed:\n"} +{"Time":"2023-05-31T12:21:39.15166-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"\n"} +{"Time":"2023-05-31T12:21:39.15167-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" $ sudo chown root:wheel /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.11.0-to-current1500520827/001/.minikube/bin/docker-machine-driver-hyperkit \n"} +{"Time":"2023-05-31T12:21:39.151676-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" $ sudo chmod u+s /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.11.0-to-current1500520827/001/.minikube/bin/docker-machine-driver-hyperkit \n"} +{"Time":"2023-05-31T12:21:39.151681-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"\n"} +{"Time":"2023-05-31T12:21:39.151684-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"\n"} +{"Time":"2023-05-31T12:21:39.170687-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"! Unable to update hyperkit driver: [sudo chown root:wheel /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.11.0-to-current1500520827/001/.minikube/bin/docker-machine-driver-hyperkit] requires a password, and --interactive=false\n"} +{"Time":"2023-05-31T12:21:39.190027-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"* Downloading VM boot image ...\n"} +{"Time":"2023-05-31T12:21:51.246539-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"* Starting control plane node minikube in cluster minikube\n"} +{"Time":"2023-05-31T12:21:51.312904-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"* Download complete!\n"} +{"Time":"2023-05-31T12:21:51.514917-07:00","Action":"run","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current"} +{"Time":"2023-05-31T12:21:51.51493-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"=== RUN TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current\n"} +{"Time":"2023-05-31T12:21:54.217478-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* minikube v1.30.1 on darwin\n"} +{"Time":"2023-05-31T12:21:54.281389-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:21:54.302462-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:21:54.344456-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:21:54.402452-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:21:54.513548-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:21:54.587458-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_HOME=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.2.0-to-current3454223224/001\n"} +{"Time":"2023-05-31T12:21:54.62979-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* Using the hyperkit driver based on user configuration\n"} +{"Time":"2023-05-31T12:21:55.063584-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* Downloading driver docker-machine-driver-hyperkit:\n"} +{"Time":"2023-05-31T12:21:57.503568-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* The 'hyperkit' driver requires elevated permissions. The following commands will be executed:\n"} +{"Time":"2023-05-31T12:21:57.50358-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"\n"} +{"Time":"2023-05-31T12:21:57.503583-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" $ sudo chown root:wheel /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.2.0-to-current3454223224/001/.minikube/bin/docker-machine-driver-hyperkit \n"} +{"Time":"2023-05-31T12:21:57.503586-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" $ sudo chmod u+s /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.2.0-to-current3454223224/001/.minikube/bin/docker-machine-driver-hyperkit \n"} +{"Time":"2023-05-31T12:21:57.503594-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"\n"} +{"Time":"2023-05-31T12:21:57.503596-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"\n"} +{"Time":"2023-05-31T12:21:57.534552-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"! Unable to update hyperkit driver: [sudo chown root:wheel /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.2.0-to-current3454223224/001/.minikube/bin/docker-machine-driver-hyperkit] requires a password, and --interactive=false\n"} +{"Time":"2023-05-31T12:21:57.597281-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* Downloading VM boot image ...\n"} +{"Time":"2023-05-31T12:22:05.603069-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* Starting control plane node minikube in cluster minikube\n"} +{"Time":"2023-05-31T12:22:05.667963-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* Download complete!\n"} +{"Time":"2023-05-31T12:22:05.994713-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"--- PASS: TestHyperkitDriverSkipUpgrade (30.13s)\n"} +{"Time":"2023-05-31T12:22:05.994728-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" --- PASS: TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current (15.65s)\n"} +{"Time":"2023-05-31T12:22:05.994732-07:00","Action":"pass","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Elapsed":15.65} +{"Time":"2023-05-31T12:22:05.994735-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" --- PASS: TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current (14.48s)\n"} +{"Time":"2023-05-31T12:22:05.994738-07:00","Action":"pass","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Elapsed":14.48} +{"Time":"2023-05-31T12:22:05.994739-07:00","Action":"pass","Test":"TestHyperkitDriverSkipUpgrade","Elapsed":30.13} +{"Time":"2023-05-31T12:22:05.994741-07:00","Action":"cont","Test":"TestHyperKitDriverInstallOrUpdate"} +{"Time":"2023-05-31T12:22:05.994743-07:00","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"=== CONT TestHyperKitDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T12:22:12.946719-07:00","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"--- PASS: TestHyperKitDriverInstallOrUpdate (6.95s)\n"} +{"Time":"2023-05-31T12:22:12.946732-07:00","Action":"pass","Test":"TestHyperKitDriverInstallOrUpdate","Elapsed":6.95} +{"Time":"2023-05-31T12:22:12.946736-07:00","Action":"cont","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T12:22:12.946742-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"=== CONT TestForceSystemdEnv\n"} +{"Time":"2023-05-31T12:22:12.946779-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:149: (dbg) Run: out/minikube-darwin-amd64 start -p force-systemd-env-713000 --memory=2048 --alsologtostderr -v=5 --driver=docker \n"} +{"Time":"2023-05-31T12:22:18.445688-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"E0531 12:22:18.445651 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:22:31.6964-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"E0531 12:22:31.696344 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:22:38.952746-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:149: (dbg) Done: out/minikube-darwin-amd64 start -p force-systemd-env-713000 --memory=2048 --alsologtostderr -v=5 --driver=docker : (26.005720566s)\n"} +{"Time":"2023-05-31T12:22:38.952762-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:104: (dbg) Run: out/minikube-darwin-amd64 -p force-systemd-env-713000 ssh \"docker info --format {{.CgroupDriver}}\"\n"} +{"Time":"2023-05-31T12:22:39.352926-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:175: Cleaning up \"force-systemd-env-713000\" profile ...\n"} +{"Time":"2023-05-31T12:22:39.35294-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p force-systemd-env-713000\n"} +{"Time":"2023-05-31T12:22:41.840773-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p force-systemd-env-713000: (2.487711993s)\n"} +{"Time":"2023-05-31T12:22:41.840793-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"--- PASS: TestForceSystemdEnv (28.89s)\n"} +{"Time":"2023-05-31T12:22:41.840804-07:00","Action":"pass","Test":"TestForceSystemdEnv","Elapsed":28.89} +{"Time":"2023-05-31T12:22:41.840809-07:00","Action":"cont","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T12:22:41.840812-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"=== CONT TestForceSystemdFlag\n"} +{"Time":"2023-05-31T12:22:41.84089-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:85: (dbg) Run: out/minikube-darwin-amd64 start -p force-systemd-flag-789000 --memory=2048 --force-systemd --alsologtostderr -v=5 --driver=docker \n"} +{"Time":"2023-05-31T12:22:49.184151-07:00","Action":"output","Test":"TestOffline","Output":" aab_offline_test.go:55: (dbg) Done: out/minikube-darwin-amd64 start -p offline-docker-175000 --alsologtostderr -v=1 --memory=2048 --wait=true --driver=docker : (1m19.398273714s)\n"} +{"Time":"2023-05-31T12:22:49.184173-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:175: Cleaning up \"offline-docker-175000\" profile ...\n"} +{"Time":"2023-05-31T12:22:49.184208-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p offline-docker-175000\n"} +{"Time":"2023-05-31T12:22:51.847483-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p offline-docker-175000: (2.663213848s)\n"} +{"Time":"2023-05-31T12:22:51.847499-07:00","Action":"output","Test":"TestOffline","Output":"--- PASS: TestOffline (82.06s)\n"} +{"Time":"2023-05-31T12:22:51.847503-07:00","Action":"pass","Test":"TestOffline","Elapsed":82.06} +{"Time":"2023-05-31T12:22:51.847507-07:00","Action":"cont","Test":"TestDockerFlags"} +{"Time":"2023-05-31T12:22:51.847508-07:00","Action":"output","Test":"TestDockerFlags","Output":"=== CONT TestDockerFlags\n"} +{"Time":"2023-05-31T12:22:51.847576-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:45: (dbg) Run: out/minikube-darwin-amd64 start -p docker-flags-508000 --cache-images=false --memory=2048 --install-addons=false --wait=false --docker-env=FOO=BAR --docker-env=BAZ=BAT --docker-opt=debug --docker-opt=icc=true --alsologtostderr -v=5 --driver=docker \n"} +{"Time":"2023-05-31T12:23:09.837526-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:85: (dbg) Done: out/minikube-darwin-amd64 start -p force-systemd-flag-789000 --memory=2048 --force-systemd --alsologtostderr -v=5 --driver=docker : (27.994178969s)\n"} +{"Time":"2023-05-31T12:23:09.837544-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:104: (dbg) Run: out/minikube-darwin-amd64 -p force-systemd-flag-789000 ssh \"docker info --format {{.CgroupDriver}}\"\n"} +{"Time":"2023-05-31T12:23:10.26611-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:175: Cleaning up \"force-systemd-flag-789000\" profile ...\n"} +{"Time":"2023-05-31T12:23:10.266123-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p force-systemd-flag-789000\n"} +{"Time":"2023-05-31T12:23:12.914567-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p force-systemd-flag-789000: (2.647451548s)\n"} +{"Time":"2023-05-31T12:23:12.914591-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"--- PASS: TestForceSystemdFlag (31.07s)\n"} +{"Time":"2023-05-31T12:23:12.914597-07:00","Action":"pass","Test":"TestForceSystemdFlag","Elapsed":31.07} +{"Time":"2023-05-31T12:23:12.914602-07:00","Action":"cont","Test":"TestCertExpiration"} +{"Time":"2023-05-31T12:23:12.914604-07:00","Action":"output","Test":"TestCertExpiration","Output":"=== CONT TestCertExpiration\n"} +{"Time":"2023-05-31T12:23:12.914705-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:123: (dbg) Run: out/minikube-darwin-amd64 start -p cert-expiration-604000 --memory=2048 --cert-expiration=3m --driver=docker \n"} +{"Time":"2023-05-31T12:23:18.537674-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:45: (dbg) Done: out/minikube-darwin-amd64 start -p docker-flags-508000 --cache-images=false --memory=2048 --install-addons=false --wait=false --docker-env=FOO=BAR --docker-env=BAZ=BAT --docker-opt=debug --docker-opt=icc=true --alsologtostderr -v=5 --driver=docker : (26.685071783s)\n"} +{"Time":"2023-05-31T12:23:18.537689-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:50: (dbg) Run: out/minikube-darwin-amd64 -p docker-flags-508000 ssh \"sudo systemctl show docker --property=Environment --no-pager\"\n"} +{"Time":"2023-05-31T12:23:18.975434-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:61: (dbg) Run: out/minikube-darwin-amd64 -p docker-flags-508000 ssh \"sudo systemctl show docker --property=ExecStart --no-pager\"\n"} +{"Time":"2023-05-31T12:23:19.407336-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:175: Cleaning up \"docker-flags-508000\" profile ...\n"} +{"Time":"2023-05-31T12:23:19.407374-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p docker-flags-508000\n"} +{"Time":"2023-05-31T12:23:22.22708-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p docker-flags-508000: (2.819110812s)\n"} +{"Time":"2023-05-31T12:23:22.227097-07:00","Action":"output","Test":"TestDockerFlags","Output":"--- PASS: TestDockerFlags (30.37s)\n"} +{"Time":"2023-05-31T12:23:22.227107-07:00","Action":"pass","Test":"TestDockerFlags","Elapsed":30.37} +{"Time":"2023-05-31T12:23:22.227113-07:00","Action":"cont","Test":"TestCertOptions"} +{"Time":"2023-05-31T12:23:22.227115-07:00","Action":"output","Test":"TestCertOptions","Output":"=== CONT TestCertOptions\n"} +{"Time":"2023-05-31T12:23:22.227172-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:49: (dbg) Run: out/minikube-darwin-amd64 start -p cert-options-100000 --memory=2048 --apiserver-ips=127.0.0.1 --apiserver-ips=192.168.15.15 --apiserver-names=localhost --apiserver-names=www.google.com --apiserver-port=8555 --driver=docker --apiserver-name=localhost\n"} +{"Time":"2023-05-31T12:23:41.263448-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:123: (dbg) Done: out/minikube-darwin-amd64 start -p cert-expiration-604000 --memory=2048 --cert-expiration=3m --driver=docker : (28.344326689s)\n"} +{"Time":"2023-05-31T12:23:49.889278-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:49: (dbg) Done: out/minikube-darwin-amd64 start -p cert-options-100000 --memory=2048 --apiserver-ips=127.0.0.1 --apiserver-ips=192.168.15.15 --apiserver-names=localhost --apiserver-names=www.google.com --apiserver-port=8555 --driver=docker --apiserver-name=localhost: (27.659589478s)\n"} +{"Time":"2023-05-31T12:23:49.889303-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:60: (dbg) Run: out/minikube-darwin-amd64 -p cert-options-100000 ssh \"openssl x509 -text -noout -in /var/lib/minikube/certs/apiserver.crt\"\n"} +{"Time":"2023-05-31T12:23:50.300164-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:100: (dbg) Run: out/minikube-darwin-amd64 ssh -p cert-options-100000 -- \"sudo cat /etc/kubernetes/admin.conf\"\n"} +{"Time":"2023-05-31T12:23:50.663389-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:175: Cleaning up \"cert-options-100000\" profile ...\n"} +{"Time":"2023-05-31T12:23:50.663404-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p cert-options-100000\n"} +{"Time":"2023-05-31T12:23:53.265656-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p cert-options-100000: (2.602072318s)\n"} +{"Time":"2023-05-31T12:23:53.265679-07:00","Action":"output","Test":"TestCertOptions","Output":"--- PASS: TestCertOptions (31.04s)\n"} +{"Time":"2023-05-31T12:23:53.265686-07:00","Action":"pass","Test":"TestCertOptions","Elapsed":31.04} +{"Time":"2023-05-31T12:23:53.26569-07:00","Action":"cont","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T12:23:53.265693-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== CONT TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T12:23:56.650671-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:132: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1450733986.exe start -p running-upgrade-692000 --memory=2200 --vm-driver=docker \n"} +{"Time":"2023-05-31T12:25:00.571808-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:132: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1450733986.exe start -p running-upgrade-692000 --memory=2200 --vm-driver=docker : exit status 70 (1m3.919800643s)\n"} +{"Time":"2023-05-31T12:25:00.571823-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:00.571826-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:25:00.571829-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t! [running-upgrade-692000] minikube v1.9.0 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:25:00.571831-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:25:00.571834-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:25:00.571836-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:25:00.571842-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:25:00.571845-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:25:00.571847-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - KUBECONFIG=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/legacy_kubeconfig2161414251\n"} +{"Time":"2023-05-31T12:25:00.571849-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T12:25:00.571853-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:25:00.571855-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Downloading Kubernetes v1.18.0 preload ...\n"} +{"Time":"2023-05-31T12:25:00.571857-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Creating Kubernetes in docker container with (CPUs=2) (6 available), Memory=2200MB (5943MB available) ...\n"} +{"Time":"2023-05-31T12:25:00.571859-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t! StartHost failed, but will try again: creating host: create: provisioning: ssh command error:\n"} +{"Time":"2023-05-31T12:25:00.571863-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tcommand : sudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:25:00.571866-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \terr : Process exited with status 1\n"} +{"Time":"2023-05-31T12:25:00.571868-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \toutput : --- /lib/systemd/system/docker.service\t2019-08-29 04:42:14.000000000 +0000\n"} +{"Time":"2023-05-31T12:25:00.57187-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:24:39.398547700 +0000\n"} +{"Time":"2023-05-31T12:25:00.571872-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t@@ -8,24 +8,22 @@\n"} +{"Time":"2023-05-31T12:25:00.571875-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.571877-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:25:00.571879-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:25:00.571881-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:25:00.571884-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:25:00.571898-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:25:00.5719-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:25:00.571903-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:25:00.571906-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-TimeoutSec=0\n"} +{"Time":"2023-05-31T12:25:00.571909-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:25:00.571911-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:25:00.571913-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:25:00.571915-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:25:00.571917-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:25:00.571919-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:25:00.571925-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:25:00.571927-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:25:00.571929-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:25:00.571931-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:25:00.571933-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:25:00.571936-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:25:00.57194-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.571943-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.571945-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.571947-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:25:00.571949-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:25:00.571952-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:25:00.571954-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:25:00.571956-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:25:00.571959-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:25:00.571961-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:25:00.571963-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.571966-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:25:00.571968-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:25:00.57197-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:25:00.571972-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:25:00.571975-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecReload=/bin/kill -s HUP \n"} +{"Time":"2023-05-31T12:25:00.571977-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.571979-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:25:00.571981-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:25:00.571983-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t@@ -33,9 +31,10 @@\n"} +{"Time":"2023-05-31T12:25:00.571985-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:25:00.571988-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:25:00.57199-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.571994-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:25:00.571997-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:25:00.571999-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:25:00.572002-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:25:00.572004-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:25:00.572006-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:25:00.572008-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.57201-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:25:00.572012-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:25:00.572014-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:25:00.572016-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:25:00.57202-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:25:00.572022-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Deleting \"running-upgrade-692000\" in docker ...\n"} +{"Time":"2023-05-31T12:25:00.572024-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Creating Kubernetes in docker container with (CPUs=2) (6 available), Memory=2200MB (5943MB available) ...\n"} +{"Time":"2023-05-31T12:25:00.572027-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* StartHost failed again: creating host: create: provisioning: ssh command error:\n"} +{"Time":"2023-05-31T12:25:00.572029-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tcommand : sudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:25:00.572032-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \terr : Process exited with status 1\n"} +{"Time":"2023-05-31T12:25:00.572034-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \toutput : --- /lib/systemd/system/docker.service\t2019-08-29 04:42:14.000000000 +0000\n"} +{"Time":"2023-05-31T12:25:00.572036-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:24:58.162074052 +0000\n"} +{"Time":"2023-05-31T12:25:00.572038-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t@@ -8,24 +8,22 @@\n"} +{"Time":"2023-05-31T12:25:00.57204-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.572042-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:25:00.572044-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:25:00.572047-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:25:00.572052-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:25:00.572054-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:25:00.572056-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:25:00.572059-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:25:00.572064-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-TimeoutSec=0\n"} +{"Time":"2023-05-31T12:25:00.572069-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:25:00.572074-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:25:00.572077-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:25:00.572079-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:25:00.572081-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:25:00.572083-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:25:00.572086-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:25:00.572088-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:25:00.57209-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:25:00.572092-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:25:00.572094-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:25:00.572096-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:25:00.572098-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.5721-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.572102-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.572104-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:25:00.57211-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:25:00.572113-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:25:00.572115-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:25:00.572118-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:25:00.57212-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:25:00.572122-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:25:00.572125-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.572127-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:25:00.572129-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:25:00.572131-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:25:00.572133-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:25:00.572138-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecReload=/bin/kill -s HUP \n"} +{"Time":"2023-05-31T12:25:00.57214-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.572142-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:25:00.572145-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:25:00.572147-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t@@ -33,9 +31,10 @@\n"} +{"Time":"2023-05-31T12:25:00.572149-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:25:00.572151-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:25:00.572153-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.572156-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:25:00.572158-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:25:00.57216-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:25:00.572163-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:25:00.572165-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:25:00.572167-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:25:00.57217-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.572172-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:25:00.572174-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:25:00.572176-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:25:00.572178-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:25:00.57218-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:25:00.572182-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - Run: \"minikube delete -p running-upgrade-692000\", then \"minikube start -p running-upgrade-692000 --alsologtostderr -v=1\" to try again with more logging\n"} +{"Time":"2023-05-31T12:25:00.572185-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:00.572187-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:25:00.572191-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:25:00.572193-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* minikube 1.30.1 is available! Download it: https://github.com/kubernetes/minikube/releases/tag/v1.30.1\n"} +{"Time":"2023-05-31T12:25:00.572195-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* To disable this notice, run: 'minikube config set WantUpdateNotification false'\n"} +{"Time":"2023-05-31T12:25:00.572197-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:25:00.572203-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 706.92 KiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 6.78 MiB / \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 9.62 MiB / \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 13.22 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 17.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 19.87 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 24.88 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 29.16 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 35.51 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 43.01 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 51.11 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 58.09 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4"} +{"Time":"2023-05-31T12:25:00.572211-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":": 65.53 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 73.43 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 80.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 86.81 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 93.97 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 100.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 104.08 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 111.97 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 118.42 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 127.27 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 131.92 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 141.69 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 147.95 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar."} +{"Time":"2023-05-31T12:25:00.572215-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"lz4: 153.41 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 161.59 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 169.33 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 175.39 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 184.06 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 192.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 199.17 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 205.06 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 209.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 216.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 224.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 229.55 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 236.58 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.t"} +{"Time":"2023-05-31T12:25:00.572218-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"ar.lz4: 240.78 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 248.16 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 256.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 256.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 264.59 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 272.92 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 281.05 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 289.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 296.17 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 301.37 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 310.84 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 319.45 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 327.97 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd6"} +{"Time":"2023-05-31T12:25:00.572225-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"4.tar.lz4: 335.50 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 338.80 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 345.33 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 352.92 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 361.53 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 368.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 377.67 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 390.41 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 399.37 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 407.98 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 413.09 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 420.44 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 428.55 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-a"} +{"Time":"2023-05-31T12:25:00.572229-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"md64.tar.lz4: 440.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 448.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 456.12 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 465.81 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 472.27 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 481.56 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 489.17 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 498.14 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 508.16 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 515.56 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 524.84 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 537.20 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 542.91 MiB* \n"} +{"Time":"2023-05-31T12:25:00.572234-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tX Unable to start VM after repeated tries. Please try {{'minikube delete' if possible: creating host: create: provisioning: ssh command error:\n"} +{"Time":"2023-05-31T12:25:00.572236-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tcommand : sudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:25:00.572239-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \terr : Process exited with status 1\n"} +{"Time":"2023-05-31T12:25:00.572241-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \toutput : --- /lib/systemd/system/docker.service\t2019-08-29 04:42:14.000000000 +0000\n"} +{"Time":"2023-05-31T12:25:00.572243-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:24:58.162074052 +0000\n"} +{"Time":"2023-05-31T12:25:00.572245-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t@@ -8,24 +8,22 @@\n"} +{"Time":"2023-05-31T12:25:00.572248-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.57225-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:25:00.572252-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:25:00.572254-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:25:00.572259-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:25:00.572261-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:25:00.572263-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:25:00.572265-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:25:00.572268-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-TimeoutSec=0\n"} +{"Time":"2023-05-31T12:25:00.57227-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:25:00.572272-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:25:00.572274-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:25:00.572276-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:25:00.572279-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:25:00.572281-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:25:00.572283-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:25:00.572285-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:25:00.572287-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:25:00.572289-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:25:00.572293-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:25:00.572295-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:25:00.572297-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.572299-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.572301-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.572304-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:25:00.572306-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:25:00.572309-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:25:00.572311-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:25:00.572313-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:25:00.572315-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:25:00.572318-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:25:00.57232-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:25:00.572322-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:25:00.572324-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:25:00.572326-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:25:00.572331-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:25:00.572335-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+ExecReload=/bin/kill -s HUP \n"} +{"Time":"2023-05-31T12:25:00.572337-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.572339-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:25:00.572341-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:25:00.572343-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t@@ -33,9 +31,10 @@\n"} +{"Time":"2023-05-31T12:25:00.572346-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:25:00.572348-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:25:00.57235-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.572352-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:25:00.572354-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:25:00.572359-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:25:00.572361-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:25:00.572363-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:25:00.572365-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:25:00.572367-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:25:00.57237-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:25:00.572372-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:25:00.572374-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:25:00.572376-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:25:00.572378-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:25:00.572381-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:25:00.572383-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* minikube is exiting due to an error. If the above message is not useful, open an issue:\n"} +{"Time":"2023-05-31T12:25:00.572385-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - https://github.com/kubernetes/minikube/issues/new/choose\n"} +{"Time":"2023-05-31T12:25:00.572387-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:00.57239-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:25:01.830136-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:132: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1450733986.exe start -p running-upgrade-692000 --memory=2200 --vm-driver=docker \n"} +{"Time":"2023-05-31T12:25:05.962706-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:132: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1450733986.exe start -p running-upgrade-692000 --memory=2200 --vm-driver=docker : exit status 70 (4.132417751s)\n"} +{"Time":"2023-05-31T12:25:05.962725-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:05.962729-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:25:05.962735-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* [running-upgrade-692000] minikube v1.9.0 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:25:05.962738-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:25:05.96274-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:25:05.962745-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:25:05.962748-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:25:05.962751-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:25:05.962755-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - KUBECONFIG=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/legacy_kubeconfig3566671383\n"} +{"Time":"2023-05-31T12:25:05.962758-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:25:05.962761-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:25:05.962765-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Updating the running docker \"running-upgrade-692000\" container ...\n"} +{"Time":"2023-05-31T12:25:05.962768-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:05.962771-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:25:05.962774-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:25:05.962777-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:25:05.962789-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tX Failed to enable container runtime: enable docker.: sudo systemctl start docker: exit status 1\n"} +{"Time":"2023-05-31T12:25:05.962792-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:25:05.962795-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:25:05.962798-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:25:05.962801-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:25:05.962806-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:25:05.962808-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:25:05.962811-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:25:05.962813-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* minikube is exiting due to an error. If the above message is not useful, open an issue:\n"} +{"Time":"2023-05-31T12:25:05.962815-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - https://github.com/kubernetes/minikube/issues/new/choose\n"} +{"Time":"2023-05-31T12:25:05.962817-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:05.962819-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:25:07.238347-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:132: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1450733986.exe start -p running-upgrade-692000 --memory=2200 --vm-driver=docker \n"} +{"Time":"2023-05-31T12:25:11.443909-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:132: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1450733986.exe start -p running-upgrade-692000 --memory=2200 --vm-driver=docker : exit status 70 (4.205416035s)\n"} +{"Time":"2023-05-31T12:25:11.443922-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:11.443925-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:25:11.443927-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* [running-upgrade-692000] minikube v1.9.0 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:25:11.44393-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:25:11.443932-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:25:11.443934-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:25:11.443936-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:25:11.443938-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:25:11.44395-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - KUBECONFIG=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/legacy_kubeconfig2418527011\n"} +{"Time":"2023-05-31T12:25:11.443952-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:25:11.443955-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:25:11.443958-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Updating the running docker \"running-upgrade-692000\" container ...\n"} +{"Time":"2023-05-31T12:25:11.443962-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:11.443964-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:25:11.443966-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:25:11.443969-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:25:11.443971-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tX Failed to enable container runtime: enable docker.: sudo systemctl start docker: exit status 1\n"} +{"Time":"2023-05-31T12:25:11.443973-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:25:11.443975-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:25:11.443977-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:25:11.443979-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:25:11.443981-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:25:11.443983-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:25:11.443984-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:25:11.443986-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* minikube is exiting due to an error. If the above message is not useful, open an issue:\n"} +{"Time":"2023-05-31T12:25:11.44399-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t - https://github.com/kubernetes/minikube/issues/new/choose\n"} +{"Time":"2023-05-31T12:25:11.443992-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:11.443994-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:25:11.444022-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:138: legacy v1.9.0 start failed: exit status 70\n"} +{"Time":"2023-05-31T12:25:11.445891-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" panic.go:522: *** TestRunningBinaryUpgrade FAILED at 2023-05-31 12:25:11.445833 -0700 PDT m=+2532.551940407\n"} +{"Time":"2023-05-31T12:25:11.445915-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:25:11.445918-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:230: ======\u003e post-mortem[TestRunningBinaryUpgrade]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:25:11.445987-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:231: (dbg) Run: docker inspect running-upgrade-692000\n"} +{"Time":"2023-05-31T12:25:11.496175-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:235: (dbg) docker inspect running-upgrade-692000:\n"} +{"Time":"2023-05-31T12:25:11.496189-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:11.496192-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:25:11.496195-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t[\n"} +{"Time":"2023-05-31T12:25:11.496197-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.496203-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Id\": \"faf015dcd46f493e535ad68895f80b9ad09c2f9a66cac4bba64439eba446f471\",\n"} +{"Time":"2023-05-31T12:25:11.496206-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Created\": \"2023-05-31T19:24:47.543296498Z\",\n"} +{"Time":"2023-05-31T12:25:11.496214-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:25:11.496216-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:25:11.496218-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:25:11.49622-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.496225-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:25:11.496228-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:25:11.49623-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:25:11.496232-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:25:11.496234-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:25:11.496236-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:25:11.496238-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:25:11.49624-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Pid\": 182752,\n"} +{"Time":"2023-05-31T12:25:11.496242-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496243-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496245-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"StartedAt\": \"2023-05-31T19:24:47.850722758Z\",\n"} +{"Time":"2023-05-31T12:25:11.496251-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:25:11.496253-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496255-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Image\": \"sha256:11589cdc9ef4b67a64cc243dd3cf013e81ad02bbed105fc37dc07aa272044680\",\n"} +{"Time":"2023-05-31T12:25:11.496259-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/faf015dcd46f493e535ad68895f80b9ad09c2f9a66cac4bba64439eba446f471/resolv.conf\",\n"} +{"Time":"2023-05-31T12:25:11.496262-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/faf015dcd46f493e535ad68895f80b9ad09c2f9a66cac4bba64439eba446f471/hostname\",\n"} +{"Time":"2023-05-31T12:25:11.496266-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/faf015dcd46f493e535ad68895f80b9ad09c2f9a66cac4bba64439eba446f471/hosts\",\n"} +{"Time":"2023-05-31T12:25:11.496268-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"LogPath\": \"/var/lib/docker/containers/faf015dcd46f493e535ad68895f80b9ad09c2f9a66cac4bba64439eba446f471/faf015dcd46f493e535ad68895f80b9ad09c2f9a66cac4bba64439eba446f471-json.log\",\n"} +{"Time":"2023-05-31T12:25:11.496272-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Name\": \"/running-upgrade-692000\",\n"} +{"Time":"2023-05-31T12:25:11.496275-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496278-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:25:11.496281-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:25:11.496284-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496287-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.49629-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496293-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:25:11.496296-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:25:11.496299-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:25:11.496301-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"running-upgrade-692000:/var\",\n"} +{"Time":"2023-05-31T12:25:11.496304-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"/lib/modules:/lib/modules:ro\"\n"} +{"Time":"2023-05-31T12:25:11.496307-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.49631-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496313-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:25:11.496316-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:25:11.496319-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:25:11.496321-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496323-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"NetworkMode\": \"default\",\n"} +{"Time":"2023-05-31T12:25:11.496325-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:25:11.496327-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:25:11.496329-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.496331-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:25:11.496333-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:25:11.496335-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.496337-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.496339-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:25:11.496343-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.496346-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:25:11.496349-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:25:11.496351-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.496353-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.496355-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:25:11.496358-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.49636-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:25:11.496364-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:25:11.496367-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.496368-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ]\n"} +{"Time":"2023-05-31T12:25:11.49637-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496372-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:25:11.496374-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:25:11.496376-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:25:11.496378-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496384-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:25:11.496386-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496389-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:25:11.496393-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:25:11.496396-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:25:11.496399-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t 0\n"} +{"Time":"2023-05-31T12:25:11.496402-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.496405-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:25:11.496408-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:25:11.49641-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:25:11.496412-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:25:11.496414-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:25:11.496416-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:25:11.496418-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:25:11.49642-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:25:11.496424-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:25:11.496427-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.49643-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:25:11.496435-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496438-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.49644-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:25:11.496442-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:25:11.496444-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:25:11.496447-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:25:11.49645-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:25:11.496453-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:25:11.49646-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.496464-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:25:11.496471-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496475-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:25:11.496477-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496479-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496481-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496483-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:25:11.496485-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:25:11.496487-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496503-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496522-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:25:11.496527-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:25:11.49653-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496536-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496545-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:25:11.496549-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:25:11.496552-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:25:11.496555-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:25:11.496559-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:25:11.496562-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496565-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496568-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496571-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496575-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496578-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.49658-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:25:11.496584-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:25:11.496589-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:25:11.496591-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496593-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MemorySwap\": 4613734400,\n"} +{"Time":"2023-05-31T12:25:11.496595-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:25:11.496597-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:25:11.496599-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:25:11.496601-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:25:11.496618-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496622-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496625-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496628-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:25:11.496641-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:25:11.496644-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:25:11.496647-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.49665-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:25:11.496659-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:25:11.496665-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/721ca7e38214f47bc0264fddc5b83c1ce97d1a987f6acef204adbae2c29d8ba6-init/diff:/var/lib/docker/overlay2/0c3a416314c4e7fe936ca9f61a79837a3cc9b3e9391bccc0ab51cc63d0c5ce05/diff:/var/lib/docker/overlay2/48e75d11fc6717e06c185692060de9bb0b651b971494e2985d913c01c2b447ab/diff:/var/lib/docker/overlay2/0c5df48089c7575b31e6e7653316fc4f27b276287b05cf8ff99323202703efb1/diff:/var/lib/docker/overlay2/d1d6f12c160307290b50c99bd9586c912f1f6e709ed45da6e66c653a8102855b/diff:/var/lib/docker/overlay2/758e17203f56b88c19e6999443e47ddcdcb57fdf8e4db138b367b14b06c8a699/diff:/var/lib/docker/overlay2/5d279dce0f2f5535bf8aa3319ca950a3361a8cc4a5caf724dccd158ab206f770/diff:/var/lib/docker/overlay2/0418f668547e7dc87d742108c2a43275aaf4acda2ec167234dfa190430a87b93/diff:/var/lib/docker/overlay2/d28c4482830942fd1476d578724dcebf95f968dec80f1b3ee9ce0b20eb108b84/diff:/var/lib/docker/overlay2/e994f5f9cec627739a871855b03e64ca7c630292cec77e4c60c75b6b80eb183a/diff:/var/lib/docker/overlay2/aaa525"} +{"Time":"2023-05-31T12:25:11.496668-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"6e26a9bf76b033d892c2a85cd6519031d9b79bc1ca76bc0c9b708858d7/diff:/var/lib/docker/overlay2/666d187998007a8b9a755044257f20417db7e54bf435dc4fc241b654996f0883/diff:/var/lib/docker/overlay2/46cc55e74ec52c30a9d921b80d400dae4aa74e765afd313b8da080d55c491652/diff:/var/lib/docker/overlay2/96a3ba431f717bf4ef8ac581e5b7e0c5ee07f2b81331f15f81f647fc0b4c2f03/diff:/var/lib/docker/overlay2/72077e5b6a9354549d9a34c5eb6e529142f073ac44b4ce0b4f9bba8dbc5c5a2e/diff:/var/lib/docker/overlay2/edc43a602bcf154454598bc7f4e719477c7edb496a4459831ed923e8f7e94f2e/diff:/var/lib/docker/overlay2/29b95372b9163e25a58ccf92381dc52c90d746583473ffaedd9e60543b467078/diff:/var/lib/docker/overlay2/86ae04e6ee55b45776e59d67905bcb2dd5dc047fe299c0da808fc0855b9737ce/diff:/var/lib/docker/overlay2/0f15afae3ed939bb5e3218f886dfa2fe740365ccc7db1dfb2ab24cbbe59fd4f2/diff:/var/lib/docker/overlay2/80512f85d47882a64ad5d7ef44e2512b6c7ca4e5dcb115241e3b23099245b4c4/diff:/var/lib/docker/overlay2/2ba32bd2aed84fbae5b8a42d317c70d68178fcee8dc5730b3ca53942dc311068/diff:/var/lib/d"} +{"Time":"2023-05-31T12:25:11.496671-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"ocker/overlay2/384bcc48c3626bb94eedded876c4b2796bd6cbf4fb0defe6985ddc27f01ef2c6/diff\",\n"} +{"Time":"2023-05-31T12:25:11.496673-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/721ca7e38214f47bc0264fddc5b83c1ce97d1a987f6acef204adbae2c29d8ba6/merged\",\n"} +{"Time":"2023-05-31T12:25:11.496688-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/721ca7e38214f47bc0264fddc5b83c1ce97d1a987f6acef204adbae2c29d8ba6/diff\",\n"} +{"Time":"2023-05-31T12:25:11.496697-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/721ca7e38214f47bc0264fddc5b83c1ce97d1a987f6acef204adbae2c29d8ba6/work\"\n"} +{"Time":"2023-05-31T12:25:11.496702-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.49672-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:25:11.496729-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496732-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:25:11.496734-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.496736-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:25:11.496739-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Name\": \"running-upgrade-692000\",\n"} +{"Time":"2023-05-31T12:25:11.496743-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Source\": \"/var/lib/docker/volumes/running-upgrade-692000/_data\",\n"} +{"Time":"2023-05-31T12:25:11.496746-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:25:11.496749-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:25:11.496753-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:25:11.49676-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:25:11.496765-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:25:11.49677-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496776-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.49678-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:25:11.496788-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:25:11.496804-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:25:11.496807-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:25:11.496809-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:25:11.496811-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:25:11.496814-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.496817-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.49682-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:25:11.496822-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Hostname\": \"running-upgrade-692000\",\n"} +{"Time":"2023-05-31T12:25:11.496825-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496827-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"User\": \"root\",\n"} +{"Time":"2023-05-31T12:25:11.496832-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:25:11.496835-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:25:11.496844-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:25:11.496847-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:25:11.496851-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:25:11.496854-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:25:11.496857-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:25:11.49686-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496863-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:25:11.496866-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:25:11.496869-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:25:11.496873-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:25:11.496876-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n"} +{"Time":"2023-05-31T12:25:11.49688-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"container=docker\"\n"} +{"Time":"2023-05-31T12:25:11.496883-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.496886-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:25:11.496889-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase:v0.0.8@sha256:2f3380ebf1bb0c75b0b47160fd4e61b7b8fef0f1f32f9def108d3eada50a7a81\",\n"} +{"Time":"2023-05-31T12:25:11.496893-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:25:11.496896-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"WorkingDir\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.496899-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:25:11.496902-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:25:11.496957-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:25:11.496964-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.496968-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:25:11.496972-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:25:11.496975-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:25:11.496978-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"mode.minikube.sigs.k8s.io\": \"running-upgrade-692000\",\n"} +{"Time":"2023-05-31T12:25:11.496985-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"name.minikube.sigs.k8s.io\": \"running-upgrade-692000\",\n"} +{"Time":"2023-05-31T12:25:11.496989-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:25:11.496992-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.496995-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:25:11.496998-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.497002-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:25:11.497005-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.497008-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"SandboxID\": \"b1803422a24a948abe663cd63b84758e29c38b587545524f73da298fea4c1bcf\",\n"} +{"Time":"2023-05-31T12:25:11.497012-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:25:11.497015-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.497018-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:25:11.497021-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:25:11.497024-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:25:11.497033-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.497039-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:25:11.497045-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostPort\": \"51668\"\n"} +{"Time":"2023-05-31T12:25:11.497048-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.497051-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.497054-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:25:11.497056-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.497059-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:25:11.497062-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostPort\": \"51669\"\n"} +{"Time":"2023-05-31T12:25:11.497065-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.497068-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:25:11.497071-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:25:11.497073-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:25:11.497075-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:25:11.497077-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"HostPort\": \"51670\"\n"} +{"Time":"2023-05-31T12:25:11.497087-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.497094-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t ]\n"} +{"Time":"2023-05-31T12:25:11.497097-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:25:11.497101-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/b1803422a24a\",\n"} +{"Time":"2023-05-31T12:25:11.497107-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:25:11.49711-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:25:11.497132-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"EndpointID\": \"4c1928fa44741f0e889e7a78ccc9742f070f543e3c8b11ec5ee68347a4dcff4d\",\n"} +{"Time":"2023-05-31T12:25:11.497138-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Gateway\": \"172.17.0.1\",\n"} +{"Time":"2023-05-31T12:25:11.497141-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.497145-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:25:11.497148-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IPAddress\": \"172.17.0.2\",\n"} +{"Time":"2023-05-31T12:25:11.497151-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IPPrefixLen\": 16,\n"} +{"Time":"2023-05-31T12:25:11.497172-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.497176-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MacAddress\": \"02:42:ac:11:00:02\",\n"} +{"Time":"2023-05-31T12:25:11.497179-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:25:11.497183-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"bridge\": {\n"} +{"Time":"2023-05-31T12:25:11.497186-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IPAMConfig\": null,\n"} +{"Time":"2023-05-31T12:25:11.497188-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:25:11.49719-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Aliases\": null,\n"} +{"Time":"2023-05-31T12:25:11.497193-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"NetworkID\": \"f44bb8cfb525a91b87ee628261c923ef34271b2ecd0e8b38de2944ec8999828f\",\n"} +{"Time":"2023-05-31T12:25:11.497195-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"EndpointID\": \"4c1928fa44741f0e889e7a78ccc9742f070f543e3c8b11ec5ee68347a4dcff4d\",\n"} +{"Time":"2023-05-31T12:25:11.497197-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"Gateway\": \"172.17.0.1\",\n"} +{"Time":"2023-05-31T12:25:11.497199-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IPAddress\": \"172.17.0.2\",\n"} +{"Time":"2023-05-31T12:25:11.497202-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IPPrefixLen\": 16,\n"} +{"Time":"2023-05-31T12:25:11.497204-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.497206-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:25:11.497208-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:25:11.49721-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"MacAddress\": \"02:42:ac:11:00:02\",\n"} +{"Time":"2023-05-31T12:25:11.497213-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:25:11.497215-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.497224-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.497227-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.49723-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:25:11.497232-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t]\n"} +{"Time":"2023-05-31T12:25:11.497234-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:11.497236-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:25:11.497241-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p running-upgrade-692000 -n running-upgrade-692000\n"} +{"Time":"2023-05-31T12:25:11.841236-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p running-upgrade-692000 -n running-upgrade-692000: exit status 6 (344.775967ms)\n"} +{"Time":"2023-05-31T12:25:11.84125-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:11.841253-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:25:11.841255-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:25:11.841257-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:25:11.84126-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:25:11.841262-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:11.841264-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:25:11.841266-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:25:11.841268-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \tE0531 12:25:11.830105 10444 status.go:415] kubeconfig endpoint: extract IP: \"running-upgrade-692000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:25:11.84127-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:25:11.841272-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:25:11.841274-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:25:11.841278-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:241: \"running-upgrade-692000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:25:11.84128-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:175: Cleaning up \"running-upgrade-692000\" profile ...\n"} +{"Time":"2023-05-31T12:25:11.841283-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p running-upgrade-692000\n"} +{"Time":"2023-05-31T12:25:14.073109-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p running-upgrade-692000: (2.231744591s)\n"} +{"Time":"2023-05-31T12:25:14.073128-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"--- FAIL: TestRunningBinaryUpgrade (80.81s)\n"} +{"Time":"2023-05-31T12:25:14.073134-07:00","Action":"fail","Test":"TestRunningBinaryUpgrade","Elapsed":80.81} +{"Time":"2023-05-31T12:25:14.073139-07:00","Action":"cont","Test":"TestMissingContainerUpgrade"} +{"Time":"2023-05-31T12:25:14.073142-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"=== CONT TestMissingContainerUpgrade\n"} +{"Time":"2023-05-31T12:25:18.052654-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:321: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.1.1992164998.exe start -p missing-upgrade-139000 --memory=2200 --driver=docker \n"} +{"Time":"2023-05-31T12:25:21.507338-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:25:21.507306 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:02.822343-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:02.822309 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:02.827471-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:02.827435 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:02.838104-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:02.838076 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:02.858216-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:02.858164 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:02.898305-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:02.898269 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:02.978467-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:02.978437 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:03.138749-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:03.138715 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:03.46093-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:03.460840 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:04.101444-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:04.101396 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:04.982748-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:321: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.1.1992164998.exe start -p missing-upgrade-139000 --memory=2200 --driver=docker : exit status 78 (46.929088495s)\n"} +{"Time":"2023-05-31T12:26:04.982761-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:04.982764-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:26:04.982766-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* [missing-upgrade-139000] minikube v1.9.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:26:04.982768-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:26:04.982771-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:26:04.982773-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:26:04.982775-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:26:04.982777-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:26:04.982779-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:26:04.982781-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T12:26:04.982783-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Starting control plane node m01 in cluster missing-upgrade-139000\n"} +{"Time":"2023-05-31T12:26:04.982785-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:26:04.982787-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Downloading Kubernetes v1.18.0 preload ...\n"} +{"Time":"2023-05-31T12:26:04.98279-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Creating Kubernetes in docker container with (CPUs=2) (6 available), Memory=2200MB (5943MB available) ...\n"} +{"Time":"2023-05-31T12:26:04.982792-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Deleting \"missing-upgrade-139000\" in docker ...\n"} +{"Time":"2023-05-31T12:26:04.982803-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Creating Kubernetes in docker container with (CPUs=2) (6 available), Memory=2200MB (5943MB available) ...\n"} +{"Time":"2023-05-31T12:26:04.982805-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:04.98281-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:26:04.982812-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:26:04.982818-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 913.70 KiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 8.81 MiB / \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 11.57 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 17.34 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 25.57 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 28.52 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 34.60 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 42.56 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 49.03 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 51.38 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 60.97 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 68.67 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4"} +{"Time":"2023-05-31T12:26:04.982824-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":": 74.41 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 82.34 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 92.41 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 98.47 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 107.38 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 115.29 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 121.38 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 132.05 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 139.48 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 152.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 156.35 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 167.82 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 181.01 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar."} +{"Time":"2023-05-31T12:26:04.982832-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"lz4: 187.50 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 194.93 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 201.95 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 210.81 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 215.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 229.97 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 240.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 247.42 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 256.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 261.85 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 270.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 280.61 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 285.77 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.t"} +{"Time":"2023-05-31T12:26:04.982835-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"ar.lz4: 293.93 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 302.12 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 311.03 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 320.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 330.77 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 342.83 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 347.73 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 359.97 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 373.28 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 382.35 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 395.51 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 406.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 418.26 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd6"} +{"Time":"2023-05-31T12:26:04.98284-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"4.tar.lz4: 427.88 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 441.18 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 453.79 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 461.12 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 471.50 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 480.93 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 490.84 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 500.36 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 505.63 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 511.20 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 518.88 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 525.81 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 535.74 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-a"} +{"Time":"2023-05-31T12:26:04.982844-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"md64.tar.lz4: 541.92 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 542.91 MiB! StartHost failed, but will try again: creating host: create: provisioning: ssh command error:\n"} +{"Time":"2023-05-31T12:26:04.982846-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tcommand : sudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:26:04.982849-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \terr : Process exited with status 1\n"} +{"Time":"2023-05-31T12:26:04.982851-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \toutput : --- /lib/systemd/system/docker.service\t2019-08-29 04:42:14.000000000 +0000\n"} +{"Time":"2023-05-31T12:26:04.982853-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:25:44.081782239 +0000\n"} +{"Time":"2023-05-31T12:26:04.982855-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t@@ -8,24 +8,22 @@\n"} +{"Time":"2023-05-31T12:26:04.982857-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:26:04.982859-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:26:04.982861-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:26:04.982863-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:26:04.982865-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:26:04.982873-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:26:04.982875-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:26:04.982877-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:26:04.982879-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-TimeoutSec=0\n"} +{"Time":"2023-05-31T12:26:04.982881-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:26:04.982883-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:26:04.982885-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:26:04.982887-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:26:04.982889-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:26:04.982893-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:26:04.982895-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:26:04.982897-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:26:04.982901-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:26:04.982903-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:26:04.982905-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:26:04.982907-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:26:04.982909-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:26:04.982911-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:26:04.982912-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:26:04.982914-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:26:04.982916-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:26:04.982919-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:26:04.982921-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:26:04.982923-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:26:04.982925-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:26:04.982927-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:26:04.982929-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:26:04.982932-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:26:04.982935-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:26:04.982938-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:26:04.982941-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:26:04.982944-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+ExecReload=/bin/kill -s HUP \n"} +{"Time":"2023-05-31T12:26:04.982945-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:26:04.982949-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:26:04.982951-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:26:04.982953-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t@@ -33,9 +31,10 @@\n"} +{"Time":"2023-05-31T12:26:04.98296-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:26:04.982962-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:26:04.982965-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:26:04.982967-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:26:04.98297-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:26:04.982973-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:26:04.982976-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:26:04.982979-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:26:04.982981-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:26:04.982983-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:26:04.982985-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:26:04.982987-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:26:04.982988-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:26:04.98299-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:26:04.982993-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:26:04.982994-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:26:04.982997-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* [DOCKER_RESTART_FAILED] Failed to start docker container. \"minikube start -p missing-upgrade-139000\" may fix it. creating host: create: provisioning: ssh command error:\n"} +{"Time":"2023-05-31T12:26:04.982999-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tcommand : sudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:26:04.983001-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \terr : Process exited with status 1\n"} +{"Time":"2023-05-31T12:26:04.983003-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \toutput : --- /lib/systemd/system/docker.service\t2019-08-29 04:42:14.000000000 +0000\n"} +{"Time":"2023-05-31T12:26:04.983006-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:26:02.661783311 +0000\n"} +{"Time":"2023-05-31T12:26:04.983009-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t@@ -8,24 +8,22 @@\n"} +{"Time":"2023-05-31T12:26:04.983011-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:26:04.983012-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:26:04.983014-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:26:04.983016-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:26:04.983018-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:26:04.98302-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:26:04.983023-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:26:04.983025-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:26:04.983026-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-TimeoutSec=0\n"} +{"Time":"2023-05-31T12:26:04.983028-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:26:04.98303-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:26:04.983032-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:26:04.983034-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:26:04.98304-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:26:04.983042-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:26:04.983044-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:26:04.983046-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:26:04.983048-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:26:04.983052-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:26:04.983055-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:26:04.983058-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:26:04.98306-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:26:04.983062-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:26:04.983064-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:26:04.983073-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:26:04.983084-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:26:04.983098-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:26:04.983109-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:26:04.983112-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:26:04.983118-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:26:04.983122-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:26:04.983125-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:26:04.983128-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:26:04.983132-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:26:04.983135-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:26:04.983138-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:26:04.983147-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+ExecReload=/bin/kill -s HUP \n"} +{"Time":"2023-05-31T12:26:04.983149-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:26:04.983152-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:26:04.983155-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:26:04.98316-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t@@ -33,9 +31,10 @@\n"} +{"Time":"2023-05-31T12:26:04.983162-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:26:04.983167-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:26:04.98317-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:26:04.983173-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:26:04.983176-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:26:04.983179-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:26:04.983183-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:26:04.983186-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:26:04.983188-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:26:04.983191-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:26:04.983194-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:26:04.983198-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:26:04.9832-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:26:04.983202-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:26:04.983204-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:26:04.983206-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Suggestion: Remove the incompatible --docker-opt flag if one was provided\n"} +{"Time":"2023-05-31T12:26:04.983208-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Related issue: https://github.com/kubernetes/minikube/issues/7070\n"} +{"Time":"2023-05-31T12:26:04.98321-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:04.983212-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:26:05.381565-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:05.381532 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:05.843138-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:321: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.1.1992164998.exe start -p missing-upgrade-139000 --memory=2200 --driver=docker \n"} +{"Time":"2023-05-31T12:26:07.941986-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:07.941956 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:09.628415-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:321: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.1.1992164998.exe start -p missing-upgrade-139000 --memory=2200 --driver=docker : exit status 70 (3.785157202s)\n"} +{"Time":"2023-05-31T12:26:09.62843-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:09.628433-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:26:09.628436-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* [missing-upgrade-139000] minikube v1.9.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:26:09.628438-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:26:09.62844-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:26:09.628442-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:26:09.628444-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:26:09.628446-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:26:09.628448-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:26:09.628451-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:26:09.628453-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Starting control plane node m01 in cluster missing-upgrade-139000\n"} +{"Time":"2023-05-31T12:26:09.628455-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:26:09.628465-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Updating the running docker \"missing-upgrade-139000\" container ...\n"} +{"Time":"2023-05-31T12:26:09.62847-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:09.628472-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:26:09.628474-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:26:09.628476-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:26:09.628478-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tX Failed to enable container runtime: enable docker.: sudo systemctl start docker: exit status 1\n"} +{"Time":"2023-05-31T12:26:09.62848-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:26:09.628482-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:26:09.628484-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:26:09.628486-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:26:09.628488-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:26:09.62849-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:26:09.628492-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:26:09.628494-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* minikube is exiting due to an error. If the above message is not useful, open an issue:\n"} +{"Time":"2023-05-31T12:26:09.628496-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - https://github.com/kubernetes/minikube/issues/new/choose\n"} +{"Time":"2023-05-31T12:26:09.628498-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:09.6285-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:26:11.085303-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:321: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.1.1992164998.exe start -p missing-upgrade-139000 --memory=2200 --driver=docker \n"} +{"Time":"2023-05-31T12:26:13.063889-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"E0531 12:26:13.063856 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:14.745473-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:321: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.1.1992164998.exe start -p missing-upgrade-139000 --memory=2200 --driver=docker : exit status 70 (3.660079893s)\n"} +{"Time":"2023-05-31T12:26:14.745498-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:14.745502-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:26:14.745507-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* [missing-upgrade-139000] minikube v1.9.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:26:14.74551-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:26:14.745512-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:26:14.745517-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:26:14.74552-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:26:14.745523-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:26:14.745526-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:26:14.745529-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:26:14.745531-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Starting control plane node m01 in cluster missing-upgrade-139000\n"} +{"Time":"2023-05-31T12:26:14.745533-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:26:14.745535-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* Updating the running docker \"missing-upgrade-139000\" container ...\n"} +{"Time":"2023-05-31T12:26:14.745538-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:14.74554-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:26:14.745542-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:26:14.745547-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:26:14.745555-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tX Failed to enable container runtime: enable docker.: sudo systemctl start docker: exit status 1\n"} +{"Time":"2023-05-31T12:26:14.745562-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:26:14.745569-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:26:14.745574-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:26:14.745577-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:26:14.745579-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:26:14.745581-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:26:14.745583-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:26:14.745588-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t* minikube is exiting due to an error. If the above message is not useful, open an issue:\n"} +{"Time":"2023-05-31T12:26:14.74559-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t - https://github.com/kubernetes/minikube/issues/new/choose\n"} +{"Time":"2023-05-31T12:26:14.745592-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:14.745594-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:26:14.745597-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:327: release start failed: exit status 70\n"} +{"Time":"2023-05-31T12:26:14.747488-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" panic.go:522: *** TestMissingContainerUpgrade FAILED at 2023-05-31 12:26:14.747438 -0700 PDT m=+2595.853069573\n"} +{"Time":"2023-05-31T12:26:14.747501-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:26:14.74752-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:230: ======\u003e post-mortem[TestMissingContainerUpgrade]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:26:14.747585-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:231: (dbg) Run: docker inspect missing-upgrade-139000\n"} +{"Time":"2023-05-31T12:26:14.798781-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:235: (dbg) docker inspect missing-upgrade-139000:\n"} +{"Time":"2023-05-31T12:26:14.798794-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:14.798797-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:26:14.798799-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t[\n"} +{"Time":"2023-05-31T12:26:14.798801-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.798803-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Id\": \"e001a13772e5b054687b0b218c256d6e3b0c1149e2fe4fcd73258b5d59c2aa80\",\n"} +{"Time":"2023-05-31T12:26:14.798805-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Created\": \"2023-05-31T19:25:52.12629184Z\",\n"} +{"Time":"2023-05-31T12:26:14.798808-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:26:14.79881-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:26:14.798812-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:26:14.798814-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.798816-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:26:14.798818-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:26:14.79882-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:26:14.798822-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:26:14.798824-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:26:14.798826-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:26:14.798828-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:26:14.79883-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Pid\": 185182,\n"} +{"Time":"2023-05-31T12:26:14.798832-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:26:14.798834-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.798836-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"StartedAt\": \"2023-05-31T19:25:52.318230739Z\",\n"} +{"Time":"2023-05-31T12:26:14.798838-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:26:14.79884-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.798842-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Image\": \"sha256:11589cdc9ef4b67a64cc243dd3cf013e81ad02bbed105fc37dc07aa272044680\",\n"} +{"Time":"2023-05-31T12:26:14.798845-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/e001a13772e5b054687b0b218c256d6e3b0c1149e2fe4fcd73258b5d59c2aa80/resolv.conf\",\n"} +{"Time":"2023-05-31T12:26:14.798848-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/e001a13772e5b054687b0b218c256d6e3b0c1149e2fe4fcd73258b5d59c2aa80/hostname\",\n"} +{"Time":"2023-05-31T12:26:14.798852-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/e001a13772e5b054687b0b218c256d6e3b0c1149e2fe4fcd73258b5d59c2aa80/hosts\",\n"} +{"Time":"2023-05-31T12:26:14.798855-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"LogPath\": \"/var/lib/docker/containers/e001a13772e5b054687b0b218c256d6e3b0c1149e2fe4fcd73258b5d59c2aa80/e001a13772e5b054687b0b218c256d6e3b0c1149e2fe4fcd73258b5d59c2aa80-json.log\",\n"} +{"Time":"2023-05-31T12:26:14.798858-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Name\": \"/missing-upgrade-139000\",\n"} +{"Time":"2023-05-31T12:26:14.79886-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:26:14.798862-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:26:14.798864-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:26:14.798866-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.798868-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.79887-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.798873-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:26:14.798876-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:26:14.798879-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:26:14.798882-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:26:14.798885-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"missing-upgrade-139000:/var\"\n"} +{"Time":"2023-05-31T12:26:14.798888-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.798891-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.798895-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:26:14.798898-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:26:14.798901-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:26:14.798909-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.798911-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"NetworkMode\": \"default\",\n"} +{"Time":"2023-05-31T12:26:14.798913-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:26:14.798917-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:26:14.798919-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.798921-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:26:14.798924-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:26:14.798932-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.798934-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.798936-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:26:14.798938-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.79894-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:26:14.798942-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:26:14.798945-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.798947-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.798949-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:26:14.798951-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.798953-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:26:14.798955-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:26:14.798958-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.798961-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ]\n"} +{"Time":"2023-05-31T12:26:14.798964-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.798968-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:26:14.798971-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:26:14.798973-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:26:14.798975-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.798977-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:26:14.798979-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.798981-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:26:14.798983-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:26:14.798991-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:26:14.798993-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t 0\n"} +{"Time":"2023-05-31T12:26:14.798995-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.798997-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:26:14.798999-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:26:14.799001-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:26:14.799003-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:26:14.799005-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:26:14.799007-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:26:14.799009-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:26:14.799011-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:26:14.799013-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:26:14.799015-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799017-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:26:14.799019-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799021-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799023-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:26:14.799025-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:26:14.799028-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:26:14.799032-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:26:14.799034-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:26:14.799037-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:26:14.799042-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.799044-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:26:14.799049-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799051-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:26:14.799053-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.799055-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799057-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.79906-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:26:14.799062-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:26:14.799064-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799066-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799068-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:26:14.79907-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:26:14.799072-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799074-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799076-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:26:14.799078-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:26:14.79908-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:26:14.799082-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:26:14.799084-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:26:14.799086-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799088-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799091-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799093-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799095-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799097-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799099-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:26:14.799101-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:26:14.799103-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:26:14.799105-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799107-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MemorySwap\": 4613734400,\n"} +{"Time":"2023-05-31T12:26:14.799109-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:26:14.799111-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:26:14.799113-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:26:14.799117-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:26:14.799119-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799121-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799123-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799125-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799127-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:26:14.79913-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:26:14.799133-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.799138-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:26:14.799141-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:26:14.799156-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/1c16b284f8fb2ab5047235a964ce67586ef53b1acb2e0824762b5acd082961ef-init/diff:/var/lib/docker/overlay2/0c3a416314c4e7fe936ca9f61a79837a3cc9b3e9391bccc0ab51cc63d0c5ce05/diff:/var/lib/docker/overlay2/48e75d11fc6717e06c185692060de9bb0b651b971494e2985d913c01c2b447ab/diff:/var/lib/docker/overlay2/0c5df48089c7575b31e6e7653316fc4f27b276287b05cf8ff99323202703efb1/diff:/var/lib/docker/overlay2/d1d6f12c160307290b50c99bd9586c912f1f6e709ed45da6e66c653a8102855b/diff:/var/lib/docker/overlay2/758e17203f56b88c19e6999443e47ddcdcb57fdf8e4db138b367b14b06c8a699/diff:/var/lib/docker/overlay2/5d279dce0f2f5535bf8aa3319ca950a3361a8cc4a5caf724dccd158ab206f770/diff:/var/lib/docker/overlay2/0418f668547e7dc87d742108c2a43275aaf4acda2ec167234dfa190430a87b93/diff:/var/lib/docker/overlay2/d28c4482830942fd1476d578724dcebf95f968dec80f1b3ee9ce0b20eb108b84/diff:/var/lib/docker/overlay2/e994f5f9cec627739a871855b03e64ca7c630292cec77e4c60c75b6b80eb183a/diff:/var/lib/docker/overlay2/aaa525"} +{"Time":"2023-05-31T12:26:14.799166-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"6e26a9bf76b033d892c2a85cd6519031d9b79bc1ca76bc0c9b708858d7/diff:/var/lib/docker/overlay2/666d187998007a8b9a755044257f20417db7e54bf435dc4fc241b654996f0883/diff:/var/lib/docker/overlay2/46cc55e74ec52c30a9d921b80d400dae4aa74e765afd313b8da080d55c491652/diff:/var/lib/docker/overlay2/96a3ba431f717bf4ef8ac581e5b7e0c5ee07f2b81331f15f81f647fc0b4c2f03/diff:/var/lib/docker/overlay2/72077e5b6a9354549d9a34c5eb6e529142f073ac44b4ce0b4f9bba8dbc5c5a2e/diff:/var/lib/docker/overlay2/edc43a602bcf154454598bc7f4e719477c7edb496a4459831ed923e8f7e94f2e/diff:/var/lib/docker/overlay2/29b95372b9163e25a58ccf92381dc52c90d746583473ffaedd9e60543b467078/diff:/var/lib/docker/overlay2/86ae04e6ee55b45776e59d67905bcb2dd5dc047fe299c0da808fc0855b9737ce/diff:/var/lib/docker/overlay2/0f15afae3ed939bb5e3218f886dfa2fe740365ccc7db1dfb2ab24cbbe59fd4f2/diff:/var/lib/docker/overlay2/80512f85d47882a64ad5d7ef44e2512b6c7ca4e5dcb115241e3b23099245b4c4/diff:/var/lib/docker/overlay2/2ba32bd2aed84fbae5b8a42d317c70d68178fcee8dc5730b3ca53942dc311068/diff:/var/lib/d"} +{"Time":"2023-05-31T12:26:14.799181-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"ocker/overlay2/384bcc48c3626bb94eedded876c4b2796bd6cbf4fb0defe6985ddc27f01ef2c6/diff\",\n"} +{"Time":"2023-05-31T12:26:14.799186-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/1c16b284f8fb2ab5047235a964ce67586ef53b1acb2e0824762b5acd082961ef/merged\",\n"} +{"Time":"2023-05-31T12:26:14.799202-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/1c16b284f8fb2ab5047235a964ce67586ef53b1acb2e0824762b5acd082961ef/diff\",\n"} +{"Time":"2023-05-31T12:26:14.799206-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/1c16b284f8fb2ab5047235a964ce67586ef53b1acb2e0824762b5acd082961ef/work\"\n"} +{"Time":"2023-05-31T12:26:14.799209-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.799218-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:26:14.79922-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.799224-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:26:14.799226-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.799228-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:26:14.79923-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:26:14.799232-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:26:14.799234-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:26:14.799236-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:26:14.799238-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:26:14.79924-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.799242-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.799246-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:26:14.799248-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Name\": \"missing-upgrade-139000\",\n"} +{"Time":"2023-05-31T12:26:14.79925-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Source\": \"/var/lib/docker/volumes/missing-upgrade-139000/_data\",\n"} +{"Time":"2023-05-31T12:26:14.799252-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:26:14.799254-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:26:14.799257-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:26:14.799259-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:26:14.799261-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:26:14.799263-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.799265-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.799267-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:26:14.799269-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Hostname\": \"missing-upgrade-139000\",\n"} +{"Time":"2023-05-31T12:26:14.799271-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799273-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"User\": \"root\",\n"} +{"Time":"2023-05-31T12:26:14.799275-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:26:14.799277-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:26:14.799279-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:26:14.799281-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:26:14.799283-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:26:14.799285-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:26:14.79929-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:26:14.799292-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.799294-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:26:14.799296-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:26:14.799298-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:26:14.7993-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:26:14.799302-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n"} +{"Time":"2023-05-31T12:26:14.799305-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"container=docker\"\n"} +{"Time":"2023-05-31T12:26:14.799307-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.799309-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:26:14.799311-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase:v0.0.8@sha256:2f3380ebf1bb0c75b0b47160fd4e61b7b8fef0f1f32f9def108d3eada50a7a81\",\n"} +{"Time":"2023-05-31T12:26:14.799313-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:26:14.799315-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"WorkingDir\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799317-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:26:14.799319-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:26:14.799321-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:26:14.799323-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.799325-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:26:14.799327-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:26:14.799329-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:26:14.799331-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"mode.minikube.sigs.k8s.io\": \"missing-upgrade-139000\",\n"} +{"Time":"2023-05-31T12:26:14.799336-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"name.minikube.sigs.k8s.io\": \"missing-upgrade-139000\",\n"} +{"Time":"2023-05-31T12:26:14.799338-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:26:14.799343-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.799345-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:26:14.799347-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.79935-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:26:14.799353-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799356-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"SandboxID\": \"229c038e04b65932645e05dec5abf207f2aa1e1034c481ad2646c57c1faaea43\",\n"} +{"Time":"2023-05-31T12:26:14.799359-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:26:14.799363-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799366-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799369-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:26:14.799372-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:26:14.799375-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.799378-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:26:14.799382-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostPort\": \"51734\"\n"} +{"Time":"2023-05-31T12:26:14.799385-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.799388-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.799392-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:26:14.799395-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.799398-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:26:14.799402-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostPort\": \"51735\"\n"} +{"Time":"2023-05-31T12:26:14.799408-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.799412-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:26:14.799415-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:26:14.799418-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:26:14.799421-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:26:14.799424-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"HostPort\": \"51736\"\n"} +{"Time":"2023-05-31T12:26:14.799427-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.79943-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t ]\n"} +{"Time":"2023-05-31T12:26:14.799433-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:26:14.799436-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/229c038e04b6\",\n"} +{"Time":"2023-05-31T12:26:14.79944-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:26:14.799443-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:26:14.799446-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"EndpointID\": \"de4baa7513e37f76edcccf3f8b763e707068b9f5f825c66167537126b74b4509\",\n"} +{"Time":"2023-05-31T12:26:14.79945-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Gateway\": \"172.17.0.1\",\n"} +{"Time":"2023-05-31T12:26:14.799453-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799457-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:26:14.79946-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IPAddress\": \"172.17.0.2\",\n"} +{"Time":"2023-05-31T12:26:14.799463-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IPPrefixLen\": 16,\n"} +{"Time":"2023-05-31T12:26:14.799466-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.79947-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MacAddress\": \"02:42:ac:11:00:02\",\n"} +{"Time":"2023-05-31T12:26:14.799473-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:26:14.799476-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"bridge\": {\n"} +{"Time":"2023-05-31T12:26:14.799485-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IPAMConfig\": null,\n"} +{"Time":"2023-05-31T12:26:14.799487-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:26:14.799489-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Aliases\": null,\n"} +{"Time":"2023-05-31T12:26:14.799493-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"NetworkID\": \"f44bb8cfb525a91b87ee628261c923ef34271b2ecd0e8b38de2944ec8999828f\",\n"} +{"Time":"2023-05-31T12:26:14.799495-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"EndpointID\": \"de4baa7513e37f76edcccf3f8b763e707068b9f5f825c66167537126b74b4509\",\n"} +{"Time":"2023-05-31T12:26:14.7995-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"Gateway\": \"172.17.0.1\",\n"} +{"Time":"2023-05-31T12:26:14.799503-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IPAddress\": \"172.17.0.2\",\n"} +{"Time":"2023-05-31T12:26:14.799508-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IPPrefixLen\": 16,\n"} +{"Time":"2023-05-31T12:26:14.799512-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799515-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:26:14.799518-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:26:14.799522-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"MacAddress\": \"02:42:ac:11:00:02\",\n"} +{"Time":"2023-05-31T12:26:14.799524-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:26:14.799526-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.799528-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.79953-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.799532-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:26:14.799534-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \t]\n"} +{"Time":"2023-05-31T12:26:14.799536-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:14.799538-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:26:14.799543-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p missing-upgrade-139000 -n missing-upgrade-139000\n"} +{"Time":"2023-05-31T12:26:15.14384-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p missing-upgrade-139000 -n missing-upgrade-139000: exit status 6 (344.902823ms)\n"} +{"Time":"2023-05-31T12:26:15.143853-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:15.143856-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:26:15.143858-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:26:15.14386-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:26:15.143862-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:26:15.143864-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:15.143866-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:26:15.143868-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:26:15.14387-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \tE0531 12:26:15.132769 10770 status.go:415] kubeconfig endpoint: extract IP: \"missing-upgrade-139000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:26:15.143872-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:26:15.143874-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:26:15.143876-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:26:15.14388-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:241: \"missing-upgrade-139000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:26:15.143882-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:175: Cleaning up \"missing-upgrade-139000\" profile ...\n"} +{"Time":"2023-05-31T12:26:15.143885-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p missing-upgrade-139000\n"} +{"Time":"2023-05-31T12:26:17.38744-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p missing-upgrade-139000: (2.243425728s)\n"} +{"Time":"2023-05-31T12:26:17.387468-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"--- FAIL: TestMissingContainerUpgrade (63.31s)\n"} +{"Time":"2023-05-31T12:26:17.387476-07:00","Action":"fail","Test":"TestMissingContainerUpgrade","Elapsed":63.31} +{"Time":"2023-05-31T12:26:17.387483-07:00","Action":"cont","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T12:26:17.387495-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== CONT TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T12:26:17.387603-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:234: (dbg) Run: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.16.0 --alsologtostderr -v=1 --driver=docker \n"} +{"Time":"2023-05-31T12:26:23.304205-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"E0531 12:26:23.304172 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:26:41.265682-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:131: (dbg) Run: out/minikube-darwin-amd64 start -p cert-expiration-604000 --memory=2048 --cert-expiration=8760h --driver=docker \n"} +{"Time":"2023-05-31T12:26:43.78571-07:00","Action":"output","Test":"TestCertExpiration","Output":"E0531 12:26:43.785643 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:27:03.025536-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:131: (dbg) Done: out/minikube-darwin-amd64 start -p cert-expiration-604000 --memory=2048 --cert-expiration=8760h --driver=docker : (21.759614545s)\n"} +{"Time":"2023-05-31T12:27:03.025632-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:175: Cleaning up \"cert-expiration-604000\" profile ...\n"} +{"Time":"2023-05-31T12:27:03.02564-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p cert-expiration-604000\n"} +{"Time":"2023-05-31T12:27:05.509687-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p cert-expiration-604000: (2.483934725s)\n"} +{"Time":"2023-05-31T12:27:05.509706-07:00","Action":"output","Test":"TestCertExpiration","Output":"--- PASS: TestCertExpiration (232.59s)\n"} +{"Time":"2023-05-31T12:27:05.509726-07:00","Action":"pass","Test":"TestCertExpiration","Elapsed":232.59} +{"Time":"2023-05-31T12:27:05.509731-07:00","Action":"cont","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T12:27:05.509734-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== CONT TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T12:27:05.509802-07:00","Action":"run","Test":"TestStoppedBinaryUpgrade/Setup"} +{"Time":"2023-05-31T12:27:05.50981-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Setup","Output":"=== RUN TestStoppedBinaryUpgrade/Setup\n"} +{"Time":"2023-05-31T12:27:08.89221-07:00","Action":"run","Test":"TestStoppedBinaryUpgrade/Upgrade"} +{"Time":"2023-05-31T12:27:08.89223-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"=== RUN TestStoppedBinaryUpgrade/Upgrade\n"} +{"Time":"2023-05-31T12:27:08.892368-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1136906741.exe start -p stopped-upgrade-731000 --memory=2200 --vm-driver=docker \n"} +{"Time":"2023-05-31T12:27:18.456756-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"E0531 12:27:18.456729 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:27:24.748147-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"E0531 12:27:24.748116 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:27:31.706815-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"E0531 12:27:31.706785 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:27:56.824148-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1136906741.exe start -p stopped-upgrade-731000 --memory=2200 --vm-driver=docker : exit status 70 (47.930762068s)\n"} +{"Time":"2023-05-31T12:27:56.824162-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:27:56.824164-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:27:56.824167-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* [stopped-upgrade-731000] minikube v1.9.0 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:27:56.824178-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:27:56.824181-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:27:56.824183-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:27:56.824185-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:27:56.824187-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:27:56.824189-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - KUBECONFIG=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/legacy_kubeconfig1942022652\n"} +{"Time":"2023-05-31T12:27:56.824191-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T12:27:56.824193-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:27:56.824195-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Downloading Kubernetes v1.18.0 preload ...\n"} +{"Time":"2023-05-31T12:27:56.824197-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Creating Kubernetes in docker container with (CPUs=2) (6 available), Memory=2200MB (5943MB available) ...\n"} +{"Time":"2023-05-31T12:27:56.824199-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t! StartHost failed, but will try again: creating host: create: provisioning: ssh command error:\n"} +{"Time":"2023-05-31T12:27:56.824202-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tcommand : sudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:27:56.824204-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \terr : Process exited with status 1\n"} +{"Time":"2023-05-31T12:27:56.824206-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \toutput : --- /lib/systemd/system/docker.service\t2019-08-29 04:42:14.000000000 +0000\n"} +{"Time":"2023-05-31T12:27:56.824208-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:27:35.493153474 +0000\n"} +{"Time":"2023-05-31T12:27:56.82421-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t@@ -8,24 +8,22 @@\n"} +{"Time":"2023-05-31T12:27:56.824212-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.824216-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:27:56.824218-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:27:56.82422-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:27:56.824222-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:27:56.824224-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:27:56.824226-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:27:56.824228-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:27:56.82423-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-TimeoutSec=0\n"} +{"Time":"2023-05-31T12:27:56.824232-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:27:56.824234-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:27:56.824236-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:27:56.824238-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:27:56.82424-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:27:56.824242-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:27:56.824244-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:27:56.824246-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:27:56.82425-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:27:56.824254-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:27:56.824257-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:27:56.82426-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:27:56.824263-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.824265-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.824268-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.824271-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:27:56.824273-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:27:56.824277-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:27:56.824279-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:27:56.824281-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:27:56.824283-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:27:56.824285-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:27:56.824287-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.82429-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:27:56.824293-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:27:56.824295-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:27:56.824297-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:27:56.824299-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecReload=/bin/kill -s HUP \n"} +{"Time":"2023-05-31T12:27:56.824301-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.824303-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:27:56.824309-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:27:56.824311-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t@@ -33,9 +31,10 @@\n"} +{"Time":"2023-05-31T12:27:56.824313-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:27:56.824315-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:27:56.824318-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.824321-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:27:56.824324-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:27:56.824327-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:27:56.824329-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:27:56.824331-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:27:56.824332-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:27:56.824334-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.824336-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:27:56.824338-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:27:56.82434-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:27:56.824342-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:27:56.824345-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:27:56.824347-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Deleting \"stopped-upgrade-731000\" in docker ...\n"} +{"Time":"2023-05-31T12:27:56.824349-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Creating Kubernetes in docker container with (CPUs=2) (6 available), Memory=2200MB (5943MB available) ...\n"} +{"Time":"2023-05-31T12:27:56.824351-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* StartHost failed again: creating host: create: provisioning: ssh command error:\n"} +{"Time":"2023-05-31T12:27:56.824355-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tcommand : sudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:27:56.824358-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \terr : Process exited with status 1\n"} +{"Time":"2023-05-31T12:27:56.824362-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \toutput : --- /lib/systemd/system/docker.service\t2019-08-29 04:42:14.000000000 +0000\n"} +{"Time":"2023-05-31T12:27:56.824368-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:27:54.437610836 +0000\n"} +{"Time":"2023-05-31T12:27:56.824371-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t@@ -8,24 +8,22 @@\n"} +{"Time":"2023-05-31T12:27:56.824374-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.824377-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:27:56.82438-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:27:56.824383-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:27:56.824386-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:27:56.824392-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:27:56.824395-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:27:56.824398-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:27:56.824401-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-TimeoutSec=0\n"} +{"Time":"2023-05-31T12:27:56.824404-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:27:56.824407-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:27:56.82441-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:27:56.824421-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:27:56.825656-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:27:56.825734-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:27:56.825738-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:27:56.825741-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:27:56.825744-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:27:56.825746-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:27:56.825749-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:27:56.825751-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:27:56.825753-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.825755-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.825757-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.825759-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:27:56.825761-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:27:56.825763-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:27:56.825766-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:27:56.825768-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:27:56.82577-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:27:56.825772-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:27:56.825779-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.825782-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:27:56.825784-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:27:56.825791-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:27:56.825794-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:27:56.825799-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecReload=/bin/kill -s HUP \n"} +{"Time":"2023-05-31T12:27:56.825801-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.825803-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:27:56.825806-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:27:56.825808-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t@@ -33,9 +31,10 @@\n"} +{"Time":"2023-05-31T12:27:56.82581-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:27:56.825812-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:27:56.825814-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.825816-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:27:56.825818-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:27:56.82582-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:27:56.825822-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:27:56.825824-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:27:56.825826-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:27:56.825828-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.825831-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:27:56.825833-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:27:56.825835-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:27:56.825837-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:27:56.82584-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:27:56.825842-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - Run: \"minikube delete -p stopped-upgrade-731000\", then \"minikube start -p stopped-upgrade-731000 --alsologtostderr -v=1\" to try again with more logging\n"} +{"Time":"2023-05-31T12:27:56.825847-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:27:56.825849-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:27:56.825851-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:27:56.825857-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 914.73 KiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 6.31 MiB / \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 10.71 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 12.71 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 17.72 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 22.41 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 28.02 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 34.49 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 42.47 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 50.50 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 58.28 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 66.60 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4"} +{"Time":"2023-05-31T12:27:56.825864-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":": 73.43 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 81.17 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 90.34 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 96.56 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 104.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 112.50 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 120.69 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 129.05 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 139.61 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 152.00 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 165.28 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 176.19 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 187.50 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar."} +{"Time":"2023-05-31T12:27:56.825868-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"lz4: 188.78 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 198.39 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 212.08 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 217.83 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 227.73 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 232.66 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 243.47 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 250.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 260.47 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 265.16 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 274.03 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 281.53 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 288.53 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.t"} +{"Time":"2023-05-31T12:27:56.825871-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"ar.lz4: 299.05 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 310.51 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 320.81 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 328.39 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 339.56 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 350.81 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 360.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 365.05 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 378.25 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 386.80 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 398.45 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 406.73 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 415.67 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd6"} +{"Time":"2023-05-31T12:27:56.825879-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"4.tar.lz4: 424.45 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 432.67 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 440.95 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 449.45 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 458.73 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 468.31 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 476.78 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 487.69 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 495.89 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 504.22 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 512.02 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 518.05 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 528.64 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-a"} +{"Time":"2023-05-31T12:27:56.825882-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"md64.tar.lz4: 537.83 MiB \u003e preloaded-images-k8s-v2-v1.18.0-docker-overlay2-amd64.tar.lz4: 542.91 MiB* \n"} +{"Time":"2023-05-31T12:27:56.825885-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tX Unable to start VM after repeated tries. Please try {{'minikube delete' if possible: creating host: create: provisioning: ssh command error:\n"} +{"Time":"2023-05-31T12:27:56.825887-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tcommand : sudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:27:56.825889-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \terr : Process exited with status 1\n"} +{"Time":"2023-05-31T12:27:56.825894-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \toutput : --- /lib/systemd/system/docker.service\t2019-08-29 04:42:14.000000000 +0000\n"} +{"Time":"2023-05-31T12:27:56.825896-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:27:54.437610836 +0000\n"} +{"Time":"2023-05-31T12:27:56.825898-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t@@ -8,24 +8,22 @@\n"} +{"Time":"2023-05-31T12:27:56.8259-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.825903-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:27:56.825905-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:27:56.825907-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:27:56.825909-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:27:56.825911-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:27:56.825913-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:27:56.825916-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:27:56.825917-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-TimeoutSec=0\n"} +{"Time":"2023-05-31T12:27:56.825919-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:27:56.825921-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:27:56.825923-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:27:56.825925-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:27:56.825928-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:27:56.82593-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:27:56.825932-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:27:56.825934-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-\n"} +{"Time":"2023-05-31T12:27:56.825936-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:27:56.825938-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:27:56.82594-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:27:56.825943-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:27:56.825944-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.825946-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.825948-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.82595-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:27:56.825952-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:27:56.825956-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:27:56.825958-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:27:56.82596-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:27:56.825962-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:27:56.825964-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:27:56.825966-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:27:56.825968-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:27:56.825971-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:27:56.825973-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:27:56.825976-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:27:56.825979-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+ExecReload=/bin/kill -s HUP \n"} +{"Time":"2023-05-31T12:27:56.825981-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.825982-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:27:56.825985-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:27:56.825987-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t@@ -33,9 +31,10 @@\n"} +{"Time":"2023-05-31T12:27:56.825988-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:27:56.82599-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:27:56.825995-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.825997-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:27:56.825999-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:27:56.826001-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:27:56.826003-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:27:56.826005-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:27:56.826007-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:27:56.826009-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:27:56.826011-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:27:56.826013-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:27:56.826015-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:27:56.826017-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:27:56.826019-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:27:56.826021-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:27:56.826023-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* minikube is exiting due to an error. If the above message is not useful, open an issue:\n"} +{"Time":"2023-05-31T12:27:56.826025-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - https://github.com/kubernetes/minikube/issues/new/choose\n"} +{"Time":"2023-05-31T12:27:56.826027-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:27:56.826029-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:27:57.929596-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1136906741.exe start -p stopped-upgrade-731000 --memory=2200 --vm-driver=docker \n"} +{"Time":"2023-05-31T12:28:01.976136-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1136906741.exe start -p stopped-upgrade-731000 --memory=2200 --vm-driver=docker : exit status 70 (4.046385845s)\n"} +{"Time":"2023-05-31T12:28:01.976152-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:01.976155-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:28:01.976158-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* [stopped-upgrade-731000] minikube v1.9.0 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:28:01.976165-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:28:01.976173-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:28:01.976179-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:28:01.976186-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:28:01.976191-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:28:01.976194-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - KUBECONFIG=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/legacy_kubeconfig3188562272\n"} +{"Time":"2023-05-31T12:28:01.976196-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:28:01.976198-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:28:01.9762-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Updating the running docker \"stopped-upgrade-731000\" container ...\n"} +{"Time":"2023-05-31T12:28:01.976202-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:01.976204-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:28:01.976206-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:28:01.976208-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:28:01.976212-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tX Failed to enable container runtime: enable docker.: sudo systemctl start docker: exit status 1\n"} +{"Time":"2023-05-31T12:28:01.976215-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:28:01.976218-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:28:01.97622-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:28:01.976222-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:28:01.976224-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:28:01.976226-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:28:01.976228-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:28:01.97623-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* minikube is exiting due to an error. If the above message is not useful, open an issue:\n"} +{"Time":"2023-05-31T12:28:01.976232-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - https://github.com/kubernetes/minikube/issues/new/choose\n"} +{"Time":"2023-05-31T12:28:01.976243-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:01.976245-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:28:03.851683-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Run: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1136906741.exe start -p stopped-upgrade-731000 --memory=2200 --vm-driver=docker \n"} +{"Time":"2023-05-31T12:28:07.930626-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Non-zero exit: /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube-v1.9.0.1136906741.exe start -p stopped-upgrade-731000 --memory=2200 --vm-driver=docker : exit status 70 (4.078805877s)\n"} +{"Time":"2023-05-31T12:28:07.930641-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:07.930644-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:28:07.930647-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* [stopped-upgrade-731000] minikube v1.9.0 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:28:07.930649-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:28:07.930652-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:28:07.930654-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:28:07.930656-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:28:07.930659-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:28:07.930661-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - KUBECONFIG=/var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/legacy_kubeconfig2369297050\n"} +{"Time":"2023-05-31T12:28:07.930663-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:28:07.930665-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:28:07.930667-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* Updating the running docker \"stopped-upgrade-731000\" container ...\n"} +{"Time":"2023-05-31T12:28:07.93067-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:07.930672-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:28:07.930674-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:28:07.930676-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:28:07.930678-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tX Failed to enable container runtime: enable docker.: sudo systemctl start docker: exit status 1\n"} +{"Time":"2023-05-31T12:28:07.93068-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:28:07.930689-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:28:07.930694-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:28:07.930696-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tJob for docker.service failed because the control process exited with error code.\n"} +{"Time":"2023-05-31T12:28:07.930701-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \tSee \"systemctl status docker.service\" and \"journalctl -xe\" for details.\n"} +{"Time":"2023-05-31T12:28:07.930703-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:28:07.930705-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:28:07.930708-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t* minikube is exiting due to an error. If the above message is not useful, open an issue:\n"} +{"Time":"2023-05-31T12:28:07.93071-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \t - https://github.com/kubernetes/minikube/issues/new/choose\n"} +{"Time":"2023-05-31T12:28:07.930712-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:07.930714-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:28:07.930722-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:201: legacy v1.9.0 start failed: exit status 70\n"} +{"Time":"2023-05-31T12:28:07.930799-07:00","Action":"run","Test":"TestStoppedBinaryUpgrade/MinikubeLogs"} +{"Time":"2023-05-31T12:28:07.930807-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":"=== RUN TestStoppedBinaryUpgrade/MinikubeLogs\n"} +{"Time":"2023-05-31T12:28:07.930846-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" version_upgrade_test.go:218: (dbg) Run: out/minikube-darwin-amd64 logs -p stopped-upgrade-731000\n"} +{"Time":"2023-05-31T12:28:11.399374-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" version_upgrade_test.go:218: (dbg) Done: out/minikube-darwin-amd64 logs -p stopped-upgrade-731000: (3.468425887s)\n"} +{"Time":"2023-05-31T12:28:11.401464-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" version_upgrade_test.go:223: *** TestStoppedBinaryUpgrade FAILED at 2023-05-31 12:28:11.401413 -0700 PDT m=+2712.506171275\n"} +{"Time":"2023-05-31T12:28:11.401478-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:28:11.401481-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:230: ======\u003e post-mortem[TestStoppedBinaryUpgrade]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:28:11.401538-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:231: (dbg) Run: docker inspect stopped-upgrade-731000\n"} +{"Time":"2023-05-31T12:28:11.452244-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:235: (dbg) docker inspect stopped-upgrade-731000:\n"} +{"Time":"2023-05-31T12:28:11.452259-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:11.452262-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:28:11.452265-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t[\n"} +{"Time":"2023-05-31T12:28:11.452267-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.452269-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Id\": \"7aaff6f7457fde1a2bbb4555711f215c5f79ad4ad29228cb4bf97a512a41f27a\",\n"} +{"Time":"2023-05-31T12:28:11.452271-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Created\": \"2023-05-31T19:27:43.52711915Z\",\n"} +{"Time":"2023-05-31T12:28:11.452273-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:28:11.452276-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:28:11.45228-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:28:11.452283-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.452286-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:28:11.452291-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:28:11.452294-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:28:11.452302-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:28:11.452304-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:28:11.452306-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:28:11.452308-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:28:11.45231-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Pid\": 193664,\n"} +{"Time":"2023-05-31T12:28:11.452312-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452314-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452316-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"StartedAt\": \"2023-05-31T19:27:43.735142048Z\",\n"} +{"Time":"2023-05-31T12:28:11.452319-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:28:11.452322-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452324-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Image\": \"sha256:11589cdc9ef4b67a64cc243dd3cf013e81ad02bbed105fc37dc07aa272044680\",\n"} +{"Time":"2023-05-31T12:28:11.452326-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/7aaff6f7457fde1a2bbb4555711f215c5f79ad4ad29228cb4bf97a512a41f27a/resolv.conf\",\n"} +{"Time":"2023-05-31T12:28:11.452328-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/7aaff6f7457fde1a2bbb4555711f215c5f79ad4ad29228cb4bf97a512a41f27a/hostname\",\n"} +{"Time":"2023-05-31T12:28:11.452331-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/7aaff6f7457fde1a2bbb4555711f215c5f79ad4ad29228cb4bf97a512a41f27a/hosts\",\n"} +{"Time":"2023-05-31T12:28:11.452333-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"LogPath\": \"/var/lib/docker/containers/7aaff6f7457fde1a2bbb4555711f215c5f79ad4ad29228cb4bf97a512a41f27a/7aaff6f7457fde1a2bbb4555711f215c5f79ad4ad29228cb4bf97a512a41f27a-json.log\",\n"} +{"Time":"2023-05-31T12:28:11.452335-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Name\": \"/stopped-upgrade-731000\",\n"} +{"Time":"2023-05-31T12:28:11.452337-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452339-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:28:11.452341-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:28:11.452343-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452345-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452347-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452349-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:28:11.452351-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:28:11.452353-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:28:11.452356-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:28:11.452359-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"stopped-upgrade-731000:/var\"\n"} +{"Time":"2023-05-31T12:28:11.452362-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.452364-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452366-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:28:11.452368-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:28:11.45237-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:28:11.452372-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452374-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"NetworkMode\": \"default\",\n"} +{"Time":"2023-05-31T12:28:11.452377-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:28:11.452379-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:28:11.452382-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.452388-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:28:11.452394-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:28:11.452398-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.452405-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.452409-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:28:11.452415-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.452421-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:28:11.452428-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:28:11.452431-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.452434-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.452437-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:28:11.45244-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.452443-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:28:11.452446-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:28:11.452449-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.452452-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ]\n"} +{"Time":"2023-05-31T12:28:11.452454-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452456-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:28:11.452458-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:28:11.452461-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:28:11.452496-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452505-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:28:11.452513-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.45252-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:28:11.452525-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:28:11.452532-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:28:11.452537-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t 0\n"} +{"Time":"2023-05-31T12:28:11.452543-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.452547-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:28:11.452551-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:28:11.452554-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:28:11.452558-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:28:11.452561-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:28:11.452564-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:28:11.452567-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:28:11.452571-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:28:11.452574-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:28:11.452577-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.45258-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:28:11.452583-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452585-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452587-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:28:11.452591-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:28:11.452594-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:28:11.452597-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:28:11.4526-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:28:11.452604-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:28:11.452607-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.45262-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:28:11.452624-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452628-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:28:11.452631-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452634-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452637-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452643-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:28:11.452646-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:28:11.452649-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.45267-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452674-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:28:11.452677-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:28:11.452681-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452685-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452688-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:28:11.452692-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:28:11.452695-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:28:11.452698-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:28:11.452701-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:28:11.452703-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452705-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452707-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:28:11.45271-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452713-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452717-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.45272-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:28:11.452723-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:28:11.452726-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:28:11.45274-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452743-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MemorySwap\": 4613734400,\n"} +{"Time":"2023-05-31T12:28:11.452745-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:28:11.452747-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:28:11.452772-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:28:11.452775-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:28:11.452777-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452779-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452781-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452783-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:28:11.452785-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:28:11.452787-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:28:11.452789-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452791-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:28:11.452795-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:28:11.4528-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/6b1374a49c9768687e087d39ef5961a0ce78b637712ab3a3566eb0f1b3897306-init/diff:/var/lib/docker/overlay2/0c3a416314c4e7fe936ca9f61a79837a3cc9b3e9391bccc0ab51cc63d0c5ce05/diff:/var/lib/docker/overlay2/48e75d11fc6717e06c185692060de9bb0b651b971494e2985d913c01c2b447ab/diff:/var/lib/docker/overlay2/0c5df48089c7575b31e6e7653316fc4f27b276287b05cf8ff99323202703efb1/diff:/var/lib/docker/overlay2/d1d6f12c160307290b50c99bd9586c912f1f6e709ed45da6e66c653a8102855b/diff:/var/lib/docker/overlay2/758e17203f56b88c19e6999443e47ddcdcb57fdf8e4db138b367b14b06c8a699/diff:/var/lib/docker/overlay2/5d279dce0f2f5535bf8aa3319ca950a3361a8cc4a5caf724dccd158ab206f770/diff:/var/lib/docker/overlay2/0418f668547e7dc87d742108c2a43275aaf4acda2ec167234dfa190430a87b93/diff:/var/lib/docker/overlay2/d28c4482830942fd1476d578724dcebf95f968dec80f1b3ee9ce0b20eb108b84/diff:/var/lib/docker/overlay2/e994f5f9cec627739a871855b03e64ca7c630292cec77e4c60c75b6b80eb183a/diff:/var/lib/docker/overlay2/aaa525"} +{"Time":"2023-05-31T12:28:11.452809-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"6e26a9bf76b033d892c2a85cd6519031d9b79bc1ca76bc0c9b708858d7/diff:/var/lib/docker/overlay2/666d187998007a8b9a755044257f20417db7e54bf435dc4fc241b654996f0883/diff:/var/lib/docker/overlay2/46cc55e74ec52c30a9d921b80d400dae4aa74e765afd313b8da080d55c491652/diff:/var/lib/docker/overlay2/96a3ba431f717bf4ef8ac581e5b7e0c5ee07f2b81331f15f81f647fc0b4c2f03/diff:/var/lib/docker/overlay2/72077e5b6a9354549d9a34c5eb6e529142f073ac44b4ce0b4f9bba8dbc5c5a2e/diff:/var/lib/docker/overlay2/edc43a602bcf154454598bc7f4e719477c7edb496a4459831ed923e8f7e94f2e/diff:/var/lib/docker/overlay2/29b95372b9163e25a58ccf92381dc52c90d746583473ffaedd9e60543b467078/diff:/var/lib/docker/overlay2/86ae04e6ee55b45776e59d67905bcb2dd5dc047fe299c0da808fc0855b9737ce/diff:/var/lib/docker/overlay2/0f15afae3ed939bb5e3218f886dfa2fe740365ccc7db1dfb2ab24cbbe59fd4f2/diff:/var/lib/docker/overlay2/80512f85d47882a64ad5d7ef44e2512b6c7ca4e5dcb115241e3b23099245b4c4/diff:/var/lib/docker/overlay2/2ba32bd2aed84fbae5b8a42d317c70d68178fcee8dc5730b3ca53942dc311068/diff:/var/lib/d"} +{"Time":"2023-05-31T12:28:11.452814-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"ocker/overlay2/384bcc48c3626bb94eedded876c4b2796bd6cbf4fb0defe6985ddc27f01ef2c6/diff\",\n"} +{"Time":"2023-05-31T12:28:11.452817-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/6b1374a49c9768687e087d39ef5961a0ce78b637712ab3a3566eb0f1b3897306/merged\",\n"} +{"Time":"2023-05-31T12:28:11.452821-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/6b1374a49c9768687e087d39ef5961a0ce78b637712ab3a3566eb0f1b3897306/diff\",\n"} +{"Time":"2023-05-31T12:28:11.452825-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/6b1374a49c9768687e087d39ef5961a0ce78b637712ab3a3566eb0f1b3897306/work\"\n"} +{"Time":"2023-05-31T12:28:11.452828-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452831-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:28:11.452834-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452837-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:28:11.452841-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.452844-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:28:11.452848-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Name\": \"stopped-upgrade-731000\",\n"} +{"Time":"2023-05-31T12:28:11.452851-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Source\": \"/var/lib/docker/volumes/stopped-upgrade-731000/_data\",\n"} +{"Time":"2023-05-31T12:28:11.452854-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:28:11.452857-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:28:11.452859-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:28:11.452861-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:28:11.452864-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:28:11.452867-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.45287-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.452872-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:28:11.452874-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:28:11.452878-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:28:11.45288-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:28:11.452882-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:28:11.452884-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:28:11.452887-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.452888-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.45289-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:28:11.452893-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Hostname\": \"stopped-upgrade-731000\",\n"} +{"Time":"2023-05-31T12:28:11.452895-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452897-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"User\": \"root\",\n"} +{"Time":"2023-05-31T12:28:11.452899-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:28:11.452901-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:28:11.452903-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:28:11.452905-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:28:11.452907-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:28:11.452911-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:28:11.452913-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:28:11.452915-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452918-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:28:11.452922-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:28:11.452925-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:28:11.452929-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:28:11.452932-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\n"} +{"Time":"2023-05-31T12:28:11.452936-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"container=docker\"\n"} +{"Time":"2023-05-31T12:28:11.452939-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.452942-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:28:11.452946-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase:v0.0.8@sha256:2f3380ebf1bb0c75b0b47160fd4e61b7b8fef0f1f32f9def108d3eada50a7a81\",\n"} +{"Time":"2023-05-31T12:28:11.452949-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:28:11.452953-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"WorkingDir\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452956-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:28:11.452959-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:28:11.452963-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:28:11.452969-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.452972-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:28:11.452975-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:28:11.452978-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:28:11.452981-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"mode.minikube.sigs.k8s.io\": \"stopped-upgrade-731000\",\n"} +{"Time":"2023-05-31T12:28:11.452984-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"name.minikube.sigs.k8s.io\": \"stopped-upgrade-731000\",\n"} +{"Time":"2023-05-31T12:28:11.452986-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:28:11.452988-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.45299-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:28:11.452992-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.452994-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:28:11.452996-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.452998-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"SandboxID\": \"2f588bdb06f3390da63897eb78636911a8e2974cee7e4184238de6a3436ca0c7\",\n"} +{"Time":"2023-05-31T12:28:11.453001-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:28:11.453015-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.453019-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:28:11.453023-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:28:11.453025-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:28:11.453028-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.453032-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:28:11.453034-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostPort\": \"51853\"\n"} +{"Time":"2023-05-31T12:28:11.453036-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.453038-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.45304-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:28:11.453043-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.453062-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:28:11.453067-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostPort\": \"51854\"\n"} +{"Time":"2023-05-31T12:28:11.45307-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.453072-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:28:11.453074-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:28:11.453076-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:28:11.453081-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:28:11.453083-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"HostPort\": \"51855\"\n"} +{"Time":"2023-05-31T12:28:11.453086-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.453089-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t ]\n"} +{"Time":"2023-05-31T12:28:11.453102-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:28:11.453107-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/2f588bdb06f3\",\n"} +{"Time":"2023-05-31T12:28:11.45311-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:28:11.453113-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:28:11.453116-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"EndpointID\": \"e84b81ab8026d6821178b0ccd0074c64ad9b4e1635438bd16cc3130a2a8772b6\",\n"} +{"Time":"2023-05-31T12:28:11.453132-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Gateway\": \"172.17.0.1\",\n"} +{"Time":"2023-05-31T12:28:11.453136-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.453139-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:28:11.45315-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IPAddress\": \"172.17.0.2\",\n"} +{"Time":"2023-05-31T12:28:11.453157-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IPPrefixLen\": 16,\n"} +{"Time":"2023-05-31T12:28:11.453161-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.453163-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MacAddress\": \"02:42:ac:11:00:02\",\n"} +{"Time":"2023-05-31T12:28:11.453166-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:28:11.453174-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"bridge\": {\n"} +{"Time":"2023-05-31T12:28:11.453176-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IPAMConfig\": null,\n"} +{"Time":"2023-05-31T12:28:11.453178-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:28:11.45318-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Aliases\": null,\n"} +{"Time":"2023-05-31T12:28:11.453183-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"NetworkID\": \"f44bb8cfb525a91b87ee628261c923ef34271b2ecd0e8b38de2944ec8999828f\",\n"} +{"Time":"2023-05-31T12:28:11.453185-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"EndpointID\": \"e84b81ab8026d6821178b0ccd0074c64ad9b4e1635438bd16cc3130a2a8772b6\",\n"} +{"Time":"2023-05-31T12:28:11.453187-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"Gateway\": \"172.17.0.1\",\n"} +{"Time":"2023-05-31T12:28:11.453189-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IPAddress\": \"172.17.0.2\",\n"} +{"Time":"2023-05-31T12:28:11.453191-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IPPrefixLen\": 16,\n"} +{"Time":"2023-05-31T12:28:11.453194-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.453196-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:28:11.453198-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:28:11.4532-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"MacAddress\": \"02:42:ac:11:00:02\",\n"} +{"Time":"2023-05-31T12:28:11.453202-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:28:11.453205-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.453208-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.45321-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.453212-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:28:11.453214-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t]\n"} +{"Time":"2023-05-31T12:28:11.453216-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:11.453218-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:28:11.453222-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p stopped-upgrade-731000 -n stopped-upgrade-731000\n"} +{"Time":"2023-05-31T12:28:11.79398-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p stopped-upgrade-731000 -n stopped-upgrade-731000: exit status 6 (341.578116ms)\n"} +{"Time":"2023-05-31T12:28:11.793993-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:11.793996-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:28:11.793998-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:28:11.794-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:28:11.794017-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:28:11.79402-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:11.794022-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:28:11.794024-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:28:11.794027-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \tE0531 12:28:11.783157 11455 status.go:415] kubeconfig endpoint: extract IP: \"stopped-upgrade-731000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:28:11.794035-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:28:11.794037-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:28:11.794039-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:28:11.794043-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:241: \"stopped-upgrade-731000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:28:11.794046-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:175: Cleaning up \"stopped-upgrade-731000\" profile ...\n"} +{"Time":"2023-05-31T12:28:11.794049-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p stopped-upgrade-731000\n"} +{"Time":"2023-05-31T12:28:14.034354-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p stopped-upgrade-731000: (2.240229763s)\n"} +{"Time":"2023-05-31T12:28:14.034375-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"--- FAIL: TestStoppedBinaryUpgrade (68.52s)\n"} +{"Time":"2023-05-31T12:28:14.034379-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Setup","Output":" --- PASS: TestStoppedBinaryUpgrade/Setup (3.38s)\n"} +{"Time":"2023-05-31T12:28:14.034382-07:00","Action":"pass","Test":"TestStoppedBinaryUpgrade/Setup","Elapsed":3.38} +{"Time":"2023-05-31T12:28:14.034387-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" --- FAIL: TestStoppedBinaryUpgrade/Upgrade (59.04s)\n"} +{"Time":"2023-05-31T12:28:14.03439-07:00","Action":"fail","Test":"TestStoppedBinaryUpgrade/Upgrade","Elapsed":59.04} +{"Time":"2023-05-31T12:28:14.034394-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" --- PASS: TestStoppedBinaryUpgrade/MinikubeLogs (3.47s)\n"} +{"Time":"2023-05-31T12:28:14.034397-07:00","Action":"pass","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Elapsed":3.47} +{"Time":"2023-05-31T12:28:14.0344-07:00","Action":"fail","Test":"TestStoppedBinaryUpgrade","Elapsed":68.52} +{"Time":"2023-05-31T12:28:14.034416-07:00","Action":"cont","Test":"TestPause"} +{"Time":"2023-05-31T12:28:14.034422-07:00","Action":"output","Test":"TestPause","Output":"=== CONT TestPause\n"} +{"Time":"2023-05-31T12:28:14.034451-07:00","Action":"run","Test":"TestPause/serial"} +{"Time":"2023-05-31T12:28:14.034454-07:00","Action":"output","Test":"TestPause/serial","Output":"=== RUN TestPause/serial\n"} +{"Time":"2023-05-31T12:28:14.034484-07:00","Action":"run","Test":"TestPause/serial/Start"} +{"Time":"2023-05-31T12:28:14.034492-07:00","Action":"output","Test":"TestPause/serial/Start","Output":"=== RUN TestPause/serial/Start\n"} +{"Time":"2023-05-31T12:28:14.034537-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" pause_test.go:80: (dbg) Run: out/minikube-darwin-amd64 start -p pause-383000 --memory=2048 --install-addons=false --wait=all --driver=docker \n"} +{"Time":"2023-05-31T12:28:46.669063-07:00","Action":"output","Test":"TestPause/serial/Start","Output":"E0531 12:28:46.669004 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:28:53.49559-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" pause_test.go:80: (dbg) Done: out/minikube-darwin-amd64 start -p pause-383000 --memory=2048 --install-addons=false --wait=all --driver=docker : (39.460642795s)\n"} +{"Time":"2023-05-31T12:28:53.495626-07:00","Action":"run","Test":"TestPause/serial/SecondStartNoReconfiguration"} +{"Time":"2023-05-31T12:28:53.495638-07:00","Action":"output","Test":"TestPause/serial/SecondStartNoReconfiguration","Output":"=== RUN TestPause/serial/SecondStartNoReconfiguration\n"} +{"Time":"2023-05-31T12:28:53.495703-07:00","Action":"output","Test":"TestPause/serial/SecondStartNoReconfiguration","Output":" pause_test.go:92: (dbg) Run: out/minikube-darwin-amd64 start -p pause-383000 --alsologtostderr -v=1 --driver=docker \n"} +{"Time":"2023-05-31T12:29:34.672447-07:00","Action":"output","Test":"TestPause/serial/SecondStartNoReconfiguration","Output":" pause_test.go:92: (dbg) Done: out/minikube-darwin-amd64 start -p pause-383000 --alsologtostderr -v=1 --driver=docker : (41.176358186s)\n"} +{"Time":"2023-05-31T12:29:34.687018-07:00","Action":"run","Test":"TestPause/serial/Pause"} +{"Time":"2023-05-31T12:29:34.687031-07:00","Action":"output","Test":"TestPause/serial/Pause","Output":"=== RUN TestPause/serial/Pause\n"} +{"Time":"2023-05-31T12:29:34.687034-07:00","Action":"output","Test":"TestPause/serial/Pause","Output":" pause_test.go:110: (dbg) Run: out/minikube-darwin-amd64 pause -p pause-383000 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T12:29:35.326028-07:00","Action":"run","Test":"TestPause/serial/VerifyStatus"} +{"Time":"2023-05-31T12:29:35.326042-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":"=== RUN TestPause/serial/VerifyStatus\n"} +{"Time":"2023-05-31T12:29:35.326095-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" status_test.go:76: (dbg) Run: out/minikube-darwin-amd64 status -p pause-383000 --output=json --layout=cluster\n"} +{"Time":"2023-05-31T12:29:35.692874-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" status_test.go:76: (dbg) Non-zero exit: out/minikube-darwin-amd64 status -p pause-383000 --output=json --layout=cluster: exit status 2 (366.684848ms)\n"} +{"Time":"2023-05-31T12:29:35.692887-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" \n"} +{"Time":"2023-05-31T12:29:35.69289-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:29:35.692895-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" \t{\"Name\":\"pause-383000\",\"StatusCode\":418,\"StatusName\":\"Paused\",\"Step\":\"Done\",\"StepDetail\":\"* Paused 12 containers in: kube-system, kubernetes-dashboard, storage-gluster, istio-operator\",\"BinaryVersion\":\"v1.30.1\",\"Components\":{\"kubeconfig\":{\"Name\":\"kubeconfig\",\"StatusCode\":200,\"StatusName\":\"OK\"}},\"Nodes\":[{\"Name\":\"pause-383000\",\"StatusCode\":200,\"StatusName\":\"OK\",\"Components\":{\"apiserver\":{\"Name\":\"apiserver\",\"StatusCode\":418,\"StatusName\":\"Paused\"},\"kubelet\":{\"Name\":\"kubelet\",\"StatusCode\":405,\"StatusName\":\"Stopped\"}}}]}\n"} +{"Time":"2023-05-31T12:29:35.692905-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" \n"} +{"Time":"2023-05-31T12:29:35.692907-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:29:35.69297-07:00","Action":"run","Test":"TestPause/serial/Unpause"} +{"Time":"2023-05-31T12:29:35.692976-07:00","Action":"output","Test":"TestPause/serial/Unpause","Output":"=== RUN TestPause/serial/Unpause\n"} +{"Time":"2023-05-31T12:29:35.693004-07:00","Action":"output","Test":"TestPause/serial/Unpause","Output":" pause_test.go:121: (dbg) Run: out/minikube-darwin-amd64 unpause -p pause-383000 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T12:29:36.294383-07:00","Action":"run","Test":"TestPause/serial/PauseAgain"} +{"Time":"2023-05-31T12:29:36.2944-07:00","Action":"output","Test":"TestPause/serial/PauseAgain","Output":"=== RUN TestPause/serial/PauseAgain\n"} +{"Time":"2023-05-31T12:29:36.294475-07:00","Action":"output","Test":"TestPause/serial/PauseAgain","Output":" pause_test.go:110: (dbg) Run: out/minikube-darwin-amd64 pause -p pause-383000 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T12:29:36.974033-07:00","Action":"run","Test":"TestPause/serial/DeletePaused"} +{"Time":"2023-05-31T12:29:36.974047-07:00","Action":"output","Test":"TestPause/serial/DeletePaused","Output":"=== RUN TestPause/serial/DeletePaused\n"} +{"Time":"2023-05-31T12:29:36.974078-07:00","Action":"output","Test":"TestPause/serial/DeletePaused","Output":" pause_test.go:132: (dbg) Run: out/minikube-darwin-amd64 delete -p pause-383000 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T12:29:39.451705-07:00","Action":"output","Test":"TestPause/serial/DeletePaused","Output":" pause_test.go:132: (dbg) Done: out/minikube-darwin-amd64 delete -p pause-383000 --alsologtostderr -v=5: (2.477543236s)\n"} +{"Time":"2023-05-31T12:29:39.451737-07:00","Action":"run","Test":"TestPause/serial/VerifyDeletedResources"} +{"Time":"2023-05-31T12:29:39.45174-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":"=== RUN TestPause/serial/VerifyDeletedResources\n"} +{"Time":"2023-05-31T12:29:39.45179-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" pause_test.go:142: (dbg) Run: out/minikube-darwin-amd64 profile list --output json\n"} +{"Time":"2023-05-31T12:29:39.800978-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" pause_test.go:168: (dbg) Run: docker ps -a\n"} +{"Time":"2023-05-31T12:29:39.851444-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" pause_test.go:173: (dbg) Run: docker volume inspect pause-383000\n"} +{"Time":"2023-05-31T12:29:39.90006-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" pause_test.go:173: (dbg) Non-zero exit: docker volume inspect pause-383000: exit status 1 (48.504248ms)\n"} +{"Time":"2023-05-31T12:29:39.900074-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" \n"} +{"Time":"2023-05-31T12:29:39.900077-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:29:39.900079-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" \t[]\n"} +{"Time":"2023-05-31T12:29:39.900081-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" \n"} +{"Time":"2023-05-31T12:29:39.900083-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:29:39.900086-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:29:39.900088-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" \tError response from daemon: get pause-383000: no such volume\n"} +{"Time":"2023-05-31T12:29:39.90009-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" \n"} +{"Time":"2023-05-31T12:29:39.900092-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:29:39.900115-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" pause_test.go:178: (dbg) Run: docker network ls\n"} +{"Time":"2023-05-31T12:29:39.949868-07:00","Action":"output","Test":"TestPause","Output":" helpers_test.go:175: Cleaning up \"pause-383000\" profile ...\n"} +{"Time":"2023-05-31T12:29:39.949883-07:00","Action":"output","Test":"TestPause","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p pause-383000\n"} +{"Time":"2023-05-31T12:29:40.30659-07:00","Action":"output","Test":"TestPause","Output":"--- PASS: TestPause (86.27s)\n"} +{"Time":"2023-05-31T12:29:40.306604-07:00","Action":"output","Test":"TestPause/serial","Output":" --- PASS: TestPause/serial (85.91s)\n"} +{"Time":"2023-05-31T12:29:40.306609-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" --- PASS: TestPause/serial/Start (39.46s)\n"} +{"Time":"2023-05-31T12:29:40.306614-07:00","Action":"pass","Test":"TestPause/serial/Start","Elapsed":39.46} +{"Time":"2023-05-31T12:29:40.306618-07:00","Action":"output","Test":"TestPause/serial/SecondStartNoReconfiguration","Output":" --- PASS: TestPause/serial/SecondStartNoReconfiguration (41.19s)\n"} +{"Time":"2023-05-31T12:29:40.306622-07:00","Action":"pass","Test":"TestPause/serial/SecondStartNoReconfiguration","Elapsed":41.19} +{"Time":"2023-05-31T12:29:40.306648-07:00","Action":"output","Test":"TestPause/serial/Pause","Output":" --- PASS: TestPause/serial/Pause (0.64s)\n"} +{"Time":"2023-05-31T12:29:40.30666-07:00","Action":"pass","Test":"TestPause/serial/Pause","Elapsed":0.64} +{"Time":"2023-05-31T12:29:40.306664-07:00","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" --- PASS: TestPause/serial/VerifyStatus (0.37s)\n"} +{"Time":"2023-05-31T12:29:40.306667-07:00","Action":"pass","Test":"TestPause/serial/VerifyStatus","Elapsed":0.37} +{"Time":"2023-05-31T12:29:40.30667-07:00","Action":"output","Test":"TestPause/serial/Unpause","Output":" --- PASS: TestPause/serial/Unpause (0.60s)\n"} +{"Time":"2023-05-31T12:29:40.306673-07:00","Action":"pass","Test":"TestPause/serial/Unpause","Elapsed":0.6} +{"Time":"2023-05-31T12:29:40.306676-07:00","Action":"output","Test":"TestPause/serial/PauseAgain","Output":" --- PASS: TestPause/serial/PauseAgain (0.68s)\n"} +{"Time":"2023-05-31T12:29:40.306679-07:00","Action":"pass","Test":"TestPause/serial/PauseAgain","Elapsed":0.68} +{"Time":"2023-05-31T12:29:40.306682-07:00","Action":"output","Test":"TestPause/serial/DeletePaused","Output":" --- PASS: TestPause/serial/DeletePaused (2.48s)\n"} +{"Time":"2023-05-31T12:29:40.306685-07:00","Action":"pass","Test":"TestPause/serial/DeletePaused","Elapsed":2.48} +{"Time":"2023-05-31T12:29:40.306688-07:00","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" --- PASS: TestPause/serial/VerifyDeletedResources (0.50s)\n"} +{"Time":"2023-05-31T12:29:40.306691-07:00","Action":"pass","Test":"TestPause/serial/VerifyDeletedResources","Elapsed":0.5} +{"Time":"2023-05-31T12:29:40.306694-07:00","Action":"pass","Test":"TestPause/serial","Elapsed":85.91} +{"Time":"2023-05-31T12:29:40.306697-07:00","Action":"pass","Test":"TestPause","Elapsed":86.27} +{"Time":"2023-05-31T12:29:40.306699-07:00","Action":"cont","Test":"TestStartStop"} +{"Time":"2023-05-31T12:29:40.306702-07:00","Action":"output","Test":"TestStartStop","Output":"=== CONT TestStartStop\n"} +{"Time":"2023-05-31T12:29:40.306707-07:00","Action":"run","Test":"TestStartStop/group"} +{"Time":"2023-05-31T12:29:40.30671-07:00","Action":"output","Test":"TestStartStop/group","Output":"=== RUN TestStartStop/group\n"} +{"Time":"2023-05-31T12:29:40.306719-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T12:29:40.306721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== RUN TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T12:29:40.306724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== PAUSE TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T12:29:40.306727-07:00","Action":"pause","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T12:29:40.30673-07:00","Action":"run","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T12:29:40.306732-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== RUN TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T12:29:40.306737-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== PAUSE TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T12:29:40.30674-07:00","Action":"pause","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T12:29:40.306742-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T12:29:40.306745-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== RUN TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T12:29:40.306749-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== PAUSE TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T12:29:40.306752-07:00","Action":"pause","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T12:29:40.306774-07:00","Action":"run","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T12:29:40.306778-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== RUN TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T12:29:40.306782-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== PAUSE TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T12:29:40.306785-07:00","Action":"pause","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T12:29:40.30679-07:00","Action":"run","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T12:29:40.306792-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== RUN TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T12:29:40.306822-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== PAUSE TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T12:29:40.306831-07:00","Action":"pause","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T12:29:40.306838-07:00","Action":"run","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T12:29:40.306842-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== RUN TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T12:29:40.306876-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== PAUSE TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T12:29:40.306883-07:00","Action":"pause","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T12:29:40.30689-07:00","Action":"cont","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T12:29:40.306894-07:00","Action":"output","Test":"TestNoKubernetes","Output":"=== CONT TestNoKubernetes\n"} +{"Time":"2023-05-31T12:29:40.3069-07:00","Action":"run","Test":"TestNoKubernetes/serial"} +{"Time":"2023-05-31T12:29:40.306904-07:00","Action":"output","Test":"TestNoKubernetes/serial","Output":"=== RUN TestNoKubernetes/serial\n"} +{"Time":"2023-05-31T12:29:40.306945-07:00","Action":"run","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion"} +{"Time":"2023-05-31T12:29:40.306957-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":"=== RUN TestNoKubernetes/serial/StartNoK8sWithVersion\n"} +{"Time":"2023-05-31T12:29:40.307027-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" no_kubernetes_test.go:83: (dbg) Run: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --no-kubernetes --kubernetes-version=1.20 --driver=docker \n"} +{"Time":"2023-05-31T12:29:40.666665-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" no_kubernetes_test.go:83: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --no-kubernetes --kubernetes-version=1.20 --driver=docker : exit status 14 (359.470355ms)\n"} +{"Time":"2023-05-31T12:29:40.66668-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T12:29:40.666684-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:29:40.666687-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t* [NoKubernetes-881000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:29:40.66669-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:29:40.666693-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:29:40.666697-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:29:40.6667-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:29:40.666703-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:29:40.666707-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:29:40.66671-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T12:29:40.666712-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T12:29:40.666716-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T12:29:40.66673-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:29:40.666736-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:29:40.666739-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \tX Exiting due to MK_USAGE: cannot specify --kubernetes-version with --no-kubernetes,\n"} +{"Time":"2023-05-31T12:29:40.666742-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \tto unset a global config run:\n"} +{"Time":"2023-05-31T12:29:40.666745-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T12:29:40.666748-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t$ minikube config unset kubernetes-version\n"} +{"Time":"2023-05-31T12:29:40.666751-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T12:29:40.666754-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:29:40.666759-07:00","Action":"run","Test":"TestNoKubernetes/serial/StartWithK8s"} +{"Time":"2023-05-31T12:29:40.666762-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":"=== RUN TestNoKubernetes/serial/StartWithK8s\n"} +{"Time":"2023-05-31T12:29:40.666765-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:95: (dbg) Run: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --driver=docker \n"} +{"Time":"2023-05-31T12:30:06.191505-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:95: (dbg) Done: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --driver=docker : (25.524474065s)\n"} +{"Time":"2023-05-31T12:30:06.191524-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:200: (dbg) Run: out/minikube-darwin-amd64 -p NoKubernetes-881000 status -o json\n"} +{"Time":"2023-05-31T12:30:06.574411-07:00","Action":"run","Test":"TestNoKubernetes/serial/StartWithStopK8s"} +{"Time":"2023-05-31T12:30:06.574429-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":"=== RUN TestNoKubernetes/serial/StartWithStopK8s\n"} +{"Time":"2023-05-31T12:30:06.574459-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:112: (dbg) Run: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --no-kubernetes --driver=docker \n"} +{"Time":"2023-05-31T12:30:21.422237-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:112: (dbg) Done: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --no-kubernetes --driver=docker : (14.847575408s)\n"} +{"Time":"2023-05-31T12:30:21.422267-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:200: (dbg) Run: out/minikube-darwin-amd64 -p NoKubernetes-881000 status -o json\n"} +{"Time":"2023-05-31T12:30:21.771936-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:200: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p NoKubernetes-881000 status -o json: exit status 2 (349.620556ms)\n"} +{"Time":"2023-05-31T12:30:21.771949-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T12:30:21.771953-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:30:21.771956-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t{\"Name\":\"NoKubernetes-881000\",\"Host\":\"Running\",\"Kubelet\":\"Stopped\",\"APIServer\":\"Stopped\",\"Kubeconfig\":\"Configured\",\"Worker\":false}\n"} +{"Time":"2023-05-31T12:30:21.77196-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T12:30:21.771963-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:30:21.771968-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:124: (dbg) Run: out/minikube-darwin-amd64 delete -p NoKubernetes-881000\n"} +{"Time":"2023-05-31T12:30:24.055626-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:124: (dbg) Done: out/minikube-darwin-amd64 delete -p NoKubernetes-881000: (2.283539265s)\n"} +{"Time":"2023-05-31T12:30:24.055645-07:00","Action":"run","Test":"TestNoKubernetes/serial/Start"} +{"Time":"2023-05-31T12:30:24.055659-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":"=== RUN TestNoKubernetes/serial/Start\n"} +{"Time":"2023-05-31T12:30:24.055719-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" no_kubernetes_test.go:136: (dbg) Run: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --no-kubernetes --driver=docker \n"} +{"Time":"2023-05-31T12:30:30.775567-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" no_kubernetes_test.go:136: (dbg) Done: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --no-kubernetes --driver=docker : (6.719701068s)\n"} +{"Time":"2023-05-31T12:30:30.775585-07:00","Action":"run","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning"} +{"Time":"2023-05-31T12:30:30.775589-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":"=== RUN TestNoKubernetes/serial/VerifyK8sNotRunning\n"} +{"Time":"2023-05-31T12:30:30.775633-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" no_kubernetes_test.go:147: (dbg) Run: out/minikube-darwin-amd64 ssh -p NoKubernetes-881000 \"sudo systemctl is-active --quiet service kubelet\"\n"} +{"Time":"2023-05-31T12:30:31.117888-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" no_kubernetes_test.go:147: (dbg) Non-zero exit: out/minikube-darwin-amd64 ssh -p NoKubernetes-881000 \"sudo systemctl is-active --quiet service kubelet\": exit status 1 (342.161576ms)\n"} +{"Time":"2023-05-31T12:30:31.117913-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \n"} +{"Time":"2023-05-31T12:30:31.117917-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:30:31.117919-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \tssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:30:31.117924-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \n"} +{"Time":"2023-05-31T12:30:31.117926-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:30:31.117936-07:00","Action":"run","Test":"TestNoKubernetes/serial/ProfileList"} +{"Time":"2023-05-31T12:30:31.117939-07:00","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":"=== RUN TestNoKubernetes/serial/ProfileList\n"} +{"Time":"2023-05-31T12:30:31.117962-07:00","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" no_kubernetes_test.go:169: (dbg) Run: out/minikube-darwin-amd64 profile list\n"} +{"Time":"2023-05-31T12:30:31.701316-07:00","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" no_kubernetes_test.go:179: (dbg) Run: out/minikube-darwin-amd64 profile list --output=json\n"} +{"Time":"2023-05-31T12:30:32.292267-07:00","Action":"run","Test":"TestNoKubernetes/serial/Stop"} +{"Time":"2023-05-31T12:30:32.292282-07:00","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":"=== RUN TestNoKubernetes/serial/Stop\n"} +{"Time":"2023-05-31T12:30:32.292322-07:00","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":" no_kubernetes_test.go:158: (dbg) Run: out/minikube-darwin-amd64 stop -p NoKubernetes-881000\n"} +{"Time":"2023-05-31T12:30:33.820978-07:00","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":" no_kubernetes_test.go:158: (dbg) Done: out/minikube-darwin-amd64 stop -p NoKubernetes-881000: (1.528573216s)\n"} +{"Time":"2023-05-31T12:30:33.82102-07:00","Action":"run","Test":"TestNoKubernetes/serial/StartNoArgs"} +{"Time":"2023-05-31T12:30:33.821027-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":"=== RUN TestNoKubernetes/serial/StartNoArgs\n"} +{"Time":"2023-05-31T12:30:33.821046-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" no_kubernetes_test.go:191: (dbg) Run: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --driver=docker \n"} +{"Time":"2023-05-31T12:30:34.761093-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":"E0531 12:30:34.761056 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:30:36.858175-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:234: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.16.0 --alsologtostderr -v=1 --driver=docker : exit status 109 (4m19.436646892s)\n"} +{"Time":"2023-05-31T12:30:36.858187-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:30:36.85819-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:30:36.858192-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* [kubernetes-upgrade-496000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:30:36.858194-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:30:36.858196-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:30:36.858199-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:30:36.858201-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:30:36.858203-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:30:36.858205-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:30:36.858207-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T12:30:36.858209-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Using Docker Desktop driver with root privileges\n"} +{"Time":"2023-05-31T12:30:36.858211-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Starting control plane node kubernetes-upgrade-496000 in cluster kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858222-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:30:36.858224-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Creating docker container (CPUs=2, Memory=2200MB) ...\n"} +{"Time":"2023-05-31T12:30:36.858226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Preparing Kubernetes v1.16.0 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:30:36.858228-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:30:36.85823-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:30:36.858232-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:30:36.858234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:30:36.858236-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858238-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.85824-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:30:36.858242-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:30:36.858244-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:30:36.858246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.449650 10814 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:30:36.858248-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.449934 10814 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:30:36.85825-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.449944 10814 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:30:36.858252-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.449951 10814 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:30:36.858254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.450153 10814 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:30:36.858256-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.452583 10814 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:30:36.858259-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.476686 10814 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":3345,\"bootTime\":1685557832,\"procs\":405,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T12:30:36.858262-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:26:17.476772 10814 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:30:36.858264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.499011 10814 out.go:177] * [kubernetes-upgrade-496000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:30:36.858266-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.541566 10814 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:30:36.858268-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.541576 10814 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:30:36.85827-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.562705 10814 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:30:36.858272-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.583324 10814 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:30:36.858274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.604693 10814 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:30:36.858277-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.626497 10814 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:30:36.858279-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.685423 10814 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:30:36.858281-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.706978 10814 config.go:182] Loaded profile config \"cert-expiration-604000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:30:36.858283-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.707123 10814 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:30:36.858285-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.764515 10814 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T12:30:36.858287-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.764658 10814 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:30:36.858293-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.874951 10814 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:1 ContainersRunning:1 ContainersPaused:0 ContainersStopped:0 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:54 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:26:17.863768976 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:30:36.8583-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:30:36.858303-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:30:36.858308-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:30:36.858311-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:30:36.858313-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.896528 10814 out.go:177] * Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T12:30:36.858315-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.917627 10814 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T12:30:36.858318-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.917658 10814 start.go:875] validating driver \"docker\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:30:36.85832-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.917677 10814 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:30:36.858323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:17.921598 10814 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:30:36.858329-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.015227 10814 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:1 ContainersRunning:1 ContainersPaused:0 ContainersStopped:0 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:54 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:26:18.004006393 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:30:36.858332-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:30:36.858336-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:30:36.858348-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:30:36.858351-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:30:36.858353-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.015392 10814 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:30:36.858355-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.015562 10814 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T12:30:36.858358-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.037115 10814 out.go:177] * Using Docker Desktop driver with root privileges\n"} +{"Time":"2023-05-31T12:30:36.85836-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.058136 10814 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:30:36.858362-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.058163 10814 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:30:36.858364-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.058172 10814 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:30:36.85837-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{Name:kubernetes-upgrade-496000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:kubernetes-upgrade-496000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local C"} +{"Time":"2023-05-31T12:30:36.858373-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"ontainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:30:36.858377-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.101014 10814 out.go:177] * Starting control plane node kubernetes-upgrade-496000 in cluster kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858379-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.122307 10814 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T12:30:36.858382-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.144065 10814 out.go:177] * Pulling base image ...\n"} +{"Time":"2023-05-31T12:30:36.858384-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.186169 10814 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:30:36.858386-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.186187 10814 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T12:30:36.858388-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.186284 10814 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T12:30:36.858391-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.186314 10814 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:30:36.858393-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.186541 10814 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:30:36.858395-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.186579 10814 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T12:30:36.858397-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.187366 10814 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/config.json ...\n"} +{"Time":"2023-05-31T12:30:36.8584-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.187465 10814 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/config.json: {Name:mk1702b4ff2addf49fe64f41fa1031e6b0f750b5 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.858402-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.236612 10814 image.go:83] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon, skipping pull\n"} +{"Time":"2023-05-31T12:30:36.858405-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.236647 10814 cache.go:145] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in daemon, skipping load\n"} +{"Time":"2023-05-31T12:30:36.858407-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.236664 10814 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:30:36.858409-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.236697 10814 start.go:364] acquiring machines lock for kubernetes-upgrade-496000: {Name:mk3954cd8c0c11d207505234bed7198193db9e47 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.858415-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.236848 10814 start.go:368] acquired machines lock for \"kubernetes-upgrade-496000\" in 139.344µs\n"} +{"Time":"2023-05-31T12:30:36.858421-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.236873 10814 start.go:93] Provisioning new machine with config: \u0026{Name:kubernetes-upgrade-496000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:kubernetes-upgrade-496000 Namespace:default AP"} +{"Time":"2023-05-31T12:30:36.858429-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"IServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClient"} +{"Time":"2023-05-31T12:30:36.858434-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"Path: SocketVMnetPath: StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:30:36.858438-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.236955 10814 start.go:125] createHost starting for \"\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:30:36.858441-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.258358 10814 out.go:204] * Creating docker container (CPUs=2, Memory=2200MB) ...\n"} +{"Time":"2023-05-31T12:30:36.858443-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.258684 10814 start.go:159] libmachine.API.Create for \"kubernetes-upgrade-496000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:30:36.858446-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.258733 10814 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:30:36.858448-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.258914 10814 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:30:36.85845-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.258980 10814 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:30:36.858452-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.259010 10814 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:30:36.858454-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.259134 10814 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:30:36.858458-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.259189 10814 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:30:36.858461-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.259206 10814 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:30:36.858464-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.279271 10814 cli_runner.go:164] Run: docker network inspect kubernetes-upgrade-496000 --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\"\n"} +{"Time":"2023-05-31T12:30:36.858468-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:26:18.329271 10814 cli_runner.go:211] docker network inspect kubernetes-upgrade-496000 --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\" returned with exit code 1\n"} +{"Time":"2023-05-31T12:30:36.858474-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.329374 10814 network_create.go:281] running [docker network inspect kubernetes-upgrade-496000] to gather additional debugging logs...\n"} +{"Time":"2023-05-31T12:30:36.858476-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.329387 10814 cli_runner.go:164] Run: docker network inspect kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858478-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:26:18.379103 10814 cli_runner.go:211] docker network inspect kubernetes-upgrade-496000 returned with exit code 1\n"} +{"Time":"2023-05-31T12:30:36.858481-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.379128 10814 network_create.go:284] error running [docker network inspect kubernetes-upgrade-496000]: docker network inspect kubernetes-upgrade-496000: exit status 1\n"} +{"Time":"2023-05-31T12:30:36.858484-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.858487-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[]\n"} +{"Time":"2023-05-31T12:30:36.85849-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858493-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.858496-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tError response from daemon: network kubernetes-upgrade-496000 not found\n"} +{"Time":"2023-05-31T12:30:36.858499-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.379150 10814 network_create.go:286] output of [docker network inspect kubernetes-upgrade-496000]: -- stdout --\n"} +{"Time":"2023-05-31T12:30:36.858502-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[]\n"} +{"Time":"2023-05-31T12:30:36.858505-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858507-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:30:36.858509-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:30:36.858515-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tError response from daemon: network kubernetes-upgrade-496000 not found\n"} +{"Time":"2023-05-31T12:30:36.858533-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858538-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:30:36.858541-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.379230 10814 cli_runner.go:164] Run: docker network inspect bridge --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\"\n"} +{"Time":"2023-05-31T12:30:36.858544-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.430383 10814 network.go:212] skipping subnet 192.168.49.0/24 that is reserved: \u0026{IP:192.168.49.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.49.0/24 Gateway:192.168.49.1 ClientMin:192.168.49.2 ClientMax:192.168.49.254 Broadcast:192.168.49.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.858569-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.430714 10814 network.go:209] using free private subnet 192.168.58.0/24: \u0026{IP:192.168.58.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.58.0/24 Gateway:192.168.58.1 ClientMin:192.168.58.2 ClientMax:192.168.58.254 Broadcast:192.168.58.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:0xc000ebe930}\n"} +{"Time":"2023-05-31T12:30:36.858574-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.430727 10814 network_create.go:123] attempt to create docker network kubernetes-upgrade-496000 192.168.58.0/24 with gateway 192.168.58.1 and MTU of 65535 ...\n"} +{"Time":"2023-05-31T12:30:36.858579-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.430800 10814 cli_runner.go:164] Run: docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=kubernetes-upgrade-496000 kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.8586-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:26:18.479429 10814 cli_runner.go:211] docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=kubernetes-upgrade-496000 kubernetes-upgrade-496000 returned with exit code 1\n"} +{"Time":"2023-05-31T12:30:36.858605-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:26:18.479472 10814 network_create.go:148] failed to create docker network kubernetes-upgrade-496000 192.168.58.0/24 with gateway 192.168.58.1 and mtu of 65535: docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=kubernetes-upgrade-496000 kubernetes-upgrade-496000: exit status 1\n"} +{"Time":"2023-05-31T12:30:36.858608-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.85861-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858612-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.858614-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tError response from daemon: Pool overlaps with other one on this address space\n"} +{"Time":"2023-05-31T12:30:36.858616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:26:18.479487 10814 network_create.go:115] failed to create docker network kubernetes-upgrade-496000 192.168.58.0/24, will retry: subnet is taken\n"} +{"Time":"2023-05-31T12:30:36.858619-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.480825 10814 network.go:212] skipping subnet 192.168.58.0/24 that is reserved: \u0026{IP:192.168.58.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.58.0/24 Gateway:192.168.58.1 ClientMin:192.168.58.2 ClientMax:192.168.58.254 Broadcast:192.168.58.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.858622-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.481151 10814 network.go:209] using free private subnet 192.168.67.0/24: \u0026{IP:192.168.67.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.67.0/24 Gateway:192.168.67.1 ClientMin:192.168.67.2 ClientMax:192.168.67.254 Broadcast:192.168.67.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:0xc000f65ac0}\n"} +{"Time":"2023-05-31T12:30:36.858624-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.481164 10814 network_create.go:123] attempt to create docker network kubernetes-upgrade-496000 192.168.67.0/24 with gateway 192.168.67.1 and MTU of 65535 ...\n"} +{"Time":"2023-05-31T12:30:36.858627-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.481231 10814 cli_runner.go:164] Run: docker network create --driver=bridge --subnet=192.168.67.0/24 --gateway=192.168.67.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=kubernetes-upgrade-496000 kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858629-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.564931 10814 network_create.go:107] docker network kubernetes-upgrade-496000 192.168.67.0/24 created\n"} +{"Time":"2023-05-31T12:30:36.858632-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.564971 10814 kic.go:117] calculated static IP \"192.168.67.2\" for the \"kubernetes-upgrade-496000\" container\n"} +{"Time":"2023-05-31T12:30:36.858634-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.565090 10814 cli_runner.go:164] Run: docker ps -a --format {{.Names}}\n"} +{"Time":"2023-05-31T12:30:36.858636-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.613867 10814 cli_runner.go:164] Run: docker volume create kubernetes-upgrade-496000 --label name.minikube.sigs.k8s.io=kubernetes-upgrade-496000 --label created_by.minikube.sigs.k8s.io=true\n"} +{"Time":"2023-05-31T12:30:36.858639-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.663964 10814 oci.go:103] Successfully created a docker volume kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858641-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:18.664113 10814 cli_runner.go:164] Run: docker run --rm --name kubernetes-upgrade-496000-preload-sidecar --label created_by.minikube.sigs.k8s.io=true --label name.minikube.sigs.k8s.io=kubernetes-upgrade-496000 --entrypoint /usr/bin/test -v kubernetes-upgrade-496000:/var gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -d /var/lib\n"} +{"Time":"2023-05-31T12:30:36.858644-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:19.271189 10814 oci.go:107] Successfully prepared a docker volume kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858649-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:19.271247 10814 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:30:36.858652-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:19.271262 10814 kic.go:190] Starting extracting preloaded images to volume ...\n"} +{"Time":"2023-05-31T12:30:36.858655-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:19.271375 10814 cli_runner.go:164] Run: docker run --rm --entrypoint /usr/bin/tar -v /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4:/preloaded.tar:ro -v kubernetes-upgrade-496000:/extractDir gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -I lz4 -xf /preloaded.tar -C /extractDir\n"} +{"Time":"2023-05-31T12:30:36.858658-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:24.865579 10814 cli_runner.go:217] Completed: docker run --rm --entrypoint /usr/bin/tar -v /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4:/preloaded.tar:ro -v kubernetes-upgrade-496000:/extractDir gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -I lz4 -xf /preloaded.tar -C /extractDir: (5.594073809s)\n"} +{"Time":"2023-05-31T12:30:36.858661-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:24.865607 10814 kic.go:199] duration metric: took 5.594299 seconds to extract preloaded images to volume\n"} +{"Time":"2023-05-31T12:30:36.858663-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:24.865734 10814 cli_runner.go:164] Run: docker info --format \"'{{json .SecurityOptions}}'\"\n"} +{"Time":"2023-05-31T12:30:36.858667-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:24.967672 10814 cli_runner.go:164] Run: docker run -d -t --privileged --security-opt seccomp=unconfined --tmpfs /tmp --tmpfs /run -v /lib/modules:/lib/modules:ro --hostname kubernetes-upgrade-496000 --name kubernetes-upgrade-496000 --label created_by.minikube.sigs.k8s.io=true --label name.minikube.sigs.k8s.io=kubernetes-upgrade-496000 --label role.minikube.sigs.k8s.io= --label mode.minikube.sigs.k8s.io=kubernetes-upgrade-496000 --network kubernetes-upgrade-496000 --ip 192.168.67.2 --volume kubernetes-upgrade-496000:/var --security-opt apparmor=unconfined --memory=2200mb --memory-swap=2200mb --cpus=2 -e container=docker --expose 8443 --publish=127.0.0.1::8443 --publish=127.0.0.1::22 --publish=127.0.0.1::2376 --publish=127.0.0.1::5000 --publish=127.0.0.1::32443 gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\n"} +{"Time":"2023-05-31T12:30:36.85867-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.245537 10814 cli_runner.go:164] Run: docker container inspect kubernetes-upgrade-496000 --format={{.State.Running}}\n"} +{"Time":"2023-05-31T12:30:36.858673-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.301764 10814 cli_runner.go:164] Run: docker container inspect kubernetes-upgrade-496000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:30:36.858675-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.366079 10814 cli_runner.go:164] Run: docker exec kubernetes-upgrade-496000 stat /var/lib/dpkg/alternatives/iptables\n"} +{"Time":"2023-05-31T12:30:36.858677-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.490206 10814 oci.go:144] the created container \"kubernetes-upgrade-496000\" has a running status.\n"} +{"Time":"2023-05-31T12:30:36.858681-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.490239 10814 kic.go:221] Creating ssh key for kic: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa...\n"} +{"Time":"2023-05-31T12:30:36.858683-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.689962 10814 kic_runner.go:191] docker (temp): /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa.pub --\u003e /home/docker/.ssh/authorized_keys (381 bytes)\n"} +{"Time":"2023-05-31T12:30:36.858686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.754905 10814 cli_runner.go:164] Run: docker container inspect kubernetes-upgrade-496000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:30:36.858688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.804484 10814 kic_runner.go:93] Run: chown docker:docker /home/docker/.ssh/authorized_keys\n"} +{"Time":"2023-05-31T12:30:36.85869-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.804507 10814 kic_runner.go:114] Args: [docker exec --privileged kubernetes-upgrade-496000 chown docker:docker /home/docker/.ssh/authorized_keys]\n"} +{"Time":"2023-05-31T12:30:36.858692-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.902298 10814 cli_runner.go:164] Run: docker container inspect kubernetes-upgrade-496000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:30:36.858694-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.952162 10814 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T12:30:36.8587-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.952200 10814 ubuntu.go:169] provisioning hostname \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:30:36.858702-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:25.952298 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.002116 10814 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:30:36.858711-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.002486 10814 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 51783 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.858714-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.002501 10814 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:30:36.858716-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tsudo hostname kubernetes-upgrade-496000 \u0026\u0026 echo \"kubernetes-upgrade-496000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T12:30:36.858719-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.129488 10814 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858721-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858723-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.129585 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858726-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.179752 10814 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:30:36.858729-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.180102 10814 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 51783 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.858731-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.180115 10814 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:30:36.858733-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858741-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\tif ! grep -xq '.*\\skubernetes-upgrade-496000' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:30:36.858743-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:30:36.858745-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 kubernetes-upgrade-496000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T12:30:36.858747-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T12:30:36.858749-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\t\techo '127.0.1.1 kubernetes-upgrade-496000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T12:30:36.858753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T12:30:36.858755-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T12:30:36.858757-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.292616 10814 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T12:30:36.85876-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.292640 10814 ubuntu.go:175] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1078/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1078/.minikube}\n"} +{"Time":"2023-05-31T12:30:36.858763-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.292663 10814 ubuntu.go:177] setting up certificates\n"} +{"Time":"2023-05-31T12:30:36.858766-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.292671 10814 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T12:30:36.858769-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.292751 10814 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858771-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.343735 10814 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T12:30:36.858773-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.343825 10814 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T12:30:36.858775-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.343831 10814 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T12:30:36.858777-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.343952 10814 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:30:36.85878-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.344180 10814 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T12:30:36.858782-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.344185 10814 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T12:30:36.858784-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.344250 10814 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:30:36.858786-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.344417 10814 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T12:30:36.858789-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.344424 10814 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T12:30:36.858791-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.344483 10814 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:30:36.858794-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.344618 10814 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem org=jenkins.kubernetes-upgrade-496000 san=[192.168.67.2 127.0.0.1 localhost 127.0.0.1 minikube kubernetes-upgrade-496000]\n"} +{"Time":"2023-05-31T12:30:36.858796-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.545542 10814 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T12:30:36.858798-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.545616 10814 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T12:30:36.8588-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.545669 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858805-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.595235 10814 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:51783 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:30:36.858807-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.682540 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:30:36.858811-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.705127 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1249 bytes)\n"} +{"Time":"2023-05-31T12:30:36.858813-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.727437 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:30:36.858816-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.749646 10814 provision.go:86] duration metric: configureAuth took 456.957578ms\n"} +{"Time":"2023-05-31T12:30:36.858818-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.749661 10814 ubuntu.go:193] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T12:30:36.85882-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.749799 10814 config.go:182] Loaded profile config \"kubernetes-upgrade-496000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.858822-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.749869 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858824-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.799656 10814 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:30:36.858827-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.800014 10814 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 51783 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.858829-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.800028 10814 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:30:36.858831-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T12:30:36.858833-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.915713 10814 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: overlay\n"} +{"Time":"2023-05-31T12:30:36.858835-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858837-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.915726 10814 ubuntu.go:71] root file system type: overlay\n"} +{"Time":"2023-05-31T12:30:36.858839-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.915814 10814 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T12:30:36.858841-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.915897 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.858843-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.965377 10814 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:30:36.858846-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.965744 10814 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 51783 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.858862-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:26.965797 10814 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:30:36.858867-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %s \"[Unit]\n"} +{"Time":"2023-05-31T12:30:36.858869-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:30:36.858871-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:30:36.858873-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:30:36.858875-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:30:36.85888-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:30:36.858882-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:30:36.858884-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:30:36.858886-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:30:36.858889-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858892-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:30:36.858895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:30:36.858898-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:30:36.8589-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858903-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858905-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858907-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:30:36.858909-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:30:36.858911-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:30:36.858913-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:30:36.858915-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:30:36.858917-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:30:36.85892-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:30:36.858922-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858924-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:30:36.858926-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:30:36.858928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:30:36.85893-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:30:36.858932-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T12:30:36.858934-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858936-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:30:36.858938-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:30:36.85894-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:30:36.858942-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:30:36.858944-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:30:36.858946-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858948-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:30:36.85895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:30:36.858952-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:30:36.858953-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:30:36.858955-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858957-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:30:36.858959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:30:36.858961-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858963-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:30:36.858965-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:30:36.858967-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.858969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:30:36.858972-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:30:36.858974-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T12:30:36.858981-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.091298 10814 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T12:30:36.858984-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:30:36.858986-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:30:36.858988-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:30:36.85899-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:30:36.858992-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:30:36.858994-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:30:36.858996-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:30:36.858997-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:30:36.858999-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859001-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:30:36.859003-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:30:36.859005-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:30:36.859007-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859009-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859011-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859016-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:30:36.859019-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:30:36.859023-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:30:36.859026-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:30:36.859037-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:30:36.859039-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:30:36.859042-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:30:36.859044-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859046-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:30:36.859048-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:30:36.85905-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:30:36.859052-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:30:36.859055-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:30:36.859057-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859059-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:30:36.859061-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:30:36.859062-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:30:36.859065-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:30:36.859067-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:30:36.859068-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.85907-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:30:36.859072-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:30:36.859075-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:30:36.859077-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:30:36.859079-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859081-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:30:36.859083-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:30:36.859085-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859087-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:30:36.859089-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:30:36.859091-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859093-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:30:36.859095-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:30:36.859097-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859099-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.091397 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.859103-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.141345 10814 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:30:36.859105-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.141686 10814 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 51783 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.859107-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.141699 10814 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:30:36.859109-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:30:36.859114-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.781177 10814 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: --- /lib/systemd/system/docker.service\t2023-05-19 18:06:21.000000000 +0000\n"} +{"Time":"2023-05-31T12:30:36.859117-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:26:27.087831990 +0000\n"} +{"Time":"2023-05-31T12:30:36.859119-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t@@ -1,30 +1,32 @@\n"} +{"Time":"2023-05-31T12:30:36.859121-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t [Unit]\n"} +{"Time":"2023-05-31T12:30:36.859123-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Description=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:30:36.859125-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Documentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:30:36.859127-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-After=network-online.target docker.socket firewalld.service containerd.service time-set.target\n"} +{"Time":"2023-05-31T12:30:36.85913-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-Wants=network-online.target containerd.service\n"} +{"Time":"2023-05-31T12:30:36.859134-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+BindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:30:36.859137-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+After=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:30:36.85914-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+Wants=network-online.target\n"} +{"Time":"2023-05-31T12:30:36.859142-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Requires=docker.socket\n"} +{"Time":"2023-05-31T12:30:36.859145-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:30:36.859148-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+StartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:30:36.85915-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:30:36.859152-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:30:36.859154-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:30:36.859156-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:30:36.859158-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:30:36.85916-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:30:36.859162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:30:36.859164-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:30:36.859166-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:30:36.859168-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:30:36.85917-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:30:36.859172-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+Restart=on-failure\n"} +{"Time":"2023-05-31T12:30:36.859174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:30:36.859181-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:30:36.859184-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:30:36.859186-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:30:36.859188-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:30:36.85919-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:30:36.859192-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:30:36.859194-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:30:36.859196-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:30:36.859198-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:30:36.859199-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:30:36.859201-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:30:36.859203-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:30:36.859239-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:30:36.859241-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:30:36.859247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:30:36.85925-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:30:36.859252-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:30:36.859254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:30:36.859259-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:30:36.859265-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:30:36.859271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:30:36.859273-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:30:36.859276-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:30:36.859278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:30:36.85928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:30:36.859282-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:30:36.859283-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t@@ -32,16 +34,16 @@\n"} +{"Time":"2023-05-31T12:30:36.859285-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:30:36.859287-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:30:36.859289-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:30:36.859291-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:30:36.85939-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:30:36.859397-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:30:36.8594-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:30:36.859411-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:30:36.859418-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:30:36.85942-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:30:36.859423-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:30:36.859425-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:30:36.859427-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:30:36.859429-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t # kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:30:36.859431-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t KillMode=process\n"} +{"Time":"2023-05-31T12:30:36.859433-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-OOMScoreAdjust=-500\n"} +{"Time":"2023-05-31T12:30:36.859442-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:30:36.859444-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t [Install]\n"} +{"Time":"2023-05-31T12:30:36.859447-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t WantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:30:36.859449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tSynchronizing state of docker.service with SysV service script with /lib/systemd/systemd-sysv-install.\n"} +{"Time":"2023-05-31T12:30:36.859451-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecuting: /lib/systemd/systemd-sysv-install enable docker\n"} +{"Time":"2023-05-31T12:30:36.859455-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.859457-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.781203 10814 machine.go:91] provisioned docker machine in 1.829009228s\n"} +{"Time":"2023-05-31T12:30:36.859459-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.781210 10814 client.go:171] LocalClient.Create took 9.522398274s\n"} +{"Time":"2023-05-31T12:30:36.859461-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.781228 10814 start.go:167] duration metric: libmachine.API.Create for \"kubernetes-upgrade-496000\" took 9.522474413s\n"} +{"Time":"2023-05-31T12:30:36.859465-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.781235 10814 start.go:300] post-start starting for \"kubernetes-upgrade-496000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:30:36.859467-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.781241 10814 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T12:30:36.859546-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.781305 10814 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:30:36.859552-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.781366 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.859558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.869007 10814 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:51783 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:30:36.859561-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.956096 10814 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T12:30:36.859563-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.960458 10814 main.go:141] libmachine: Couldn't set key VERSION_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:30:36.859565-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.960478 10814 main.go:141] libmachine: Couldn't set key PRIVACY_POLICY_URL, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:30:36.859568-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.960485 10814 main.go:141] libmachine: Couldn't set key UBUNTU_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:30:36.85957-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.960490 10814 info.go:137] Remote host: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T12:30:36.859572-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.960500 10814 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T12:30:36.85958-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.960584 10814 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T12:30:36.859583-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.960767 10814 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e 15662.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:30:36.859586-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.960968 10814 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:30:36.859588-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.970141 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:30:36.85959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.991924 10814 start.go:303] post-start completed in 210.677504ms\n"} +{"Time":"2023-05-31T12:30:36.859592-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:27.992437 10814 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.859734-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.042788 10814 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/config.json ...\n"} +{"Time":"2023-05-31T12:30:36.85974-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.043203 10814 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T12:30:36.859746-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.043265 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.859754-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.093487 10814 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:51783 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:30:36.859756-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.175775 10814 ssh_runner.go:195] Run: sh -c \"df -BG /var | awk 'NR==2{print $4}'\"\n"} +{"Time":"2023-05-31T12:30:36.859759-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.181659 10814 start.go:128] duration metric: createHost completed in 9.944609942s\n"} +{"Time":"2023-05-31T12:30:36.859766-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.181681 10814 start.go:83] releasing machines lock for \"kubernetes-upgrade-496000\", held for 9.944749147s\n"} +{"Time":"2023-05-31T12:30:36.859768-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.181773 10814 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.85977-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.232593 10814 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T12:30:36.859772-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.232607 10814 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T12:30:36.859775-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.232667 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.859777-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.232681 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.85978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.284462 10814 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:51783 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:30:36.859782-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.284730 10814 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:51783 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:30:36.859785-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.469196 10814 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T12:30:36.859945-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.474660 10814 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T12:30:36.85995-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.480336 10814 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *loopback.conf* -not -name *.mk_disabled -exec sh -c \"grep -q loopback {} \u0026\u0026 ( grep -q name {} || sudo sed -i '/\"type\": \"loopback\"/i \\ \\ \\ \\ \"name\": \"loopback\",' {} ) \u0026\u0026 sudo sed -i 's|\"cniVersion\": \".*\"|\"cniVersion\": \"1.0.0\"|g' {}\" ;\n"} +{"Time":"2023-05-31T12:30:36.859953-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.504167 10814 cni.go:229] loopback cni configuration patched: \"/etc/cni/net.d/*loopback.conf*\" found\n"} +{"Time":"2023-05-31T12:30:36.859956-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.504237 10814 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *bridge* -not -name *podman* -not -name *.mk_disabled -printf \"%p, \" -exec sh -c \"sudo sed -i -r -e '/\"dst\": \".*:.*\"/d' -e 's|^(.*)\"dst\": (.*)[,*]$|\\1\"dst\": \\2|g' -e '/\"subnet\": \".*:.*\"/d' -e 's|^(.*)\"subnet\": \".*\"(.*)[,*]$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T12:30:36.859959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.520974 10814 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *podman* -not -name *.mk_disabled -printf \"%p, \" -exec sh -c \"sudo sed -i -r -e 's|^(.*)\"subnet\": \".*\"(.*)$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' -e 's|^(.*)\"gateway\": \".*\"(.*)$|\\1\"gateway\": \"10.244.0.1\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T12:30:36.859964-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.537389 10814 cni.go:307] configured [/etc/cni/net.d/100-crio-bridge.conf, /etc/cni/net.d/87-podman-bridge.conflist] bridge cni config(s)\n"} +{"Time":"2023-05-31T12:30:36.859967-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.537403 10814 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:30:36.859969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.537417 10814 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:30:36.859971-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.537528 10814 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:30:36.859974-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.859976-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.553362 10814 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.1\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:30:36.859978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.563474 10814 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:30:36.859981-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.573656 10814 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:30:36.860101-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.573716 10814 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:30:36.860105-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.583959 10814 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:30:36.860107-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.594318 10814 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:30:36.86011-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.604384 10814 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:30:36.860112-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.614596 10814 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T12:30:36.860114-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.624560 10814 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:30:36.860116-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.634811 10814 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T12:30:36.860126-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.643458 10814 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T12:30:36.86013-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.651976 10814 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:30:36.860133-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.724830 10814 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T12:30:36.860137-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.804292 10814 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:30:36.86014-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.804312 10814 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:30:36.860144-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.804376 10814 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T12:30:36.860152-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.816721 10814 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T12:30:36.860156-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.816791 10814 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T12:30:36.860159-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.828547 10814 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///var/run/dockershim.sock\n"} +{"Time":"2023-05-31T12:30:36.860163-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.860246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.845504 10814 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T12:30:36.860251-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.850317 10814 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T12:30:36.860254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.860055 10814 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T12:30:36.860256-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.896431 10814 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T12:30:36.860259-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:28.992295 10814 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T12:30:36.860261-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.058249 10814 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:30:36.860264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.058268 10814 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T12:30:36.860266-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.092613 10814 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:30:36.860274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.168933 10814 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:30:36.860276-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.417454 10814 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:30:36.860278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.443120 10814 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:30:36.860281-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.495185 10814 out.go:204] * Preparing Kubernetes v1.16.0 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:30:36.86029-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.495340 10814 cli_runner.go:164] Run: docker exec -t kubernetes-upgrade-496000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T12:30:36.860294-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.605026 10814 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T12:30:36.860297-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.605136 10814 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:30:36.860303-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.609788 10814 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.65.254\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:30:36.860306-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.621119 10814 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.860308-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.670795 10814 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:30:36.860441-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.670883 10814 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:30:36.860457-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.692205 10814 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:30:36.860462-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:30:36.860465-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860467-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860469-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860471-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860473-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:30:36.860475-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:30:36.860477-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/pause:3.1\n"} +{"Time":"2023-05-31T12:30:36.860479-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.860481-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:30:36.860483-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.692227 10814 docker.go:639] registry.k8s.io/kube-apiserver:v1.16.0 wasn't preloaded\n"} +{"Time":"2023-05-31T12:30:36.860485-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.692295 10814 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T12:30:36.860487-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.701895 10814 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T12:30:36.86049-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.706358 10814 ssh_runner.go:195] Run: stat -c \"%s %y\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:30:36.860492-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.710594 10814 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%s %y\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.860494-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.860496-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.860498-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.8605-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.860502-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:29.710624 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 --\u003e /preloaded.tar.lz4 (369789069 bytes)\n"} +{"Time":"2023-05-31T12:30:36.860504-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:34.703011 10814 docker.go:597] Took 4.996679 seconds to copy over tarball\n"} +{"Time":"2023-05-31T12:30:36.860658-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:34.703090 10814 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:30:36.860663-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.078041 10814 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (2.374901604s)\n"} +{"Time":"2023-05-31T12:30:36.860673-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.078057 10814 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:30:36.860676-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.149291 10814 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T12:30:36.860678-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.158295 10814 ssh_runner.go:362] scp memory --\u003e /var/lib/docker/image/overlay2/repositories.json (2499 bytes)\n"} +{"Time":"2023-05-31T12:30:36.86068-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.175155 10814 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:30:36.860682-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.245031 10814 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:30:36.860684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.679222 10814 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:30:36.860686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.700906 10814 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:30:36.860688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:30:36.86069-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860692-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860694-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860696-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860698-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:30:36.8607-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:30:36.860702-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/pause:3.1\n"} +{"Time":"2023-05-31T12:30:36.860705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.86071-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:30:36.860713-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.700920 10814 docker.go:639] registry.k8s.io/kube-apiserver:v1.16.0 wasn't preloaded\n"} +{"Time":"2023-05-31T12:30:36.860722-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.700925 10814 cache_images.go:88] LoadImages start: [registry.k8s.io/kube-apiserver:v1.16.0 registry.k8s.io/kube-controller-manager:v1.16.0 registry.k8s.io/kube-scheduler:v1.16.0 registry.k8s.io/kube-proxy:v1.16.0 registry.k8s.io/pause:3.1 registry.k8s.io/etcd:3.3.15-0 registry.k8s.io/coredns:1.6.2 gcr.io/k8s-minikube/storage-provisioner:v5]\n"} +{"Time":"2023-05-31T12:30:36.860801-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.707164 10814 image.go:134] retrieving image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860807-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.707166 10814 image.go:134] retrieving image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860811-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.707479 10814 image.go:134] retrieving image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:30:36.860815-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.707505 10814 image.go:134] retrieving image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:30:36.860822-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.708191 10814 image.go:134] retrieving image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860826-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.708722 10814 image.go:134] retrieving image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:30:36.860829-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.709108 10814 image.go:134] retrieving image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860833-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.709701 10814 image.go:134] retrieving image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:30:36.860836-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.712392 10814 image.go:177] daemon lookup for registry.k8s.io/kube-scheduler:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860857-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.713888 10814 image.go:177] daemon lookup for registry.k8s.io/etcd:3.3.15-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:30:36.860862-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.713862 10814 image.go:177] daemon lookup for registry.k8s.io/kube-proxy:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860864-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.715688 10814 image.go:177] daemon lookup for gcr.io/k8s-minikube/storage-provisioner:v5: Error response from daemon: No such image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:30:36.860867-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.715779 10814 image.go:177] daemon lookup for registry.k8s.io/kube-controller-manager:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860872-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.716585 10814 image.go:177] daemon lookup for registry.k8s.io/pause:3.1: Error response from daemon: No such image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:30:36.860874-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.716696 10814 image.go:177] daemon lookup for registry.k8s.io/kube-apiserver:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860877-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:37.717381 10814 image.go:177] daemon lookup for registry.k8s.io/coredns:1.6.2: Error response from daemon: No such image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:30:36.860975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:38.847533 10814 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860981-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:38.868829 10814 cache_images.go:116] \"registry.k8s.io/kube-scheduler:v1.16.0\" needs transfer: \"registry.k8s.io/kube-scheduler:v1.16.0\" does not exist at hash \"301ddc62b80b16315d3c2653cf3888370394277afb3187614cfa20edc352ca0a\" in container runtime\n"} +{"Time":"2023-05-31T12:30:36.860984-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:38.868902 10814 docker.go:313] Removing image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860986-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:38.868984 10814 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860988-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:38.889857 10814 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-scheduler_v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.860994-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.038501 10814 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:30:36.860997-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.060240 10814 cache_images.go:116] \"registry.k8s.io/etcd:3.3.15-0\" needs transfer: \"registry.k8s.io/etcd:3.3.15-0\" does not exist at hash \"b2756210eeabf84f3221da9959e9483f3919dc2aaab4cd45e7cd072fcbde27ed\" in container runtime\n"} +{"Time":"2023-05-31T12:30:36.860999-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.060269 10814 docker.go:313] Removing image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:30:36.861002-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.060329 10814 ssh_runner.go:195] Run: docker rmi registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:30:36.861004-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.081992 10814 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/etcd_3.3.15-0\n"} +{"Time":"2023-05-31T12:30:36.861006-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.177135 10814 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861008-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.198769 10814 cache_images.go:116] \"registry.k8s.io/kube-proxy:v1.16.0\" needs transfer: \"registry.k8s.io/kube-proxy:v1.16.0\" does not exist at hash \"c21b0c7400f988db4777858edd13b6d3930d62d7ccf026d2415485a52037f384\" in container runtime\n"} +{"Time":"2023-05-31T12:30:36.861011-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.198800 10814 docker.go:313] Removing image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861013-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.198861 10814 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861193-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.219549 10814 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-proxy_v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861199-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.546173 10814 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861203-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.568054 10814 cache_images.go:116] \"registry.k8s.io/kube-controller-manager:v1.16.0\" needs transfer: \"registry.k8s.io/kube-controller-manager:v1.16.0\" does not exist at hash \"06a629a7e51cdcc81a5ed6a3e6650348312f20c954ac52ee489a023628ec9c7d\" in container runtime\n"} +{"Time":"2023-05-31T12:30:36.861207-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.568098 10814 docker.go:313] Removing image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861209-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.568163 10814 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861212-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.589488 10814 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:30:36.861214-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.591335 10814 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-controller-manager_v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861216-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.750132 10814 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:30:36.861222-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.773584 10814 cache_images.go:116] \"registry.k8s.io/pause:3.1\" needs transfer: \"registry.k8s.io/pause:3.1\" does not exist at hash \"da86e6ba6ca197bf6bc5e9d900febd906b133eaa4750e6bed647b0fbe50ed43e\" in container runtime\n"} +{"Time":"2023-05-31T12:30:36.861224-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.773609 10814 docker.go:313] Removing image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:30:36.861227-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.773667 10814 ssh_runner.go:195] Run: docker rmi registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:30:36.861229-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:39.797252 10814 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/pause_3.1\n"} +{"Time":"2023-05-31T12:30:36.861231-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.150949 10814 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.171794 10814 cache_images.go:116] \"registry.k8s.io/kube-apiserver:v1.16.0\" needs transfer: \"registry.k8s.io/kube-apiserver:v1.16.0\" does not exist at hash \"b305571ca60a5a7818bda47da122683d75e8a1907475681ee8b1efbd06bff12e\" in container runtime\n"} +{"Time":"2023-05-31T12:30:36.861236-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.171821 10814 docker.go:313] Removing image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.86144-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.171880 10814 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861447-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.193025 10814 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-apiserver_v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.861451-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.374726 10814 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:30:36.861462-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.397139 10814 cache_images.go:116] \"registry.k8s.io/coredns:1.6.2\" needs transfer: \"registry.k8s.io/coredns:1.6.2\" does not exist at hash \"bf261d157914477ee1a5969d28ec687f3fbfc9fb5a664b22df78e57023b0e03b\" in container runtime\n"} +{"Time":"2023-05-31T12:30:36.861467-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.397175 10814 docker.go:313] Removing image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:30:36.861469-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.397266 10814 ssh_runner.go:195] Run: docker rmi registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:30:36.861471-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.416875 10814 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/coredns_1.6.2\n"} +{"Time":"2023-05-31T12:30:36.861474-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.416938 10814 cache_images.go:92] LoadImages completed in 2.715981547s\n"} +{"Time":"2023-05-31T12:30:36.861485-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:26:40.417002 10814 out.go:239] X Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-scheduler_v1.16.0: no such file or directory\n"} +{"Time":"2023-05-31T12:30:36.861491-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tX Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-scheduler_v1.16.0: no such file or directory\n"} +{"Time":"2023-05-31T12:30:36.861493-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.417076 10814 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T12:30:36.861499-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.466571 10814 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:30:36.861508-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.466586 10814 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:30:36.861512-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.466606 10814 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:30:36.861517-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.466622 10814 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.67.2 APIServerPort:8443 KubernetesVersion:v1.16.0 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:kubernetes-upgrade-496000 NodeName:kubernetes-upgrade-496000 DNSDomain:cluster.local CRISocket:/var/run/dockershim.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.67.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.67.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt S"} +{"Time":"2023-05-31T12:30:36.861719-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"taticPodPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:false}\n"} +{"Time":"2023-05-31T12:30:36.861724-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.466728 10814 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T12:30:36.861727-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeadm.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:30:36.861729-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T12:30:36.861731-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T12:30:36.861733-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t advertiseAddress: 192.168.67.2\n"} +{"Time":"2023-05-31T12:30:36.861735-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T12:30:36.861737-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T12:30:36.861739-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - groups:\n"} +{"Time":"2023-05-31T12:30:36.861741-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T12:30:36.861743-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T12:30:36.861745-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t usages:\n"} +{"Time":"2023-05-31T12:30:36.861747-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - signing\n"} +{"Time":"2023-05-31T12:30:36.86175-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - authentication\n"} +{"Time":"2023-05-31T12:30:36.861753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T12:30:36.861755-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t criSocket: /var/run/dockershim.sock\n"} +{"Time":"2023-05-31T12:30:36.861757-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t name: \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:30:36.861759-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T12:30:36.861761-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t node-ip: 192.168.67.2\n"} +{"Time":"2023-05-31T12:30:36.861763-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t taints: []\n"} +{"Time":"2023-05-31T12:30:36.861765-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:30:36.861767-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeadm.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:30:36.861769-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:30:36.861964-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T12:30:36.861969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.67.2\"]\n"} +{"Time":"2023-05-31T12:30:36.861971-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:30:36.861973-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T12:30:36.861976-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T12:30:36.861978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:30:36.861987-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:30:36.86199-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:30:36.861992-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T12:30:36.861994-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:30:36.861996-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:30:36.861998-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:30:36.862-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterName: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:36.862002-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:30:36.862004-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tdns:\n"} +{"Time":"2023-05-31T12:30:36.862009-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t type: CoreDNS\n"} +{"Time":"2023-05-31T12:30:36.862013-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tetcd:\n"} +{"Time":"2023-05-31T12:30:36.862015-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t local:\n"} +{"Time":"2023-05-31T12:30:36.862017-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:30:36.862019-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:30:36.862021-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t listen-metrics-urls: http://127.0.0.1:2381,http://192.168.67.2:2381\n"} +{"Time":"2023-05-31T12:30:36.862023-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkubernetesVersion: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.862025-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T12:30:36.862027-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:30:36.86203-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:30:36.862032-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:30:36.862208-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:30:36.862211-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:30:36.862213-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:30:36.862215-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T12:30:36.862219-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t x509:\n"} +{"Time":"2023-05-31T12:30:36.862222-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:30:36.862225-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:30:36.862226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:30:36.862228-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T12:30:36.86223-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T12:30:36.862232-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T12:30:36.862234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:30:36.862236-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T12:30:36.862238-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t nodefs.available: \"0%\"\n"} +{"Time":"2023-05-31T12:30:36.86224-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t nodefs.inodesFree: \"0%\"\n"} +{"Time":"2023-05-31T12:30:36.862245-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t imagefs.available: \"0%\"\n"} +{"Time":"2023-05-31T12:30:36.862248-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T12:30:36.862249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:30:36.862251-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:30:36.862254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:30:36.862256-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:30:36.862258-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:30:36.86226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:30:36.862262-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T12:30:36.862264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T12:30:36.862266-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T12:30:36.862456-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:30:36.862463-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T12:30:36.862466-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:30:36.862468-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.86247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.466803 10814 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T12:30:36.862472-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T12:30:36.862474-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.862476-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:30:36.862478-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:30:36.86248-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=/var/lib/minikube/binaries/v1.16.0/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime=docker --hostname-override=kubernetes-upgrade-496000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.67.2\n"} +{"Time":"2023-05-31T12:30:36.862482-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.862484-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:30:36.862486-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t config:\n"} +{"Time":"2023-05-31T12:30:36.862488-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{KubernetesVersion:v1.16.0 ClusterName:kubernetes-upgrade-496000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T12:30:36.862491-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.466863 10814 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.862499-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.476230 10814 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T12:30:36.862501-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.476292 10814 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T12:30:36.862503-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.485473 10814 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (351 bytes)\n"} +{"Time":"2023-05-31T12:30:36.862506-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.502204 10814 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T12:30:36.862508-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.519012 10814 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2180 bytes)\n"} +{"Time":"2023-05-31T12:30:36.862708-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.535698 10814 ssh_runner.go:195] Run: grep 192.168.67.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:30:36.862713-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.540677 10814 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.67.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:30:36.862718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.551989 10814 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000 for IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:30:36.862721-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.552009 10814 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.862723-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.552185 10814 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T12:30:36.862726-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.552249 10814 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T12:30:36.862728-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.552293 10814 certs.go:319] generating minikube-user signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key\n"} +{"Time":"2023-05-31T12:30:36.862731-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.552304 10814 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt with IP's: []\n"} +{"Time":"2023-05-31T12:30:36.862733-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.849705 10814 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt ...\n"} +{"Time":"2023-05-31T12:30:36.862735-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.849720 10814 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt: {Name:mk7ef9641311775b872c3c85adf469d74a990bb6 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.862738-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.850023 10814 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key ...\n"} +{"Time":"2023-05-31T12:30:36.86274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.850031 10814 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key: {Name:mk7bde90d371d2895bc68069b7b2c87c5c23e35e Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.862742-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.850222 10814 certs.go:319] generating minikube signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.key.c7fa3a9e\n"} +{"Time":"2023-05-31T12:30:36.862745-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.850234 10814 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.crt.c7fa3a9e with IP's: [192.168.67.2 10.96.0.1 127.0.0.1 10.0.0.1]\n"} +{"Time":"2023-05-31T12:30:36.862968-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.976630 10814 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.crt.c7fa3a9e ...\n"} +{"Time":"2023-05-31T12:30:36.862972-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.976645 10814 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.crt.c7fa3a9e: {Name:mke13773d24605ac491fe6be2009b6a3837176a3 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.862975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.976919 10814 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.key.c7fa3a9e ...\n"} +{"Time":"2023-05-31T12:30:36.862983-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.976927 10814 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.key.c7fa3a9e: {Name:mk7b299ffd9249e745b6f6124acbc8e450891ee2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.862985-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.977111 10814 certs.go:337] copying /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.crt.c7fa3a9e -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.crt\n"} +{"Time":"2023-05-31T12:30:36.862993-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.977271 10814 certs.go:341] copying /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.key.c7fa3a9e -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.key\n"} +{"Time":"2023-05-31T12:30:36.862995-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.977411 10814 certs.go:319] generating aggregator signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.key\n"} +{"Time":"2023-05-31T12:30:36.862998-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:40.977423 10814 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.crt with IP's: []\n"} +{"Time":"2023-05-31T12:30:36.863-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.151637 10814 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.crt ...\n"} +{"Time":"2023-05-31T12:30:36.863003-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.151652 10814 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.crt: {Name:mke522fae188c36016ab8bc70b2f125f6fe63588 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.863005-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.151923 10814 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.key ...\n"} +{"Time":"2023-05-31T12:30:36.863163-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.151931 10814 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.key: {Name:mk6123798ba17c1d5c82e5c45b305dae68ad6006 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:30:36.863169-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.152318 10814 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863173-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:26:41.152366 10814 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T12:30:36.863179-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.152381 10814 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863183-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.152412 10814 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863186-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.152444 10814 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863188-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.152477 10814 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:30:36.86319-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.152544 10814 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863193-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.153021 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863196-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.176345 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1679 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863199-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.198727 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863203-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.221308 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863326-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.243369 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863332-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.265496 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863335-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.290039 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863347-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.314793 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:30:36.86335-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.338388 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863353-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.360574 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863357-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.383589 10814 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863362-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.406414 10814 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T12:30:36.863365-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.423755 10814 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T12:30:36.863368-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.430148 10814 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T12:30:36.863371-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.440255 10814 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:30:36.863373-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.444758 10814 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:30:36.863375-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.444801 10814 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:30:36.863377-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.451834 10814 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T12:30:36.863483-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.461822 10814 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T12:30:36.863488-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.471865 10814 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:30:36.86349-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.476591 10814 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:30:36.863497-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.476642 10814 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:30:36.8635-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.484123 10814 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T12:30:36.863504-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.494477 10814 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T12:30:36.863508-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.504706 10814 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:30:36.86351-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.509435 10814 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:30:36.863512-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.509484 10814 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:30:36.863515-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.516751 10814 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T12:30:36.863519-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.526799 10814 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T12:30:36.863521-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.531240 10814 certs.go:353] certs directory doesn't exist, likely first start: ls /var/lib/minikube/certs/etcd: Process exited with status 2\n"} +{"Time":"2023-05-31T12:30:36.863523-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.863525-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.863528-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.86353-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/var/lib/minikube/certs/etcd': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.863535-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.531282 10814 kubeadm.go:404] StartCluster: {Name:kubernetes-upgrade-496000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:kubernetes-upgrade-496000 Namespace:default APIServerName:minikubeCA"} +{"Time":"2023-05-31T12:30:36.863666-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.67.2 Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: Sock"} +{"Time":"2023-05-31T12:30:36.863671-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"etVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:30:36.863674-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.531373 10814 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:30:36.863676-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.551938 10814 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:30:36.863679-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.562348 10814 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:30:36.863681-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.572218 10814 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:30:36.863684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.572271 10814 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:30:36.863686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.582068 10814 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:30:36.863688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.863691-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.863692-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.863876-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.863881-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.863883-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.863885-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.863888-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.582098 10814 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:30:36.863891-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.638352 10814 kubeadm.go:322] [init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.863893-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.638411 10814 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.863895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.933039 10814 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.863897-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.933155 10814 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.863911-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:41.933273 10814 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.863914-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.128753 10814 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.863916-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.129570 10814 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.863928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.136235 10814 kubeadm.go:322] [kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.863938-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.209902 10814 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.86394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.251508 10814 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:30:36.863942-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.251639 10814 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.864098-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.251734 10814 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.864103-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.421314 10814 kubeadm.go:322] [certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864109-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.509329 10814 kubeadm.go:322] [certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864115-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.599080 10814 kubeadm.go:322] [certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864119-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.803356 10814 kubeadm.go:322] [certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864123-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.925227 10814 kubeadm.go:322] [certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864126-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:42.925362 10814 kubeadm.go:322] [certs] etcd/server serving cert is signed for DNS names [kubernetes-upgrade-496000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:30:36.864129-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:43.221799 10814 kubeadm.go:322] [certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864132-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:43.221922 10814 kubeadm.go:322] [certs] etcd/peer serving cert is signed for DNS names [kubernetes-upgrade-496000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:30:36.864134-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:43.319767 10814 kubeadm.go:322] [certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864139-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:43.570992 10814 kubeadm.go:322] [certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864141-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:43.898905 10814 kubeadm.go:322] [certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T12:30:36.864143-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:43.899251 10814 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.864146-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.003137 10814 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.864149-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.320740 10814 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.864153-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.622213 10814 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.864156-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.698958 10814 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.864315-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.699569 10814 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.864324-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.722867 10814 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:30:36.864327-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.722971 10814 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.864329-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.723043 10814 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.864332-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.723107 10814 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.864334-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.723172 10814 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.864336-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:26:44.723311 10814 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.864339-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:24.708307 10814 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.864341-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:24.708807 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.864343-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:24.709030 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.864345-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:29.710099 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.864348-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:29.710262 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.86435-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:39.711949 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.864353-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:39.712175 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.864355-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:59.713337 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.864357-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:27:59.713564 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.864533-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714425 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.864538-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714585 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.86454-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714596 10814 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:30:36.864542-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714642 10814 kubeadm.go:322] Unfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.864544-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714673 10814 kubeadm.go:322] \ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.864547-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714677 10814 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:30:36.864549-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714699 10814 kubeadm.go:322] This error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.864551-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714751 10814 kubeadm.go:322] \t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.864553-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714835 10814 kubeadm.go:322] \t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.864555-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714843 10814 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:30:36.864557-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714935 10814 kubeadm.go:322] If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.86456-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714971 10814 kubeadm.go:322] \t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.864562-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.714994 10814 kubeadm.go:322] \t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.864565-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.715002 10814 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:30:36.864567-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.715105 10814 kubeadm.go:322] Additionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.864569-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.715184 10814 kubeadm.go:322] To troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.864571-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.715246 10814 kubeadm.go:322] Here is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.864573-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.715279 10814 kubeadm.go:322] \t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.864678-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.715338 10814 kubeadm.go:322] \tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.864682-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.715360 10814 kubeadm.go:322] \t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.864688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.718054 10814 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.86469-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.718131 10814 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.864693-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.718237 10814 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.864695-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.718324 10814 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.864697-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.718412 10814 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.8647-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.718474 10814 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.864702-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:28:39.718562 10814 out.go:239] ! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.864705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.864707-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.864714-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.864716-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.864718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.86472-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.864867-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.864882-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.864888-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.864892-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.864896-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.864899-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.864903-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864906-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864909-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864911-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864913-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864915-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] etcd/server serving cert is signed for DNS names [kubernetes-upgrade-496000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:30:36.864917-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864919-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] etcd/peer serving cert is signed for DNS names [kubernetes-upgrade-496000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:30:36.864926-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864929-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.864931-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T12:30:36.864934-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.864936-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.864938-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.864941-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.864947-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.865034-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.865039-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.865042-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.865044-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.865046-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.865048-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.865051-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.865053-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.865055-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.865057-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.865059-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.865062-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.865064-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.865066-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.865069-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.865074-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.865078-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.865083-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.8652-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.865204-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.865206-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.865209-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.865211-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.865213-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.865215-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.865217-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.865219-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.865221-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.865223-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.865225-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.865227-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.86523-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.865233-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.865241-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.865245-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.865247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.865249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.865251-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.865253-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.865256-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.865258-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.865478-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.865484-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.865488-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.865492-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.865501-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.865503-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.865505-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.865507-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.865509-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.865511-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.865514-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.865519-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.865526-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.86553-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.865533-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.865536-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.865541-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.865543-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.865545-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.865769-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.865783-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.865788-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] etcd/server serving cert is signed for DNS names [kubernetes-upgrade-496000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:30:36.865791-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.865793-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] etcd/peer serving cert is signed for DNS names [kubernetes-upgrade-496000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:30:36.865795-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.865797-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T12:30:36.865799-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T12:30:36.865802-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.865804-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.865806-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.865808-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.865811-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.865814-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.865817-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.86582-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.865822-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.865824-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.865826-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.865829-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.865831-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866062-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866076-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866081-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866084-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866086-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866089-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866091-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866093-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866096-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866098-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.8661-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.866109-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.866118-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.866121-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.866125-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.866128-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.866132-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.866135-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.866249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.866257-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.866261-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.866264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.866268-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.866271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.866274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.866276-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.866278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.86628-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.866282-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.866284-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.866287-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.86629-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.866294-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.866297-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.8663-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.866302-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.866304-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:39.718604 10814 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm reset --cri-socket /var/run/dockershim.sock --force\"\n"} +{"Time":"2023-05-31T12:30:36.866309-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.136659 10814 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:30:36.866311-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.148471 10814 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:30:36.866392-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.148529 10814 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:30:36.866397-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.157553 10814 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:30:36.866404-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.866408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.86641-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.866412-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.866414-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.866418-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.86642-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:30:36.866423-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.157573 10814 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:30:36.866426-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.209133 10814 kubeadm.go:322] [init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.866428-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.209612 10814 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.86643-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.459901 10814 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.866433-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.459988 10814 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.866435-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.460080 10814 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.866437-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.649882 10814 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.866439-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.650769 10814 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.866538-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.657860 10814 kubeadm.go:322] [kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.866545-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.728115 10814 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.866551-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.749723 10814 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:30:36.866553-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.749803 10814 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.866555-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.749889 10814 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.866558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.749954 10814 kubeadm.go:322] [certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.86656-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750019 10814 kubeadm.go:322] [certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.866562-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750079 10814 kubeadm.go:322] [certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.866564-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750163 10814 kubeadm.go:322] [certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.866566-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750233 10814 kubeadm.go:322] [certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.866568-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750303 10814 kubeadm.go:322] [certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.86657-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750364 10814 kubeadm.go:322] [certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.866572-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750443 10814 kubeadm.go:322] [certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.866574-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750480 10814 kubeadm.go:322] [certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:30:36.866577-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.750527 10814 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.866579-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.810751 10814 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.866581-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:40.952619 10814 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.866671-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.087929 10814 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.866675-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.206054 10814 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.866677-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.206669 10814 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.866679-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.228130 10814 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:30:36.866682-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.228224 10814 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.866684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.228295 10814 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.866694-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.228371 10814 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.866698-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.228445 10814 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.866701-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:28:41.228555 10814 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.866704-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:21.216409 10814 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.866709-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:21.217237 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866711-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:21.217428 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866713-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:26.218153 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866716-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:26.218346 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:36.219062 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866722-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:36.219252 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866845-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:56.220177 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866849-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:29:56.220303 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866852-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.221709 10814 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.866854-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.221939 10814 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.866856-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.221957 10814 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:30:36.866858-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222019 10814 kubeadm.go:322] Unfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.86686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222084 10814 kubeadm.go:322] \ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.866862-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222091 10814 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:30:36.866865-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222141 10814 kubeadm.go:322] This error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.866867-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222194 10814 kubeadm.go:322] \t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.866869-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222384 10814 kubeadm.go:322] \t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.866871-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222399 10814 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:30:36.866873-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222527 10814 kubeadm.go:322] If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.866879-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222554 10814 kubeadm.go:322] \t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.866881-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222581 10814 kubeadm.go:322] \t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.866885-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222587 10814 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:30:36.866887-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222681 10814 kubeadm.go:322] Additionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.866962-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222784 10814 kubeadm.go:322] To troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.866974-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222853 10814 kubeadm.go:322] Here is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.866976-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222886 10814 kubeadm.go:322] \t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.866979-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222951 10814 kubeadm.go:322] \tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.866994-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.222978 10814 kubeadm.go:322] \t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.866998-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.226019 10814 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.867002-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.226092 10814 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.867006-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.226208 10814 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.86701-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.226280 10814 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.867013-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.226369 10814 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.867016-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.226477 10814 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.867032-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.226500 10814 kubeadm.go:406] StartCluster complete in 3m54.693463638s\n"} +{"Time":"2023-05-31T12:30:36.867035-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.226591 10814 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:30:36.867037-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.248416 10814 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:30:36.867039-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.248433 10814 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.867042-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.248506 10814 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:30:36.86705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.269516 10814 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:30:36.867135-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.269529 10814 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:30:36.867139-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.269597 10814 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:30:36.867141-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.289979 10814 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:30:36.867143-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.289993 10814 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:30:36.86715-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.290067 10814 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:30:36.867152-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.311247 10814 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:30:36.867154-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.311261 10814 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.867157-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.311323 10814 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:30:36.867161-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.332547 10814 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:30:36.867164-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.332561 10814 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:30:36.867166-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.332638 10814 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:30:36.867168-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.352657 10814 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:30:36.86717-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.352671 10814 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.867172-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.352741 10814 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:30:36.867174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.372956 10814 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:30:36.867176-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.372971 10814 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:30:36.867181-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.372979 10814 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:30:36.867183-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.372993 10814 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:30:36.867185-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.446121 10814 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.867338-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.867356-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.867361-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.867364-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:30:36.867368-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t output: \n"} +{"Time":"2023-05-31T12:30:36.867371-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:30:36.867373-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:30:36.867376-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.867378-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:30:36.867381-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.446133 10814 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:30:36.867383-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.446140 10814 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:30:36.867385-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.463050 10814 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:30:36.867387-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.463064 10814 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:30:36.867389-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.518859 10814 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:30:36.867391-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.518874 10814 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:30:36.867393-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.558039 10814 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:30:36.867399-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.558052 10814 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:30:36.867402-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.573407 10814 out.go:369] Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.867514-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.867528-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.867533-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.867536-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.867539-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.867542-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.867545-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.867548-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.86755-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.867552-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.867554-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.867556-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.867558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.867561-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.867563-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.867566-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.867568-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.86757-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.867573-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.867575-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.867576-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:30:36.867694-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.867706-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.867714-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.867718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.867728-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.867734-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.867737-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.867741-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.867747-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.86775-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.867752-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.867756-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.867759-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.867762-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.867765-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.867767-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.867769-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.867771-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.867773-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.867864-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.86787-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.867873-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.867877-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.867889-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.867893-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.867895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.867897-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.867899-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.867901-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.867903-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.867905-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.867907-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.867909-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.867911-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.867913-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.867916-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.867918-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.86792-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.867923-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.867925-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.867927-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.867928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.867931-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.868052-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.868067-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.868079-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.868091-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.868093-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.868095-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.573427 10814 out.go:239] * \n"} +{"Time":"2023-05-31T12:30:36.868098-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:30:36.8681-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.573464 10814 out.go:239] X Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.868103-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.868105-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.868107-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.868116-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.868123-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.868125-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.868127-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.86813-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.868132-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.868291-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.868296-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.868298-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868301-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868303-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.868305-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868307-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.868309-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868311-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868313-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868315-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868317-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:30:36.868319-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.868321-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.868323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.868325-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.868327-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.868338-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.868342-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.868344-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.868347-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.868349-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.8685-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.868514-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.868518-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.868521-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.868525-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.868544-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.868551-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.868554-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.868558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.868561-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.868564-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.868578-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.868583-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.868585-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.868587-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.868589-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.868591-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.868593-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.868595-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.868597-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.868723-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.868731-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.868733-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.868735-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.868737-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.868739-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.868741-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.868743-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.868745-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.868748-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.868749-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.868751-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.868753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.868757-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.868759-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.868761-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.868764-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.868765-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.868767-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.868771-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tX Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.868943-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.868949-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.868961-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.868963-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.868966-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.868968-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.86897-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.868972-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.868974-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.868976-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.868978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.868981-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868983-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868985-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.868987-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868989-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.868991-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868993-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868995-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868997-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.868999-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:30:36.869158-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.869162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.869164-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.869166-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.869168-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.86917-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.869172-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.869174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.869177-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.869179-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.869181-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.869183-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.869185-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.869188-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.86919-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.869192-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.869194-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.869196-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.869199-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.869202-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.869392-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.869406-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.869409-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.869411-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.869413-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.869415-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.869417-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.869419-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.869421-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.869424-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.869426-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.869428-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.86943-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.869432-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.869434-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.869437-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.869439-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.869441-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.869443-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.869445-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.869447-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.869449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.869451-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.86959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.869595-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.869598-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.869602-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.869605-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.869607-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.869609-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.573477 10814 out.go:239] * \n"} +{"Time":"2023-05-31T12:30:36.869611-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:30:36.869627-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.574036 10814 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:30:36.869632-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:30:36.869634-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:30:36.869636-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:30:36.869639-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:30:36.869641-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:30:36.869643-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:30:36.869645-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:30:36.869753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:30:36.869756-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:30:36.869762-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:30:36.869765-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:30:36.869767-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:30:36.86977-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:30:36.869772-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:30:36.869774-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:30:36.869776-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.662965 10814 out.go:177] \n"} +{"Time":"2023-05-31T12:30:36.86978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.704789 10814 out.go:239] X Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.869787-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.869789-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.869791-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.869793-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.869795-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.869945-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.869949-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.869951-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.86996-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.869964-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.869967-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.869969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.869971-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.869974-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.869976-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.869978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.86998-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.869982-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.869984-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.869986-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.869988-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:30:36.86999-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.869992-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.869994-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.869996-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.869998-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.870001-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.870003-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.870134-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.870141-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.870145-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.870149-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.870151-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.870154-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.870158-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.870162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.870165-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.870169-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.870172-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.870174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.870177-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.87018-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.870184-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.870187-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.870191-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.870194-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.870319-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.870324-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.870327-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.87033-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.870333-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.870335-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.870337-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.870339-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.870341-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.870343-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.870345-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.870347-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.870366-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.87037-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.870374-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.870377-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.87039-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.870392-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.870394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.870396-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.870409-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.870412-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.870414-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.870526-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.870531-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tX Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:30:36.870534-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:30:36.870537-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:30:36.870539-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:30:36.870541-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.870543-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:30:36.870545-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:30:36.870547-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:30:36.87055-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:30:36.870552-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:30:36.870554-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:30:36.870556-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.870558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.87056-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.870562-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.870564-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.870566-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:30:36.870568-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.87074-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.870747-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.870751-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:30:36.870754-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:30:36.870758-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:30:36.870762-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.870765-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.870769-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.870772-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:30:36.870775-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.870779-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:30:36.870783-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:30:36.870786-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:30:36.87079-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:30:36.870794-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:30:36.870796-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:30:36.8708-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.870803-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.870816-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.870822-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.870975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.87099-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.870997-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.870999-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.871002-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:30:36.871004-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:30:36.871007-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.871009-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:30:36.871011-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:30:36.871013-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.871015-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:30:36.871017-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:30:36.871021-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:30:36.871023-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.871025-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:30:36.871027-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:30:36.871029-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:30:36.871031-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.871034-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:30:36.871036-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:30:36.871038-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:30:36.871226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:30:36.871234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:30:36.871249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:30:36.871254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.871257-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:30:36.871261-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:30:36.871265-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:30:36.87127-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:30:36.871275-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:30:36.871278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:30:36.871282-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:30:36.871285-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:30:36.871289-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.704830 10814 out.go:239] * Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T12:30:36.871292-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T12:30:36.871296-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:30:36.704905 10814 out.go:239] * Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T12:30:36.8713-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T12:30:36.871302-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:30:36.762800 10814 out.go:177] \n"} +{"Time":"2023-05-31T12:30:36.871305-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:30:36.871307-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:30:36.871311-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:236: failed to start minikube HEAD with oldest k8s version: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.16.0 --alsologtostderr -v=1 --driver=docker : exit status 109\n"} +{"Time":"2023-05-31T12:30:36.871316-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:239: (dbg) Run: out/minikube-darwin-amd64 stop -p kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:30:38.366069-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:239: (dbg) Done: out/minikube-darwin-amd64 stop -p kubernetes-upgrade-496000: (1.501944469s)\n"} +{"Time":"2023-05-31T12:30:38.366088-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:244: (dbg) Run: out/minikube-darwin-amd64 -p kubernetes-upgrade-496000 status --format={{.Host}}\n"} +{"Time":"2023-05-31T12:30:38.462643-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:244: (dbg) Non-zero exit: out/minikube-darwin-amd64 -p kubernetes-upgrade-496000 status --format={{.Host}}: exit status 7 (96.478827ms)\n"} +{"Time":"2023-05-31T12:30:38.462656-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:30:38.462662-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:30:38.462664-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:30:38.462666-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:30:38.462682-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:30:38.462684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:246: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:30:38.462688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:255: (dbg) Run: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=docker \n"} +{"Time":"2023-05-31T12:30:41.760629-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" no_kubernetes_test.go:191: (dbg) Done: out/minikube-darwin-amd64 start -p NoKubernetes-881000 --driver=docker : (7.939460985s)\n"} +{"Time":"2023-05-31T12:30:41.760674-07:00","Action":"run","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond"} +{"Time":"2023-05-31T12:30:41.760689-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":"=== RUN TestNoKubernetes/serial/VerifyK8sNotRunningSecond\n"} +{"Time":"2023-05-31T12:30:41.760697-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" no_kubernetes_test.go:147: (dbg) Run: out/minikube-darwin-amd64 ssh -p NoKubernetes-881000 \"sudo systemctl is-active --quiet service kubelet\"\n"} +{"Time":"2023-05-31T12:30:42.093509-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" no_kubernetes_test.go:147: (dbg) Non-zero exit: out/minikube-darwin-amd64 ssh -p NoKubernetes-881000 \"sudo systemctl is-active --quiet service kubelet\": exit status 1 (332.718296ms)\n"} +{"Time":"2023-05-31T12:30:42.093531-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \n"} +{"Time":"2023-05-31T12:30:42.093537-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:30:42.093542-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \tssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:30:42.093547-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \n"} +{"Time":"2023-05-31T12:30:42.093549-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:30:42.093555-07:00","Action":"output","Test":"TestNoKubernetes","Output":" helpers_test.go:175: Cleaning up \"NoKubernetes-881000\" profile ...\n"} +{"Time":"2023-05-31T12:30:42.093577-07:00","Action":"output","Test":"TestNoKubernetes","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p NoKubernetes-881000\n"} +{"Time":"2023-05-31T12:30:44.153718-07:00","Action":"output","Test":"TestNoKubernetes","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p NoKubernetes-881000: (2.06005648s)\n"} +{"Time":"2023-05-31T12:30:44.153743-07:00","Action":"output","Test":"TestNoKubernetes","Output":"--- PASS: TestNoKubernetes (63.85s)\n"} +{"Time":"2023-05-31T12:30:44.153747-07:00","Action":"output","Test":"TestNoKubernetes/serial","Output":" --- PASS: TestNoKubernetes/serial (61.79s)\n"} +{"Time":"2023-05-31T12:30:44.15375-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" --- PASS: TestNoKubernetes/serial/StartNoK8sWithVersion (0.36s)\n"} +{"Time":"2023-05-31T12:30:44.153752-07:00","Action":"pass","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Elapsed":0.36} +{"Time":"2023-05-31T12:30:44.153756-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" --- PASS: TestNoKubernetes/serial/StartWithK8s (25.91s)\n"} +{"Time":"2023-05-31T12:30:44.153758-07:00","Action":"pass","Test":"TestNoKubernetes/serial/StartWithK8s","Elapsed":25.91} +{"Time":"2023-05-31T12:30:44.153761-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" --- PASS: TestNoKubernetes/serial/StartWithStopK8s (17.48s)\n"} +{"Time":"2023-05-31T12:30:44.153782-07:00","Action":"pass","Test":"TestNoKubernetes/serial/StartWithStopK8s","Elapsed":17.48} +{"Time":"2023-05-31T12:30:44.153784-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" --- PASS: TestNoKubernetes/serial/Start (6.72s)\n"} +{"Time":"2023-05-31T12:30:44.153786-07:00","Action":"pass","Test":"TestNoKubernetes/serial/Start","Elapsed":6.72} +{"Time":"2023-05-31T12:30:44.153788-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" --- PASS: TestNoKubernetes/serial/VerifyK8sNotRunning (0.34s)\n"} +{"Time":"2023-05-31T12:30:44.153791-07:00","Action":"pass","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Elapsed":0.34} +{"Time":"2023-05-31T12:30:44.153793-07:00","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" --- PASS: TestNoKubernetes/serial/ProfileList (1.17s)\n"} +{"Time":"2023-05-31T12:30:44.153795-07:00","Action":"pass","Test":"TestNoKubernetes/serial/ProfileList","Elapsed":1.17} +{"Time":"2023-05-31T12:30:44.153797-07:00","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":" --- PASS: TestNoKubernetes/serial/Stop (1.53s)\n"} +{"Time":"2023-05-31T12:30:44.153799-07:00","Action":"pass","Test":"TestNoKubernetes/serial/Stop","Elapsed":1.53} +{"Time":"2023-05-31T12:30:44.153804-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" --- PASS: TestNoKubernetes/serial/StartNoArgs (7.94s)\n"} +{"Time":"2023-05-31T12:30:44.153807-07:00","Action":"pass","Test":"TestNoKubernetes/serial/StartNoArgs","Elapsed":7.94} +{"Time":"2023-05-31T12:30:44.153809-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" --- PASS: TestNoKubernetes/serial/VerifyK8sNotRunningSecond (0.33s)\n"} +{"Time":"2023-05-31T12:30:44.153811-07:00","Action":"pass","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Elapsed":0.33} +{"Time":"2023-05-31T12:30:44.153813-07:00","Action":"pass","Test":"TestNoKubernetes/serial","Elapsed":61.79} +{"Time":"2023-05-31T12:30:44.153815-07:00","Action":"pass","Test":"TestNoKubernetes","Elapsed":63.85} +{"Time":"2023-05-31T12:30:44.153817-07:00","Action":"cont","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T12:30:44.153819-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== CONT TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T12:30:44.153822-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto/Start"} +{"Time":"2023-05-31T12:30:44.153824-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"=== RUN TestNetworkPlugins/group/auto/Start\n"} +{"Time":"2023-05-31T12:30:44.153861-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p auto-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --driver=docker \n"} +{"Time":"2023-05-31T12:31:02.824907-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"E0531 12:31:02.824866 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:31:30.510405-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"E0531 12:31:30.510370 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:31:30.547412-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p auto-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --driver=docker : (46.393132176s)\n"} +{"Time":"2023-05-31T12:31:30.547462-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto/KubeletFlags"} +{"Time":"2023-05-31T12:31:30.547471-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/auto/KubeletFlags\n"} +{"Time":"2023-05-31T12:31:30.547506-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p auto-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:31:30.900399-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto/NetCatPod"} +{"Time":"2023-05-31T12:31:30.90041-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/auto/NetCatPod\n"} +{"Time":"2023-05-31T12:31:30.900461-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context auto-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:31:31.120204-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/auto/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:31:31.12446-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-g8lnr\" [d47ae127-6b74-4627-a7ac-06c86d5cd8aa] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:31:38.129206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-g8lnr\" [d47ae127-6b74-4627-a7ac-06c86d5cd8aa] Running\n"} +{"Time":"2023-05-31T12:31:43.129422-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/auto/NetCatPod: app=netcat healthy within 12.009182173s\n"} +{"Time":"2023-05-31T12:31:43.129437-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto/DNS"} +{"Time":"2023-05-31T12:31:43.12944-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/DNS","Output":"=== RUN TestNetworkPlugins/group/auto/DNS\n"} +{"Time":"2023-05-31T12:31:43.129543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context auto-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:31:43.265071-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto/Localhost"} +{"Time":"2023-05-31T12:31:43.265091-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Localhost","Output":"=== RUN TestNetworkPlugins/group/auto/Localhost\n"} +{"Time":"2023-05-31T12:31:43.265189-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context auto-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:31:43.379988-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto/HairPin"} +{"Time":"2023-05-31T12:31:43.380001-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/HairPin","Output":"=== RUN TestNetworkPlugins/group/auto/HairPin\n"} +{"Time":"2023-05-31T12:31:43.380123-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context auto-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:31:43.495797-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" net_test.go:209: \"auto\" test finished in 10m13.697810412s, failed=false\n"} +{"Time":"2023-05-31T12:32:02.295509-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:32:02.295523-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ----------------------- debugLogs start: auto-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:32:02.295526-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:32:02.295529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:32:02.295531-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:32:02.295534-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295537-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:32:02.295554-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:32:02.295561-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295565-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295589-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295597-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:32:02.295605-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:32:02.295615-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295622-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295626-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:32:02.29563-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:32:02.295634-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295637-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295644-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:32:02.295648-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:32:02.295651-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:32:02.295653-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295655-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295658-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:32:02.295662-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:32:02.295666-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:32:02.29567-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:32:02.295673-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:32:02.295677-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:32:02.29568-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:32:02.2957-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:32:02.29571-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 10.244.0.4\tnetcat-7458db8b8-g8lnr\n"} +{"Time":"2023-05-31T12:32:02.295715-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295721-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295726-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:32:02.29573-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:32:02.295733-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:32:02.295742-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:32:02.295746-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.29575-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295753-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:32:02.295756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:32:02.295758-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.29576-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:32:02.295763-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:32:02.295765-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:32:02.295769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.295772-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:32:02.295775-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:32:02.295779-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:32:02.295783-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:32:02.295789-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.295796-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:32:02.295803-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:32:02.295811-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.295817-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:32:02.295821-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:32:02.295825-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:32:02.295828-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:32:02.295831-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.295834-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:32:02.295836-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295838-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.29584-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:32:02.295842-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:32:02.295845-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:32:02.295847-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:32:02.295849-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:32:02.295852-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:32:02.295856-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:32:02.295864-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.76.2\tauto-996000\r\n"} +{"Time":"2023-05-31T12:32:02.295867-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:32:02.295869-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.76.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:32:02.295871-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295874-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295877-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:32:02.29588-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:32:02.295884-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:32:02.295887-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295894-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295898-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:32:02.295905-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:32:02.29591-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node/auto-996000 Ready control-plane 42s v1.27.2 192.168.76.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:32:02.295914-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.29592-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:32:02.295924-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 40s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.295928-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default service/netcat ClusterIP 10.111.23.83 \u003cnone\u003e 8080/TCP 19s app=netcat\n"} +{"Time":"2023-05-31T12:32:02.295932-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 39s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:32:02.295942-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295945-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:32:02.295948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default endpoints/kubernetes 192.168.76.2:8443 40s\n"} +{"Time":"2023-05-31T12:32:02.295952-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default endpoints/netcat 10.244.0.4:8080 19s\n"} +{"Time":"2023-05-31T12:32:02.295955-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 23s\n"} +{"Time":"2023-05-31T12:32:02.295959-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 25s\n"} +{"Time":"2023-05-31T12:32:02.295963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295968-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:32:02.295972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 39s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.295976-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.29598-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:32:02.295984-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default deployment.apps/netcat 1/1 1 1 19s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:32:02.295988-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system deployment.apps/coredns 1/1 1 1 39s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:32:02.295992-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.295995-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:32:02.295998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default pod/netcat-7458db8b8-g8lnr 1/1 Running 0 19s 10.244.0.4 auto-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296001-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/coredns-5d78c9869d-lcnpk 1/1 Running 0 25s 10.244.0.2 auto-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296006-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/etcd-auto-996000 1/1 Running 0 38s 192.168.76.2 auto-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296017-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/kube-apiserver-auto-996000 1/1 Running 0 38s 192.168.76.2 auto-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296021-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/kube-controller-manager-auto-996000 1/1 Running 0 38s 192.168.76.2 auto-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296024-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/kube-proxy-fsrxx 1/1 Running 0 25s 192.168.76.2 auto-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296026-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/kube-scheduler-auto-996000 1/1 Running 0 38s 192.168.76.2 auto-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296034-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/storage-provisioner 1/1 Running 0 23s 192.168.76.2 auto-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296038-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296042-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296045-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:32:02.296049-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:32:02.296053-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" e48aa0d1dc259 19 seconds ago Ready netcat-7458db8b8-g8lnr default 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.296062-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3fd6c81619cf8 23 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.296065-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 5b57afb02c237 24 seconds ago Ready coredns-5d78c9869d-lcnpk kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.296068-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 129b42ef933e4 24 seconds ago NotReady coredns-5d78c9869d-5hjrj kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.296072-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" f0324a33c11c5 25 seconds ago Ready kube-proxy-fsrxx kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.296078-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 9fb700f7f9a76 45 seconds ago Ready kube-scheduler-auto-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.29608-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 679a363bb31cf 45 seconds ago Ready kube-controller-manager-auto-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.296084-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" d854a57bc8a41 45 seconds ago Ready kube-apiserver-auto-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.296092-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1490948c1e415 45 seconds ago Ready etcd-auto-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:32:02.296095-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296097-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296099-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:32:02.296102-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:32:02.296106-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 6d1e392bc6e2c registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 15 seconds ago Running dnsutils 0 e48aa0d1dc259 netcat-7458db8b8-g8lnr\r\n"} +{"Time":"2023-05-31T12:32:02.296111-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 21c25d795a911 6e38f40d628db 24 seconds ago Running storage-provisioner 0 3fd6c81619cf8 storage-provisioner\r\n"} +{"Time":"2023-05-31T12:32:02.296115-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" d259948f65cec ead0a4a53df89 24 seconds ago Running coredns 0 5b57afb02c237 coredns-5d78c9869d-lcnpk\r\n"} +{"Time":"2023-05-31T12:32:02.29612-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 482ddb44808fe b8aa50768fd67 25 seconds ago Running kube-proxy 0 f0324a33c11c5 kube-proxy-fsrxx\r\n"} +{"Time":"2023-05-31T12:32:02.296135-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 41df1a5527eb9 c5b13e4f7806d 45 seconds ago Running kube-apiserver 0 d854a57bc8a41 kube-apiserver-auto-996000\r\n"} +{"Time":"2023-05-31T12:32:02.29614-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 5c6d48cadd324 89e70da428d29 45 seconds ago Running kube-scheduler 0 9fb700f7f9a76 kube-scheduler-auto-996000\r\n"} +{"Time":"2023-05-31T12:32:02.296145-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 6be6cb3a3495f ac2b7465ebba9 45 seconds ago Running kube-controller-manager 0 679a363bb31cf kube-controller-manager-auto-996000\r\n"} +{"Time":"2023-05-31T12:32:02.296149-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" aab813d4c7804 86b6af7dd652c 45 seconds ago Running etcd 0 1490948c1e415 etcd-auto-996000\r\n"} +{"Time":"2023-05-31T12:32:02.296154-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296157-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296161-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:32:02.296168-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:32:02.296172-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:32:02.296175-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CreationTimestamp: Wed, 31 May 2023 12:31:31 -0700\n"} +{"Time":"2023-05-31T12:32:02.296179-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:32:02.296182-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:32:02.296188-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:32:02.296195-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:32:02.2962-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:32:02.296207-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:32:02.296212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:32:02.296216-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:32:02.296219-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:32:02.296222-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T12:32:02.296225-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:32:02.296229-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:32:02.296233-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.29624-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T12:32:02.296243-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:32:02.296246-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -c\n"} +{"Time":"2023-05-31T12:32:02.296249-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:32:02.296251-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296268-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296282-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296289-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:32:02.296294-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:32:02.296298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:32:02.296306-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:32:02.296315-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:32:02.296325-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296334-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:32:02.296342-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T12:32:02.29635-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:32:02.296356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:32:02.29638-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal ScalingReplicaSet 20s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:32:02.296389-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296397-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296401-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:32:02.296408-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: netcat-7458db8b8-g8lnr\n"} +{"Time":"2023-05-31T12:32:02.296414-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:32:02.296421-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:32:02.296426-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:32:02.29643-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node: auto-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.296434-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Start Time: Wed, 31 May 2023 12:31:31 -0700\n"} +{"Time":"2023-05-31T12:32:02.296438-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:32:02.296441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:32:02.296445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296448-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:32:02.296452-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T12:32:02.296455-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IPs:\n"} +{"Time":"2023-05-31T12:32:02.296459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T12:32:02.296462-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:32:02.296466-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T12:32:02.296474-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:32:02.296477-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Container ID: docker://6d1e392bc6e2c83c715f7577651e1e55d86134d01e61550c0518ed9c6d73246d\n"} +{"Time":"2023-05-31T12:32:02.29648-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:32:02.296486-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:32:02.29649-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296502-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T12:32:02.296505-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:32:02.296508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -c\n"} +{"Time":"2023-05-31T12:32:02.296512-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:32:02.296515-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" State: Running\n"} +{"Time":"2023-05-31T12:32:02.296518-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Started: Wed, 31 May 2023 12:31:37 -0700\n"} +{"Time":"2023-05-31T12:32:02.296522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:32:02.296525-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:32:02.296528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296531-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:32:02.296534-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-4ntm6 (ro)\n"} +{"Time":"2023-05-31T12:32:02.296538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:32:02.296541-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status\n"} +{"Time":"2023-05-31T12:32:02.296544-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:32:02.296548-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready True \n"} +{"Time":"2023-05-31T12:32:02.296551-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:32:02.296555-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:32:02.296558-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:32:02.296562-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-api-access-4ntm6:\n"} +{"Time":"2023-05-31T12:32:02.296566-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:32:02.296571-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:32:02.296578-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:32:02.296583-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:32:02.296588-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:32:02.296592-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:32:02.296596-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.2966-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:32:02.296605-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:32:02.296608-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T12:32:02.296615-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:32:02.296621-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:32:02.296633-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Scheduled 20s default-scheduler Successfully assigned default/netcat-7458db8b8-g8lnr to auto-996000\n"} +{"Time":"2023-05-31T12:32:02.29664-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulling 20s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:32:02.296644-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulled 15s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.327811827s (5.327848478s including waiting)\n"} +{"Time":"2023-05-31T12:32:02.296647-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Created 14s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:32:02.29665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Started 14s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:32:02.296658-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296662-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:32:02.296669-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296672-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296676-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:32:02.29668-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:32:02.296683-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.296687-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CreationTimestamp: Wed, 31 May 2023 12:31:11 -0700\n"} +{"Time":"2023-05-31T12:32:02.29669-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:32:02.296694-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:32:02.296698-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:32:02.296706-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:32:02.296714-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:32:02.296719-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:32:02.296724-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:32:02.296731-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:32:02.296734-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:32:02.296737-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:32:02.296741-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T12:32:02.296744-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" coredns:\n"} +{"Time":"2023-05-31T12:32:02.296747-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:32:02.296751-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:32:02.296754-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:32:02.296762-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Args:\n"} +{"Time":"2023-05-31T12:32:02.296766-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -conf\n"} +{"Time":"2023-05-31T12:32:02.29677-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:32:02.296773-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Limits:\n"} +{"Time":"2023-05-31T12:32:02.296777-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:32:02.296781-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requests:\n"} +{"Time":"2023-05-31T12:32:02.296784-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:32:02.296787-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:32:02.296791-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:32:02.296795-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:32:02.296799-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296802-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:32:02.296804-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:32:02.296806-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:32:02.296809-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:32:02.296811-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:32:02.296813-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:32:02.296817-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:32:02.29682-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:32:02.296829-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:32:02.296833-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:32:02.296836-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:32:02.296839-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:32:02.296846-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:32:02.296849-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.296911-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:32:02.29692-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T12:32:02.296925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:32:02.296929-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:32:02.296936-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal ScalingReplicaSet 26s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:32:02.29694-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal ScalingReplicaSet 26s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:32:02.296944-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.296952-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:32:02.296956-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: coredns-5d78c9869d-lcnpk\n"} +{"Time":"2023-05-31T12:32:02.29696-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.296964-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:32:02.296968-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:32:02.296972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:32:02.296976-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node: auto-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.29698-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Start Time: Wed, 31 May 2023 12:31:25 -0700\n"} +{"Time":"2023-05-31T12:32:02.296984-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:32:02.296988-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:32:02.297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.297008-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:32:02.297011-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:32:02.297013-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IPs:\n"} +{"Time":"2023-05-31T12:32:02.297019-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:32:02.297023-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:32:02.297027-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T12:32:02.297029-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" coredns:\n"} +{"Time":"2023-05-31T12:32:02.297032-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Container ID: docker://d259948f65cecd72bb5fa2365bcdad90a8144599d1a1fd71ee3b3812a38072e0\n"} +{"Time":"2023-05-31T12:32:02.297034-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:32:02.297037-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:32:02.297039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:32:02.297045-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:32:02.297049-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Args:\n"} +{"Time":"2023-05-31T12:32:02.297053-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -conf\n"} +{"Time":"2023-05-31T12:32:02.297056-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:32:02.297059-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" State: Running\n"} +{"Time":"2023-05-31T12:32:02.297063-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Started: Wed, 31 May 2023 12:31:27 -0700\n"} +{"Time":"2023-05-31T12:32:02.297066-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:32:02.29707-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:32:02.297079-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Limits:\n"} +{"Time":"2023-05-31T12:32:02.297082-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:32:02.297085-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requests:\n"} +{"Time":"2023-05-31T12:32:02.297089-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:32:02.297092-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:32:02.297096-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:32:02.2971-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:32:02.297104-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.297107-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:32:02.297111-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:32:02.297115-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-vld6h (ro)\n"} +{"Time":"2023-05-31T12:32:02.297118-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:32:02.29712-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status\n"} +{"Time":"2023-05-31T12:32:02.297122-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:32:02.297124-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready True \n"} +{"Time":"2023-05-31T12:32:02.29713-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:32:02.297132-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:32:02.297134-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:32:02.297137-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:32:02.29714-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:32:02.297144-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:32:02.297147-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:32:02.297151-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-api-access-vld6h:\n"} +{"Time":"2023-05-31T12:32:02.297155-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:32:02.297163-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:32:02.297167-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:32:02.297172-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:32:02.29718-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:32:02.297185-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:32:02.29719-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:32:02.297194-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:32:02.297198-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:32:02.297202-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:32:02.297206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:32:02.297209-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T12:32:02.297212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:32:02.297216-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:32:02.29722-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Scheduled 26s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-lcnpk to auto-996000\n"} +{"Time":"2023-05-31T12:32:02.297232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulled 24s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:32:02.297241-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Created 24s kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:32:02.297247-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Started 24s kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:32:02.297251-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.297254-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.29726-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:32:02.297282-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" .:53\n"} +{"Time":"2023-05-31T12:32:02.297286-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/reload: Running configuration SHA512 = 591cf328cccc12bc490481273e738df59329c62c0b729d94e8b61db9961c2fa5f046dd37f1cf888b953814040d180f52594972691cd6ff41be96639138a43908\n"} +{"Time":"2023-05-31T12:32:02.29729-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:32:02.297294-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:32:02.297297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.297301-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.297304-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:32:02.297307-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-apiserver-auto-996000\n"} +{"Time":"2023-05-31T12:32:02.29731-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.297318-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:32:02.297321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:32:02.297325-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node: auto-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.297329-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Start Time: Wed, 31 May 2023 12:31:12 -0700\n"} +{"Time":"2023-05-31T12:32:02.297333-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:32:02.297337-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:32:02.297341-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.76.2:8443\n"} +{"Time":"2023-05-31T12:32:02.297345-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/config.hash: aa9f9ddbf8512e9e1e527a4835c650f1\n"} +{"Time":"2023-05-31T12:32:02.297349-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/config.mirror: aa9f9ddbf8512e9e1e527a4835c650f1\n"} +{"Time":"2023-05-31T12:32:02.297357-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/config.seen: 2023-05-31T19:31:11.910787826Z\n"} +{"Time":"2023-05-31T12:32:02.29736-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:32:02.297364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:32:02.297368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.297371-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IPs:\n"} +{"Time":"2023-05-31T12:32:02.297375-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.297378-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Controlled By: Node/auto-996000\n"} +{"Time":"2023-05-31T12:32:02.297381-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T12:32:02.297385-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:32:02.297389-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Container ID: docker://41df1a5527eb9dd0a60f806fcf5bf606d83da2389050af4645a53f12d84fc72c\n"} +{"Time":"2023-05-31T12:32:02.297396-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:32:02.297401-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:32:02.297406-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.29741-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.297414-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T12:32:02.297418-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:32:02.297443-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --advertise-address=192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.297451-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:32:02.297455-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:32:02.297459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:32:02.297462-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:32:02.297467-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:32:02.297471-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:32:02.297475-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:32:02.297479-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:32:02.297482-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:32:02.297486-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:32:02.297489-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:32:02.297493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:32:02.297497-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:32:02.2975-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:32:02.297504-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:32:02.297508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:32:02.297511-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:32:02.297514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:32:02.297518-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:32:02.297522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:32:02.297525-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:32:02.297529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:32:02.297536-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:32:02.297541-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:32:02.297545-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:32:02.297549-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:32:02.297553-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" State: Running\n"} +{"Time":"2023-05-31T12:32:02.297556-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Started: Wed, 31 May 2023 12:31:06 -0700\n"} +{"Time":"2023-05-31T12:32:02.297565-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:32:02.297568-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:32:02.297572-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requests:\n"} +{"Time":"2023-05-31T12:32:02.297575-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:32:02.297579-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Liveness: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:32:02.297582-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Readiness: http-get https://192.168.76.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:32:02.297585-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Startup: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:32:02.297588-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.297592-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:32:02.297595-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:32:02.297602-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:32:02.297606-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:32:02.29761-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:32:02.297613-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:32:02.297617-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:32:02.29762-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status\n"} +{"Time":"2023-05-31T12:32:02.297624-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:32:02.297628-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready True \n"} +{"Time":"2023-05-31T12:32:02.297631-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:32:02.297634-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:32:02.297637-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:32:02.297641-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:32:02.297644-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.297651-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:32:02.297655-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:32:02.297658-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:32:02.297662-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.297665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:32:02.297669-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:32:02.297672-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:32:02.297675-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.297683-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:32:02.297686-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:32:02.29769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:32:02.297694-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.297697-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:32:02.2977-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:32:02.297704-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:32:02.297709-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.297923-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:32:02.297931-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:32:02.297935-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:32:02.297938-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.297951-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:32:02.297958-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.297963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.297966-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.29797-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:32:02.297974-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:06.507401 1 server.go:551] external host was not specified, using 192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.297978-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:06.509164 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:32:02.297982-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:06.509188 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:32:02.297986-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:07.509223 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:32:02.29799-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:07.529651 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:32:02.297996-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:07.529684 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:32:02.298006-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:07.596080 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298011-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:07.596121 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298015-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:07.596767 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:32:02.298121-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:07.895785 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298129-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:07.896055 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:32:02.298138-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.297104 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:32:02.298147-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.317393 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298151-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.317436 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298155-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.317442 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.29816-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.318752 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298164-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.318789 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298168-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.320259 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298171-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.320770 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298175-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.320807 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298179-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.320813 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298183-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.322762 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298186-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.322801 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.29819-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.324337 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298197-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.324377 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298203-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.324382 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298387-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.325791 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298395-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.325832 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.2984-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.326940 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298404-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.327336 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298408-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.330076 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298412-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.330115 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298416-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.330121 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298424-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.331659 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298429-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.331695 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298433-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.331700 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298437-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.333503 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.333553 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.336194 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298461-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.336230 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298467-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.336238 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298477-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.337843 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298604-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.337887 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298611-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.337893 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298634-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.340857 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298644-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.340895 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298649-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.340900 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298671-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.343242 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298687-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.344231 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298693-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.344270 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298697-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.344276 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298701-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.381441 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298705-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.381482 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298709-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.381488 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298713-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.383651 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298721-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.383686 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298724-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.383691 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298728-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.385379 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298744-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.385414 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.29897-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.393843 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:32:02.298988-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:08.393882 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:32:02.298993-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.871724 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:32:02.298998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.871838 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:32:02.299002-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.872166 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:32:02.299011-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.872792 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:32:02.299015-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.872848 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:32:02.299019-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.872871 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:32:02.299023-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.872886 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:32:02.299028-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.872888 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:32:02.299032-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873042 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:32:02.299039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873150 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:32:02.299043-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873290 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:32:02.299047-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873316 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:32:02.299052-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873511 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:32:02.299056-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873689 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:32:02.29906-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873730 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:32:02.299397-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873742 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:32:02.29942-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873748 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:32:02.299429-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873755 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:32:02.299435-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873766 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:32:02.299441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873773 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:32:02.299448-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873782 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:32:02.299453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873566 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:32:02.299458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873805 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:32:02.299465-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873951 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:32:02.299469-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873959 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:32:02.299471-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873973 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:32:02.299473-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873975 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:32:02.299475-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.874249 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:32:02.299478-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.873308 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:32:02.29948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.874367 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:32:02.299482-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.874394 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:32:02.299484-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.888192 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:32:02.29949-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.888241 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:32:02.299853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.893708 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:32:02.299861-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.894013 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:32:02.299866-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.909494 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:32:02.299869-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.981491 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:32:02.299873-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.981537 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:32:02.299877-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.981571 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:32:02.29988-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.981682 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:32:02.299884-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.982349 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:32:02.299888-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.982804 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:32:02.299892-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.982845 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:32:02.299895-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.984745 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:32:02.299899-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" E0531 19:31:08.987053 1 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"namespaces \\\"kube-system\\\" not found\" interval=\"200ms\"\n"} +{"Time":"2023-05-31T12:32:02.299904-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:08.988396 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:32:02.299907-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:09.192457 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:32:02.299912-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:09.659030 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:32:02.299916-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:09.877822 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:32:02.300213-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:09.881110 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:32:02.300237-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:09.881145 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:32:02.30028-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:10.351222 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:32:02.300283-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:10.414910 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:32:02.300285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:10.516094 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:32:02.300288-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:31:10.522337 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.76.2]\n"} +{"Time":"2023-05-31T12:32:02.300291-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:10.523398 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:32:02.300294-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:10.526959 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:32:02.300296-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:10.899086 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:32:02.300299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:11.801137 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:32:02.300301-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:11.810742 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:32:02.300304-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:11.818738 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:32:02.300311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:25.428675 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:32:02.300314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:25.486178 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:32:02.300316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:31.094988 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.111.23.83]\n"} +{"Time":"2023-05-31T12:32:02.300318-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.300321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.300324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:32:02.300602-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:32:02.300611-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.30062-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:32:02.300625-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:32:02.300628-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:32:02.300631-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.300635-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T12:32:02.300639-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.300642-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:32:02.300646-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:32:02.300649-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:32:02.300652-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.300656-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:32:02.300659-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:32:02.300662-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.300664-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.300667-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.300669-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:32:02.300675-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:32:02.300679-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:32:02.300683-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:32:02.300686-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [\r\n"} +{"Time":"2023-05-31T12:32:02.30069-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.300693-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:32:02.300697-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T12:32:02.3007-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.300704-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T12:32:02.300707-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T12:32:02.300941-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.300948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T12:32:02.300952-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.300956-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:32:02.30096-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:32:02.300963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:32:02.300966-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.30097-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T12:32:02.300972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.300975-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:32:02.300983-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T12:32:02.300987-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.30099-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:32:02.300997-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.301-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T12:32:02.301003-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.301008-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/cni/net.d/100-crio-bridge.conf.mk_disabled\r\n"} +{"Time":"2023-05-31T12:32:02.301014-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.301017-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:32:02.301021-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:32:02.301026-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:32:02.30103-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:32:02.301033-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.301036-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.301039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.301042-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:32:02.301045-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:32:02.301049-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:32:02.301287-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" { \"dst\": \"0.0.0.0/0\" },\r\n"} +{"Time":"2023-05-31T12:32:02.301294-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" { \"dst\": \"1100:200::1/24\" }\r\n"} +{"Time":"2023-05-31T12:32:02.301298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ],\r\n"} +{"Time":"2023-05-31T12:32:02.3013-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:32:02.301303-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [{ \"subnet\": \"10.85.0.0/16\" }],\r\n"} +{"Time":"2023-05-31T12:32:02.301305-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [{ \"subnet\": \"1100:200::/24\" }]\r\n"} +{"Time":"2023-05-31T12:32:02.301307-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T12:32:02.301309-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.301312-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.301314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/cni/net.d/1-k8s.conflist\r\n"} +{"Time":"2023-05-31T12:32:02.301316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.301318-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.301321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:32:02.301323-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"name\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:32:02.301325-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:32:02.301327-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.30133-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:32:02.301332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"bridge\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:32:02.301334-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"addIf\": \"true\",\r\n"} +{"Time":"2023-05-31T12:32:02.301337-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"isDefaultGateway\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.301339-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"forceAddress\": false,\r\n"} +{"Time":"2023-05-31T12:32:02.301341-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.301343-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:32:02.301346-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:32:02.301348-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:32:02.30135-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"subnet\": \"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T12:32:02.301353-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.301355-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T12:32:02.301645-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.30165-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:32:02.301652-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:32:02.301654-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:32:02.301657-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.301659-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.301665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T12:32:02.301669-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.301673-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.301679-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.301684-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:32:02.301692-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:32:02.301697-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:32:02.301699-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:32:02.301702-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:32:02.301704-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 2: tunl0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:32:02.301706-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:32:02.30171-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:32:02.301714-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/tunnel6 :: brd :: permaddr c208:3f96:52f9::\r\n"} +{"Time":"2023-05-31T12:32:02.301718-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:32:02.301721-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether 02:42:82:40:13:83 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:32:02.301725-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:32:02.301728-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:32:02.301732-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 5: bridge: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:32:02.301956-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether 46:19:aa:c6:12:d4 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:32:02.301961-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" inet 10.244.0.1/16 brd 10.244.255.255 scope global bridge\r\n"} +{"Time":"2023-05-31T12:32:02.301963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:32:02.301965-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 6: veth9b3b8904@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T12:32:02.301968-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether da:5b:62:14:58:a5 brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:32:02.301973-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 8: veth5e0a5ca2@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T12:32:02.301976-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether ca:30:c7:90:4a:3a brd ff:ff:ff:ff:ff:ff link-netnsid 3\r\n"} +{"Time":"2023-05-31T12:32:02.301978-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 276: eth0@if277: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:32:02.30198-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether 02:42:c0:a8:4c:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:32:02.301983-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" inet 192.168.76.2/24 brd 192.168.76.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:32:02.301985-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:32:02.301987-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.301989-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.301991-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:32:02.301994-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default via 192.168.76.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:32:02.301996-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 10.244.0.0/16 dev bridge proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T12:32:02.301998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:32:02.302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.76.0/24 dev eth0 proto kernel scope link src 192.168.76.2 \r\n"} +{"Time":"2023-05-31T12:32:02.302003-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.302005-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.302007-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:32:02.302009-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:31:53 2023\r\n"} +{"Time":"2023-05-31T12:32:02.302306-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:32:02.302311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :PREROUTING ACCEPT [13951:56724241]\r\n"} +{"Time":"2023-05-31T12:32:02.302313-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :INPUT ACCEPT [13916:56721431]\r\n"} +{"Time":"2023-05-31T12:32:02.302316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :FORWARD ACCEPT [35:2810]\r\n"} +{"Time":"2023-05-31T12:32:02.302318-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :OUTPUT ACCEPT [12493:6133148]\r\n"} +{"Time":"2023-05-31T12:32:02.30232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :POSTROUTING ACCEPT [12528:6135958]\r\n"} +{"Time":"2023-05-31T12:32:02.302322-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302326-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:32:02.302334-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Completed on Wed May 31 19:31:53 2023\r\n"} +{"Time":"2023-05-31T12:32:02.302336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:31:53 2023\r\n"} +{"Time":"2023-05-31T12:32:02.302338-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:32:02.302341-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :INPUT ACCEPT [5670:1233447]\r\n"} +{"Time":"2023-05-31T12:32:02.302343-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :FORWARD ACCEPT [16:927]\r\n"} +{"Time":"2023-05-31T12:32:02.302345-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :OUTPUT ACCEPT [5655:1524302]\r\n"} +{"Time":"2023-05-31T12:32:02.302347-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.30235-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302354-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302357-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.30236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302367-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302371-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302374-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302377-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302381-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302652-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.302657-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:32:02.30266-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:32:02.302663-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:32:02.302665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:32:02.302667-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:32:02.30267-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:32:02.302676-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:32:02.302679-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:32:02.302681-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:32:02.302684-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:32:02.302686-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:32:02.30269-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:32:02.302693-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:32:02.302695-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:32:02.302697-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:32:02.3027-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:32:02.302702-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:32:02.302707-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:32:02.302709-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:32:02.303021-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:32:02.30303-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:32:02.303034-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:32:02.303039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:32:02.303043-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:32:02.303047-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:32:02.303051-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:32:02.303055-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:32:02.303059-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Completed on Wed May 31 19:31:53 2023\r\n"} +{"Time":"2023-05-31T12:32:02.303063-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:31:53 2023\r\n"} +{"Time":"2023-05-31T12:32:02.303076-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:32:02.303086-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:32:02.303089-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :INPUT ACCEPT [37:2245]\r\n"} +{"Time":"2023-05-31T12:32:02.303091-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :OUTPUT ACCEPT [44:2665]\r\n"} +{"Time":"2023-05-31T12:32:02.303094-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :POSTROUTING ACCEPT [44:2665]\r\n"} +{"Time":"2023-05-31T12:32:02.303097-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :CNI-d95782ee10e5fad589290930 - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303099-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :CNI-e8628490065efc43233dd16f - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303103-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303106-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.30311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303114-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303117-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303121-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303124-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303414-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303429-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303435-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-M66F6TD25XSFZOMV - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303438-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.30344-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-XPTUC4FRAFEFDBGF - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303442-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303447-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303449-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303451-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303456-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:32:02.303458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:32:02.303462-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:32:02.303465-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:32:02.303469-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:32:02.303471-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:32:02.303474-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:32:02.303476-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:32:02.303479-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:32:02.303481-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:32:02.303484-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A POSTROUTING -s 10.244.0.2/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5b57afb02c2378a3d46d2ff7efa5dffaa6775923ff751dab42d38cf7b020a688\\\"\" -j CNI-d95782ee10e5fad589290930\r\n"} +{"Time":"2023-05-31T12:32:02.303487-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A POSTROUTING -s 10.244.0.4/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"e48aa0d1dc259075747b7ef32950cd7cdaca27346310fa135047c5841a64f95b\\\"\" -j CNI-e8628490065efc43233dd16f\r\n"} +{"Time":"2023-05-31T12:32:02.303799-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A CNI-d95782ee10e5fad589290930 -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5b57afb02c2378a3d46d2ff7efa5dffaa6775923ff751dab42d38cf7b020a688\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:32:02.303806-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A CNI-d95782ee10e5fad589290930 ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5b57afb02c2378a3d46d2ff7efa5dffaa6775923ff751dab42d38cf7b020a688\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:32:02.303809-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A CNI-e8628490065efc43233dd16f -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"e48aa0d1dc259075747b7ef32950cd7cdaca27346310fa135047c5841a64f95b\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:32:02.303812-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A CNI-e8628490065efc43233dd16f ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"e48aa0d1dc259075747b7ef32950cd7cdaca27346310fa135047c5841a64f95b\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:32:02.303814-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:32:02.303817-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:45783\r\n"} +{"Time":"2023-05-31T12:32:02.30382-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:54085\r\n"} +{"Time":"2023-05-31T12:32:02.303822-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 45783 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:32:02.303824-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 54085 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:32:02.303827-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:32:02.303829-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:32:02.303832-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:32:02.303834-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:32:02.303859-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.303864-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:32:02.303869-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -s 192.168.76.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304016-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:32:02.304024-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304041-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:32:02.304045-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -s 10.244.0.4/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304047-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T12:32:02.30405-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304052-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:32:02.304055-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:32:02.304057-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:32:02.304061-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:32:02.304065-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:32:02.304069-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.111.23.83/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:32:02.304073-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:32:02.304075-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304078-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T12:32:02.304083-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T12:32:02.304309-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.76.2:8443\" -j KUBE-SEP-M66F6TD25XSFZOMV\r\n"} +{"Time":"2023-05-31T12:32:02.304324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304329-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T12:32:02.304333-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.111.23.83/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:32:02.304341-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.4:8080\" -j KUBE-SEP-XPTUC4FRAFEFDBGF\r\n"} +{"Time":"2023-05-31T12:32:02.304352-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:32:02.304359-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Completed on Wed May 31 19:31:53 2023\r\n"} +{"Time":"2023-05-31T12:32:02.304364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.304368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.304371-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:32:02.304375-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:32:02.304378-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304385-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 56 3570 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:32:02.304395-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3 255 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:32:02.304404-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 44 2640 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:32:02.30441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain INPUT (policy ACCEPT 38 packets, 2305 bytes)\r\n"} +{"Time":"2023-05-31T12:32:02.304537-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304555-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.30456-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain OUTPUT (policy ACCEPT 44 packets, 2665 bytes)\r\n"} +{"Time":"2023-05-31T12:32:02.304562-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304565-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 189 14119 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:32:02.304567-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 50 4382 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:32:02.30457-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 83 4980 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:32:02.304572-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain POSTROUTING (policy ACCEPT 44 packets, 2665 bytes)\r\n"} +{"Time":"2023-05-31T12:32:02.304577-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304579-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 197 14734 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:32:02.304582-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:32:02.304584-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:32:02.304587-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 CNI-d95782ee10e5fad589290930 all -- * * 10.244.0.2 0.0.0.0/0 /* name: \"bridge\" id: \"5b57afb02c2378a3d46d2ff7efa5dffaa6775923ff751dab42d38cf7b020a688\" */\r\n"} +{"Time":"2023-05-31T12:32:02.30459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 9 675 CNI-e8628490065efc43233dd16f all -- * * 10.244.0.4 0.0.0.0/0 /* name: \"bridge\" id: \"e48aa0d1dc259075747b7ef32950cd7cdaca27346310fa135047c5841a64f95b\" */\r\n"} +{"Time":"2023-05-31T12:32:02.304592-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304594-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain CNI-d95782ee10e5fad589290930 (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.304597-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304736-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"5b57afb02c2378a3d46d2ff7efa5dffaa6775923ff751dab42d38cf7b020a688\" */\r\n"} +{"Time":"2023-05-31T12:32:02.304743-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"5b57afb02c2378a3d46d2ff7efa5dffaa6775923ff751dab42d38cf7b020a688\" */\r\n"} +{"Time":"2023-05-31T12:32:02.304747-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304749-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain CNI-e8628490065efc43233dd16f (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.304751-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304754-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 9 675 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"e48aa0d1dc259075747b7ef32950cd7cdaca27346310fa135047c5841a64f95b\" */\r\n"} +{"Time":"2023-05-31T12:32:02.304757-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"e48aa0d1dc259075747b7ef32950cd7cdaca27346310fa135047c5841a64f95b\" */\r\n"} +{"Time":"2023-05-31T12:32:02.304761-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304764-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:32:02.304768-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304772-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:32:02.304775-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304777-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:32:02.30478-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304782-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:45783\r\n"} +{"Time":"2023-05-31T12:32:02.304784-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 53 4637 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:54085\r\n"} +{"Time":"2023-05-31T12:32:02.304787-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304789-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.304791-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304793-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:45783 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:32:02.304967-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:54085 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:32:02.304973-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304975-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:32:02.304978-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304982-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304985-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:32:02.304989-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.304993-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:32:02.304996-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.304999-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305001-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.305003-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305005-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305008-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.305024-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 53 3340 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:32:02.305028-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:32:02.305035-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:32:02.305039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305043-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305047-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.305356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305366-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.305371-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:32:02.305374-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:32:02.305376-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305378-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-M66F6TD25XSFZOMV (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305381-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.305383-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-MARK-MASQ all -- * * 192.168.76.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:32:02.305386-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:32:02.305403-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305412-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305416-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.305424-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:32:02.30543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:32:02.305432-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305435-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-XPTUC4FRAFEFDBGF (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305437-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.30544-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.4 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:32:02.305442-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T12:32:02.305704-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305711-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305714-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.305718-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:32:02.305722-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:32:02.305726-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305738-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305743-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.305748-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:32:02.305752-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:32:02.305757-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:32:02.305761-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:32:02.305765-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.111.23.83 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:32:02.305769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 79 4740 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:32:02.305772-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.305774-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.305778-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.306058-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:32:02.306067-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:32:02.306071-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.306075-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.30608-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.306084-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:32:02.306088-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T12:32:02.306092-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.306096-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.3061-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.306104-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:32:02.306108-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3 180 KUBE-SEP-M66F6TD25XSFZOMV all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.76.2:8443 */\r\n"} +{"Time":"2023-05-31T12:32:02.306113-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.306116-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.30612-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.306125-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:32:02.306129-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:32:02.306133-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.306137-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:32:02.306365-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:32:02.306397-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.111.23.83 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:32:02.306401-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-SEP-XPTUC4FRAFEFDBGF all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.4:8080 */\r\n"} +{"Time":"2023-05-31T12:32:02.306404-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.306406-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.306408-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:32:02.306411-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.306413-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.306416-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:32:02.306418-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.306422-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:32:02.306425-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:32:02.306431-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:32:02.306438-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:32:02.306445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:32:02.306447-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:32:02.306449-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:32:02.306452-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:32:02.306454-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.306457-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.306459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T12:32:02.306461-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:32:02.306463-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:32:02.306708-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.306715-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.306717-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T12:32:02.30672-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.306722-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:32:02.306725-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:32:02.306727-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment:\n"} +{"Time":"2023-05-31T12:32:02.306734-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:32:02.306738-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:32:02.306742-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:32:02.306746-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:32:02.306749-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:32:02.306753-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:32:02.306756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:32:02.306759-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:32:02.306763-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.306767-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:32:02.30677-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:32:02.306773-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.306777-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:32:02.30678-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:32:02.306783-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:32:02.306787-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.30679-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:32:02.306793-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:32:02.306797-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:32:02.307143-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T12:32:02.307151-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:32:02.307155-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:32:02.307159-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal SuccessfulCreate 28s daemonset-controller Created pod: kube-proxy-fsrxx\n"} +{"Time":"2023-05-31T12:32:02.307163-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.307166-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.30717-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:32:02.307173-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-proxy-fsrxx\n"} +{"Time":"2023-05-31T12:32:02.307182-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.307188-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:32:02.307192-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:32:02.307194-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.307197-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node: auto-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.307199-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Start Time: Wed, 31 May 2023 12:31:25 -0700\n"} +{"Time":"2023-05-31T12:32:02.307201-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:32:02.307204-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.307206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:32:02.307208-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.307211-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:32:02.307213-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.307226-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IPs:\n"} +{"Time":"2023-05-31T12:32:02.307229-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.307231-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.307234-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T12:32:02.307236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:32:02.307484-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Container ID: docker://482ddb44808fe23ff98e64901c232693220cb92eafa33a454f00eda7aeb89afa\n"} +{"Time":"2023-05-31T12:32:02.307491-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:32:02.307495-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:32:02.307499-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.307503-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:32:02.307507-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T12:32:02.30751-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.307514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:32:02.307518-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:32:02.307521-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" State: Running\n"} +{"Time":"2023-05-31T12:32:02.307525-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Started: Wed, 31 May 2023 12:31:26 -0700\n"} +{"Time":"2023-05-31T12:32:02.307528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:32:02.307532-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:32:02.307535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment:\n"} +{"Time":"2023-05-31T12:32:02.307538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:32:02.307542-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:32:02.307545-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:32:02.307549-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:32:02.307552-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:32:02.307556-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-mnchb (ro)\n"} +{"Time":"2023-05-31T12:32:02.30756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:32:02.307563-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status\n"} +{"Time":"2023-05-31T12:32:02.307569-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:32:02.307575-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready True \n"} +{"Time":"2023-05-31T12:32:02.308093-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:32:02.308098-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:32:02.308101-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:32:02.308103-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:32:02.308106-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:32:02.308108-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.30811-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:32:02.308112-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:32:02.308115-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.308117-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:32:02.308119-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:32:02.308121-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:32:02.308124-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:32:02.308126-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:32:02.308128-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:32:02.30813-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-api-access-mnchb:\n"} +{"Time":"2023-05-31T12:32:02.308132-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:32:02.308139-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:32:02.308145-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:32:02.308147-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:32:02.308149-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:32:02.308152-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:32:02.308154-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:32:02.308156-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:32:02.308159-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:32:02.308161-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:32:02.308523-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:32:02.308528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:32:02.30853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:32:02.308533-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:32:02.308535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:32:02.308537-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T12:32:02.308539-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:32:02.308542-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:32:02.308544-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Scheduled 28s default-scheduler Successfully assigned kube-system/kube-proxy-fsrxx to auto-996000\n"} +{"Time":"2023-05-31T12:32:02.308546-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulled 27s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:32:02.308549-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Created 27s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.308551-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Started 27s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.308553-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.308555-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.308557-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:32:02.30856-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.384638 1 node.go:141] Successfully retrieved node IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.308569-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.384725 1 server_others.go:110] \"Detected node IP\" address=\"192.168.76.2\"\n"} +{"Time":"2023-05-31T12:32:02.308572-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.384745 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:32:02.308574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.601803 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:32:02.308576-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.601838 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:32:02.308578-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.601845 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:32:02.308869-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.601857 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:32:02.308873-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.601881 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:32:02.308876-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.602296 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:32:02.308878-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.602305 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:32:02.308881-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.603449 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:32:02.308883-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.603457 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:32:02.308885-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.603471 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:32:02.308888-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.603474 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:32:02.30889-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.606953 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:32:02.308892-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.608307 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:32:02.308895-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.608330 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:32:02.308897-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.704647 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:32:02.308899-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:31:26.704686 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:32:02.308901-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.308906-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.308908-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:32:02.308911-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:32:02.308913-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: loaded (\u001b]8;;file://auto-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:32:02.309255-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:32:02.30926-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─\u001b]8;;file://auto-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:32:02.309263-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:31:11 UTC; 42s ago\r\n"} +{"Time":"2023-05-31T12:32:02.309265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:32:02.309268-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Main PID: 2378 (kubelet)\r\n"} +{"Time":"2023-05-31T12:32:02.30927-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tasks: 13 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:32:02.309273-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Memory: 37.0M\r\n"} +{"Time":"2023-05-31T12:32:02.309275-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CPU: 1.715s\r\n"} +{"Time":"2023-05-31T12:32:02.309277-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:32:02.30928-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─2378 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=auto-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:32:02.309287-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.309289-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: W0531 19:31:33.536863 2378 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/3441f41c-f663-4d1d-b5f0-58954190954f/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:32:02.309293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.537078 2378 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/3441f41c-f663-4d1d-b5f0-58954190954f-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"3441f41c-f663-4d1d-b5f0-58954190954f\" (UID: \"3441f41c-f663-4d1d-b5f0-58954190954f\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.309299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.539730 2378 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/3441f41c-f663-4d1d-b5f0-58954190954f-kube-api-access-nqm6p\" (OuterVolumeSpecName: \"kube-api-access-nqm6p\") pod \"3441f41c-f663-4d1d-b5f0-58954190954f\" (UID: \"3441f41c-f663-4d1d-b5f0-58954190954f\"). InnerVolumeSpecName \"kube-api-access-nqm6p\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.309302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.637470 2378 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/3441f41c-f663-4d1d-b5f0-58954190954f-config-volume\\\") on node \\\"auto-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:32:02.309576-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.637543 2378 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-nqm6p\\\" (UniqueName: \\\"kubernetes.io/projected/3441f41c-f663-4d1d-b5f0-58954190954f-kube-api-access-nqm6p\\\") on node \\\"auto-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:32:02.309585-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:34 auto-996000 kubelet[2378]: I0531 19:31:34.388644 2378 scope.go:115] \"RemoveContainer\" containerID=\"c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\"\r\n"} +{"Time":"2023-05-31T12:32:02.309601-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:34 auto-996000 kubelet[2378]: I0531 19:31:34.403356 2378 scope.go:115] \"RemoveContainer\" containerID=\"c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\"\r\n"} +{"Time":"2023-05-31T12:32:02.309607-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:34 auto-996000 kubelet[2378]: E0531 19:31:34.404880 2378 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = Unknown desc = Error: No such container: c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\" containerID=\"c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\"\r\n"} +{"Time":"2023-05-31T12:32:02.30962-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:34 auto-996000 kubelet[2378]: I0531 19:31:34.404957 2378 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:docker ID:c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec} err=\"failed to get container status \\\"c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\\\": rpc error: code = Unknown desc = Error: No such container: c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\"\r\n"} +{"Time":"2023-05-31T12:32:02.309624-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:35 auto-996000 kubelet[2378]: I0531 19:31:35.990203 2378 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=3441f41c-f663-4d1d-b5f0-58954190954f path=\"/var/lib/kubelet/pods/3441f41c-f663-4d1d-b5f0-58954190954f/volumes\"\r\n"} +{"Time":"2023-05-31T12:32:02.309629-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.309631-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.309634-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:32:02.309636-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.309639-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:32:02.309643-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:32:02.309646-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:32:02.309649-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:32:02.309801-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.309808-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.309813-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:32:02.309821-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:32:02.309825-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:32:02.309829-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:32:02.309833-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.309836-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:32:02.30984-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:32:02.309843-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.309847-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.309851-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:32:02.309855-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:32:02.309858-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.309861-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.309873-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:32:02.309878-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=auto-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:32:02.309881-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.309884-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:32:02.309895-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.3099-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.309904-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:32:02.309908-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:32:02.309912-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.31001-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.310015-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.310022-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.310026-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.310029-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.310032-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.310035-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:32:02.310038-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.379335 1728 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:32:02.310041-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.379402 1728 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:32:02.310046-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.379593 1728 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:32:02.310048-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.385387 1728 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:32:02.310051-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.386520 1728 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.310055-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: W0531 19:31:05.389281 1728 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:32:02.310058-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.396497 1728 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:32:02.31006-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.397075 1728 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:32:02.310298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.397140 1728 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:32:02.310311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.397158 1728 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:32:02.310317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.397166 1728 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:32:02.310321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.397336 1728 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:32:02.310324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.417284 1728 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:32:02.310329-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.417362 1728 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:32:02.310332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.417629 1728 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:32:02.310335-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.417706 1728 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:32:02.310337-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: W0531 19:31:05.418266 1728 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.310341-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: W0531 19:31:05.418326 1728 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dauto-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.310538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.418351 1728 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.310551-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.418353 1728 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dauto-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.310556-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.425998 1728 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:32:02.310561-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: W0531 19:31:05.426748 1728 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:32:02.310566-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.427744 1728 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:32:02.31057-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.427948 1728 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:32:02.310574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.428277 1728 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:32:02.310581-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.428943 1728 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"auto-996000.17645138e9e7722e\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"auto-996000\", UID:\"auto-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"auto-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 31, 5, 427685934, time.Local), LastTimestamp:time.Date(2023, time"} +{"Time":"2023-05-31T12:32:02.310593-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":".May, 31, 19, 31, 5, 427685934, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.76.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:32:02.310769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.429747 1728 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:32:02.310777-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.430138 1728 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:32:02.310782-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.430322 1728 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:32:02.310787-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: W0531 19:31:05.430663 1728 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.310792-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.430732 1728 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.310796-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.430984 1728 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:32:02.310801-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.431153 1728 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/auto-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:32:02.310806-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.444424 1728 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:32:02.31081-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.445780 1728 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:32:02.310814-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.445860 1728 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:32:02.310818-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.445877 1728 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:32:02.311063-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.445911 1728 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:32:02.311071-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: W0531 19:31:05.446433 1728 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.311076-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.446614 1728 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.31108-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.485635 1728 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:32:02.311085-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.485682 1728 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:32:02.311089-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.485696 1728 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:32:02.311093-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.487725 1728 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:32:02.311097-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.489483 1728 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:32:02.311101-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.489526 1728 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:32:02.311105-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.510903 1728 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:32:02.31111-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.511184 1728 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:32:02.311114-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.520652 1728 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"auto-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:32:02.311119-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.539167 1728 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.31139-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.539481 1728 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311398-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.546969 1728 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.311403-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.554346 1728 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.311415-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.562333 1728 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.31142-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.570333 1728 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.311433-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.632322 1728 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/auto-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:32:02.311441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732305 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-etc-ca-certificates\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311448-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732364 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-k8s-certs\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732391 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732409 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-k8s-certs\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311664-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732429 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/592ca6e9b777803761c7b96944e91736-etcd-certs\\\") pod \\\"etcd-auto-996000\\\" (UID: \\\"592ca6e9b777803761c7b96944e91736\\\") \" pod=\"kube-system/etcd-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311676-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732443 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/592ca6e9b777803761c7b96944e91736-etcd-data\\\") pod \\\"etcd-auto-996000\\\" (UID: \\\"592ca6e9b777803761c7b96944e91736\\\") \" pod=\"kube-system/etcd-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311682-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732466 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-etc-ca-certificates\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311688-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732483 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-flexvolume-dir\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311694-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732633 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/b167cf705952a0eabeed5d210325f356-kubeconfig\\\") pod \\\"kube-scheduler-auto-996000\\\" (UID: \\\"b167cf705952a0eabeed5d210325f356\\\") \" pod=\"kube-system/kube-scheduler-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311699-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732664 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-ca-certs\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311705-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732689 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311934-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732748 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-ca-certs\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311944-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732801 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-kubeconfig\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.31196-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732824 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311967-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.732838 1728 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: I0531 19:31:05.748062 1728 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311976-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:05 auto-996000 kubelet[1728]: E0531 19:31:05.748396 1728 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.311982-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:06 auto-996000 kubelet[1728]: E0531 19:31:06.033893 1728 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/auto-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:32:02.311987-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:06 auto-996000 kubelet[1728]: I0531 19:31:06.189054 1728 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.312241-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:06 auto-996000 kubelet[1728]: E0531 19:31:06.189571 1728 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.31225-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:06 auto-996000 kubelet[1728]: W0531 19:31:06.384502 1728 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.312256-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:06 auto-996000 kubelet[1728]: E0531 19:31:06.384723 1728 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:32:02.312261-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:07 auto-996000 kubelet[1728]: I0531 19:31:07.005947 1728 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.312266-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:08 auto-996000 kubelet[1728]: E0531 19:31:08.905496 1728 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"auto-996000\\\" not found\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.312271-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:08 auto-996000 kubelet[1728]: I0531 19:31:08.996745 1728 kubelet_node_status.go:73] \"Successfully registered node\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.312275-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:09 auto-996000 kubelet[1728]: I0531 19:31:09.093596 1728 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T12:32:02.312279-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:09 auto-996000 kubelet[1728]: I0531 19:31:09.420054 1728 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:32:02.312284-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:09 auto-996000 kubelet[1728]: E0531 19:31:09.425839 1728 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-auto-996000\\\" is forbidden: no PriorityClass with name system-node-critical was found\" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.312289-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:09 auto-996000 kubelet[1728]: I0531 19:31:09.430852 1728 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:32:02.312293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:09 auto-996000 kubelet[1728]: I0531 19:31:09.509750 1728 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:32:02.312297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:32:02.312553-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.31256-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312563-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312566-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312569-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312577-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312582-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[1728]: I0531 19:31:11.742882 1728 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:32:02.312586-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:32:02.312589-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312593-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312597-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312601-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312605-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312609-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:32:02.31262-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312625-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312627-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312861-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.31287-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312875-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312884-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312889-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:32:02.312893-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312897-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312902-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312906-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312914-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312918-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312921-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.312925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:32:02.31293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.838825 2378 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:32:02.312934-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.838889 2378 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:32:02.312939-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.839056 2378 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:32:02.312943-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.840259 2378 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:32:02.31314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.843159 2378 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:32:02.313164-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: W0531 19:31:11.883576 2378 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:32:02.313169-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.887094 2378 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:32:02.313171-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.887411 2378 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:32:02.313175-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.887479 2378 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:32:02.313178-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.887495 2378 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:32:02.313181-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.887504 2378 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:32:02.313184-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.887527 2378 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:32:02.313187-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.905490 2378 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:32:02.313206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.905537 2378 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:32:02.313218-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.905554 2378 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:32:02.313227-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.905573 2378 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:32:02.313387-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.913278 2378 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:32:02.313395-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.914055 2378 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:32:02.313399-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.914239 2378 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:32:02.313404-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.915510 2378 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:32:02.313412-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.916935 2378 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:32:02.313419-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.917125 2378 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:32:02.313424-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.917521 2378 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:32:02.313428-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.920003 2378 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:32:02.313432-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.982811 2378 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:32:02.313436-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.984099 2378 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:32:02.31344-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.984145 2378 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:32:02.313449-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: I0531 19:31:11.984165 2378 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:32:02.313453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:11 auto-996000 kubelet[2378]: E0531 19:31:11.984218 2378 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:32:02.313455-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.005830 2378 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:32:02.313458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.005871 2378 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:32:02.313671-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.005884 2378 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:32:02.313698-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.006059 2378 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:32:02.313702-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.006082 2378 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:32:02.313704-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.006087 2378 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:32:02.313707-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.008379 2378 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:32:02.313709-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.008427 2378 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:32:02.313712-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.008538 2378 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:32:02.313714-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.009320 2378 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:32:02.313719-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.009503 2378 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:32:02.313723-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.025267 2378 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.313727-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.085097 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.313731-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.085394 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.313735-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.085478 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.313739-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.085582 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.313743-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.085590 2378 kubelet_node_status.go:108] \"Node was previously registered\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.3139-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.086137 2378 kubelet_node_status.go:73] \"Successfully registered node\" node=\"auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.313907-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218307 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-ca-certs\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.313913-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218379 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-ca-certs\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.313918-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218405 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-etc-ca-certificates\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.313923-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218423 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/592ca6e9b777803761c7b96944e91736-etcd-data\\\") pod \\\"etcd-auto-996000\\\" (UID: \\\"592ca6e9b777803761c7b96944e91736\\\") \" pod=\"kube-system/etcd-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.313928-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218447 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-flexvolume-dir\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.313931-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218521 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-kubeconfig\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.313935-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218623 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/b167cf705952a0eabeed5d210325f356-kubeconfig\\\") pod \\\"kube-scheduler-auto-996000\\\" (UID: \\\"b167cf705952a0eabeed5d210325f356\\\") \" pod=\"kube-system/kube-scheduler-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314021-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218670 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-k8s-certs\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314028-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218850 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314032-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218910 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-k8s-certs\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314035-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.218958 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.219032 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/f1b01ea43cd7b8a2459bd799845cc4bc-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-auto-996000\\\" (UID: \\\"f1b01ea43cd7b8a2459bd799845cc4bc\\\") \" pod=\"kube-system/kube-controller-manager-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314042-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.219116 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-etc-ca-certificates\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314046-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.219149 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/aa9f9ddbf8512e9e1e527a4835c650f1-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-auto-996000\\\" (UID: \\\"aa9f9ddbf8512e9e1e527a4835c650f1\\\") \" pod=\"kube-system/kube-apiserver-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.219165 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/592ca6e9b777803761c7b96944e91736-etcd-certs\\\") pod \\\"etcd-auto-996000\\\" (UID: \\\"592ca6e9b777803761c7b96944e91736\\\") \" pod=\"kube-system/etcd-auto-996000\"\r\n"} +{"Time":"2023-05-31T12:32:02.314305-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.906134 2378 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:32:02.314309-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.918617 2378 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:32:02.314313-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:12 auto-996000 kubelet[2378]: I0531 19:31:12.924900 2378 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:32:02.314319-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:13 auto-996000 kubelet[2378]: I0531 19:31:13.012462 2378 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-auto-996000\" podStartSLOduration=1.012427785 podCreationTimestamp=\"2023-05-31 19:31:12 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:31:13.012332334 +0000 UTC m=+1.230128134\" watchObservedRunningTime=\"2023-05-31 19:31:13.012427785 +0000 UTC m=+1.230223584\"\r\n"} +{"Time":"2023-05-31T12:32:02.314329-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:13 auto-996000 kubelet[2378]: I0531 19:31:13.019979 2378 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-auto-996000\" podStartSLOduration=1.019955665 podCreationTimestamp=\"2023-05-31 19:31:12 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:31:13.019892506 +0000 UTC m=+1.237688304\" watchObservedRunningTime=\"2023-05-31 19:31:13.019955665 +0000 UTC m=+1.237751464\"\r\n"} +{"Time":"2023-05-31T12:32:02.314333-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:13 auto-996000 kubelet[2378]: I0531 19:31:13.040866 2378 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-auto-996000\" podStartSLOduration=1.04083698 podCreationTimestamp=\"2023-05-31 19:31:12 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:31:13.027375462 +0000 UTC m=+1.245171267\" watchObservedRunningTime=\"2023-05-31 19:31:13.04083698 +0000 UTC m=+1.258632776\"\r\n"} +{"Time":"2023-05-31T12:32:02.314337-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:13 auto-996000 kubelet[2378]: I0531 19:31:13.052921 2378 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-auto-996000\" podStartSLOduration=1.052895142 podCreationTimestamp=\"2023-05-31 19:31:12 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:31:13.041310206 +0000 UTC m=+1.259106006\" watchObservedRunningTime=\"2023-05-31 19:31:13.052895142 +0000 UTC m=+1.270690947\"\r\n"} +{"Time":"2023-05-31T12:32:02.314493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.441889 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.314501-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.519505 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-mnchb\\\" (UniqueName: \\\"kubernetes.io/projected/b9942a0f-ae61-4feb-aa3b-92dd62a3cca2-kube-api-access-mnchb\\\") pod \\\"kube-proxy-fsrxx\\\" (UID: \\\"b9942a0f-ae61-4feb-aa3b-92dd62a3cca2\\\") \" pod=\"kube-system/kube-proxy-fsrxx\"\r\n"} +{"Time":"2023-05-31T12:32:02.314522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.519575 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/b9942a0f-ae61-4feb-aa3b-92dd62a3cca2-kube-proxy\\\") pod \\\"kube-proxy-fsrxx\\\" (UID: \\\"b9942a0f-ae61-4feb-aa3b-92dd62a3cca2\\\") \" pod=\"kube-system/kube-proxy-fsrxx\"\r\n"} +{"Time":"2023-05-31T12:32:02.31453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.519599 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/b9942a0f-ae61-4feb-aa3b-92dd62a3cca2-xtables-lock\\\") pod \\\"kube-proxy-fsrxx\\\" (UID: \\\"b9942a0f-ae61-4feb-aa3b-92dd62a3cca2\\\") \" pod=\"kube-system/kube-proxy-fsrxx\"\r\n"} +{"Time":"2023-05-31T12:32:02.314534-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.519618 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/b9942a0f-ae61-4feb-aa3b-92dd62a3cca2-lib-modules\\\") pod \\\"kube-proxy-fsrxx\\\" (UID: \\\"b9942a0f-ae61-4feb-aa3b-92dd62a3cca2\\\") \" pod=\"kube-system/kube-proxy-fsrxx\"\r\n"} +{"Time":"2023-05-31T12:32:02.314538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.641103 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.31454-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.650690 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.314543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.822492 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-nqm6p\\\" (UniqueName: \\\"kubernetes.io/projected/3441f41c-f663-4d1d-b5f0-58954190954f-kube-api-access-nqm6p\\\") pod \\\"coredns-5d78c9869d-5hjrj\\\" (UID: \\\"3441f41c-f663-4d1d-b5f0-58954190954f\\\") \" pod=\"kube-system/coredns-5d78c9869d-5hjrj\"\r\n"} +{"Time":"2023-05-31T12:32:02.314555-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.822559 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/2dd94e10-bc76-4a4b-b736-e2c61af3ad41-config-volume\\\") pod \\\"coredns-5d78c9869d-lcnpk\\\" (UID: \\\"2dd94e10-bc76-4a4b-b736-e2c61af3ad41\\\") \" pod=\"kube-system/coredns-5d78c9869d-lcnpk\"\r\n"} +{"Time":"2023-05-31T12:32:02.314605-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.822581 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-vld6h\\\" (UniqueName: \\\"kubernetes.io/projected/2dd94e10-bc76-4a4b-b736-e2c61af3ad41-kube-api-access-vld6h\\\") pod \\\"coredns-5d78c9869d-lcnpk\\\" (UID: \\\"2dd94e10-bc76-4a4b-b736-e2c61af3ad41\\\") \" pod=\"kube-system/coredns-5d78c9869d-lcnpk\"\r\n"} +{"Time":"2023-05-31T12:32:02.31461-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:25 auto-996000 kubelet[2378]: I0531 19:31:25.822597 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/3441f41c-f663-4d1d-b5f0-58954190954f-config-volume\\\") pod \\\"coredns-5d78c9869d-5hjrj\\\" (UID: \\\"3441f41c-f663-4d1d-b5f0-58954190954f\\\") \" pod=\"kube-system/coredns-5d78c9869d-5hjrj\"\r\n"} +{"Time":"2023-05-31T12:32:02.314614-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:27 auto-996000 kubelet[2378]: I0531 19:31:27.427121 2378 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-fsrxx\" podStartSLOduration=2.427065766 podCreationTimestamp=\"2023-05-31 19:31:25 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:31:27.311425936 +0000 UTC m=+15.529221736\" watchObservedRunningTime=\"2023-05-31 19:31:27.427065766 +0000 UTC m=+15.644861565\"\r\n"} +{"Time":"2023-05-31T12:32:02.314619-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:27 auto-996000 kubelet[2378]: I0531 19:31:27.427797 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.314623-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:27 auto-996000 kubelet[2378]: I0531 19:31:27.594061 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/6532df92-d2ba-4418-b02b-f0a16f37dd3e-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"6532df92-d2ba-4418-b02b-f0a16f37dd3e\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:32:02.314627-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:27 auto-996000 kubelet[2378]: I0531 19:31:27.594155 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-w8rvd\\\" (UniqueName: \\\"kubernetes.io/projected/6532df92-d2ba-4418-b02b-f0a16f37dd3e-kube-api-access-w8rvd\\\") pod \\\"storage-provisioner\\\" (UID: \\\"6532df92-d2ba-4418-b02b-f0a16f37dd3e\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:32:02.314641-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:28 auto-996000 kubelet[2378]: I0531 19:31:28.341671 2378 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-5hjrj\" podStartSLOduration=3.341640818 podCreationTimestamp=\"2023-05-31 19:31:25 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:31:28.332003779 +0000 UTC m=+16.549799578\" watchObservedRunningTime=\"2023-05-31 19:31:28.341640818 +0000 UTC m=+16.559436618\"\r\n"} +{"Time":"2023-05-31T12:32:02.314707-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:28 auto-996000 kubelet[2378]: I0531 19:31:28.349596 2378 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-lcnpk\" podStartSLOduration=3.349570167 podCreationTimestamp=\"2023-05-31 19:31:25 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:31:28.349486231 +0000 UTC m=+16.567282036\" watchObservedRunningTime=\"2023-05-31 19:31:28.349570167 +0000 UTC m=+16.567365966\"\r\n"} +{"Time":"2023-05-31T12:32:02.314715-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:31 auto-996000 kubelet[2378]: I0531 19:31:31.106005 2378 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=4.105975718 podCreationTimestamp=\"2023-05-31 19:31:27 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:31:28.39230704 +0000 UTC m=+16.610102846\" watchObservedRunningTime=\"2023-05-31 19:31:31.105975718 +0000 UTC m=+19.323771529\"\r\n"} +{"Time":"2023-05-31T12:32:02.314719-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:31 auto-996000 kubelet[2378]: I0531 19:31:31.106257 2378 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:32:02.314723-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:31 auto-996000 kubelet[2378]: I0531 19:31:31.219301 2378 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-4ntm6\\\" (UniqueName: \\\"kubernetes.io/projected/d47ae127-6b74-4627-a7ac-06c86d5cd8aa-kube-api-access-4ntm6\\\") pod \\\"netcat-7458db8b8-g8lnr\\\" (UID: \\\"d47ae127-6b74-4627-a7ac-06c86d5cd8aa\\\") \" pod=\"default/netcat-7458db8b8-g8lnr\"\r\n"} +{"Time":"2023-05-31T12:32:02.314745-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:32 auto-996000 kubelet[2378]: I0531 19:31:32.611335 2378 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:32:02.314759-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:32 auto-996000 kubelet[2378]: I0531 19:31:32.612152 2378 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:32:02.314764-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.536507 2378 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-nqm6p\\\" (UniqueName: \\\"kubernetes.io/projected/3441f41c-f663-4d1d-b5f0-58954190954f-kube-api-access-nqm6p\\\") pod \\\"3441f41c-f663-4d1d-b5f0-58954190954f\\\" (UID: \\\"3441f41c-f663-4d1d-b5f0-58954190954f\\\") \"\r\n"} +{"Time":"2023-05-31T12:32:02.31477-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.536590 2378 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/3441f41c-f663-4d1d-b5f0-58954190954f-config-volume\\\") pod \\\"3441f41c-f663-4d1d-b5f0-58954190954f\\\" (UID: \\\"3441f41c-f663-4d1d-b5f0-58954190954f\\\") \"\r\n"} +{"Time":"2023-05-31T12:32:02.314809-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: W0531 19:31:33.536863 2378 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/3441f41c-f663-4d1d-b5f0-58954190954f/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:32:02.314816-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.537078 2378 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/3441f41c-f663-4d1d-b5f0-58954190954f-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"3441f41c-f663-4d1d-b5f0-58954190954f\" (UID: \"3441f41c-f663-4d1d-b5f0-58954190954f\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.31483-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.539730 2378 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/3441f41c-f663-4d1d-b5f0-58954190954f-kube-api-access-nqm6p\" (OuterVolumeSpecName: \"kube-api-access-nqm6p\") pod \"3441f41c-f663-4d1d-b5f0-58954190954f\" (UID: \"3441f41c-f663-4d1d-b5f0-58954190954f\"). InnerVolumeSpecName \"kube-api-access-nqm6p\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.314835-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.637470 2378 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/3441f41c-f663-4d1d-b5f0-58954190954f-config-volume\\\") on node \\\"auto-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:32:02.314839-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 kubelet[2378]: I0531 19:31:33.637543 2378 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-nqm6p\\\" (UniqueName: \\\"kubernetes.io/projected/3441f41c-f663-4d1d-b5f0-58954190954f-kube-api-access-nqm6p\\\") on node \\\"auto-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:32:02.314842-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:34 auto-996000 kubelet[2378]: I0531 19:31:34.388644 2378 scope.go:115] \"RemoveContainer\" containerID=\"c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\"\r\n"} +{"Time":"2023-05-31T12:32:02.314853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:34 auto-996000 kubelet[2378]: I0531 19:31:34.403356 2378 scope.go:115] \"RemoveContainer\" containerID=\"c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\"\r\n"} +{"Time":"2023-05-31T12:32:02.314868-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:34 auto-996000 kubelet[2378]: E0531 19:31:34.404880 2378 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = Unknown desc = Error: No such container: c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\" containerID=\"c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\"\r\n"} +{"Time":"2023-05-31T12:32:02.314909-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:34 auto-996000 kubelet[2378]: I0531 19:31:34.404957 2378 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:docker ID:c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec} err=\"failed to get container status \\\"c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\\\": rpc error: code = Unknown desc = Error: No such container: c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec\"\r\n"} +{"Time":"2023-05-31T12:32:02.314914-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:35 auto-996000 kubelet[2378]: I0531 19:31:35.990203 2378 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=3441f41c-f663-4d1d-b5f0-58954190954f path=\"/var/lib/kubelet/pods/3441f41c-f663-4d1d-b5f0-58954190954f/volumes\"\r\n"} +{"Time":"2023-05-31T12:32:02.314917-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.314919-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.314925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:32:02.314928-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:32:02.31493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:32:02.314933-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:32:02.314938-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCakNDQWU2Z0F3SUJBZ0lCQVRBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwdGFXNXAKYTNWaVpVTkJNQjRYRFRJek1EVXpNREU0TkRReE5Gb1hEVE16TURVeU9ERTRORFF4TkZvd0ZURVRNQkVHQTFVRQpBeE1LYldsdWFXdDFZbVZEUVRDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTCtXCitneFltMnNKQjJPdWkrbUxpY3FKUU1wbDNQMTdDUmVvak4xQWNBdngrK2Z3S1djTTZud042SmZmNTA3Q05HamcKTm1Cdzh1UC9sU1ZBSGY5dG5tN3g0Kytub1dBL0FsYncvMkJRTHhOb0FMTEJ1YnFrNmgrcW9jQm9pSkNJZGpSLwpVOHRoTmhXM0xScElmdHF5VktKQTRJc2ZrOHZvOFUzdXFKT04yd1FlS1RKMUgvbnJyMjQ0S3NhUFgwWW92elVPCnIwK05PeXhWdTFJL2k3ckdNaHVNNzV5TVoxeE9WWloyNnZPaFVOS092OVk0cFRjRzMvT0NtKzk0aDU4dnhuTTcKQ2JEZEozMnREL2YrWjVrS3VnV0Z0RWRtOEg2QnJqckxqcFlqR0k3OUJjMlpFVFRxQmtCaUpXdi80K1hyblUvUQpwTzNtMnJ5cmhBMUxOSFRyMEc4Q0F3RUFBYU5oTUY4d0RnWURWUjBQQVFIL0JBUURBZ0trTUIwR0ExVWRKUVFXCk1CUUdDQ3NHQVFVRkJ3TUNCZ2dyQmdFRkJRY0RBVEFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVcKQkJUYVlvOHZkanRNS1lqUkpXaXpHRGQ3d0Z4Z296QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFLWk9L"} +{"Time":"2023-05-31T12:32:02.314944-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:32:02.31505-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:32:02.315055-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:32:02.315064-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:32:02.315068-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:32:02.315071-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:32:02.315075-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user: system:node:auto-996000\r\n"} +{"Time":"2023-05-31T12:32:02.315079-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: system:node:auto-996000@mk\r\n"} +{"Time":"2023-05-31T12:32:02.315083-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: system:node:auto-996000@mk\r\n"} +{"Time":"2023-05-31T12:32:02.315087-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:32:02.315091-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:32:02.315094-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users:\r\n"} +{"Time":"2023-05-31T12:32:02.315101-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - name: system:node:auto-996000\r\n"} +{"Time":"2023-05-31T12:32:02.315123-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user:\r\n"} +{"Time":"2023-05-31T12:32:02.315131-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:32:02.315133-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:32:02.315136-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.315138-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.31514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:32:02.315143-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:32:02.315145-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:32:02.315147-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:32:02.315149-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:32:02.315151-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:32:02.315153-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315156-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:32:02.315158-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:32:02.315182-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:32:02.315185-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:32:02.315191-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:32:02.315202-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:32:02.315206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.31522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:32:02.315226-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:32:02.31523-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:32:02.315238-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:32:02.315242-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.315246-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.31525-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:32:02.315254-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:32:02.315258-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:32:02.315262-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:32:02.315265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315269-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:32:02.315273-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315277-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:32:02.31528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:32:02.315284-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:32:02.315288-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315292-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:32:02.315296-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315303-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:32:02.315307-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:32:02.315311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:32:02.315314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" options:\r\n"} +{"Time":"2023-05-31T12:32:02.315317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" json:\r\n"} +{"Time":"2023-05-31T12:32:02.315321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:32:02.315336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:32:02.315342-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:32:02.315346-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315349-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315353-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:32:02.315356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:32:02.31536-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315363-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315365-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:32:02.315368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.31537-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:32:02.315374-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.315376-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.315379-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:32:02.315389-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.315419-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters:\n"} +{"Time":"2023-05-31T12:32:02.315433-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:32:02.315438-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:32:02.315442-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extensions:\n"} +{"Time":"2023-05-31T12:32:02.315446-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - extension:\n"} +{"Time":"2023-05-31T12:32:02.315448-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" last-update: Wed, 31 May 2023 12:31:25 PDT\n"} +{"Time":"2023-05-31T12:32:02.315458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:32:02.315461-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:32:02.315463-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:32:02.315465-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://127.0.0.1:52089\n"} +{"Time":"2023-05-31T12:32:02.315467-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: auto-996000\n"} +{"Time":"2023-05-31T12:32:02.315469-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:32:02.315471-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:32:02.315474-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extensions:\n"} +{"Time":"2023-05-31T12:32:02.315476-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - extension:\n"} +{"Time":"2023-05-31T12:32:02.315478-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" last-update: Wed, 31 May 2023 12:30:59 PDT\n"} +{"Time":"2023-05-31T12:32:02.315493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:32:02.315496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:32:02.315498-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:32:02.3155-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://127.0.0.1:52059\n"} +{"Time":"2023-05-31T12:32:02.315503-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:32:02.315505-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts:\n"} +{"Time":"2023-05-31T12:32:02.315508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - context:\n"} +{"Time":"2023-05-31T12:32:02.315511-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cluster: auto-996000\n"} +{"Time":"2023-05-31T12:32:02.315514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extensions:\n"} +{"Time":"2023-05-31T12:32:02.315517-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - extension:\n"} +{"Time":"2023-05-31T12:32:02.315521-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" last-update: Wed, 31 May 2023 12:31:25 PDT\n"} +{"Time":"2023-05-31T12:32:02.315525-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:32:02.315528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:32:02.315532-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:32:02.315535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:32:02.315538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user: auto-996000\n"} +{"Time":"2023-05-31T12:32:02.315541-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: auto-996000\n"} +{"Time":"2023-05-31T12:32:02.315544-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - context:\n"} +{"Time":"2023-05-31T12:32:02.315547-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cluster: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:32:02.31555-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:32:02.315554-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:32:02.315557-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: auto-996000\n"} +{"Time":"2023-05-31T12:32:02.315561-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:32:02.315563-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:32:02.315565-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users:\n"} +{"Time":"2023-05-31T12:32:02.315584-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - name: auto-996000\n"} +{"Time":"2023-05-31T12:32:02.315587-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user:\n"} +{"Time":"2023-05-31T12:32:02.31559-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt\n"} +{"Time":"2023-05-31T12:32:02.315594-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.key\n"} +{"Time":"2023-05-31T12:32:02.315599-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:32:02.315601-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user:\n"} +{"Time":"2023-05-31T12:32:02.315604-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt\n"} +{"Time":"2023-05-31T12:32:02.315606-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key\n"} +{"Time":"2023-05-31T12:32:02.315608-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.31561-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.315613-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:32:02.315615-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.315617-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" items:\n"} +{"Time":"2023-05-31T12:32:02.315633-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.315636-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.315709-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:32:02.315715-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.315719-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:32:02.315732-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:32:02.315738-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:32:02.31574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:32:02.315743-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:32:02.315747-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:32:02.31575-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:32:02.315753-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:32:02.315756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:32:02.315758-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:32:02.315764-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:32:02.315766-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:32:02.315769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:32:02.315771-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:32:02.315773-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:32:02.315775-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:32:02.315778-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:32:02.31578-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.315782-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.315784-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.315787-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" annotations:\n"} +{"Time":"2023-05-31T12:32:02.315864-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:32:02.315871-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:32:02.315875-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:32:02.315879-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:32:02.315881-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:24Z\"\n"} +{"Time":"2023-05-31T12:32:02.315885-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:32:02.315888-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:32:02.315892-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"294\"\n"} +{"Time":"2023-05-31T12:32:02.315895-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 5368a793-6efd-4f33-918b-a04cd410f0c7\n"} +{"Time":"2023-05-31T12:32:02.315899-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.315902-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.31591-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:32:02.315914-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.315918-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:32:02.315922-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:32:02.315925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:32:02.31594-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:32:02.315948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:32:02.315952-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:32:02.315954-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:32:02.315961-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:32:02.315963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:32:02.315966-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:32:02.315968-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:32:02.31597-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:32:02.315972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:32:02.315975-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:32:02.315977-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:32:02.315979-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:32:02.315981-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:32:02.315984-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.315986-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.315988-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.31599-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" annotations:\n"} +{"Time":"2023-05-31T12:32:02.315993-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:32:02.315996-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:32:02.315998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:32:02.316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:32:02.316003-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:24Z\"\n"} +{"Time":"2023-05-31T12:32:02.316007-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:32:02.316009-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:32:02.316012-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"296\"\n"} +{"Time":"2023-05-31T12:32:02.316014-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: a24c08ee-0fd9-4105-bf39-b50d617ffddb\n"} +{"Time":"2023-05-31T12:32:02.316016-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.316018-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.316021-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" jws-kubeconfig-kcaemq: eyJhbGciOiJIUzI1NiIsImtpZCI6ImtjYWVtcSJ9..DBjHrMnSP8QG6XZbfkiqxZ8jIU19xcl7NAHAg8cckCA\n"} +{"Time":"2023-05-31T12:32:02.316121-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:32:02.31613-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.316134-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters:\n"} +{"Time":"2023-05-31T12:32:02.316137-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:32:02.316144-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCakNDQWU2Z0F3SUJBZ0lCQVRBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwdGFXNXAKYTNWaVpVTkJNQjRYRFRJek1EVXpNREU0TkRReE5Gb1hEVE16TURVeU9ERTRORFF4TkZvd0ZURVRNQkVHQTFVRQpBeE1LYldsdWFXdDFZbVZEUVRDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTCtXCitneFltMnNKQjJPdWkrbUxpY3FKUU1wbDNQMTdDUmVvak4xQWNBdngrK2Z3S1djTTZud042SmZmNTA3Q05HamcKTm1Cdzh1UC9sU1ZBSGY5dG5tN3g0Kytub1dBL0FsYncvMkJRTHhOb0FMTEJ1YnFrNmgrcW9jQm9pSkNJZGpSLwpVOHRoTmhXM0xScElmdHF5VktKQTRJc2ZrOHZvOFUzdXFKT04yd1FlS1RKMUgvbnJyMjQ0S3NhUFgwWW92elVPCnIwK05PeXhWdTFJL2k3ckdNaHVNNzV5TVoxeE9WWloyNnZPaFVOS092OVk0cFRjRzMvT0NtKzk0aDU4dnhuTTcKQ2JEZEozMnREL2YrWjVrS3VnV0Z0RWRtOEg2QnJqckxqcFlqR0k3OUJjMlpFVFRxQmtCaUpXdi80K1hyblUvUQpwTzNtMnJ5cmhBMUxOSFRyMEc4Q0F3RUFBYU5oTUY4d0RnWURWUjBQQVFIL0JBUURBZ0trTUIwR0ExVWRKUVFXCk1CUUdDQ3NHQVFVRkJ3TUNCZ2dyQmdFRkJRY0RBVEFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVcKQkJUYVlvOHZkanRNS1lqUkpXaXpHRGQ3d0Z4Z296QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRU"} +{"Time":"2023-05-31T12:32:02.31615-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"FLWk9LdUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\n"} +{"Time":"2023-05-31T12:32:02.316155-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:32:02.316158-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:32:02.316161-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:32:02.316164-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:32:02.316168-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:32:02.316171-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:32:02.316174-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users: null\n"} +{"Time":"2023-05-31T12:32:02.316177-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.31618-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.316183-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:11Z\"\n"} +{"Time":"2023-05-31T12:32:02.316186-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:32:02.31634-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:32:02.316349-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"303\"\n"} +{"Time":"2023-05-31T12:32:02.316352-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: d1036d59-dc29-46ee-a393-0fc1b50d5eb2\n"} +{"Time":"2023-05-31T12:32:02.316366-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.31637-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.316372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:32:02.316375-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.316378-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:32:02.316384-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:32:02.316386-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:32:02.316389-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:32:02.316391-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:32:02.3164-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:32:02.316403-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:32:02.316405-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:32:02.316408-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:32:02.31641-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:32:02.316412-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:32:02.316415-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:32:02.316417-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:32:02.31642-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:32:02.316422-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:32:02.316452-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:32:02.316459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:32:02.316464-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.316468-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.316472-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.316476-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" annotations:\n"} +{"Time":"2023-05-31T12:32:02.31648-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:32:02.316489-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:32:02.316493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:32:02.316498-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:32:02.316502-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:24Z\"\n"} +{"Time":"2023-05-31T12:32:02.316506-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:32:02.31651-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:32:02.316523-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"297\"\n"} +{"Time":"2023-05-31T12:32:02.31653-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 39589104-9185-4b3e-a22e-1fef888ee7bb\n"} +{"Time":"2023-05-31T12:32:02.316535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.316539-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.316543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:32:02.316547-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:32:02.316551-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" log\n"} +{"Time":"2023-05-31T12:32:02.316555-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" errors\n"} +{"Time":"2023-05-31T12:32:02.316559-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" health {\n"} +{"Time":"2023-05-31T12:32:02.316562-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:32:02.316566-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T12:32:02.31657-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ready\n"} +{"Time":"2023-05-31T12:32:02.316574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:32:02.316578-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:32:02.316595-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:32:02.316603-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:32:02.316607-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T12:32:02.31661-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:32:02.316613-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hosts {\n"} +{"Time":"2023-05-31T12:32:02.316615-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:32:02.316617-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:32:02.31662-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T12:32:02.316622-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:32:02.316625-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:32:02.316627-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T12:32:02.316629-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cache 30\n"} +{"Time":"2023-05-31T12:32:02.316631-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" loop\n"} +{"Time":"2023-05-31T12:32:02.316633-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" reload\n"} +{"Time":"2023-05-31T12:32:02.316636-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:32:02.316638-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T12:32:02.31664-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.316642-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.316645-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:11Z\"\n"} +{"Time":"2023-05-31T12:32:02.316647-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:32:02.31665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.316653-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"357\"\n"} +{"Time":"2023-05-31T12:32:02.316656-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 90983f94-644f-4c41-801f-abc5c21b49bd\n"} +{"Time":"2023-05-31T12:32:02.316658-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.31666-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.316685-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:32:02.316688-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.31669-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:32:02.316693-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:32:02.316696-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:32:02.316699-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:32:02.316701-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:32:02.316703-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:32:02.316706-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:32:02.316708-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:32:02.31671-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:32:02.316714-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:32:02.316717-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:32:02.316722-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:32:02.316725-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:32:02.316727-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:32:02.316729-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:32:02.316732-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:32:02.316734-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:32:02.316737-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.316741-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:32:02.316744-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:32:02.316825-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.316831-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:32:02.316835-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTMxMDNaFw0zMzA1MjgxOTMxMDNaMBkxFzAV\n"} +{"Time":"2023-05-31T12:32:02.316839-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:32:02.316843-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CgKCAQEApdnjriq5yeCJL2N0yWk+tOGc6RyS+S6LRmyxBuOaB8iAkvPpWT1IKLGY\n"} +{"Time":"2023-05-31T12:32:02.316847-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" M7gb+Auaj4s++xufbAh9oqVDUT8fr8mVkgmeUvlSmDSyVIKIDcB/FUvwiBw57yc8\n"} +{"Time":"2023-05-31T12:32:02.316851-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" xlzNoqnNyIJ+DO5xawmi82KCrKztIf92Mgh3GaT0DzEea7EbmItk/07DS7Y9u/Qm\n"} +{"Time":"2023-05-31T12:32:02.316859-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gj+wi0jvAgQu5vRA0ZzNGxC9/oY1G/JLjHZPGTwSb+KgcCAt+txmCR69JVHTvtYQ\n"} +{"Time":"2023-05-31T12:32:02.316863-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" xIzLX2Bhg1Jg3JTWEvpdqeXjMpCPyiSTnTB+ui3BaRzAkngEZQ+LCeyBP/Zrjmjw\n"} +{"Time":"2023-05-31T12:32:02.316867-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LRSl3z+Y2XxWlS/utqZZjaKrsYJp2wIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:32:02.316871-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUX7+OKc3T3Drwn9AbjVVg5O89l4kw\n"} +{"Time":"2023-05-31T12:32:02.316875-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAIHY\n"} +{"Time":"2023-05-31T12:32:02.316879-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3JOXmpeRonmIk0I88i8BmNnMuFJpR0Lhk8p9i2G4v0DLIwVT5OM4BI34VBlUpM2+\n"} +{"Time":"2023-05-31T12:32:02.316883-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HDylRADFfu8+w7kmV7r61B5qkMHzFUJEGTLHwZLVmBJBN9hbhcmp0+jJMTJTTrf5\n"} +{"Time":"2023-05-31T12:32:02.31689-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 9dHLoCKfs/9VkujcUs12Gc/mnYfxr1f+RYsn4mBuNm30h8gYk2LcqnEJmGSPqjV4\n"} +{"Time":"2023-05-31T12:32:02.316893-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ZcaFaLp1ipzEGzEt8yxQEcaazTxS/wYToqV4olD6n0PSkag72PqZVuN2Yw1o2iNK\n"} +{"Time":"2023-05-31T12:32:02.316896-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" B7kneNasR78RNxHhsF6BCjitGjbVFMElKo/08mSEWcS+FGyWybSb1Djan9VY8LlD\n"} +{"Time":"2023-05-31T12:32:02.316898-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LbAGlxBqE5SP3nYDMiE=\n"} +{"Time":"2023-05-31T12:32:02.316901-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.316903-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:32:02.316908-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:32:02.317027-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:32:02.317035-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.31704-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.317044-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:08Z\"\n"} +{"Time":"2023-05-31T12:32:02.317046-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:32:02.317049-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.317051-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"27\"\n"} +{"Time":"2023-05-31T12:32:02.317054-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: d4f71f42-3d8e-45f4-9ffd-4e826a4d30f3\n"} +{"Time":"2023-05-31T12:32:02.317056-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.317058-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.317065-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:32:02.317067-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.31707-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.317074-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:09Z\"\n"} +{"Time":"2023-05-31T12:32:02.317076-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:32:02.317079-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.317081-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"42\"\n"} +{"Time":"2023-05-31T12:32:02.317083-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 5a45b977-a840-40e7-a616-bc40dd37ae2d\n"} +{"Time":"2023-05-31T12:32:02.317086-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.317088-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.31709-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:32:02.317092-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:32:02.317095-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:32:02.317098-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:32:02.317101-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:32:02.317232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317241-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:32:02.317245-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317249-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:32:02.317253-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:32:02.317257-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:32:02.317261-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.317265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:32:02.317268-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:32:02.317272-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" min: null\n"} +{"Time":"2023-05-31T12:32:02.317276-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:32:02.31728-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:32:02.317289-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:32:02.317293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317301-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317304-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:32:02.317308-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317312-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" iptables:\n"} +{"Time":"2023-05-31T12:32:02.31732-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:32:02.317324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:32:02.317328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:32:02.317331-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.317335-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.317457-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:32:02.317466-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:32:02.31747-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.317474-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317477-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:32:02.317481-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.317485-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:32:02.317489-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:32:02.317493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:32:02.317496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:32:02.3175-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:32:02.317504-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:32:02.317512-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:32:02.317515-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317518-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:32:02.317525-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:32:02.317529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:32:02.317532-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317536-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317539-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:32:02.317543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:32:02.317553-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.317745-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:32:02.317752-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters:\n"} +{"Time":"2023-05-31T12:32:02.317756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:32:02.317761-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:32:02.317765-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:32:02.317769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: default\n"} +{"Time":"2023-05-31T12:32:02.317773-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts:\n"} +{"Time":"2023-05-31T12:32:02.317777-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - context:\n"} +{"Time":"2023-05-31T12:32:02.31778-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:32:02.317784-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:32:02.317788-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user: default\n"} +{"Time":"2023-05-31T12:32:02.317792-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: default\n"} +{"Time":"2023-05-31T12:32:02.317796-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:32:02.317799-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users:\n"} +{"Time":"2023-05-31T12:32:02.317807-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - name: default\n"} +{"Time":"2023-05-31T12:32:02.317812-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user:\n"} +{"Time":"2023-05-31T12:32:02.317816-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:32:02.31782-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.317823-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.317827-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:11Z\"\n"} +{"Time":"2023-05-31T12:32:02.317831-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" labels:\n"} +{"Time":"2023-05-31T12:32:02.317836-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.317839-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:32:02.317843-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.317847-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"226\"\n"} +{"Time":"2023-05-31T12:32:02.317851-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: fc032d18-3258-4cb0-95a2-b7e92af998cb\n"} +{"Time":"2023-05-31T12:32:02.317855-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.31811-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.318118-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:32:02.318122-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.318126-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:32:02.318146-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:32:02.318151-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:32:02.318156-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:32:02.318158-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:32:02.318161-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:32:02.318163-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:32:02.318165-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:32:02.318168-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:32:02.318171-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:32:02.318174-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:32:02.318179-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:32:02.318183-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:32:02.318186-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:32:02.318189-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:32:02.318192-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:32:02.318194-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:32:02.318196-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:32:02.318206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.31853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.318538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" annotations:\n"} +{"Time":"2023-05-31T12:32:02.318543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:32:02.318572-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:32:02.318589-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:32:02.318593-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:32:02.318595-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:24Z\"\n"} +{"Time":"2023-05-31T12:32:02.318598-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:32:02.3186-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.318602-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"298\"\n"} +{"Time":"2023-05-31T12:32:02.318605-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: a0ae05f1-7afd-45f2-95d0-7664bb669829\n"} +{"Time":"2023-05-31T12:32:02.318607-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.31861-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.318612-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:32:02.318615-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:32:02.318618-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:32:02.318622-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:32:02.318625-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - localhost\n"} +{"Time":"2023-05-31T12:32:02.318629-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - 192.168.76.2\n"} +{"Time":"2023-05-31T12:32:02.318632-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:32:02.318635-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:32:02.318637-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:32:02.31864-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:32:02.318642-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:32:02.318878-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:32:02.318886-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:32:02.318891-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:32:02.318895-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:32:02.318899-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:32:02.318902-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:32:02.318906-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:32:02.31891-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:32:02.318913-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" etcd:\n"} +{"Time":"2023-05-31T12:32:02.318917-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" local:\n"} +{"Time":"2023-05-31T12:32:02.318921-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:32:02.318925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:32:02.318929-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:32:02.318932-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:32:02.318937-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:32:02.31894-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:32:02.318944-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" networking:\n"} +{"Time":"2023-05-31T12:32:02.318948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:32:02.318952-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:32:02.318956-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:32:02.31896-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:32:02.318963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:32:02.318973-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:32:02.318978-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.318982-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.318985-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:10Z\"\n"} +{"Time":"2023-05-31T12:32:02.318989-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:32:02.319216-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.319223-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"199\"\n"} +{"Time":"2023-05-31T12:32:02.319228-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 2064430f-86bc-4fce-bb7a-60d875e71fae\n"} +{"Time":"2023-05-31T12:32:02.319232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:32:02.319246-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T12:32:02.31925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:32:02.319257-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:32:02.319262-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authentication:\n"} +{"Time":"2023-05-31T12:32:02.319265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:32:02.319267-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:32:02.31927-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" webhook:\n"} +{"Time":"2023-05-31T12:32:02.319272-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:32:02.319275-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:32:02.319277-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" x509:\n"} +{"Time":"2023-05-31T12:32:02.319279-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:32:02.319284-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authorization:\n"} +{"Time":"2023-05-31T12:32:02.319288-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:32:02.31929-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" webhook:\n"} +{"Time":"2023-05-31T12:32:02.319293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:32:02.319295-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:32:02.319298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:32:02.3193-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:32:02.319302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:32:02.319305-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:32:02.319307-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:32:02.319309-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.319312-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:32:02.319314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:32:02.319446-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:32:02.319453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:32:02.319468-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.319474-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:32:02.319477-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:32:02.31948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:32:02.319486-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:32:02.319489-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:32:02.319491-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:32:02.319494-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:32:02.319496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:32:02.319499-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:32:02.319501-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" logging:\n"} +{"Time":"2023-05-31T12:32:02.319503-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:32:02.319506-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" options:\n"} +{"Time":"2023-05-31T12:32:02.319508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" json:\n"} +{"Time":"2023-05-31T12:32:02.31951-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:32:02.319513-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:32:02.319515-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:32:02.319517-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:32:02.31952-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:32:02.319522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:32:02.319527-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:32:02.31953-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.319532-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:32:02.319878-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:32:02.319885-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:32:02.31989-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:32:02.319894-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:32:02.319897-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:32:02.319901-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.319905-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:31:10Z\"\n"} +{"Time":"2023-05-31T12:32:02.319909-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:32:02.319913-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:32:02.319915-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"202\"\n"} +{"Time":"2023-05-31T12:32:02.319918-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 4bc46a02-1feb-4aec-8083-341b46e33025\n"} +{"Time":"2023-05-31T12:32:02.31992-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: List\n"} +{"Time":"2023-05-31T12:32:02.319922-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T12:32:02.319924-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:32:02.319927-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.319929-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.319932-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:32:02.319934-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:32:02.319937-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: loaded (\u001b]8;;file://auto-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:32:02.319941-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:30:59 UTC; 55s ago\r\n"} +{"Time":"2023-05-31T12:32:02.319943-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:32:02.319956-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:32:02.319963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Main PID: 1034 (dockerd)\r\n"} +{"Time":"2023-05-31T12:32:02.319966-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tasks: 16\r\n"} +{"Time":"2023-05-31T12:32:02.319968-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Memory: 175.1M\r\n"} +{"Time":"2023-05-31T12:32:02.320305-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CPU: 7.960s\r\n"} +{"Time":"2023-05-31T12:32:02.320312-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:32:02.320317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─1034 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:32:02.320334-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.320341-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:30:59 auto-996000 dockerd[1034]: time=\"2023-05-31T19:30:59.719739083Z\" level=info msg=\"Loading containers: start.\"\r\n"} +{"Time":"2023-05-31T12:32:02.320346-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:30:59 auto-996000 dockerd[1034]: time=\"2023-05-31T19:30:59.822221467Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\r\n"} +{"Time":"2023-05-31T12:32:02.320351-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:30:59 auto-996000 dockerd[1034]: time=\"2023-05-31T19:30:59.864292853Z\" level=info msg=\"Loading containers: done.\"\r\n"} +{"Time":"2023-05-31T12:32:02.320354-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:30:59 auto-996000 dockerd[1034]: time=\"2023-05-31T19:30:59.874257701Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\r\n"} +{"Time":"2023-05-31T12:32:02.320356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:30:59 auto-996000 dockerd[1034]: time=\"2023-05-31T19:30:59.874331231Z\" level=info msg=\"Daemon has completed initialization\"\r\n"} +{"Time":"2023-05-31T12:32:02.320359-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:30:59 auto-996000 dockerd[1034]: time=\"2023-05-31T19:30:59.908325236Z\" level=info msg=\"API listen on /var/run/docker.sock\"\r\n"} +{"Time":"2023-05-31T12:32:02.320366-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:30:59 auto-996000 dockerd[1034]: time=\"2023-05-31T19:30:59.908372799Z\" level=info msg=\"API listen on [::]:2376\"\r\n"} +{"Time":"2023-05-31T12:32:02.320369-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:30:59 auto-996000 systemd[1]: Started Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T12:32:02.320372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 dockerd[1034]: time=\"2023-05-31T19:31:33.346907396Z\" level=info msg=\"ignoring event\" container=c895a55964b7730938ccff98bc272b76176b02e883716cf5262b5e9e816ce4ec module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:32:02.320377-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 dockerd[1034]: time=\"2023-05-31T19:31:33.450841801Z\" level=info msg=\"ignoring event\" container=129b42ef933e4e372f7657468dc9cddce5a497f042243807af6187343a5b1278 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:32:02.320399-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.320406-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.320748-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:32:02.320758-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.320764-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:32:02.320772-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:32:02.320778-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:32:02.320782-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:32:02.320785-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:32:02.320787-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:32:02.32079-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:32:02.320793-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:32:02.320795-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:32:02.320797-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.3208-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.320802-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:32:02.320805-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:32:02.320807-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.32081-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.320812-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.320814-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:32:02.320817-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:32:02.32082-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:32:02.320823-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:32:02.321042-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:32:02.321052-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:32:02.321061-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:32:02.321067-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.321071-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:32:02.321075-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:32:02.321079-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:32:02.321083-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:32:02.321086-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:32:02.321089-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.321091-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:32:02.321094-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:32:02.321097-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.3211-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.321104-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.321108-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.321112-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:32:02.321116-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:32:02.32112-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.321124-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:32:02.321128-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.321132-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:32:02.321463-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:32:02.321469-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.321472-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:32:02.321475-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:32:02.321477-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.321479-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:32:02.321482-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:32:02.321484-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.321487-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.321489-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:32:02.321491-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T12:32:02.321494-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:32:02.321496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:32:02.321499-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:32:02.321501-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:32:02.321504-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T12:32:02.321506-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:32:02.321509-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T12:32:02.321511-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.321514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.321516-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:32:02.321519-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:32:02.321521-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:32:02.321523-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:32:02.321526-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:32:02.321528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:32:02.321531-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:32:02.321538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:32:02.321769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:32:02.321775-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.321778-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:32:02.321781-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers: 17\r\n"} +{"Time":"2023-05-31T12:32:02.321783-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Running: 16\r\n"} +{"Time":"2023-05-31T12:32:02.321785-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:32:02.321788-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Stopped: 1\r\n"} +{"Time":"2023-05-31T12:32:02.321792-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Images: 9\r\n"} +{"Time":"2023-05-31T12:32:02.321795-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:32:02.321799-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:32:02.321809-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:32:02.321812-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:32:02.321816-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:32:02.32182-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:32:02.321824-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:32:02.321828-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:32:02.321832-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:32:02.321835-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:32:02.321843-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:32:02.321846-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:32:02.32185-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:32:02.321853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:32:02.321856-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:32:02.321859-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Runtimes: io.containerd.runc.v2 runc\r\n"} +{"Time":"2023-05-31T12:32:02.321862-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:32:02.321866-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:32:02.32187-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:32:02.322137-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:32:02.322145-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:32:02.322148-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:32:02.322152-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:32:02.322156-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:32:02.32216-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:32:02.322164-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:32:02.322168-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:32:02.322172-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:32:02.322176-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:32:02.32218-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:32:02.322188-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:32:02.322192-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: auto-996000\r\n"} +{"Time":"2023-05-31T12:32:02.322196-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ID: 5fa7cb35-dbb2-4b94-a0ff-21501f0ad0dc\r\n"} +{"Time":"2023-05-31T12:32:02.3222-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:32:02.322204-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:32:02.322207-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:32:02.322212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:32:02.322218-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:32:02.322224-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:32:02.322232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:32:02.322254-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:32:02.322259-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:32:02.322267-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:32:02.322288-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.322307-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.322311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.32249-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:32:02.322497-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:32:02.322502-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: loaded (\u001b]8;;file://auto-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:32:02.322507-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:32:02.322511-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─\u001b]8;;file://auto-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:32:02.322514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:31:00 UTC; 56s ago\r\n"} +{"Time":"2023-05-31T12:32:02.322517-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:32:02.322519-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:32:02.322522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Main PID: 1255 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:32:02.322524-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tasks: 11\r\n"} +{"Time":"2023-05-31T12:32:02.322527-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Memory: 18.1M\r\n"} +{"Time":"2023-05-31T12:32:02.322529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CPU: 1.539s\r\n"} +{"Time":"2023-05-31T12:32:02.322532-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:32:02.322534-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─1255 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:32:02.322537-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.32254-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:06 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:06Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/679a363bb31cfc349d7f7df344ef9e2c7ff852cb7130337b495cdcaed97b5771/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:32:02.32255-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:06 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:06Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/9fb700f7f9a765ec444ed4238dbf2836b84f41c24008694f224475fa9e66effe/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:32:02.322553-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:06 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:06Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/d854a57bc8a411e477eb4f108033f4c55de6e899f4658fe48c8a2e457ea32ed7/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:32:02.322713-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:26 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:26Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/f0324a33c11c5b2b6d389dc39b70e8b38114eeb4cb383a2e423c505a96db7301/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:32:02.322722-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:26 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:26Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/5b57afb02c2378a3d46d2ff7efa5dffaa6775923ff751dab42d38cf7b020a688/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:32:02.322725-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:26 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:26Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/129b42ef933e4e372f7657468dc9cddce5a497f042243807af6187343a5b1278/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:32:02.322728-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:27 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:27Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/3fd6c81619cf89d2ed81714266cba9c4daa4caca62ea8efc82bccce918e9b193/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:32:02.322731-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:31 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:31Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/e48aa0d1dc259075747b7ef32950cd7cdaca27346310fa135047c5841a64f95b/resolv.conf as [nameserver 10.96.0.10 search default.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\r\n"} +{"Time":"2023-05-31T12:32:02.322734-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:32 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:32Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/24,},}\"\r\n"} +{"Time":"2023-05-31T12:32:02.322738-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:36 auto-996000 cri-dockerd[1255]: time=\"2023-05-31T19:31:36Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:32:02.322741-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.322743-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.322746-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:32:02.322748-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.322751-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:32:02.322754-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:32:02.322756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:32:02.323143-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:32:02.323159-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:32:02.323169-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:32:02.323174-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.323178-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.323182-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:32:02.323204-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:32:02.323214-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:32:02.323219-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:32:02.323224-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:32:02.323228-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:32:02.323232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.323236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:32:02.32324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:32:02.323244-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:32:02.323248-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:32:02.323252-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.323256-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:32:02.32326-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:32:02.323265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:32:02.323268-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:32:02.323273-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.323276-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:32:02.32328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:32:02.323284-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.323606-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.323613-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.323626-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.323633-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:32:02.323635-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:32:02.323638-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.32364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:32:02.323643-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:32:02.323645-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.323648-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:32:02.32365-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:32:02.323652-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.323655-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.323658-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.323661-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:32:02.323663-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:32:02.32367-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.323672-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.323675-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:32:02.323678-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.32368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:32:02.323682-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:32:02.323685-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.323687-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:32:02.32369-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:32:02.324039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:32:02.324047-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:32:02.324052-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:32:02.324056-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:32:02.32406-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:32:02.324064-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.324074-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.324081-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:32:02.324085-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:32:02.324094-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:32:02.324098-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:32:02.324102-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:32:02.324106-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:32:02.32411-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.324113-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:32:02.324118-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:32:02.324122-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:32:02.324126-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:32:02.324129-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.324133-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:32:02.324141-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:32:02.324146-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:32:02.32415-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:32:02.324153-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.324157-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:32:02.32445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:32:02.324458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.324463-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.324467-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.324471-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.324476-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:32:02.32448-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:32:02.324485-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.324499-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:32:02.324505-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:32:02.324508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.324511-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:32:02.324514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:32:02.324517-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.324521-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.324524-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:32:02.324529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:32:02.324532-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.324536-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.324545-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:32:02.32455-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:32:02.324554-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: loaded (\u001b]8;;file://auto-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:32:02.324559-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:30:59 UTC; 1min 0s ago\r\n"} +{"Time":"2023-05-31T12:32:02.324563-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:32:02.324845-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Main PID: 817 (containerd)\r\n"} +{"Time":"2023-05-31T12:32:02.324852-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tasks: 179\r\n"} +{"Time":"2023-05-31T12:32:02.324856-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Memory: 68.1M\r\n"} +{"Time":"2023-05-31T12:32:02.32486-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CPU: 2.591s\r\n"} +{"Time":"2023-05-31T12:32:02.324864-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:32:02.324868-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─ 817 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:32:02.324872-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─1884 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 9fb700f7f9a765ec444ed4238dbf2836b84f41c24008694f224475fa9e66effe -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.324877-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─1902 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 679a363bb31cfc349d7f7df344ef9e2c7ff852cb7130337b495cdcaed97b5771 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.324881-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─1935 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 1490948c1e415b31d1595b47121e239be5bb7b9ef46431a4aec95571c1ca5946 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.324886-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─1942 /usr/bin/containerd-shim-runc-v2 -namespace moby -id d854a57bc8a411e477eb4f108033f4c55de6e899f4658fe48c8a2e457ea32ed7 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.324891-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─2095 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5c6d48cadd324caefdbfee24b05585a4a9193c417512f038de94d47dbf63f55a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.324895-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─2104 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 6be6cb3a3495f3a212b4b67733565127059263e76e9aac46f5a7793bd0a32bf8 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.3249-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─2105 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 41df1a5527eb9dd0a60f806fcf5bf606d83da2389050af4645a53f12d84fc72c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.324909-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─2148 /usr/bin/containerd-shim-runc-v2 -namespace moby -id aab813d4c78044b393e1e81ef66b86e00ea1b02342358da56edb1609d39fc8f1 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.324914-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─2895 /usr/bin/containerd-shim-runc-v2 -namespace moby -id f0324a33c11c5b2b6d389dc39b70e8b38114eeb4cb383a2e423c505a96db7301 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.324932-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─2961 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 482ddb44808fe23ff98e64901c232693220cb92eafa33a454f00eda7aeb89afa -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.32527-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─3016 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5b57afb02c2378a3d46d2ff7efa5dffaa6775923ff751dab42d38cf7b020a688 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.325282-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─3283 /usr/bin/containerd-shim-runc-v2 -namespace moby -id d259948f65cecd72bb5fa2365bcdad90a8144599d1a1fd71ee3b3812a38072e0 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.32529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─3405 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 3fd6c81619cf89d2ed81714266cba9c4daa4caca62ea8efc82bccce918e9b193 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.325295-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─3445 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 21c25d795a91183ce0b59bda23acd47e9d075209eca06da96eb280f13b9573ca -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.3253-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─3529 /usr/bin/containerd-shim-runc-v2 -namespace moby -id e48aa0d1dc259075747b7ef32950cd7cdaca27346310fa135047c5841a64f95b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.32531-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─3815 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 6d1e392bc6e2c83c715f7577651e1e55d86134d01e61550c0518ed9c6d73246d -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:32:02.325317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.325322-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 containerd[817]: time=\"2023-05-31T19:31:33.347193975Z\" level=info msg=\"cleaning up dead shim\"\r\n"} +{"Time":"2023-05-31T12:32:02.325337-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 containerd[817]: time=\"2023-05-31T19:31:33.356216399Z\" level=warning msg=\"cleanup warnings time=\\\"2023-05-31T19:31:33Z\\\" level=info msg=\\\"starting signal loop\\\" namespace=moby pid=3627 runtime=io.containerd.runc.v2\\n\"\r\n"} +{"Time":"2023-05-31T12:32:02.325349-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 containerd[817]: time=\"2023-05-31T19:31:33.451298785Z\" level=info msg=\"shim disconnected\" id=129b42ef933e4e372f7657468dc9cddce5a497f042243807af6187343a5b1278\r\n"} +{"Time":"2023-05-31T12:32:02.325355-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 containerd[817]: time=\"2023-05-31T19:31:33.451363886Z\" level=warning msg=\"cleaning up after shim disconnected\" id=129b42ef933e4e372f7657468dc9cddce5a497f042243807af6187343a5b1278 namespace=moby\r\n"} +{"Time":"2023-05-31T12:32:02.325359-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 containerd[817]: time=\"2023-05-31T19:31:33.451375695Z\" level=info msg=\"cleaning up dead shim\"\r\n"} +{"Time":"2023-05-31T12:32:02.325364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:33 auto-996000 containerd[817]: time=\"2023-05-31T19:31:33.461232671Z\" level=warning msg=\"cleanup warnings time=\\\"2023-05-31T19:31:33Z\\\" level=info msg=\\\"starting signal loop\\\" namespace=moby pid=3681 runtime=io.containerd.runc.v2\\n\"\r\n"} +{"Time":"2023-05-31T12:32:02.325369-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:37 auto-996000 containerd[817]: time=\"2023-05-31T19:31:37.041874677Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:32:02.325822-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:37 auto-996000 containerd[817]: time=\"2023-05-31T19:31:37.041941292Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:32:02.325832-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:37 auto-996000 containerd[817]: time=\"2023-05-31T19:31:37.041958994Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:32:02.325839-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:31:37 auto-996000 containerd[817]: time=\"2023-05-31T19:31:37.042568181Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/6d1e392bc6e2c83c715f7577651e1e55d86134d01e61550c0518ed9c6d73246d pid=3815 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:32:02.325844-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.325848-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.325858-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:32:02.325864-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.325874-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:32:02.325887-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.325893-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:32:02.325897-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:32:02.325902-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:32:02.325906-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.32591-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:32:02.325914-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.325933-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:32:02.325944-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:32:02.325949-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:32:02.325953-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:32:02.326328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:32:02.326336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.32634-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:32:02.326344-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:32:02.326363-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:32:02.326367-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:32:02.326372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.326405-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.326416-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:32:02.326421-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:32:02.326425-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.326429-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:32:02.326433-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:32:02.32644-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:32:02.326447-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:32:02.326451-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:32:02.326458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:32:02.326465-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:32:02.326472-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.326479-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.326484-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.326493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:32:02.3265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:32:02.326508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.326518-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:32:02.326523-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.326529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:32:02.326991-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:32:02.326998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.327-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.327003-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:32:02.327006-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:32:02.327009-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.327011-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:32:02.327014-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:32:02.327017-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:32:02.327019-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.327022-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:32:02.327024-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.327027-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:32:02.327031-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:32:02.327033-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:32:02.327036-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:32:02.327038-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:32:02.327041-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327043-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:32:02.327046-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:32:02.327048-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:32:02.327051-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:32:02.327053-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327056-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.327058-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:32:02.327304-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:32:02.327313-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327318-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:32:02.327322-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:32:02.327326-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:32:02.327329-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:32:02.327333-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:32:02.327337-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:32:02.327357-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:32:02.327361-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.327365-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.327369-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.327373-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:32:02.327377-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:32:02.327381-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.327401-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:32:02.327406-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327408-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:32:02.327411-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:32:02.327414-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.327416-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.327418-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:32:02.327421-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:32:02.327424-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:32:02.327426-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:32:02.327428-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:32:02.327819-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:32:02.327827-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327831-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:32:02.327834-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:32:02.327836-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.327839-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.327841-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:32:02.327843-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:32:02.327846-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327848-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:32:02.32785-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.327853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.327855-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.327857-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.327859-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327862-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:32:02.327864-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.327867-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:32:02.327869-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327871-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:32:02.327873-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.327876-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.327878-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:32:02.32788-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:32:02.327894-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:32:02.327903-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:32:02.327908-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.327912-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:32:02.328065-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:32:02.328072-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:32:02.328076-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:32:02.32808-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:32:02.328084-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:32:02.328088-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:32:02.328093-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328097-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:32:02.328101-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:32:02.328111-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:32:02.328119-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.328123-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:32:02.328128-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328132-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328136-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.32814-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:32:02.328144-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:32:02.328148-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:32:02.328153-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:32:02.328157-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:32:02.328164-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328169-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:32:02.328173-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:32:02.328177-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:32:02.328181-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328407-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:32:02.328413-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:32:02.328424-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328428-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:32:02.328431-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:32:02.328433-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:32:02.328436-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:32:02.328438-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:32:02.328441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:32:02.328445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:32:02.328449-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:32:02.328453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.328456-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.32846-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:32:02.32848-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:32:02.328486-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:32:02.32849-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:32:02.328493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:32:02.3285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:32:02.328503-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:32:02.328507-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328511-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:32:02.328514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328517-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:32:02.328521-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328525-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328748-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:32:02.328755-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328759-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328763-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.328766-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328775-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.328779-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328782-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:32:02.328786-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:32:02.328789-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.328791-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:32:02.328794-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:32:02.328796-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328803-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328807-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328811-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.328815-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.328818-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328823-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:32:02.328826-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.32883-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:32:02.328834-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328837-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:32:02.328841-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.328844-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:32:02.328859-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:32:02.328867-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:32:02.328874-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:32:02.328879-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:32:02.329285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:32:02.329292-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.329297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:32:02.329306-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:32:02.329311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:32:02.329315-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:32:02.329319-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:32:02.329323-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:32:02.329327-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:32:02.329331-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:32:02.329335-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:32:02.329339-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:32:02.329343-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:32:02.329347-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:32:02.329351-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:32:02.329355-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:32:02.329372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:32:02.329378-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:32:02.329382-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:32:02.329386-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:32:02.32939-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:32:02.329394-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:32:02.329399-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329403-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:32:02.329407-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:32:02.329717-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:32:02.329726-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329731-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.329735-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:32:02.329739-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:32:02.329743-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:32:02.329746-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.32975-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329754-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:32:02.329757-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.329761-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:32:02.329765-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.329769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:32:02.329772-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:32:02.329776-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:32:02.32978-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:32:02.329789-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:32:02.329794-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.329798-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:32:02.329802-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329806-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.32981-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:32:02.329813-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:32:02.329817-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:32:02.329821-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:32:02.329933-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329941-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329951-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329955-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.329959-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:32:02.329963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.329966-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:32:02.329969-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.329973-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:32:02.329976-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.32998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.329983-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:32:02.329986-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:32:02.32999-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:32:02.329994-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:32:02.329997-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330001-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330004-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330008-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:32:02.330011-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330015-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:32:02.330025-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:32:02.330029-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330032-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:32:02.330036-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330363-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:32:02.330377-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:32:02.33038-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:32:02.330382-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:32:02.330384-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330387-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330389-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330392-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330398-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330401-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:32:02.330404-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330408-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:32:02.330412-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:32:02.330415-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330419-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:32:02.330423-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:32:02.330427-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330431-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:32:02.330434-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330439-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:32:02.330442-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330446-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:32:02.330454-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:32:02.330462-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330788-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:32:02.330796-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330799-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330803-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330828-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:32:02.330839-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:32:02.330844-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330848-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:32:02.330853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:32:02.33087-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330878-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:32:02.330881-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:32:02.330883-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:32:02.330886-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330891-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:32:02.330895-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:32:02.3309-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330904-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:32:02.330908-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:32:02.330911-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.330915-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:32:02.330919-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:32:02.330922-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.330925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.330929-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:32:02.331244-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:32:02.331252-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331272-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331279-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:32:02.331286-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.33129-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331305-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331312-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331318-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331322-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331326-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331331-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331339-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331347-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331352-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331359-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:32:02.331368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331371-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:32:02.331375-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331379-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331382-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331386-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.33139-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331398-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331687-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331717-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331724-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331729-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331733-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:32:02.331737-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331741-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331745-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331749-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331753-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331757-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331761-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:32:02.331765-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.331768-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331772-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:32:02.331776-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.33178-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:32:02.331784-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331788-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331792-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331796-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:32:02.3318-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331804-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:32:02.331808-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:32:02.331812-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.331987-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:32:02.331999-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:32:02.332004-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:32:02.332009-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:32:02.332013-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:32:02.332017-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:32:02.332021-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.332025-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:32:02.332028-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:32:02.332032-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:32:02.332036-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:32:02.332039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:32:02.332042-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:32:02.332044-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.332047-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:32:02.332049-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.332051-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.332054-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:32:02.332056-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.332058-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.33206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:32:02.332063-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:32:02.332066-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: loaded (\u001b]8;;file://auto-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:32:02.332166-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:32:02.332172-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:32:02.332176-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:32:02.332179-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.332181-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.332184-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:32:02.332187-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:32:02.332189-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:32:02.332192-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:32:02.332194-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:32:02.332197-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:32:02.332199-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:32:02.332201-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:32:02.332204-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.332206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:32:02.332212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:32:02.332217-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:32:02.332219-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:32:02.332222-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:32:02.332225-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:32:02.332227-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:32:02.33223-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:32:02.332232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:32:02.332235-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:32:02.332237-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:32:02.332239-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.332483-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:32:02.33249-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:32:02.332495-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:32:02.332498-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:32:02.332502-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:32:02.332505-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:32:02.332508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.332512-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:32:02.332516-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:32:02.33252-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:32:02.332524-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.332527-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.332531-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:32:02.332535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:32:02.332539-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:32:02.332543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.332552-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:32:02.332556-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.33256-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:32:02.332564-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:32:02.332568-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.332572-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.332576-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:32:02.33258-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.332584-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.332588-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:32:02.332592-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.332596-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:32:02.332951-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:32:02.332958-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:32:02.332963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:32:02.332967-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.332971-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:32:02.332984-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.332993-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:32:02.332998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:32:02.333001-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:32:02.333005-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:32:02.333008-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333012-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:32:02.333022-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:32:02.333025-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:32:02.333027-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:32:02.33304-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:32:02.333047-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.33306-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:32:02.333065-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:32:02.333069-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:32:02.333071-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333073-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:32:02.333076-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:32:02.333538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333547-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:32:02.333551-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:32:02.333556-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:32:02.33356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333564-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:32:02.333568-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:32:02.333572-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:32:02.333576-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.33358-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333584-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:32:02.333588-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:32:02.333591-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:32:02.333595-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333599-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:32:02.333603-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:32:02.333612-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:32:02.333617-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:32:02.333619-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333627-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:32:02.333632-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:32:02.333636-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:32:02.33364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:32:02.333647-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333914-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:32:02.333922-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:32:02.333927-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:32:02.333932-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333936-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:32:02.333941-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:32:02.333945-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:32:02.33395-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:32:02.333954-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333958-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:32:02.333962-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:32:02.333966-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.33397-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:32:02.333975-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:32:02.333979-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333983-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:32:02.333987-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:32:02.333991-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.333996-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:32:02.334-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:32:02.334005-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:32:02.334014-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334018-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:32:02.334022-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:32:02.334026-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334451-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:32:02.334459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.334464-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334468-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:32:02.334472-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:32:02.334476-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:32:02.33448-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.334484-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334488-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:32:02.334492-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:32:02.334496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.334499-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334501-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:32:02.334535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:32:02.334543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:32:02.334546-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.334549-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334551-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:32:02.334559-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:32:02.334561-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334564-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:32:02.334566-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:32:02.334569-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334571-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:32:02.334919-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:32:02.334927-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:32:02.334932-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334936-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:32:02.334941-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:32:02.334946-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:32:02.334953-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:32:02.334957-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:32:02.334961-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.334965-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334969-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:32:02.334973-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:32:02.334979-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334983-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:32:02.334987-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.334991-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:32:02.334995-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.334999-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:32:02.335003-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:32:02.335007-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:32:02.335017-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.335021-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.335025-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:32:02.335029-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:32:02.335434-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.335441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.335446-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:32:02.33545-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:32:02.335455-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:32:02.335459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:32:02.335463-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.335468-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.335472-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:32:02.335476-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:32:02.33548-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:32:02.335487-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:32:02.335493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.335497-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.335501-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:32:02.335505-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:32:02.335509-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.335514-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:32:02.335518-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:32:02.335523-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.335527-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.335531-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.335535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:32:02.335539-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:32:02.335544-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:32:02.336033-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:32:02.33604-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:32:02.336044-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.336048-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:32:02.336058-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:32:02.336062-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:32:02.336067-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:32:02.336071-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.336075-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:32:02.336079-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.336083-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:32:02.336088-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:32:02.336092-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.336096-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.3361-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:32:02.336104-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:32:02.336108-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:32:02.336112-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.336117-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:32:02.336121-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.336125-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.336129-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.336133-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:32:02.336522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:32:02.33653-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.336535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:32:02.33654-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.336544-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.336552-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:32:02.336556-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:32:02.336559-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:32:02.336565-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:32:02.336569-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:32:02.336573-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:32:02.336577-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:32:02.336579-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:32:02.336583-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:32:02.336589-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:32:02.336592-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:32:02.336596-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:32:02.3366-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:32:02.336603-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.336607-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.336611-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:32:02.336615-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:32:02.336619-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:32:02.336623-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.336629-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:32:02.336632-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:32:02.337079-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:32:02.337087-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.337092-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337096-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:32:02.3371-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:32:02.337104-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:32:02.337108-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:32:02.337112-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.337116-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337119-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:32:02.337123-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:32:02.337128-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:32:02.337131-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:32:02.337135-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:32:02.33714-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.337143-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337147-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:32:02.337151-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:32:02.337155-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:32:02.337164-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:32:02.337168-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.337172-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337175-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:32:02.337179-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:32:02.337183-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:32:02.337489-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:32:02.337509-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337513-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:32:02.337516-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:32:02.33752-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:32:02.337524-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:32:02.337528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.337532-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337534-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:32:02.337538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:32:02.337541-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:32:02.337543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.337546-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:32:02.337549-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:32:02.337554-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:32:02.337561-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.337568-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:32:02.337575-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:32:02.337584-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:32:02.337592-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:32:02.337597-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.337601-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.337606-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337613-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:32:02.337868-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:32:02.337875-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:32:02.33788-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337884-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:32:02.337888-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:32:02.337892-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:32:02.337894-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:32:02.337898-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:32:02.337901-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337905-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:32:02.337909-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:32:02.337913-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337917-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:32:02.337921-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:32:02.337925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337929-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:32:02.337933-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:32:02.337942-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337947-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:32:02.337951-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.337954-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.337958-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:32:02.337961-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:32:02.337965-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.338261-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:32:02.33827-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:32:02.338278-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.338282-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:32:02.338286-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.33829-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:32:02.338294-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.338298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.338302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.338306-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:32:02.33831-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:32:02.338314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:32:02.338317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.338321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.338325-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:32:02.338328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:32:02.338332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:32:02.338335-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.338338-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.33834-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:32:02.338342-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:32:02.338345-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:32:02.338347-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:32:02.338349-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.338745-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:32:02.338756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:32:02.33876-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:32:02.338773-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:32:02.338779-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.338783-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:32:02.338787-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:32:02.338795-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:32:02.338799-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:32:02.338803-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.338807-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:32:02.338811-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:32:02.338815-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:32:02.338819-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:32:02.338823-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:32:02.338826-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.33883-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:32:02.338834-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:32:02.338838-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:32:02.338841-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.338845-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.338849-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:32:02.338853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:32:02.339272-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:32:02.339279-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.339282-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:32:02.339284-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.339287-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.339289-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:32:02.339292-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:32:02.339295-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:32:02.339298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.339302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.339306-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:32:02.33931-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:32:02.339314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:32:02.339318-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:32:02.339321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:32:02.339328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:32:02.339332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:32:02.339336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.339339-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.339343-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:32:02.339347-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:32:02.339351-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:32:02.339356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:32:02.339798-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.33981-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:32:02.33982-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:32:02.339829-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:32:02.339834-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:32:02.339838-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:32:02.339849-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:32:02.33986-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:32:02.339871-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:32:02.33988-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:32:02.339892-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:32:02.3399-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:32:02.339904-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:32:02.339921-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:32:02.339931-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:32:02.339946-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:32:02.339951-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:32:02.339955-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:32:02.339962-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:32:02.339972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:32:02.339981-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:32:02.339989-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:32:02.339993-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:32:02.340259-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:32:02.34027-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:32:02.340276-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:32:02.340281-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:32:02.340285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:32:02.340292-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:32:02.340296-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:32:02.3403-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:32:02.340304-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:32:02.340311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:32:02.340317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.340321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.340325-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:32:02.340331-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.340335-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:32:02.340339-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.340344-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.340348-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.340352-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \r\n"} +{"Time":"2023-05-31T12:32:02.340356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:32:02.340368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:32:02.340379-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.340391-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \r\n"} +{"Time":"2023-05-31T12:32:02.340844-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.340853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \r\n"} +{"Time":"2023-05-31T12:32:02.340857-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:32:02.340862-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:32:02.340866-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.34087-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \r\n"} +{"Time":"2023-05-31T12:32:02.340891-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:32:02.340901-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.340906-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \r\n"} +{"Time":"2023-05-31T12:32:02.340911-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.340915-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:32:02.340919-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:32:02.34093-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:32:02.340938-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.340942-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:32:02.340949-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:32:02.340958-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:32:02.340961-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.340965-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:32:02.340969-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:32:02.340973-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.340976-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:32:02.34098-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:32:02.340985-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.340988-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:32:02.340992-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:32:02.341355-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.341372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:32:02.34138-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:32:02.341385-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:32:02.341391-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:32:02.341396-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:32:02.341402-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:32:02.341407-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:32:02.341413-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:32:02.341419-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:32:02.341434-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:32:02.341443-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:32:02.341448-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:32:02.341452-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:32:02.341456-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:32:02.34146-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:32:02.341465-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:32:02.341469-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:32:02.341473-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:32:02.341477-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:32:02.341482-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:32:02.341791-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:32:02.341824-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:32:02.34183-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:32:02.341835-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:32:02.341839-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \r\n"} +{"Time":"2023-05-31T12:32:02.341843-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.341848-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:32:02.341853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.341857-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:32:02.341861-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:32:02.341865-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:32:02.341869-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:32:02.341874-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:32:02.341878-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:32:02.341882-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.341886-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:32:02.34189-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:32:02.341896-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.3419-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:32:02.341923-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:32:02.34193-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.341935-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34194-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:32:02.342299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.34231-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:32:02.34232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342326-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:32:02.34233-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:32:02.342335-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.34234-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.342344-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342355-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:32:02.34236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:32:02.342365-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:32:02.342369-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.342374-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:32:02.342378-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342382-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:32:02.342415-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:32:02.342426-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:32:02.342432-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:32:02.342441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:32:02.34245-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.342459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342464-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:32:02.34247-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:32:02.342478-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:32:02.342737-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:32:02.342746-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.342752-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:32:02.342761-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:32:02.342765-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:32:02.34278-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342788-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:32:02.342792-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.342797-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342802-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:32:02.342806-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:32:02.342811-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:32:02.342814-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342817-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:32:02.342821-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:32:02.342825-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.34283-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342836-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:32:02.342841-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:32:02.342844-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.342853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:32:02.342859-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:32:02.342863-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:32:02.342883-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.342906-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.343158-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:32:02.343176-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:32:02.343181-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.343186-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:32:02.34319-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:32:02.343194-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.343199-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:32:02.343208-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:32:02.343215-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:32:02.343225-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:32:02.343235-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:32:02.34324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:32:02.343248-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:32:02.343256-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.34326-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:32:02.343263-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:32:02.343266-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:32:02.343271-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:32:02.343274-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:32:02.343285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:32:02.343289-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:32:02.343293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:32:02.343296-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:32:02.3433-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343305-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:32:02.343672-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:32:02.343681-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343686-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:32:02.34369-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343694-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343699-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343703-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343707-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343712-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343716-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.34372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.343724-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.343728-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:32:02.343731-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:32:02.343735-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.343738-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:32:02.343741-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.343743-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.343746-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:32:02.343749-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:32:02.343751-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:32:02.343755-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:32:02.343759-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.343763-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.343767-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:32:02.343772-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:32:02.344109-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.344119-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344123-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:32:02.344129-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:32:02.344133-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344138-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:32:02.344144-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:32:02.344148-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344165-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:32:02.344173-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:32:02.344177-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34418-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:32:02.344182-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:32:02.344186-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344189-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:32:02.344192-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:32:02.344198-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344202-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:32:02.344206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:32:02.34421-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:32:02.344215-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344219-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.344222-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.344225-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:32:02.344231-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:32:02.250819414Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:32:02.344494-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:32:02.344519-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:32:02.344524-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:32:02.34453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:32:02.344534-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.344539-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:32:02.344544-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344547-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:32:02.344552-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:32:02.344559-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:32:02.344563-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:32:02.344567-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:32:02.344581-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:32:02.344586-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:32:02.344591-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:32:02.344595-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:32:02.344599-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344605-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:32:02.344608-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:32:02.34461-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:32:02.344619-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344628-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:32:02.344892-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:32:02.344902-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344908-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:32:02.344912-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:32:02.344917-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.344922-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:32:02.34493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:32:02.344933-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:32:02.344938-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.344942-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344946-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:32:02.34495-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:32:02.344955-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:32:02.34496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344964-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:32:02.344968-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:32:02.344972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:32:02.344983-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:32:02.344987-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.344991-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:32:02.344995-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:32:02.344999-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:32:02.345003-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:32:02.345263-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34527-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:32:02.34529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:32:02.345294-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:32:02.345298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:32:02.345308-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:32:02.345312-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:32:02.345317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:32:02.345321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:32:02.345328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:32:02.345332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:32:02.345341-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:32:02.345345-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345349-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:32:02.345353-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:32:02.345357-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345361-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:32:02.345365-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:32:02.34538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:32:02.34539-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345395-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:32:02.345399-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:32:02.345627-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345638-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:32:02.345643-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.345647-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345651-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:32:02.345656-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:32:02.34566-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:32:02.345665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.345669-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345673-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:32:02.345678-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:32:02.345688-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.345692-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345697-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:32:02.345701-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:32:02.345706-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:32:02.34571-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.345715-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345719-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:32:02.345728-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:32:02.345732-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345736-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:32:02.34574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:32:02.345745-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345859-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:32:02.345867-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:32:02.345872-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:32:02.345876-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345881-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:32:02.345885-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:32:02.34589-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:32:02.345895-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:32:02.345899-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:32:02.345904-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.345908-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345913-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:32:02.345917-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:32:02.345921-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345925-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:32:02.34593-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.345935-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:32:02.345945-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345949-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:32:02.345954-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:32:02.345959-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:32:02.345963-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.345967-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.345972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:32:02.345976-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:32:02.346108-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.346118-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346128-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:32:02.346135-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:32:02.346139-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:32:02.346144-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:32:02.346148-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.346153-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346158-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:32:02.346163-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:32:02.346168-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:32:02.346172-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:32:02.346177-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.346182-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346186-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:32:02.346191-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:32:02.346197-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346208-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:32:02.346215-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:32:02.34622-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.346228-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.346236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346246-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:32:02.346251-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:32:02.346381-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:32:02.346403-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:32:02.346413-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:32:02.346417-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34643-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:32:02.34644-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:32:02.346445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:32:02.34645-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:32:02.346454-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.346458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:32:02.346462-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346556-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:32:02.346564-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:32:02.346568-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.346571-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346576-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:32:02.346579-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:32:02.346583-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:32:02.346586-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34659-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:32:02.346594-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.346598-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.346602-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346606-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:32:02.346751-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:32:02.346758-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346763-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:32:02.346768-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.346771-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346777-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:32:02.346781-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:32:02.346785-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:32:02.34679-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:32:02.346794-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:32:02.346798-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:32:02.346803-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:32:02.346807-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:32:02.346811-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:32:02.346815-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:32:02.34682-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:32:02.346824-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:32:02.346829-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:32:02.346833-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.346838-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.346843-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:32:02.346847-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:32:02.346852-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:32:02.346856-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34686-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:32:02.347159-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:32:02.347169-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:32:02.347174-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.347179-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347183-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:32:02.347189-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:32:02.347212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:32:02.347217-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:32:02.347229-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.347234-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347238-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:32:02.347242-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:32:02.347247-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:32:02.347252-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:32:02.347257-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:32:02.347261-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.347264-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347268-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:32:02.347272-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:32:02.347276-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:32:02.347281-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:32:02.347285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.347288-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:32:02.347297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:32:02.34754-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:32:02.34755-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:32:02.347555-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:32:02.347567-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:32:02.347571-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:32:02.347579-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:32:02.347585-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.347589-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347593-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:32:02.347598-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:32:02.347602-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:32:02.347606-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.34761-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:32:02.347615-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:32:02.347619-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:32:02.347622-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.347627-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:32:02.347631-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:32:02.347635-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:32:02.347639-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:32:02.347644-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.347647-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.347649-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347652-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:32:02.347918-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:32:02.347928-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:32:02.347933-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347936-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:32:02.347941-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:32:02.347945-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:32:02.347949-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:32:02.347954-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:32:02.347958-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347961-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:32:02.347965-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:32:02.34797-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347975-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:32:02.34798-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:32:02.347983-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347987-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:32:02.347991-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:32:02.347994-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.347998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:32:02.348002-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.348005-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348009-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:32:02.348013-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:32:02.3483-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34831-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:32:02.348315-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:32:02.348319-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.348324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:32:02.348328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348331-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:32:02.348335-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.348339-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.348343-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348346-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:32:02.348364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:32:02.348379-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:32:02.348384-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.348389-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348393-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:32:02.348402-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:32:02.348406-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:32:02.348411-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.348415-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348419-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:32:02.348424-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:32:02.348428-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:32:02.348432-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:32:02.348436-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348725-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:32:02.348733-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:32:02.34875-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:32:02.348763-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:32:02.348768-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.34878-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:32:02.348785-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:32:02.348789-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:32:02.348795-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:32:02.348799-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348804-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:32:02.348809-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:32:02.348814-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:32:02.348818-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:32:02.348835-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:32:02.348853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348857-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:32:02.34886-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:32:02.348868-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:32:02.348871-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.348876-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.348879-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:32:02.348882-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:32:02.349134-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:32:02.349166-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.349178-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:32:02.349192-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.3492-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.349204-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:32:02.349212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:32:02.349232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:32:02.349238-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.349243-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.349247-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:32:02.349251-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:32:02.349258-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:32:02.349261-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:32:02.349264-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:32:02.349267-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:32:02.349272-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:32:02.349277-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.349281-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.349291-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:32:02.349295-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:32:02.349299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:32:02.349607-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:32:02.349618-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.349623-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:32:02.349628-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:32:02.349633-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:32:02.349638-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:32:02.349642-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:32:02.349647-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:32:02.349651-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:32:02.349655-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:32:02.349659-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:32:02.349665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:32:02.34967-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:32:02.349674-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:32:02.349679-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:32:02.349683-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:32:02.349689-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:32:02.349713-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:32:02.349721-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:32:02.349725-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:32:02.34973-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:32:02.349735-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:32:02.349957-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:32:02.349967-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:32:02.349972-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:32:02.349976-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:32:02.34998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:32:02.349985-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:32:02.349989-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:32:02.349993-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:32:02.349997-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:32:02.350002-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:32:02.350006-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:32:02.35001-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:32:02.350014-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350017-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350021-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:32:02.350025-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.350029-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:32:02.350034-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:32:02.350042-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.350058-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350067-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350075-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.350083-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350375-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.350388-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.350395-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350398-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350401-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:32:02.350404-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:32:02.350407-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:32:02.35041-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350413-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:32:02.350416-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:32:02.350419-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:32:02.350423-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350428-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:32:02.350432-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:32:02.350436-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:32:02.350445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:32:02.350448-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350454-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:32:02.350458-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:32:02.350461-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.350466-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:32:02.350471-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:32:02.350478-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:32:02.350483-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:32:02.350809-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:32:02.350835-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:32:02.35084-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:32:02.350843-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:32:02.350847-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:32:02.35085-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:32:02.350853-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:32:02.350856-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:32:02.350858-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:32:02.350862-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:32:02.350864-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:32:02.350867-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:32:02.35087-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:32:02.350873-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:32:02.350879-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:32:02.350883-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:32:02.350887-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:32:02.350892-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:32:02.350896-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:32:02.350899-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:32:02.351147-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \r\n"} +{"Time":"2023-05-31T12:32:02.351157-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351168-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:32:02.351176-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T12:32:02.35118-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:32:02.351185-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:32:02.35119-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:32:02.351194-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:32:02.351203-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:32:02.351208-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:32:02.351212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351217-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:32:02.351255-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:32:02.351264-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:32:02.35131-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:32:02.351315-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.351319-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351323-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:32:02.351327-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.351332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:32:02.351336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.35134-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:32:02.351344-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:32:02.351565-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.351574-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.351585-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.35159-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:32:02.351596-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:32:02.351602-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:32:02.351606-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:32:02.351612-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:32:02.351616-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351619-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:32:02.351636-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:32:02.351643-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:32:02.351647-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:32:02.351652-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:32:02.351657-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.351661-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351665-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:32:02.351669-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:32:02.351673-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:32:02.351677-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:32:02.351681-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.351685-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351689-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:32:02.351694-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:32:02.351854-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:32:02.351863-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351868-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:32:02.351872-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.351888-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351901-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:32:02.35192-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:32:02.351926-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:32:02.351931-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351938-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:32:02.351943-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:32:02.351953-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.351959-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.351964-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:32:02.351968-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:32:02.351975-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.35198-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:32:02.351984-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:32:02.351989-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:32:02.351993-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.351998-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.352002-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:32:02.352006-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:32:02.35201-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.352014-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:32:02.352018-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:32:02.352258-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.352266-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:32:02.35227-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:32:02.352275-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:32:02.352281-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:32:02.352285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:32:02.35229-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:32:02.352294-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:32:02.352299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352303-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:32:02.352307-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:32:02.352311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:32:02.352317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:32:02.352321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:32:02.352327-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:32:02.352332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:32:02.352336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:32:02.35234-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:32:02.352345-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352349-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:32:02.352354-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:32:02.352358-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352362-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:32:02.352366-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352375-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352747-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.35276-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352765-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352769-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.3528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352815-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:32:02.352822-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:32:02.352827-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:32:02.352849-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:32:02.352859-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.352896-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:32:02.352901-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.352906-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.35291-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:32:02.352915-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:32:02.352919-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:32:02.352923-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:32:02.352927-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.35293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.352934-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:32:02.352938-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:32:02.352942-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:32:02.352947-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.352953-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:32:02.352981-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:32:02.35299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.353205-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:32:02.353218-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:32:02.353225-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.35323-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:32:02.353236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:32:02.353253-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.353259-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:32:02.353264-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:32:02.35327-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.353279-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:32:02.353286-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:32:02.35329-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.353294-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:32:02.353299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:32:02.353303-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:32:02.353308-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T12:32:02.353312-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:32:02.353316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ----------------------- debugLogs end: auto-996000 [took: 18.798474918s] --------------------------------\n"} +{"Time":"2023-05-31T12:32:02.353321-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:175: Cleaning up \"auto-996000\" profile ...\n"} +{"Time":"2023-05-31T12:32:02.353328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p auto-996000\n"} +{"Time":"2023-05-31T12:32:04.99515-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p auto-996000: (2.666399796s)\n"} +{"Time":"2023-05-31T12:32:04.995169-07:00","Action":"cont","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T12:32:04.995173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== CONT TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T12:32:04.995222-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet/Start"} +{"Time":"2023-05-31T12:32:04.995233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"=== RUN TestNetworkPlugins/group/kindnet/Start\n"} +{"Time":"2023-05-31T12:32:04.995265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p kindnet-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=kindnet --driver=docker \n"} +{"Time":"2023-05-31T12:32:18.458301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"E0531 12:32:18.458248 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:32:31.708896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"E0531 12:32:31.708867 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:32:59.789626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p kindnet-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=kindnet --driver=docker : (54.793858504s)\n"} +{"Time":"2023-05-31T12:32:59.789675-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet/ControllerPod"} +{"Time":"2023-05-31T12:32:59.789686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":"=== RUN TestNetworkPlugins/group/kindnet/ControllerPod\n"} +{"Time":"2023-05-31T12:32:59.791453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/kindnet/ControllerPod: waiting 10m0s for pods matching \"app=kindnet\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T12:32:59.803948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":" helpers_test.go:344: \"kindnet-j9shg\" [737c7633-e778-45a5-ae84-eae57b7258d8] Running\n"} +{"Time":"2023-05-31T12:33:04.808656-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/kindnet/ControllerPod: app=kindnet healthy within 5.017174538s\n"} +{"Time":"2023-05-31T12:33:04.808674-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags"} +{"Time":"2023-05-31T12:33:04.808677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/kindnet/KubeletFlags\n"} +{"Time":"2023-05-31T12:33:04.808702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p kindnet-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:33:05.165058-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet/NetCatPod"} +{"Time":"2023-05-31T12:33:05.165071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/kindnet/NetCatPod\n"} +{"Time":"2023-05-31T12:33:05.165127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context kindnet-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:33:05.377836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/kindnet/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:33:05.380816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-zxf6k\" [6cbc580f-87d9-4b0e-ae5d-b07bd004536c] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:33:12.385836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-zxf6k\" [6cbc580f-87d9-4b0e-ae5d-b07bd004536c] Running\n"} +{"Time":"2023-05-31T12:33:18.385139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/kindnet/NetCatPod: app=netcat healthy within 13.007206071s\n"} +{"Time":"2023-05-31T12:33:18.385154-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet/DNS"} +{"Time":"2023-05-31T12:33:18.385156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/DNS","Output":"=== RUN TestNetworkPlugins/group/kindnet/DNS\n"} +{"Time":"2023-05-31T12:33:18.38526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context kindnet-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:33:18.519453-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet/Localhost"} +{"Time":"2023-05-31T12:33:18.519465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Localhost","Output":"=== RUN TestNetworkPlugins/group/kindnet/Localhost\n"} +{"Time":"2023-05-31T12:33:18.519583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context kindnet-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:33:18.627153-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet/HairPin"} +{"Time":"2023-05-31T12:33:18.627181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/HairPin","Output":"=== RUN TestNetworkPlugins/group/kindnet/HairPin\n"} +{"Time":"2023-05-31T12:33:18.627286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context kindnet-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:33:18.746935-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" net_test.go:209: \"kindnet\" test finished in 11m48.948039283s, failed=false\n"} +{"Time":"2023-05-31T12:33:38.021446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:33:38.021459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ----------------------- debugLogs start: kindnet-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:33:38.021462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:33:38.021464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:33:38.021467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:33:38.021469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:33:38.021474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:33:38.021476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021481-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:33:38.021483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:33:38.021486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.02149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:33:38.021492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:33:38.021494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:33:38.021499-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:33:38.021501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:33:38.021503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:33:38.021509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:33:38.021511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:33:38.021513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:33:38.021515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:33:38.021517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:33:38.021519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:33:38.021521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:33:38.021523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 10.244.0.3\tnetcat-7458db8b8-zxf6k\n"} +{"Time":"2023-05-31T12:33:38.021525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021529-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:33:38.021531-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:33:38.021532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:33:38.021534-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:33:38.021536-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.02154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:33:38.021542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:33:38.021544-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.021546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:33:38.021548-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:33:38.02155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:33:38.021552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.021554-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:33:38.021556-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:33:38.021558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:33:38.02156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:33:38.021562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.021564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:33:38.021566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:33:38.021568-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.021569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:33:38.021571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:33:38.021573-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:33:38.021575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:33:38.021577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.021579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:33:38.021581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021584-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:33:38.021587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:33:38.021589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:33:38.021591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:33:38.021593-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:33:38.021595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:33:38.021597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:33:38.021599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.76.2\tkindnet-996000\r\n"} +{"Time":"2023-05-31T12:33:38.021602-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:33:38.021604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.76.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:33:38.021606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.02161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:33:38.021612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:33:38.021614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:33:38.021616-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021618-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.02162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:33:38.021622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:33:38.021624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node/kindnet-996000 Ready control-plane 61s v1.27.2 192.168.76.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:33:38.021627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:33:38.021631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 59s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021633-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default service/netcat ClusterIP 10.97.100.224 \u003cnone\u003e 8080/TCP 20s app=netcat\n"} +{"Time":"2023-05-31T12:33:38.021636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 58s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:33:38.021638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.02164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:33:38.021644-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default endpoints/kubernetes 192.168.76.2:8443 59s\n"} +{"Time":"2023-05-31T12:33:38.021646-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default endpoints/netcat 10.244.0.3:8080 20s\n"} +{"Time":"2023-05-31T12:33:38.021648-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 44s\n"} +{"Time":"2023-05-31T12:33:38.021651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 45s\n"} +{"Time":"2023-05-31T12:33:38.021653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:33:38.021658-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system daemonset.apps/kindnet 1 1 1 1 1 \u003cnone\u003e 57s kindnet-cni docker.io/kindest/kindnetd:v20230511-dc714da8 app=kindnet\n"} +{"Time":"2023-05-31T12:33:38.02166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 58s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.021662-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:33:38.021666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default deployment.apps/netcat 1/1 1 1 20s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:33:38.021668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system deployment.apps/coredns 1/1 1 1 58s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:33:38.02167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:33:38.021675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default pod/netcat-7458db8b8-zxf6k 1/1 Running 0 20s 10.244.0.3 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/coredns-5d78c9869d-45977 1/1 Running 1 (29s ago) 45s 10.244.0.2 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021679-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/etcd-kindnet-996000 1/1 Running 0 59s 192.168.76.2 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kindnet-j9shg 1/1 Running 0 45s 192.168.76.2 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kube-apiserver-kindnet-996000 1/1 Running 0 58s 192.168.76.2 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kube-controller-manager-kindnet-996000 1/1 Running 0 58s 192.168.76.2 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kube-proxy-7bktv 1/1 Running 0 45s 192.168.76.2 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kube-scheduler-kindnet-996000 1/1 Running 0 58s 192.168.76.2 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/storage-provisioner 1/1 Running 0 44s 192.168.76.2 kindnet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021699-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021701-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:33:38.021705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:33:38.021707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dfb79f2a09421 20 seconds ago Ready netcat-7458db8b8-zxf6k default 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021709-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dd641eca2b321 29 seconds ago Ready coredns-5d78c9869d-45977 kube-system 1 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ab4160ec5f022 43 seconds ago NotReady coredns-5d78c9869d-45977 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 013936ad3fae3 43 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021716-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 126cbc32c4acb 45 seconds ago Ready kube-proxy-7bktv kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021719-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 9311e8298f955 45 seconds ago Ready kindnet-j9shg kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021721-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 09fc4dc773b0f About a minute ago Ready kube-scheduler-kindnet-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021723-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7e013d09b584b About a minute ago Ready kube-controller-manager-kindnet-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021725-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" d829708357f1b About a minute ago Ready etcd-kindnet-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.021728-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 6a17a76a6e04d About a minute ago Ready kube-apiserver-kindnet-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:33:38.02173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:33:38.021735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:33:38.021738-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" e67213fbbf94e registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 16 seconds ago Running dnsutils 0 dfb79f2a09421 netcat-7458db8b8-zxf6k\r\n"} +{"Time":"2023-05-31T12:33:38.021741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" c821f7ff7ef1b ead0a4a53df89 30 seconds ago Running coredns 1 dd641eca2b321 coredns-5d78c9869d-45977\r\n"} +{"Time":"2023-05-31T12:33:38.021743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 5db638a8b7edb kindest/kindnetd@sha256:6c00e28db008c2afa67d9ee085c86184ec9ae5281d5ae1bd15006746fb9a1974 42 seconds ago Running kindnet-cni 0 9311e8298f955 kindnet-j9shg\r\n"} +{"Time":"2023-05-31T12:33:38.021746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 068c3c423f728 ead0a4a53df89 44 seconds ago Exited coredns 0 ab4160ec5f022 coredns-5d78c9869d-45977\r\n"} +{"Time":"2023-05-31T12:33:38.021749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a9bbdc66efdbe 6e38f40d628db 44 seconds ago Running storage-provisioner 0 013936ad3fae3 storage-provisioner\r\n"} +{"Time":"2023-05-31T12:33:38.021751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 82c1a8ca96f48 b8aa50768fd67 45 seconds ago Running kube-proxy 0 126cbc32c4acb kube-proxy-7bktv\r\n"} +{"Time":"2023-05-31T12:33:38.021754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 62fdafd2357a6 86b6af7dd652c About a minute ago Running etcd 0 d829708357f1b etcd-kindnet-996000\r\n"} +{"Time":"2023-05-31T12:33:38.021757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ae3be1cc5480a 89e70da428d29 About a minute ago Running kube-scheduler 0 09fc4dc773b0f kube-scheduler-kindnet-996000\r\n"} +{"Time":"2023-05-31T12:33:38.021759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 925dbab831550 c5b13e4f7806d About a minute ago Running kube-apiserver 0 6a17a76a6e04d kube-apiserver-kindnet-996000\r\n"} +{"Time":"2023-05-31T12:33:38.021762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cf04f2429c5ba ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 7e013d09b584b kube-controller-manager-kindnet-996000\r\n"} +{"Time":"2023-05-31T12:33:38.021764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021765-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:33:38.02177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:33:38.021772-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:33:38.021774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CreationTimestamp: Wed, 31 May 2023 12:33:05 -0700\n"} +{"Time":"2023-05-31T12:33:38.021776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:33:38.021778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:33:38.02178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:33:38.021782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:33:38.021784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:33:38.021787-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:33:38.021789-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:33:38.021791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:33:38.021793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:33:38.021795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.021797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:33:38.021799-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:33:38.021801-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021803-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021805-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T12:33:38.021807-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:33:38.021809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -c\n"} +{"Time":"2023-05-31T12:33:38.021811-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:33:38.021812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021814-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:33:38.021821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:33:38.021823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:33:38.021825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:33:38.021827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:33:38.021829-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021831-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:33:38.021833-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T12:33:38.021835-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:33:38.021837-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:33:38.021839-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal ScalingReplicaSet 21s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:33:38.021841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021843-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021846-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:33:38.021848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: netcat-7458db8b8-zxf6k\n"} +{"Time":"2023-05-31T12:33:38.02185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:33:38.021852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:33:38.021854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:33:38.021856-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.021858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 12:33:05 -0700\n"} +{"Time":"2023-05-31T12:33:38.02186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:33:38.021862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:33:38.021864-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:33:38.021868-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:33:38.02187-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:33:38.021872-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:33:38.021874-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:33:38.021876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.021878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:33:38.02188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: docker://e67213fbbf94ea22e000092cc021b75bca2bcac6e72e6a89400466a92f4d8101\n"} +{"Time":"2023-05-31T12:33:38.021883-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:33:38.021885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:33:38.021887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021891-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T12:33:38.021894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:33:38.021897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -c\n"} +{"Time":"2023-05-31T12:33:38.021899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:33:38.021901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:33:38.021902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 12:33:11 -0700\n"} +{"Time":"2023-05-31T12:33:38.021904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:33:38.021906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:33:38.021908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.02191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:33:38.021912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-h5nlk (ro)\n"} +{"Time":"2023-05-31T12:33:38.021914-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:33:38.021916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:33:38.021918-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:33:38.02192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:33:38.021922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:33:38.021924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:33:38.021926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:33:38.021927-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-api-access-h5nlk:\n"} +{"Time":"2023-05-31T12:33:38.021929-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:33:38.021931-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:33:38.021933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.021936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:33:38.021938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:33:38.021939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:33:38.021941-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.021944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:33:38.021946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:33:38.021948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T12:33:38.02195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:33:38.021952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:33:38.021954-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Scheduled 21s default-scheduler Successfully assigned default/netcat-7458db8b8-zxf6k to kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.021956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulling 21s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:33:38.021959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulled 16s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.098322243s (5.098327299s including waiting)\n"} +{"Time":"2023-05-31T12:33:38.021961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Created 15s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:33:38.021963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Started 15s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:33:38.021965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:33:38.021971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.021974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:33:38.021976-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:33:38.021979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.021981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CreationTimestamp: Wed, 31 May 2023 12:32:27 -0700\n"} +{"Time":"2023-05-31T12:33:38.021985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:33:38.021987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:33:38.021989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:33:38.021991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:33:38.021993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:33:38.021995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:33:38.021997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:33:38.021999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:33:38.022001-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:33:38.022003-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:33:38.022005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.022007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" coredns:\n"} +{"Time":"2023-05-31T12:33:38.022009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:33:38.022011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:33:38.022013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:33:38.022015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Args:\n"} +{"Time":"2023-05-31T12:33:38.022017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -conf\n"} +{"Time":"2023-05-31T12:33:38.022019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:33:38.022021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Limits:\n"} +{"Time":"2023-05-31T12:33:38.022023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:33:38.022025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T12:33:38.022027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:33:38.02203-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:33:38.022032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:33:38.022035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:33:38.022037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.02204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:33:38.022042-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:33:38.022044-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:33:38.022046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:33:38.022048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:33:38.02205-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:33:38.022052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:33:38.022054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:33:38.022057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:33:38.022059-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:33:38.022061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:33:38.022063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:33:38.022065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:33:38.022067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.022069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:33:38.02207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T12:33:38.022072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:33:38.022074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:33:38.022076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal ScalingReplicaSet 46s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:33:38.022079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal ScalingReplicaSet 46s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:33:38.02208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.022082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.022084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:33:38.022087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: coredns-5d78c9869d-45977\n"} +{"Time":"2023-05-31T12:33:38.022089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.022091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:33:38.022093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:33:38.022095-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:33:38.022097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.022099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 12:32:41 -0700\n"} +{"Time":"2023-05-31T12:33:38.022101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:33:38.022103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:33:38.022105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.022107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:33:38.022108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:33:38.02211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:33:38.022112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:33:38.022114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:33:38.022116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.022118-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" coredns:\n"} +{"Time":"2023-05-31T12:33:38.022121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: docker://c821f7ff7ef1b53e80715a0d74a56668e250591601fd9d974dc5f10a6949f996\n"} +{"Time":"2023-05-31T12:33:38.022123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:33:38.022125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:33:38.022127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:33:38.022129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:33:38.022131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Args:\n"} +{"Time":"2023-05-31T12:33:38.022133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -conf\n"} +{"Time":"2023-05-31T12:33:38.022134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:33:38.022137-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:33:38.022139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 12:32:56 -0700\n"} +{"Time":"2023-05-31T12:33:38.022141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Last State: Terminated\n"} +{"Time":"2023-05-31T12:33:38.022143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:33:38.022145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:33:38.022147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 12:32:42 -0700\n"} +{"Time":"2023-05-31T12:33:38.022149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Finished: Wed, 31 May 2023 12:32:56 -0700\n"} +{"Time":"2023-05-31T12:33:38.022151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:33:38.022153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 1\n"} +{"Time":"2023-05-31T12:33:38.022155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Limits:\n"} +{"Time":"2023-05-31T12:33:38.022156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:33:38.022158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T12:33:38.02216-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:33:38.022162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:33:38.022164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:33:38.022167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:33:38.022169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.022171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:33:38.022173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:33:38.022175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-nmvd7 (ro)\n"} +{"Time":"2023-05-31T12:33:38.022177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:33:38.022178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:33:38.02218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:33:38.022182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:33:38.022184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:33:38.022186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:33:38.022188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:33:38.02219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:33:38.022192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:33:38.022194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:33:38.022196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:33:38.022199-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-api-access-nmvd7:\n"} +{"Time":"2023-05-31T12:33:38.022201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:33:38.022203-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:33:38.022205-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.022207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:33:38.022209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:33:38.022211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:33:38.022213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:33:38.022215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:33:38.022217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:33:38.022219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:33:38.022222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:33:38.022223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T12:33:38.022225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:33:38.022227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:33:38.02223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Warning FailedScheduling 46s default-scheduler 0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..\n"} +{"Time":"2023-05-31T12:33:38.022232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Scheduled 45s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-45977 to kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.022234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal SandboxChanged 44s kubelet Pod sandbox changed, it will be killed and re-created.\n"} +{"Time":"2023-05-31T12:33:38.022237-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Killing 44s kubelet Stopping container coredns\n"} +{"Time":"2023-05-31T12:33:38.022239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulled 30s (x2 over 44s) kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:33:38.022241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Created 30s (x2 over 44s) kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:33:38.022243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Started 30s (x2 over 44s) kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:33:38.022245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Warning Unhealthy 30s (x3 over 44s) kubelet Readiness probe failed: Get \"http://:8181/ready\": dial tcp :8181: connect: connection refused\n"} +{"Time":"2023-05-31T12:33:38.022248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.02225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.022252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:33:38.022254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" .:53\n"} +{"Time":"2023-05-31T12:33:38.022256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] plugin/reload: Running configuration SHA512 = f869070685748660180df1b7a47d58cdafcf2f368266578c062d1151dc2c900964aecc5975e8882e6de6fdfb6460463e30ebfaad2ec8f0c3c6436f80225b3b5b\n"} +{"Time":"2023-05-31T12:33:38.022258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:33:38.02226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:33:38.022262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 127.0.0.1:52188 - 4795 \"HINFO IN 7909029586357481346.3226049685136352026. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.012642021s\n"} +{"Time":"2023-05-31T12:33:38.022264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:60446 - 64027 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000151188s\n"} +{"Time":"2023-05-31T12:33:38.022266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:56376 - 15024 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000112375s\n"} +{"Time":"2023-05-31T12:33:38.022269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:43182 - 16973 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000095436s\n"} +{"Time":"2023-05-31T12:33:38.022271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:49285 - 35317 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000190523s\n"} +{"Time":"2023-05-31T12:33:38.022273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:49285 - 35116 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000243595s\n"} +{"Time":"2023-05-31T12:33:38.022275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:40262 - 22082 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000148436s\n"} +{"Time":"2023-05-31T12:33:38.022278-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:46098 - 9830 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000091441s\n"} +{"Time":"2023-05-31T12:33:38.02228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:52221 - 9456 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000065274s\n"} +{"Time":"2023-05-31T12:33:38.022282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.022284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.022286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:33:38.022288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-apiserver-kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.02229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.022292-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:33:38.022294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:33:38.022296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.022298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 12:32:27 -0700\n"} +{"Time":"2023-05-31T12:33:38.0223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:33:38.022302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:33:38.022304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.76.2:8443\n"} +{"Time":"2023-05-31T12:33:38.022306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/config.hash: e800ec97290ce8b750dfc3986337d0ce\n"} +{"Time":"2023-05-31T12:33:38.022308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/config.mirror: e800ec97290ce8b750dfc3986337d0ce\n"} +{"Time":"2023-05-31T12:33:38.02231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/config.seen: 2023-05-31T19:32:27.622272772Z\n"} +{"Time":"2023-05-31T12:33:38.022312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:33:38.022314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:33:38.022317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.022319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:33:38.022321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.022322-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: Node/kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.022324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.022326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:33:38.022328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: docker://925dbab831550e44a45e5f5e6b2bc4e6100cff5de8411e90affb01b8fb32217b\n"} +{"Time":"2023-05-31T12:33:38.022331-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:33:38.022333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:33:38.022335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.022337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.022339-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T12:33:38.022341-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:33:38.022343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --advertise-address=192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.022345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:33:38.022346-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:33:38.022348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:33:38.02235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:33:38.022353-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:33:38.022355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:33:38.022357-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:33:38.022359-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:33:38.02236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:33:38.022362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:33:38.022666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:33:38.022672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:33:38.022675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:33:38.022677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:33:38.022684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:33:38.022686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.022689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:33:38.022703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:33:38.022706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:33:38.022708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:33:38.02271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:33:38.022713-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:33:38.022715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:33:38.022717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:33:38.022719-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:33:38.022722-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:33:38.02273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:33:38.022732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 12:32:22 -0700\n"} +{"Time":"2023-05-31T12:33:38.022734-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:33:38.022737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:33:38.022739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T12:33:38.022741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:33:38.022859-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Liveness: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:33:38.022866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Readiness: http-get https://192.168.76.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:33:38.02287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Startup: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:33:38.022873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.022876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:33:38.022878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:33:38.02288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:33:38.022882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:33:38.022884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:33:38.022886-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:33:38.022888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:33:38.02289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:33:38.022892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:33:38.022894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:33:38.022896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:33:38.022898-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:33:38.022901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:33:38.022903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:33:38.022907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.022909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:33:38.022911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:33:38.022913-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:33:38.022915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.022917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:33:38.023033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:33:38.023038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:33:38.02304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.023042-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:33:38.023045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:33:38.023049-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:33:38.023053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.023056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:33:38.023059-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:33:38.023062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:33:38.023065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.023069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:33:38.023072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:33:38.023075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:33:38.023088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.023096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:33:38.023099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.023101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.023103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.023105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:33:38.023107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:22.700277 1 server.go:551] external host was not specified, using 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.023109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:22.701234 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:33:38.023111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:22.701323 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:33:38.023114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:23.099040 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:33:38.023201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:23.110621 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:33:38.023208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:23.110657 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:33:38.023213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:23.238986 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:23.239008 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:23.239582 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:33:38.023221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:23.523865 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:23.524391 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:33:38.023226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.017063 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:33:38.023228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.025880 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.025920 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023237-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.025925 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.027402 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023242-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.027480 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.029284 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023341-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.029972 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023346-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.030007 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.030012 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.032541 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.032578 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.039704 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.02336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.039747 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.039753 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.081472 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.081549 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023368-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.083394 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.02337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.083942 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.086242 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.086280 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.086286 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.02338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.087456 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.087491 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.087502 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.02362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.088789 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023623-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.088824 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023625-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.090702 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.090738 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.02363-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.090743 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.091952 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023634-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.091995 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.092000 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.094207 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023648-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.094245 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.094250 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.096147 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023658-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.097106 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.02366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.097143 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023662-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.097148 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.102657 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.102699 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.102705 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.105815 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.105851 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.105856 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.107691 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.107729 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.126972 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:33:38.023926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:24.127060 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:33:38.023928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.594711 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:33:38.023931-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.594877 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:33:38.023933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.594993 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:33:38.023935-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.595582 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:33:38.023938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.595658 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:33:38.02394-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.595912 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:33:38.023942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596098 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:33:38.024152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596172 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:33:38.024155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596229 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:33:38.024157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596250 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:33:38.024159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596253 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:33:38.024161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596264 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:33:38.024163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596309 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:33:38.024166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596492 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:33:38.024168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596540 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:33:38.024171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596706 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:33:38.024173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596715 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:33:38.024175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596835 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:33:38.024178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.596868 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:33:38.024184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597114 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:33:38.024187-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597202 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:33:38.024189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597402 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:33:38.024191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597435 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:33:38.024193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597458 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:33:38.024392-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597464 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:33:38.024396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597493 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:33:38.024398-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597561 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:33:38.0244-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597982 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:33:38.024403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.598093 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:33:38.024405-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.598115 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:33:38.024407-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.598132 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:33:38.024409-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.598149 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:33:38.024411-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.598282 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:33:38.024413-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.598341 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:33:38.024415-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.597127 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:33:38.024417-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.696272 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:33:38.024419-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.696297 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:33:38.024422-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.696404 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:33:38.024424-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.696437 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:33:38.024426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.697551 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:33:38.024428-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.699559 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:33:38.02443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.699612 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:33:38.024667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.699791 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:33:38.024673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.699837 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:33:38.024675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.699848 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:33:38.024677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:24.721963 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:33:38.02468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:25.407557 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:33:38.024682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:25.600868 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:33:38.024684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:25.603872 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:33:38.024686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:25.603883 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:33:38.024689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:26.106017 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:33:38.024691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:26.136997 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:33:38.024693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:26.223290 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:33:38.024696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:32:26.232313 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.76.2]\n"} +{"Time":"2023-05-31T12:33:38.024698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:26.233083 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:33:38.0247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:26.236947 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:33:38.024702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:26.627388 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:33:38.024704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:27.510967 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:33:38.024938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:27.519350 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:33:38.024942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:27.527147 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:33:38.024945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:40.234946 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:33:38.024948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:40.493808 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:33:38.02495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:33:05.353984 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.97.100.224]\n"} +{"Time":"2023-05-31T12:33:38.024952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.024954-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.024956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:33:38.024958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:33:38.02496-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.024962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:33:38.024965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:33:38.024967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:33:38.024969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.024971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d/10-kindnet.conflist\r\n"} +{"Time":"2023-05-31T12:33:38.024973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.024975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.024977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:33:38.024979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"name\": \"kindnet\",\r\n"} +{"Time":"2023-05-31T12:33:38.024981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"plugins\": [\r\n"} +{"Time":"2023-05-31T12:33:38.024983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t{\r\n"} +{"Time":"2023-05-31T12:33:38.024985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"type\": \"ptp\",\r\n"} +{"Time":"2023-05-31T12:33:38.024987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"ipMasq\": false,\r\n"} +{"Time":"2023-05-31T12:33:38.024989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"ipam\": {\r\n"} +{"Time":"2023-05-31T12:33:38.024991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:33:38.025192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"dataDir\": \"/run/cni-ipam-state\",\r\n"} +{"Time":"2023-05-31T12:33:38.025198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"routes\": [\r\n"} +{"Time":"2023-05-31T12:33:38.0252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t\r\n"} +{"Time":"2023-05-31T12:33:38.025202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t\r\n"} +{"Time":"2023-05-31T12:33:38.025204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t{ \"dst\": \"0.0.0.0/0\" }\r\n"} +{"Time":"2023-05-31T12:33:38.025207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t],\r\n"} +{"Time":"2023-05-31T12:33:38.025209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"ranges\": [\r\n"} +{"Time":"2023-05-31T12:33:38.025211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t\r\n"} +{"Time":"2023-05-31T12:33:38.025213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t\r\n"} +{"Time":"2023-05-31T12:33:38.025215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t[ { \"subnet\": \"10.244.0.0/24\" } ]\r\n"} +{"Time":"2023-05-31T12:33:38.025217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t]\r\n"} +{"Time":"2023-05-31T12:33:38.025219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t}\r\n"} +{"Time":"2023-05-31T12:33:38.025221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t,\r\n"} +{"Time":"2023-05-31T12:33:38.025223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"mtu\": 65535\r\n"} +{"Time":"2023-05-31T12:33:38.025225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\r\n"} +{"Time":"2023-05-31T12:33:38.025227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t},\r\n"} +{"Time":"2023-05-31T12:33:38.025229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t{\r\n"} +{"Time":"2023-05-31T12:33:38.025231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:33:38.025233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:33:38.025235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:33:38.025237-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t}\r\n"} +{"Time":"2023-05-31T12:33:38.025239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t}\r\n"} +{"Time":"2023-05-31T12:33:38.025241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t]\r\n"} +{"Time":"2023-05-31T12:33:38.025243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.025252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T12:33:38.025254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.025256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:33:38.025258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:33:38.025451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:33:38.025455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.025457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:33:38.02546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:33:38.025465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:33:38.025467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:33:38.02547-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:33:38.025472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:33:38.025474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:33:38.025477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:33:38.025479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:33:38.025481-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [\r\n"} +{"Time":"2023-05-31T12:33:38.025483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.025485-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:33:38.025487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T12:33:38.025489-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.025491-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T12:33:38.025493-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T12:33:38.025495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.025497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" },\r\n"} +{"Time":"2023-05-31T12:33:38.025499-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.025501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:33:38.025503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:33:38.025505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:33:38.025507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.025509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" },\r\n"} +{"Time":"2023-05-31T12:33:38.025511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.02572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:33:38.025726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" },\r\n"} +{"Time":"2023-05-31T12:33:38.025729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.025731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:33:38.025733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.025735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T12:33:38.025736-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.025739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d/100-crio-bridge.conf.mk_disabled\r\n"} +{"Time":"2023-05-31T12:33:38.025741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.025743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:33:38.025745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:33:38.025747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:33:38.025749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:33:38.025751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:33:38.025753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:33:38.025755-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:33:38.025757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:33:38.02576-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:33:38.025762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:33:38.025764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" { \"dst\": \"0.0.0.0/0\" },\r\n"} +{"Time":"2023-05-31T12:33:38.025766-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" { \"dst\": \"1100:200::1/24\" }\r\n"} +{"Time":"2023-05-31T12:33:38.025768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ],\r\n"} +{"Time":"2023-05-31T12:33:38.02577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:33:38.025772-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [{ \"subnet\": \"10.85.0.0/16\" }],\r\n"} +{"Time":"2023-05-31T12:33:38.025774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [{ \"subnet\": \"1100:200::/24\" }]\r\n"} +{"Time":"2023-05-31T12:33:38.025777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T12:33:38.025931-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.025936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.025939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.025941-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.025943-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:33:38.025945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:33:38.025948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:33:38.02595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:33:38.025952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:33:38.025954-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 2: tunl0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:33:38.025956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:33:38.025959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:33:38.025961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/tunnel6 :: brd :: permaddr 8e2e:6193:bd03::\r\n"} +{"Time":"2023-05-31T12:33:38.025963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:33:38.025965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ether 02:42:19:fc:06:f6 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:33:38.025967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:33:38.025969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:33:38.025971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 5: veth0350b7de@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:33:38.025973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ether a2:bb:d9:cf:7c:80 brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:33:38.025975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 10.244.0.1/32 scope global veth0350b7de\r\n"} +{"Time":"2023-05-31T12:33:38.025977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:33:38.025979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 6: veth0a236b0e@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:33:38.026151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ether b6:2a:2a:09:50:5b brd ff:ff:ff:ff:ff:ff link-netnsid 2\r\n"} +{"Time":"2023-05-31T12:33:38.026156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 10.244.0.1/32 scope global veth0a236b0e\r\n"} +{"Time":"2023-05-31T12:33:38.026159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:33:38.026161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 283: eth0@if284: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:33:38.026163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ether 02:42:c0:a8:4c:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:33:38.026165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 192.168.76.2/24 brd 192.168.76.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:33:38.026167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:33:38.026169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.026171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.026173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:33:38.026175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default via 192.168.76.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:33:38.026177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 10.244.0.2 dev veth0350b7de scope host \r\n"} +{"Time":"2023-05-31T12:33:38.026179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 10.244.0.3 dev veth0a236b0e scope host \r\n"} +{"Time":"2023-05-31T12:33:38.026182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:33:38.026184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.76.0/24 dev eth0 proto kernel scope link src 192.168.76.2 \r\n"} +{"Time":"2023-05-31T12:33:38.026186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.026187-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.026189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:33:38.026191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:33:28 2023\r\n"} +{"Time":"2023-05-31T12:33:38.026193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:33:38.026196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :PREROUTING ACCEPT [18278:75830571]\r\n"} +{"Time":"2023-05-31T12:33:38.026198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :INPUT ACCEPT [18243:75827773]\r\n"} +{"Time":"2023-05-31T12:33:38.026201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :FORWARD ACCEPT [35:2798]\r\n"} +{"Time":"2023-05-31T12:33:38.026202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :OUTPUT ACCEPT [16758:5585191]\r\n"} +{"Time":"2023-05-31T12:33:38.026204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :POSTROUTING ACCEPT [16792:5587901]\r\n"} +{"Time":"2023-05-31T12:33:38.026403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026407-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.02641-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:33:38.026414-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Completed on Wed May 31 19:33:28 2023\r\n"} +{"Time":"2023-05-31T12:33:38.026416-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:33:28 2023\r\n"} +{"Time":"2023-05-31T12:33:38.026418-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:33:38.02642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :INPUT ACCEPT [5943:1282150]\r\n"} +{"Time":"2023-05-31T12:33:38.026423-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :FORWARD ACCEPT [16:927]\r\n"} +{"Time":"2023-05-31T12:33:38.026425-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :OUTPUT ACCEPT [5911:1585958]\r\n"} +{"Time":"2023-05-31T12:33:38.026427-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026429-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026431-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026435-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026439-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026441-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026445-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026447-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:33:38.026454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:33:38.026644-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:33:38.026651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:33:38.026654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:33:38.026657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:33:38.026659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:33:38.026661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:33:38.026664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:33:38.026666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:33:38.026668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:33:38.02667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:33:38.026672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:33:38.026681-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:33:38.026687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:33:38.02669-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:33:38.026692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:33:38.026694-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:33:38.026696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:33:38.026698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:33:38.0267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:33:38.026702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:33:38.026704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:33:38.026885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:33:38.02689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:33:38.026892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:33:38.026895-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:33:38.026897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Completed on Wed May 31 19:33:28 2023\r\n"} +{"Time":"2023-05-31T12:33:38.026899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:33:28 2023\r\n"} +{"Time":"2023-05-31T12:33:38.026903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:33:38.026905-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:33:38.026907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:33:38.026909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :OUTPUT ACCEPT [43:2580]\r\n"} +{"Time":"2023-05-31T12:33:38.026911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :POSTROUTING ACCEPT [52:3255]\r\n"} +{"Time":"2023-05-31T12:33:38.026913-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KIND-MASQ-AGENT - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026927-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026929-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026931-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-M66F6TD25XSFZOMV - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026935-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.026937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-UTWFOSUDHOCXYA2F - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.027192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.027196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.027198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.0272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.027202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.027204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.027206-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:33:38.027208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:33:38.027211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:33:38.027213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:33:38.027215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:33:38.027217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:33:38.027219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:33:38.027221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:33:38.027224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:33:38.027229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:33:38.027232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A POSTROUTING -m addrtype ! --dst-type LOCAL -m comment --comment \"kind-masq-agent: ensure nat POSTROUTING directs all non-LOCAL destination traffic to our custom KIND-MASQ-AGENT chain\" -j KIND-MASQ-AGENT\r\n"} +{"Time":"2023-05-31T12:33:38.027234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:33:38.027236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:46277\r\n"} +{"Time":"2023-05-31T12:33:38.027238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:47867\r\n"} +{"Time":"2023-05-31T12:33:38.027241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 46277 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:33:38.027401-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 47867 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:33:38.027405-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KIND-MASQ-AGENT -d 10.244.0.0/16 -m comment --comment \"kind-masq-agent: local traffic is not subject to MASQUERADE\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:33:38.027408-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KIND-MASQ-AGENT -m comment --comment \"kind-masq-agent: outbound traffic is subject to MASQUERADE (must be last in chain)\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:33:38.02741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:33:38.027412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:33:38.027414-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:33:38.027416-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:33:38.027419-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.027421-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:33:38.027423-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -s 192.168.76.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.027426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:33:38.027428-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.02743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:33:38.027432-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -s 10.244.0.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.027435-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T12:33:38.027438-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.02744-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:33:38.027599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:33:38.027603-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:33:38.027606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:33:38.02761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:33:38.027612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.97.100.224/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:33:38.027614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:33:38.027617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.027619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T12:33:38.027622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.027624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T12:33:38.027626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.027629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.76.2:8443\" -j KUBE-SEP-M66F6TD25XSFZOMV\r\n"} +{"Time":"2023-05-31T12:33:38.027631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.027633-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T12:33:38.027636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.97.100.224/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:33:38.027797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.3:8080\" -j KUBE-SEP-UTWFOSUDHOCXYA2F\r\n"} +{"Time":"2023-05-31T12:33:38.027802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:33:38.027804-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Completed on Wed May 31 19:33:28 2023\r\n"} +{"Time":"2023-05-31T12:33:38.027806-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.027808-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.02781-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:33:38.027812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:33:38.027815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.027817-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 53 3340 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:33:38.027819-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 85 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:33:38.027821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 45 2700 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:33:38.027823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.027825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:33:38.027827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.027833-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.027836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain OUTPUT (policy ACCEPT 44 packets, 2640 bytes)\r\n"} +{"Time":"2023-05-31T12:33:38.027838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.02784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 248 17933 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:33:38.027842-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 65 5480 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:33:38.027844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 103 6180 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:33:38.027984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.027986-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain POSTROUTING (policy ACCEPT 53 packets, 3315 bytes)\r\n"} +{"Time":"2023-05-31T12:33:38.027988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.027991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 258 18668 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:33:38.027993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:33:38.027995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:33:38.027998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 89 6852 KIND-MASQ-AGENT all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type !LOCAL /* kind-masq-agent: ensure nat POSTROUTING directs all non-LOCAL destination traffic to our custom KIND-MASQ-AGENT chain */\r\n"} +{"Time":"2023-05-31T12:33:38.028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:33:38.028009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:46277\r\n"} +{"Time":"2023-05-31T12:33:38.028017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 66 5565 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:47867\r\n"} +{"Time":"2023-05-31T12:33:38.028019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:46277 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:33:38.028191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:47867 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:33:38.028193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KIND-MASQ-AGENT (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028199-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 13 915 RETURN all -- * * 0.0.0.0/0 10.244.0.0/16 /* kind-masq-agent: local traffic is not subject to MASQUERADE */\r\n"} +{"Time":"2023-05-31T12:33:38.028203-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 76 5937 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kind-masq-agent: outbound traffic is subject to MASQUERADE (must be last in chain) */\r\n"} +{"Time":"2023-05-31T12:33:38.028205-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:33:38.02821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028212-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028216-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:33:38.02822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 53 3315 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:33:38.028388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:33:38.028393-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:33:38.028395-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028397-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028399-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028401-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028407-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028409-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:33:38.028411-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:33:38.028413-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028415-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-M66F6TD25XSFZOMV (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028417-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.02842-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 2 120 KUBE-MARK-MASQ all -- * * 192.168.76.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:33:38.028422-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:33:38.028424-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028428-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028431-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:33:38.028433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:33:38.02858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028585-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-UTWFOSUDHOCXYA2F (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.02859-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:33:38.028592-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T12:33:38.028594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:33:38.028603-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:33:38.028606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:33:38.02861-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:33:38.028615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:33:38.028617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:33:38.02862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:33:38.028622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.97.100.224 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:33:38.028818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 79 4740 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:33:38.028834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028837-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028839-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:33:38.028844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:33:38.028846-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.02885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:33:38.028857-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T12:33:38.028859-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028861-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.028865-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 2 120 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:33:38.028868-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3 180 KUBE-SEP-M66F6TD25XSFZOMV all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.76.2:8443 */\r\n"} +{"Time":"2023-05-31T12:33:38.02887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.028872-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.028874-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.029134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:33:38.029138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:33:38.02914-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.029143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:33:38.029145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:33:38.029147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.97.100.224 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:33:38.029149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-SEP-UTWFOSUDHOCXYA2F all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.3:8080 */\r\n"} +{"Time":"2023-05-31T12:33:38.029151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.029153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.029155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kindnet daemon set:\n"} +{"Time":"2023-05-31T12:33:38.029158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kindnet\n"} +{"Time":"2023-05-31T12:33:38.02916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Selector: app=kindnet\n"} +{"Time":"2023-05-31T12:33:38.029162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selector: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.029164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=kindnet\n"} +{"Time":"2023-05-31T12:33:38.029166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-app=kindnet\n"} +{"Time":"2023-05-31T12:33:38.029168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tier=node\n"} +{"Time":"2023-05-31T12:33:38.02917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:33:38.029172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:33:38.029174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:33:38.029176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:33:38.029178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:33:38.029436-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:33:38.029441-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:33:38.029443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:33:38.029445-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=kindnet\n"} +{"Time":"2023-05-31T12:33:38.029447-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-app=kindnet\n"} +{"Time":"2023-05-31T12:33:38.029449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tier=node\n"} +{"Time":"2023-05-31T12:33:38.029452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: kindnet\n"} +{"Time":"2023-05-31T12:33:38.029453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.029455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kindnet-cni:\n"} +{"Time":"2023-05-31T12:33:38.029457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: docker.io/kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T12:33:38.029459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.029462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.029464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Limits:\n"} +{"Time":"2023-05-31T12:33:38.029466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:33:38.029468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:33:38.029471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T12:33:38.029473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:33:38.029476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:33:38.029478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment:\n"} +{"Time":"2023-05-31T12:33:38.02948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HOST_IP: (v1:status.hostIP)\n"} +{"Time":"2023-05-31T12:33:38.029482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD_IP: (v1:status.podIP)\n"} +{"Time":"2023-05-31T12:33:38.029484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD_SUBNET: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:33:38.029486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:33:38.029488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d from cni-cfg (rw)\n"} +{"Time":"2023-05-31T12:33:38.02949-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:33:38.029493-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:33:38.029495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:33:38.029758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni-cfg:\n"} +{"Time":"2023-05-31T12:33:38.029761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.029764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:33:38.029766-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:33:38.029768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:33:38.02977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.029772-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:33:38.029774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:33:38.029776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:33:38.029778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.02978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:33:38.029782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:33:38.029784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T12:33:38.029786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:33:38.029788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:33:38.02979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal SuccessfulCreate 48s daemonset-controller Created pod: kindnet-j9shg\n"} +{"Time":"2023-05-31T12:33:38.029797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.029799-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.029801-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kindnet pod(s):\n"} +{"Time":"2023-05-31T12:33:38.029803-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kindnet-j9shg\n"} +{"Time":"2023-05-31T12:33:38.029805-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.029807-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:33:38.029809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: kindnet\n"} +{"Time":"2023-05-31T12:33:38.029811-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.029813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 12:32:40 -0700\n"} +{"Time":"2023-05-31T12:33:38.030026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=kindnet\n"} +{"Time":"2023-05-31T12:33:38.030028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" controller-revision-hash=575d9d6996\n"} +{"Time":"2023-05-31T12:33:38.030031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-app=kindnet\n"} +{"Time":"2023-05-31T12:33:38.030033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:33:38.030035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tier=node\n"} +{"Time":"2023-05-31T12:33:38.030037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.030039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:33:38.030041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.030043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:33:38.030045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.030047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: DaemonSet/kindnet\n"} +{"Time":"2023-05-31T12:33:38.030049-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.030051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kindnet-cni:\n"} +{"Time":"2023-05-31T12:33:38.030053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: docker://5db638a8b7edb8ca68469ea8181a6f4ee16db5bbfef2541b3c70c115f4a7b245\n"} +{"Time":"2023-05-31T12:33:38.030055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: docker.io/kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T12:33:38.030057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: docker-pullable://kindest/kindnetd@sha256:6c00e28db008c2afa67d9ee085c86184ec9ae5281d5ae1bd15006746fb9a1974\n"} +{"Time":"2023-05-31T12:33:38.03006-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.030062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.030064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:33:38.030066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 12:32:44 -0700\n"} +{"Time":"2023-05-31T12:33:38.030068-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:33:38.03007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:33:38.030072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Limits:\n"} +{"Time":"2023-05-31T12:33:38.030074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:33:38.030076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:33:38.030282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T12:33:38.030284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:33:38.030286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:33:38.030289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment:\n"} +{"Time":"2023-05-31T12:33:38.030291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HOST_IP: (v1:status.hostIP)\n"} +{"Time":"2023-05-31T12:33:38.030293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD_IP: (v1:status.podIP)\n"} +{"Time":"2023-05-31T12:33:38.030295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD_SUBNET: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:33:38.030297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:33:38.030299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d from cni-cfg (rw)\n"} +{"Time":"2023-05-31T12:33:38.030301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:33:38.030303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:33:38.030305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-mwvzz (ro)\n"} +{"Time":"2023-05-31T12:33:38.030307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:33:38.030309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:33:38.030311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:33:38.030313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:33:38.030316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:33:38.030318-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:33:38.03032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:33:38.030322-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni-cfg:\n"} +{"Time":"2023-05-31T12:33:38.030324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.030326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:33:38.030328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:33:38.03033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:33:38.030332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.030335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:33:38.030575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:33:38.030579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:33:38.030581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.030583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:33:38.030585-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:33:38.030588-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-api-access-mwvzz:\n"} +{"Time":"2023-05-31T12:33:38.03059-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:33:38.030592-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:33:38.030594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.030596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:33:38.030598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:33:38.0306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: Guaranteed\n"} +{"Time":"2023-05-31T12:33:38.030602-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.030604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: :NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.030607-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.030609-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.030612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.030614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:33:38.030616-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.030618-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:33:38.03062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.030622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T12:33:38.030814-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:33:38.030818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:33:38.03082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Scheduled 48s default-scheduler Successfully assigned kube-system/kindnet-j9shg to kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.030822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulling 47s kubelet Pulling image \"docker.io/kindest/kindnetd:v20230511-dc714da8\"\n"} +{"Time":"2023-05-31T12:33:38.030824-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulled 44s kubelet Successfully pulled image \"docker.io/kindest/kindnetd:v20230511-dc714da8\" in 2.649796184s (2.649836497s including waiting)\n"} +{"Time":"2023-05-31T12:33:38.030827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Created 44s kubelet Created container kindnet-cni\n"} +{"Time":"2023-05-31T12:33:38.030829-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Started 44s kubelet Started container kindnet-cni\n"} +{"Time":"2023-05-31T12:33:38.030832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.030834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.030836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kindnet container(s) logs (current):\n"} +{"Time":"2023-05-31T12:33:38.030838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:32:44.682201 1 main.go:223] Handling node with IPs: map[192.168.76.2:{}]\n"} +{"Time":"2023-05-31T12:33:38.030841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:32:44.682243 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T12:33:38.030843-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:32:54.696061 1 main.go:223] Handling node with IPs: map[192.168.76.2:{}]\n"} +{"Time":"2023-05-31T12:33:38.030845-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:32:54.696105 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T12:33:38.030847-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:33:04.707432 1 main.go:223] Handling node with IPs: map[192.168.76.2:{}]\n"} +{"Time":"2023-05-31T12:33:38.030849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:33:04.707472 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T12:33:38.030851-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:33:14.712540 1 main.go:223] Handling node with IPs: map[192.168.76.2:{}]\n"} +{"Time":"2023-05-31T12:33:38.030854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:33:14.712651 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T12:33:38.030856-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:33:24.720319 1 main.go:223] Handling node with IPs: map[192.168.76.2:{}]\n"} +{"Time":"2023-05-31T12:33:38.030858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-j9shg/kindnet-cni] I0531 19:33:24.720359 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T12:33:38.031078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.031082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.031084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kindnet container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:33:38.031086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: previous terminated container \"kindnet-cni\" in pod \"kindnet-j9shg\" not found\n"} +{"Time":"2023-05-31T12:33:38.031089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.03109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.031092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:33:38.031094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:33:38.031102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:33:38.031106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:33:38.031108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:33:38.03111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:33:38.031112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:33:38.031114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:33:38.031116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:33:38.031119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:33:38.031121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.031127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:33:38.03113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:33:38.031479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.031497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.031504-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T12:33:38.031506-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:33:38.031511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:33:38.031513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment:\n"} +{"Time":"2023-05-31T12:33:38.031515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:33:38.031517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:33:38.031519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:33:38.031521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:33:38.031523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:33:38.031525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:33:38.031527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:33:38.031529-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:33:38.031531-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031533-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:33:38.031535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:33:38.031537-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.031539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:33:38.031542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:33:38.031544-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:33:38.031546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.031548-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:33:38.03155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:33:38.031717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:33:38.031721-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T12:33:38.031724-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:33:38.031726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:33:38.031728-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal SuccessfulCreate 49s daemonset-controller Created pod: kube-proxy-7bktv\n"} +{"Time":"2023-05-31T12:33:38.03173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.031732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.031734-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:33:38.031736-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-proxy-7bktv\n"} +{"Time":"2023-05-31T12:33:38.031738-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.03174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:33:38.031742-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:33:38.031744-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.031749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 12:32:40 -0700\n"} +{"Time":"2023-05-31T12:33:38.031751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:33:38.031753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031755-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:33:38.031757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.031759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:33:38.031761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.031763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:33:38.031765-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.03177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.03189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:33:38.031894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:33:38.031896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: docker://82c1a8ca96f48659115fcdb85d2b1b4cdc03f34ef2d7d436559d006da8911a05\n"} +{"Time":"2023-05-31T12:33:38.031898-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:33:38.031901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:33:38.031903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.031905-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:33:38.031907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T12:33:38.031909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.031911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:33:38.031913-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:33:38.031915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:33:38.031917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 12:32:41 -0700\n"} +{"Time":"2023-05-31T12:33:38.03192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:33:38.031922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:33:38.031924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment:\n"} +{"Time":"2023-05-31T12:33:38.031926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:33:38.031928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:33:38.03193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:33:38.031932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:33:38.031934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:33:38.031936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-frl7j (ro)\n"} +{"Time":"2023-05-31T12:33:38.031938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:33:38.03194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:33:38.03211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:33:38.032113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:33:38.032115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:33:38.032117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:33:38.032119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:33:38.032121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:33:38.032123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:33:38.032125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.032127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:33:38.032129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:33:38.032131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.032133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:33:38.032135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:33:38.032138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:33:38.03214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:33:38.032142-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:33:38.032145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:33:38.032148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-api-access-frl7j:\n"} +{"Time":"2023-05-31T12:33:38.03215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:33:38.032152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:33:38.032154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.032156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:33:38.032175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:33:38.032177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:33:38.032179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:33:38.032181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:33:38.032446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.032452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.032455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.032458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:33:38.032462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.032465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:33:38.032469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:33:38.032472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T12:33:38.032475-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:33:38.032479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:33:38.032482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Scheduled 49s default-scheduler Successfully assigned kube-system/kube-proxy-7bktv to kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.032489-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulled 48s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:33:38.032497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Created 48s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.032503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Started 48s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.032508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.032511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.032514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:33:38.032518-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.624760 1 node.go:141] Successfully retrieved node IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.032521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.624854 1 server_others.go:110] \"Detected node IP\" address=\"192.168.76.2\"\n"} +{"Time":"2023-05-31T12:33:38.032525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.624883 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:33:38.032528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.713345 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:33:38.032767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.713494 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:33:38.032772-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.713505 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:33:38.032774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.713517 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:33:38.032777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.713541 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:33:38.032779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.714058 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:33:38.032782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.714114 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:33:38.032784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.715241 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:33:38.032786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.715471 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:33:38.032788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.715500 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:33:38.032791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.715506 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:33:38.032793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.715697 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:33:38.032795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.715727 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:33:38.032811-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.816529 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:33:38.032814-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.816616 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:33:38.032817-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:32:41.816635 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:33:38.03284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.032843-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.032846-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:33:38.033152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:33:38.033171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: loaded (\u001b]8;;file://kindnet-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:33:38.033177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:33:38.03318-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─\u001b]8;;file://kindnet-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:33:38.033192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:32:27 UTC; 1min 2s ago\r\n"} +{"Time":"2023-05-31T12:33:38.033197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:33:38.033201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Main PID: 2377 (kubelet)\r\n"} +{"Time":"2023-05-31T12:33:38.033204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tasks: 14 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:33:38.033208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Memory: 32.8M\r\n"} +{"Time":"2023-05-31T12:33:38.033225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CPU: 2.237s\r\n"} +{"Time":"2023-05-31T12:33:38.033228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:33:38.033233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─2377 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=kindnet-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:33:38.033257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.033261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 kubelet[2377]: I0531 19:32:42.095494 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/0bc69f48-5684-4b6d-a781-98655ea296d4-config-volume\\\") pod \\\"coredns-5d78c9869d-45977\\\" (UID: \\\"0bc69f48-5684-4b6d-a781-98655ea296d4\\\") \" pod=\"kube-system/coredns-5d78c9869d-45977\"\r\n"} +{"Time":"2023-05-31T12:33:38.033267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 kubelet[2377]: I0531 19:32:42.838773 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=1.838745341 podCreationTimestamp=\"2023-05-31 19:32:41 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:42.819504474 +0000 UTC m=+15.324503388\" watchObservedRunningTime=\"2023-05-31 19:32:42.838745341 +0000 UTC m=+15.343744256\"\r\n"} +{"Time":"2023-05-31T12:33:38.033282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:44 kindnet-996000 kubelet[2377]: I0531 19:32:44.905513 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kindnet-j9shg\" podStartSLOduration=2.255564786 podCreationTimestamp=\"2023-05-31 19:32:40 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:32:41.386629313 +0000 UTC m=+13.891628218\" lastFinishedPulling=\"2023-05-31 19:32:44.036503222 +0000 UTC m=+16.541502130\" observedRunningTime=\"2023-05-31 19:32:44.905354349 +0000 UTC m=+17.410353263\" watchObservedRunningTime=\"2023-05-31 19:32:44.905438698 +0000 UTC m=+17.410437608\"\r\n"} +{"Time":"2023-05-31T12:33:38.03344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:44 kindnet-996000 kubelet[2377]: I0531 19:32:44.905632 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-45977\" podStartSLOduration=4.905618894 podCreationTimestamp=\"2023-05-31 19:32:40 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:42.83891333 +0000 UTC m=+15.343912244\" watchObservedRunningTime=\"2023-05-31 19:32:44.905618894 +0000 UTC m=+17.410617803\"\r\n"} +{"Time":"2023-05-31T12:33:38.033445-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:48 kindnet-996000 kubelet[2377]: I0531 19:32:48.699724 2377 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:33:38.033448-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:48 kindnet-996000 kubelet[2377]: I0531 19:32:48.700351 2377 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:33:38.033452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:56 kindnet-996000 kubelet[2377]: I0531 19:32:56.987193 2377 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"ab4160ec5f0223ee38f7162ac1ec6bf971301fc0cf7e558e8603079d4c4de016\"\r\n"} +{"Time":"2023-05-31T12:33:38.033454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 kubelet[2377]: I0531 19:33:05.360688 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.033489-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 kubelet[2377]: I0531 19:33:05.492213 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-h5nlk\\\" (UniqueName: \\\"kubernetes.io/projected/6cbc580f-87d9-4b0e-ae5d-b07bd004536c-kube-api-access-h5nlk\\\") pod \\\"netcat-7458db8b8-zxf6k\\\" (UID: \\\"6cbc580f-87d9-4b0e-ae5d-b07bd004536c\\\") \" pod=\"default/netcat-7458db8b8-zxf6k\"\r\n"} +{"Time":"2023-05-31T12:33:38.033495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:12 kindnet-996000 kubelet[2377]: I0531 19:33:12.136461 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-zxf6k\" podStartSLOduration=2.038099469 podCreationTimestamp=\"2023-05-31 19:33:05 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:33:05.842914011 +0000 UTC m=+38.347912919\" lastFinishedPulling=\"2023-05-31 19:33:10.941469357 +0000 UTC m=+43.446246033\" observedRunningTime=\"2023-05-31 19:33:12.136307219 +0000 UTC m=+44.641083899\" watchObservedRunningTime=\"2023-05-31 19:33:12.136432583 +0000 UTC m=+44.641209261\"\r\n"} +{"Time":"2023-05-31T12:33:38.03352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.033682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.033693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:33:38.033698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.033701-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:33:38.033703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:33:38.033705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:33:38.033707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:33:38.03371-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.033712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.033714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:33:38.033716-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:33:38.033718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:33:38.03372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:33:38.033724-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.033726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:33:38.033728-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:33:38.03373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.033732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.033735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:33:38.033737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:33:38.033738-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.03374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.033742-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:33:38.033745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=kindnet-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:33:38.033919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.033923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:33:38.033925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.033927-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.033929-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:33:38.033934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:33:38.033936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.033939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.033941-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.033943-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.033945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.033948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.03395-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.033952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:33:38.033955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.513483 1740 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:33:38.033957-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.513553 1740 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:33:38.03396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.513693 1740 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:33:38.033962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.516280 1740 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:33:38.034215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.517426 1740 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.034219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: W0531 19:32:21.519689 1740 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:33:38.034222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.526030 1740 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:33:38.034224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.526367 1740 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:33:38.034233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.526435 1740 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:33:38.034238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.526452 1740 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:33:38.034241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.526462 1740 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:33:38.034243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.526525 1740 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:33:38.034245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.544642 1740 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:33:38.034248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.544686 1740 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:33:38.034498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.544702 1740 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:33:38.034503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.544718 1740 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:33:38.034505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: W0531 19:32:21.545254 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.034511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: W0531 19:32:21.545368 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkindnet-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.034514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.545434 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.034517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.545449 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkindnet-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.03452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.552873 1740 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:33:38.034523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: W0531 19:32:21.553124 1740 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:33:38.034525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.553600 1740 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:33:38.034528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.553913 1740 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:33:38.03453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.553942 1740 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:33:38.034533-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.554060 1740 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kindnet-996000.1764514aa35c828c\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"kindnet-996000\", UID:\"kindnet-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"kindnet-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 32, 21, 553586828, time.Local), LastTimestamp:time"} +{"Time":"2023-05-31T12:33:38.034779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":".Date(2023, time.May, 31, 19, 32, 21, 553586828, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.76.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:33:38.034784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.554508 1740 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:33:38.034787-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.554730 1740 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:33:38.034789-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.554966 1740 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:33:38.034791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.555019 1740 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:33:38.034794-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.555101 1740 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kindnet-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:33:38.034797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: W0531 19:32:21.555298 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.034801-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.555339 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.035073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.569673 1740 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:33:38.035079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.580670 1740 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:33:38.035083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.580860 1740 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:33:38.035085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.580946 1740 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:33:38.035088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.581006 1740 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:33:38.035091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: W0531 19:32:21.581897 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.035093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.581931 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.035096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.589891 1740 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:33:38.035099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.589941 1740 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:33:38.035101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.589956 1740 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:33:38.035103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.591689 1740 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:33:38.035106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.593335 1740 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:33:38.035108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.593377 1740 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:33:38.035356-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.610703 1740 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:33:38.03536-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.611067 1740 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:33:38.035362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.620605 1740 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"kindnet-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:33:38.035364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.663838 1740 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.664383 1740 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.03537-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.681851 1740 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.035372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.689667 1740 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.035375-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.697885 1740 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.035377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.705392 1740 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.03538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.755715 1740 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kindnet-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:33:38.035383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.856104 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035585-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.856382 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-flexvolume-dir\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.856516 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-kubeconfig\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.856568 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-ca-certs\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.856604 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.856726 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/90b6fdd0376ec11a75a4366845b9c111-etcd-data\\\") pod \\\"etcd-kindnet-996000\\\" (UID: \\\"90b6fdd0376ec11a75a4366845b9c111\\\") \" pod=\"kube-system/etcd-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.856832 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-etc-ca-certificates\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035607-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.856874 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.03561-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.857089 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-k8s-certs\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035829-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.857181 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-ca-certs\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.857265 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-k8s-certs\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035845-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.857363 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.857412 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/b3c5c99007c2d37273134948a57cf584-kubeconfig\\\") pod \\\"kube-scheduler-kindnet-996000\\\" (UID: \\\"b3c5c99007c2d37273134948a57cf584\\\") \" pod=\"kube-system/kube-scheduler-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.857460 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/90b6fdd0376ec11a75a4366845b9c111-etcd-certs\\\") pod \\\"etcd-kindnet-996000\\\" (UID: \\\"90b6fdd0376ec11a75a4366845b9c111\\\") \" pod=\"kube-system/etcd-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035855-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.857519 1740 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-etc-ca-certificates\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.035857-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: I0531 19:32:21.873944 1740 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.036138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:21 kindnet-996000 kubelet[1740]: E0531 19:32:21.874423 1740 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.036145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:22 kindnet-996000 kubelet[1740]: E0531 19:32:22.181406 1740 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kindnet-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:33:38.036148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:22 kindnet-996000 kubelet[1740]: I0531 19:32:22.290285 1740 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.036151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:22 kindnet-996000 kubelet[1740]: E0531 19:32:22.290540 1740 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.036154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:22 kindnet-996000 kubelet[1740]: W0531 19:32:22.399860 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.036157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:22 kindnet-996000 kubelet[1740]: E0531 19:32:22.399975 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.036171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:22 kindnet-996000 kubelet[1740]: W0531 19:32:22.598878 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.036175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:22 kindnet-996000 kubelet[1740]: E0531 19:32:22.599050 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:33:38.036177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:23 kindnet-996000 kubelet[1740]: I0531 19:32:23.101627 1740 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.03618-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:24 kindnet-996000 kubelet[1740]: E0531 19:32:24.621255 1740 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"kindnet-996000\\\" not found\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.036412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:24 kindnet-996000 kubelet[1740]: I0531 19:32:24.715016 1740 kubelet_node_status.go:73] \"Successfully registered node\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.036416-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:24 kindnet-996000 kubelet[1740]: I0531 19:32:24.798112 1740 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T12:33:38.036418-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:25 kindnet-996000 kubelet[1740]: I0531 19:32:25.582140 1740 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:33:38.036422-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:25 kindnet-996000 kubelet[1740]: I0531 19:32:25.680857 1740 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:33:38.036426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:25 kindnet-996000 kubelet[1740]: I0531 19:32:25.702365 1740 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:33:38.036429-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:33:38.036432-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036435-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.03645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036461-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[1740]: I0531 19:32:27.447500 1740 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:33:38.036463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:33:38.036696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036701-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.03671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:33:38.036713-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.03672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036722-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036724-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:33:38.036731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.03674-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036976-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.036981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:33:38.036984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.584171 2377 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:33:38.036986-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.584284 2377 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:33:38.036989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.584435 2377 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:33:38.036991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.585623 2377 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:33:38.036994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.586454 2377 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:33:38.036996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: W0531 19:32:27.590449 2377 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:33:38.036999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.597569 2377 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:33:38.037001-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.597907 2377 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:33:38.037004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.597971 2377 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:33:38.037224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.597989 2377 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:33:38.037226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.597998 2377 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:33:38.037229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.598015 2377 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:33:38.037231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.617071 2377 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:33:38.037234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.617122 2377 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:33:38.037236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.617138 2377 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:33:38.037238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.617151 2377 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:33:38.037241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.629234 2377 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:33:38.037243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.630128 2377 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:33:38.037246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.630605 2377 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:33:38.037248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.630644 2377 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:33:38.03725-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.631659 2377 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:33:38.037253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.632374 2377 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:33:38.037255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.631668 2377 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:33:38.037436-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.634034 2377 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:33:38.037442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.688991 2377 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:33:38.037444-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.690403 2377 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:33:38.037447-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.690454 2377 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:33:38.037449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.690470 2377 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:33:38.037451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: E0531 19:32:27.690542 2377 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:33:38.037454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.713416 2377 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:33:38.037456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.713479 2377 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:33:38.037458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.713499 2377 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:33:38.03746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.713614 2377 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:33:38.037463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.713655 2377 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:33:38.037465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.713662 2377 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:33:38.037467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.716701 2377 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:33:38.03747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.716764 2377 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:33:38.037657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.716904 2377 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:33:38.037663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.717830 2377 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:33:38.037666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.718165 2377 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:33:38.037668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.790770 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.037671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.790858 2377 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.790869 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.037675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.790898 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.037678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.790927 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.037685-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.881588 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-kubeconfig\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037688-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.881726 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.881756 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/90b6fdd0376ec11a75a4366845b9c111-etcd-data\\\") pod \\\"etcd-kindnet-996000\\\" (UID: \\\"90b6fdd0376ec11a75a4366845b9c111\\\") \" pod=\"kube-system/etcd-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037765-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.881775 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-k8s-certs\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.03777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.881918 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-etc-ca-certificates\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882015 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-etc-ca-certificates\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882061 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.03778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882091 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882110 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-k8s-certs\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882130 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/b3c5c99007c2d37273134948a57cf584-kubeconfig\\\") pod \\\"kube-scheduler-kindnet-996000\\\" (UID: \\\"b3c5c99007c2d37273134948a57cf584\\\") \" pod=\"kube-system/kube-scheduler-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882148 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/90b6fdd0376ec11a75a4366845b9c111-etcd-certs\\\") pod \\\"etcd-kindnet-996000\\\" (UID: \\\"90b6fdd0376ec11a75a4366845b9c111\\\") \" pod=\"kube-system/etcd-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882247 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/e800ec97290ce8b750dfc3986337d0ce-ca-certs\\\") pod \\\"kube-apiserver-kindnet-996000\\\" (UID: \\\"e800ec97290ce8b750dfc3986337d0ce\\\") \" pod=\"kube-system/kube-apiserver-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882272 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-ca-certs\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882295 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.882314 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/24df74171def20a2387d97a69a6efaae-flexvolume-dir\\\") pod \\\"kube-controller-manager-kindnet-996000\\\" (UID: \\\"24df74171def20a2387d97a69a6efaae\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: E0531 19:32:27.884089 2377 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-kindnet-996000\\\" already exists\" pod=\"kube-system/etcd-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: E0531 19:32:27.884089 2377 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-kindnet-996000\\\" already exists\" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.037998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.885651 2377 kubelet_node_status.go:108] \"Node was previously registered\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.03822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:27 kindnet-996000 kubelet[2377]: I0531 19:32:27.885720 2377 kubelet_node_status.go:73] \"Successfully registered node\" node=\"kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.038224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:28 kindnet-996000 kubelet[2377]: I0531 19:32:28.618517 2377 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:33:38.038227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:28 kindnet-996000 kubelet[2377]: I0531 19:32:28.634267 2377 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:33:38.038229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:28 kindnet-996000 kubelet[2377]: I0531 19:32:28.689261 2377 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:33:38.038232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:28 kindnet-996000 kubelet[2377]: E0531 19:32:28.725479 2377 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-kindnet-996000\\\" already exists\" pod=\"kube-system/kube-controller-manager-kindnet-996000\"\r\n"} +{"Time":"2023-05-31T12:33:38.038235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:28 kindnet-996000 kubelet[2377]: I0531 19:32:28.748882 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-kindnet-996000\" podStartSLOduration=1.74879709 podCreationTimestamp=\"2023-05-31 19:32:27 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:28.740672415 +0000 UTC m=+1.245865074\" watchObservedRunningTime=\"2023-05-31 19:32:28.74879709 +0000 UTC m=+1.253989727\"\r\n"} +{"Time":"2023-05-31T12:33:38.038238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:28 kindnet-996000 kubelet[2377]: I0531 19:32:28.787265 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-kindnet-996000\" podStartSLOduration=1.7872377799999999 podCreationTimestamp=\"2023-05-31 19:32:27 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:28.749029894 +0000 UTC m=+1.254222526\" watchObservedRunningTime=\"2023-05-31 19:32:28.78723778 +0000 UTC m=+1.292430417\"\r\n"} +{"Time":"2023-05-31T12:33:38.038242-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:28 kindnet-996000 kubelet[2377]: I0531 19:32:28.794909 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-kindnet-996000\" podStartSLOduration=1.794872504 podCreationTimestamp=\"2023-05-31 19:32:27 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:28.787397397 +0000 UTC m=+1.292590030\" watchObservedRunningTime=\"2023-05-31 19:32:28.794872504 +0000 UTC m=+1.300065147\"\r\n"} +{"Time":"2023-05-31T12:33:38.038248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:28 kindnet-996000 kubelet[2377]: I0531 19:32:28.804121 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-kindnet-996000\" podStartSLOduration=2.804093818 podCreationTimestamp=\"2023-05-31 19:32:26 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:28.795144863 +0000 UTC m=+1.300337496\" watchObservedRunningTime=\"2023-05-31 19:32:28.804093818 +0000 UTC m=+1.309286452\"\r\n"} +{"Time":"2023-05-31T12:33:38.038367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.505999 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.038371-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.509589 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.038374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.584729 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-mwvzz\\\" (UniqueName: \\\"kubernetes.io/projected/737c7633-e778-45a5-ae84-eae57b7258d8-kube-api-access-mwvzz\\\") pod \\\"kindnet-j9shg\\\" (UID: \\\"737c7633-e778-45a5-ae84-eae57b7258d8\\\") \" pod=\"kube-system/kindnet-j9shg\"\r\n"} +{"Time":"2023-05-31T12:33:38.038378-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.584795 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-cfg\\\" (UniqueName: \\\"kubernetes.io/host-path/737c7633-e778-45a5-ae84-eae57b7258d8-cni-cfg\\\") pod \\\"kindnet-j9shg\\\" (UID: \\\"737c7633-e778-45a5-ae84-eae57b7258d8\\\") \" pod=\"kube-system/kindnet-j9shg\"\r\n"} +{"Time":"2023-05-31T12:33:38.038381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.584813 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/737c7633-e778-45a5-ae84-eae57b7258d8-lib-modules\\\") pod \\\"kindnet-j9shg\\\" (UID: \\\"737c7633-e778-45a5-ae84-eae57b7258d8\\\") \" pod=\"kube-system/kindnet-j9shg\"\r\n"} +{"Time":"2023-05-31T12:33:38.038384-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.584829 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/f998b66f-882e-4a12-bceb-648bab1504c9-kube-proxy\\\") pod \\\"kube-proxy-7bktv\\\" (UID: \\\"f998b66f-882e-4a12-bceb-648bab1504c9\\\") \" pod=\"kube-system/kube-proxy-7bktv\"\r\n"} +{"Time":"2023-05-31T12:33:38.038388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.584842 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/f998b66f-882e-4a12-bceb-648bab1504c9-xtables-lock\\\") pod \\\"kube-proxy-7bktv\\\" (UID: \\\"f998b66f-882e-4a12-bceb-648bab1504c9\\\") \" pod=\"kube-system/kube-proxy-7bktv\"\r\n"} +{"Time":"2023-05-31T12:33:38.038494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.584855 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/f998b66f-882e-4a12-bceb-648bab1504c9-lib-modules\\\") pod \\\"kube-proxy-7bktv\\\" (UID: \\\"f998b66f-882e-4a12-bceb-648bab1504c9\\\") \" pod=\"kube-system/kube-proxy-7bktv\"\r\n"} +{"Time":"2023-05-31T12:33:38.038509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.584870 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-frl7j\\\" (UniqueName: \\\"kubernetes.io/projected/f998b66f-882e-4a12-bceb-648bab1504c9-kube-api-access-frl7j\\\") pod \\\"kube-proxy-7bktv\\\" (UID: \\\"f998b66f-882e-4a12-bceb-648bab1504c9\\\") \" pod=\"kube-system/kube-proxy-7bktv\"\r\n"} +{"Time":"2023-05-31T12:33:38.038512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:40 kindnet-996000 kubelet[2377]: I0531 19:32:40.584885 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/737c7633-e778-45a5-ae84-eae57b7258d8-xtables-lock\\\") pod \\\"kindnet-j9shg\\\" (UID: \\\"737c7633-e778-45a5-ae84-eae57b7258d8\\\") \" pod=\"kube-system/kindnet-j9shg\"\r\n"} +{"Time":"2023-05-31T12:33:38.038515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:41 kindnet-996000 kubelet[2377]: I0531 19:32:41.728362 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.038517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:41 kindnet-996000 kubelet[2377]: I0531 19:32:41.893686 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-znmm6\\\" (UniqueName: \\\"kubernetes.io/projected/f45232ce-38f7-4836-8d33-297c9aac04d6-kube-api-access-znmm6\\\") pod \\\"storage-provisioner\\\" (UID: \\\"f45232ce-38f7-4836-8d33-297c9aac04d6\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:33:38.03852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:41 kindnet-996000 kubelet[2377]: I0531 19:32:41.893797 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/f45232ce-38f7-4836-8d33-297c9aac04d6-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"f45232ce-38f7-4836-8d33-297c9aac04d6\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:33:38.038524-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:41 kindnet-996000 kubelet[2377]: I0531 19:32:41.947883 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-7bktv\" podStartSLOduration=1.9478420509999999 podCreationTimestamp=\"2023-05-31 19:32:40 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:41.853468818 +0000 UTC m=+14.358467730\" watchObservedRunningTime=\"2023-05-31 19:32:41.947842051 +0000 UTC m=+14.452840963\"\r\n"} +{"Time":"2023-05-31T12:33:38.038527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:41 kindnet-996000 kubelet[2377]: I0531 19:32:41.948301 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.038597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 kubelet[2377]: I0531 19:32:42.095428 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-nmvd7\\\" (UniqueName: \\\"kubernetes.io/projected/0bc69f48-5684-4b6d-a781-98655ea296d4-kube-api-access-nmvd7\\\") pod \\\"coredns-5d78c9869d-45977\\\" (UID: \\\"0bc69f48-5684-4b6d-a781-98655ea296d4\\\") \" pod=\"kube-system/coredns-5d78c9869d-45977\"\r\n"} +{"Time":"2023-05-31T12:33:38.038601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 kubelet[2377]: I0531 19:32:42.095494 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/0bc69f48-5684-4b6d-a781-98655ea296d4-config-volume\\\") pod \\\"coredns-5d78c9869d-45977\\\" (UID: \\\"0bc69f48-5684-4b6d-a781-98655ea296d4\\\") \" pod=\"kube-system/coredns-5d78c9869d-45977\"\r\n"} +{"Time":"2023-05-31T12:33:38.038604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 kubelet[2377]: I0531 19:32:42.838773 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=1.838745341 podCreationTimestamp=\"2023-05-31 19:32:41 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:42.819504474 +0000 UTC m=+15.324503388\" watchObservedRunningTime=\"2023-05-31 19:32:42.838745341 +0000 UTC m=+15.343744256\"\r\n"} +{"Time":"2023-05-31T12:33:38.038607-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:44 kindnet-996000 kubelet[2377]: I0531 19:32:44.905513 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kindnet-j9shg\" podStartSLOduration=2.255564786 podCreationTimestamp=\"2023-05-31 19:32:40 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:32:41.386629313 +0000 UTC m=+13.891628218\" lastFinishedPulling=\"2023-05-31 19:32:44.036503222 +0000 UTC m=+16.541502130\" observedRunningTime=\"2023-05-31 19:32:44.905354349 +0000 UTC m=+17.410353263\" watchObservedRunningTime=\"2023-05-31 19:32:44.905438698 +0000 UTC m=+17.410437608\"\r\n"} +{"Time":"2023-05-31T12:33:38.038611-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:44 kindnet-996000 kubelet[2377]: I0531 19:32:44.905632 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-45977\" podStartSLOduration=4.905618894 podCreationTimestamp=\"2023-05-31 19:32:40 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:32:42.83891333 +0000 UTC m=+15.343912244\" watchObservedRunningTime=\"2023-05-31 19:32:44.905618894 +0000 UTC m=+17.410617803\"\r\n"} +{"Time":"2023-05-31T12:33:38.038614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:48 kindnet-996000 kubelet[2377]: I0531 19:32:48.699724 2377 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:33:38.038616-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:48 kindnet-996000 kubelet[2377]: I0531 19:32:48.700351 2377 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:33:38.038732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:56 kindnet-996000 kubelet[2377]: I0531 19:32:56.987193 2377 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"ab4160ec5f0223ee38f7162ac1ec6bf971301fc0cf7e558e8603079d4c4de016\"\r\n"} +{"Time":"2023-05-31T12:33:38.038735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 kubelet[2377]: I0531 19:33:05.360688 2377 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:33:38.038738-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 kubelet[2377]: I0531 19:33:05.492213 2377 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-h5nlk\\\" (UniqueName: \\\"kubernetes.io/projected/6cbc580f-87d9-4b0e-ae5d-b07bd004536c-kube-api-access-h5nlk\\\") pod \\\"netcat-7458db8b8-zxf6k\\\" (UID: \\\"6cbc580f-87d9-4b0e-ae5d-b07bd004536c\\\") \" pod=\"default/netcat-7458db8b8-zxf6k\"\r\n"} +{"Time":"2023-05-31T12:33:38.038742-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:12 kindnet-996000 kubelet[2377]: I0531 19:33:12.136461 2377 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-zxf6k\" podStartSLOduration=2.038099469 podCreationTimestamp=\"2023-05-31 19:33:05 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:33:05.842914011 +0000 UTC m=+38.347912919\" lastFinishedPulling=\"2023-05-31 19:33:10.941469357 +0000 UTC m=+43.446246033\" observedRunningTime=\"2023-05-31 19:33:12.136307219 +0000 UTC m=+44.641083899\" watchObservedRunningTime=\"2023-05-31 19:33:12.136432583 +0000 UTC m=+44.641209261\"\r\n"} +{"Time":"2023-05-31T12:33:38.038745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.038747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.038749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:33:38.038752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:33:38.038754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:33:38.038756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:33:38.03876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:33:38.038878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:33:38.038883-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:33:38.038885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:33:38.038887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:33:38.038889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:33:38.038891-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:33:38.038893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user: system:node:kindnet-996000\r\n"} +{"Time":"2023-05-31T12:33:38.038895-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: system:node:kindnet-996000@mk\r\n"} +{"Time":"2023-05-31T12:33:38.038897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: system:node:kindnet-996000@mk\r\n"} +{"Time":"2023-05-31T12:33:38.038899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:33:38.038902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:33:38.038904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users:\r\n"} +{"Time":"2023-05-31T12:33:38.038906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - name: system:node:kindnet-996000\r\n"} +{"Time":"2023-05-31T12:33:38.038909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user:\r\n"} +{"Time":"2023-05-31T12:33:38.038911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:33:38.038914-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:33:38.038917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.038919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.038921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:33:38.038924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:33:38.038925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:33:38.038927-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:33:38.039005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:33:38.039009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:33:38.039011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:33:38.039016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:33:38.039018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:33:38.03902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:33:38.039022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:33:38.039024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:33:38.039026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.03903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:33:38.039032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:33:38.039034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:33:38.039036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:33:38.039038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.039041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039042-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:33:38.039045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:33:38.039046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:33:38.039049-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:33:38.03905-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:33:38.039055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:33:38.039098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:33:38.039105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:33:38.03911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:33:38.039119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:33:38.039132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:33:38.039136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:33:38.039139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" options:\r\n"} +{"Time":"2023-05-31T12:33:38.039141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" json:\r\n"} +{"Time":"2023-05-31T12:33:38.039143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:33:38.039145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:33:38.039147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:33:38.039149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:33:38.039157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:33:38.03916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:33:38.039169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:33:38.039179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.039189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.039192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:33:38.039194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.039196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters:\n"} +{"Time":"2023-05-31T12:33:38.039211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:33:38.039213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:33:38.039215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extensions:\n"} +{"Time":"2023-05-31T12:33:38.039217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - extension:\n"} +{"Time":"2023-05-31T12:33:38.03922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" last-update: Wed, 31 May 2023 12:32:40 PDT\n"} +{"Time":"2023-05-31T12:33:38.039222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:33:38.039224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:33:38.039226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:33:38.039228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://127.0.0.1:52254\n"} +{"Time":"2023-05-31T12:33:38.03923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.039232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:33:38.039234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:33:38.039236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extensions:\n"} +{"Time":"2023-05-31T12:33:38.039238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - extension:\n"} +{"Time":"2023-05-31T12:33:38.03925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" last-update: Wed, 31 May 2023 12:30:59 PDT\n"} +{"Time":"2023-05-31T12:33:38.039252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:33:38.039254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:33:38.039257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:33:38.039259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://127.0.0.1:52059\n"} +{"Time":"2023-05-31T12:33:38.039261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:33:38.039263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts:\n"} +{"Time":"2023-05-31T12:33:38.039265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - context:\n"} +{"Time":"2023-05-31T12:33:38.039296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cluster: kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.039299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extensions:\n"} +{"Time":"2023-05-31T12:33:38.039301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - extension:\n"} +{"Time":"2023-05-31T12:33:38.039303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" last-update: Wed, 31 May 2023 12:32:40 PDT\n"} +{"Time":"2023-05-31T12:33:38.039305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:33:38.039307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:33:38.039309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:33:38.039311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:33:38.039313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user: kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.039315-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.039317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - context:\n"} +{"Time":"2023-05-31T12:33:38.039319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cluster: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:33:38.039321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:33:38.039323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:33:38.039325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.039327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:33:38.039329-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:33:38.039331-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users:\n"} +{"Time":"2023-05-31T12:33:38.039333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - name: kindnet-996000\n"} +{"Time":"2023-05-31T12:33:38.039335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user:\n"} +{"Time":"2023-05-31T12:33:38.039337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt\n"} +{"Time":"2023-05-31T12:33:38.03934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.key\n"} +{"Time":"2023-05-31T12:33:38.039342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:33:38.039344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user:\n"} +{"Time":"2023-05-31T12:33:38.039346-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt\n"} +{"Time":"2023-05-31T12:33:38.039535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key\n"} +{"Time":"2023-05-31T12:33:38.039542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.039545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.039549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:33:38.039552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.039555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" items:\n"} +{"Time":"2023-05-31T12:33:38.039558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.039575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.039578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:33:38.03958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.039582-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:33:38.039584-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:33:38.039599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:33:38.039603-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:33:38.039606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:33:38.039608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:33:38.03961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:33:38.039613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:33:38.039615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:33:38.039617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:33:38.039619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:33:38.039621-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:33:38.039768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:33:38.039771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:33:38.039774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:33:38.039776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:33:38.039778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:33:38.03978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.039782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.039784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.039786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" annotations:\n"} +{"Time":"2023-05-31T12:33:38.039788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:33:38.03979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:33:38.039792-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:33:38.039794-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:33:38.039797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:40Z\"\n"} +{"Time":"2023-05-31T12:33:38.0398-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.039802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:33:38.039804-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"322\"\n"} +{"Time":"2023-05-31T12:33:38.039806-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: db823b54-251e-4908-bd3a-ff98de0ad9b3\n"} +{"Time":"2023-05-31T12:33:38.039808-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.03981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.039812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:33:38.039814-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.039816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:33:38.039818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:33:38.039912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:33:38.039915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:33:38.039938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:33:38.03994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:33:38.039942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:33:38.039944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:33:38.039947-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:33:38.039949-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:33:38.039951-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:33:38.039953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:33:38.039955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:33:38.039957-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:33:38.039959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:33:38.039975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:33:38.039977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:33:38.039979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.039982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.04022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.040225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" annotations:\n"} +{"Time":"2023-05-31T12:33:38.040227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:33:38.04023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:33:38.040232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:33:38.040234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:33:38.040236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:40Z\"\n"} +{"Time":"2023-05-31T12:33:38.040238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.04024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:33:38.040242-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"327\"\n"} +{"Time":"2023-05-31T12:33:38.040244-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 45cea31b-810b-4f56-aab6-90d112ca3028\n"} +{"Time":"2023-05-31T12:33:38.040246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.040248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.040251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" jws-kubeconfig-ruwew8: eyJhbGciOiJIUzI1NiIsImtpZCI6InJ1d2V3OCJ9..WCz_RHbhg-5CByTxJb3AgqlzdWM_Og9Og1nrM9e2jyQ\n"} +{"Time":"2023-05-31T12:33:38.040253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:33:38.040255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.040257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters:\n"} +{"Time":"2023-05-31T12:33:38.040259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:33:38.040262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:33:38.040425-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"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\n"} +{"Time":"2023-05-31T12:33:38.04045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:33:38.040452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:33:38.040455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:33:38.040457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:33:38.040459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:33:38.040461-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:33:38.040463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users: null\n"} +{"Time":"2023-05-31T12:33:38.040465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.040467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.040469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:27Z\"\n"} +{"Time":"2023-05-31T12:33:38.040471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:33:38.040473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:33:38.040475-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"321\"\n"} +{"Time":"2023-05-31T12:33:38.040477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: f3988f97-c988-4f83-bc47-7f47d880b9bb\n"} +{"Time":"2023-05-31T12:33:38.040479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.040482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.040484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:33:38.0405-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.040503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:33:38.040505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:33:38.040677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:33:38.040683-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:33:38.040686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:33:38.040689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:33:38.040691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:33:38.040705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:33:38.040711-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:33:38.040715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:33:38.04073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:33:38.040741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:33:38.040748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:33:38.040751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:33:38.040753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:33:38.040755-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:33:38.040758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:33:38.04076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.040762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.040764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.040766-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" annotations:\n"} +{"Time":"2023-05-31T12:33:38.040768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:33:38.04077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:33:38.040772-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:33:38.040775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:33:38.040777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:40Z\"\n"} +{"Time":"2023-05-31T12:33:38.040779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.040781-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:33:38.040783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"328\"\n"} +{"Time":"2023-05-31T12:33:38.040785-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 829e5f57-b627-4101-b658-ed1267f8d16c\n"} +{"Time":"2023-05-31T12:33:38.040787-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.040789-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.040791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:33:38.040793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:33:38.040795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" log\n"} +{"Time":"2023-05-31T12:33:38.040797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" errors\n"} +{"Time":"2023-05-31T12:33:38.040801-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" health {\n"} +{"Time":"2023-05-31T12:33:38.040812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:33:38.040816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T12:33:38.040818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ready\n"} +{"Time":"2023-05-31T12:33:38.040821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:33:38.040823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:33:38.040825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:33:38.040827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:33:38.040829-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T12:33:38.040831-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:33:38.040833-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hosts {\n"} +{"Time":"2023-05-31T12:33:38.040835-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:33:38.040858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:33:38.04086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T12:33:38.040862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:33:38.040864-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:33:38.040866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T12:33:38.040869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cache 30\n"} +{"Time":"2023-05-31T12:33:38.040871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" loop\n"} +{"Time":"2023-05-31T12:33:38.040873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" reload\n"} +{"Time":"2023-05-31T12:33:38.040875-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:33:38.040877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T12:33:38.040879-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.040881-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.040883-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:27Z\"\n"} +{"Time":"2023-05-31T12:33:38.040885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:33:38.040887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.040889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"361\"\n"} +{"Time":"2023-05-31T12:33:38.040891-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 323002ce-1889-42d7-a1ca-a2d6bc880e59\n"} +{"Time":"2023-05-31T12:33:38.040893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.040895-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.040897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:33:38.040899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.040901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:33:38.040903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:33:38.040905-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:33:38.040907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:33:38.040981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:33:38.040984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:33:38.040986-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:33:38.040988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:33:38.04099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:33:38.040992-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:33:38.040994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:33:38.040996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:33:38.040998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:33:38.041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:33:38.041003-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:33:38.041005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:33:38.041007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:33:38.041009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.041011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:33:38.041013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:33:38.041015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.041017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:33:38.041019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTMyMTlaFw0zMzA1MjgxOTMyMTlaMBkxFzAV\n"} +{"Time":"2023-05-31T12:33:38.041021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:33:38.041023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CgKCAQEAv2eDZvbDu/IVfqe3CClE2ROZFPlrmUMw1oReDxh4Ika9CyXTqojLeEKT\n"} +{"Time":"2023-05-31T12:33:38.041096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IpKrTIUfkFSRllAMONBdfQxhyil6SHH6jLnWJvAm+iUDTphIIKdwjMonohefvh4d\n"} +{"Time":"2023-05-31T12:33:38.041101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fhOMoNDu3uQ1ndZ6qKzqIwOQwjxcFQdIXSzjaXpxpEEvR6QwBdXbTefSXpAf0T0u\n"} +{"Time":"2023-05-31T12:33:38.041103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" i2hyj5jNRaX3LbcJRQBKoihU35v6UzLaCpLlm6eXy0zV+NQsG/jXx9X/05LEhhez\n"} +{"Time":"2023-05-31T12:33:38.041106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" l+zsE+eyQNYtjhl6QpttdoR1ynh+5ZhP8u6MboXxBtSbV+yjk5wSc35v+bdGRWp0\n"} +{"Time":"2023-05-31T12:33:38.041108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imip4fT4wNx5VOXr2n+tZEnArbCIzwIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:33:38.041111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUBbPHUfowcL6kCfXe8QB4wZuRF9Iw\n"} +{"Time":"2023-05-31T12:33:38.041113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAHt0\n"} +{"Time":"2023-05-31T12:33:38.041115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RA2ZsegjqoVnlukccNyUbZ1i5iTOmAQiA14tn0fEiuHEgAKq/t7IyzwTXfdd4m00\n"} +{"Time":"2023-05-31T12:33:38.041117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0xhtlWhDZsZj2YtsnfN8b3lyKgyo24kltZZKYrnU9cDKWbvEgo0ivy4b9J2bdqh\n"} +{"Time":"2023-05-31T12:33:38.041119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" q/qnYFGK0OHxjOBgLrNCfnbU3XBS3plP1EGP99HeBAyN1D8cWe9HYc1dbimBZj/T\n"} +{"Time":"2023-05-31T12:33:38.041121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" g3BRZmPEP8pa22w0H2NTGZwuua+xqBofGpstvRXUOdgQDOsYPw41u7Zs8dQ7Cw/y\n"} +{"Time":"2023-05-31T12:33:38.041123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pvtPySUZzPcnjvLfr0VOGRyMOYmaAxPVYiGBIrD0DYwFfX8PYux6Hb01rIDilzg8\n"} +{"Time":"2023-05-31T12:33:38.041125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" n7oyvF68rXzjOZEWvpg=\n"} +{"Time":"2023-05-31T12:33:38.041127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.041129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:33:38.041131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:33:38.041135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:33:38.041137-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.04114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.041143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:24Z\"\n"} +{"Time":"2023-05-31T12:33:38.041146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:33:38.041148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.041185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"23\"\n"} +{"Time":"2023-05-31T12:33:38.041191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 7f4834f1-6a59-415e-9dc6-8284f3241969\n"} +{"Time":"2023-05-31T12:33:38.041194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.041198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.041201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:33:38.041211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.041215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.041219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:24Z\"\n"} +{"Time":"2023-05-31T12:33:38.041221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:33:38.041223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.041225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"46\"\n"} +{"Time":"2023-05-31T12:33:38.041227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: f3f697bd-1d9a-4a54-8843-cca2189d13fa\n"} +{"Time":"2023-05-31T12:33:38.041229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.041232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.041234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:33:38.041236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:33:38.04124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:33:38.041243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:33:38.041245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:33:38.041247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:33:38.041251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:33:38.04126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:33:38.041263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:33:38.041265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:33:38.041267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.041269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:33:38.041271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:33:38.041273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" min: null\n"} +{"Time":"2023-05-31T12:33:38.041275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:33:38.041277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:33:38.041279-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:33:38.041281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:33:38.041289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" iptables:\n"} +{"Time":"2023-05-31T12:33:38.041298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:33:38.041301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:33:38.041304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:33:38.041307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.04131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.041312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:33:38.041425-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:33:38.04143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.041433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041436-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:33:38.041438-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.04144-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:33:38.041443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:33:38.041445-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:33:38.041447-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:33:38.041449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:33:38.041452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:33:38.041456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:33:38.041458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:33:38.04146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:33:38.041464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:33:38.041466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:33:38.041468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:33:38.04147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:33:38.041474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:33:38.041476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.041478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:33:38.04148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters:\n"} +{"Time":"2023-05-31T12:33:38.041482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:33:38.041485-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:33:38.041613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:33:38.041617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: default\n"} +{"Time":"2023-05-31T12:33:38.04162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts:\n"} +{"Time":"2023-05-31T12:33:38.041622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - context:\n"} +{"Time":"2023-05-31T12:33:38.041624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:33:38.041626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:33:38.041629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user: default\n"} +{"Time":"2023-05-31T12:33:38.041632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: default\n"} +{"Time":"2023-05-31T12:33:38.041635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:33:38.041637-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users:\n"} +{"Time":"2023-05-31T12:33:38.041639-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - name: default\n"} +{"Time":"2023-05-31T12:33:38.041641-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user:\n"} +{"Time":"2023-05-31T12:33:38.041643-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:33:38.041645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.041647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.041649-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:27Z\"\n"} +{"Time":"2023-05-31T12:33:38.041651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" labels:\n"} +{"Time":"2023-05-31T12:33:38.041653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.041655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:33:38.041657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.041659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"239\"\n"} +{"Time":"2023-05-31T12:33:38.041661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: bdb12fd6-500e-47a8-bc85-62d5aa3b1f97\n"} +{"Time":"2023-05-31T12:33:38.041663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.041665-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.041667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:33:38.041669-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.041899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:33:38.041914-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:33:38.041928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:33:38.041932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:33:38.041934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:33:38.041936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:33:38.041938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:33:38.04194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:33:38.041942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:33:38.041944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:33:38.041946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:33:38.041948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:33:38.04195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:33:38.041952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:33:38.041954-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:33:38.041956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:33:38.041958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:33:38.041961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:33:38.041963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.041965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.041967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" annotations:\n"} +{"Time":"2023-05-31T12:33:38.041969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:33:38.042193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:33:38.042196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:33:38.042198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:33:38.042201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:40Z\"\n"} +{"Time":"2023-05-31T12:33:38.042203-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:33:38.042205-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.042207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"330\"\n"} +{"Time":"2023-05-31T12:33:38.04221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: dcc56697-bbea-4db1-bacd-981597b5b890\n"} +{"Time":"2023-05-31T12:33:38.042212-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.042214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.042216-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:33:38.042218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:33:38.04222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:33:38.042222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:33:38.042224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - localhost\n"} +{"Time":"2023-05-31T12:33:38.042226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - 192.168.76.2\n"} +{"Time":"2023-05-31T12:33:38.042228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:33:38.04223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:33:38.042232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:33:38.042234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:33:38.042236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:33:38.042239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:33:38.042241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:33:38.042243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:33:38.042482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:33:38.042486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:33:38.042488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:33:38.04249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:33:38.042492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:33:38.042494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" etcd:\n"} +{"Time":"2023-05-31T12:33:38.042496-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" local:\n"} +{"Time":"2023-05-31T12:33:38.042498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:33:38.042501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:33:38.042503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:33:38.042505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:33:38.042507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:33:38.042509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:33:38.042511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" networking:\n"} +{"Time":"2023-05-31T12:33:38.042513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:33:38.042515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:33:38.042517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:33:38.04252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:33:38.042522-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:33:38.042524-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:33:38.042526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.042528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.04253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:26Z\"\n"} +{"Time":"2023-05-31T12:33:38.042532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:33:38.042534-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.042536-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"194\"\n"} +{"Time":"2023-05-31T12:33:38.042769-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 3dbba28a-59fa-4715-a695-28c068ea7915\n"} +{"Time":"2023-05-31T12:33:38.042771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:33:38.042773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T12:33:38.042775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:33:38.042777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:33:38.042779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authentication:\n"} +{"Time":"2023-05-31T12:33:38.042781-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:33:38.042783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:33:38.042785-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" webhook:\n"} +{"Time":"2023-05-31T12:33:38.042787-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:33:38.042789-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:33:38.042791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" x509:\n"} +{"Time":"2023-05-31T12:33:38.042793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:33:38.042795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authorization:\n"} +{"Time":"2023-05-31T12:33:38.042797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:33:38.042799-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" webhook:\n"} +{"Time":"2023-05-31T12:33:38.042801-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:33:38.042804-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:33:38.042806-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:33:38.042807-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:33:38.04281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:33:38.042812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:33:38.042814-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:33:38.042816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.042818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:33:38.04282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:33:38.042822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:33:38.043022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:33:38.043032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.04304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:33:38.043045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:33:38.043048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:33:38.04306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:33:38.043065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:33:38.043067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:33:38.043069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:33:38.043071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:33:38.043073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:33:38.043075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" logging:\n"} +{"Time":"2023-05-31T12:33:38.043077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:33:38.043079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" options:\n"} +{"Time":"2023-05-31T12:33:38.043082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" json:\n"} +{"Time":"2023-05-31T12:33:38.043084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:33:38.043086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:33:38.043088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:33:38.04309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:33:38.043092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:33:38.043094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:33:38.043096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:33:38.043098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.0431-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:33:38.043102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:33:38.043281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:33:38.043283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:33:38.043285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:33:38.043287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:33:38.043289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.043291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:32:26Z\"\n"} +{"Time":"2023-05-31T12:33:38.043293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:33:38.043295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:33:38.043297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"200\"\n"} +{"Time":"2023-05-31T12:33:38.043299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: aadbc05f-62ef-4b37-8340-7c31f7417ef6\n"} +{"Time":"2023-05-31T12:33:38.043301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: List\n"} +{"Time":"2023-05-31T12:33:38.043303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:33:38.043305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:33:38.043307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.043309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.043311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:33:38.043314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:33:38.043316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: loaded (\u001b]8;;file://kindnet-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:33:38.043318-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:32:17 UTC; 1min 13s ago\r\n"} +{"Time":"2023-05-31T12:33:38.043321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:33:38.043323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:33:38.043326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Main PID: 1043 (dockerd)\r\n"} +{"Time":"2023-05-31T12:33:38.043328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tasks: 17\r\n"} +{"Time":"2023-05-31T12:33:38.04333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Memory: 223.5M\r\n"} +{"Time":"2023-05-31T12:33:38.043525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CPU: 10.347s\r\n"} +{"Time":"2023-05-31T12:33:38.04353-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:33:38.043533-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─1043 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:33:38.043535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.043538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:17 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:17.441697032Z\" level=info msg=\"Loading containers: start.\"\r\n"} +{"Time":"2023-05-31T12:33:38.04354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:17 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:17.529945658Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\r\n"} +{"Time":"2023-05-31T12:33:38.043543-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:17 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:17.567627891Z\" level=info msg=\"Loading containers: done.\"\r\n"} +{"Time":"2023-05-31T12:33:38.043546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:17 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:17.576401390Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\r\n"} +{"Time":"2023-05-31T12:33:38.043549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:17 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:17.576466394Z\" level=info msg=\"Daemon has completed initialization\"\r\n"} +{"Time":"2023-05-31T12:33:38.043551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:17 kindnet-996000 systemd[1]: Started Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T12:33:38.043554-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:17 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:17.603696649Z\" level=info msg=\"API listen on /var/run/docker.sock\"\r\n"} +{"Time":"2023-05-31T12:33:38.043556-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:17 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:17.603755036Z\" level=info msg=\"API listen on [::]:2376\"\r\n"} +{"Time":"2023-05-31T12:33:38.043558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:56 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:56.587767472Z\" level=info msg=\"ignoring event\" container=068c3c423f7286fcec1bec4d50e76a1413b1b8e75140dd34ef86ce2c2c1ab697 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:33:38.043567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:56 kindnet-996000 dockerd[1043]: time=\"2023-05-31T19:32:56.643968679Z\" level=info msg=\"ignoring event\" container=ab4160ec5f0223ee38f7162ac1ec6bf971301fc0cf7e558e8603079d4c4de016 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:33:38.043569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.043571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.043714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:33:38.043718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.043721-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:33:38.043723-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:33:38.043726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:33:38.043728-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:33:38.043731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:33:38.043734-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:33:38.043737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:33:38.04374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:33:38.043743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:33:38.043745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.043747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.04375-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:33:38.043752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:33:38.043754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.043756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.043758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04376-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:33:38.043762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:33:38.043764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:33:38.043766-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:33:38.043768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:33:38.043771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:33:38.043998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:33:38.044002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.044005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:33:38.044007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:33:38.044009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:33:38.044011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:33:38.044014-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:33:38.044016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.044018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:33:38.04402-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:33:38.044022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.044024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.044026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.044028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:33:38.044032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:33:38.044034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.044036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:33:38.044039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.044041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:33:38.044043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:33:38.044045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.044047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:33:38.044272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:33:38.044292-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.044295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:33:38.044297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:33:38.0443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.044302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.044304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:33:38.044307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T12:33:38.044309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:33:38.044311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:33:38.044314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:33:38.044316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:33:38.044318-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" },\r\n"} +{"Time":"2023-05-31T12:33:38.04432-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:33:38.044322-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T12:33:38.044324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.044326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.044328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:33:38.04433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:33:38.044332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:33:38.044334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:33:38.044336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:33:38.044338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:33:38.04434-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:33:38.044342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:33:38.044344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:33:38.044346-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.044348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:33:38.044563-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers: 20\r\n"} +{"Time":"2023-05-31T12:33:38.044566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Running: 18\r\n"} +{"Time":"2023-05-31T12:33:38.044568-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:33:38.04457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Stopped: 2\r\n"} +{"Time":"2023-05-31T12:33:38.044572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Images: 10\r\n"} +{"Time":"2023-05-31T12:33:38.044574-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:33:38.044576-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:33:38.044578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:33:38.044581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:33:38.044583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:33:38.044585-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:33:38.044587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:33:38.044589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:33:38.044591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:33:38.044593-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:33:38.044595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:33:38.044597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:33:38.044599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:33:38.044601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:33:38.044604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:33:38.044606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Runtimes: io.containerd.runc.v2 runc\r\n"} +{"Time":"2023-05-31T12:33:38.044608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:33:38.04461-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:33:38.044612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:33:38.044614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:33:38.044616-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:33:38.044815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:33:38.044818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:33:38.04482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:33:38.044822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:33:38.044824-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:33:38.044826-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:33:38.044828-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:33:38.04483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:33:38.044832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:33:38.044834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:33:38.044836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kindnet-996000\r\n"} +{"Time":"2023-05-31T12:33:38.044838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ID: 8a328e1c-2758-4950-bb26-2c3bdadb49ad\r\n"} +{"Time":"2023-05-31T12:33:38.04484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:33:38.044842-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:33:38.044844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:33:38.044846-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:33:38.044848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:33:38.04485-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:33:38.044853-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:33:38.044855-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:33:38.044856-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:33:38.044858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:33:38.04486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.044863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.044864-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.044866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:33:38.045057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:33:38.045062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: loaded (\u001b]8;;file://kindnet-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:33:38.045065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:33:38.045068-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─\u001b]8;;file://kindnet-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:33:38.045071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:32:18 UTC; 1min 15s ago\r\n"} +{"Time":"2023-05-31T12:33:38.045073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:33:38.045075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:33:38.045078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Main PID: 1264 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:33:38.04508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tasks: 11\r\n"} +{"Time":"2023-05-31T12:33:38.045082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Memory: 17.0M\r\n"} +{"Time":"2023-05-31T12:33:38.045084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CPU: 1.745s\r\n"} +{"Time":"2023-05-31T12:33:38.045086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:33:38.045088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─1264 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:33:38.04509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:41 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:32:41Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/9311e8298f955aac5802b585758b8b6141eeae37ea60902729a092de3477e9b6/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:33:38.045095-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:32:42Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/013936ad3fae32755fbd80f137cf5fa319a1217def96c7f4324b9a3ce6c4a1fa/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:33:38.045098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:32:42Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/ab4160ec5f0223ee38f7162ac1ec6bf971301fc0cf7e558e8603079d4c4de016/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:33:38.045303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:32:42Z\" level=info msg=\"Failed to read pod IP from plugin/docker: networkPlugin cni failed on the status hook for pod \\\"coredns-5d78c9869d-45977_kube-system\\\": unexpected command output Device \\\"eth0\\\" does not exist.\\n with error: exit status 1\"\r\n"} +{"Time":"2023-05-31T12:33:38.045309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:42 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:32:42Z\" level=info msg=\"Failed to read pod IP from plugin/docker: networkPlugin cni failed on the status hook for pod \\\"coredns-5d78c9869d-45977_kube-system\\\": unexpected command output Device \\\"eth0\\\" does not exist.\\n with error: exit status 1\"\r\n"} +{"Time":"2023-05-31T12:33:38.045312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:44 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:32:44Z\" level=info msg=\"Stop pulling image docker.io/kindest/kindnetd:v20230511-dc714da8: Status: Downloaded newer image for kindest/kindnetd:v20230511-dc714da8\"\r\n"} +{"Time":"2023-05-31T12:33:38.045314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:48 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:32:48Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/24,},}\"\r\n"} +{"Time":"2023-05-31T12:33:38.045317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:56 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:32:56Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/dd641eca2b321baac5e7370f06e02613226bfab7eb43bc3f82311b710379ea9b/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:33:38.04532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:33:05Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/dfb79f2a09421f679bf27b4b739499d067de80acecc055cdeb32642da54057c8/resolv.conf as [nameserver 10.96.0.10 search default.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\r\n"} +{"Time":"2023-05-31T12:33:38.045323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:10 kindnet-996000 cri-dockerd[1264]: time=\"2023-05-31T19:33:10Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:33:38.045325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.045327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.045329-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:33:38.045332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.045334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:33:38.045336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:33:38.045529-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:33:38.045544-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:33:38.045547-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:33:38.045549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:33:38.045551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045553-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.045555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:33:38.045557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:33:38.04556-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:33:38.045561-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:33:38.045563-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:33:38.045565-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:33:38.045567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:33:38.045572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:33:38.045574-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:33:38.045576-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:33:38.045578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:33:38.045582-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:33:38.045584-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:33:38.045586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:33:38.045589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:33:38.045738-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:33:38.045742-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.045745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.045747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.04575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:33:38.045754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:33:38.045756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.045759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:33:38.045761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:33:38.045763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045765-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:33:38.045767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:33:38.045769-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.045773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.045775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:33:38.045777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:33:38.04578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.045782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.045784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:33:38.045786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.045788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:33:38.04579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:33:38.045792-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.045953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:33:38.045955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:33:38.045958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:33:38.04596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:33:38.045962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:33:38.045964-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:33:38.045966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:33:38.045968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.045972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:33:38.045974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:33:38.045976-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:33:38.045978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:33:38.04598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:33:38.045982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:33:38.045984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045986-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:33:38.045989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:33:38.045992-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:33:38.045994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:33:38.045996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.045998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:33:38.046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:33:38.046002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:33:38.046149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:33:38.046151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.046153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:33:38.046155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:33:38.046157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.046159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.046161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.046163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.046165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:33:38.046167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:33:38.046169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.046171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:33:38.046173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:33:38.046175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.046177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:33:38.046179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:33:38.046181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.046182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.046184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:33:38.046187-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:33:38.046189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.046191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.046193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:33:38.046195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:33:38.046197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: loaded (\u001b]8;;file://kindnet-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:33:38.04636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:32:16 UTC; 1min 17s ago\r\n"} +{"Time":"2023-05-31T12:33:38.046364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:33:38.046367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Main PID: 825 (containerd)\r\n"} +{"Time":"2023-05-31T12:33:38.046369-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tasks: 202\r\n"} +{"Time":"2023-05-31T12:33:38.046371-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Memory: 75.3M\r\n"} +{"Time":"2023-05-31T12:33:38.046373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CPU: 2.906s\r\n"} +{"Time":"2023-05-31T12:33:38.046375-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:33:38.046378-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─ 825 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:33:38.04638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─1892 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 7e013d09b584b4365c69df8aa381f3d23e622419497b73ab9ed9246b5dd57c1b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046384-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─1908 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 6a17a76a6e04daec250ed8dc2fd6a44e8b64409b93aff36f7501db2589952552 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─1945 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 09fc4dc773b0f5da0f457729b47c1a7413f1f7cb09eda1169803383598f12acf -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─1950 /usr/bin/containerd-shim-runc-v2 -namespace moby -id d829708357f1be5f10702ebe8234d1982ceb7192446701f3eb2a05847e3403e8 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046391-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─2088 /usr/bin/containerd-shim-runc-v2 -namespace moby -id cf04f2429c5ba8479d592416e2ef4a3a06df24064108eaeb1d05516ef7ac8487 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046399-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─2113 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 925dbab831550e44a45e5f5e6b2bc4e6100cff5de8411e90affb01b8fb32217b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046401-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─2114 /usr/bin/containerd-shim-runc-v2 -namespace moby -id ae3be1cc5480a2f8ba97a3cca0b0c42e7a8dbce7b19ad075cd8c272332fbe383 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046404-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─2144 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 62fdafd2357a6796a08d2a94f59d05bea498c1993ac5b8eda59ac850227999c6 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046406-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─2877 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 9311e8298f955aac5802b585758b8b6141eeae37ea60902729a092de3477e9b6 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─2901 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 126cbc32c4acbc66a8b2dd2eb8c1af0538f808f4c6a2296d5107ed4083482dfe -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─2969 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 82c1a8ca96f48659115fcdb85d2b1b4cdc03f34ef2d7d436559d006da8911a05 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─3137 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 013936ad3fae32755fbd80f137cf5fa319a1217def96c7f4324b9a3ce6c4a1fa -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─3176 /usr/bin/containerd-shim-runc-v2 -namespace moby -id a9bbdc66efdbe66e5e67a4d2260a842bd650bb0a3b4fb4d8c7d0ff97daa72ccd -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─3369 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5db638a8b7edb8ca68469ea8181a6f4ee16db5bbfef2541b3c70c115f4a7b245 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─3627 /usr/bin/containerd-shim-runc-v2 -namespace moby -id dd641eca2b321baac5e7370f06e02613226bfab7eb43bc3f82311b710379ea9b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046582-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─3700 /usr/bin/containerd-shim-runc-v2 -namespace moby -id c821f7ff7ef1b53e80715a0d74a56668e250591601fd9d974dc5f10a6949f996 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046585-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─3882 /usr/bin/containerd-shim-runc-v2 -namespace moby -id dfb79f2a09421f679bf27b4b739499d067de80acecc055cdeb32642da54057c8 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─4019 /usr/bin/containerd-shim-runc-v2 -namespace moby -id e67213fbbf94ea22e000092cc021b75bca2bcac6e72e6a89400466a92f4d8101 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:33:38.046589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.046591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:56 kindnet-996000 containerd[825]: time=\"2023-05-31T19:32:56.890161398Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:33:38.046594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:32:56 kindnet-996000 containerd[825]: time=\"2023-05-31T19:32:56.890497712Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/c821f7ff7ef1b53e80715a0d74a56668e250591601fd9d974dc5f10a6949f996 pid=3700 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:33:38.046597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 containerd[825]: time=\"2023-05-31T19:33:05.709010130Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:33:38.046803-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 containerd[825]: time=\"2023-05-31T19:33:05.709086016Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:33:38.046814-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 containerd[825]: time=\"2023-05-31T19:33:05.709096042Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:33:38.046818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:05 kindnet-996000 containerd[825]: time=\"2023-05-31T19:33:05.709302269Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/dfb79f2a09421f679bf27b4b739499d067de80acecc055cdeb32642da54057c8 pid=3882 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:33:38.046821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:11 kindnet-996000 containerd[825]: time=\"2023-05-31T19:33:11.055091709Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:33:38.046825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:11 kindnet-996000 containerd[825]: time=\"2023-05-31T19:33:11.055169301Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:33:38.046828-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:11 kindnet-996000 containerd[825]: time=\"2023-05-31T19:33:11.055179971Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:33:38.046831-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:33:11 kindnet-996000 containerd[825]: time=\"2023-05-31T19:33:11.055852336Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/e67213fbbf94ea22e000092cc021b75bca2bcac6e72e6a89400466a92f4d8101 pid=4019 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:33:38.046838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.04684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.046842-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:33:38.046845-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.046848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:33:38.04685-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.046852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:33:38.046855-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:33:38.047005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:33:38.047012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.047015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:33:38.047018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.04702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:33:38.047024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:33:38.047026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:33:38.047028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:33:38.047031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:33:38.047033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:33:38.047038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:33:38.04704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:33:38.047043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:33:38.047045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.047049-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:33:38.047052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:33:38.047053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:33:38.047058-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:33:38.047061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:33:38.047063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:33:38.047065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:33:38.047067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:33:38.047217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:33:38.047223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.047228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.047239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.047245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:33:38.047248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:33:38.04725-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.047252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:33:38.047255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:33:38.04726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:33:38.047262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.047268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.047272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:33:38.047288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:33:38.04729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.047293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:33:38.047295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:33:38.047298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:33:38.0473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.047302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:33:38.047304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.047306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:33:38.047308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:33:38.047311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:33:38.04738-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:33:38.047387-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:33:38.047389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047391-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:33:38.047394-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:33:38.047397-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:33:38.047399-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:33:38.047401-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047405-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.047408-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:33:38.047412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:33:38.047416-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047421-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:33:38.047424-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:33:38.047428-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:33:38.047432-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:33:38.047436-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:33:38.047439-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:33:38.047442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:33:38.047446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.04745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.047453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.047456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:33:38.04746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:33:38.047562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.047569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:33:38.047572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:33:38.04758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:33:38.047582-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.047584-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.047586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:33:38.047589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:33:38.047591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:33:38.047594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:33:38.047596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:33:38.047599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:33:38.047601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047605-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:33:38.047609-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:33:38.047613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.047616-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.04762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:33:38.047624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:33:38.047627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:33:38.047634-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.047638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.047641-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.047643-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.047645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047648-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:33:38.047749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.047755-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:33:38.047757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:33:38.047762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.047765-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:33:38.047769-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:33:38.047772-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:33:38.047774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:33:38.047777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.047779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:33:38.047781-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:33:38.047783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:33:38.047786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:33:38.047788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:33:38.047791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:33:38.047793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:33:38.047795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.047797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:33:38.047799-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:33:38.047802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:33:38.047804-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.047807-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:33:38.047809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.047812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:33:38.048054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:33:38.048067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:33:38.048075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:33:38.048079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:33:38.048085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:33:38.048092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:33:38.048094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:33:38.048096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:33:38.048101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:33:38.048103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:33:38.048109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:33:38.048112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:33:38.048115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:33:38.048119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:33:38.048123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:33:38.048126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:33:38.04813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:33:38.048133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.048136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.048139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:33:38.048277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:33:38.048297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:33:38.048307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:33:38.048312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048315-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:33:38.048317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:33:38.048319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:33:38.048322-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:33:38.048326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:33:38.048331-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:33:38.048339-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.048348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.04835-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.048353-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:33:38.048358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:33:38.048369-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.048383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:33:38.048387-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:33:38.048389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048391-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.048583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:33:38.048588-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.04859-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:33:38.048595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:33:38.048599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:33:38.048606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:33:38.048609-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:33:38.048611-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:33:38.048614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:33:38.048616-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:33:38.048619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048621-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:33:38.048623-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:33:38.048626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:33:38.048628-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:33:38.04863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:33:38.048632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:33:38.048635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:33:38.048637-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:33:38.048639-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:33:38.048642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:33:38.048863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:33:38.04887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:33:38.048874-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:33:38.048877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:33:38.048881-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:33:38.048885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:33:38.048888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:33:38.048893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:33:38.048897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:33:38.0489-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:33:38.048903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:33:38.048912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:33:38.048916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:33:38.04892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:33:38.048933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:33:38.048936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:33:38.048942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.048949-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:33:38.048954-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.048957-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:33:38.048961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.048998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:33:38.049005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:33:38.049009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:33:38.049013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:33:38.049017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:33:38.049021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:33:38.049028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:33:38.04904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:33:38.049044-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:33:38.049048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:33:38.049052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049059-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:33:38.049074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:33:38.049104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:33:38.049213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.04922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:33:38.049229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:33:38.049232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:33:38.049245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:33:38.049249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:33:38.049258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:33:38.049264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:33:38.049268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:33:38.049275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.04928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:33:38.049282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:33:38.049286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:33:38.04929-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:33:38.049294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.0493-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049429-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049432-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:33:38.049434-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049436-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:33:38.049441-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:33:38.049443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049445-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:33:38.049448-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:33:38.04945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:33:38.049455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:33:38.049459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:33:38.049464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:33:38.049469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:33:38.049473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049475-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049481-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049485-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:33:38.049487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:33:38.049644-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049646-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049649-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:33:38.049652-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:33:38.049654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049656-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049658-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:33:38.04966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049662-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049665-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:33:38.049668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049674-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:33:38.049678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.049682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:33:38.04969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:33:38.049693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:33:38.049723-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:33:38.04973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:33:38.04995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.04996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.04997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049976-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:33:38.049979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:33:38.049982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:33:38.049987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.049995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.049998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:33:38.05-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.050002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.050009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:33:38.050011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.050158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.050167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:33:38.050169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.050171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:33:38.050176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:33:38.05018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050187-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:33:38.050193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:33:38.050195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:33:38.0502-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050205-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:33:38.050207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:33:38.05021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:33:38.050273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:33:38.050284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:33:38.050288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:33:38.050292-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:33:38.050296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:33:38.0503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:33:38.050303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:33:38.050308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.05031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.050312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:33:38.050314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.050316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.050319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:33:38.050321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:33:38.050325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: loaded (\u001b]8;;file://kindnet-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:33:38.050327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:33:38.05033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:33:38.050334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:33:38.050337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.05034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.050343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:33:38.050347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:33:38.050408-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:33:38.050414-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:33:38.050416-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:33:38.050418-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:33:38.05042-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:33:38.050424-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:33:38.050426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050428-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:33:38.05043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:33:38.050433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:33:38.050435-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:33:38.050437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:33:38.050439-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:33:38.050442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:33:38.050454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:33:38.050457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:33:38.05046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:33:38.050462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:33:38.050464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.050466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:33:38.050469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:33:38.050471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:33:38.050476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:33:38.050478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:33:38.05048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:33:38.050483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050485-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:33:38.050589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:33:38.050595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:33:38.050597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.0506-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.050602-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:33:38.050605-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:33:38.050608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:33:38.050612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.050615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:33:38.050618-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.05062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:33:38.050623-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:33:38.050626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.050628-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:33:38.050632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.050646-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050648-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:33:38.05065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.050653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:33:38.050655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:33:38.050658-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:33:38.05066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:33:38.050662-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.050679-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:33:38.050823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050829-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:33:38.050832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:33:38.050842-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:33:38.050854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:33:38.050858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050861-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:33:38.050878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:33:38.050881-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:33:38.050884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:33:38.050888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:33:38.050892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:33:38.0509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:33:38.050904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:33:38.050908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:33:38.050915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:33:38.050918-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.050921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:33:38.050925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:33:38.050928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:33:38.050931-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:33:38.051049-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:33:38.051053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:33:38.051057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.051069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:33:38.051079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:33:38.051082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:33:38.051084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:33:38.051089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:33:38.051092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:33:38.051094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:33:38.051098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:33:38.051105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:33:38.051108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:33:38.051112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:33:38.051114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:33:38.051119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:33:38.051122-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:33:38.051125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:33:38.051265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:33:38.05127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:33:38.051272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:33:38.051277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051279-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:33:38.051283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:33:38.051285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:33:38.051293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:33:38.051297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:33:38.051304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:33:38.051307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:33:38.051314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:33:38.051316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:33:38.051318-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:33:38.051323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:33:38.051325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:33:38.05133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.051333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:33:38.051482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:33:38.051488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:33:38.051491-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.051494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051496-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:33:38.0515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:33:38.051502-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.051504-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051506-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:33:38.051508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:33:38.051511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:33:38.051524-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.051527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051529-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:33:38.051532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:33:38.051535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051537-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:33:38.051539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:33:38.051541-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:33:38.051549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:33:38.051552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:33:38.051556-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:33:38.051693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:33:38.051697-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:33:38.051699-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:33:38.051702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:33:38.051704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.051706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:33:38.051719-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:33:38.051727-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:33:38.051735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.051739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:33:38.051743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:33:38.05175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:33:38.051755-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:33:38.05176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.051763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051766-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:33:38.051769-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:33:38.051771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.051774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:33:38.051778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:33:38.051917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:33:38.051923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:33:38.051937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.051942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:33:38.051948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:33:38.05195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:33:38.051952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:33:38.051956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.051958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:33:38.051965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:33:38.051968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:33:38.051975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:33:38.051979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.051982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.051986-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.051989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:33:38.051993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:33:38.051996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:33:38.052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:33:38.052003-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:33:38.052006-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:33:38.052149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:33:38.052152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:33:38.052154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:33:38.052157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.052159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:33:38.052162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:33:38.052167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:33:38.052169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.052171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:33:38.052176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:33:38.052178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:33:38.052183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:33:38.052189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.052193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.052195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:33:38.052202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:33:38.052204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052206-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:33:38.052211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.052351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:33:38.05236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:33:38.052363-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:33:38.052367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:33:38.052369-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:33:38.052372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:33:38.052374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:33:38.052376-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:33:38.052378-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:33:38.05238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:33:38.052382-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:33:38.052384-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:33:38.052386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:33:38.052389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.05239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052393-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:33:38.052396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:33:38.052398-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:33:38.0524-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:33:38.052406-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:33:38.052408-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:33:38.05241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.052412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052415-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:33:38.052562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:33:38.052571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:33:38.052575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:33:38.05258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.052583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:33:38.052589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:33:38.052591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:33:38.052594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:33:38.052596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:33:38.052599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.052602-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:33:38.052609-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:33:38.052613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:33:38.052617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:33:38.052621-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.052625-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052628-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:33:38.052633-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:33:38.052636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:33:38.052639-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:33:38.052648-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:33:38.05277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:33:38.052773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:33:38.052776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:33:38.05278-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.052783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:33:38.052788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:33:38.052791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:33:38.052793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.052798-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:33:38.052802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:33:38.052805-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:33:38.052809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.052812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:33:38.05282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:33:38.052824-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:33:38.052827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:33:38.052831-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.052833-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.052835-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:33:38.052841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:33:38.052843-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:33:38.052845-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:33:38.052981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:33:38.052983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:33:38.052988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:33:38.05299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:33:38.052993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.052995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:33:38.052998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:33:38.053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:33:38.053005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:33:38.053007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:33:38.053011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:33:38.053013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:33:38.053017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.05302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:33:38.053024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:33:38.053026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:33:38.053031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:33:38.053191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.053194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:33:38.053196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:33:38.053201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.053203-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.053205-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:33:38.05321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:33:38.053212-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:33:38.053214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.053216-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:33:38.053221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:33:38.053224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:33:38.053227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.053229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:33:38.053233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:33:38.053235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:33:38.053237-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:33:38.053239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053242-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:33:38.053244-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:33:38.053458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:33:38.053464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:33:38.053467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:33:38.053472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:33:38.053474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:33:38.053477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:33:38.053479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053481-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:33:38.053483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:33:38.053486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:33:38.053488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:33:38.05349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:33:38.053493-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:33:38.053498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:33:38.0535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:33:38.053503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.053505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:33:38.05351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:33:38.053513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:33:38.053515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05369-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:33:38.053697-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.053701-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.053704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:33:38.053709-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:33:38.053712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:33:38.053715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.053717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:33:38.053722-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:33:38.053726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:33:38.05373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:33:38.053736-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:33:38.053739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:33:38.053741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:33:38.053743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.053746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05375-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:33:38.053754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:33:38.053757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:33:38.053761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:33:38.053764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.053948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:33:38.053956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:33:38.053958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:33:38.053961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:33:38.053964-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:33:38.053966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:33:38.053968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:33:38.053973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:33:38.053976-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:33:38.053978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:33:38.053981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:33:38.053983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:33:38.053985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:33:38.053989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:33:38.053991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:33:38.053993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:33:38.053996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:33:38.053998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:33:38.054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:33:38.054002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:33:38.054005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:33:38.054007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:33:38.05421-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:33:38.054215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:33:38.054219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:33:38.054222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:33:38.054225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:33:38.054228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:33:38.05423-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:33:38.054233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:33:38.054235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:33:38.054238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:33:38.05424-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.054242-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.054244-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:33:38.054246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.054249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:33:38.054251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.054253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.054255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.054257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \r\n"} +{"Time":"2023-05-31T12:33:38.054261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:33:38.054263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:33:38.054266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.054268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \r\n"} +{"Time":"2023-05-31T12:33:38.054641-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.054646-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \r\n"} +{"Time":"2023-05-31T12:33:38.054648-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:33:38.054666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:33:38.054668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.054672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \r\n"} +{"Time":"2023-05-31T12:33:38.054694-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:33:38.054699-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.054702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \r\n"} +{"Time":"2023-05-31T12:33:38.054706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.054709-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:33:38.054714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:33:38.054718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:33:38.054721-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.054724-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:33:38.054727-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:33:38.054729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:33:38.054731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.054734-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:33:38.054737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:33:38.054741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.054744-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:33:38.054748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:33:38.054751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.054756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:33:38.055099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:33:38.055124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:33:38.055131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:33:38.055134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:33:38.055136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:33:38.055139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:33:38.055142-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:33:38.055144-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:33:38.055146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:33:38.055149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:33:38.055152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:33:38.055155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:33:38.055157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:33:38.055159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:33:38.055162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:33:38.055164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:33:38.055168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:33:38.05517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:33:38.055172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:33:38.055174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:33:38.055176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:33:38.055376-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:33:38.055404-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:33:38.055408-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:33:38.055412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:33:38.055416-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \r\n"} +{"Time":"2023-05-31T12:33:38.05543-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055434-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:33:38.055437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.055442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:33:38.055445-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:33:38.055448-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:33:38.05545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:33:38.055452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:33:38.055455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:33:38.055458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:33:38.055462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:33:38.055465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:33:38.055469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:33:38.055472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.055474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:33:38.05564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.055643-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:33:38.055647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05565-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:33:38.055652-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:33:38.055655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.055657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.055659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:33:38.055664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:33:38.055666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:33:38.055668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.055671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:33:38.055673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:33:38.055677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:33:38.05568-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:33:38.055682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:33:38.055685-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:33:38.055687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.055689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:33:38.055917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:33:38.055919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:33:38.055922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:33:38.055925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.055927-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05593-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:33:38.055932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:33:38.055934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:33:38.055937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:33:38.055942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.055944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:33:38.055948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:33:38.05595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:33:38.055953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:33:38.055958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:33:38.05596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.055963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:33:38.055967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:33:38.055969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.055972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:33:38.056209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:33:38.056215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:33:38.056218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.056221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:33:38.056225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:33:38.056227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05623-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:33:38.056232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:33:38.056234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:33:38.056239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:33:38.056241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:33:38.056244-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:33:38.056246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:33:38.056249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:33:38.056251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:33:38.056253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:33:38.056258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:33:38.05626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:33:38.056262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:33:38.056264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:33:38.056267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:33:38.056269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:33:38.05644-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:33:38.056446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:33:38.056448-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:33:38.056454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:33:38.056456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:33:38.056463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.05647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056481-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.056491-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.056495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:33:38.056498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:33:38.056501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056504-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:33:38.056509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.056512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:33:38.056516-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:33:38.056519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:33:38.056634-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:33:38.056637-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.056639-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:33:38.056646-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:33:38.056649-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.056654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:33:38.056662-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:33:38.056666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:33:38.05667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:33:38.056673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056676-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:33:38.056679-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:33:38.056683-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:33:38.05669-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:33:38.056693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:33:38.0567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:33:38.056705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:33:38.056712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:33:38.056714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:33:38.056857-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056861-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.056863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.056866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:33:38.056868-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:33:37.981437922Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:33:38.056871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:33:38.056874-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:33:38.056876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:33:38.05688-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:33:38.056882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.056884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:33:38.056887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:33:38.056891-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:33:38.056893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:33:38.056896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:33:38.056899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.056902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:33:38.056908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:33:38.056912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:33:38.056916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:33:38.05692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:33:38.057062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:33:38.05707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:33:38.057072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:33:38.057074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:33:38.057079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:33:38.057089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:33:38.057098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:33:38.057101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.057104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:33:38.057109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:33:38.057111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:33:38.057113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.057117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:33:38.057123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:33:38.057126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:33:38.057128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05713-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:33:38.057134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:33:38.057136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:33:38.057263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:33:38.057266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:33:38.05727-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:33:38.057273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:33:38.057277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:33:38.057279-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:33:38.057284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:33:38.057286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:33:38.057288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:33:38.057293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:33:38.057295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:33:38.057297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:33:38.0573-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:33:38.057304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:33:38.057306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:33:38.05731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:33:38.057312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:33:38.057317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:33:38.057457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:33:38.057462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:33:38.057464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:33:38.057467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:33:38.057472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:33:38.057474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:33:38.057478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.05748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:33:38.057484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:33:38.057488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:33:38.05749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.057492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:33:38.057496-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:33:38.057499-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.057501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:33:38.057505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:33:38.057508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:33:38.05751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.057655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:33:38.057662-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:33:38.057664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:33:38.057669-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:33:38.057671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:33:38.057676-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:33:38.057678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:33:38.05768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:33:38.057684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:33:38.057687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:33:38.057689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:33:38.057691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:33:38.057693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.057696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:33:38.0577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:33:38.057703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:33:38.057707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.057846-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:33:38.057852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:33:38.057857-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:33:38.05786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:33:38.057863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.057865-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057867-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:33:38.057871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:33:38.057873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.057875-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:33:38.057881-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:33:38.057884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:33:38.057886-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:33:38.057888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.05789-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.057893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:33:38.057898-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:33:38.0579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:33:38.057903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:33:38.057905-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.057908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:33:38.058041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:33:38.058061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:33:38.058066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:33:38.058069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.058071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.058073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:33:38.058078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:33:38.05808-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:33:38.058083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:33:38.058085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:33:38.058087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:33:38.058092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:33:38.058094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:33:38.058096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:33:38.058099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.058101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:33:38.058103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:33:38.058108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:33:38.05811-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.058112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:33:38.058254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:33:38.058256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:33:38.058259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:33:38.058264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.058267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.058269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:33:38.058274-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:33:38.058277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05828-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:33:38.058282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.058284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:33:38.058288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:33:38.058291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:33:38.058293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:33:38.058295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:33:38.058298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:33:38.0583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:33:38.058303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:33:38.058305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:33:38.058307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:33:38.058309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:33:38.058312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:33:38.058437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:33:38.05844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.058442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058445-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:33:38.058449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:33:38.058453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:33:38.058456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:33:38.058462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:33:38.058464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:33:38.058466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.058468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05847-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:33:38.058473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:33:38.058475-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:33:38.058477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:33:38.05848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.058482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:33:38.058487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:33:38.05849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:33:38.058492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:33:38.058494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:33:38.058496-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.058666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058674-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:33:38.058677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:33:38.058679-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:33:38.058683-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:33:38.058686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.05869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:33:38.058695-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:33:38.058699-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:33:38.058702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:33:38.058706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:33:38.058711-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:33:38.058713-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:33:38.058715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:33:38.058718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.05872-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058722-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:33:38.058724-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:33:38.058726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:33:38.058737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.058748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:33:38.058752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:33:38.058847-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:33:38.058852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.058854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:33:38.058857-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:33:38.058859-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:33:38.058861-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:33:38.058863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.058865-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.058867-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:33:38.058871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:33:38.058874-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:33:38.058876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:33:38.05888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:33:38.058882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:33:38.058885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:33:38.058887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:33:38.058889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.058902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:33:38.058907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:33:38.058911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:33:38.059324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:33:38.05933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:33:38.059353-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:33:38.059356-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:33:38.05936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.059363-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059365-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:33:38.059368-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:33:38.05937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:33:38.059374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:33:38.059377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.059381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:33:38.059383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:33:38.059388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.05939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.059392-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059394-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:33:38.059397-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:33:38.059399-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:33:38.059566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.059586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:33:38.059594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:33:38.059596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:33:38.059598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.0596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059602-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:33:38.059609-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:33:38.059612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:33:38.059614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:33:38.059617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:33:38.059622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:33:38.059624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:33:38.059627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:33:38.059629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:33:38.059633-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:33:38.059635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:33:38.059638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:33:38.05964-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:33:38.05981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:33:38.059817-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:33:38.059821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:33:38.059824-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:33:38.059828-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059833-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:33:38.059836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:33:38.05984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:33:38.059844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.059847-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:33:38.059852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:33:38.059855-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:33:38.059857-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05986-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:33:38.059863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.059866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.05987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:33:38.059874-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:33:38.059878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:33:38.059882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.059886-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.059891-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:33:38.059894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:33:38.060086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:33:38.060093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:33:38.060097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:33:38.060101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:33:38.060105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:33:38.060108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.060111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:33:38.06012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:33:38.060124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:33:38.060128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:33:38.060132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.060136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:33:38.060139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:33:38.060143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:33:38.060146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:33:38.06015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:33:38.060153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:33:38.060156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:33:38.06016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:33:38.060163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:33:38.060166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:33:38.06038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:33:38.060387-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:33:38.060389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:33:38.060393-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:33:38.060395-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:33:38.060398-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:33:38.060403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:33:38.060407-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:33:38.060411-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:33:38.060415-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:33:38.060419-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:33:38.060422-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:33:38.060426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:33:38.060429-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:33:38.060434-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:33:38.060438-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:33:38.060442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:33:38.060446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:33:38.060449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:33:38.060451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:33:38.060613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:33:38.060621-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:33:38.060624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060628-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:33:38.060631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.060635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:33:38.060638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:33:38.060641-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.060645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060649-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.06066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.06067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.060677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:33:38.060693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:33:38.060695-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:33:38.060697-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.0607-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:33:38.060702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:33:38.060704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:33:38.060707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:33:38.060923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:33:38.060927-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.06093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:33:38.060934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:33:38.060938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060941-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:33:38.060945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:33:38.060948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.060952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:33:38.060956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:33:38.060959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:33:38.060964-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:33:38.060966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:33:38.060969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:33:38.060972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:33:38.060974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:33:38.060977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:33:38.06098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:33:38.060984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:33:38.060987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:33:38.060992-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:33:38.061184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:33:38.06119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:33:38.061193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:33:38.061195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:33:38.061198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:33:38.061202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:33:38.061204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:33:38.061206-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:33:38.061209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:33:38.061211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:33:38.061214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:33:38.061216-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \r\n"} +{"Time":"2023-05-31T12:33:38.061218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:33:38.061223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T12:33:38.061225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:33:38.061227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:33:38.06123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:33:38.061232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:33:38.061247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:33:38.061268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:33:38.061271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:33:38.061397-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:33:38.061408-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061414-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:33:38.061418-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:33:38.06143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.061436-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.06144-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:33:38.061443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.061447-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:33:38.061451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:33:38.061459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:33:38.061463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.061467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.061471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:33:38.061478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:33:38.06148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:33:38.061483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:33:38.061486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:33:38.061488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.06149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:33:38.061598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:33:38.061614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:33:38.061622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:33:38.061625-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:33:38.061628-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.06163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:33:38.061635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:33:38.061638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:33:38.06164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:33:38.061642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.061645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:33:38.061649-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:33:38.061652-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:33:38.061654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:33:38.061659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.061662-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:33:38.061671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:33:38.061673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:33:38.061676-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:33:38.061805-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:33:38.061814-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.061819-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:33:38.061837-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:33:38.061847-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:33:38.061856-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:33:38.061879-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:33:38.061887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.06189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:33:38.061894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:33:38.061896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:33:38.061902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:33:38.061904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.061907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:33:38.061909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:33:38.061913-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:33:38.061915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:33:38.061919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:33:38.061921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:33:38.061923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:33:38.061925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:33:38.06204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:33:38.062044-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:33:38.062048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:33:38.062051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:33:38.062055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:33:38.062073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:33:38.062083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:33:38.062086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:33:38.062088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:33:38.062094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:33:38.062096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.0621-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:33:38.062103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:33:38.062123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:33:38.062126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:33:38.062128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:33:38.062214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:33:38.062225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.062229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:33:38.062255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:33:38.062264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:33:38.062267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:33:38.062269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.062272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:33:38.062277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:33:38.062279-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:33:38.062281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:33:38.062288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:33:38.06229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:33:38.062295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:33:38.062297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.0623-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:33:38.062302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:33:38.062304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:33:38.062309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:33:38.062454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:33:38.062468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:33:38.062472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:33:38.062479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:33:38.062499-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:33:38.062505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T12:33:38.062509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:33:38.062513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ----------------------- debugLogs end: kindnet-996000 [took: 19.273467697s] --------------------------------\n"} +{"Time":"2023-05-31T12:33:38.062517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:175: Cleaning up \"kindnet-996000\" profile ...\n"} +{"Time":"2023-05-31T12:33:38.062521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p kindnet-996000\n"} +{"Time":"2023-05-31T12:33:40.603827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p kindnet-996000: (2.557203985s)\n"} +{"Time":"2023-05-31T12:33:40.603853-07:00","Action":"cont","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T12:33:40.603857-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== CONT TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T12:33:40.603893-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico/Start"} +{"Time":"2023-05-31T12:33:40.603897-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":"=== RUN TestNetworkPlugins/group/calico/Start\n"} +{"Time":"2023-05-31T12:33:40.603969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p calico-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=calico --driver=docker \n"} +{"Time":"2023-05-31T12:34:49.403433-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p calico-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=calico --driver=docker : (1m8.798860156s)\n"} +{"Time":"2023-05-31T12:34:49.403498-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico/ControllerPod"} +{"Time":"2023-05-31T12:34:49.403505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":"=== RUN TestNetworkPlugins/group/calico/ControllerPod\n"} +{"Time":"2023-05-31T12:34:49.404771-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/calico/ControllerPod: waiting 10m0s for pods matching \"k8s-app=calico-node\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T12:34:49.416751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":" helpers_test.go:344: \"calico-node-2h2zk\" [ea96a45d-5d03-4fca-9297-78b1a040458f] Running\n"} +{"Time":"2023-05-31T12:34:54.421338-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/calico/ControllerPod: k8s-app=calico-node healthy within 5.016509476s\n"} +{"Time":"2023-05-31T12:34:54.421362-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico/KubeletFlags"} +{"Time":"2023-05-31T12:34:54.421366-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/calico/KubeletFlags\n"} +{"Time":"2023-05-31T12:34:54.421379-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p calico-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:34:54.805896-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico/NetCatPod"} +{"Time":"2023-05-31T12:34:54.80591-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/calico/NetCatPod\n"} +{"Time":"2023-05-31T12:34:54.806009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context calico-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:34:55.082014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/calico/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:34:55.085011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-jpmr2\" [566d939a-191c-4f66-84d7-a30b6f96df72] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:35:02.090096-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-jpmr2\" [566d939a-191c-4f66-84d7-a30b6f96df72] Running\n"} +{"Time":"2023-05-31T12:35:08.090134-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/calico/NetCatPod: app=netcat healthy within 13.008024747s\n"} +{"Time":"2023-05-31T12:35:08.090158-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico/DNS"} +{"Time":"2023-05-31T12:35:08.090162-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/DNS","Output":"=== RUN TestNetworkPlugins/group/calico/DNS\n"} +{"Time":"2023-05-31T12:35:08.09027-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context calico-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:35:08.227378-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico/Localhost"} +{"Time":"2023-05-31T12:35:08.227393-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Localhost","Output":"=== RUN TestNetworkPlugins/group/calico/Localhost\n"} +{"Time":"2023-05-31T12:35:08.227513-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context calico-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:35:08.35237-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico/HairPin"} +{"Time":"2023-05-31T12:35:08.352382-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/HairPin","Output":"=== RUN TestNetworkPlugins/group/calico/HairPin\n"} +{"Time":"2023-05-31T12:35:08.352495-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context calico-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:35:08.474571-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" net_test.go:209: \"calico\" test finished in 13m38.673605223s, failed=false\n"} +{"Time":"2023-05-31T12:35:18.331232-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:255: (dbg) Done: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=docker : (4m39.866343145s)\n"} +{"Time":"2023-05-31T12:35:18.331336-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:260: (dbg) Run: kubectl --context kubernetes-upgrade-496000 version --output=json\n"} +{"Time":"2023-05-31T12:35:18.388661-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:279: Attempting to downgrade Kubernetes (should fail)\n"} +{"Time":"2023-05-31T12:35:18.388677-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:281: (dbg) Run: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.16.0 --driver=docker \n"} +{"Time":"2023-05-31T12:35:18.903642-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:281: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.16.0 --driver=docker : exit status 106 (514.804525ms)\n"} +{"Time":"2023-05-31T12:35:18.903654-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:35:18.903657-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:35:18.903659-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* [kubernetes-upgrade-496000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:35:18.903662-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:35:18.903665-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:35:18.903667-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:35:18.90367-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:35:18.903672-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:35:18.903674-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:35:18.903676-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:18.903678-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:18.90368-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:35:18.903682-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:35:18.903684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:35:18.903686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tX Exiting due to K8S_DOWNGRADE_UNSUPPORTED: Unable to safely downgrade existing Kubernetes v1.27.2 cluster to v1.16.0\n"} +{"Time":"2023-05-31T12:35:18.903688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Suggestion: \n"} +{"Time":"2023-05-31T12:35:18.90369-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:18.903692-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t 1) Recreate the cluster with Kubernetes 1.16.0, by running:\n"} +{"Time":"2023-05-31T12:35:18.903694-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:18.903696-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube delete -p kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:18.903698-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube start -p kubernetes-upgrade-496000 --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T12:35:18.903701-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:18.903703-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t 2) Create a second cluster with Kubernetes 1.16.0, by running:\n"} +{"Time":"2023-05-31T12:35:18.903705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:18.903706-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube start -p kubernetes-upgrade-4960002 --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T12:35:18.903709-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:18.90371-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t 3) Use the existing cluster at version Kubernetes 1.27.2, by running:\n"} +{"Time":"2023-05-31T12:35:18.903712-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:18.903714-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube start -p kubernetes-upgrade-496000 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:35:18.903716-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:18.903718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:35:18.90372-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:35:18.903722-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:285: Attempting restart after unsuccessful downgrade\n"} +{"Time":"2023-05-31T12:35:18.903726-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:287: (dbg) Run: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=docker \n"} +{"Time":"2023-05-31T12:35:29.719328-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:35:29.719341-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ----------------------- debugLogs start: calico-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:35:29.719344-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:35:29.719347-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:35:29.719349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:35:29.719351-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719353-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:35:29.719355-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:35:29.719358-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719361-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719363-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:35:29.719365-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:35:29.719367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719369-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:35:29.719373-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:35:29.719375-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719377-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719379-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:35:29.719381-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:35:29.719383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:35:29.719384-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719386-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719388-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:35:29.71939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:35:29.719392-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:35:29.719395-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:35:29.719397-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:35:29.719399-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:35:29.719401-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:35:29.719402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:35:29.719404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.244.91.3\tnetcat-7458db8b8-jpmr2\n"} +{"Time":"2023-05-31T12:35:29.719406-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.71941-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719412-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:35:29.719414-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:35:29.719416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:35:29.719418-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:35:29.71942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719422-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719424-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:35:29.719426-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:35:29.719428-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.71943-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:35:29.719432-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:35:29.719434-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:35:29.719436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.719438-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:35:29.71944-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:35:29.719442-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:35:29.719444-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:35:29.719446-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.719448-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:35:29.71945-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:35:29.719452-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.719454-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:35:29.719456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:35:29.719458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:35:29.71946-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:35:29.719462-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.719464-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:35:29.719466-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719468-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.71947-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:35:29.719472-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:35:29.719474-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:35:29.719476-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:35:29.719478-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:35:29.71948-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:35:29.719482-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:35:29.719484-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.76.2\tcalico-996000\r\n"} +{"Time":"2023-05-31T12:35:29.719486-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:35:29.719488-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.76.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:35:29.71949-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719492-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719494-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:35:29.719496-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:35:29.719498-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:35:29.7195-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719502-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719504-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:35:29.719506-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:35:29.719508-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node/calico-996000 Ready control-plane 74s v1.27.2 192.168.76.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:35:29.71951-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719512-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:35:29.719515-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 73s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719517-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default service/netcat ClusterIP 10.102.247.5 \u003cnone\u003e 8080/TCP 20s app=netcat\n"} +{"Time":"2023-05-31T12:35:29.71952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 71s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:35:29.719524-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719526-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:35:29.719528-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default endpoints/kubernetes 192.168.76.2:8443 73s\n"} +{"Time":"2023-05-31T12:35:29.71953-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default endpoints/netcat 10.244.91.3:8080 20s\n"} +{"Time":"2023-05-31T12:35:29.719532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 56s\n"} +{"Time":"2023-05-31T12:35:29.719535-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system endpoints/kube-dns 10.244.91.1:53,10.244.91.1:53,10.244.91.1:9153 59s\n"} +{"Time":"2023-05-31T12:35:29.719537-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719539-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:35:29.719542-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system daemonset.apps/calico-node 1 1 1 1 1 kubernetes.io/os=linux 70s calico-node docker.io/calico/node:v3.25.1 k8s-app=calico-node\n"} +{"Time":"2023-05-31T12:35:29.719544-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 71s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.719546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719549-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:35:29.719552-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default deployment.apps/netcat 1/1 1 1 20s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:35:29.719554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system deployment.apps/calico-kube-controllers 1/1 1 1 70s calico-kube-controllers docker.io/calico/kube-controllers:v3.25.1 k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.719556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system deployment.apps/coredns 1/1 1 1 71s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:35:29.719559-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719561-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:35:29.719563-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default pod/netcat-7458db8b8-jpmr2 1/1 Running 0 20s 10.244.91.3 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719565-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/calico-kube-controllers-674fff74c8-ths92 1/1 Running 1 (45s ago) 59s 10.244.91.2 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/calico-node-2h2zk 1/1 Running 0 59s 192.168.76.2 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.71957-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/coredns-5d78c9869d-xnzjr 1/1 Running 1 (44s ago) 59s 10.244.91.1 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719573-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/etcd-calico-996000 1/1 Running 0 71s 192.168.76.2 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719576-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/kube-apiserver-calico-996000 1/1 Running 0 71s 192.168.76.2 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719578-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/kube-controller-manager-calico-996000 1/1 Running 0 71s 192.168.76.2 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.71958-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/kube-proxy-bt5n4 1/1 Running 0 59s 192.168.76.2 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719583-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/kube-scheduler-calico-996000 1/1 Running 0 71s 192.168.76.2 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719585-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/storage-provisioner 1/1 Running 0 56s 192.168.76.2 calico-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719587-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719589-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719591-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:35:29.719593-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:35:29.719595-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" e2de3c8ba5b3c 20 seconds ago Ready netcat-7458db8b8-jpmr2 default 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719598-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 3861aa029f16b 32 seconds ago Ready calico-kube-controllers-674fff74c8-ths92 kube-system 10 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.7196-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 659e0ea3eb0d5 32 seconds ago Ready coredns-5d78c9869d-xnzjr kube-system 10 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719602-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cb198ddabc77e 56 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719605-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 397115f5a2687 58 seconds ago NotReady calico-kube-controllers-674fff74c8-ths92 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719607-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 629ecf7b98904 58 seconds ago NotReady coredns-5d78c9869d-xnzjr kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719609-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 6adb3698a390d 59 seconds ago Ready kube-proxy-bt5n4 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719611-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 26cb794a82243 59 seconds ago Ready calico-node-2h2zk kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719614-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" e83e20c86329d About a minute ago Ready kube-scheduler-calico-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719616-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a7cbd73a31fff About a minute ago Ready kube-controller-manager-calico-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719618-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 44e421d63c0a9 About a minute ago Ready kube-apiserver-calico-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719621-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 99a513b3f02f1 About a minute ago Ready etcd-calico-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:35:29.719623-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719625-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719627-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:35:29.719629-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:35:29.719631-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" eb469e4b06956 registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 16 seconds ago Running dnsutils 0 e2de3c8ba5b3c netcat-7458db8b8-jpmr2\r\n"} +{"Time":"2023-05-31T12:35:29.719635-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" c1b464c229aed 212faac284a2e 33 seconds ago Running calico-kube-controllers 1 3861aa029f16b calico-kube-controllers-674fff74c8-ths92\r\n"} +{"Time":"2023-05-31T12:35:29.719639-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 6a3c7367618f1 ead0a4a53df89 33 seconds ago Running coredns 1 659e0ea3eb0d5 coredns-5d78c9869d-xnzjr\r\n"} +{"Time":"2023-05-31T12:35:29.719641-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 376d5b40a0a56 cae61b85e9b45 34 seconds ago Running calico-node 0 26cb794a82243 calico-node-2h2zk\r\n"} +{"Time":"2023-05-31T12:35:29.719644-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 05d73d24ed40e calico/node@sha256:0cd00e83d06b3af8cd712ad2c310be07b240235ad7ca1397e04eb14d20dcc20f 35 seconds ago Exited mount-bpffs 0 26cb794a82243 calico-node-2h2zk\r\n"} +{"Time":"2023-05-31T12:35:29.719647-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 9a7d2ff9301f1 calico/kube-controllers@sha256:02c1232ee4b8c5a145c401ac1adb34a63ee7fc46b70b6ad0a4e068a774f25f8a 47 seconds ago Exited calico-kube-controllers 0 397115f5a2687 calico-kube-controllers-674fff74c8-ths92\r\n"} +{"Time":"2023-05-31T12:35:29.719649-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 4e9f6b2ebd405 a0138614e6094 52 seconds ago Exited install-cni 0 26cb794a82243 calico-node-2h2zk\r\n"} +{"Time":"2023-05-31T12:35:29.719652-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 19eafcb2e9ec1 calico/cni@sha256:9a2c99f0314053aa11e971bd5d72e17951767bf5c6ff1fd9c38c4582d7cb8a0a 53 seconds ago Exited upgrade-ipam 0 26cb794a82243 calico-node-2h2zk\r\n"} +{"Time":"2023-05-31T12:35:29.719654-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 28351278247fb 6e38f40d628db 57 seconds ago Running storage-provisioner 0 cb198ddabc77e storage-provisioner\r\n"} +{"Time":"2023-05-31T12:35:29.719657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 5539b7f13c7df ead0a4a53df89 58 seconds ago Exited coredns 0 629ecf7b98904 coredns-5d78c9869d-xnzjr\r\n"} +{"Time":"2023-05-31T12:35:29.71966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" da1d501cf3f73 b8aa50768fd67 59 seconds ago Running kube-proxy 0 6adb3698a390d kube-proxy-bt5n4\r\n"} +{"Time":"2023-05-31T12:35:29.719662-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 5e5408615e29b ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 a7cbd73a31fff kube-controller-manager-calico-996000\r\n"} +{"Time":"2023-05-31T12:35:29.719665-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 97635c586feeb 89e70da428d29 About a minute ago Running kube-scheduler 0 e83e20c86329d kube-scheduler-calico-996000\r\n"} +{"Time":"2023-05-31T12:35:29.719667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 3af22502555bb 86b6af7dd652c About a minute ago Running etcd 0 99a513b3f02f1 etcd-calico-996000\r\n"} +{"Time":"2023-05-31T12:35:29.71967-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bda0978deaa7e c5b13e4f7806d About a minute ago Running kube-apiserver 0 44e421d63c0a9 kube-apiserver-calico-996000\r\n"} +{"Time":"2023-05-31T12:35:29.719672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719675-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719678-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:35:29.719682-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:35:29.719685-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:35:29.719688-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CreationTimestamp: Wed, 31 May 2023 12:34:55 -0700\n"} +{"Time":"2023-05-31T12:35:29.71969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:35:29.719692-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:35:29.719694-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:35:29.719696-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:35:29.719698-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:35:29.7197-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:35:29.719702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:35:29.719704-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:35:29.719706-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:35:29.719708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.71971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:35:29.719713-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:35:29.719715-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719717-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.719721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:35:29.719724-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -c\n"} +{"Time":"2023-05-31T12:35:29.719726-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:35:29.719728-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.71973-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719734-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.719736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:35:29.719738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:35:29.71974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:35:29.719742-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:35:29.719744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:35:29.719748-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.71975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.719752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.719755-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal ScalingReplicaSet 21s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:35:29.719757-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.71976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:35:29.719762-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: netcat-7458db8b8-jpmr2\n"} +{"Time":"2023-05-31T12:35:29.719764-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:35:29.719766-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:35:29.719768-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:35:29.71977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.719772-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 12:34:55 -0700\n"} +{"Time":"2023-05-31T12:35:29.719774-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:35:29.719776-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:35:29.719779-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: cni.projectcalico.org/containerID: e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\n"} +{"Time":"2023-05-31T12:35:29.719781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIP: 10.244.91.3/32\n"} +{"Time":"2023-05-31T12:35:29.719783-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIPs: 10.244.91.3/32\n"} +{"Time":"2023-05-31T12:35:29.719785-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:35:29.719787-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.91.3\n"} +{"Time":"2023-05-31T12:35:29.71979-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T12:35:29.719792-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.91.3\n"} +{"Time":"2023-05-31T12:35:29.719794-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:35:29.719796-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.719798-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:35:29.7198-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://eb469e4b069569975d814bdc10c9bf1d085929fbaa7540eb8dcf50db9050db5c\n"} +{"Time":"2023-05-31T12:35:29.719802-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:35:29.719804-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:35:29.719806-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719809-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719811-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.719813-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:35:29.719815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -c\n"} +{"Time":"2023-05-31T12:35:29.719817-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:35:29.719819-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T12:35:29.719821-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:35:00 -0700\n"} +{"Time":"2023-05-31T12:35:29.719823-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.719825-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:35:29.719827-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719829-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.719831-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-jtjnx (ro)\n"} +{"Time":"2023-05-31T12:35:29.719833-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.719835-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T12:35:29.719837-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:35:29.719839-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T12:35:29.719841-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:35:29.719843-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:35:29.719845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.719847-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-jtjnx:\n"} +{"Time":"2023-05-31T12:35:29.719849-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:35:29.719851-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:35:29.719853-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.719855-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:35:29.719857-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:35:29.71986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:35:29.719862-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719864-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:35:29.719866-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:35:29.719868-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.71987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.719872-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.719874-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 21s default-scheduler Successfully assigned default/netcat-7458db8b8-jpmr2 to calico-996000\n"} +{"Time":"2023-05-31T12:35:29.719876-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulling 21s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:35:29.719878-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 16s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.128088521s (5.128095641s including waiting)\n"} +{"Time":"2023-05-31T12:35:29.719881-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 16s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:35:29.719883-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 16s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:35:29.719885-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719887-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719888-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:35:29.71989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719892-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719894-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:35:29.719896-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:35:29.719898-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.7199-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CreationTimestamp: Wed, 31 May 2023 12:34:04 -0700\n"} +{"Time":"2023-05-31T12:35:29.719902-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:35:29.719904-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:35:29.719906-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:35:29.719908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:35:29.71991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:35:29.719912-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:35:29.719914-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:35:29.719916-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:35:29.719918-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:35:29.719921-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:35:29.719924-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.719926-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" coredns:\n"} +{"Time":"2023-05-31T12:35:29.719928-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:35:29.71993-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:35:29.719932-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:35:29.719934-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Args:\n"} +{"Time":"2023-05-31T12:35:29.719936-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -conf\n"} +{"Time":"2023-05-31T12:35:29.719938-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:35:29.71994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Limits:\n"} +{"Time":"2023-05-31T12:35:29.719942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:35:29.719944-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T12:35:29.719946-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:35:29.719948-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:35:29.71995-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:35:29.719952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:35:29.719954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719956-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.719958-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:35:29.71996-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.719962-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:35:29.719964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:35:29.719967-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:35:29.719969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:35:29.719971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:35:29.719973-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.719975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:35:29.719977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:35:29.719979-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:35:29.719981-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:35:29.719983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.719985-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:35:29.719987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.719989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.719991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.719993-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal ScalingReplicaSet 60s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:35:29.719995-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal ScalingReplicaSet 59s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:35:29.719997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.719999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.720001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:35:29.720004-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: coredns-5d78c9869d-xnzjr\n"} +{"Time":"2023-05-31T12:35:29.720006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.720008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:35:29.72001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:35:29.720012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:35:29.720015-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.720017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 12:34:17 -0700\n"} +{"Time":"2023-05-31T12:35:29.720019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:35:29.720021-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:35:29.720023-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: cni.projectcalico.org/containerID: 659e0ea3eb0d5d625aa102e93dd6f43ee95139e7135f1ace37842f3a124cd1dc\n"} +{"Time":"2023-05-31T12:35:29.720025-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIP: 10.244.91.1/32\n"} +{"Time":"2023-05-31T12:35:29.720028-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIPs: 10.244.91.1/32\n"} +{"Time":"2023-05-31T12:35:29.72003-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:35:29.720032-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.91.1\n"} +{"Time":"2023-05-31T12:35:29.720035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T12:35:29.720037-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.91.1\n"} +{"Time":"2023-05-31T12:35:29.720039-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:35:29.720041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.720043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" coredns:\n"} +{"Time":"2023-05-31T12:35:29.720045-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://6a3c7367618f1d82e9e0dc0380bdd1d1b91a6afe5d02cb5c42614c36075063e1\n"} +{"Time":"2023-05-31T12:35:29.720047-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:35:29.720049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:35:29.720051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:35:29.720053-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:35:29.720055-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Args:\n"} +{"Time":"2023-05-31T12:35:29.720057-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -conf\n"} +{"Time":"2023-05-31T12:35:29.720059-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:35:29.720061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T12:35:29.720063-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:43 -0700\n"} +{"Time":"2023-05-31T12:35:29.720065-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Last State: Terminated\n"} +{"Time":"2023-05-31T12:35:29.720067-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:35:29.720069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:35:29.720071-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:18 -0700\n"} +{"Time":"2023-05-31T12:35:29.720073-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Finished: Wed, 31 May 2023 12:34:31 -0700\n"} +{"Time":"2023-05-31T12:35:29.720075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.720077-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 1\n"} +{"Time":"2023-05-31T12:35:29.720079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Limits:\n"} +{"Time":"2023-05-31T12:35:29.720081-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:35:29.720083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T12:35:29.720085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:35:29.720087-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:35:29.720089-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:35:29.720091-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:35:29.720093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.720095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.720097-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:35:29.720099-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-9zkz2 (ro)\n"} +{"Time":"2023-05-31T12:35:29.720101-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.720103-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T12:35:29.720105-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:35:29.720107-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T12:35:29.72011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:35:29.720112-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:35:29.720114-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.720116-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:35:29.720118-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:35:29.72012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:35:29.720122-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:35:29.720124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-9zkz2:\n"} +{"Time":"2023-05-31T12:35:29.720126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:35:29.720128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:35:29.72013-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.720132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:35:29.720134-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:35:29.720136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:35:29.720138-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:35:29.72014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:35:29.720143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:35:29.720145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:35:29.720147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:35:29.720149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.720151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.720154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.720156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 59s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-xnzjr to calico-996000\n"} +{"Time":"2023-05-31T12:35:29.720158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 58s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:35:29.720161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 58s kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:35:29.720163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 58s kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:35:29.720165-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Killing 57s kubelet Stopping container coredns\n"} +{"Time":"2023-05-31T12:35:29.720167-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning Unhealthy 49s (x2 over 57s) kubelet Readiness probe failed: Get \"http://:8181/ready\": dial tcp :8181: connect: connection refused\n"} +{"Time":"2023-05-31T12:35:29.72017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 43s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"64bef55cbf7a7214055334de68a91f1dfd94413069595192f083e189b5ff7e08\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.720174-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 41s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"a1ef1a022a441e982bb6e3cae6764349691932a8e4d8ee556c4647dd8ebcc68a\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.720177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 40s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"bfcedb8791325e2755d8b91ff54b50e3d1a9e12b76c853adef2aa9a04acce93f\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.72018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 39s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"e6d900907c2f3965f306dd915afbc88b7074f41d92d9467d6f2f4cbe7a8a1d07\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.720184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 38s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"ebe3a219ff6aeb04994c71da89f89f5145b1ec79197a8246b4cb8ead65f9fad7\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.720187-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 37s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"90d9e8940229d780156b91867331d3fd7ec8e22ca68982430017d16cb287d077\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.72019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 36s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"81e254a18d45489c9478e3ee34c59de4b8366746b70b2716359c0bb82b14f4f0\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.720193-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 35s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"1ef81b491d7a1fd63524334ae093ae8341dc95dc1e946c69e6deb773e2b20dfb\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.720196-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal SandboxChanged 34s (x10 over 57s) kubelet Pod sandbox changed, it will be killed and re-created.\n"} +{"Time":"2023-05-31T12:35:29.720199-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 34s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\" network for pod \"coredns-5d78c9869d-xnzjr\": networkPlugin cni failed to set up pod \"coredns-5d78c9869d-xnzjr_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.720202-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.720306-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.720312-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:35:29.720314-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" .:53\n"} +{"Time":"2023-05-31T12:35:29.720317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] plugin/reload: Running configuration SHA512 = f869070685748660180df1b7a47d58cdafcf2f368266578c062d1151dc2c900964aecc5975e8882e6de6fdfb6460463e30ebfaad2ec8f0c3c6436f80225b3b5b\n"} +{"Time":"2023-05-31T12:35:29.720319-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:35:29.720323-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:35:29.720326-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 127.0.0.1:34826 - 21298 \"HINFO IN 7274912443799090526.6618214698209152108. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.018649129s\n"} +{"Time":"2023-05-31T12:35:29.720328-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.91.3:53163 - 4683 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000159119s\n"} +{"Time":"2023-05-31T12:35:29.72033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.91.3:53895 - 20784 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000142584s\n"} +{"Time":"2023-05-31T12:35:29.720332-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.91.3:55420 - 13850 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000104447s\n"} +{"Time":"2023-05-31T12:35:29.720335-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.91.3:53279 - 7582 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000308219s\n"} +{"Time":"2023-05-31T12:35:29.720338-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.91.3:53279 - 7384 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000212436s\n"} +{"Time":"2023-05-31T12:35:29.72034-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.91.3:52717 - 64589 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000134088s\n"} +{"Time":"2023-05-31T12:35:29.720343-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.91.3:59196 - 7190 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000175595s\n"} +{"Time":"2023-05-31T12:35:29.720345-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.91.3:35964 - 59639 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000113641s\n"} +{"Time":"2023-05-31T12:35:29.720347-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.720349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.720351-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:35:29.720353-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-apiserver-calico-996000\n"} +{"Time":"2023-05-31T12:35:29.72049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.720496-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:35:29.720498-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:35:29.7205-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.720507-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 12:34:04 -0700\n"} +{"Time":"2023-05-31T12:35:29.720509-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:35:29.720512-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:35:29.720516-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.76.2:8443\n"} +{"Time":"2023-05-31T12:35:29.720518-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/config.hash: 7dbabd351e651b3a8feddaf1f8d788f0\n"} +{"Time":"2023-05-31T12:35:29.72052-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/config.mirror: 7dbabd351e651b3a8feddaf1f8d788f0\n"} +{"Time":"2023-05-31T12:35:29.720523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/config.seen: 2023-05-31T19:34:04.129121771Z\n"} +{"Time":"2023-05-31T12:35:29.720525-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:35:29.720527-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:35:29.720529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.720531-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T12:35:29.720533-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.720535-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: Node/calico-996000\n"} +{"Time":"2023-05-31T12:35:29.720537-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.720539-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:35:29.720542-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://bda0978deaa7ee2379c09b22f17ec888e2ee4c7201d56d84d937abfa4a0285b2\n"} +{"Time":"2023-05-31T12:35:29.720544-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:35:29.720547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:35:29.720653-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.720657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.720659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.720662-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:35:29.720664-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --advertise-address=192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.720666-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:35:29.720668-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:35:29.720671-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:35:29.720673-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:35:29.720675-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:35:29.720678-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:35:29.72068-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:35:29.720682-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:35:29.720684-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:35:29.720686-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:35:29.720688-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:35:29.72069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:35:29.720692-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:35:29.720695-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:35:29.720697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:35:29.720699-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.720823-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:35:29.720827-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:35:29.720829-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:35:29.720831-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:35:29.720834-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:35:29.720836-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:35:29.720838-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:35:29.72084-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:35:29.720842-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:35:29.720844-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:35:29.720846-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T12:35:29.720848-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:33:59 -0700\n"} +{"Time":"2023-05-31T12:35:29.72085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.720852-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:35:29.720853-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T12:35:29.720856-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:35:29.720858-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:35:29.72086-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: http-get https://192.168.76.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:35:29.720862-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Startup: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:35:29.720864-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.720866-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.720868-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:35:29.720971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:35:29.720976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:35:29.720978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:35:29.720981-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:35:29.720983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.720985-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T12:35:29.720987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:35:29.720989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T12:35:29.720991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:35:29.720993-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:35:29.720995-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.720997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:35:29.720999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.721001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:35:29.721003-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.721005-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:35:29.721007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.72101-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:35:29.721012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.721014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:35:29.721016-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.721018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:35:29.72102-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.721093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:35:29.721095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.721097-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:35:29.721099-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.721101-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:35:29.721103-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.721105-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:35:29.721107-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.721109-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:35:29.721111-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.721113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:35:29.721115-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.721117-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.721119-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.721121-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:35:29.721124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:33:59.215252 1 server.go:551] external host was not specified, using 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.721126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:33:59.216341 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:35:29.721128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:33:59.216422 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:35:29.72113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:33:59.886544 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:35:29.721133-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:33:59.900773 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:35:29.721139-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:33:59.900811 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:35:29.721354-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:33:59.919866 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.72136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:33:59.919909 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721362-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:33:59.921167 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:35:29.721365-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.193967 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.194192 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:35:29.721369-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.448405 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:35:29.721371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.463133 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721374-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.463177 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721376-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.463184 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721378-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.464421 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.72138-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.464457 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721382-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.465882 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721386-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.466425 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721388-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.466462 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721391-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.466466 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721393-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.468300 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721622-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.468335 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721625-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.469845 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721627-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.469881 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721629-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.469887 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721631-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.471334 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721633-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.471369 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721635-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.472474 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721638-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.481271 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.72164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.485439 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721642-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.485480 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721644-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.485485 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721646-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.487050 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721648-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.487092 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721651-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.487099 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721653-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.488711 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721655-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.488746 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.491244 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721889-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.491282 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721894-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.491288 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721896-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.492807 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721898-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.492874 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.7219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.492881 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721903-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.495681 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721905-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.495720 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721907-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.495725 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721909-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.497921 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721911-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.498930 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721915-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.498966 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721918-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.498972 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.72192-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.503433 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.503472 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721924-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.503477 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.721927-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.505576 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.721929-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.505615 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.72215-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.505621 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.722154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.507419 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.722156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.507459 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.722159-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.515902 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.722161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:00.515980 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:35:29.722163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.958795 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:35:29.722165-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.958830 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:35:29.722168-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.959305 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:35:29.72217-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.959718 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:35:29.722172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.959943 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:35:29.722174-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.959736 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:35:29.722177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960129 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:35:29.722179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960137 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:35:29.722182-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960256 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:35:29.722184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960410 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:35:29.722187-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960439 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:35:29.722422-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960494 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:35:29.722427-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960624 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:35:29.722429-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960644 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:35:29.722431-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960896 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:35:29.722433-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960941 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:35:29.722435-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960950 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:35:29.722437-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960968 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:35:29.722448-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961001 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:35:29.722453-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961010 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:35:29.722456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961013 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:35:29.722458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960131 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:35:29.72246-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960143 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:35:29.722463-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961094 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:35:29.722465-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961123 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:35:29.722467-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960433 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:35:29.722469-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961133 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:35:29.722473-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961234 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:35:29.722475-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961306 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:35:29.7227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961002 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:35:29.722705-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961369 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:35:29.722707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960154 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:35:29.72271-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961611 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:35:29.722712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.960162 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:35:29.722714-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:00.961020 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:35:29.722716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.081844 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:35:29.722719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.081963 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:35:29.722721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.082019 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:35:29.722724-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.082220 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:35:29.722726-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.082103 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:35:29.722728-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.082117 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:35:29.72273-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.082371 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:35:29.722732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.082473 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:35:29.722734-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.083594 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:35:29.722737-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.086681 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:35:29.722739-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" E0531 19:34:01.089640 1 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"namespaces \\\"kube-system\\\" not found\" interval=\"200ms\"\n"} +{"Time":"2023-05-31T12:35:29.722951-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.293817 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.722953-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.753786 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:35:29.722955-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.965340 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:35:29.722958-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.969267 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:35:29.72296-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:01.969306 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:35:29.722962-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:02.485837 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.722965-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:02.518237 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.722967-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:02.609789 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:35:29.722969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:34:02.615326 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.76.2]\n"} +{"Time":"2023-05-31T12:35:29.722971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:02.616127 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:35:29.722974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:02.620327 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.722976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:03.016545 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:35:29.722978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:04.016553 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:35:29.722981-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:04.025161 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:35:29.722983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:04.033056 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:35:29.722985-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.170402 1 controller.go:624] quota admission added evaluator for: poddisruptionbudgets.policy\n"} +{"Time":"2023-05-31T12:35:29.722987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.214459 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.215143 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723229-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.220993 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723231-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.222451 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723233-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.226715 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723235-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.227790 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723238-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.234493 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.72324-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.234883 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723242-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.284235 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723244-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.286534 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723247-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.294965 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723249-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.318520 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723251-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.383287 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723253-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.396066 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723255-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.396310 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723257-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.396799 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723259-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.399790 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723262-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.408320 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.7235-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.423599 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723502-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.425818 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723504-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.482625 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723506-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.486192 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723508-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.496684 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.72351-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.497189 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723513-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.497407 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723515-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.502114 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723517-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.504944 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723519-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.508515 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723521-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.512684 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.518157 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723525-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.524227 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723528-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.597617 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.72353-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.600970 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.601470 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723534-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.606364 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723706-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.606947 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.610992 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723727-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.614167 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.617121 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.684521 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723734-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.684624 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.688475 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.698187 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.72374-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:05.700759 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:35:29.723744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:16.471304 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:35:29.723746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:16.521360 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:35:29.723748-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:55.021614 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.102.247.5]\n"} +{"Time":"2023-05-31T12:35:29.723751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.723753-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.723755-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:35:29.723757-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:35:29.723759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.723761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:35:29.723763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:35:29.723787-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:35:29.723793-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.723797-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T12:35:29.7238-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.723803-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:35:29.723806-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:35:29.723808-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:35:29.72381-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.723812-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:35:29.723814-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:35:29.723816-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:35:29.723818-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:35:29.723822-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:35:29.723824-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:35:29.723826-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:35:29.723828-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:35:29.72383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:35:29.723832-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [\r\n"} +{"Time":"2023-05-31T12:35:29.723834-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.723836-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:35:29.723839-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T12:35:29.723842-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.723845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T12:35:29.723847-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T12:35:29.723849-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.723851-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T12:35:29.723853-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.723933-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:35:29.723937-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:35:29.72394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:35:29.723942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.723944-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T12:35:29.723946-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.723948-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:35:29.72395-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T12:35:29.723952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.723954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:35:29.723956-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.723958-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T12:35:29.72396-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.723962-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/cni/net.d/calico-kubeconfig\r\n"} +{"Time":"2023-05-31T12:35:29.723964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kubeconfig file for Calico CNI plugin. Installed by calico/node.\r\n"} +{"Time":"2023-05-31T12:35:29.723966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:35:29.723968-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:35:29.72397-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:35:29.723973-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: local\r\n"} +{"Time":"2023-05-31T12:35:29.723975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster:\r\n"} +{"Time":"2023-05-31T12:35:29.723977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://10.96.0.1:443\r\n"} +{"Time":"2023-05-31T12:35:29.723981-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority-data: \"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"} +{"Time":"2023-05-31T12:35:29.724188-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"LdUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\"\r\n"} +{"Time":"2023-05-31T12:35:29.724193-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users:\r\n"} +{"Time":"2023-05-31T12:35:29.724204-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: calico\r\n"} +{"Time":"2023-05-31T12:35:29.724211-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\r\n"} +{"Time":"2023-05-31T12:35:29.724216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" token: eyJhbGciOiJSUzI1NiIsImtpZCI6Im1uNTJ3RU94dHoyWmhXQXBibzZKNnFuaVFQS25Kc1dMbTVUaTdZYnlZbFkifQ.eyJhdWQiOlsiaHR0cHM6Ly9rdWJlcm5ldGVzLmRlZmF1bHQuc3ZjLmNsdXN0ZXIubG9jYWwiXSwiZXhwIjoxNjg1NjQ4MDg0LCJpYXQiOjE2ODU1NjE2ODQsImlzcyI6Imh0dHBzOi8va3ViZXJuZXRlcy5kZWZhdWx0LnN2Yy5jbHVzdGVyLmxvY2FsIiwia3ViZXJuZXRlcy5pbyI6eyJuYW1lc3BhY2UiOiJrdWJlLXN5c3RlbSIsInNlcnZpY2VhY2NvdW50Ijp7Im5hbWUiOiJjYWxpY28tbm9kZSIsInVpZCI6IjU1ODYxNjIwLTllMjEtNDVjZC05MjkyLWUzMjg4MWNlYWJiZCJ9fSwibmJmIjoxNjg1NTYxNjg0LCJzdWIiOiJzeXN0ZW06c2VydmljZWFjY291bnQ6a3ViZS1zeXN0ZW06Y2FsaWNvLW5vZGUifQ.fnL_EyBCTAMcIwuqNtd6bhAbgrZfx4Oek3GMQZZthIoq_Gw8xEuLlXjm-P6BpcMz4IKsw0JbV6PMVEIVF7vgPGjmLNwhoPC6Iqrrnb7zJmyfIk9yZ1zsGy3emC9fHK5ExrhrsiPdU5wCB6a4VFQA3J93SRVRtGwNCGSlBS01H4TdaCDH50n7nOURzfjilWCN66Ot0qMKTPBnHPIX1jDZu7cKiZ4_bIlROEFRH0azGB_Z2Ow8tdl5xQTRri3IjHxxgIR512JPpBDIUE2M9YOmqGRvcjBDSwVxBr7H68dw0_YllZymjzapl-nQFi6INSBWs-jw30LgEKnoaYAFFgxuiA\r\n"} +{"Time":"2023-05-31T12:35:29.724221-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:35:29.724224-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: calico-context\r\n"} +{"Time":"2023-05-31T12:35:29.724227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" context:\r\n"} +{"Time":"2023-05-31T12:35:29.724231-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: local\r\n"} +{"Time":"2023-05-31T12:35:29.724234-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: calico\r\n"} +{"Time":"2023-05-31T12:35:29.724238-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: calico-context/etc/cni/net.d/10-calico.conflist\r\n"} +{"Time":"2023-05-31T12:35:29.724264-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.72428-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"name\": \"k8s-pod-network\",\r\n"} +{"Time":"2023-05-31T12:35:29.724286-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:35:29.72429-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:35:29.724293-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.724296-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"calico\",\r\n"} +{"Time":"2023-05-31T12:35:29.724515-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log_level\": \"info\",\r\n"} +{"Time":"2023-05-31T12:35:29.724519-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log_file_path\": \"/var/log/calico/cni/cni.log\",\r\n"} +{"Time":"2023-05-31T12:35:29.724521-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"datastore_type\": \"kubernetes\",\r\n"} +{"Time":"2023-05-31T12:35:29.724523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"nodename\": \"calico-996000\",\r\n"} +{"Time":"2023-05-31T12:35:29.724526-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"mtu\": 0,\r\n"} +{"Time":"2023-05-31T12:35:29.724528-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:35:29.72453-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"calico-ipam\"\r\n"} +{"Time":"2023-05-31T12:35:29.724532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T12:35:29.724534-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"policy\": {\r\n"} +{"Time":"2023-05-31T12:35:29.724536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"k8s\"\r\n"} +{"Time":"2023-05-31T12:35:29.724538-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T12:35:29.72454-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"kubernetes\": {\r\n"} +{"Time":"2023-05-31T12:35:29.724542-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"kubeconfig\": \"/etc/cni/net.d/calico-kubeconfig\"\r\n"} +{"Time":"2023-05-31T12:35:29.724545-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.724547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T12:35:29.72455-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.724552-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:35:29.724554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"snat\": true,\r\n"} +{"Time":"2023-05-31T12:35:29.724556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\"portMappings\": true}\r\n"} +{"Time":"2023-05-31T12:35:29.724558-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T12:35:29.72456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.724562-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"bandwidth\",\r\n"} +{"Time":"2023-05-31T12:35:29.724564-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\"bandwidth\": true}\r\n"} +{"Time":"2023-05-31T12:35:29.724566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.724568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T12:35:29.72457-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }/etc/cni/net.d/100-crio-bridge.conf.mk_disabled\r\n"} +{"Time":"2023-05-31T12:35:29.724766-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.724772-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:35:29.724775-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:35:29.724777-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:35:29.724779-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:35:29.724781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:35:29.724783-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:35:29.724785-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:35:29.724787-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:35:29.724789-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:35:29.724791-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:35:29.724794-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" { \"dst\": \"0.0.0.0/0\" },\r\n"} +{"Time":"2023-05-31T12:35:29.724796-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" { \"dst\": \"1100:200::1/24\" }\r\n"} +{"Time":"2023-05-31T12:35:29.724799-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ],\r\n"} +{"Time":"2023-05-31T12:35:29.724802-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:35:29.724804-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [{ \"subnet\": \"10.85.0.0/16\" }],\r\n"} +{"Time":"2023-05-31T12:35:29.724806-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [{ \"subnet\": \"1100:200::/24\" }]\r\n"} +{"Time":"2023-05-31T12:35:29.724808-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T12:35:29.72481-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.724812-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.724814-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.724816-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.724818-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:35:29.72482-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:35:29.724823-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:35:29.724825-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:35:29.72505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:35:29.725069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 2: tunl0@NONE: \u003cNOARP,UP,LOWER_UP\u003e mtu 65515 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:35:29.725072-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:35:29.725074-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" inet 10.244.91.0/32 scope global tunl0\r\n"} +{"Time":"2023-05-31T12:35:29.725081-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:35:29.725083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:35:29.725085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/tunnel6 :: brd :: permaddr f66b:f8a1:6f6a::\r\n"} +{"Time":"2023-05-31T12:35:29.725088-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:35:29.72509-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether 02:42:4b:89:a0:aa brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:35:29.725092-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:35:29.725094-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:35:29.725096-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 5: cali48cab21d877@if5: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:35:29.725098-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether ee:ee:ee:ee:ee:ee brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:35:29.7251-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 6: cali6ab2acc5004@if5: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:35:29.725102-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether ee:ee:ee:ee:ee:ee brd ff:ff:ff:ff:ff:ff link-netnsid 2\r\n"} +{"Time":"2023-05-31T12:35:29.725105-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 9: cali1ce0d62fe56@if5: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65515 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:35:29.725107-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether ee:ee:ee:ee:ee:ee brd ff:ff:ff:ff:ff:ff link-netnsid 3\r\n"} +{"Time":"2023-05-31T12:35:29.725109-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 290: eth0@if291: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:35:29.725111-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether 02:42:c0:a8:4c:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:35:29.725113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" inet 192.168.76.2/24 brd 192.168.76.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:35:29.725323-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:35:29.725327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.725329-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.725331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:35:29.725333-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default via 192.168.76.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:35:29.725336-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" blackhole 10.244.91.0/26 proto bird \r\n"} +{"Time":"2023-05-31T12:35:29.725338-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.244.91.1 dev cali48cab21d877 scope link \r\n"} +{"Time":"2023-05-31T12:35:29.72534-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.244.91.2 dev cali6ab2acc5004 scope link \r\n"} +{"Time":"2023-05-31T12:35:29.725342-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.244.91.3 dev cali1ce0d62fe56 scope link \r\n"} +{"Time":"2023-05-31T12:35:29.725345-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:35:29.725347-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.76.0/24 dev eth0 proto kernel scope link src 192.168.76.2 \r\n"} +{"Time":"2023-05-31T12:35:29.725349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.725351-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.725353-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:35:29.725355-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:35:19 2023\r\n"} +{"Time":"2023-05-31T12:35:29.725357-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" *raw\r\n"} +{"Time":"2023-05-31T12:35:29.725359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :PREROUTING ACCEPT [14993:55305794]\r\n"} +{"Time":"2023-05-31T12:35:29.725361-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :OUTPUT ACCEPT [13545:5046359]\r\n"} +{"Time":"2023-05-31T12:35:29.725363-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725365-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-PREROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725369-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-rpf-skip - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725373-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m comment --comment \"cali:6gwbT8clXdHdC1b1\" -j cali-PREROUTING\r\n"} +{"Time":"2023-05-31T12:35:29.725375-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m comment --comment \"cali:tVnHkvAo15HuiPy0\" -j cali-OUTPUT\r\n"} +{"Time":"2023-05-31T12:35:29.725529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:njdnLwYeGqBJyMxW\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T12:35:29.725533-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:rz86uTUcEZAfFsh7\" -j cali-to-host-endpoint\r\n"} +{"Time":"2023-05-31T12:35:29.725536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:pN0F5zD0b8yf9W1Z\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.725538-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:XFX5xbM8B9qR10JG\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T12:35:29.72554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -i cali+ -m comment --comment \"cali:EWMPb0zVROM-woQp\" -j MARK --set-xmark 0x40000/0x40000\r\n"} +{"Time":"2023-05-31T12:35:29.725542-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:PWuxTAIaFCtsg5Qa\" -m mark --mark 0x40000/0x40000 -j cali-rpf-skip\r\n"} +{"Time":"2023-05-31T12:35:29.725545-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:fSSbGND7dgyemWU7\" -m mark --mark 0x40000/0x40000 -m rpfilter --validmark --invert -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.725547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:ImU0-4Rl2WoOI9Ou\" -m mark --mark 0x0/0x40000 -j cali-from-host-endpoint\r\n"} +{"Time":"2023-05-31T12:35:29.725549-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:lV4V2MPoMBf0hl9T\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.725551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:35:29.725554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Completed on Wed May 31 19:35:19 2023\r\n"} +{"Time":"2023-05-31T12:35:29.725556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:35:19 2023\r\n"} +{"Time":"2023-05-31T12:35:29.725558-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:35:29.72556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :PREROUTING ACCEPT [182:12239]\r\n"} +{"Time":"2023-05-31T12:35:29.725562-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :INPUT ACCEPT [14939:55299142]\r\n"} +{"Time":"2023-05-31T12:35:29.725564-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :FORWARD ACCEPT [35:2810]\r\n"} +{"Time":"2023-05-31T12:35:29.725566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :OUTPUT ACCEPT [13527:5043733]\r\n"} +{"Time":"2023-05-31T12:35:29.725568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :POSTROUTING ACCEPT [13561:5046455]\r\n"} +{"Time":"2023-05-31T12:35:29.72557-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725723-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725726-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-PREROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725731-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725733-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m comment --comment \"cali:6gwbT8clXdHdC1b1\" -j cali-PREROUTING\r\n"} +{"Time":"2023-05-31T12:35:29.725737-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A POSTROUTING -m comment --comment \"cali:O3lYWMrLQYEMJtB5\" -j cali-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:35:29.72574-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:NX-7roTexQ3fGRfU\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.725742-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:nnqPh8lh2VOogSzX\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T12:35:29.725744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:nquN8Jw8Tz72pcBW\" -m conntrack --ctstate DNAT -j cali-to-host-endpoint\r\n"} +{"Time":"2023-05-31T12:35:29.725746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:jWrgvDQ0xEZHmta3\" -m comment --comment \"Host endpoint policy accepted packet.\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.725749-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:6BJqBjBC7crtA-7-\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.725751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:KX7AGNd6rMcDUai6\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.725753-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:wNH7KsA3ILKJBsY9\" -j cali-from-host-endpoint\r\n"} +{"Time":"2023-05-31T12:35:29.725755-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:Cg96MgVuoPm7UMRo\" -m comment --comment \"Host endpoint policy accepted packet.\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.725757-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:35:29.725759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Completed on Wed May 31 19:35:19 2023\r\n"} +{"Time":"2023-05-31T12:35:29.725761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:35:19 2023\r\n"} +{"Time":"2023-05-31T12:35:29.725764-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:35:29.725765-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :INPUT ACCEPT [6653:1722222]\r\n"} +{"Time":"2023-05-31T12:35:29.725767-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :FORWARD ACCEPT [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725926-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :OUTPUT ACCEPT [6665:2108436]\r\n"} +{"Time":"2023-05-31T12:35:29.72593-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725933-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725935-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725937-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725941-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725943-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725945-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725947-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725949-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725956-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725958-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-INPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.72596-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725961-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-cidr-block - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-hep-forward - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725968-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-wl-dispatch - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.72597-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fw-cali1ce0d62fe56 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725972-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fw-cali48cab21d877 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fw-cali6ab2acc5004 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-_PTRGc0U-L5Kz7V6ERW - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.725978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-_u2Tn2rSoAPffvE7JO6 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.72598-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-kns.default - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726112-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-kns.kube-system - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726114-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-ksa.default.default - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726117-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-_PTRGc0U-L5Kz7V6ERW - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726119-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-_u2Tn2rSoAPffvE7JO6 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726121-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-kns.default - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726123-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-kns.kube-system - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726125-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-ksa.default.default - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726127-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-hep-forward - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-wl-dispatch - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726133-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-tw-cali1ce0d62fe56 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-tw-cali48cab21d877 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-tw-cali6ab2acc5004 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726138-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-wl-to-host - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.726141-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -m comment --comment \"cali:Cz_u1IQiXIMmKD4c\" -j cali-INPUT\r\n"} +{"Time":"2023-05-31T12:35:29.726144-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:35:29.726146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:35:29.726149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:35:29.726151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:35:29.726154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m comment --comment \"cali:wUHhoiAYhphO9Mso\" -j cali-FORWARD\r\n"} +{"Time":"2023-05-31T12:35:29.726157-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:35:29.72616-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:35:29.726162-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:35:29.726318-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:35:29.726321-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:35:29.726323-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:35:29.726325-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:35:29.726329-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726334-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m comment --comment \"cali:S93hcgKJrXEqnTfs\" -m comment --comment \"Policy explicitly accepted packet.\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726336-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m comment --comment \"cali:mp77cMpurHhyjLrM\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.726339-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m comment --comment \"cali:tVnHkvAo15HuiPy0\" -j cali-OUTPUT\r\n"} +{"Time":"2023-05-31T12:35:29.726341-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:35:29.726343-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:35:29.726345-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:35:29.726347-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:35:29.726349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.726351-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726353-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.726355-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.726357-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.72636-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726516-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726518-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726521-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -m comment --comment \"cali:vjrMJCRpqwy5oRoX\" -j MARK --set-xmark 0x0/0xe0000\r\n"} +{"Time":"2023-05-31T12:35:29.726523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -m comment --comment \"cali:A_sPAO0mcxbT9mOV\" -m mark --mark 0x0/0x10000 -j cali-from-hep-forward\r\n"} +{"Time":"2023-05-31T12:35:29.726525-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -i cali+ -m comment --comment \"cali:8ZoYfO5HKXWbB3pk\" -j cali-from-wl-dispatch\r\n"} +{"Time":"2023-05-31T12:35:29.726527-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -o cali+ -m comment --comment \"cali:jdEuaPBe14V2hutn\" -j cali-to-wl-dispatch\r\n"} +{"Time":"2023-05-31T12:35:29.726529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -m comment --comment \"cali:12bc6HljsMKsmfr-\" -j cali-to-hep-forward\r\n"} +{"Time":"2023-05-31T12:35:29.726531-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -m comment --comment \"cali:NOSxoaGx8OIstr1z\" -j cali-cidr-block\r\n"} +{"Time":"2023-05-31T12:35:29.726534-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -p ipencap -m comment --comment \"cali:PajejrV4aFdkZojI\" -m comment --comment \"Allow IPIP packets from Calico hosts\" -m set --match-set cali40all-hosts-net src -m addrtype --dst-type LOCAL -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -p ipencap -m comment --comment \"cali:_wjq-Yrma8Ly1Svo\" -m comment --comment \"Drop IPIP packets from non-Calico hosts\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726538-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -i cali+ -m comment --comment \"cali:8TZGxLWh_Eiz66wc\" -g cali-wl-to-host\r\n"} +{"Time":"2023-05-31T12:35:29.726541-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -m comment --comment \"cali:6McIeIDvPdL6PE1T\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726543-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -m comment --comment \"cali:YGPbrUms7NId8xVa\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T12:35:29.726545-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -m comment --comment \"cali:2gmY7Bg2i0i84Wk_\" -j cali-from-host-endpoint\r\n"} +{"Time":"2023-05-31T12:35:29.726547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -m comment --comment \"cali:q-Vz2ZT9iGE331LL\" -m comment --comment \"Host endpoint policy accepted packet.\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.72655-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:Mq1_rAdXXH3YkrzW\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726552-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -o cali+ -m comment --comment \"cali:69FkRTJDvD5Vu6Vl\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.726703-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -p ipencap -m comment --comment \"cali:AnEsmO6bDZbQntWW\" -m comment --comment \"Allow IPIP packets to other Calico hosts\" -m set --match-set cali40all-hosts-net dst -m addrtype --src-type LOCAL -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726706-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:9e9Uf3GU5tX--Lxy\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T12:35:29.726708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:0f3LDz_VKuHFaA2K\" -m conntrack ! --ctstate DNAT -j cali-to-host-endpoint\r\n"} +{"Time":"2023-05-31T12:35:29.726711-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:OgU2f8BVEAZ_fwkq\" -m comment --comment \"Host endpoint policy accepted packet.\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726714-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-from-wl-dispatch -i cali1ce0d62fe56 -m comment --comment \"cali:VZAeGRgi-kswMKjk\" -g cali-fw-cali1ce0d62fe56\r\n"} +{"Time":"2023-05-31T12:35:29.726716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-from-wl-dispatch -i cali48cab21d877 -m comment --comment \"cali:UKL5cxf15y5A-PaT\" -g cali-fw-cali48cab21d877\r\n"} +{"Time":"2023-05-31T12:35:29.726719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-from-wl-dispatch -i cali6ab2acc5004 -m comment --comment \"cali:7pqW-DoXsST7gLrJ\" -g cali-fw-cali6ab2acc5004\r\n"} +{"Time":"2023-05-31T12:35:29.726721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-from-wl-dispatch -m comment --comment \"cali:7xAjpakZIu1IQkck\" -m comment --comment \"Unknown interface\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726723-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -m comment --comment \"cali:PiyrxpLk8AELbfFb\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726725-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -m comment --comment \"cali:QWwYbQE-KztoF-p_\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726728-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -m comment --comment \"cali:ZnmWPdHVaPRQlmeS\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.72673-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -p udp -m comment --comment \"cali:x6u3Y69Pxz5giZ7Q\" -m comment --comment \"Drop VXLAN encapped packets originating in workloads\" -m multiport --dports 4789 -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -p ipencap -m comment --comment \"cali:tIMkO0EPx8bA6Vgw\" -m comment --comment \"Drop IPinIP encapped packets originating in workloads\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726734-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -m comment --comment \"cali:gQvsZGDYVjScdTRJ\" -j cali-pro-kns.default\r\n"} +{"Time":"2023-05-31T12:35:29.726737-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -m comment --comment \"cali:6j8vxIihMJWVVGlZ\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.726903-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -m comment --comment \"cali:gVuechWQJfaC4r80\" -j cali-pro-ksa.default.default\r\n"} +{"Time":"2023-05-31T12:35:29.726908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -m comment --comment \"cali:vH1zfFJo4Fdcm0sZ\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.726911-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali1ce0d62fe56 -m comment --comment \"cali:F8ydSf2I7iyJwZei\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726914-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -m comment --comment \"cali:y4rYHbkB9m1dpzVR\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726916-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -m comment --comment \"cali:dpXQVUuTM35icVoo\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726918-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -m comment --comment \"cali:6niuR7xC0K88LfPw\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.726921-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -p udp -m comment --comment \"cali:skg79VJykO6Pkbfn\" -m comment --comment \"Drop VXLAN encapped packets originating in workloads\" -m multiport --dports 4789 -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726923-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -p ipencap -m comment --comment \"cali:cUESTdgFMJEpkAuK\" -m comment --comment \"Drop IPinIP encapped packets originating in workloads\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726928-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -m comment --comment \"cali:RtDLf3PKIByI6YBL\" -j cali-pro-kns.kube-system\r\n"} +{"Time":"2023-05-31T12:35:29.726931-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -m comment --comment \"cali:O8JAKe2B4aFXQ9Fi\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.726934-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -m comment --comment \"cali:Of7t8TJVsv6_4DPT\" -j cali-pro-_u2Tn2rSoAPffvE7JO6\r\n"} +{"Time":"2023-05-31T12:35:29.726937-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -m comment --comment \"cali:1XeFqQm0J8y11yq5\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.726939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali48cab21d877 -m comment --comment \"cali:B6_z5Bsm37WoG9Hh\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.726941-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -m comment --comment \"cali:WRtpeHEOaFBG4ccK\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.726943-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -m comment --comment \"cali:77R9QzGvJfA2eW2Y\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727137-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -m comment --comment \"cali:QHedskLVMfs4qpIi\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.727141-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -p udp -m comment --comment \"cali:Sc-wtrhHNQULc-r4\" -m comment --comment \"Drop VXLAN encapped packets originating in workloads\" -m multiport --dports 4789 -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727144-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -p ipencap -m comment --comment \"cali:tkR8CrKHXox7uCoL\" -m comment --comment \"Drop IPinIP encapped packets originating in workloads\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -m comment --comment \"cali:qYZLNRckQzPdfbyh\" -j cali-pro-kns.kube-system\r\n"} +{"Time":"2023-05-31T12:35:29.727148-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -m comment --comment \"cali:p7pdJqqMmZPz42uy\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -m comment --comment \"cali:qhzAW-AG8cRarrRm\" -j cali-pro-_PTRGc0U-L5Kz7V6ERW\r\n"} +{"Time":"2023-05-31T12:35:29.727153-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -m comment --comment \"cali:swLGtH3BmltwMRyH\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali6ab2acc5004 -m comment --comment \"cali:LW6Ce8MnJ8mRo94K\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-_PTRGc0U-L5Kz7V6ERW -m comment --comment \"cali:g4z4yZxg6IEqYbOs\" -m comment --comment \"Profile ksa.kube-system.calico-kube-controllers ingress\"\r\n"} +{"Time":"2023-05-31T12:35:29.727161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-_u2Tn2rSoAPffvE7JO6 -m comment --comment \"cali:WqgznqAQ-uYV0oBx\" -m comment --comment \"Profile ksa.kube-system.coredns ingress\"\r\n"} +{"Time":"2023-05-31T12:35:29.727164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-kns.default -m comment --comment \"cali:WMSw8BmYOknRHfsz\" -m comment --comment \"Profile kns.default ingress\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.727166-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-kns.default -m comment --comment \"cali:z015TBt2tO4F28NC\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727168-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-kns.kube-system -m comment --comment \"cali:J1TyxtHWd0qaBGK-\" -m comment --comment \"Profile kns.kube-system ingress\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.727171-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-kns.kube-system -m comment --comment \"cali:QIB6k7eEKdIg73Jp\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727173-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-ksa.default.default -m comment --comment \"cali:PrckJA84jX_kGp99\" -m comment --comment \"Profile ksa.default.default ingress\"\r\n"} +{"Time":"2023-05-31T12:35:29.727337-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-_PTRGc0U-L5Kz7V6ERW -m comment --comment \"cali:DR9-t6YJRvFY-IdZ\" -m comment --comment \"Profile ksa.kube-system.calico-kube-controllers egress\"\r\n"} +{"Time":"2023-05-31T12:35:29.727339-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-_u2Tn2rSoAPffvE7JO6 -m comment --comment \"cali:0-_UPh39dt5XfhmJ\" -m comment --comment \"Profile ksa.kube-system.coredns egress\"\r\n"} +{"Time":"2023-05-31T12:35:29.727342-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-kns.default -m comment --comment \"cali:Vr81boRqq4V77Sg8\" -m comment --comment \"Profile kns.default egress\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.727344-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-kns.default -m comment --comment \"cali:2CkTlvGj1F9ZRYXl\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727346-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-kns.kube-system -m comment --comment \"cali:tgOR2S8DVHZW3F1M\" -m comment --comment \"Profile kns.kube-system egress\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.727349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-kns.kube-system -m comment --comment \"cali:HVEEtYPJsiGRXCIt\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727351-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-ksa.default.default -m comment --comment \"cali:bUZzZcietq9v5Ybq\" -m comment --comment \"Profile ksa.default.default egress\"\r\n"} +{"Time":"2023-05-31T12:35:29.727354-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-to-wl-dispatch -o cali1ce0d62fe56 -m comment --comment \"cali:c1_g3YVYEVUJr8YH\" -g cali-tw-cali1ce0d62fe56\r\n"} +{"Time":"2023-05-31T12:35:29.727356-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-to-wl-dispatch -o cali48cab21d877 -m comment --comment \"cali:nDHzlnR7laHze8xM\" -g cali-tw-cali48cab21d877\r\n"} +{"Time":"2023-05-31T12:35:29.727359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-to-wl-dispatch -o cali6ab2acc5004 -m comment --comment \"cali:rpzuiNC5XRkV7kDf\" -g cali-tw-cali6ab2acc5004\r\n"} +{"Time":"2023-05-31T12:35:29.727361-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-to-wl-dispatch -m comment --comment \"cali:NwV3cBPfy6foni-m\" -m comment --comment \"Unknown interface\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727363-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali1ce0d62fe56 -m comment --comment \"cali:JL4EdQm5Sxp0nzYK\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.727365-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali1ce0d62fe56 -m comment --comment \"cali:8Av2Ch8DJ8Rw5eEF\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727368-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali1ce0d62fe56 -m comment --comment \"cali:XL8MLGqe8HN74FmL\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.72737-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali1ce0d62fe56 -m comment --comment \"cali:H-7CRN42R-M68iIP\" -j cali-pri-kns.default\r\n"} +{"Time":"2023-05-31T12:35:29.727626-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali1ce0d62fe56 -m comment --comment \"cali:IcO59xx5aB5bLiJq\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727633-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali1ce0d62fe56 -m comment --comment \"cali:862HGAcXsKCG5ctT\" -j cali-pri-ksa.default.default\r\n"} +{"Time":"2023-05-31T12:35:29.727636-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali1ce0d62fe56 -m comment --comment \"cali:c8NqqTEdJr0l-qcG\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727638-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali1ce0d62fe56 -m comment --comment \"cali:5dnDzg9EMlI1nMN8\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727641-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali48cab21d877 -m comment --comment \"cali:o0d1D2DPWttYhFoH\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.727643-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali48cab21d877 -m comment --comment \"cali:HrT-w9ccKspgA4k_\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727645-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali48cab21d877 -m comment --comment \"cali:3H4jw1psJ1DKVU2-\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.727648-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali48cab21d877 -m comment --comment \"cali:3x_pK33su1nfZG1e\" -j cali-pri-kns.kube-system\r\n"} +{"Time":"2023-05-31T12:35:29.72765-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali48cab21d877 -m comment --comment \"cali:kwYw3I0CV7lfLoXV\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727652-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali48cab21d877 -m comment --comment \"cali:oN4iOLAUpyVn2CgN\" -j cali-pri-_u2Tn2rSoAPffvE7JO6\r\n"} +{"Time":"2023-05-31T12:35:29.727655-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali48cab21d877 -m comment --comment \"cali:UJf4PE_1QhjG9J5H\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali48cab21d877 -m comment --comment \"cali:W3aiYhGI_gCoz77z\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali6ab2acc5004 -m comment --comment \"cali:Xe6l7KDvWNu4oEbj\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.727662-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali6ab2acc5004 -m comment --comment \"cali:rIq9qKZbLQh3ytWG\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727664-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali6ab2acc5004 -m comment --comment \"cali:VAUyWmqfLTskB-1L\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T12:35:29.727666-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali6ab2acc5004 -m comment --comment \"cali:9P9-unqlVaw_innV\" -j cali-pri-kns.kube-system\r\n"} +{"Time":"2023-05-31T12:35:29.727959-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali6ab2acc5004 -m comment --comment \"cali:uFCEscczoM1ybNWr\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali6ab2acc5004 -m comment --comment \"cali:uWvQbtVgQuWF7fvy\" -j cali-pri-_PTRGc0U-L5Kz7V6ERW\r\n"} +{"Time":"2023-05-31T12:35:29.727967-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali6ab2acc5004 -m comment --comment \"cali:vJ8w3_TQqJf-sP4v\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.727969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali6ab2acc5004 -m comment --comment \"cali:jGgLZMBuuMxO0z--\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T12:35:29.727972-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-wl-to-host -m comment --comment \"cali:Ee9Sbo10IpVujdIY\" -j cali-from-wl-dispatch\r\n"} +{"Time":"2023-05-31T12:35:29.727975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-wl-to-host -m comment --comment \"cali:nSZbcOoG1xPONxb8\" -m comment --comment \"Configured DefaultEndpointToHostAction\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:35:29.727978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:35:29.72798-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Completed on Wed May 31 19:35:19 2023\r\n"} +{"Time":"2023-05-31T12:35:29.727982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:35:19 2023\r\n"} +{"Time":"2023-05-31T12:35:29.727984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:35:29.727986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:35:29.727988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:35:29.72799-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :OUTPUT ACCEPT [51:3060]\r\n"} +{"Time":"2023-05-31T12:35:29.727992-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :POSTROUTING ACCEPT [60:3735]\r\n"} +{"Time":"2023-05-31T12:35:29.727994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.727997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.727999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728002-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728005-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-AVKG35NOHHKPUPTG - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.72812-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-F26PXU4Z4IVDVY3V - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728127-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-M66F6TD25XSFZOMV - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-U2IFKKYZBGBL35KQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728134-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-YTGO7XSDH2ZTMYIB - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728137-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.72814-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.72815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728153-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728157-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.72816-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-PREROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728167-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fip-dnat - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.72817-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fip-snat - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728173-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-nat-outgoing - [0:0]\r\n"} +{"Time":"2023-05-31T12:35:29.728176-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m comment --comment \"cali:6gwbT8clXdHdC1b1\" -j cali-PREROUTING\r\n"} +{"Time":"2023-05-31T12:35:29.728179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:35:29.728183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:35:29.728188-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:35:29.728195-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m comment --comment \"cali:tVnHkvAo15HuiPy0\" -j cali-OUTPUT\r\n"} +{"Time":"2023-05-31T12:35:29.728201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:35:29.728208-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:35:29.728212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:35:29.728434-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A POSTROUTING -m comment --comment \"cali:O3lYWMrLQYEMJtB5\" -j cali-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:35:29.72844-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:35:29.728443-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:35:29.728457-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:35:29.728459-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.728468-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:39129\r\n"} +{"Time":"2023-05-31T12:35:29.728472-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:44326\r\n"} +{"Time":"2023-05-31T12:35:29.728475-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 39129 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:35:29.728481-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 44326 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:35:29.728483-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:35:29.728501-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:35:29.728504-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:35:29.728506-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:35:29.728508-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-AVKG35NOHHKPUPTG -s 10.244.91.1/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.728511-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-AVKG35NOHHKPUPTG -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.91.1:53\r\n"} +{"Time":"2023-05-31T12:35:29.728513-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-F26PXU4Z4IVDVY3V -s 10.244.91.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.728515-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-F26PXU4Z4IVDVY3V -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.91.3:8080\r\n"} +{"Time":"2023-05-31T12:35:29.728517-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -s 192.168.76.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.72852-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:35:29.728738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-U2IFKKYZBGBL35KQ -s 10.244.91.1/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.728744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-U2IFKKYZBGBL35KQ -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.91.1:53\r\n"} +{"Time":"2023-05-31T12:35:29.728746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-YTGO7XSDH2ZTMYIB -s 10.244.91.1/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.728749-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-YTGO7XSDH2ZTMYIB -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.91.1:9153\r\n"} +{"Time":"2023-05-31T12:35:29.728751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:35:29.728753-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:35:29.728756-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:35:29.728758-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:35:29.72876-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.102.247.5/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:35:29.728763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:35:29.728766-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.728768-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.91.1:53\" -j KUBE-SEP-AVKG35NOHHKPUPTG\r\n"} +{"Time":"2023-05-31T12:35:29.728771-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.728773-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.91.1:9153\" -j KUBE-SEP-YTGO7XSDH2ZTMYIB\r\n"} +{"Time":"2023-05-31T12:35:29.728775-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.729015-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.76.2:8443\" -j KUBE-SEP-M66F6TD25XSFZOMV\r\n"} +{"Time":"2023-05-31T12:35:29.72905-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.729057-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.91.1:53\" -j KUBE-SEP-U2IFKKYZBGBL35KQ\r\n"} +{"Time":"2023-05-31T12:35:29.72906-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.102.247.5/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:35:29.729064-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.91.3:8080\" -j KUBE-SEP-F26PXU4Z4IVDVY3V\r\n"} +{"Time":"2023-05-31T12:35:29.729067-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:GBTAv2p5CwevEyJm\" -j cali-fip-dnat\r\n"} +{"Time":"2023-05-31T12:35:29.729071-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:Z-c7XtVd2Bq7s_hA\" -j cali-fip-snat\r\n"} +{"Time":"2023-05-31T12:35:29.729075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:nYKhEzDlr11Jccal\" -j cali-nat-outgoing\r\n"} +{"Time":"2023-05-31T12:35:29.729078-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -o tunl0 -m comment --comment \"cali:SXWvdsbh4Mw7wOln\" -m addrtype ! --src-type LOCAL --limit-iface-out -m addrtype --src-type LOCAL -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:35:29.729081-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:r6XmIziWUJsdOK6Z\" -j cali-fip-dnat\r\n"} +{"Time":"2023-05-31T12:35:29.729085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-nat-outgoing -m comment --comment \"cali:flqWnvo8yq4ULQLa\" -m set --match-set cali40masq-ipam-pools src -m set ! --match-set cali40all-ipam-pools dst -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:35:29.729088-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:35:29.729092-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Completed on Wed May 31 19:35:19 2023\r\n"} +{"Time":"2023-05-31T12:35:29.729095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.729098-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.729101-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:35:29.729103-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:35:29.729106-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.72929-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 51 3195 cali-PREROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:6gwbT8clXdHdC1b1 */\r\n"} +{"Time":"2023-05-31T12:35:29.729295-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 54 3400 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:35:29.729297-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 85 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:35:29.7293-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 44 2640 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:35:29.729302-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729304-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:35:29.729307-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729309-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729311-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain OUTPUT (policy ACCEPT 52 packets, 3120 bytes)\r\n"} +{"Time":"2023-05-31T12:35:29.729313-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729315-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 205 15004 cali-OUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:tVnHkvAo15HuiPy0 */\r\n"} +{"Time":"2023-05-31T12:35:29.729317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 522 37877 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:35:29.72932-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 152 12518 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:35:29.729322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 118 7080 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:35:29.729324-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729326-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain POSTROUTING (policy ACCEPT 61 packets, 3795 bytes)\r\n"} +{"Time":"2023-05-31T12:35:29.729328-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.72933-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 215 15739 cali-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:O3lYWMrLQYEMJtB5 */\r\n"} +{"Time":"2023-05-31T12:35:29.729332-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 531 38552 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:35:29.729532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:35:29.72954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:35:29.729543-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729545-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:35:29.729547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729549-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:35:29.729551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729553-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:35:29.729555-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729557-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:39129\r\n"} +{"Time":"2023-05-31T12:35:29.729559-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 153 12603 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:44326\r\n"} +{"Time":"2023-05-31T12:35:29.729562-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729564-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.729566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:39129 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:35:29.729571-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:44326 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:35:29.729573-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729575-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:35:29.729577-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729579-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729581-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:35:29.729583-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.72977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:35:29.729775-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729778-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.72978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729782-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729784-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.729786-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729789-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 61 3795 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:35:29.729791-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:35:29.729793-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:35:29.729795-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729797-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:35:29.729799-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729802-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729804-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-AVKG35NOHHKPUPTG (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.729806-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.729808-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.91.1 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:35:29.72981-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.91.1:53\r\n"} +{"Time":"2023-05-31T12:35:29.729812-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.729815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-F26PXU4Z4IVDVY3V (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730036-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730042-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.91.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:35:29.730044-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.91.3:8080\r\n"} +{"Time":"2023-05-31T12:35:29.730047-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-M66F6TD25XSFZOMV (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730053-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 17 1020 KUBE-MARK-MASQ all -- * * 192.168.76.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:35:29.730056-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 19 1140 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:35:29.730059-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-U2IFKKYZBGBL35KQ (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730063-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730066-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.91.1 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:35:29.730068-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.91.1:53\r\n"} +{"Time":"2023-05-31T12:35:29.73007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730072-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-YTGO7XSDH2ZTMYIB (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730077-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.91.1 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:35:29.730079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.91.1:9153\r\n"} +{"Time":"2023-05-31T12:35:29.730082-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730293-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730297-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730299-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:35:29.730302-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:35:29.730304-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:35:29.730306-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:35:29.730309-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.102.247.5 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:35:29.730311-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 87 5220 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:35:29.730314-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730316-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730319-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730321-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:35:29.730324-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-SEP-AVKG35NOHHKPUPTG all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.91.1:53 */\r\n"} +{"Time":"2023-05-31T12:35:29.730327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730329-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730333-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:35:29.730511-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-SEP-YTGO7XSDH2ZTMYIB all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.91.1:9153 */\r\n"} +{"Time":"2023-05-31T12:35:29.730517-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730519-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730521-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730524-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 17 1020 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:35:29.730526-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 19 1140 KUBE-SEP-M66F6TD25XSFZOMV all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.76.2:8443 */\r\n"} +{"Time":"2023-05-31T12:35:29.730529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730531-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730533-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730535-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:35:29.730537-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8 615 KUBE-SEP-U2IFKKYZBGBL35KQ all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.91.1:53 */\r\n"} +{"Time":"2023-05-31T12:35:29.730539-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730542-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730544-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.102.247.5 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:35:29.730549-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-SEP-F26PXU4Z4IVDVY3V all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.91.3:8080 */\r\n"} +{"Time":"2023-05-31T12:35:29.730551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730553-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-OUTPUT (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730555-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730717-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 205 15004 cali-fip-dnat all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:GBTAv2p5CwevEyJm */\r\n"} +{"Time":"2023-05-31T12:35:29.730722-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730724-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730726-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730728-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 215 15739 cali-fip-snat all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:Z-c7XtVd2Bq7s_hA */\r\n"} +{"Time":"2023-05-31T12:35:29.730732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 215 15739 cali-nat-outgoing all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:nYKhEzDlr11Jccal */\r\n"} +{"Time":"2023-05-31T12:35:29.730734-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 MASQUERADE all -- * tunl0 0.0.0.0/0 0.0.0.0/0 /* cali:SXWvdsbh4Mw7wOln */ ADDRTYPE match src-type !LOCAL limit-out ADDRTYPE match src-type LOCAL random-fully\r\n"} +{"Time":"2023-05-31T12:35:29.730736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-PREROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730741-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 51 3195 cali-fip-dnat all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:r6XmIziWUJsdOK6Z */\r\n"} +{"Time":"2023-05-31T12:35:29.730746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730748-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-fip-dnat (2 references)\r\n"} +{"Time":"2023-05-31T12:35:29.73075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730754-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-fip-snat (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730756-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.730761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-nat-outgoing (1 references)\r\n"} +{"Time":"2023-05-31T12:35:29.730763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:35:29.730902-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:flqWnvo8yq4ULQLa */ match-set cali40masq-ipam-pools src ! match-set cali40all-ipam-pools dst random-fully\r\n"} +{"Time":"2023-05-31T12:35:29.730905-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.730907-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.730909-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico daemon set:\n"} +{"Time":"2023-05-31T12:35:29.730912-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-node\n"} +{"Time":"2023-05-31T12:35:29.730914-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: k8s-app=calico-node\n"} +{"Time":"2023-05-31T12:35:29.730916-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:35:29.730918-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-node\n"} +{"Time":"2023-05-31T12:35:29.73092-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:35:29.730922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:35:29.730924-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:35:29.730926-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:35:29.730928-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:35:29.730931-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:35:29.730933-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:35:29.730935-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:35:29.730937-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-node\n"} +{"Time":"2023-05-31T12:35:29.73094-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: calico-node\n"} +{"Time":"2023-05-31T12:35:29.730942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Init Containers:\n"} +{"Time":"2023-05-31T12:35:29.730944-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" upgrade-ipam:\n"} +{"Time":"2023-05-31T12:35:29.730946-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/cni:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.730948-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.73095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.731056-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.731058-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /opt/cni/bin/calico-ipam\n"} +{"Time":"2023-05-31T12:35:29.73106-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -upgrade\n"} +{"Time":"2023-05-31T12:35:29.731062-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T12:35:29.731064-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T12:35:29.731066-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.731068-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KUBERNETES_NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:35:29.73107-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_NETWORKING_BACKEND: \u003cset to the key 'calico_backend' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.731073-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.731075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/opt/cni/bin from cni-bin-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.731077-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/cni/networks from host-local-net-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.731079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" install-cni:\n"} +{"Time":"2023-05-31T12:35:29.731081-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/cni:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.731083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.731085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.731087-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.731089-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /opt/cni/bin/install\n"} +{"Time":"2023-05-31T12:35:29.731091-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T12:35:29.731093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T12:35:29.731095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.731097-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_CONF_NAME: 10-calico.conflist\n"} +{"Time":"2023-05-31T12:35:29.731099-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_NETWORK_CONFIG: \u003cset to the key 'cni_network_config' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.731101-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KUBERNETES_NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:35:29.731103-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_MTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.731235-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SLEEP: false\n"} +{"Time":"2023-05-31T12:35:29.731237-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.731239-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/etc/cni/net.d from cni-net-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.731241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/opt/cni/bin from cni-bin-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.731243-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mount-bpffs:\n"} +{"Time":"2023-05-31T12:35:29.731245-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/node:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.731247-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.731249-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.731251-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.731254-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-node\n"} +{"Time":"2023-05-31T12:35:29.731256-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -init\n"} +{"Time":"2023-05-31T12:35:29.731258-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -best-effort\n"} +{"Time":"2023-05-31T12:35:29.73126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.731262-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.731264-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /nodeproc from nodeproc (ro)\n"} +{"Time":"2023-05-31T12:35:29.731266-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /sys/fs from sys-fs (rw)\n"} +{"Time":"2023-05-31T12:35:29.731268-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/calico from var-run-calico (rw)\n"} +{"Time":"2023-05-31T12:35:29.73127-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.731272-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-node:\n"} +{"Time":"2023-05-31T12:35:29.731274-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/node:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.731276-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.731278-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.73128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T12:35:29.731282-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:35:29.731285-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: exec [/bin/calico-node -felix-live -bird-live] delay=10s timeout=10s period=10s #success=1 #failure=6\n"} +{"Time":"2023-05-31T12:35:29.731417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: exec [/bin/calico-node -felix-ready -bird-ready] delay=0s timeout=10s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:35:29.731421-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T12:35:29.731425-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T12:35:29.731427-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.731436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DATASTORE_TYPE: kubernetes\n"} +{"Time":"2023-05-31T12:35:29.731441-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WAIT_FOR_DATASTORE: true\n"} +{"Time":"2023-05-31T12:35:29.731443-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NODENAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:35:29.731445-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_NETWORKING_BACKEND: \u003cset to the key 'calico_backend' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.731448-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CLUSTER_TYPE: k8s,bgp\n"} +{"Time":"2023-05-31T12:35:29.73145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: autodetect\n"} +{"Time":"2023-05-31T12:35:29.731452-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_IPIP: Always\n"} +{"Time":"2023-05-31T12:35:29.731454-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_VXLAN: Never\n"} +{"Time":"2023-05-31T12:35:29.731456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV6POOL_VXLAN: Never\n"} +{"Time":"2023-05-31T12:35:29.731458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_IPINIPMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.731461-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_VXLANMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.731463-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_WIREGUARDMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.731465-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:35:29.731467-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_DISABLE_FILE_LOGGING: true\n"} +{"Time":"2023-05-31T12:35:29.73147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_DEFAULTENDPOINTTOHOSTACTION: ACCEPT\n"} +{"Time":"2023-05-31T12:35:29.731472-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_IPV6SUPPORT: false\n"} +{"Time":"2023-05-31T12:35:29.731474-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_HEALTHENABLED: true\n"} +{"Time":"2023-05-31T12:35:29.73159-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.731593-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/etc/cni/net.d from cni-net-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.731595-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:35:29.731597-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:35:29.731599-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /sys/fs/bpf from bpffs (rw)\n"} +{"Time":"2023-05-31T12:35:29.731602-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/calico from var-lib-calico (rw)\n"} +{"Time":"2023-05-31T12:35:29.731603-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/log/calico/cni from cni-log-dir (ro)\n"} +{"Time":"2023-05-31T12:35:29.731606-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/calico from var-run-calico (rw)\n"} +{"Time":"2023-05-31T12:35:29.731608-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/nodeagent from policysync (rw)\n"} +{"Time":"2023-05-31T12:35:29.73161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.731612-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:35:29.731614-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.731616-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:35:29.731618-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.73162-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" var-run-calico:\n"} +{"Time":"2023-05-31T12:35:29.731622-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.731624-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/run/calico\n"} +{"Time":"2023-05-31T12:35:29.731626-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.731628-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" var-lib-calico:\n"} +{"Time":"2023-05-31T12:35:29.73163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.731632-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/calico\n"} +{"Time":"2023-05-31T12:35:29.731634-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.731636-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:35:29.731638-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.73164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:35:29.731642-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:35:29.731826-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sys-fs:\n"} +{"Time":"2023-05-31T12:35:29.73183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.731833-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /sys/fs/\n"} +{"Time":"2023-05-31T12:35:29.731835-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.731837-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bpffs:\n"} +{"Time":"2023-05-31T12:35:29.731839-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.731841-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /sys/fs/bpf\n"} +{"Time":"2023-05-31T12:35:29.731843-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: Directory\n"} +{"Time":"2023-05-31T12:35:29.731845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeproc:\n"} +{"Time":"2023-05-31T12:35:29.731847-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.73185-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /proc\n"} +{"Time":"2023-05-31T12:35:29.731852-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.731854-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-bin-dir:\n"} +{"Time":"2023-05-31T12:35:29.731856-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.731858-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T12:35:29.73186-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.731862-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-net-dir:\n"} +{"Time":"2023-05-31T12:35:29.731864-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.731866-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:35:29.731868-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.73187-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-log-dir:\n"} +{"Time":"2023-05-31T12:35:29.731872-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.731874-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/log/calico/cni\n"} +{"Time":"2023-05-31T12:35:29.731876-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.731878-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" host-local-net-dir:\n"} +{"Time":"2023-05-31T12:35:29.73188-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.732111-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/cni/networks\n"} +{"Time":"2023-05-31T12:35:29.732113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.732115-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" policysync:\n"} +{"Time":"2023-05-31T12:35:29.732117-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.732119-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/run/nodeagent\n"} +{"Time":"2023-05-31T12:35:29.732121-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.732123-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:35:29.732125-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.732127-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.732129-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.732132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal SuccessfulCreate 64s daemonset-controller Created pod: calico-node-2h2zk\n"} +{"Time":"2023-05-31T12:35:29.732134-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.732136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.732139-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico daemon set pod(s):\n"} +{"Time":"2023-05-31T12:35:29.732141-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-node-2h2zk\n"} +{"Time":"2023-05-31T12:35:29.732144-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.732146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:35:29.732148-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:35:29.73215-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: calico-node\n"} +{"Time":"2023-05-31T12:35:29.732152-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.732154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 12:34:16 -0700\n"} +{"Time":"2023-05-31T12:35:29.732156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: controller-revision-hash=785457b4dc\n"} +{"Time":"2023-05-31T12:35:29.732158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" k8s-app=calico-node\n"} +{"Time":"2023-05-31T12:35:29.73216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:35:29.732353-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.732359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:35:29.732361-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.732364-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T12:35:29.732367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.732369-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: DaemonSet/calico-node\n"} +{"Time":"2023-05-31T12:35:29.732371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Init Containers:\n"} +{"Time":"2023-05-31T12:35:29.732388-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" upgrade-ipam:\n"} +{"Time":"2023-05-31T12:35:29.732391-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://19eafcb2e9ec1cd723f8bb5de3b8bd22413929e3c69e7d8e2afcea7c88626401\n"} +{"Time":"2023-05-31T12:35:29.732394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/cni:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.732396-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://calico/cni@sha256:9a2c99f0314053aa11e971bd5d72e17951767bf5c6ff1fd9c38c4582d7cb8a0a\n"} +{"Time":"2023-05-31T12:35:29.732398-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.7324-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.732402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.732404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /opt/cni/bin/calico-ipam\n"} +{"Time":"2023-05-31T12:35:29.732406-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -upgrade\n"} +{"Time":"2023-05-31T12:35:29.732409-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Terminated\n"} +{"Time":"2023-05-31T12:35:29.732412-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:35:29.732414-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:35:29.732416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:24 -0700\n"} +{"Time":"2023-05-31T12:35:29.732418-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Finished: Wed, 31 May 2023 12:34:24 -0700\n"} +{"Time":"2023-05-31T12:35:29.73242-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.732422-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:35:29.732424-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T12:35:29.732426-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T12:35:29.732541-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.732546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KUBERNETES_NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:35:29.732549-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_NETWORKING_BACKEND: \u003cset to the key 'calico_backend' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.732551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.732553-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/opt/cni/bin from cni-bin-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.732555-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/cni/networks from host-local-net-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.732557-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-cpwwd (ro)\n"} +{"Time":"2023-05-31T12:35:29.732559-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" install-cni:\n"} +{"Time":"2023-05-31T12:35:29.732561-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://4e9f6b2ebd405734f24e8421eeb704914214060ea0d41d408520335a044abbb1\n"} +{"Time":"2023-05-31T12:35:29.732564-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/cni:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.732566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://calico/cni@sha256:9a2c99f0314053aa11e971bd5d72e17951767bf5c6ff1fd9c38c4582d7cb8a0a\n"} +{"Time":"2023-05-31T12:35:29.732568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.73257-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.732573-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.732576-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /opt/cni/bin/install\n"} +{"Time":"2023-05-31T12:35:29.732581-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Terminated\n"} +{"Time":"2023-05-31T12:35:29.732588-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:35:29.732592-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:35:29.732595-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:25 -0700\n"} +{"Time":"2023-05-31T12:35:29.732597-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Finished: Wed, 31 May 2023 12:34:26 -0700\n"} +{"Time":"2023-05-31T12:35:29.7326-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.732602-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:35:29.732604-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T12:35:29.732606-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T12:35:29.732729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.732732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_CONF_NAME: 10-calico.conflist\n"} +{"Time":"2023-05-31T12:35:29.732735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_NETWORK_CONFIG: \u003cset to the key 'cni_network_config' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.732738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KUBERNETES_NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:35:29.73274-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_MTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.732742-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SLEEP: false\n"} +{"Time":"2023-05-31T12:35:29.732744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.732746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/etc/cni/net.d from cni-net-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.732748-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/opt/cni/bin from cni-bin-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.73275-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-cpwwd (ro)\n"} +{"Time":"2023-05-31T12:35:29.732752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mount-bpffs:\n"} +{"Time":"2023-05-31T12:35:29.732754-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://05d73d24ed40e261cebfdf0ca544ead9f74296130081e6f65bbcb34609931429\n"} +{"Time":"2023-05-31T12:35:29.732756-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/node:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.732759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://calico/node@sha256:0cd00e83d06b3af8cd712ad2c310be07b240235ad7ca1397e04eb14d20dcc20f\n"} +{"Time":"2023-05-31T12:35:29.732761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.732763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.732765-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.732767-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-node\n"} +{"Time":"2023-05-31T12:35:29.732769-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -init\n"} +{"Time":"2023-05-31T12:35:29.732771-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -best-effort\n"} +{"Time":"2023-05-31T12:35:29.732776-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Terminated\n"} +{"Time":"2023-05-31T12:35:29.732778-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:35:29.732781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:35:29.732958-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:41 -0700\n"} +{"Time":"2023-05-31T12:35:29.732963-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Finished: Wed, 31 May 2023 12:34:41 -0700\n"} +{"Time":"2023-05-31T12:35:29.732965-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.732967-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:35:29.732974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.732977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.732979-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /nodeproc from nodeproc (ro)\n"} +{"Time":"2023-05-31T12:35:29.732981-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /sys/fs from sys-fs (rw)\n"} +{"Time":"2023-05-31T12:35:29.732983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/calico from var-run-calico (rw)\n"} +{"Time":"2023-05-31T12:35:29.732985-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-cpwwd (ro)\n"} +{"Time":"2023-05-31T12:35:29.732987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.732989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-node:\n"} +{"Time":"2023-05-31T12:35:29.732991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://376d5b40a0a56cb6f3880128c4b93a03dfe302188138684e9b01f3f118b86a7d\n"} +{"Time":"2023-05-31T12:35:29.732994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/node:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.732996-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://calico/node@sha256:0cd00e83d06b3af8cd712ad2c310be07b240235ad7ca1397e04eb14d20dcc20f\n"} +{"Time":"2023-05-31T12:35:29.732998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.733001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.733004-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T12:35:29.733006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:43 -0700\n"} +{"Time":"2023-05-31T12:35:29.733008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.73301-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:35:29.733013-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T12:35:29.733015-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:35:29.733017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: exec [/bin/calico-node -felix-live -bird-live] delay=10s timeout=10s period=10s #success=1 #failure=6\n"} +{"Time":"2023-05-31T12:35:29.733163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: exec [/bin/calico-node -felix-ready -bird-ready] delay=0s timeout=10s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:35:29.733166-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T12:35:29.733168-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T12:35:29.73317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.733172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DATASTORE_TYPE: kubernetes\n"} +{"Time":"2023-05-31T12:35:29.733174-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WAIT_FOR_DATASTORE: true\n"} +{"Time":"2023-05-31T12:35:29.733177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NODENAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:35:29.733179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_NETWORKING_BACKEND: \u003cset to the key 'calico_backend' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.733181-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CLUSTER_TYPE: k8s,bgp\n"} +{"Time":"2023-05-31T12:35:29.733183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: autodetect\n"} +{"Time":"2023-05-31T12:35:29.733185-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_IPIP: Always\n"} +{"Time":"2023-05-31T12:35:29.733187-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_VXLAN: Never\n"} +{"Time":"2023-05-31T12:35:29.73319-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV6POOL_VXLAN: Never\n"} +{"Time":"2023-05-31T12:35:29.733192-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_IPINIPMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.733194-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_VXLANMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.733196-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_WIREGUARDMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T12:35:29.733199-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:35:29.733201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_DISABLE_FILE_LOGGING: true\n"} +{"Time":"2023-05-31T12:35:29.733203-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_DEFAULTENDPOINTTOHOSTACTION: ACCEPT\n"} +{"Time":"2023-05-31T12:35:29.733205-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_IPV6SUPPORT: false\n"} +{"Time":"2023-05-31T12:35:29.733398-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_HEALTHENABLED: true\n"} +{"Time":"2023-05-31T12:35:29.733402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.733405-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/etc/cni/net.d from cni-net-dir (rw)\n"} +{"Time":"2023-05-31T12:35:29.733407-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:35:29.733409-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:35:29.733411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /sys/fs/bpf from bpffs (rw)\n"} +{"Time":"2023-05-31T12:35:29.733413-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/calico from var-lib-calico (rw)\n"} +{"Time":"2023-05-31T12:35:29.733415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/log/calico/cni from cni-log-dir (ro)\n"} +{"Time":"2023-05-31T12:35:29.733418-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/calico from var-run-calico (rw)\n"} +{"Time":"2023-05-31T12:35:29.73342-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/nodeagent from policysync (rw)\n"} +{"Time":"2023-05-31T12:35:29.733422-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-cpwwd (ro)\n"} +{"Time":"2023-05-31T12:35:29.733424-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.733426-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T12:35:29.733428-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:35:29.73343-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T12:35:29.733439-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:35:29.733445-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:35:29.733447-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.733449-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:35:29.733451-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733454-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:35:29.733455-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.733458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" var-run-calico:\n"} +{"Time":"2023-05-31T12:35:29.73346-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733462-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/run/calico\n"} +{"Time":"2023-05-31T12:35:29.733627-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.733632-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" var-lib-calico:\n"} +{"Time":"2023-05-31T12:35:29.733634-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733637-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/calico\n"} +{"Time":"2023-05-31T12:35:29.733639-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.733641-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:35:29.733643-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733645-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:35:29.733647-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:35:29.733649-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sys-fs:\n"} +{"Time":"2023-05-31T12:35:29.733651-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733653-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /sys/fs/\n"} +{"Time":"2023-05-31T12:35:29.733655-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.733657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bpffs:\n"} +{"Time":"2023-05-31T12:35:29.733659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733661-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /sys/fs/bpf\n"} +{"Time":"2023-05-31T12:35:29.733663-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: Directory\n"} +{"Time":"2023-05-31T12:35:29.733665-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeproc:\n"} +{"Time":"2023-05-31T12:35:29.733667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.73367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /proc\n"} +{"Time":"2023-05-31T12:35:29.733674-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.733676-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-bin-dir:\n"} +{"Time":"2023-05-31T12:35:29.733678-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.73368-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T12:35:29.733682-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.733684-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-net-dir:\n"} +{"Time":"2023-05-31T12:35:29.733838-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.73384-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:35:29.733842-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.733844-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-log-dir:\n"} +{"Time":"2023-05-31T12:35:29.733846-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733848-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/log/calico/cni\n"} +{"Time":"2023-05-31T12:35:29.733851-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.733853-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" host-local-net-dir:\n"} +{"Time":"2023-05-31T12:35:29.733855-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733857-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/cni/networks\n"} +{"Time":"2023-05-31T12:35:29.733859-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.733861-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" policysync:\n"} +{"Time":"2023-05-31T12:35:29.733863-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.733865-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/run/nodeagent\n"} +{"Time":"2023-05-31T12:35:29.733867-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:35:29.733869-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-cpwwd:\n"} +{"Time":"2023-05-31T12:35:29.733871-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:35:29.733874-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:35:29.733876-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.733878-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:35:29.73388-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:35:29.733883-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:35:29.733885-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:35:29.733887-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: :NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734065-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734073-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734077-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.73408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734082-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734084-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734086-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.734088-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.734091-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.734093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.734095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 64s default-scheduler Successfully assigned kube-system/calico-node-2h2zk to calico-996000\n"} +{"Time":"2023-05-31T12:35:29.734097-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulling 63s kubelet Pulling image \"docker.io/calico/cni:v3.25.1\"\n"} +{"Time":"2023-05-31T12:35:29.7341-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 57s kubelet Successfully pulled image \"docker.io/calico/cni:v3.25.1\" in 6.804225643s (6.804377974s including waiting)\n"} +{"Time":"2023-05-31T12:35:29.734102-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 57s kubelet Created container upgrade-ipam\n"} +{"Time":"2023-05-31T12:35:29.734104-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 56s kubelet Started container upgrade-ipam\n"} +{"Time":"2023-05-31T12:35:29.734106-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 56s kubelet Container image \"docker.io/calico/cni:v3.25.1\" already present on machine\n"} +{"Time":"2023-05-31T12:35:29.734109-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 56s kubelet Created container install-cni\n"} +{"Time":"2023-05-31T12:35:29.734302-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 55s kubelet Started container install-cni\n"} +{"Time":"2023-05-31T12:35:29.734306-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulling 54s kubelet Pulling image \"docker.io/calico/node:v3.25.1\"\n"} +{"Time":"2023-05-31T12:35:29.734309-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 39s kubelet Successfully pulled image \"docker.io/calico/node:v3.25.1\" in 12.208696006s (14.830547386s including waiting)\n"} +{"Time":"2023-05-31T12:35:29.734311-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 39s kubelet Created container mount-bpffs\n"} +{"Time":"2023-05-31T12:35:29.734313-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 39s kubelet Started container mount-bpffs\n"} +{"Time":"2023-05-31T12:35:29.734316-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 38s kubelet Container image \"docker.io/calico/node:v3.25.1\" already present on machine\n"} +{"Time":"2023-05-31T12:35:29.734318-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 38s kubelet Created container calico-node\n"} +{"Time":"2023-05-31T12:35:29.73432-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 37s kubelet Started container calico-node\n"} +{"Time":"2023-05-31T12:35:29.734322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning Unhealthy 36s kubelet Readiness probe failed: calico/node is not ready: BIRD is not ready: Error querying BIRD: unable to connect to BIRDv4 socket: dial unix /var/run/bird/bird.ctl: connect: no such file or directory\n"} +{"Time":"2023-05-31T12:35:29.734325-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning Unhealthy 34s (x2 over 35s) kubelet Readiness probe failed: calico/node is not ready: BIRD is not ready: Error querying BIRD: unable to connect to BIRDv4 socket: dial unix /var/run/calico/bird.ctl: connect: connection refused\n"} +{"Time":"2023-05-31T12:35:29.734327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.734329-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.734331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico daemon set container(s) logs (current):\n"} +{"Time":"2023-05-31T12:35:29.734334-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/upgrade-ipam] 2023-05-31 19:34:24.098 [INFO][1] ipam_plugin.go 80: migrating from host-local to calico-ipam...\n"} +{"Time":"2023-05-31T12:35:29.734336-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/upgrade-ipam] 2023-05-31 19:34:24.100 [INFO][1] migrate.go 66: checking host-local IPAM data dir dir existence...\n"} +{"Time":"2023-05-31T12:35:29.734339-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/upgrade-ipam] 2023-05-31 19:34:24.100 [INFO][1] migrate.go 68: host-local IPAM data dir dir not found; no migration necessary, successfully exiting...\n"} +{"Time":"2023-05-31T12:35:29.734341-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/upgrade-ipam] 2023-05-31 19:34:24.100 [INFO][1] ipam_plugin.go 110: migration from host-local to calico-ipam complete node=\"calico-996000\"\n"} +{"Time":"2023-05-31T12:35:29.734569-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] \"type\": \"portmap\",\n"} +{"Time":"2023-05-31T12:35:29.734574-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] \"snat\": true,\n"} +{"Time":"2023-05-31T12:35:29.734576-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] \"capabilities\": {\"portMappings\": true}\n"} +{"Time":"2023-05-31T12:35:29.734578-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] },\n"} +{"Time":"2023-05-31T12:35:29.734581-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] {\n"} +{"Time":"2023-05-31T12:35:29.734583-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] \"type\": \"bandwidth\",\n"} +{"Time":"2023-05-31T12:35:29.734585-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] \"capabilities\": {\"bandwidth\": true}\n"} +{"Time":"2023-05-31T12:35:29.734587-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] }\n"} +{"Time":"2023-05-31T12:35:29.734589-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] ]\n"} +{"Time":"2023-05-31T12:35:29.734591-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/install-cni] }\n"} +{"Time":"2023-05-31T12:35:29.734593-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/mount-bpffs] 2023-05-31 19:34:41.902 [INFO][1] init-best-effort/startup.go 427: Early log level set to info\n"} +{"Time":"2023-05-31T12:35:29.734596-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/mount-bpffs] 2023-05-31 19:34:41.902 [INFO][1] init-best-effort/calico-init_linux.go 57: Checking if BPF filesystem is mounted.\n"} +{"Time":"2023-05-31T12:35:29.734598-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/mount-bpffs] 2023-05-31 19:34:41.902 [INFO][1] init-best-effort/calico-init_linux.go 78: BPF filesystem is not mounted. Trying to mount it...\n"} +{"Time":"2023-05-31T12:35:29.734601-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/mount-bpffs] 2023-05-31 19:34:41.904 [INFO][1] init-best-effort/calico-init_linux.go 83: Mounted BPF filesystem.\n"} +{"Time":"2023-05-31T12:35:29.734608-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/mount-bpffs] 2023-05-31 19:34:41.904 [INFO][1] init-best-effort/calico-init_linux.go 92: Checking if cgroup2 filesystem is mounted.\n"} +{"Time":"2023-05-31T12:35:29.73461-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/mount-bpffs] 2023-05-31 19:34:41.905 [INFO][1] init-best-effort/calico-init_linux.go 120: Cgroup2 filesystem is not mounted. Trying to mount it...\n"} +{"Time":"2023-05-31T12:35:29.734613-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/mount-bpffs] 2023-05-31 19:34:41.905 [INFO][1] init-best-effort/calico-init_linux.go 126: Mount point /run/calico/cgroup is ready for mounting root cgroup2 fs.\n"} +{"Time":"2023-05-31T12:35:29.734615-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/mount-bpffs] 2023-05-31 19:34:41.909 [INFO][1] init-best-effort/calico-init_linux.go 135: Mounted root cgroup2 filesystem.\n"} +{"Time":"2023-05-31T12:35:29.734871-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.432 [INFO][70] felix/endpoint_mgr.go 602: Updating per-endpoint chains. id=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-jpmr2\", EndpointId:\"eth0\"}\n"} +{"Time":"2023-05-31T12:35:29.73488-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.433 [INFO][70] felix/table.go 508: Queueing update of chain. chainName=\"cali-tw-cali1ce0d62fe56\" ipVersion=0x4 table=\"filter\"\n"} +{"Time":"2023-05-31T12:35:29.734885-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.433 [INFO][70] felix/table.go 508: Queueing update of chain. chainName=\"cali-fw-cali1ce0d62fe56\" ipVersion=0x4 table=\"filter\"\n"} +{"Time":"2023-05-31T12:35:29.73489-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.433 [INFO][70] felix/endpoint_mgr.go 648: Updating endpoint routes. id=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-jpmr2\", EndpointId:\"eth0\"}\n"} +{"Time":"2023-05-31T12:35:29.734895-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.433 [INFO][70] felix/endpoint_mgr.go 1215: Applying /proc/sys configuration to interface. ifaceName=\"cali1ce0d62fe56\"\n"} +{"Time":"2023-05-31T12:35:29.7349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.433 [INFO][70] felix/endpoint_mgr.go 490: Re-evaluated workload endpoint status adminUp=true failed=false known=true operUp=true status=\"up\" workloadEndpointID=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-jpmr2\", EndpointId:\"eth0\"}\n"} +{"Time":"2023-05-31T12:35:29.734915-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.433 [INFO][70] felix/status_combiner.go 58: Storing endpoint status update ipVersion=0x4 status=\"up\" workload=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-jpmr2\", EndpointId:\"eth0\"}\n"} +{"Time":"2023-05-31T12:35:29.734919-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.440 [INFO][70] felix/status_combiner.go 81: Endpoint up for at least one IP version id=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-jpmr2\", EndpointId:\"eth0\"} ipVersion=0x4 status=\"up\"\n"} +{"Time":"2023-05-31T12:35:29.734922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:01.440 [INFO][70] felix/status_combiner.go 98: Reporting combined status. id=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-jpmr2\", EndpointId:\"eth0\"} status=\"up\"\n"} +{"Time":"2023-05-31T12:35:29.734925-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-2h2zk/calico-node] 2023-05-31 19:35:06.007 [INFO][70] felix/int_dataplane.go 1693: Received *proto.HostMetadataV4V6Update update from calculation graph msg=hostname:\"calico-996000\" ipv4_addr:\"192.168.76.2/24\" labels:\u003ckey:\"beta.kubernetes.io/arch\" value:\"amd64\" \u003e labels:\u003ckey:\"beta.kubernetes.io/os\" value:\"linux\" \u003e labels:\u003ckey:\"kubernetes.io/arch\" value:\"amd64\" \u003e labels:\u003ckey:\"kubernetes.io/hostname\" value:\"calico-996000\" \u003e labels:\u003ckey:\"kubernetes.io/os\" value:\"linux\" \u003e labels:\u003ckey:\"minikube.k8s.io/commit\" value:\"7022875d4a054c2d518e5e5a7b9d500799d50140\" \u003e labels:\u003ckey:\"minikube.k8s.io/name\" value:\"calico-996000\" \u003e labels:\u003ckey:\"minikube.k8s.io/primary\" value:\"true\" \u003e labels:\u003ckey:\"minikube.k8s.io/updated_at\" value:\"2023_05_31T12_34_05_0700\" \u003e labels:\u003ckey:\"minikube.k8s.io/version\" value:\"v1.30.1\" \u003e labels:\u003ckey:\"node-role.kubernetes.io/control-plane\" value:\"\" \u003e labels:\u003ckey:\"node.kubernetes.io/exclude-from-external-load-balancers\" value:\"\" \u003e \n"} +{"Time":"2023-05-31T12:35:29.735206-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.735211-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.735214-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico daemon set container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:35:29.735217-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"upgrade-ipam\" in pod \"calico-node-2h2zk\" not found\n"} +{"Time":"2023-05-31T12:35:29.735219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"install-cni\" in pod \"calico-node-2h2zk\" not found\n"} +{"Time":"2023-05-31T12:35:29.735222-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"mount-bpffs\" in pod \"calico-node-2h2zk\" not found\n"} +{"Time":"2023-05-31T12:35:29.735247-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"calico-node\" in pod \"calico-node-2h2zk\" not found\n"} +{"Time":"2023-05-31T12:35:29.735274-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.735277-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.735279-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico deployment:\n"} +{"Time":"2023-05-31T12:35:29.735281-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.735283-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.735285-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CreationTimestamp: Wed, 31 May 2023 12:34:05 -0700\n"} +{"Time":"2023-05-31T12:35:29.735287-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.735289-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:35:29.735292-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.735294-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:35:29.735342-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StrategyType: Recreate\n"} +{"Time":"2023-05-31T12:35:29.735344-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:35:29.735346-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:35:29.7357-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.73572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.735744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.735747-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-kube-controllers:\n"} +{"Time":"2023-05-31T12:35:29.735762-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/kube-controllers:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.735765-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.735767-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.73577-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: exec [/usr/bin/check-status -l] delay=10s timeout=10s period=10s #success=1 #failure=6\n"} +{"Time":"2023-05-31T12:35:29.735772-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: exec [/usr/bin/check-status -r] delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:35:29.735774-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.735777-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ENABLED_CONTROLLERS: node\n"} +{"Time":"2023-05-31T12:35:29.735779-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DATASTORE_TYPE: kubernetes\n"} +{"Time":"2023-05-31T12:35:29.735781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.735783-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.735785-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:35:29.735787-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.735789-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:35:29.735791-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:35:29.735793-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:35:29.735795-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:35:29.735799-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.735801-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NewReplicaSet: calico-kube-controllers-674fff74c8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:35:29.735803-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.735805-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.735987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.735994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal ScalingReplicaSet 64s deployment-controller Scaled up replica set calico-kube-controllers-674fff74c8 to 1\n"} +{"Time":"2023-05-31T12:35:29.735999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.736002-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.736006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico deployment pod(s):\n"} +{"Time":"2023-05-31T12:35:29.736009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-kube-controllers-674fff74c8-ths92\n"} +{"Time":"2023-05-31T12:35:29.736014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.736017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:35:29.73602-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:35:29.736023-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.736027-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.73603-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 12:34:17 -0700\n"} +{"Time":"2023-05-31T12:35:29.736034-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.736038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-hash=674fff74c8\n"} +{"Time":"2023-05-31T12:35:29.736041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: cni.projectcalico.org/containerID: 3861aa029f16bf7f39ce25ebacf866ac329a7ed5830a01a5c5beedbd0124cdd3\n"} +{"Time":"2023-05-31T12:35:29.736044-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIP: 10.244.91.2/32\n"} +{"Time":"2023-05-31T12:35:29.736048-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIPs: 10.244.91.2/32\n"} +{"Time":"2023-05-31T12:35:29.736061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:35:29.736079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.91.2\n"} +{"Time":"2023-05-31T12:35:29.736081-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T12:35:29.736083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.91.2\n"} +{"Time":"2023-05-31T12:35:29.736085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: ReplicaSet/calico-kube-controllers-674fff74c8\n"} +{"Time":"2023-05-31T12:35:29.736088-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.736376-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-kube-controllers:\n"} +{"Time":"2023-05-31T12:35:29.736381-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://c1b464c229aedf20cd1c2599ad0d2655687242cd1cc9f67cb3ddaec2cf08584a\n"} +{"Time":"2023-05-31T12:35:29.736383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/kube-controllers:v3.25.1\n"} +{"Time":"2023-05-31T12:35:29.736386-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://calico/kube-controllers@sha256:02c1232ee4b8c5a145c401ac1adb34a63ee7fc46b70b6ad0a4e068a774f25f8a\n"} +{"Time":"2023-05-31T12:35:29.736388-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.736391-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.736393-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T12:35:29.736396-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:43 -0700\n"} +{"Time":"2023-05-31T12:35:29.736398-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Last State: Terminated\n"} +{"Time":"2023-05-31T12:35:29.736402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Reason: Error\n"} +{"Time":"2023-05-31T12:35:29.736404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Exit Code: 2\n"} +{"Time":"2023-05-31T12:35:29.736406-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:29 -0700\n"} +{"Time":"2023-05-31T12:35:29.736408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Finished: Wed, 31 May 2023 12:34:30 -0700\n"} +{"Time":"2023-05-31T12:35:29.73641-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.736412-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 1\n"} +{"Time":"2023-05-31T12:35:29.736414-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: exec [/usr/bin/check-status -l] delay=10s timeout=10s period=10s #success=1 #failure=6\n"} +{"Time":"2023-05-31T12:35:29.736417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: exec [/usr/bin/check-status -r] delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:35:29.736419-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.736421-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ENABLED_CONTROLLERS: node\n"} +{"Time":"2023-05-31T12:35:29.736424-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DATASTORE_TYPE: kubernetes\n"} +{"Time":"2023-05-31T12:35:29.736426-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.736428-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-tg45q (ro)\n"} +{"Time":"2023-05-31T12:35:29.736431-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.736434-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T12:35:29.736687-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:35:29.736692-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T12:35:29.736695-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:35:29.736697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:35:29.736699-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.736701-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-tg45q:\n"} +{"Time":"2023-05-31T12:35:29.736703-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:35:29.736705-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:35:29.736708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.73671-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:35:29.736712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:35:29.736714-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:35:29.736716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:35:29.736718-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:35:29.73672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:35:29.736723-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node-role.kubernetes.io/master:NoSchedule\n"} +{"Time":"2023-05-31T12:35:29.736725-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:35:29.736727-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:35:29.736729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.736732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.736734-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.736736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 63s default-scheduler Successfully assigned kube-system/calico-kube-controllers-674fff74c8-ths92 to calico-996000\n"} +{"Time":"2023-05-31T12:35:29.736991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulling 62s kubelet Pulling image \"docker.io/calico/kube-controllers:v3.25.1\"\n"} +{"Time":"2023-05-31T12:35:29.736996-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 51s kubelet Successfully pulled image \"docker.io/calico/kube-controllers:v3.25.1\" in 5.696492662s (11.024379995s including waiting)\n"} +{"Time":"2023-05-31T12:35:29.736999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 51s kubelet Created container calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.737001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 51s kubelet Started container calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.737003-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Killing 51s kubelet Stopping container calico-kube-controllers\n"} +{"Time":"2023-05-31T12:35:29.737006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning Unhealthy 50s kubelet Readiness probe failed: cannot exec in a stopped state: unknown\n"} +{"Time":"2023-05-31T12:35:29.737009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 49s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"47fe99299325ac663facad5e4324372047da60b41154d7c018b4297a9ee0ca5b\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.737013-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 47s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"aa82882f7a342a398192de1eea761b1a60528f2f12f1718fe1d9423b3eff27c6\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.737017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 45s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"44b82610b33e6e0f5a847f8e37c9144f80e919e6986b4c8a3f8e22e3f4dca8c8\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.73702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 44s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"0e0ce8a163ce432bb5c02589ce514ce1ccd1b61ed818181330341d7becaa0e35\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.737277-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 43s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"6f49bcc3fe7a4b007c0758186cd8ddc5f6085bf0937cdc5a0a92df0336cd3320\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.737282-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 42s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"b4386adafbc4658b4b9ddbdadf01f7b20aac56eb147dfa198f3bf17205dc4f2d\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.737285-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 40s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"964e4a675db0928eac123638af13957971afd22d74f5e119e3fbf89430cdb70e\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.737288-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 39s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"694136df31d2a9f62273b382d93217e144902048a80a5257da18e733631ccc97\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.737291-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal SandboxChanged 38s (x10 over 51s) kubelet Pod sandbox changed, it will be killed and re-created.\n"} +{"Time":"2023-05-31T12:35:29.737294-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 38s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to set up sandbox container \"ade3453d49fca528b718574782246ed77bac39a0ac4a5b50be872326fc87c84c\" network for pod \"calico-kube-controllers-674fff74c8-ths92\": networkPlugin cni failed to set up pod \"calico-kube-controllers-674fff74c8-ths92_kube-system\" network: plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T12:35:29.737556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.737559-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.737562-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico deployment container(s) logs (current):\n"} +{"Time":"2023-05-31T12:35:29.737565-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:44.182 [INFO][1] watchersyncer.go 209: Received InSync event from one of the watcher caches\n"} +{"Time":"2023-05-31T12:35:29.737567-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:44.182 [INFO][1] watchersyncer.go 221: All watchers have sync'd data - sending data and final sync\n"} +{"Time":"2023-05-31T12:35:29.73757-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:44.182 [INFO][1] watchersyncer.go 130: Sending status update Status=in-sync\n"} +{"Time":"2023-05-31T12:35:29.737572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:44.182 [INFO][1] syncer.go 86: Node controller syncer status updated: in-sync\n"} +{"Time":"2023-05-31T12:35:29.737574-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:44.191 [INFO][1] hostendpoints.go 173: successfully synced all hostendpoints\n"} +{"Time":"2023-05-31T12:35:29.737577-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] I0531 19:34:44.211900 1 shared_informer.go:262] Caches are synced for nodes\n"} +{"Time":"2023-05-31T12:35:29.737579-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] I0531 19:34:44.211916 1 shared_informer.go:255] Waiting for caches to sync for pods\n"} +{"Time":"2023-05-31T12:35:29.737582-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] I0531 19:34:44.211924 1 shared_informer.go:262] Caches are synced for pods\n"} +{"Time":"2023-05-31T12:35:29.737584-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:44.211 [INFO][1] ipam.go 253: Will run periodic IPAM sync every 7m30s\n"} +{"Time":"2023-05-31T12:35:29.737587-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:44.212 [INFO][1] ipam.go 331: Syncer is InSync, kicking sync channel status=in-sync\n"} +{"Time":"2023-05-31T12:35:29.73759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.737592-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.737594-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico deployment container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:35:29.737596-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:29.894 [INFO][1] main.go 107: Loaded configuration from environment config=\u0026config.Config{LogLevel:\"info\", WorkloadEndpointWorkers:1, ProfileWorkers:1, PolicyWorkers:1, NodeWorkers:1, Kubeconfig:\"\", DatastoreType:\"kubernetes\"}\n"} +{"Time":"2023-05-31T12:35:29.737836-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] W0531 19:34:29.895750 1 client_config.go:617] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\n"} +{"Time":"2023-05-31T12:35:29.73784-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:29.896 [INFO][1] main.go 131: Ensuring Calico datastore is initialized\n"} +{"Time":"2023-05-31T12:35:29.737843-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:29.896 [ERROR][1] client.go 290: Error getting cluster information config ClusterInformation=\"default\" error=Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default\": dial tcp 10.96.0.1:443: connect: network is unreachable\n"} +{"Time":"2023-05-31T12:35:29.737845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-ths92/calico-kube-controllers] 2023-05-31 19:34:29.896 [INFO][1] main.go 138: Failed to initialize datastore error=Get \"https://10.96.0.1:443/apis/crd.projectcalico.org/v1/clusterinformations/default\": dial tcp 10.96.0.1:443: connect: network is unreachable\n"} +{"Time":"2023-05-31T12:35:29.737848-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.73785-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.737852-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:35:29.737854-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.737856-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.737858-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:35:29.73786-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.737863-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:35:29.737865-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:35:29.737867-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:35:29.737869-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:35:29.737871-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:35:29.737873-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:35:29.738113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:35:29.73812-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:35:29.738122-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738125-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738127-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.738129-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:35:29.738131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:35:29.738133-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.738135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.738137-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.738142-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:35:29.738147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:35:29.738149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.738151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:35:29.738153-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.738155-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:35:29.738157-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:35:29.738159-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:35:29.738163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.738173-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:35:29.738177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:35:29.73818-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738182-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:35:29.738184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:35:29.738392-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.738396-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:35:29.738398-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:35:29.7384-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:35:29.738402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.738404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:35:29.738406-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.738408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:35:29.738411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.738413-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.738415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.738417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal SuccessfulCreate 64s daemonset-controller Created pod: kube-proxy-bt5n4\n"} +{"Time":"2023-05-31T12:35:29.738419-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.738421-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.738423-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:35:29.738425-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-proxy-bt5n4\n"} +{"Time":"2023-05-31T12:35:29.738428-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.73843-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:35:29.738432-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:35:29.738434-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.738438-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 12:34:16 -0700\n"} +{"Time":"2023-05-31T12:35:29.73844-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:35:29.738442-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738444-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:35:29.738678-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.738683-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:35:29.738686-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.738688-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T12:35:29.73869-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.738693-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738695-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T12:35:29.738697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:35:29.738699-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: docker://da1d501cf3f732bc4c9b2f12481f39cc8ffb6f6069e0acab0495f0b237f54549\n"} +{"Time":"2023-05-31T12:35:29.738701-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:35:29.738703-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:35:29.738706-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.738708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:35:29.73871-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T12:35:29.738712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738714-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:35:29.738716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:35:29.738718-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T12:35:29.73872-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 12:34:17 -0700\n"} +{"Time":"2023-05-31T12:35:29.738722-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:35:29.738725-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:35:29.738729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T12:35:29.738731-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:35:29.738733-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:35:29.738735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:35:29.738961-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:35:29.738966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:35:29.738969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-sw2gj (ro)\n"} +{"Time":"2023-05-31T12:35:29.738971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:35:29.738973-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T12:35:29.738975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:35:29.738978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T12:35:29.73898-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:35:29.738983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:35:29.738985-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:35:29.738987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:35:29.738989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:35:29.738991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.738994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:35:29.738996-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:35:29.738998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.739-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:35:29.739002-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:35:29.739004-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:35:29.739006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:35:29.739008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:35:29.73901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:35:29.739012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-sw2gj:\n"} +{"Time":"2023-05-31T12:35:29.739015-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:35:29.739017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:35:29.739019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.739205-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:35:29.73921-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:35:29.739212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:35:29.739214-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:35:29.739216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:35:29.73922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.739225-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.739228-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.73923-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:35:29.739232-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.739235-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:35:29.739237-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:35:29.739239-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T12:35:29.739241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:29.739243-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:29.739246-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 64s default-scheduler Successfully assigned kube-system/kube-proxy-bt5n4 to calico-996000\n"} +{"Time":"2023-05-31T12:35:29.739249-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 63s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:35:29.739252-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 63s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.739254-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 63s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.739256-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.739258-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.7394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:35:29.739403-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.421994 1 node.go:141] Successfully retrieved node IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.739406-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.422133 1 server_others.go:110] \"Detected node IP\" address=\"192.168.76.2\"\n"} +{"Time":"2023-05-31T12:35:29.739408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.422146 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:35:29.73941-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.506130 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:35:29.739412-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.506199 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:35:29.739415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.506207 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:35:29.739417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.506215 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:35:29.73942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.506237 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:35:29.739423-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.506821 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:35:29.739425-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.506834 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:35:29.739427-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.507389 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:35:29.739429-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.507399 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:35:29.739432-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.507600 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:35:29.739434-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.507607 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:35:29.739436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.507617 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:35:29.739438-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.507624 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:35:29.73944-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.609803 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:35:29.739634-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.609851 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:35:29.739639-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:34:17.609870 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:35:29.739641-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.739643-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.739645-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:35:29.739647-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:35:29.73965-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: loaded (\u001b]8;;file://calico-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:35:29.739653-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:35:29.739655-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─\u001b]8;;file://calico-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:35:29.739657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:34:03 UTC; 1min 17s ago\r\n"} +{"Time":"2023-05-31T12:35:29.739661-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:35:29.739663-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Main PID: 2371 (kubelet)\r\n"} +{"Time":"2023-05-31T12:35:29.739665-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tasks: 13 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:35:29.739667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Memory: 35.7M\r\n"} +{"Time":"2023-05-31T12:35:29.739669-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CPU: 3.140s\r\n"} +{"Time":"2023-05-31T12:35:29.739672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:35:29.739674-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─2371 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=calico-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:35:29.739677-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.739679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.533883 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.739783-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.533972 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.739788-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: I0531 19:34:42.935010 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\"\r\n"} +{"Time":"2023-05-31T12:35:29.739791-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: I0531 19:34:42.987444 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"ade3453d49fca528b718574782246ed77bac39a0ac4a5b50be872326fc87c84c\"\r\n"} +{"Time":"2023-05-31T12:35:29.739794-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:44 calico-996000 kubelet[2371]: I0531 19:34:44.083938 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/calico-node-2h2zk\" podStartSLOduration=3.374381451 podCreationTimestamp=\"2023-05-31 19:34:16 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:34:17.023711606 +0000 UTC m=+13.027158877\" lastFinishedPulling=\"2023-05-31 19:34:41.733464063 +0000 UTC m=+37.736681406\" observedRunningTime=\"2023-05-31 19:34:44.083592616 +0000 UTC m=+40.086809978\" watchObservedRunningTime=\"2023-05-31 19:34:44.08390398 +0000 UTC m=+40.087121334\"\r\n"} +{"Time":"2023-05-31T12:35:29.739798-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:44 calico-996000 kubelet[2371]: I0531 19:34:44.118620 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podStartSLOduration=17.094203414 podCreationTimestamp=\"2023-05-31 19:34:16 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:34:18.500191671 +0000 UTC m=+14.503638947\" lastFinishedPulling=\"2023-05-31 19:34:29.524580747 +0000 UTC m=+25.528028017\" observedRunningTime=\"2023-05-31 19:34:30.011143964 +0000 UTC m=+26.014591241\" watchObservedRunningTime=\"2023-05-31 19:34:44.118592484 +0000 UTC m=+40.121809830\"\r\n"} +{"Time":"2023-05-31T12:35:29.739951-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 kubelet[2371]: I0531 19:34:55.034577 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.739964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 kubelet[2371]: E0531 19:34:55.035097 2371 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"35ceffb1-33ff-470f-b7aa-458d774a92d0\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:35:29.739967-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 kubelet[2371]: I0531 19:34:55.035154 2371 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"35ceffb1-33ff-470f-b7aa-458d774a92d0\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:35:29.73997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 kubelet[2371]: I0531 19:34:55.194388 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-jtjnx\\\" (UniqueName: \\\"kubernetes.io/projected/566d939a-191c-4f66-84d7-a30b6f96df72-kube-api-access-jtjnx\\\") pod \\\"netcat-7458db8b8-jpmr2\\\" (UID: \\\"566d939a-191c-4f66-84d7-a30b6f96df72\\\") \" pod=\"default/netcat-7458db8b8-jpmr2\"\r\n"} +{"Time":"2023-05-31T12:35:29.739973-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.739975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.739977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:35:29.739979-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.739982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:35:29.739984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:35:29.739986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:35:29.739988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:35:29.73999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.739993-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.739995-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:35:29.739997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:35:29.739999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:35:29.740001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:35:29.740003-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.740006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:35:29.740217-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:35:29.740221-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.740223-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.740226-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:35:29.740228-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:35:29.74023-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.740232-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.740234-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:35:29.740236-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=calico-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:35:29.740239-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.740241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:35:29.740243-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.740245-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.740247-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:35:29.740249-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:57 calico-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:35:29.740251-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.740254-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.740256-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.740259-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.740261-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.740263-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.740266-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.740495-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:57 calico-996000 kubelet[1735]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:35:29.7405-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.056585 1735 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:35:29.740502-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.056631 1735 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:35:29.740505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.056828 1735 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:35:29.740507-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.059677 1735 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:35:29.74051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.060764 1735 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.740513-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: W0531 19:33:58.063710 1735 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:35:29.740516-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.069595 1735 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:35:29.740518-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.069911 1735 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:35:29.740521-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.069973 1735 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:35:29.740754-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.069987 1735 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:35:29.740758-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.069995 1735 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:35:29.740761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.070051 1735 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:35:29.740763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.088471 1735 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:35:29.740765-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.088518 1735 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:35:29.740768-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.088534 1735 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:35:29.74077-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.088547 1735 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:35:29.740772-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: W0531 19:33:58.089262 1735 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.740775-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.089306 1735 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.740778-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: W0531 19:33:58.089265 1735 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcalico-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.740781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.089329 1735 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcalico-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.741033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.095750 1735 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:35:29.741038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: W0531 19:33:58.096007 1735 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:35:29.741041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.096452 1735 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:35:29.741043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.096698 1735 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:35:29.741046-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.096846 1735 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:35:29.74105-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.097033 1735 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"calico-996000.176451611dc38355\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"calico-996000\", UID:\"calico-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"calico-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 33, 58, 96438101, time.Local), LastTimestamp:time.Date("} +{"Time":"2023-05-31T12:35:29.741054-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"2023, time.May, 31, 19, 33, 58, 96438101, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.76.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:35:29.741057-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.097327 1735 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:35:29.741059-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.097508 1735 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:35:29.741063-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.097541 1735 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:35:29.741211-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.097601 1735 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:35:29.741216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.097821 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.741219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: W0531 19:33:58.097831 1735 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.741222-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.098045 1735 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.741225-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.098053 1735 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/calico-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:35:29.741228-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.111769 1735 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:35:29.74123-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.113019 1735 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:35:29.741233-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.113065 1735 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:35:29.741235-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.113080 1735 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:35:29.741238-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.113117 1735 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:35:29.741285-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: W0531 19:33:58.113420 1735 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.741289-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.113457 1735 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.741292-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.125264 1735 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:35:29.741295-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.125319 1735 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:35:29.741297-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.125334 1735 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:35:29.741299-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.126947 1735 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:35:29.741302-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.128902 1735 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:35:29.741305-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.128953 1735 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:35:29.741308-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.147221 1735 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.74131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.147428 1735 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:35:29.741312-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.156573 1735 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.741404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.206921 1735 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.207330 1735 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.213770 1735 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.741413-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.221562 1735 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.741415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.229391 1735 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.741418-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.237326 1735 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.74142-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.299134 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/b52a682fcfb5e94090f961d5fa92bf40-etcd-certs\\\") pod \\\"etcd-calico-996000\\\" (UID: \\\"b52a682fcfb5e94090f961d5fa92bf40\\\") \" pod=\"kube-system/etcd-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741423-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.299463 1735 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/calico-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:35:29.741427-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.399625 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-k8s-certs\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.74143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.399735 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-ca-certs\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741576-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.399774 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-etc-ca-certificates\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741579-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.399801 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-k8s-certs\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741582-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.399860 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741586-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400069 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-ca-certs\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741589-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400130 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-etc-ca-certificates\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741592-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400164 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-flexvolume-dir\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741596-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400208 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741818-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400244 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741825-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400331 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741828-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400439 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/2f57d33962ead505b653fbd6cff9b8d8-kubeconfig\\\") pod \\\"kube-scheduler-calico-996000\\\" (UID: \\\"2f57d33962ead505b653fbd6cff9b8d8\\\") \" pod=\"kube-system/kube-scheduler-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741831-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400616 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/b52a682fcfb5e94090f961d5fa92bf40-etcd-data\\\") pod \\\"etcd-calico-996000\\\" (UID: \\\"b52a682fcfb5e94090f961d5fa92bf40\\\") \" pod=\"kube-system/etcd-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741834-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.400737 1735 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-kubeconfig\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741837-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.416971 1735 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.74184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.417338 1735 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.741843-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.700567 1735 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/calico-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:35:29.74212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: I0531 19:33:58.827345 1735 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.74213-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:58 calico-996000 kubelet[1735]: E0531 19:33:58.827697 1735 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.742135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:59 calico-996000 kubelet[1735]: W0531 19:33:59.082144 1735 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.74214-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:59 calico-996000 kubelet[1735]: E0531 19:33:59.082330 1735 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.742146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:59 calico-996000 kubelet[1735]: W0531 19:33:59.082144 1735 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcalico-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.742149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:59 calico-996000 kubelet[1735]: E0531 19:33:59.082369 1735 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcalico-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.742155-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:59 calico-996000 kubelet[1735]: W0531 19:33:59.082635 1735 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.742158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:59 calico-996000 kubelet[1735]: E0531 19:33:59.082695 1735 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:35:29.742161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:33:59 calico-996000 kubelet[1735]: I0531 19:33:59.684743 1735 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.74238-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.005063 1735 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"calico-996000\\\" not found\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.74239-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: I0531 19:34:01.102172 1735 kubelet_node_status.go:73] \"Successfully registered node\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.742393-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.116153 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742399-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.216329 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742401-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.316874 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.417123 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742406-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.518164 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742409-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.619000 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742413-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.720197 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.820912 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.74242-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:01 calico-996000 kubelet[1735]: E0531 19:34:01.921320 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742422-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:02 calico-996000 kubelet[1735]: E0531 19:34:02.022436 1735 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"calico-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.742668-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:02 calico-996000 kubelet[1735]: I0531 19:34:02.092203 1735 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:35:29.742676-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:02 calico-996000 kubelet[1735]: I0531 19:34:02.098962 1735 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:35:29.742679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:02 calico-996000 kubelet[1735]: I0531 19:34:02.138029 1735 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T12:35:29.742681-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:02 calico-996000 kubelet[1735]: I0531 19:34:02.190814 1735 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:35:29.742684-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:03 calico-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:35:29.742686-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742689-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742693-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742695-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742699-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742704-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742706-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:03 calico-996000 kubelet[1735]: I0531 19:34:03.958132 1735 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:35:29.742709-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:03 calico-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:35:29.742711-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742713-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742715-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742717-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:03 calico-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:35:29.742976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.742998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743005-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743015-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:03 calico-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:35:29.743022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743029-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743036-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.74304-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743044-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.743048-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:35:29.743204-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.094025 2371 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:35:29.743219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.094087 2371 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:35:29.743224-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.094234 2371 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:35:29.743228-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.095347 2371 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:35:29.743233-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.096284 2371 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:35:29.743237-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: W0531 19:34:04.099990 2371 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:35:29.743241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.104353 2371 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:35:29.743245-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.104685 2371 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:35:29.743262-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.104744 2371 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:35:29.743275-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.104763 2371 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:35:29.743282-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.104771 2371 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:35:29.743416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.104788 2371 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:35:29.743435-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.124748 2371 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:35:29.743442-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.124794 2371 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:35:29.743447-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.124811 2371 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:35:29.743451-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.124823 2371 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:35:29.743456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.134216 2371 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:35:29.74346-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.134646 2371 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:35:29.743475-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.134782 2371 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:35:29.74348-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.135017 2371 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:35:29.743485-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.135390 2371 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:35:29.743489-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.136329 2371 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:35:29.743493-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.136944 2371 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:35:29.743495-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.137007 2371 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:35:29.743498-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.186941 2371 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:35:29.743502-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.188579 2371 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:35:29.743644-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.188632 2371 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:35:29.74365-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.188658 2371 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:35:29.743654-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: E0531 19:34:04.188695 2371 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:35:29.743659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.221567 2371 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:35:29.743662-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.221610 2371 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:35:29.743666-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.221630 2371 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:35:29.74367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.221759 2371 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:35:29.743673-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.221771 2371 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:35:29.743677-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.221777 2371 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:35:29.743681-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.225973 2371 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:35:29.743685-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.226046 2371 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:35:29.743704-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.226178 2371 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:35:29.743707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.227240 2371 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:35:29.743783-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.227515 2371 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:35:29.743789-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.288840 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.743806-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.289758 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.743825-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.289802 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.743829-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.289903 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.743831-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.293647 2371 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.743836-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.305649 2371 kubelet_node_status.go:108] \"Node was previously registered\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.743838-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.305824 2371 kubelet_node_status.go:73] \"Successfully registered node\" node=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.743841-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.385559 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/2f57d33962ead505b653fbd6cff9b8d8-kubeconfig\\\") pod \\\"kube-scheduler-calico-996000\\\" (UID: \\\"2f57d33962ead505b653fbd6cff9b8d8\\\") \" pod=\"kube-system/kube-scheduler-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.743845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.385690 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/b52a682fcfb5e94090f961d5fa92bf40-etcd-certs\\\") pod \\\"etcd-calico-996000\\\" (UID: \\\"b52a682fcfb5e94090f961d5fa92bf40\\\") \" pod=\"kube-system/etcd-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.743848-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.385748 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/b52a682fcfb5e94090f961d5fa92bf40-etcd-data\\\") pod \\\"etcd-calico-996000\\\" (UID: \\\"b52a682fcfb5e94090f961d5fa92bf40\\\") \" pod=\"kube-system/etcd-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.74444-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.385775 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744465-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.385804 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-ca-certs\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744492-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.385931 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744499-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.385974 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-k8s-certs\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744504-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.385999 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-flexvolume-dir\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.74451-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.386018 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-kubeconfig\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744517-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.386040 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-ca-certs\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744522-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.386061 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744867-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.386084 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-etc-ca-certificates\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744895-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.386104 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-k8s-certs\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.386126 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/7dbabd351e651b3a8feddaf1f8d788f0-etc-ca-certificates\\\") pod \\\"kube-apiserver-calico-996000\\\" (UID: \\\"7dbabd351e651b3a8feddaf1f8d788f0\\\") \" pod=\"kube-system/kube-apiserver-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:04 calico-996000 kubelet[2371]: I0531 19:34:04.386149 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/6b5ceb88be22441d4da9a490263580e5-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-calico-996000\\\" (UID: \\\"6b5ceb88be22441d4da9a490263580e5\\\") \" pod=\"kube-system/kube-controller-manager-calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.744918-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:05 calico-996000 kubelet[2371]: I0531 19:34:05.125185 2371 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:35:29.744923-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:05 calico-996000 kubelet[2371]: I0531 19:34:05.138058 2371 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:35:29.744927-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:05 calico-996000 kubelet[2371]: I0531 19:34:05.192649 2371 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:35:29.744942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:05 calico-996000 kubelet[2371]: I0531 19:34:05.325052 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-calico-996000\" podStartSLOduration=1.325011575 podCreationTimestamp=\"2023-05-31 19:34:04 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:34:05.324999637 +0000 UTC m=+1.328651440\" watchObservedRunningTime=\"2023-05-31 19:34:05.325011575 +0000 UTC m=+1.328663369\"\r\n"} +{"Time":"2023-05-31T12:35:29.74508-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:05 calico-996000 kubelet[2371]: I0531 19:34:05.325164 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-calico-996000\" podStartSLOduration=1.3251314650000001 podCreationTimestamp=\"2023-05-31 19:34:04 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:34:05.310474229 +0000 UTC m=+1.314126025\" watchObservedRunningTime=\"2023-05-31 19:34:05.325131465 +0000 UTC m=+1.328783260\"\r\n"} +{"Time":"2023-05-31T12:35:29.745115-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:05 calico-996000 kubelet[2371]: I0531 19:34:05.392238 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-calico-996000\" podStartSLOduration=1.3921861930000001 podCreationTimestamp=\"2023-05-31 19:34:04 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:34:05.390183355 +0000 UTC m=+1.393835158\" watchObservedRunningTime=\"2023-05-31 19:34:05.392186193 +0000 UTC m=+1.395837986\"\r\n"} +{"Time":"2023-05-31T12:35:29.745118-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:05 calico-996000 kubelet[2371]: I0531 19:34:05.415922 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-calico-996000\" podStartSLOduration=1.41584178 podCreationTimestamp=\"2023-05-31 19:34:04 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:34:05.408018531 +0000 UTC m=+1.411670333\" watchObservedRunningTime=\"2023-05-31 19:34:05.41584178 +0000 UTC m=+1.419493574\"\r\n"} +{"Time":"2023-05-31T12:35:29.745133-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.532970 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.74514-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.541246 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.745143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587572 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-log-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-cni-log-dir\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587610 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"sys-fs\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-sys-fs\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745316-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587670 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-net-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-cni-net-dir\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587860 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"bpffs\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-bpffs\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745325-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587897 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"nodeproc\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-nodeproc\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745329-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587919 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-bin-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-cni-bin-dir\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745332-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587942 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-cpwwd\\\" (UniqueName: \\\"kubernetes.io/projected/ea96a45d-5d03-4fca-9297-78b1a040458f-kube-api-access-cpwwd\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745336-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587963 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/c6c4d369-c6a6-4969-9d3b-686167b4b0fa-kube-proxy\\\") pod \\\"kube-proxy-bt5n4\\\" (UID: \\\"c6c4d369-c6a6-4969-9d3b-686167b4b0fa\\\") \" pod=\"kube-system/kube-proxy-bt5n4\"\r\n"} +{"Time":"2023-05-31T12:35:29.745339-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.587983 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-sw2gj\\\" (UniqueName: \\\"kubernetes.io/projected/c6c4d369-c6a6-4969-9d3b-686167b4b0fa-kube-api-access-sw2gj\\\") pod \\\"kube-proxy-bt5n4\\\" (UID: \\\"c6c4d369-c6a6-4969-9d3b-686167b4b0fa\\\") \" pod=\"kube-system/kube-proxy-bt5n4\"\r\n"} +{"Time":"2023-05-31T12:35:29.745343-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.588002 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"host-local-net-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-host-local-net-dir\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745489-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.588018 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/c6c4d369-c6a6-4969-9d3b-686167b4b0fa-lib-modules\\\") pod \\\"kube-proxy-bt5n4\\\" (UID: \\\"c6c4d369-c6a6-4969-9d3b-686167b4b0fa\\\") \" pod=\"kube-system/kube-proxy-bt5n4\"\r\n"} +{"Time":"2023-05-31T12:35:29.745517-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.588033 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"var-lib-calico\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-var-lib-calico\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.74552-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.588154 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"policysync\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-policysync\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.588180 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-lib-modules\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745527-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.588206 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"var-run-calico\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-var-run-calico\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745531-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.588227 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/ea96a45d-5d03-4fca-9297-78b1a040458f-xtables-lock\\\") pod \\\"calico-node-2h2zk\\\" (UID: \\\"ea96a45d-5d03-4fca-9297-78b1a040458f\\\") \" pod=\"kube-system/calico-node-2h2zk\"\r\n"} +{"Time":"2023-05-31T12:35:29.745537-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:16 calico-996000 kubelet[2371]: I0531 19:34:16.588243 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/c6c4d369-c6a6-4969-9d3b-686167b4b0fa-xtables-lock\\\") pod \\\"kube-proxy-bt5n4\\\" (UID: \\\"c6c4d369-c6a6-4969-9d3b-686167b4b0fa\\\") \" pod=\"kube-system/kube-proxy-bt5n4\"\r\n"} +{"Time":"2023-05-31T12:35:29.745667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:17 calico-996000 kubelet[2371]: I0531 19:34:17.000567 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.745676-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:17 calico-996000 kubelet[2371]: I0531 19:34:17.002466 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.745679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:17 calico-996000 kubelet[2371]: I0531 19:34:17.010946 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.745681-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:17 calico-996000 kubelet[2371]: I0531 19:34:17.193983 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07-config-volume\\\") pod \\\"coredns-5d78c9869d-xnzjr\\\" (UID: \\\"9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\\\") \" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.745685-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:17 calico-996000 kubelet[2371]: I0531 19:34:17.194124 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/35ceffb1-33ff-470f-b7aa-458d774a92d0-config-volume\\\") pod \\\"coredns-5d78c9869d-5vw5c\\\" (UID: \\\"35ceffb1-33ff-470f-b7aa-458d774a92d0\\\") \" pod=\"kube-system/coredns-5d78c9869d-5vw5c\"\r\n"} +{"Time":"2023-05-31T12:35:29.745688-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:17 calico-996000 kubelet[2371]: I0531 19:34:17.194161 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-9zkz2\\\" (UniqueName: \\\"kubernetes.io/projected/9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07-kube-api-access-9zkz2\\\") pod \\\"coredns-5d78c9869d-xnzjr\\\" (UID: \\\"9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\\\") \" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.745692-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:17 calico-996000 kubelet[2371]: I0531 19:34:17.194292 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-tg45q\\\" (UniqueName: \\\"kubernetes.io/projected/6ff620af-85a1-4798-bda1-4f262acb4d95-kube-api-access-tg45q\\\") pod \\\"calico-kube-controllers-674fff74c8-ths92\\\" (UID: \\\"6ff620af-85a1-4798-bda1-4f262acb4d95\\\") \" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.745696-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:17 calico-996000 kubelet[2371]: I0531 19:34:17.194368 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-wmzhx\\\" (UniqueName: \\\"kubernetes.io/projected/35ceffb1-33ff-470f-b7aa-458d774a92d0-kube-api-access-wmzhx\\\") pod \\\"coredns-5d78c9869d-5vw5c\\\" (UID: \\\"35ceffb1-33ff-470f-b7aa-458d774a92d0\\\") \" pod=\"kube-system/coredns-5d78c9869d-5vw5c\"\r\n"} +{"Time":"2023-05-31T12:35:29.745909-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:19 calico-996000 kubelet[2371]: I0531 19:34:19.197757 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-bt5n4\" podStartSLOduration=3.197723698 podCreationTimestamp=\"2023-05-31 19:34:16 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:34:17.394491038 +0000 UTC m=+13.397938318\" watchObservedRunningTime=\"2023-05-31 19:34:19.197723698 +0000 UTC m=+15.201170972\"\r\n"} +{"Time":"2023-05-31T12:35:29.745916-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:19 calico-996000 kubelet[2371]: I0531 19:34:19.197943 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.745942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:19 calico-996000 kubelet[2371]: I0531 19:34:19.218915 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/fa090d7a-96e2-4307-b4ec-218f50a6c8c0-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"fa090d7a-96e2-4307-b4ec-218f50a6c8c0\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:35:29.745948-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:19 calico-996000 kubelet[2371]: I0531 19:34:19.218971 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-mmphg\\\" (UniqueName: \\\"kubernetes.io/projected/fa090d7a-96e2-4307-b4ec-218f50a6c8c0-kube-api-access-mmphg\\\") pod \\\"storage-provisioner\\\" (UID: \\\"fa090d7a-96e2-4307-b4ec-218f50a6c8c0\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:35:29.745954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:19 calico-996000 kubelet[2371]: I0531 19:34:19.625690 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-5vw5c\" podStartSLOduration=3.625664379 podCreationTimestamp=\"2023-05-31 19:34:16 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:34:19.625399505 +0000 UTC m=+15.628846780\" watchObservedRunningTime=\"2023-05-31 19:34:19.625664379 +0000 UTC m=+15.629111659\"\r\n"} +{"Time":"2023-05-31T12:35:29.74596-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:19 calico-996000 kubelet[2371]: I0531 19:34:19.630893 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"cb198ddabc77eda0c6ed18919b35e9b49c7cc68e4c79915a8dca8265f7f75b15\"\r\n"} +{"Time":"2023-05-31T12:35:29.74598-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:20 calico-996000 kubelet[2371]: I0531 19:34:20.786864 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podStartSLOduration=4.786833732 podCreationTimestamp=\"2023-05-31 19:34:16 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:34:19.788715409 +0000 UTC m=+15.792162689\" watchObservedRunningTime=\"2023-05-31 19:34:20.786833732 +0000 UTC m=+16.790281008\"\r\n"} +{"Time":"2023-05-31T12:35:29.745983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:20 calico-996000 kubelet[2371]: I0531 19:34:20.787120 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=1.787103792 podCreationTimestamp=\"2023-05-31 19:34:19 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:34:20.787040811 +0000 UTC m=+16.790488087\" watchObservedRunningTime=\"2023-05-31 19:34:20.787103792 +0000 UTC m=+16.790551067\"\r\n"} +{"Time":"2023-05-31T12:35:29.746104-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:24 calico-996000 kubelet[2371]: I0531 19:34:24.884515 2371 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:35:29.746108-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:24 calico-996000 kubelet[2371]: I0531 19:34:24.884917 2371 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:35:29.746111-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:31 calico-996000 kubelet[2371]: I0531 19:34:31.081569 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"397115f5a26871ff784ad064c6cc65fa8eb9575d6cbb3afed1665ba0c3869e4d\"\r\n"} +{"Time":"2023-05-31T12:35:29.746114-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:31 calico-996000 kubelet[2371]: E0531 19:34:31.124584 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"47fe99299325ac663facad5e4324372047da60b41154d7c018b4297a9ee0ca5b\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.746122-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:31 calico-996000 kubelet[2371]: E0531 19:34:31.124672 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"47fe99299325ac663facad5e4324372047da60b41154d7c018b4297a9ee0ca5b\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.746128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:31 calico-996000 kubelet[2371]: E0531 19:34:31.124693 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"47fe99299325ac663facad5e4324372047da60b41154d7c018b4297a9ee0ca5b\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.746152-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:31 calico-996000 kubelet[2371]: E0531 19:34:31.124763 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"47fe99299325ac663facad5e4324372047da60b41154d7c018b4297a9ee0ca5b\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.746206-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.746212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:32 calico-996000 kubelet[2371]: I0531 19:34:32.099245 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"47fe99299325ac663facad5e4324372047da60b41154d7c018b4297a9ee0ca5b\"\r\n"} +{"Time":"2023-05-31T12:35:29.746215-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: I0531 19:34:33.116005 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"629ecf7b98904a6327886da27bcaed0a4e5b416312f19f08c08a2012bfd440b7\"\r\n"} +{"Time":"2023-05-31T12:35:29.746219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: E0531 19:34:33.236013 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"aa82882f7a342a398192de1eea761b1a60528f2f12f1718fe1d9423b3eff27c6\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.746222-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: E0531 19:34:33.236184 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"aa82882f7a342a398192de1eea761b1a60528f2f12f1718fe1d9423b3eff27c6\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.746227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: E0531 19:34:33.236211 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"aa82882f7a342a398192de1eea761b1a60528f2f12f1718fe1d9423b3eff27c6\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.746326-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: E0531 19:34:33.236256 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"aa82882f7a342a398192de1eea761b1a60528f2f12f1718fe1d9423b3eff27c6\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.746331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.746334-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: E0531 19:34:33.339448 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"64bef55cbf7a7214055334de68a91f1dfd94413069595192f083e189b5ff7e08\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.746341-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: E0531 19:34:33.339550 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"64bef55cbf7a7214055334de68a91f1dfd94413069595192f083e189b5ff7e08\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.746344-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: E0531 19:34:33.339612 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"64bef55cbf7a7214055334de68a91f1dfd94413069595192f083e189b5ff7e08\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.746349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: E0531 19:34:33.339660 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"64bef55cbf7a7214055334de68a91f1dfd94413069595192f083e189b5ff7e08\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.746453-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: I0531 19:34:33.426970 2371 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-wmzhx\\\" (UniqueName: \\\"kubernetes.io/projected/35ceffb1-33ff-470f-b7aa-458d774a92d0-kube-api-access-wmzhx\\\") pod \\\"35ceffb1-33ff-470f-b7aa-458d774a92d0\\\" (UID: \\\"35ceffb1-33ff-470f-b7aa-458d774a92d0\\\") \"\r\n"} +{"Time":"2023-05-31T12:35:29.746459-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: I0531 19:34:33.427149 2371 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/35ceffb1-33ff-470f-b7aa-458d774a92d0-config-volume\\\") pod \\\"35ceffb1-33ff-470f-b7aa-458d774a92d0\\\" (UID: \\\"35ceffb1-33ff-470f-b7aa-458d774a92d0\\\") \"\r\n"} +{"Time":"2023-05-31T12:35:29.746463-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: W0531 19:34:33.427355 2371 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/35ceffb1-33ff-470f-b7aa-458d774a92d0/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:35:29.746466-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: I0531 19:34:33.427499 2371 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/35ceffb1-33ff-470f-b7aa-458d774a92d0-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"35ceffb1-33ff-470f-b7aa-458d774a92d0\" (UID: \"35ceffb1-33ff-470f-b7aa-458d774a92d0\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.74647-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: I0531 19:34:33.429320 2371 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/35ceffb1-33ff-470f-b7aa-458d774a92d0-kube-api-access-wmzhx\" (OuterVolumeSpecName: \"kube-api-access-wmzhx\") pod \"35ceffb1-33ff-470f-b7aa-458d774a92d0\" (UID: \"35ceffb1-33ff-470f-b7aa-458d774a92d0\"). InnerVolumeSpecName \"kube-api-access-wmzhx\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.746473-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: I0531 19:34:33.527775 2371 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-wmzhx\\\" (UniqueName: \\\"kubernetes.io/projected/35ceffb1-33ff-470f-b7aa-458d774a92d0-kube-api-access-wmzhx\\\") on node \\\"calico-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:35:29.74661-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:33 calico-996000 kubelet[2371]: I0531 19:34:33.527806 2371 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/35ceffb1-33ff-470f-b7aa-458d774a92d0-config-volume\\\") on node \\\"calico-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:35:29.746616-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:34 calico-996000 kubelet[2371]: I0531 19:34:34.302439 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"64bef55cbf7a7214055334de68a91f1dfd94413069595192f083e189b5ff7e08\"\r\n"} +{"Time":"2023-05-31T12:35:29.746619-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:34 calico-996000 kubelet[2371]: I0531 19:34:34.310667 2371 scope.go:115] \"RemoveContainer\" containerID=\"8e04b441e38b3b4dd5679bd629d6b25c29d2b610dd295578bad871b0b13fefa7\"\r\n"} +{"Time":"2023-05-31T12:35:29.746622-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:34 calico-996000 kubelet[2371]: I0531 19:34:34.387206 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"aa82882f7a342a398192de1eea761b1a60528f2f12f1718fe1d9423b3eff27c6\"\r\n"} +{"Time":"2023-05-31T12:35:29.746627-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: E0531 19:34:35.324184 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"44b82610b33e6e0f5a847f8e37c9144f80e919e6986b4c8a3f8e22e3f4dca8c8\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.746631-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: E0531 19:34:35.324271 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"44b82610b33e6e0f5a847f8e37c9144f80e919e6986b4c8a3f8e22e3f4dca8c8\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.746638-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: E0531 19:34:35.324299 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"44b82610b33e6e0f5a847f8e37c9144f80e919e6986b4c8a3f8e22e3f4dca8c8\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.746816-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: E0531 19:34:35.324345 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"44b82610b33e6e0f5a847f8e37c9144f80e919e6986b4c8a3f8e22e3f4dca8c8\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.746822-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.746825-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: E0531 19:34:35.387128 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"a1ef1a022a441e982bb6e3cae6764349691932a8e4d8ee556c4647dd8ebcc68a\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.746829-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: E0531 19:34:35.387210 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"a1ef1a022a441e982bb6e3cae6764349691932a8e4d8ee556c4647dd8ebcc68a\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.746833-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: E0531 19:34:35.387237 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"a1ef1a022a441e982bb6e3cae6764349691932a8e4d8ee556c4647dd8ebcc68a\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.746838-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: E0531 19:34:35.387275 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"a1ef1a022a441e982bb6e3cae6764349691932a8e4d8ee556c4647dd8ebcc68a\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.747026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:35 calico-996000 kubelet[2371]: I0531 19:34:35.405968 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"44b82610b33e6e0f5a847f8e37c9144f80e919e6986b4c8a3f8e22e3f4dca8c8\"\r\n"} +{"Time":"2023-05-31T12:35:29.747031-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: I0531 19:34:36.197574 2371 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=35ceffb1-33ff-470f-b7aa-458d774a92d0 path=\"/var/lib/kubelet/pods/35ceffb1-33ff-470f-b7aa-458d774a92d0/volumes\"\r\n"} +{"Time":"2023-05-31T12:35:29.747038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: E0531 19:34:36.281833 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"bfcedb8791325e2755d8b91ff54b50e3d1a9e12b76c853adef2aa9a04acce93f\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.747042-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: E0531 19:34:36.281914 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"bfcedb8791325e2755d8b91ff54b50e3d1a9e12b76c853adef2aa9a04acce93f\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.747046-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: E0531 19:34:36.281944 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"bfcedb8791325e2755d8b91ff54b50e3d1a9e12b76c853adef2aa9a04acce93f\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.747051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: E0531 19:34:36.282103 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"bfcedb8791325e2755d8b91ff54b50e3d1a9e12b76c853adef2aa9a04acce93f\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.747166-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: E0531 19:34:36.297105 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"0e0ce8a163ce432bb5c02589ce514ce1ccd1b61ed818181330341d7becaa0e35\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.747175-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: E0531 19:34:36.297234 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"0e0ce8a163ce432bb5c02589ce514ce1ccd1b61ed818181330341d7becaa0e35\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.747179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: E0531 19:34:36.297252 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"0e0ce8a163ce432bb5c02589ce514ce1ccd1b61ed818181330341d7becaa0e35\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.747184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: E0531 19:34:36.297368 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"0e0ce8a163ce432bb5c02589ce514ce1ccd1b61ed818181330341d7becaa0e35\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.747414-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.747423-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: I0531 19:34:36.435369 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"a1ef1a022a441e982bb6e3cae6764349691932a8e4d8ee556c4647dd8ebcc68a\"\r\n"} +{"Time":"2023-05-31T12:35:29.747429-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: I0531 19:34:36.435426 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"bfcedb8791325e2755d8b91ff54b50e3d1a9e12b76c853adef2aa9a04acce93f\"\r\n"} +{"Time":"2023-05-31T12:35:29.747433-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:36 calico-996000 kubelet[2371]: I0531 19:34:36.499013 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"0e0ce8a163ce432bb5c02589ce514ce1ccd1b61ed818181330341d7becaa0e35\"\r\n"} +{"Time":"2023-05-31T12:35:29.747436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: E0531 19:34:37.383999 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"6f49bcc3fe7a4b007c0758186cd8ddc5f6085bf0937cdc5a0a92df0336cd3320\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.747443-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: E0531 19:34:37.384098 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"6f49bcc3fe7a4b007c0758186cd8ddc5f6085bf0937cdc5a0a92df0336cd3320\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.747447-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: E0531 19:34:37.384124 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"6f49bcc3fe7a4b007c0758186cd8ddc5f6085bf0937cdc5a0a92df0336cd3320\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.747617-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: E0531 19:34:37.384211 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"6f49bcc3fe7a4b007c0758186cd8ddc5f6085bf0937cdc5a0a92df0336cd3320\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.747627-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.747632-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: E0531 19:34:37.387760 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"e6d900907c2f3965f306dd915afbc88b7074f41d92d9467d6f2f4cbe7a8a1d07\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.747638-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: E0531 19:34:37.387837 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"e6d900907c2f3965f306dd915afbc88b7074f41d92d9467d6f2f4cbe7a8a1d07\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.747645-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: E0531 19:34:37.387857 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"e6d900907c2f3965f306dd915afbc88b7074f41d92d9467d6f2f4cbe7a8a1d07\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.747728-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: E0531 19:34:37.387894 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"e6d900907c2f3965f306dd915afbc88b7074f41d92d9467d6f2f4cbe7a8a1d07\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.747735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: I0531 19:34:37.514591 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"e6d900907c2f3965f306dd915afbc88b7074f41d92d9467d6f2f4cbe7a8a1d07\"\r\n"} +{"Time":"2023-05-31T12:35:29.747738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:37 calico-996000 kubelet[2371]: I0531 19:34:37.526270 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"6f49bcc3fe7a4b007c0758186cd8ddc5f6085bf0937cdc5a0a92df0336cd3320\"\r\n"} +{"Time":"2023-05-31T12:35:29.747741-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: E0531 19:34:38.416262 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"ebe3a219ff6aeb04994c71da89f89f5145b1ec79197a8246b4cb8ead65f9fad7\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.747745-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: E0531 19:34:38.416332 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"ebe3a219ff6aeb04994c71da89f89f5145b1ec79197a8246b4cb8ead65f9fad7\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.747749-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: E0531 19:34:38.416352 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"ebe3a219ff6aeb04994c71da89f89f5145b1ec79197a8246b4cb8ead65f9fad7\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.747829-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: E0531 19:34:38.416396 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"ebe3a219ff6aeb04994c71da89f89f5145b1ec79197a8246b4cb8ead65f9fad7\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.747845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: E0531 19:34:38.617997 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"b4386adafbc4658b4b9ddbdadf01f7b20aac56eb147dfa198f3bf17205dc4f2d\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.747852-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: E0531 19:34:38.618122 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"b4386adafbc4658b4b9ddbdadf01f7b20aac56eb147dfa198f3bf17205dc4f2d\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.747859-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: E0531 19:34:38.618143 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"b4386adafbc4658b4b9ddbdadf01f7b20aac56eb147dfa198f3bf17205dc4f2d\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.747942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: E0531 19:34:38.618216 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"b4386adafbc4658b4b9ddbdadf01f7b20aac56eb147dfa198f3bf17205dc4f2d\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.747949-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.747951-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 kubelet[2371]: I0531 19:34:38.696677 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"ebe3a219ff6aeb04994c71da89f89f5145b1ec79197a8246b4cb8ead65f9fad7\"\r\n"} +{"Time":"2023-05-31T12:35:29.747955-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:39 calico-996000 kubelet[2371]: E0531 19:34:39.383005 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"90d9e8940229d780156b91867331d3fd7ec8e22ca68982430017d16cb287d077\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.747959-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:39 calico-996000 kubelet[2371]: E0531 19:34:39.383140 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"90d9e8940229d780156b91867331d3fd7ec8e22ca68982430017d16cb287d077\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.747963-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:39 calico-996000 kubelet[2371]: E0531 19:34:39.383161 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"90d9e8940229d780156b91867331d3fd7ec8e22ca68982430017d16cb287d077\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.748041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:39 calico-996000 kubelet[2371]: E0531 19:34:39.383232 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"90d9e8940229d780156b91867331d3fd7ec8e22ca68982430017d16cb287d077\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.748052-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:39 calico-996000 kubelet[2371]: I0531 19:34:39.719092 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"90d9e8940229d780156b91867331d3fd7ec8e22ca68982430017d16cb287d077\"\r\n"} +{"Time":"2023-05-31T12:35:29.748068-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:39 calico-996000 kubelet[2371]: I0531 19:34:39.734104 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"b4386adafbc4658b4b9ddbdadf01f7b20aac56eb147dfa198f3bf17205dc4f2d\"\r\n"} +{"Time":"2023-05-31T12:35:29.748075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: E0531 19:34:40.516407 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"964e4a675db0928eac123638af13957971afd22d74f5e119e3fbf89430cdb70e\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.748082-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: E0531 19:34:40.516521 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"81e254a18d45489c9478e3ee34c59de4b8366746b70b2716359c0bb82b14f4f0\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.74809-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: E0531 19:34:40.516552 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"81e254a18d45489c9478e3ee34c59de4b8366746b70b2716359c0bb82b14f4f0\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.748135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: E0531 19:34:40.516569 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"81e254a18d45489c9478e3ee34c59de4b8366746b70b2716359c0bb82b14f4f0\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.748142-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: E0531 19:34:40.516610 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"81e254a18d45489c9478e3ee34c59de4b8366746b70b2716359c0bb82b14f4f0\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.74815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: E0531 19:34:40.516525 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"964e4a675db0928eac123638af13957971afd22d74f5e119e3fbf89430cdb70e\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.748155-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: E0531 19:34:40.516708 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"964e4a675db0928eac123638af13957971afd22d74f5e119e3fbf89430cdb70e\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.748274-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: E0531 19:34:40.516743 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"964e4a675db0928eac123638af13957971afd22d74f5e119e3fbf89430cdb70e\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.748291-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.748295-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: I0531 19:34:40.789352 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"964e4a675db0928eac123638af13957971afd22d74f5e119e3fbf89430cdb70e\"\r\n"} +{"Time":"2023-05-31T12:35:29.748298-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 kubelet[2371]: I0531 19:34:40.802178 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"81e254a18d45489c9478e3ee34c59de4b8366746b70b2716359c0bb82b14f4f0\"\r\n"} +{"Time":"2023-05-31T12:35:29.748301-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: E0531 19:34:41.606141 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"694136df31d2a9f62273b382d93217e144902048a80a5257da18e733631ccc97\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.748306-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: E0531 19:34:41.606404 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"694136df31d2a9f62273b382d93217e144902048a80a5257da18e733631ccc97\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.748366-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: E0531 19:34:41.606426 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"694136df31d2a9f62273b382d93217e144902048a80a5257da18e733631ccc97\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.748385-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: E0531 19:34:41.606505 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"694136df31d2a9f62273b382d93217e144902048a80a5257da18e733631ccc97\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.748391-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.748394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: E0531 19:34:41.613333 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"1ef81b491d7a1fd63524334ae093ae8341dc95dc1e946c69e6deb773e2b20dfb\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.748398-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: E0531 19:34:41.613533 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"1ef81b491d7a1fd63524334ae093ae8341dc95dc1e946c69e6deb773e2b20dfb\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.748402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: E0531 19:34:41.613564 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"1ef81b491d7a1fd63524334ae093ae8341dc95dc1e946c69e6deb773e2b20dfb\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.748473-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: E0531 19:34:41.613632 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"1ef81b491d7a1fd63524334ae093ae8341dc95dc1e946c69e6deb773e2b20dfb\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.748481-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: I0531 19:34:41.889316 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"694136df31d2a9f62273b382d93217e144902048a80a5257da18e733631ccc97\"\r\n"} +{"Time":"2023-05-31T12:35:29.748485-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 kubelet[2371]: I0531 19:34:41.910901 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"1ef81b491d7a1fd63524334ae093ae8341dc95dc1e946c69e6deb773e2b20dfb\"\r\n"} +{"Time":"2023-05-31T12:35:29.748495-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.519978 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"ade3453d49fca528b718574782246ed77bac39a0ac4a5b50be872326fc87c84c\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.748501-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.520094 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"ade3453d49fca528b718574782246ed77bac39a0ac4a5b50be872326fc87c84c\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.748547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.520124 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"ade3453d49fca528b718574782246ed77bac39a0ac4a5b50be872326fc87c84c\\\" network for pod \\\"calico-kube-controllers-674fff74c8-ths92\\\": networkPlugin cni failed to set up pod \\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\"\r\n"} +{"Time":"2023-05-31T12:35:29.748557-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.520216 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system(6ff620af-85a1-4798-bda1-4f262acb4d95)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"ade3453d49fca528b718574782246ed77bac39a0ac4a5b50be872326fc87c84c\\\\\\\" network for pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"calico-kube-controllers-674fff74c8-ths92_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podUID=6ff620af-85a1-4798-bda1-4f2"} +{"Time":"2023-05-31T12:35:29.748562-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"62acb4d95\r\n"} +{"Time":"2023-05-31T12:35:29.748566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.533756 2371 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T12:35:29.748574-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.533858 2371 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.74858-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.533883 2371 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to set up sandbox container \\\"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\\\" network for pod \\\"coredns-5d78c9869d-xnzjr\\\": networkPlugin cni failed to set up pod \\\"coredns-5d78c9869d-xnzjr_kube-system\\\" network: plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\"\r\n"} +{"Time":"2023-05-31T12:35:29.748638-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: E0531 19:34:42.533972 2371 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system(9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07)\\\\\\\": rpc error: code = Unknown desc = failed to set up sandbox container \\\\\\\"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\\\\\\\" network for pod \\\\\\\"coredns-5d78c9869d-xnzjr\\\\\\\": networkPlugin cni failed to set up pod \\\\\\\"coredns-5d78c9869d-xnzjr_kube-system\\\\\\\" network: plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-xnzjr\" podUID=9c34d645-bbb1-4a61-b5b1-5c6e43dd5a07\r\n"} +{"Time":"2023-05-31T12:35:29.748647-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: I0531 19:34:42.935010 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2\"\r\n"} +{"Time":"2023-05-31T12:35:29.748652-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 kubelet[2371]: I0531 19:34:42.987444 2371 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"ade3453d49fca528b718574782246ed77bac39a0ac4a5b50be872326fc87c84c\"\r\n"} +{"Time":"2023-05-31T12:35:29.748655-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:44 calico-996000 kubelet[2371]: I0531 19:34:44.083938 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/calico-node-2h2zk\" podStartSLOduration=3.374381451 podCreationTimestamp=\"2023-05-31 19:34:16 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:34:17.023711606 +0000 UTC m=+13.027158877\" lastFinishedPulling=\"2023-05-31 19:34:41.733464063 +0000 UTC m=+37.736681406\" observedRunningTime=\"2023-05-31 19:34:44.083592616 +0000 UTC m=+40.086809978\" watchObservedRunningTime=\"2023-05-31 19:34:44.08390398 +0000 UTC m=+40.087121334\"\r\n"} +{"Time":"2023-05-31T12:35:29.748659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:44 calico-996000 kubelet[2371]: I0531 19:34:44.118620 2371 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/calico-kube-controllers-674fff74c8-ths92\" podStartSLOduration=17.094203414 podCreationTimestamp=\"2023-05-31 19:34:16 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:34:18.500191671 +0000 UTC m=+14.503638947\" lastFinishedPulling=\"2023-05-31 19:34:29.524580747 +0000 UTC m=+25.528028017\" observedRunningTime=\"2023-05-31 19:34:30.011143964 +0000 UTC m=+26.014591241\" watchObservedRunningTime=\"2023-05-31 19:34:44.118592484 +0000 UTC m=+40.121809830\"\r\n"} +{"Time":"2023-05-31T12:35:29.748712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 kubelet[2371]: I0531 19:34:55.034577 2371 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:35:29.748715-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 kubelet[2371]: E0531 19:34:55.035097 2371 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"35ceffb1-33ff-470f-b7aa-458d774a92d0\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:35:29.748718-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 kubelet[2371]: I0531 19:34:55.035154 2371 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"35ceffb1-33ff-470f-b7aa-458d774a92d0\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:35:29.748721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 kubelet[2371]: I0531 19:34:55.194388 2371 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-jtjnx\\\" (UniqueName: \\\"kubernetes.io/projected/566d939a-191c-4f66-84d7-a30b6f96df72-kube-api-access-jtjnx\\\") pod \\\"netcat-7458db8b8-jpmr2\\\" (UID: \\\"566d939a-191c-4f66-84d7-a30b6f96df72\\\") \" pod=\"default/netcat-7458db8b8-jpmr2\"\r\n"} +{"Time":"2023-05-31T12:35:29.748724-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.748726-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.748729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:35:29.748731-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:35:29.748736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:35:29.748738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:35:29.748741-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:35:29.7488-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:35:29.748806-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:35:29.748809-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:35:29.748812-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:35:29.748814-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:35:29.748817-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:35:29.748819-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: system:node:calico-996000\r\n"} +{"Time":"2023-05-31T12:35:29.748826-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: system:node:calico-996000@mk\r\n"} +{"Time":"2023-05-31T12:35:29.748828-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: system:node:calico-996000@mk\r\n"} +{"Time":"2023-05-31T12:35:29.74883-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:35:29.748832-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:35:29.748834-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users:\r\n"} +{"Time":"2023-05-31T12:35:29.748836-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: system:node:calico-996000\r\n"} +{"Time":"2023-05-31T12:35:29.748841-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\r\n"} +{"Time":"2023-05-31T12:35:29.748843-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:35:29.748845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:35:29.748848-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.748853-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.748855-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:35:29.748893-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:35:29.7489-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:35:29.748903-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:35:29.748907-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:35:29.748911-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:35:29.748915-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.748918-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:35:29.748922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:35:29.748926-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:35:29.748929-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:35:29.748932-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:35:29.748945-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:35:29.748948-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.74895-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.748952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:35:29.748954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:35:29.748956-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:35:29.748958-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:35:29.748961-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.748964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.748974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:35:29.748979-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:35:29.748981-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:35:29.748984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:35:29.748986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.748988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:35:29.74899-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.748992-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:35:29.748994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:35:29.748997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:35:29.748999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:35:29.749006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:35:29.749011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:35:29.749013-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:35:29.749016-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" options:\r\n"} +{"Time":"2023-05-31T12:35:29.749018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" json:\r\n"} +{"Time":"2023-05-31T12:35:29.74902-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:35:29.749022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:35:29.749025-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:35:29.749027-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749029-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:35:29.749035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:35:29.749043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749045-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:35:29.749051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749053-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749055-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:35:29.749058-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.74906-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.749062-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:35:29.749065-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749067-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\n"} +{"Time":"2023-05-31T12:35:29.749069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:35:29.749072-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:35:29.749074-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T12:35:29.749076-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T12:35:29.749078-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 12:34:17 PDT\n"} +{"Time":"2023-05-31T12:35:29.74908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.749083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:35:29.749085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:35:29.749087-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://127.0.0.1:52412\n"} +{"Time":"2023-05-31T12:35:29.749089-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: calico-996000\n"} +{"Time":"2023-05-31T12:35:29.749091-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:35:29.749093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:35:29.749095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T12:35:29.749097-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T12:35:29.7491-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 12:35:16 PDT\n"} +{"Time":"2023-05-31T12:35:29.749111-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.749113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:35:29.749115-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:35:29.749118-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://127.0.0.1:52059\n"} +{"Time":"2023-05-31T12:35:29.74912-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:29.749122-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts:\n"} +{"Time":"2023-05-31T12:35:29.749124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\n"} +{"Time":"2023-05-31T12:35:29.749126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: calico-996000\n"} +{"Time":"2023-05-31T12:35:29.749128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T12:35:29.749136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T12:35:29.749139-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 12:34:17 PDT\n"} +{"Time":"2023-05-31T12:35:29.749141-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.749143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:35:29.749146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:35:29.749148-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:35:29.749149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: calico-996000\n"} +{"Time":"2023-05-31T12:35:29.749152-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: calico-996000\n"} +{"Time":"2023-05-31T12:35:29.749154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\n"} +{"Time":"2023-05-31T12:35:29.749157-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:29.749159-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T12:35:29.749161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T12:35:29.749163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 12:35:16 PDT\n"} +{"Time":"2023-05-31T12:35:29.749207-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.749209-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:35:29.749211-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:35:29.749213-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:35:29.749216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:29.749218-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:29.74922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:29.749225-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:35:29.749227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:35:29.749229-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users:\n"} +{"Time":"2023-05-31T12:35:29.749231-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: calico-996000\n"} +{"Time":"2023-05-31T12:35:29.749233-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\n"} +{"Time":"2023-05-31T12:35:29.749236-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt\n"} +{"Time":"2023-05-31T12:35:29.749238-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.key\n"} +{"Time":"2023-05-31T12:35:29.749241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:29.749243-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\n"} +{"Time":"2023-05-31T12:35:29.749245-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt\n"} +{"Time":"2023-05-31T12:35:29.749247-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key\n"} +{"Time":"2023-05-31T12:35:29.74925-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.749252-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.749254-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:35:29.749256-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749258-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" items:\n"} +{"Time":"2023-05-31T12:35:29.749261-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749263-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.749265-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:35:29.749284-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.74929-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:35:29.749293-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:35:29.749295-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:35:29.749298-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:35:29.7493-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:35:29.749302-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:35:29.749305-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:35:29.749308-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:35:29.74931-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:35:29.749312-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:35:29.749314-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:35:29.749317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:35:29.749319-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:35:29.749322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:35:29.749325-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:35:29.749327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:35:29.749329-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:35:29.749331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.749334-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.749383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.749407-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T12:35:29.74941-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:35:29.749412-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:35:29.749415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:35:29.749417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:35:29.749422-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:16Z\"\n"} +{"Time":"2023-05-31T12:35:29.749424-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.749426-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:35:29.749429-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"361\"\n"} +{"Time":"2023-05-31T12:35:29.749431-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 3af47ec4-f0ee-4509-b579-77eb80ba6980\n"} +{"Time":"2023-05-31T12:35:29.749434-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.749438-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:35:29.74944-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.749442-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:35:29.749445-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:35:29.749447-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:35:29.749449-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:35:29.749452-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:35:29.749454-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:35:29.749457-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:35:29.749469-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:35:29.749476-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:35:29.749479-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:35:29.749481-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:35:29.749484-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:35:29.749486-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:35:29.749488-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:35:29.74949-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:35:29.749496-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:35:29.749499-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:35:29.749501-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.749503-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.749505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.749508-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T12:35:29.749518-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:35:29.749522-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:35:29.749524-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:35:29.749527-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:35:29.749529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:16Z\"\n"} +{"Time":"2023-05-31T12:35:29.749532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.749536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:35:29.74954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"362\"\n"} +{"Time":"2023-05-31T12:35:29.749542-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: acb88df2-8317-45c9-bbf6-bf2773a35329\n"} +{"Time":"2023-05-31T12:35:29.749544-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.749549-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" jws-kubeconfig-vtk4w6: eyJhbGciOiJIUzI1NiIsImtpZCI6InZ0azR3NiJ9..-S3KL8AwBF2BALjst3oFpJ3Hac5JLCzdJv0aXCuQNm4\n"} +{"Time":"2023-05-31T12:35:29.749551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:35:29.749553-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\n"} +{"Time":"2023-05-31T12:35:29.749558-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:35:29.749563-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:35:29.749568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"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\n"} +{"Time":"2023-05-31T12:35:29.749572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:35:29.749574-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:35:29.749576-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:35:29.749579-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:35:29.749612-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:35:29.749616-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:35:29.749618-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users: null\n"} +{"Time":"2023-05-31T12:35:29.74962-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.749622-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.749627-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:03Z\"\n"} +{"Time":"2023-05-31T12:35:29.74963-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:35:29.749632-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:35:29.749634-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"386\"\n"} +{"Time":"2023-05-31T12:35:29.749636-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 87e05fe1-d319-4a96-ab52-d4f68a0b1043\n"} +{"Time":"2023-05-31T12:35:29.749639-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749641-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.749643-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:35:29.749645-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.749647-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:35:29.74965-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:35:29.749653-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:35:29.749655-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:35:29.749657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:35:29.74966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:35:29.749663-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:35:29.749665-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:35:29.749667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:35:29.749697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:35:29.7497-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:35:29.749703-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:35:29.749705-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:35:29.749708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:35:29.749711-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:35:29.749713-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:35:29.749729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:35:29.749732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.749734-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.749736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.749758-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T12:35:29.749761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:35:29.749763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:35:29.749766-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:35:29.749768-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:35:29.74977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:16Z\"\n"} +{"Time":"2023-05-31T12:35:29.749773-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.749775-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:35:29.749777-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"363\"\n"} +{"Time":"2023-05-31T12:35:29.74978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 9ea0ac17-35b0-4ee5-8486-3db43ac503c9\n"} +{"Time":"2023-05-31T12:35:29.749782-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749807-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.749811-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico_backend: bird\n"} +{"Time":"2023-05-31T12:35:29.749813-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_network_config: |-\n"} +{"Time":"2023-05-31T12:35:29.749815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\n"} +{"Time":"2023-05-31T12:35:29.749818-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"name\": \"k8s-pod-network\",\n"} +{"Time":"2023-05-31T12:35:29.749821-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"cniVersion\": \"0.3.1\",\n"} +{"Time":"2023-05-31T12:35:29.749823-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"plugins\": [\n"} +{"Time":"2023-05-31T12:35:29.749825-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\n"} +{"Time":"2023-05-31T12:35:29.749828-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"calico\",\n"} +{"Time":"2023-05-31T12:35:29.74983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log_level\": \"info\",\n"} +{"Time":"2023-05-31T12:35:29.749832-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n"} +{"Time":"2023-05-31T12:35:29.749835-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"datastore_type\": \"kubernetes\",\n"} +{"Time":"2023-05-31T12:35:29.749838-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n"} +{"Time":"2023-05-31T12:35:29.74984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"mtu\": __CNI_MTU__,\n"} +{"Time":"2023-05-31T12:35:29.749843-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipam\": {\n"} +{"Time":"2023-05-31T12:35:29.749845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"calico-ipam\"\n"} +{"Time":"2023-05-31T12:35:29.749847-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\n"} +{"Time":"2023-05-31T12:35:29.74985-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"policy\": {\n"} +{"Time":"2023-05-31T12:35:29.749852-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"k8s\"\n"} +{"Time":"2023-05-31T12:35:29.749855-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\n"} +{"Time":"2023-05-31T12:35:29.749857-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"kubernetes\": {\n"} +{"Time":"2023-05-31T12:35:29.749859-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n"} +{"Time":"2023-05-31T12:35:29.749862-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T12:35:29.749864-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\n"} +{"Time":"2023-05-31T12:35:29.749866-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\n"} +{"Time":"2023-05-31T12:35:29.749868-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"portmap\",\n"} +{"Time":"2023-05-31T12:35:29.749886-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"snat\": true,\n"} +{"Time":"2023-05-31T12:35:29.749889-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\"portMappings\": true}\n"} +{"Time":"2023-05-31T12:35:29.749891-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\n"} +{"Time":"2023-05-31T12:35:29.749893-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\n"} +{"Time":"2023-05-31T12:35:29.749896-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"bandwidth\",\n"} +{"Time":"2023-05-31T12:35:29.749898-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\"bandwidth\": true}\n"} +{"Time":"2023-05-31T12:35:29.749901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T12:35:29.749903-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\n"} +{"Time":"2023-05-31T12:35:29.749905-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T12:35:29.749907-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" typha_service_name: none\n"} +{"Time":"2023-05-31T12:35:29.74991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" veth_mtu: \"0\"\n"} +{"Time":"2023-05-31T12:35:29.749913-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.749915-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.749917-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T12:35:29.749919-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubectl.kubernetes.io/last-applied-configuration: |\n"} +{"Time":"2023-05-31T12:35:29.749923-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\"apiVersion\":\"v1\",\"data\":{\"calico_backend\":\"bird\",\"cni_network_config\":\"{\\n \\\"name\\\": \\\"k8s-pod-network\\\",\\n \\\"cniVersion\\\": \\\"0.3.1\\\",\\n \\\"plugins\\\": [\\n {\\n \\\"type\\\": \\\"calico\\\",\\n \\\"log_level\\\": \\\"info\\\",\\n \\\"log_file_path\\\": \\\"/var/log/calico/cni/cni.log\\\",\\n \\\"datastore_type\\\": \\\"kubernetes\\\",\\n \\\"nodename\\\": \\\"__KUBERNETES_NODE_NAME__\\\",\\n \\\"mtu\\\": __CNI_MTU__,\\n \\\"ipam\\\": {\\n \\\"type\\\": \\\"calico-ipam\\\"\\n },\\n \\\"policy\\\": {\\n \\\"type\\\": \\\"k8s\\\"\\n },\\n \\\"kubernetes\\\": {\\n \\\"kubeconfig\\\": \\\"__KUBECONFIG_FILEPATH__\\\"\\n }\\n },\\n {\\n \\\"type\\\": \\\"portmap\\\",\\n \\\"snat\\\": true,\\n \\\"capabilities\\\": {\\\"portMappings\\\": true}\\n },\\n {\\n \\\"type\\\": \\\"bandwidth\\\",\\n \\\"capabilities\\\": {\\\"bandwidth\\\": true}\\n }\\n ]\\n}\",\"typha_service_name\":\"none\",\"veth_mtu\":\"0\"},\"kind\":\"ConfigMap\",\"metadata\":{\"annotations\":{},\"name\":\"calico-config\",\"namespace\":\"kube-system\"}}\n"} +{"Time":"2023-05-31T12:35:29.749961-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:05Z\"\n"} +{"Time":"2023-05-31T12:35:29.749964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: calico-config\n"} +{"Time":"2023-05-31T12:35:29.749966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.749968-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"260\"\n"} +{"Time":"2023-05-31T12:35:29.749971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: cb35447e-ec93-4bbd-b8ba-d3b3acaca0fd\n"} +{"Time":"2023-05-31T12:35:29.749973-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.749975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.749978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:35:29.74998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:35:29.749982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" log\n"} +{"Time":"2023-05-31T12:35:29.749984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" errors\n"} +{"Time":"2023-05-31T12:35:29.749986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" health {\n"} +{"Time":"2023-05-31T12:35:29.749988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:35:29.750004-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T12:35:29.750007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ready\n"} +{"Time":"2023-05-31T12:35:29.750009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:35:29.750012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:35:29.750034-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:35:29.750036-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:35:29.750038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T12:35:29.750041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:35:29.750043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hosts {\n"} +{"Time":"2023-05-31T12:35:29.750046-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:35:29.750089-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:35:29.750093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T12:35:29.750115-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:35:29.750118-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:35:29.75012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T12:35:29.750122-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cache 30\n"} +{"Time":"2023-05-31T12:35:29.750124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" loop\n"} +{"Time":"2023-05-31T12:35:29.750126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" reload\n"} +{"Time":"2023-05-31T12:35:29.750128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:35:29.750131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T12:35:29.750133-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.750135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.750137-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:04Z\"\n"} +{"Time":"2023-05-31T12:35:29.75014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:35:29.750142-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.750145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"448\"\n"} +{"Time":"2023-05-31T12:35:29.750147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 8f9914f9-e11d-4515-9770-af4fa270478f\n"} +{"Time":"2023-05-31T12:35:29.750149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.750151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.750153-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:35:29.750156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.750158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:35:29.75016-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:35:29.750177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:35:29.750181-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:35:29.750183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:35:29.750186-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:35:29.750188-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:35:29.75019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:35:29.750193-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:35:29.750195-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:35:29.750197-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:35:29.7502-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:35:29.750203-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:35:29.750205-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:35:29.750207-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:35:29.750209-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:35:29.750212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:35:29.750215-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.750217-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:35:29.75022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:35:29.750222-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.750299-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:35:29.750317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTMzNTVaFw0zMzA1MjgxOTMzNTVaMBkxFzAV\n"} +{"Time":"2023-05-31T12:35:29.75032-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:35:29.750322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CgKCAQEApfhTmJPvbJ5vf714RiI6bASQPFaNrvXwiue2qe20wV96pKSICKNyPaMh\n"} +{"Time":"2023-05-31T12:35:29.750346-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /C4vLQjIXQqXO2zSGPWD03bM4OHvAX6DHhSxpfVp/5xMEkjatBXBTRx7kB9PpecD\n"} +{"Time":"2023-05-31T12:35:29.750348-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" t3vvMs1Clm3eylGPDC+RxjAi0zq96Fzxa8xtGYHGeVi7qDa8ZpDGyklGDSAsK15x\n"} +{"Time":"2023-05-31T12:35:29.75035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /814bkS2FK1AgOY1DDli9RO1aaAFd5piySpH+9COHavbemfgBqS4V1OfIneAFdZf\n"} +{"Time":"2023-05-31T12:35:29.750352-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" m84WGtXlPgP1/WJT5N4jxBXGGDI+tBU+RYnJoklV5H5C2O9GJXW8Kse013L5QFHY\n"} +{"Time":"2023-05-31T12:35:29.750354-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 4hiBuTvpdAZgxm/CIS3KWjox8yhmrQIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:35:29.750356-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQURApC/lrgSDFC3ku5TDz/wzaMnxAw\n"} +{"Time":"2023-05-31T12:35:29.750358-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBADpW\n"} +{"Time":"2023-05-31T12:35:29.75036-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WX2wUlFah/aTf46RqwhFYC80dm3f1uOhHuBmgQDpH/xnjfk9Y0cnMNUVe3E1LulR\n"} +{"Time":"2023-05-31T12:35:29.750362-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0j5+TgI6QJrcVFaYwSjnVuz7O7IwAA9RDjU06BX6jJ+vCs974ba9gkv18NM/tp3m\n"} +{"Time":"2023-05-31T12:35:29.750365-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" J3t67pee+GKMXN/GsGXNd9VL536xmwhILZ/gDcXXLx6o7kJ3pscXTok6JN7+8ZY3\n"} +{"Time":"2023-05-31T12:35:29.750367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NGxyXtDr8EyhLLzJsbSbKQTeGwFGsi8rht54knPdgPag3lUSqupruT34vUHMU3WX\n"} +{"Time":"2023-05-31T12:35:29.750369-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 3h39x6G18Fj4rWUtlqKjuI8yucYD1R2ut88l647Sb/G4eyQM9sxBPYl82C8+xuwi\n"} +{"Time":"2023-05-31T12:35:29.750371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FyTOHWDFdARMyb6QBSM=\n"} +{"Time":"2023-05-31T12:35:29.750373-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.750376-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:35:29.750378-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:35:29.750381-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:35:29.750383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.750512-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.750517-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:01Z\"\n"} +{"Time":"2023-05-31T12:35:29.750521-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:35:29.750523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.750526-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"34\"\n"} +{"Time":"2023-05-31T12:35:29.750528-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 71ebebe6-a566-4ec5-8e1e-ebc944730777\n"} +{"Time":"2023-05-31T12:35:29.75053-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.750533-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.750535-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:35:29.750537-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.750539-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.750541-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:01Z\"\n"} +{"Time":"2023-05-31T12:35:29.750544-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:35:29.750546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.750548-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"55\"\n"} +{"Time":"2023-05-31T12:35:29.75055-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 4fe29e22-f78d-4e3c-85de-6346ecd55850\n"} +{"Time":"2023-05-31T12:35:29.750553-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.750556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.750558-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:35:29.75056-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:35:29.750562-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:35:29.750564-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:35:29.750566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:35:29.750569-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:35:29.750571-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:35:29.750573-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:35:29.750576-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:35:29.750849-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:35:29.750853-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:35:29.750856-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.750858-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:35:29.75086-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:35:29.750863-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" min: null\n"} +{"Time":"2023-05-31T12:35:29.750865-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:29.750867-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:29.75087-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:35:29.750872-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:35:29.750875-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:35:29.750877-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:35:29.750879-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:35:29.750882-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:35:29.750884-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:35:29.750887-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" iptables:\n"} +{"Time":"2023-05-31T12:35:29.750889-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:35:29.750891-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:35:29.750893-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:35:29.750896-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.750899-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.750901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:35:29.750904-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:35:29.750906-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.750908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:35:29.75091-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:35:29.750912-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.751152-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:29.751156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:29.751159-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:29.751161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:35:29.751163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:35:29.751165-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:35:29.751168-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:35:29.75117-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:35:29.751172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:35:29.751174-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:35:29.751176-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:35:29.751178-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:35:29.751181-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:35:29.751183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:35:29.751185-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:35:29.751187-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:35:29.751193-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:35:29.751197-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.751201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:35:29.751204-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\n"} +{"Time":"2023-05-31T12:35:29.751206-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:35:29.751209-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:35:29.751212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:35:29.751214-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: default\n"} +{"Time":"2023-05-31T12:35:29.751216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts:\n"} +{"Time":"2023-05-31T12:35:29.751226-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\n"} +{"Time":"2023-05-31T12:35:29.751444-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:35:29.75145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:35:29.751453-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: default\n"} +{"Time":"2023-05-31T12:35:29.751456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: default\n"} +{"Time":"2023-05-31T12:35:29.751458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:35:29.75146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users:\n"} +{"Time":"2023-05-31T12:35:29.751462-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: default\n"} +{"Time":"2023-05-31T12:35:29.751464-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\n"} +{"Time":"2023-05-31T12:35:29.751466-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:35:29.751469-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.751471-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.751473-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:04Z\"\n"} +{"Time":"2023-05-31T12:35:29.751476-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" labels:\n"} +{"Time":"2023-05-31T12:35:29.751479-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.751481-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:35:29.751483-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.751485-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"236\"\n"} +{"Time":"2023-05-31T12:35:29.751487-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 106a547c-acde-430b-b209-12df0f95f8d4\n"} +{"Time":"2023-05-31T12:35:29.75149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.751492-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.751494-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:35:29.751496-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.751498-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:35:29.7515-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:35:29.751503-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:35:29.751505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:35:29.751739-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:35:29.751744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:35:29.751747-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:35:29.751749-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:35:29.751751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:35:29.751767-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:35:29.75177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:35:29.751774-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:35:29.751776-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:35:29.751778-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:35:29.751781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:35:29.751783-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:35:29.751785-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:35:29.751788-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:35:29.75179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.751792-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.751794-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T12:35:29.751796-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:35:29.7518-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:35:29.751802-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:35:29.751804-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:35:29.751806-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:16Z\"\n"} +{"Time":"2023-05-31T12:35:29.752019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:35:29.752026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.752028-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"364\"\n"} +{"Time":"2023-05-31T12:35:29.752031-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 471cf4c1-da4c-4f07-b19e-2b01eab6c10e\n"} +{"Time":"2023-05-31T12:35:29.752033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.752035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.752038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:35:29.75204-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:35:29.752042-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:35:29.752047-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:35:29.752049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - localhost\n"} +{"Time":"2023-05-31T12:35:29.752051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:29.752053-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:35:29.752057-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:35:29.752059-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:35:29.752062-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:35:29.752066-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:35:29.752068-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:35:29.752071-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:35:29.752073-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:35:29.752076-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:35:29.752079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:35:29.752082-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:35:29.752084-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:35:29.752087-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:35:29.752262-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" etcd:\n"} +{"Time":"2023-05-31T12:35:29.752268-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" local:\n"} +{"Time":"2023-05-31T12:35:29.75227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:35:29.752272-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:35:29.752275-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:35:29.752278-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:35:29.75228-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:35:29.752283-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:35:29.752296-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" networking:\n"} +{"Time":"2023-05-31T12:35:29.7523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:35:29.752303-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:35:29.752305-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:35:29.752307-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:35:29.752309-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:35:29.752312-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:35:29.752314-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.752316-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.752319-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:02Z\"\n"} +{"Time":"2023-05-31T12:35:29.752322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:35:29.752324-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.752328-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"198\"\n"} +{"Time":"2023-05-31T12:35:29.75233-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 628f4074-04d1-47a6-a9bc-03150f2ec3ac\n"} +{"Time":"2023-05-31T12:35:29.752332-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:35:29.752334-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T12:35:29.752336-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:35:29.752339-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:35:29.75253-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authentication:\n"} +{"Time":"2023-05-31T12:35:29.752535-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:35:29.752538-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:35:29.75254-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" webhook:\n"} +{"Time":"2023-05-31T12:35:29.752542-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:35:29.752545-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:35:29.752547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" x509:\n"} +{"Time":"2023-05-31T12:35:29.75255-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:35:29.752552-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authorization:\n"} +{"Time":"2023-05-31T12:35:29.752554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:35:29.752557-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" webhook:\n"} +{"Time":"2023-05-31T12:35:29.752559-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:35:29.752561-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:35:29.752563-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:35:29.752566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:35:29.752568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:35:29.75257-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:35:29.752572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:35:29.752575-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.752577-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:35:29.752579-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:35:29.752581-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:35:29.752583-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:35:29.752585-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.752588-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:35:29.752591-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:35:29.752592-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:35:29.75284-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:35:29.752845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:35:29.752868-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:35:29.75287-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:35:29.752872-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:35:29.752874-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:35:29.752877-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" logging:\n"} +{"Time":"2023-05-31T12:35:29.752879-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:35:29.752883-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" options:\n"} +{"Time":"2023-05-31T12:35:29.752885-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" json:\n"} +{"Time":"2023-05-31T12:35:29.752887-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:35:29.752889-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:35:29.752892-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:35:29.752894-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:35:29.752897-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:35:29.752899-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:35:29.752901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:35:29.752903-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.752906-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:35:29.752908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:35:29.752911-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:29.752913-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:35:29.752915-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:35:29.752917-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:35:29.752919-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.752921-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:34:02Z\"\n"} +{"Time":"2023-05-31T12:35:29.752923-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:35:29.753058-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:35:29.753061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"201\"\n"} +{"Time":"2023-05-31T12:35:29.753063-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: c35bded4-0dcd-43b9-95b1-83c466a5edcf\n"} +{"Time":"2023-05-31T12:35:29.753066-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: List\n"} +{"Time":"2023-05-31T12:35:29.753068-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T12:35:29.75307-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:35:29.753073-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.753075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.753078-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:35:29.75308-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:35:29.753083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: loaded (\u001b]8;;file://calico-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:35:29.753086-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:33:53 UTC; 1min 29s ago\r\n"} +{"Time":"2023-05-31T12:35:29.753088-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:35:29.753091-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:35:29.753093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Main PID: 1034 (dockerd)\r\n"} +{"Time":"2023-05-31T12:35:29.753095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tasks: 19\r\n"} +{"Time":"2023-05-31T12:35:29.753098-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Memory: 502.7M\r\n"} +{"Time":"2023-05-31T12:35:29.7531-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CPU: 29.753s\r\n"} +{"Time":"2023-05-31T12:35:29.753102-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:35:29.753106-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─1034 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:35:29.753108-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.753111-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:38.306953695Z\" level=info msg=\"ignoring event\" container=ebe3a219ff6aeb04994c71da89f89f5145b1ec79197a8246b4cb8ead65f9fad7 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753316-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:38 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:38.505955353Z\" level=info msg=\"ignoring event\" container=b4386adafbc4658b4b9ddbdadf01f7b20aac56eb147dfa198f3bf17205dc4f2d module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753319-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:39 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:39.308956409Z\" level=info msg=\"ignoring event\" container=90d9e8940229d780156b91867331d3fd7ec8e22ca68982430017d16cb287d077 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:40.482022663Z\" level=info msg=\"ignoring event\" container=964e4a675db0928eac123638af13957971afd22d74f5e119e3fbf89430cdb70e module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753325-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:40 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:40.484148629Z\" level=info msg=\"ignoring event\" container=81e254a18d45489c9478e3ee34c59de4b8366746b70b2716359c0bb82b14f4f0 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753328-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:41.510742737Z\" level=info msg=\"ignoring event\" container=694136df31d2a9f62273b382d93217e144902048a80a5257da18e733631ccc97 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:41.514164869Z\" level=info msg=\"ignoring event\" container=1ef81b491d7a1fd63524334ae093ae8341dc95dc1e946c69e6deb773e2b20dfb module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753334-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:41 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:41.983428615Z\" level=info msg=\"ignoring event\" container=05d73d24ed40e261cebfdf0ca544ead9f74296130081e6f65bbcb34609931429 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753337-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:42.486842432Z\" level=info msg=\"ignoring event\" container=ade3453d49fca528b718574782246ed77bac39a0ac4a5b50be872326fc87c84c module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.75334-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:42 calico-996000 dockerd[1034]: time=\"2023-05-31T19:34:42.506354003Z\" level=info msg=\"ignoring event\" container=b8243a87dea7d5057b9f14a57e9f1195d29bfa46e07e2fcf08c455b21526c8b2 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:35:29.753343-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.753578-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.753582-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:35:29.753585-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.753587-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:35:29.75359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:35:29.753592-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:35:29.753594-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:35:29.753596-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:35:29.753599-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:35:29.753601-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:35:29.753603-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:35:29.753605-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:35:29.753608-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.75361-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.753612-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:35:29.753614-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:35:29.753616-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.753618-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.75362-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.753622-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:35:29.753625-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:35:29.753627-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:35:29.753629-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:35:29.753631-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:35:29.753887-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:35:29.753892-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:35:29.753894-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.753896-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:35:29.753899-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:35:29.753901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:35:29.753903-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:35:29.753906-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:35:29.753908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.753911-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:35:29.753913-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:35:29.753915-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.753918-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.75392-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.753922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.753924-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:35:29.753927-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:35:29.75393-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.753932-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:35:29.753936-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.753939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:35:29.753941-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:35:29.753943-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.754106-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:35:29.754112-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:35:29.75412-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.754141-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:35:29.754143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:35:29.754146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.754148-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.75415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:35:29.754154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T12:35:29.754156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:35:29.754158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:35:29.75416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:35:29.754163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:35:29.754165-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T12:35:29.754167-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:35:29.75417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T12:35:29.754172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.754174-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.754176-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:35:29.754178-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:35:29.75418-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:35:29.754183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:35:29.754185-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:35:29.754187-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:35:29.754189-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:35:29.754192-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:35:29.754194-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:35:29.754396-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.754403-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:35:29.754408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers: 27\r\n"} +{"Time":"2023-05-31T12:35:29.754411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Running: 20\r\n"} +{"Time":"2023-05-31T12:35:29.754414-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:35:29.754416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Stopped: 7\r\n"} +{"Time":"2023-05-31T12:35:29.754418-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Images: 12\r\n"} +{"Time":"2023-05-31T12:35:29.754421-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:35:29.754423-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:35:29.754427-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:35:29.754429-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:35:29.754433-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:35:29.754436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:35:29.754439-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:35:29.754443-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:35:29.754447-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:35:29.754451-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:35:29.754454-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:35:29.754458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:35:29.754461-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:35:29.754468-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:35:29.754472-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:35:29.754475-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Runtimes: io.containerd.runc.v2 runc\r\n"} +{"Time":"2023-05-31T12:35:29.754479-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:35:29.754481-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:35:29.754483-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:35:29.754743-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:35:29.754752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:35:29.754758-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:35:29.754761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:35:29.754764-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:35:29.754766-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:35:29.75477-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:35:29.754772-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:35:29.754775-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:35:29.754777-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:35:29.754779-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:35:29.754781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:35:29.754784-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-996000\r\n"} +{"Time":"2023-05-31T12:35:29.754786-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ID: 944d808f-c889-46cb-a3ac-f0691566a49b\r\n"} +{"Time":"2023-05-31T12:35:29.754788-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:35:29.754791-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:35:29.754793-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:35:29.754796-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:35:29.754798-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:35:29.7548-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:35:29.754803-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:35:29.754805-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:35:29.754807-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:35:29.75481-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:35:29.754812-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.754814-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.754817-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.754819-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:35:29.755036-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:35:29.755045-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: loaded (\u001b]8;;file://calico-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:35:29.75505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:35:29.755054-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─\u001b]8;;file://calico-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:35:29.755058-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:33:53 UTC; 1min 31s ago\r\n"} +{"Time":"2023-05-31T12:35:29.755071-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:35:29.755079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:35:29.755081-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Main PID: 1255 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:35:29.7551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tasks: 12\r\n"} +{"Time":"2023-05-31T12:35:29.755104-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Memory: 19.0M\r\n"} +{"Time":"2023-05-31T12:35:29.755127-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CPU: 7.211s\r\n"} +{"Time":"2023-05-31T12:35:29.755131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:35:29.755135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─1255 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:35:29.755138-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.755143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: 2023-05-31 19:34:55.600 [INFO][7707] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [10.244.91.3/26] handle=\"k8s-pod-network.e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" host=\"calico-996000\"\r\n"} +{"Time":"2023-05-31T12:35:29.755145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: time=\"2023-05-31T19:34:55Z\" level=info msg=\"Released host-wide IPAM lock.\" source=\"ipam_plugin.go:378\"\r\n"} +{"Time":"2023-05-31T12:35:29.755151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: 2023-05-31 19:34:55.600 [INFO][7707] ipam_plugin.go 287: Calico CNI IPAM assigned addresses IPv4=[10.244.91.3/26] IPv6=[] ContainerID=\"e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" HandleID=\"k8s-pod-network.e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" Workload=\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\"\r\n"} +{"Time":"2023-05-31T12:35:29.755535-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: 2023-05-31 19:34:55.603 [INFO][7698] k8s.go 383: Populated endpoint ContainerID=\"e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" Namespace=\"default\" Pod=\"netcat-7458db8b8-jpmr2\" WorkloadEndpoint=\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\" endpoint=\u0026v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:\"WorkloadEndpoint\", APIVersion:\"projectcalico.org/v3\"}, ObjectMeta:v1.ObjectMeta{Name:\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\", GenerateName:\"netcat-7458db8b8-\", Namespace:\"default\", SelfLink:\"\", UID:\"566d939a-191c-4f66-84d7-a30b6f96df72\", ResourceVersion:\"623\", Generation:0, CreationTimestamp:time.Date(2023, time.May, 31, 19, 34, 55, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"app\":\"netcat\", \"pod-template-hash\":\"7458db8b8\", \"projectcalico.org/namespace\":\"default\", \"projectcalico.org/orchestrator\":\"k8s\", \"projectcalico.org/serviceaccount\":\"default\"}, Annotations:map"} +{"Time":"2023-05-31T12:35:29.755546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:\"k8s\", Workload:\"\", Node:\"calico-996000\", ContainerID:\"\", Pod:\"netcat-7458db8b8-jpmr2\", Endpoint:\"eth0\", ServiceAccountName:\"default\", IPNetworks:[]string{\"10.244.91.3/32\"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:\"\", IPv6Gateway:\"\", Profiles:[]string{\"kns.default\", \"ksa.default.default\"}, InterfaceName:\"cali1ce0d62fe56\", MAC:\"\", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}\r\n"} +{"Time":"2023-05-31T12:35:29.755567-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: 2023-05-31 19:34:55.604 [INFO][7698] k8s.go 384: Calico CNI using IPs: [10.244.91.3/32] ContainerID=\"e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" Namespace=\"default\" Pod=\"netcat-7458db8b8-jpmr2\" WorkloadEndpoint=\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\"\r\n"} +{"Time":"2023-05-31T12:35:29.755574-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: 2023-05-31 19:34:55.604 [INFO][7698] dataplane_linux.go 68: Setting the host side veth name to cali1ce0d62fe56 ContainerID=\"e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" Namespace=\"default\" Pod=\"netcat-7458db8b8-jpmr2\" WorkloadEndpoint=\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\"\r\n"} +{"Time":"2023-05-31T12:35:29.75558-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: 2023-05-31 19:34:55.606 [INFO][7698] dataplane_linux.go 473: Disabling IPv4 forwarding ContainerID=\"e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" Namespace=\"default\" Pod=\"netcat-7458db8b8-jpmr2\" WorkloadEndpoint=\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\"\r\n"} +{"Time":"2023-05-31T12:35:29.755585-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: 2023-05-31 19:34:55.611 [INFO][7698] k8s.go 411: Added Mac, interface name, and active container ID to endpoint ContainerID=\"e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" Namespace=\"default\" Pod=\"netcat-7458db8b8-jpmr2\" WorkloadEndpoint=\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\" endpoint=\u0026v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:\"WorkloadEndpoint\", APIVersion:\"projectcalico.org/v3\"}, ObjectMeta:v1.ObjectMeta{Name:\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\", GenerateName:\"netcat-7458db8b8-\", Namespace:\"default\", SelfLink:\"\", UID:\"566d939a-191c-4f66-84d7-a30b6f96df72\", ResourceVersion:\"623\", Generation:0, CreationTimestamp:time.Date(2023, time.May, 31, 19, 34, 55, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"app\":\"netcat\", \"pod-template-hash\":\"7458db8b8\", \"projectcalico.org/namespace\":\"default\", \"projectcalico.org/orchestrator\":\"k8s\", \"projectcalico.org"} +{"Time":"2023-05-31T12:35:29.75585-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"/serviceaccount\":\"default\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:\"k8s\", Workload:\"\", Node:\"calico-996000\", ContainerID:\"e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\", Pod:\"netcat-7458db8b8-jpmr2\", Endpoint:\"eth0\", ServiceAccountName:\"default\", IPNetworks:[]string{\"10.244.91.3/32\"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:\"\", IPv6Gateway:\"\", Profiles:[]string{\"kns.default\", \"ksa.default.default\"}, InterfaceName:\"cali1ce0d62fe56\", MAC:\"1a:67:75:69:a1:9a\", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}\r\n"} +{"Time":"2023-05-31T12:35:29.755863-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 cri-dockerd[1255]: 2023-05-31 19:34:55.616 [INFO][7698] k8s.go 489: Wrote updated endpoint to datastore ContainerID=\"e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b\" Namespace=\"default\" Pod=\"netcat-7458db8b8-jpmr2\" WorkloadEndpoint=\"calico--996000-k8s-netcat--7458db8b8--jpmr2-eth0\"\r\n"} +{"Time":"2023-05-31T12:35:29.755868-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:35:00 calico-996000 cri-dockerd[1255]: time=\"2023-05-31T19:35:00Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:35:29.755873-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.755877-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.755882-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:35:29.755886-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.755892-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:35:29.755896-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:35:29.755899-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:35:29.755902-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:35:29.755905-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:35:29.755907-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:35:29.755909-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756176-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.756191-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:35:29.756193-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:35:29.756195-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:35:29.756198-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:35:29.756201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:35:29.756203-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:35:29.756205-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756211-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:35:29.756216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:35:29.756219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:35:29.756223-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:35:29.756227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756232-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:35:29.756237-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:35:29.756241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:35:29.756258-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:35:29.756267-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756272-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:35:29.756275-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:35:29.75628-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.756286-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.75629-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.756294-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756297-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:35:29.756667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:35:29.756673-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.756677-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:35:29.756679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:35:29.756681-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756684-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:35:29.756687-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:35:29.756689-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756693-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.756697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.756701-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:35:29.756707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:35:29.756712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.756716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.756719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:35:29.756721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.756724-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:35:29.756727-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:35:29.756729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.756732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:35:29.756735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:35:29.756739-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:35:29.756742-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:35:29.75694-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:35:29.756947-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:35:29.75695-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:35:29.756952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756955-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.756957-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:35:29.756959-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:35:29.756962-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:35:29.756964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:35:29.756966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:35:29.756968-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:35:29.756971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:35:29.756977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:35:29.75698-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:35:29.756982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:35:29.756984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:35:29.756989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:35:29.756991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:35:29.756993-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:35:29.756995-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.756998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:35:29.757001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:35:29.757143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.757151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.757153-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.757156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.757158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:35:29.75716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:35:29.757162-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.757165-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:35:29.757167-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:35:29.75717-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.757172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:35:29.757176-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:35:29.757179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.757181-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.757184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:35:29.757186-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:35:29.757188-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.75719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.757192-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:35:29.757195-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:35:29.757198-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: loaded (\u001b]8;;file://calico-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:35:29.757201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:33:52 UTC; 1min 33s ago\r\n"} +{"Time":"2023-05-31T12:35:29.757203-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:35:29.757206-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Main PID: 815 (containerd)\r\n"} +{"Time":"2023-05-31T12:35:29.757208-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tasks: 229\r\n"} +{"Time":"2023-05-31T12:35:29.75721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Memory: 86.3M\r\n"} +{"Time":"2023-05-31T12:35:29.757366-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CPU: 8.186s\r\n"} +{"Time":"2023-05-31T12:35:29.757373-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:35:29.757376-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─ 815 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:35:29.75738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─1889 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 44e421d63c0a97bc3cc050ad508173694c3ae01cca511a07c59ad8136844262e -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─1919 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 99a513b3f02f1884baca48199491f7d2226fa58d777dedf656397e13e33144f9 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757385-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─1920 /usr/bin/containerd-shim-runc-v2 -namespace moby -id e83e20c86329dd27abad1bc9e8903c4437103eb0eb04fbfc236b34f528d10c7f -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.75739-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─1978 /usr/bin/containerd-shim-runc-v2 -namespace moby -id a7cbd73a31fff2dc36efc5fdba83ae96d8f1196fe997550929cfc0d53e019859 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2089 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 97635c586feebb4d6d76b78a51cb60122ee107535512ea749b715c8cebe46c74 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757398-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2096 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 3af22502555bb583e67049cc9681f05af5cfa037803a13daf3d751c56c1d6128 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2115 /usr/bin/containerd-shim-runc-v2 -namespace moby -id bda0978deaa7ee2379c09b22f17ec888e2ee4c7201d56d84d937abfa4a0285b2 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757406-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2156 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5e5408615e29b032174dda2591b41f3c000ec248110ec1641162fde4ee159095 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2797 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 26cb794a82243d7ca58d82f12865938e5e2ab720f7c162bbc54e093ad9f3f7fc -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757414-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2812 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 6adb3698a390d7fbfc551b940dc7aa0507e944f435c66063cf89d5218624d732 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2884 /usr/bin/containerd-shim-runc-v2 -namespace moby -id da1d501cf3f732bc4c9b2f12481f39cc8ffb6f6069e0acab0495f0b237f54549 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757419-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─3435 /usr/bin/containerd-shim-runc-v2 -namespace moby -id cb198ddabc77eda0c6ed18919b35e9b49c7cc68e4c79915a8dca8265f7f75b15 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757573-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─3487 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 28351278247fbd02fe24b0891fde0815ec4f527a89388570f52d7e0daf7f115e -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757579-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─6767 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 376d5b40a0a56cb6f3880128c4b93a03dfe302188138684e9b01f3f118b86a7d -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757583-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─6821 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 659e0ea3eb0d5d625aa102e93dd6f43ee95139e7135f1ace37842f3a124cd1dc -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757587-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─6868 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 3861aa029f16bf7f39ce25ebacf866ac329a7ed5830a01a5c5beedbd0124cdd3 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.75759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─7022 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 6a3c7367618f1d82e9e0dc0380bdd1d1b91a6afe5d02cb5c42614c36075063e1 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757594-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─7057 /usr/bin/containerd-shim-runc-v2 -namespace moby -id c1b464c229aedf20cd1c2599ad0d2655687242cd1cc9f67cb3ddaec2cf08584a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757597-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─7651 /usr/bin/containerd-shim-runc-v2 -namespace moby -id e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.7576-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─8023 /usr/bin/containerd-shim-runc-v2 -namespace moby -id eb469e4b069569975d814bdc10c9bf1d085929fbaa7540eb8dcf50db9050db5c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:35:29.757603-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.757605-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:43 calico-996000 containerd[815]: time=\"2023-05-31T19:34:43.910909596Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:35:29.757609-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:43 calico-996000 containerd[815]: time=\"2023-05-31T19:34:43.911215896Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/c1b464c229aedf20cd1c2599ad0d2655687242cd1cc9f67cb3ddaec2cf08584a pid=7057 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:35:29.757611-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 containerd[815]: time=\"2023-05-31T19:34:55.377792641Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:35:29.757616-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 containerd[815]: time=\"2023-05-31T19:34:55.377874414Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:35:29.757781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 containerd[815]: time=\"2023-05-31T19:34:55.377884606Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:35:29.75779-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:34:55 calico-996000 containerd[815]: time=\"2023-05-31T19:34:55.378163959Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/e2de3c8ba5b3c5ff6f3310fc6cfda787729d968cd6c9b4385bf0e2930861211b pid=7651 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:35:29.757795-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:35:00 calico-996000 containerd[815]: time=\"2023-05-31T19:35:00.914961109Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:35:29.7578-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:35:00 calico-996000 containerd[815]: time=\"2023-05-31T19:35:00.915043567Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:35:29.757804-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:35:00 calico-996000 containerd[815]: time=\"2023-05-31T19:35:00.915053156Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:35:29.75782-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:35:00 calico-996000 containerd[815]: time=\"2023-05-31T19:35:00.915510164Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/eb469e4b069569975d814bdc10c9bf1d085929fbaa7540eb8dcf50db9050db5c pid=8023 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:35:29.757828-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.757831-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.757834-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:35:29.757837-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.757841-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:35:29.757844-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.757846-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:35:29.757851-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:35:29.757855-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:35:29.757993-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.757997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:35:29.758001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.758003-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:35:29.758006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:35:29.758008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:35:29.758011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:35:29.758014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:35:29.758016-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:35:29.75802-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:35:29.758023-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:35:29.758025-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:35:29.758027-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.75803-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.758033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:35:29.758037-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:35:29.75804-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758042-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:35:29.758044-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:35:29.758047-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:35:29.758049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:35:29.758051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:35:29.758054-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:35:29.758056-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:35:29.758114-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.758117-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.75812-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.758122-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:35:29.758124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:35:29.758126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.758132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:35:29.758134-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758137-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:35:29.75814-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:35:29.758143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.758145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.758148-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:35:29.75815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:35:29.758154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.758158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:35:29.758162-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:35:29.758166-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:35:29.75817-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.758173-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:35:29.758175-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.758178-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:35:29.75818-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:35:29.758183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:35:29.758285-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:35:29.758293-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:35:29.758297-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.7583-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:35:29.758303-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:35:29.758307-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:35:29.75831-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:35:29.758315-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758318-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.75832-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:35:29.758323-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:35:29.758325-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:35:29.75833-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:35:29.758333-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:35:29.758336-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:35:29.75834-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:35:29.758343-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:35:29.758346-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:35:29.758349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.758351-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.758353-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.758356-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:35:29.758359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:35:29.758361-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.758465-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:35:29.758478-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758486-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:35:29.758499-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:35:29.758504-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.758508-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.758511-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:35:29.758513-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:35:29.758516-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:35:29.758519-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:35:29.758523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:35:29.758526-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:35:29.758529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:35:29.758536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:35:29.758542-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.758546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.758548-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:35:29.758551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:35:29.758553-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758555-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:35:29.758557-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.758559-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.758561-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.758564-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.758566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:35:29.758572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.758697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:35:29.758707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758713-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:35:29.758716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.75872-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758724-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:35:29.758731-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:35:29.758752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:35:29.75876-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:35:29.758764-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.758768-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:35:29.758773-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:35:29.758777-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:35:29.758781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:35:29.758784-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:35:29.758788-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:35:29.758792-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:35:29.758805-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758811-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:35:29.758815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:35:29.758819-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:35:29.758822-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.758824-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:35:29.758829-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.758831-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.758835-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.758951-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:35:29.758956-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:35:29.75896-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:35:29.758964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:35:29.758969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:35:29.758972-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:35:29.758981-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:35:29.758985-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:35:29.758988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.758991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:35:29.758993-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:35:29.758995-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.758998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:35:29.759009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:35:29.759018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:35:29.759023-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:35:29.759041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:35:29.759053-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:35:29.759057-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:35:29.759061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:35:29.759065-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.759069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.759073-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:35:29.759077-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:35:29.759201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:35:29.759207-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:35:29.75921-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:35:29.759214-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:35:29.759217-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:35:29.759219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759222-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:35:29.759224-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:35:29.75923-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759232-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759234-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:35:29.759236-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759239-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.759243-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759246-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.759248-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.75925-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:35:29.759253-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:35:29.759255-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.759257-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:35:29.75926-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:35:29.759262-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759266-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759268-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.75927-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.759467-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759471-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:35:29.759475-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759479-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:35:29.759483-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759487-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:35:29.759491-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759494-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:35:29.7595-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:35:29.759503-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:35:29.759507-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:35:29.759511-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:35:29.759516-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:35:29.75952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:35:29.759527-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:35:29.759532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:35:29.759536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:35:29.75954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:35:29.759543-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:35:29.759547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:35:29.759551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:35:29.759554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:35:29.759558-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:35:29.759563-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:35:29.759662-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:35:29.759672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:35:29.759678-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:35:29.759682-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:35:29.759687-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:35:29.759691-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:35:29.759695-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:35:29.759699-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:35:29.759703-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:35:29.759707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759711-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:35:29.759716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:35:29.759719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:35:29.759723-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759727-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759731-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:35:29.759735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:35:29.759753-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:35:29.759759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759788-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759796-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:35:29.7598-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759805-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:35:29.759809-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.759813-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:35:29.759817-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:35:29.759819-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:35:29.759822-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:35:29.759824-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:35:29.759827-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.75983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:35:29.759834-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759838-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759844-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:35:29.759849-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:35:29.759853-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:35:29.759857-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:35:29.75986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759865-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759868-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.75987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.759873-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759875-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:35:29.759932-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759934-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:35:29.759936-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.759939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:35:29.759943-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760123-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760139-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:35:29.760144-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:35:29.760147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:35:29.760151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:35:29.760154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:35:29.760164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760166-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:35:29.760169-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:35:29.760171-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760173-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:35:29.760175-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760178-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.76018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:35:29.760182-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:35:29.760184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:35:29.760186-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:35:29.760189-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760191-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760193-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760195-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760197-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760396-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:35:29.760401-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:35:29.760408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:35:29.760411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760413-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:35:29.760416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:35:29.760419-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760421-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:35:29.760423-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760426-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:35:29.760429-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760431-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:35:29.760436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76044-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:35:29.760442-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760444-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:35:29.760446-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760463-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760466-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760468-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:35:29.760471-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760473-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760476-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:35:29.760478-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760639-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760644-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:35:29.760646-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:35:29.760648-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760663-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:35:29.760665-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:35:29.76067-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:35:29.760672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760675-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760677-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:35:29.760679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.760682-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760684-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:35:29.760687-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:35:29.760689-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760691-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760694-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760696-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:35:29.760698-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760703-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760705-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76071-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760934-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760941-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760945-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760947-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760949-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760957-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760959-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:35:29.760961-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:35:29.760966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760972-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76098-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:35:29.760984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.760988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:35:29.76099-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.760994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:35:29.760997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761004-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.761007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761141-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.761149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:35:29.761153-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.761156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76116-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:35:29.761163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761165-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:35:29.761167-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76117-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761175-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761178-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761181-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:35:29.761183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:35:29.761185-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761188-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761191-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761193-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761196-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:35:29.761199-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:35:29.761202-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:35:29.761204-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761206-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:35:29.761222-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:35:29.761292-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:35:29.761297-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:35:29.7613-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:35:29.761302-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:35:29.761305-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761308-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:35:29.76131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.761312-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.761315-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:35:29.761317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.761319-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.761322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:35:29.761324-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:35:29.761327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: loaded (\u001b]8;;file://calico-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:35:29.76133-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:35:29.761333-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:35:29.761338-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:35:29.761342-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.761345-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.761349-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:35:29.761352-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:35:29.761355-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:35:29.761357-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:35:29.761361-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:35:29.76148-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:35:29.761486-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:35:29.761488-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:35:29.761491-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761493-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:35:29.761496-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:35:29.761499-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:35:29.761505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:35:29.761508-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:35:29.761511-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:35:29.761513-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:35:29.761516-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:35:29.761518-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:35:29.76152-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:35:29.761523-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:35:29.761525-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.761528-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:35:29.76153-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:35:29.761532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:35:29.761535-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:35:29.761537-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:35:29.761539-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:35:29.761544-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:35:29.761548-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:35:29.76155-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:35:29.761552-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.761714-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.76172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:35:29.761722-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:35:29.761725-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:35:29.761727-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.761732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:35:29.761735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.761738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:35:29.761741-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:35:29.761743-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.761746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761748-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:35:29.76175-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.761752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761754-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:35:29.761757-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.761759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:35:29.761761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:35:29.761764-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:35:29.761767-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:35:29.76177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.761772-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:35:29.761774-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.761777-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:35:29.761779-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:35:29.762057-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:35:29.762063-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:35:29.762067-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762071-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:35:29.762074-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:35:29.762078-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:35:29.76208-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:35:29.762098-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:35:29.762101-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762104-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:35:29.762111-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:35:29.762115-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:35:29.76212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:35:29.762129-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:35:29.762132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:35:29.76214-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:35:29.762142-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:35:29.762145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:35:29.762151-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:35:29.762155-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:35:29.76216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.762345-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762353-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:35:29.762357-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:35:29.762359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:35:29.762362-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762364-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:35:29.762367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:35:29.76237-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:35:29.762372-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:35:29.762374-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762376-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:35:29.762379-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:35:29.762381-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:35:29.762384-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:35:29.762387-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762389-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:35:29.762392-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:35:29.762394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:35:29.762396-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762399-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:35:29.762401-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:35:29.762404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:35:29.762408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:35:29.762634-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762643-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:35:29.762648-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:35:29.762652-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762656-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:35:29.762669-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:35:29.762675-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762678-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:35:29.762681-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:35:29.762689-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762693-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:35:29.762697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:35:29.762707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:35:29.762711-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762715-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:35:29.762721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:35:29.762725-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:35:29.762733-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.762736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762741-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:35:29.762744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:35:29.762747-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:35:29.762749-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.762751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762931-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:35:29.762939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:35:29.762943-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.762949-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762953-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:35:29.762965-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:35:29.762967-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:35:29.76297-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.762972-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:35:29.762978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:35:29.76298-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:35:29.762989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:35:29.762992-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.762996-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:35:29.763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:35:29.763002-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:35:29.763005-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:35:29.763011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:35:29.763014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:35:29.763016-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:35:29.763019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:35:29.763146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.763154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763159-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:35:29.763163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:35:29.763167-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:35:29.763177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.763192-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:35:29.763196-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763199-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:35:29.763201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:35:29.763204-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:35:29.763207-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.763209-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763211-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:35:29.763214-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:35:29.763216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.763218-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763222-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:35:29.763224-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:35:29.763227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:35:29.763229-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:35:29.763231-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.763233-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763425-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:35:29.763431-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:35:29.763434-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:35:29.763436-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:35:29.763438-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.763442-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763444-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:35:29.763447-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:35:29.76345-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763452-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:35:29.763456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:35:29.763458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.763461-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.763463-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763465-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:35:29.763468-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:35:29.76347-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:35:29.763472-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:35:29.763474-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:35:29.763477-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76348-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:35:29.763482-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:35:29.763484-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:35:29.763487-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:35:29.763651-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.763657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:35:29.763659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763662-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:35:29.763665-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:35:29.763667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.76367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:35:29.763675-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:35:29.763678-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:35:29.76368-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763683-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:35:29.763686-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.763688-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.763691-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763694-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:35:29.763697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:35:29.7637-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:35:29.763705-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.763709-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:35:29.763716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:35:29.763718-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:35:29.763874-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:35:29.763882-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:35:29.763887-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:35:29.763892-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:35:29.763899-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:35:29.763904-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:35:29.763908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:35:29.763911-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:35:29.763916-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:35:29.76392-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:35:29.763924-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.763929-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763933-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:35:29.763937-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:35:29.763942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:35:29.763946-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763949-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:35:29.763953-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:35:29.763957-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:35:29.76396-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.763964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.763967-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:35:29.763974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:35:29.763983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:35:29.763991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:35:29.763997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.764103-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:35:29.764117-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:35:29.764124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:35:29.764128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:35:29.764131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:35:29.764135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.764139-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:35:29.764146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:35:29.764152-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:35:29.764156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:35:29.76416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.764162-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:35:29.764167-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:35:29.76417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:35:29.764173-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:35:29.764175-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764177-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:35:29.76418-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:35:29.764183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:35:29.764185-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:35:29.764187-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.764189-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76433-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:35:29.764341-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:35:29.764346-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:35:29.764354-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.764358-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:35:29.764362-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:35:29.764367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:35:29.764371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.764374-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:35:29.764379-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:35:29.764382-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:35:29.764385-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:35:29.764387-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.764389-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.764393-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764395-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:35:29.764397-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:35:29.7644-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:35:29.764403-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764405-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:35:29.764417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:35:29.764424-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:35:29.764428-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:35:29.764549-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:35:29.76456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764563-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:35:29.764566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:35:29.764568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:35:29.764574-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:35:29.764577-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764579-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:35:29.764581-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:35:29.764584-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764586-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:35:29.764588-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.76459-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764593-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:35:29.764596-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:35:29.764598-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.7646-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:35:29.764603-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:35:29.764607-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.764609-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:35:29.764611-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764615-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:35:29.764618-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.764781-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.764789-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764793-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:35:29.764795-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:35:29.764798-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:35:29.764801-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.764805-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764808-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:35:29.764811-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:35:29.764815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:35:29.764819-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.764823-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764825-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:35:29.764827-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:35:29.76483-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:35:29.764832-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:35:29.764835-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764838-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:35:29.76484-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:35:29.764842-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:35:29.764846-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:35:29.764849-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.764853-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:35:29.765086-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:35:29.765095-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:35:29.765097-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:35:29.7651-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765102-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:35:29.765105-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:35:29.765108-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:35:29.765112-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:35:29.765114-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:35:29.765116-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765119-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:35:29.765121-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:35:29.765124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:35:29.765128-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.765132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:35:29.76514-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:35:29.765143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:35:29.765145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765148-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:35:29.76515-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.765155-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765157-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:35:29.765159-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:35:29.765404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:35:29.765413-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.765416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765419-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:35:29.765421-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:35:29.765426-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:35:29.765428-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:35:29.76543-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:35:29.765438-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:35:29.765441-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:35:29.765443-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.765446-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765448-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:35:29.765451-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:35:29.765454-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:35:29.765456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:35:29.765459-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.765462-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:35:29.765467-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:35:29.76547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:35:29.765472-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:35:29.765475-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:35:29.765477-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:35:29.765653-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:35:29.765672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:35:29.76568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:35:29.765691-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:35:29.765695-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:35:29.7657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:35:29.765704-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:35:29.765708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:35:29.76571-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:35:29.765712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:35:29.765715-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:35:29.765718-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:35:29.76572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:35:29.765723-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:35:29.765726-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:35:29.765728-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:35:29.765731-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:35:29.765734-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:35:29.765736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:35:29.765739-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:35:29.765741-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:35:29.765922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:35:29.765931-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:35:29.765936-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:35:29.76594-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:35:29.765945-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:35:29.765951-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765955-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765959-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:35:29.765963-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.765966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:35:29.76597-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.765975-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.765979-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.765982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \r\n"} +{"Time":"2023-05-31T12:35:29.765986-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:35:29.76599-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:35:29.765995-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.765999-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \r\n"} +{"Time":"2023-05-31T12:35:29.766002-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.766006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \r\n"} +{"Time":"2023-05-31T12:35:29.766009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:35:29.766012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:35:29.766015-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.766017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \r\n"} +{"Time":"2023-05-31T12:35:29.766021-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:35:29.766024-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.76625-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \r\n"} +{"Time":"2023-05-31T12:35:29.76626-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766264-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:35:29.766269-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:35:29.766274-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:35:29.766278-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766282-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:35:29.766287-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:35:29.766292-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:35:29.766298-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766301-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:35:29.766306-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:35:29.766308-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76631-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:35:29.766313-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:35:29.766315-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:35:29.76632-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:35:29.766328-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766347-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:35:29.766366-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:35:29.766371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:35:29.766375-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:35:29.766379-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:35:29.766487-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:35:29.766503-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:35:29.76651-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:35:29.766514-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:35:29.766518-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:35:29.766524-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:35:29.766528-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:35:29.766532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:35:29.766536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:35:29.76654-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:35:29.766544-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:35:29.766547-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:35:29.766551-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:35:29.766554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:35:29.766564-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:35:29.766569-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:35:29.766573-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:35:29.766578-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:35:29.766595-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:35:29.766599-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \r\n"} +{"Time":"2023-05-31T12:35:29.766603-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:35:29.766715-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.766718-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:35:29.76672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:35:29.766723-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:35:29.76673-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:35:29.766733-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:35:29.766736-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:35:29.766739-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766741-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:35:29.766747-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:35:29.766751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766755-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:35:29.766758-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:35:29.766763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.766767-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76677-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:35:29.766775-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.766779-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:35:29.766783-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766787-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:35:29.766792-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:35:29.766796-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.7668-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.766947-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766956-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:35:29.766961-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:35:29.766966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:35:29.76697-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.766974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:35:29.766978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.766992-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:35:29.766998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:35:29.767001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:35:29.767006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:35:29.767009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:35:29.767014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.767018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:35:29.767026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:35:29.76703-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:35:29.767035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:35:29.767039-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.767044-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767047-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:35:29.767052-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:35:29.767164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:35:29.76717-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767174-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:35:29.767178-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.767182-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767191-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:35:29.767195-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:35:29.767198-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:35:29.767201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767203-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:35:29.767206-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:35:29.767208-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.76721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:35:29.767215-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:35:29.767217-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:35:29.767221-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:35:29.767224-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:35:29.767226-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.767241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767247-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:35:29.767251-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:35:29.767255-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767261-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:35:29.767265-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:35:29.767271-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767377-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:35:29.767383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:35:29.767388-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:35:29.767392-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:35:29.767397-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:35:29.767407-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:35:29.767411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:35:29.767425-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767434-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:35:29.767438-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:35:29.767445-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:35:29.767448-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:35:29.76745-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:35:29.767452-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:35:29.767455-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:35:29.767457-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:35:29.76746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:35:29.767463-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767465-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:35:29.767467-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:35:29.767469-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767472-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:35:29.767474-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767478-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767665-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767667-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.76767-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767672-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767674-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.767679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.767694-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:35:29.767699-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:35:29.767702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:35:29.767712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.767716-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:35:29.767723-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:35:29.767727-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:35:29.76773-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:35:29.767732-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.767735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:35:29.767747-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:35:29.767751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.767756-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767759-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:35:29.767763-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:35:29.767876-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767883-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:35:29.767887-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:35:29.767891-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767895-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:35:29.7679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:35:29.767904-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767908-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:35:29.767922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:35:29.767936-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767951-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:35:29.767957-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:35:29.76796-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767963-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:35:29.767966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:35:29.767969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:35:29.767971-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.767974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.767977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.767979-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:35:29.767982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:35:29.675159736Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:35:29.767988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:35:29.767998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:35:29.768004-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:35:29.768126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:35:29.768137-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.768147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:35:29.768158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:35:29.76817-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:35:29.768174-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:35:29.76818-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:35:29.76819-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768197-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:35:29.768201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:35:29.768216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:35:29.768225-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:35:29.768229-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:35:29.768243-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768248-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:35:29.768253-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:35:29.768257-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:35:29.768261-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768265-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:35:29.768269-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:35:29.768272-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768276-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:35:29.768543-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:35:29.76855-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.768553-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:35:29.768558-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:35:29.768561-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:35:29.768563-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.768566-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768569-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:35:29.768572-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:35:29.768575-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:35:29.768577-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76858-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:35:29.768582-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:35:29.768584-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:35:29.768587-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:35:29.76859-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768592-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:35:29.768595-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:35:29.768597-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:35:29.7686-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:35:29.768602-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768604-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:35:29.768607-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:35:29.768771-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:35:29.768777-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.76878-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:35:29.768783-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:35:29.768786-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:35:29.768788-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:35:29.768791-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768793-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:35:29.768796-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:35:29.768798-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768802-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:35:29.768804-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:35:29.768807-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768811-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:35:29.768815-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:35:29.76882-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768826-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:35:29.76883-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:35:29.768832-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:35:29.768835-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768837-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:35:29.76884-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:35:29.768842-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.768845-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:35:29.768847-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:35:29.769017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:35:29.769019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:35:29.769026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769029-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769032-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:35:29.769035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:35:29.769038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.76904-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:35:29.769046-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:35:29.769048-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:35:29.769051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769053-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769055-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:35:29.769058-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:35:29.769061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769065-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:35:29.769069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:35:29.769075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:35:29.769083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:35:29.769087-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:35:29.769257-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769264-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:35:29.769268-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:35:29.769274-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:35:29.769279-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:35:29.769283-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:35:29.769288-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.769294-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769298-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:35:29.7693-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:35:29.769302-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769305-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:35:29.769307-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.76931-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:35:29.769312-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769315-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:35:29.769318-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:35:29.76932-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:35:29.769323-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769326-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769328-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:35:29.769331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:35:29.769333-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769335-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769469-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:35:29.769474-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:35:29.769477-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:35:29.76948-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:35:29.769483-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.769485-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769488-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:35:29.769491-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:35:29.769494-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:35:29.769496-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:35:29.769499-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.769501-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769503-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:35:29.769506-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:35:29.769509-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769512-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:35:29.769519-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:35:29.769522-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.769524-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769527-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:35:29.769532-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:35:29.769536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:35:29.76954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:35:29.769702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:35:29.769707-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769709-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:35:29.769712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:35:29.769714-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:35:29.769717-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:35:29.76972-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.769722-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:35:29.769725-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769727-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:35:29.769729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:35:29.769733-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769738-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:35:29.769741-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:35:29.769743-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:35:29.769746-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769748-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:35:29.769751-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.769754-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769756-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769762-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:35:29.769764-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:35:29.769929-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769937-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:35:29.769942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.769946-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.769951-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:35:29.769954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:35:29.769958-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:35:29.769963-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:35:29.76997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:35:29.769974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:35:29.769978-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:35:29.769984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:35:29.769988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:35:29.769992-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:35:29.769997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:35:29.77-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:35:29.770004-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:35:29.770008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.770011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770013-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:35:29.770018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:35:29.770022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:35:29.770025-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770028-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:35:29.770031-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:35:29.770179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:35:29.770184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.770186-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.77019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:35:29.770199-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:35:29.770204-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:35:29.770208-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:35:29.770212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.770216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.77022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:35:29.770223-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:35:29.77023-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:35:29.770235-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:35:29.770239-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:35:29.770246-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.770249-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770253-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:35:29.770257-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:35:29.770259-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:35:29.770261-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:35:29.770264-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.770266-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770269-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:35:29.770286-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:35:29.770301-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:35:29.770415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:35:29.770419-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770423-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:35:29.770427-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:35:29.770431-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:35:29.770435-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:35:29.770439-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.770443-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770447-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:35:29.770451-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:35:29.770454-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:35:29.770458-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.770462-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:35:29.770466-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:35:29.77047-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:35:29.770474-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.77048-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:35:29.770485-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:35:29.770489-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:35:29.770497-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:35:29.770501-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.770505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.770511-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770514-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:35:29.770752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:35:29.770761-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:35:29.770765-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770769-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:35:29.770773-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:35:29.770784-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:35:29.770788-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:35:29.770792-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:35:29.770794-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770797-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:35:29.770799-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:35:29.77082-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770824-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:35:29.770828-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:35:29.770832-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770836-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:35:29.77084-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:35:29.770843-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770847-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:35:29.770865-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.770872-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.770875-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:35:29.770877-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:35:29.77088-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771003-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:35:29.77101-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:35:29.771018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.771022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:35:29.771024-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771027-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:35:29.771031-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.771035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.771041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771048-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:35:29.77105-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:35:29.771054-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:35:29.771056-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.771059-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771062-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:35:29.771064-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:35:29.771066-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:35:29.771071-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.771076-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:35:29.771083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:35:29.771087-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:35:29.771091-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:35:29.771094-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771313-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:35:29.771324-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:35:29.771327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:35:29.77133-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:35:29.771332-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771336-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:35:29.771339-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:35:29.771341-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:35:29.771345-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:35:29.771347-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.77135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:35:29.771352-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:35:29.771355-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:35:29.771357-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:35:29.771359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:35:29.771362-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771365-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:35:29.771367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:35:29.77137-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:35:29.771373-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.771375-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771377-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:35:29.77138-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:35:29.771628-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:35:29.771641-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771648-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:35:29.771652-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.771655-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:35:29.771663-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:35:29.771666-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:35:29.771669-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.771673-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771677-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:35:29.771681-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:35:29.771686-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:35:29.77169-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:35:29.771694-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:35:29.771699-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:35:29.771705-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:35:29.771708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.771712-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.771715-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:35:29.771719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:35:29.771723-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:35:29.772052-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:35:29.772061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.772066-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:35:29.77207-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:35:29.772074-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:35:29.772077-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:35:29.772079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:35:29.772082-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:35:29.772085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:35:29.772087-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:35:29.772091-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:35:29.772093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:35:29.772097-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:35:29.772099-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:35:29.772102-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:35:29.772105-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:35:29.772116-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:35:29.772124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:35:29.772127-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:35:29.77213-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:35:29.772132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:35:29.772136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:35:29.772138-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:35:29.772335-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:35:29.772362-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:35:29.772366-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:35:29.772369-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:35:29.772371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:35:29.772374-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:35:29.772376-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:35:29.772379-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:35:29.772381-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:35:29.772383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:35:29.772391-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:35:29.772394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772399-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:35:29.772404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.772407-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:35:29.772409-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:35:29.772411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.772415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772417-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.77242-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.772422-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772618-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.772627-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.772632-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772648-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772653-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:35:29.772657-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:35:29.772659-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:35:29.772661-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772663-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:35:29.77268-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:35:29.772683-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:35:29.772688-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772691-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:35:29.772695-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:35:29.772699-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:35:29.772706-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:35:29.77271-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772713-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:35:29.772718-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:35:29.77272-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.772724-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:35:29.772726-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:35:29.772729-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:35:29.772731-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:35:29.772855-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:35:29.772879-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:35:29.772882-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:35:29.772884-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:35:29.772887-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:35:29.772893-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:35:29.772896-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:35:29.772898-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:35:29.772901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:35:29.772903-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:35:29.772907-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:35:29.772909-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:35:29.772914-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:35:29.772917-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:35:29.772919-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:35:29.772922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:35:29.772924-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:35:29.77293-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:35:29.772932-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:35:29.772935-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:35:29.773113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \r\n"} +{"Time":"2023-05-31T12:35:29.773118-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.773121-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:35:29.773124-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T12:35:29.773126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:35:29.773129-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:35:29.773132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:35:29.773134-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:35:29.773137-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:35:29.77314-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:35:29.773142-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.773145-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:35:29.773147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:35:29.77315-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.773152-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:35:29.773154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:35:29.773157-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.773159-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.773161-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:35:29.773163-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.773168-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:35:29.773171-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.773173-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:35:29.773175-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:35:29.773656-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.773665-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.773679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.773691-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:35:29.773694-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:35:29.773701-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:35:29.773703-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:35:29.773706-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:35:29.773708-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.77371-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:35:29.773713-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:35:29.773715-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:35:29.773717-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:35:29.773719-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:35:29.773722-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.773724-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.773726-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:35:29.773728-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:35:29.773731-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:35:29.773733-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:35:29.773735-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.773737-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.773739-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:35:29.773982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:35:29.773989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:35:29.774009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:35:29.774017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.774021-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774023-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:35:29.774026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:35:29.774028-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:35:29.774031-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:35:29.774036-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:35:29.774038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.774041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:35:29.774046-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:35:29.774049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:35:29.774053-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:35:29.774056-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:35:29.774058-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.774061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774063-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:35:29.774065-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:35:29.774068-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774229-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:35:29.774234-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:35:29.774236-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774239-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:35:29.774241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:35:29.774248-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:35:29.774251-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:35:29.774254-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:35:29.774256-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:35:29.774259-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:35:29.774261-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774264-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:35:29.774266-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:35:29.774268-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:35:29.774273-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:35:29.774275-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:35:29.774279-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:35:29.774281-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:35:29.774284-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:35:29.774287-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:35:29.774289-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774291-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:35:29.774293-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:35:29.774296-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774298-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:35:29.774489-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774497-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.7745-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774502-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774508-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.77451-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774513-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:35:29.774516-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:35:29.774519-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:35:29.774522-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:35:29.774524-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774526-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:35:29.774529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.774531-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774533-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:35:29.774536-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:35:29.774539-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:35:29.774541-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:35:29.774543-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.774546-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774548-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:35:29.77455-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:35:29.774554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:35:29.774556-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774559-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:35:29.774888-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:35:29.774895-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774905-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:35:29.77491-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:35:29.774914-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774918-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:35:29.774922-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:35:29.774926-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774932-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:35:29.774934-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:35:29.774937-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:35:29.774942-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:35:29.774945-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774947-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:35:29.774949-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:35:29.774952-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:35:29.774954-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T12:35:29.774957-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:35:29.77496-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ----------------------- debugLogs end: calico-996000 [took: 21.243381727s] --------------------------------\n"} +{"Time":"2023-05-31T12:35:29.774963-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:175: Cleaning up \"calico-996000\" profile ...\n"} +{"Time":"2023-05-31T12:35:29.774966-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p calico-996000\n"} +{"Time":"2023-05-31T12:35:32.485802-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p calico-996000: (2.731468887s)\n"} +{"Time":"2023-05-31T12:35:32.485854-07:00","Action":"cont","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T12:35:32.485865-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== CONT TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T12:35:32.4859-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/Start"} +{"Time":"2023-05-31T12:35:32.485917-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/Start\n"} +{"Time":"2023-05-31T12:35:32.485978-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p custom-flannel-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=testdata/kube-flannel.yaml --driver=docker \n"} +{"Time":"2023-05-31T12:35:52.780824-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:287: (dbg) Done: out/minikube-darwin-amd64 start -p kubernetes-upgrade-496000 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=docker : (33.876765348s)\n"} +{"Time":"2023-05-31T12:35:52.780844-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:291: *** TestKubernetesUpgrade FAILED at 2023-05-31 12:35:52.780805 -0700 PDT m=+3173.882108213\n"} +{"Time":"2023-05-31T12:35:52.780852-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:35:52.780857-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:230: ======\u003e post-mortem[TestKubernetesUpgrade]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:35:52.781008-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:231: (dbg) Run: docker inspect kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:52.842141-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:235: (dbg) docker inspect kubernetes-upgrade-496000:\n"} +{"Time":"2023-05-31T12:35:52.842157-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:35:52.84216-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:35:52.842162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[\n"} +{"Time":"2023-05-31T12:35:52.842172-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.842174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Id\": \"c34da42a10fca88d0a433aabb98fe5f04b86aa39e725c1b801accedb03c50651\",\n"} +{"Time":"2023-05-31T12:35:52.842176-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Created\": \"2023-05-31T19:26:25.016365528Z\",\n"} +{"Time":"2023-05-31T12:35:52.842179-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:35:52.842183-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:35:52.842186-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:35:52.842189-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842191-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:35:52.842194-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:35:52.842196-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:35:52.842198-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:35:52.842201-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:35:52.842204-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:35:52.842207-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:35:52.842212-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Pid\": 211969,\n"} +{"Time":"2023-05-31T12:35:52.842214-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842216-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842219-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"StartedAt\": \"2023-05-31T19:30:39.609988406Z\",\n"} +{"Time":"2023-05-31T12:35:52.842221-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"FinishedAt\": \"2023-05-31T19:30:37.271755321Z\"\n"} +{"Time":"2023-05-31T12:35:52.842224-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:35:52.842229-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/c34da42a10fca88d0a433aabb98fe5f04b86aa39e725c1b801accedb03c50651/resolv.conf\",\n"} +{"Time":"2023-05-31T12:35:52.842232-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/c34da42a10fca88d0a433aabb98fe5f04b86aa39e725c1b801accedb03c50651/hostname\",\n"} +{"Time":"2023-05-31T12:35:52.842236-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/c34da42a10fca88d0a433aabb98fe5f04b86aa39e725c1b801accedb03c50651/hosts\",\n"} +{"Time":"2023-05-31T12:35:52.842239-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"LogPath\": \"/var/lib/docker/containers/c34da42a10fca88d0a433aabb98fe5f04b86aa39e725c1b801accedb03c50651/c34da42a10fca88d0a433aabb98fe5f04b86aa39e725c1b801accedb03c50651-json.log\",\n"} +{"Time":"2023-05-31T12:35:52.842243-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Name\": \"/kubernetes-upgrade-496000\",\n"} +{"Time":"2023-05-31T12:35:52.842247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:35:52.84225-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:35:52.842254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:35:52.842257-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.84226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842267-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:35:52.842274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:35:52.842278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:35:52.842281-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:35:52.842285-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"kubernetes-upgrade-496000:/var\"\n"} +{"Time":"2023-05-31T12:35:52.842288-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842291-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842294-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:35:52.842297-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:35:52.842299-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:35:52.842301-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842304-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"NetworkMode\": \"kubernetes-upgrade-496000\",\n"} +{"Time":"2023-05-31T12:35:52.842307-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:35:52.84231-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.842313-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.842316-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.84232-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:35:52.842323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.842327-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.84233-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.842333-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.842336-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.84234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:35:52.842343-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.842346-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842361-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.842368-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.842372-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.842376-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:35:52.84238-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.842383-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842387-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.842391-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.842394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.842398-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:35:52.842402-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.842405-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.842412-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.842424-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.842428-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:35:52.842431-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.842435-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ]\n"} +{"Time":"2023-05-31T12:35:52.842438-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842442-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:35:52.842445-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:35:52.842449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:35:52.842453-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842456-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:35:52.84246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842464-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:35:52.842467-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:35:52.842471-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:35:52.842474-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t 0\n"} +{"Time":"2023-05-31T12:35:52.842478-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842481-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:35:52.84249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:35:52.842494-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:35:52.8425-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:35:52.842504-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:35:52.842507-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:35:52.842511-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:35:52.842514-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:35:52.842518-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:35:52.842522-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842525-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:35:52.842529-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842533-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842536-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:35:52.84254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:35:52.842544-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:35:52.842547-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:35:52.842551-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:35:52.842554-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:35:52.842558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:35:52.842561-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842565-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:35:52.842569-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842572-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:35:52.842576-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842579-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842583-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842587-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:35:52.84259-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:35:52.842594-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842598-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842601-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:35:52.842605-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:35:52.842609-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842612-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:35:52.842619-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:35:52.842623-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:35:52.842626-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:35:52.84263-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:35:52.842634-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842637-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842641-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842645-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842648-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842652-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842655-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:35:52.842662-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:35:52.842665-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:35:52.842669-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842672-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MemorySwap\": 2306867200,\n"} +{"Time":"2023-05-31T12:35:52.842676-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:35:52.84268-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:35:52.842683-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:35:52.842687-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:35:52.842691-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842695-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842698-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842702-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:35:52.842706-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:35:52.842712-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:35:52.842723-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842731-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:35:52.842733-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:35:52.842737-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/dbe1f7fe5798d61e022a9684f9347e88e062a90183dade445dc0d0462077d964-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:35:52.842741-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/dbe1f7fe5798d61e022a9684f9347e88e062a90183dade445dc0d0462077d964/merged\",\n"} +{"Time":"2023-05-31T12:35:52.842745-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/dbe1f7fe5798d61e022a9684f9347e88e062a90183dade445dc0d0462077d964/diff\",\n"} +{"Time":"2023-05-31T12:35:52.842748-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/dbe1f7fe5798d61e022a9684f9347e88e062a90183dade445dc0d0462077d964/work\"\n"} +{"Time":"2023-05-31T12:35:52.842752-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842755-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:35:52.842759-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842762-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:35:52.842765-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.842769-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:35:52.842772-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:35:52.842776-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:35:52.842779-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:35:52.842782-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:35:52.842786-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:35:52.842789-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842792-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.842796-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:35:52.842799-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Name\": \"kubernetes-upgrade-496000\",\n"} +{"Time":"2023-05-31T12:35:52.842808-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Source\": \"/var/lib/docker/volumes/kubernetes-upgrade-496000/_data\",\n"} +{"Time":"2023-05-31T12:35:52.842812-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:35:52.842815-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:35:52.842818-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:35:52.84282-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:35:52.842822-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:35:52.842825-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.842828-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842832-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:35:52.842836-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Hostname\": \"kubernetes-upgrade-496000\",\n"} +{"Time":"2023-05-31T12:35:52.842839-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842843-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.842846-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:35:52.842849-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:35:52.842852-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:35:52.842857-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:35:52.842865-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:35:52.842871-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:35:52.842875-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:35:52.842881-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:35:52.842887-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:35:52.842891-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842898-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:35:52.842901-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:35:52.842905-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:35:52.842909-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:35:52.842912-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:35:52.842916-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:35:52.84292-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842927-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:35:52.842932-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:35:52.842936-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:35:52.842942-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:35:52.842946-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:35:52.84295-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:35:52.842954-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:35:52.842957-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.842963-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:35:52.842967-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:35:52.84297-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:35:52.842975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"mode.minikube.sigs.k8s.io\": \"kubernetes-upgrade-496000\",\n"} +{"Time":"2023-05-31T12:35:52.842978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"name.minikube.sigs.k8s.io\": \"kubernetes-upgrade-496000\",\n"} +{"Time":"2023-05-31T12:35:52.842982-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:35:52.842986-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842989-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:35:52.842993-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.842997-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:35:52.843-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843004-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"SandboxID\": \"c661741127491853918dacea377f5ee328a08b612e9f50712a89c4328d8e8abd\",\n"} +{"Time":"2023-05-31T12:35:52.843008-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:35:52.843013-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843019-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:35:52.843022-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:35:52.843024-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.843026-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.843039-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.843049-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"52060\"\n"} +{"Time":"2023-05-31T12:35:52.843054-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.843058-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.843062-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.843065-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.843069-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.843073-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"52061\"\n"} +{"Time":"2023-05-31T12:35:52.843077-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.84308-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.843084-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.843088-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.843091-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.843095-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"52057\"\n"} +{"Time":"2023-05-31T12:35:52.843098-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.843102-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.843105-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.843109-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.843113-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.843116-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"52058\"\n"} +{"Time":"2023-05-31T12:35:52.843119-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.843122-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.843124-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:35:52.843126-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t {\n"} +{"Time":"2023-05-31T12:35:52.843128-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:52.84313-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"HostPort\": \"52059\"\n"} +{"Time":"2023-05-31T12:35:52.843133-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.843135-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ]\n"} +{"Time":"2023-05-31T12:35:52.843136-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.843139-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/c66174112749\",\n"} +{"Time":"2023-05-31T12:35:52.843141-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:35:52.843143-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:35:52.843145-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843148-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843152-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843155-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:35:52.843158-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:35:52.843164-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843166-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843168-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:35:52.84317-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"kubernetes-upgrade-496000\": {\n"} +{"Time":"2023-05-31T12:35:52.843172-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:35:52.843174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IPv4Address\": \"192.168.67.2\"\n"} +{"Time":"2023-05-31T12:35:52.843182-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t },\n"} +{"Time":"2023-05-31T12:35:52.843185-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:35:52.843188-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:35:52.843192-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"c34da42a10fc\",\n"} +{"Time":"2023-05-31T12:35:52.843198-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:52.843202-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ],\n"} +{"Time":"2023-05-31T12:35:52.843205-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"NetworkID\": \"1683fcd5a716a953bd6cde4ce5d31a46e8aea6783c58a40834c5d1573d1f37c7\",\n"} +{"Time":"2023-05-31T12:35:52.843209-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"EndpointID\": \"be7307135b136abc93a412edc531b036242b668e1bb8fbb29b8ea252ce9ad81c\",\n"} +{"Time":"2023-05-31T12:35:52.843212-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Gateway\": \"192.168.67.1\",\n"} +{"Time":"2023-05-31T12:35:52.843216-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IPAddress\": \"192.168.67.2\",\n"} +{"Time":"2023-05-31T12:35:52.843219-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:35:52.843223-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.843226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:35:52.84323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:35:52.843233-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"MacAddress\": \"02:42:c0:a8:43:02\",\n"} +{"Time":"2023-05-31T12:35:52.843237-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:35:52.84324-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.843243-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.843247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.84325-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t }\n"} +{"Time":"2023-05-31T12:35:52.843253-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t]\n"} +{"Time":"2023-05-31T12:35:52.843257-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:35:52.84326-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:35:52.843263-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p kubernetes-upgrade-496000 -n kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:53.247712-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:244: \u003c\u003c\u003c TestKubernetesUpgrade FAILED: start of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T12:35:53.24774-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:245: ======\u003e post-mortem[TestKubernetesUpgrade]: minikube logs \u003c======\n"} +{"Time":"2023-05-31T12:35:53.247747-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:247: (dbg) Run: out/minikube-darwin-amd64 -p kubernetes-upgrade-496000 logs -n 25\n"} +{"Time":"2023-05-31T12:35:56.64229-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:247: (dbg) Done: out/minikube-darwin-amd64 -p kubernetes-upgrade-496000 logs -n 25: (3.394409654s)\n"} +{"Time":"2023-05-31T12:35:56.695246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:252: TestKubernetesUpgrade logs: \n"} +{"Time":"2023-05-31T12:35:56.695261-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:35:56.695264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.695266-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T12:35:56.695269-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* |---------|------------------------------------------------------|-----------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:35:56.695271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T12:35:56.695274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t|---------|------------------------------------------------------|-----------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:35:56.695276-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl status kubelet --all | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695281-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695283-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695285-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl cat kubelet | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695288-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.69529-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695292-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | journalctl -xeu kubelet --all | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695295-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695297-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo cat | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.6953-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | /etc/kubernetes/kubelet.conf | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695302-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo cat | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695304-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | /var/lib/kubelet/config.yaml | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695306-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695309-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl status docker --all | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695311-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695313-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695316-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl cat docker | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695318-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.69532-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo cat | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695322-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | /etc/docker/daemon.json | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695325-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo docker | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695335-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | system info | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695337-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695339-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl status cri-docker | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695342-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --all --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695344-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695346-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl cat cri-docker | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695348-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695351-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo cat | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695353-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | /etc/systemd/system/cri-docker.service.d/10-cni.conf | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695355-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo cat | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695357-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | /usr/lib/systemd/system/cri-docker.service | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.69536-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695362-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | cri-dockerd --version | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695364-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.69537-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl status containerd | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695372-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --all --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695374-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695377-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl cat containerd | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695379-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695382-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo cat | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695384-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | /lib/systemd/system/containerd.service | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695386-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo cat | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695389-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | /etc/containerd/config.toml | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695391-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | containerd config dump | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695396-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | |\n"} +{"Time":"2023-05-31T12:35:56.695398-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl status crio --all | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695401-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695405-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695407-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | systemctl cat crio --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.69541-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo find | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695412-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | /etc/crio -type f -exec sh -c | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695415-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | 'echo {}; cat {}' \\; | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695417-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| ssh | -p calico-996000 sudo crio | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695419-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | config | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695422-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| delete | -p calico-996000 | calico-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | 31 May 23 12:35 PDT |\n"} +{"Time":"2023-05-31T12:35:56.695424-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| start | -p custom-flannel-996000 | custom-flannel-996000 | jenkins | v1.30.1 | 31 May 23 12:35 PDT | |\n"} +{"Time":"2023-05-31T12:35:56.695426-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --memory=3072 --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695429-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --wait=true --wait-timeout=15m | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695431-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --cni=testdata/kube-flannel.yaml | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695433-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T12:35:56.695436-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t|---------|------------------------------------------------------|-----------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:35:56.695438-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.69544-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.695442-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T12:35:56.695444-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Log file created at: 2023/05/31 12:35:32\n"} +{"Time":"2023-05-31T12:35:56.695449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRunning on machine: MacOS-Agent-3\n"} +{"Time":"2023-05-31T12:35:56.695451-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tBinary: Built with gc go1.20.4 for darwin/amd64\n"} +{"Time":"2023-05-31T12:35:56.695454-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T12:35:56.695456-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.533041 14039 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:35:56.695458-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.533227 14039 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:35:56.69546-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.533232 14039 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:35:56.695462-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.533238 14039 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:35:56.695465-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.533361 14039 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:35:56.695467-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.535060 14039 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:35:56.695469-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.559935 14039 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":3900,\"bootTime\":1685557832,\"procs\":396,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T12:35:56.695473-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:32.560042 14039 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:35:56.695475-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.586114 14039 out.go:177] * [custom-flannel-996000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:35:56.695477-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.629120 14039 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:35:56.695479-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.656860 14039 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:35:56.695481-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.715029 14039 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:35:56.695483-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.758144 14039 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:35:56.695486-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.799889 14039 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:35:56.695488-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.864043 14039 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:35:56.69549-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.908137 14039 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:35:56.695492-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.929694 14039 config.go:182] Loaded profile config \"kubernetes-upgrade-496000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.695495-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.929845 14039 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:35:56.695497-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.989341 14039 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T12:35:56.695499-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.989493 14039 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:35:56.695505-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.093491 14039 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:1 ContainersRunning:1 ContainersPaused:0 ContainersStopped:0 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:55 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:35:33.081494599 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:35:56.695511-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:35:56.695515-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:35:56.695521-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:35:56.695524-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:35:56.695526-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.118459 14039 out.go:177] * Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T12:35:56.695528-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.176434 14039 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T12:35:56.695531-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.176487 14039 start.go:875] validating driver \"docker\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:35:56.695533-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.176513 14039 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:35:56.695535-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.180753 14039 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:35:56.695542-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.278118 14039 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:1 ContainersRunning:1 ContainersPaused:0 ContainersStopped:0 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:55 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:35:33.265664517 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:35:56.695545-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:35:56.695549-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:35:56.695553-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:35:56.695556-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:35:56.695558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.278304 14039 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:35:56.69556-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.278500 14039 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:35:56.695562-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.300836 14039 out.go:177] * Using Docker Desktop driver with root privileges\n"} +{"Time":"2023-05-31T12:35:56.695565-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.336850 14039 cni.go:84] Creating CNI manager for \"testdata/kube-flannel.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.695567-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.336892 14039 start_flags.go:314] Found \"testdata/kube-flannel.yaml\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:35:56.695569-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.336906 14039 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:35:56.695573-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{Name:custom-flannel-996000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:custom-flannel-996000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Container"} +{"Time":"2023-05-31T12:35:56.695576-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"Runtime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:testdata/kube-flannel.yaml NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:35:56.695581-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.394836 14039 out.go:177] * Starting control plane node custom-flannel-996000 in cluster custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.695584-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.432036 14039 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T12:35:56.695586-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.469913 14039 out.go:177] * Pulling base image ...\n"} +{"Time":"2023-05-31T12:35:56.695588-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.528011 14039 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:35:56.69559-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.528028 14039 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T12:35:56.695593-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.528129 14039 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T12:35:56.695595-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.528177 14039 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:35:56.695597-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.528566 14039 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:35:56.6956-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.528629 14039 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:35:56.695602-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.529909 14039 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/config.json ...\n"} +{"Time":"2023-05-31T12:35:56.695605-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.530068 14039 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/config.json: {Name:mk90fb3d5e866d5daa7ebb13f0abc83d421d12a8 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.695607-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.581419 14039 image.go:83] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon, skipping pull\n"} +{"Time":"2023-05-31T12:35:56.69561-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.581451 14039 cache.go:145] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in daemon, skipping load\n"} +{"Time":"2023-05-31T12:35:56.695612-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.581469 14039 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:35:56.695614-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.581511 14039 start.go:364] acquiring machines lock for custom-flannel-996000: {Name:mk2d197cd5a2129dca0a2ae0232a17eddfd5b2ba Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.695616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.581686 14039 start.go:368] acquired machines lock for \"custom-flannel-996000\" in 163.558µs\n"} +{"Time":"2023-05-31T12:35:56.695621-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.581729 14039 start.go:93] Provisioning new machine with config: \u0026{Name:custom-flannel-996000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:custom-flannel-996000 Namespace:default APIServerN"} +{"Time":"2023-05-31T12:35:56.695624-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"ame:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:testdata/kube-flannel.yaml NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryM"} +{"Time":"2023-05-31T12:35:56.695627-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"irror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:35:56.69563-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.581803 14039 start.go:125] createHost starting for \"\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:35:56.695632-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.405767 13691 ssh_runner.go:235] Completed: sudo systemctl restart containerd: (10.252837577s)\n"} +{"Time":"2023-05-31T12:35:56.695634-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.405787 13691 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:35:56.695636-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.405800 13691 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:35:56.695638-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.405901 13691 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T12:35:56.69564-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.420853 13691 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T12:35:56.695643-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.420958 13691 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T12:35:56.695645-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.434927 13691 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.695647-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.695649-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.456303 13691 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T12:35:56.695651-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.482930 13691 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T12:35:56.695654-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.499272 13691 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T12:35:56.695656-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.521744 13691 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T12:35:56.69566-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.629616 13691 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T12:35:56.695662-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.702631 13691 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:35:56.695665-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.702651 13691 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T12:35:56.695667-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.720211 13691 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:35:56.695669-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:32.798843 13691 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:35:56.695671-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.744373 13691 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T12:35:56.695674-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.828416 13691 ssh_runner.go:195] Run: sudo systemctl unmask cri-docker.socket\n"} +{"Time":"2023-05-31T12:35:56.695676-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.917783 13691 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T12:35:56.695678-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.000278 13691 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:35:56.69568-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.078361 13691 ssh_runner.go:195] Run: sudo systemctl restart cri-docker.socket\n"} +{"Time":"2023-05-31T12:35:56.695682-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.111809 13691 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:35:56.695684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.213173 13691 ssh_runner.go:195] Run: sudo systemctl restart cri-docker\n"} +{"Time":"2023-05-31T12:35:56.695691-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.326888 13691 start.go:528] Will wait 60s for socket path /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.695693-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.327005 13691 ssh_runner.go:195] Run: stat /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.695695-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.332703 13691 start.go:549] Will wait 60s for crictl version\n"} +{"Time":"2023-05-31T12:35:56.695697-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.332784 13691 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T12:35:56.695699-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.337596 13691 ssh_runner.go:195] Run: sudo /usr/bin/crictl version\n"} +{"Time":"2023-05-31T12:35:56.695701-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.392925 13691 start.go:565] Version: 0.1.0\n"} +{"Time":"2023-05-31T12:35:56.695704-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRuntimeName: docker\n"} +{"Time":"2023-05-31T12:35:56.695706-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRuntimeVersion: 24.0.1\n"} +{"Time":"2023-05-31T12:35:56.695708-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRuntimeApiVersion: v1\n"} +{"Time":"2023-05-31T12:35:56.69571-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.393017 13691 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:35:56.695712-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.421558 13691 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:35:56.695714-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.605753 14039 out.go:204] * Creating docker container (CPUs=2, Memory=3072MB) ...\n"} +{"Time":"2023-05-31T12:35:56.695716-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.605970 14039 start.go:159] libmachine.API.Create for \"custom-flannel-996000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:35:56.695718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.606000 14039 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:35:56.695721-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.606087 14039 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:35:56.695723-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.606123 14039 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:35:56.695725-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.606142 14039 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:35:56.695727-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.606219 14039 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:35:56.695729-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.606248 14039 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:35:56.695731-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.606274 14039 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:35:56.695734-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.606689 14039 cli_runner.go:164] Run: docker network inspect custom-flannel-996000 --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\"\n"} +{"Time":"2023-05-31T12:35:56.695738-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:33.658214 14039 cli_runner.go:211] docker network inspect custom-flannel-996000 --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\" returned with exit code 1\n"} +{"Time":"2023-05-31T12:35:56.695741-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.658330 14039 network_create.go:281] running [docker network inspect custom-flannel-996000] to gather additional debugging logs...\n"} +{"Time":"2023-05-31T12:35:56.695743-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.658349 14039 cli_runner.go:164] Run: docker network inspect custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.695748-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:33.714450 14039 cli_runner.go:211] docker network inspect custom-flannel-996000 returned with exit code 1\n"} +{"Time":"2023-05-31T12:35:56.69575-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.714477 14039 network_create.go:284] error running [docker network inspect custom-flannel-996000]: docker network inspect custom-flannel-996000: exit status 1\n"} +{"Time":"2023-05-31T12:35:56.695752-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.695754-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[]\n"} +{"Time":"2023-05-31T12:35:56.695756-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.695758-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.69576-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tError response from daemon: network custom-flannel-996000 not found\n"} +{"Time":"2023-05-31T12:35:56.695762-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.714494 14039 network_create.go:286] output of [docker network inspect custom-flannel-996000]: -- stdout --\n"} +{"Time":"2023-05-31T12:35:56.695764-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[]\n"} +{"Time":"2023-05-31T12:35:56.695766-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.695768-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:35:56.69577-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:35:56.695774-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tError response from daemon: network custom-flannel-996000 not found\n"} +{"Time":"2023-05-31T12:35:56.695776-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.695778-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:35:56.695781-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.714586 14039 cli_runner.go:164] Run: docker network inspect bridge --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\"\n"} +{"Time":"2023-05-31T12:35:56.695784-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.770243 14039 network.go:212] skipping subnet 192.168.49.0/24 that is reserved: \u0026{IP:192.168.49.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.49.0/24 Gateway:192.168.49.1 ClientMin:192.168.49.2 ClientMax:192.168.49.254 Broadcast:192.168.49.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.695787-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.770801 14039 network.go:209] using free private subnet 192.168.58.0/24: \u0026{IP:192.168.58.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.58.0/24 Gateway:192.168.58.1 ClientMin:192.168.58.2 ClientMax:192.168.58.254 Broadcast:192.168.58.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:0xc000ef1d90}\n"} +{"Time":"2023-05-31T12:35:56.69579-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.770828 14039 network_create.go:123] attempt to create docker network custom-flannel-996000 192.168.58.0/24 with gateway 192.168.58.1 and MTU of 65535 ...\n"} +{"Time":"2023-05-31T12:35:56.695794-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.770929 14039 cli_runner.go:164] Run: docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=custom-flannel-996000 custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.695797-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:33.828208 14039 cli_runner.go:211] docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=custom-flannel-996000 custom-flannel-996000 returned with exit code 1\n"} +{"Time":"2023-05-31T12:35:56.6958-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:33.828253 14039 network_create.go:148] failed to create docker network custom-flannel-996000 192.168.58.0/24 with gateway 192.168.58.1 and mtu of 65535: docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=custom-flannel-996000 custom-flannel-996000: exit status 1\n"} +{"Time":"2023-05-31T12:35:56.695803-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.695805-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.695809-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.695811-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tError response from daemon: Pool overlaps with other one on this address space\n"} +{"Time":"2023-05-31T12:35:56.695813-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:33.828272 14039 network_create.go:115] failed to create docker network custom-flannel-996000 192.168.58.0/24, will retry: subnet is taken\n"} +{"Time":"2023-05-31T12:35:56.695816-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.829737 14039 network.go:212] skipping subnet 192.168.58.0/24 that is reserved: \u0026{IP:192.168.58.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.58.0/24 Gateway:192.168.58.1 ClientMin:192.168.58.2 ClientMax:192.168.58.254 Broadcast:192.168.58.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.695819-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.830105 14039 network.go:209] using free private subnet 192.168.67.0/24: \u0026{IP:192.168.67.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.67.0/24 Gateway:192.168.67.1 ClientMin:192.168.67.2 ClientMax:192.168.67.254 Broadcast:192.168.67.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:0xc000cd3bb0}\n"} +{"Time":"2023-05-31T12:35:56.695821-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.830118 14039 network_create.go:123] attempt to create docker network custom-flannel-996000 192.168.67.0/24 with gateway 192.168.67.1 and MTU of 65535 ...\n"} +{"Time":"2023-05-31T12:35:56.695824-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.830179 14039 cli_runner.go:164] Run: docker network create --driver=bridge --subnet=192.168.67.0/24 --gateway=192.168.67.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=custom-flannel-996000 custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.695826-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:33.887266 14039 cli_runner.go:211] docker network create --driver=bridge --subnet=192.168.67.0/24 --gateway=192.168.67.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=custom-flannel-996000 custom-flannel-996000 returned with exit code 1\n"} +{"Time":"2023-05-31T12:35:56.695829-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:33.887310 14039 network_create.go:148] failed to create docker network custom-flannel-996000 192.168.67.0/24 with gateway 192.168.67.1 and mtu of 65535: docker network create --driver=bridge --subnet=192.168.67.0/24 --gateway=192.168.67.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=custom-flannel-996000 custom-flannel-996000: exit status 1\n"} +{"Time":"2023-05-31T12:35:56.695832-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.695834-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.695835-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.695837-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tError response from daemon: Pool overlaps with other one on this address space\n"} +{"Time":"2023-05-31T12:35:56.69584-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:33.887326 14039 network_create.go:115] failed to create docker network custom-flannel-996000 192.168.67.0/24, will retry: subnet is taken\n"} +{"Time":"2023-05-31T12:35:56.695842-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.888741 14039 network.go:212] skipping subnet 192.168.67.0/24 that is reserved: \u0026{IP:192.168.67.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.67.0/24 Gateway:192.168.67.1 ClientMin:192.168.67.2 ClientMax:192.168.67.254 Broadcast:192.168.67.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.695845-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.889180 14039 network.go:209] using free private subnet 192.168.76.0/24: \u0026{IP:192.168.76.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.76.0/24 Gateway:192.168.76.1 ClientMin:192.168.76.2 ClientMax:192.168.76.254 Broadcast:192.168.76.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:0xc000b63a80}\n"} +{"Time":"2023-05-31T12:35:56.695847-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.889198 14039 network_create.go:123] attempt to create docker network custom-flannel-996000 192.168.76.0/24 with gateway 192.168.76.1 and MTU of 65535 ...\n"} +{"Time":"2023-05-31T12:35:56.69585-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.889287 14039 cli_runner.go:164] Run: docker network create --driver=bridge --subnet=192.168.76.0/24 --gateway=192.168.76.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=custom-flannel-996000 custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.695852-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.983666 14039 network_create.go:107] docker network custom-flannel-996000 192.168.76.0/24 created\n"} +{"Time":"2023-05-31T12:35:56.695855-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.983719 14039 kic.go:117] calculated static IP \"192.168.76.2\" for the \"custom-flannel-996000\" container\n"} +{"Time":"2023-05-31T12:35:56.695857-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:33.983884 14039 cli_runner.go:164] Run: docker ps -a --format {{.Names}}\n"} +{"Time":"2023-05-31T12:35:56.695859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.041851 14039 cli_runner.go:164] Run: docker volume create custom-flannel-996000 --label name.minikube.sigs.k8s.io=custom-flannel-996000 --label created_by.minikube.sigs.k8s.io=true\n"} +{"Time":"2023-05-31T12:35:56.695862-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.095607 14039 oci.go:103] Successfully created a docker volume custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.695864-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.095734 14039 cli_runner.go:164] Run: docker run --rm --name custom-flannel-996000-preload-sidecar --label created_by.minikube.sigs.k8s.io=true --label name.minikube.sigs.k8s.io=custom-flannel-996000 --entrypoint /usr/bin/test -v custom-flannel-996000:/var gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -d /var/lib\n"} +{"Time":"2023-05-31T12:35:56.695869-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.608687 14039 oci.go:107] Successfully prepared a docker volume custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.695871-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.608761 14039 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:35:56.695873-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.608779 14039 kic.go:190] Starting extracting preloaded images to volume ...\n"} +{"Time":"2023-05-31T12:35:56.695876-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.608913 14039 cli_runner.go:164] Run: docker run --rm --entrypoint /usr/bin/tar -v /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4:/preloaded.tar:ro -v custom-flannel-996000:/extractDir gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -I lz4 -xf /preloaded.tar -C /extractDir\n"} +{"Time":"2023-05-31T12:35:56.695879-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.513752 13691 out.go:204] * Preparing Kubernetes v1.27.2 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:35:56.695881-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.513997 13691 cli_runner.go:164] Run: docker exec -t kubernetes-upgrade-496000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T12:35:56.695883-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.635607 13691 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T12:35:56.695885-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.635736 13691 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:35:56.695888-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.642327 13691 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.695892-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.700181 13691 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:35:56.695895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.700258 13691 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:35:56.695897-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.729056 13691 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:35:56.695899-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.695901-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.695903-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.695905-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.695907-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:35:56.695909-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:35:56.695911-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T12:35:56.695913-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:35:56.695915-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:35:56.695917-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:35:56.695919-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:35:56.695921-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:35:56.695923-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:35:56.695925-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:35:56.695927-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/pause:3.1\n"} +{"Time":"2023-05-31T12:35:56.695929-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.695931-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:35:56.695933-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.729080 13691 docker.go:563] Images already preloaded, skipping extraction\n"} +{"Time":"2023-05-31T12:35:56.695936-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.729166 13691 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:35:56.695938-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.754077 13691 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:35:56.69594-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.695942-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.695944-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.696103-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.696133-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:35:56.69614-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:35:56.696144-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T12:35:56.696148-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:35:56.696151-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:35:56.696154-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:35:56.696158-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:35:56.696161-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:35:56.696164-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:35:56.696168-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:35:56.696171-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tk8s.gcr.io/pause:3.1\n"} +{"Time":"2023-05-31T12:35:56.696174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.696178-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:35:56.696181-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.754099 13691 cache_images.go:84] Images are preloaded, skipping loading\n"} +{"Time":"2023-05-31T12:35:56.696183-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.754181 13691 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T12:35:56.696186-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.812809 13691 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:35:56.69619-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.812828 13691 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:35:56.696193-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.812858 13691 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:35:56.696197-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.812879 13691 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.67.2 APIServerPort:8443 KubernetesVersion:v1.27.2 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:kubernetes-upgrade-496000 NodeName:kubernetes-upgrade-496000 DNSDomain:cluster.local CRISocket:/var/run/cri-dockerd.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.67.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.67.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt "} +{"Time":"2023-05-31T12:35:56.696311-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"StaticPodPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:true}\n"} +{"Time":"2023-05-31T12:35:56.696318-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.813002 13691 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T12:35:56.696325-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:35:56.696327-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T12:35:56.696329-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T12:35:56.696331-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t advertiseAddress: 192.168.67.2\n"} +{"Time":"2023-05-31T12:35:56.696334-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T12:35:56.696336-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T12:35:56.696338-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - groups:\n"} +{"Time":"2023-05-31T12:35:56.69634-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T12:35:56.696342-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T12:35:56.696346-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t usages:\n"} +{"Time":"2023-05-31T12:35:56.696348-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - signing\n"} +{"Time":"2023-05-31T12:35:56.69635-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - authentication\n"} +{"Time":"2023-05-31T12:35:56.696353-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T12:35:56.696357-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t criSocket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.69636-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t name: \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.696363-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T12:35:56.696367-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t node-ip: 192.168.67.2\n"} +{"Time":"2023-05-31T12:35:56.69637-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t taints: []\n"} +{"Time":"2023-05-31T12:35:56.696373-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:35:56.696376-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:35:56.696379-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:35:56.696382-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T12:35:56.696385-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.67.2\"]\n"} +{"Time":"2023-05-31T12:35:56.696388-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:35:56.696506-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T12:35:56.696514-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T12:35:56.696518-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:35:56.696522-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:35:56.696525-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:35:56.696542-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T12:35:56.69655-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:35:56.696554-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:35:56.696558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:35:56.696561-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T12:35:56.696566-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:35:56.696568-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tetcd:\n"} +{"Time":"2023-05-31T12:35:56.69657-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t local:\n"} +{"Time":"2023-05-31T12:35:56.696573-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:35:56.696575-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:35:56.696577-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:35:56.69658-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.696582-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T12:35:56.696584-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:35:56.696585-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:35:56.696588-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:35:56.69659-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:35:56.696592-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:35:56.696594-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:35:56.696596-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T12:35:56.696598-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t x509:\n"} +{"Time":"2023-05-31T12:35:56.6966-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:35:56.696602-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:35:56.696914-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:35:56.696921-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T12:35:56.696925-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T12:35:56.696928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T12:35:56.696934-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:35:56.696937-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T12:35:56.696941-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t nodefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.696944-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t nodefs.inodesFree: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.696948-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t imagefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.696951-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T12:35:56.696955-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:35:56.696958-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:35:56.696962-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:35:56.696965-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:35:56.696969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:35:56.696972-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:35:56.696975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T12:35:56.696979-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T12:35:56.696982-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T12:35:56.696986-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:56.69699-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T12:35:56.696994-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:56.696997-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.697-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.813090 13691 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T12:35:56.697004-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T12:35:56.697007-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.697011-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:35:56.697112-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:35:56.69713-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=kubernetes-upgrade-496000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.67.2\n"} +{"Time":"2023-05-31T12:35:56.697135-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.697141-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:35:56.697144-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t config:\n"} +{"Time":"2023-05-31T12:35:56.697146-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{KubernetesVersion:v1.27.2 ClusterName:kubernetes-upgrade-496000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T12:35:56.697149-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.813164 13691 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.697151-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.828406 13691 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T12:35:56.697154-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.828486 13691 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T12:35:56.697158-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.838941 13691 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (386 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697165-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.857086 13691 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697171-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.881055 13691 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2108 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697178-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.903611 13691 ssh_runner.go:195] Run: grep 192.168.67.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:35:56.697182-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.908686 13691 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000 for IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:35:56.697192-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.908714 13691 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.697277-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.908926 13691 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T12:35:56.697284-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.908998 13691 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T12:35:56.697288-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909102 13691 certs.go:315] skipping minikube-user signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key\n"} +{"Time":"2023-05-31T12:35:56.697301-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909184 13691 certs.go:315] skipping minikube signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.key.c7fa3a9e\n"} +{"Time":"2023-05-31T12:35:56.697308-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909252 13691 certs.go:315] skipping aggregator signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.key\n"} +{"Time":"2023-05-31T12:35:56.697313-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909509 13691 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697317-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:34.909553 13691 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T12:35:56.697329-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909572 13691 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697337-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909609 13691 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697342-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909642 13691 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697346-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909679 13691 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.69735-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.909769 13691 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:35:56.69739-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.910421 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697398-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.939240 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1679 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.967677 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697412-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:34.996952 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697417-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.024035 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697426-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.055797 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697433-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.084268 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697439-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.112763 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697448-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.144618 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697452-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.175621 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697622-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.205861 13691 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697629-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.244040 13691 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T12:35:56.697634-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.272809 13691 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T12:35:56.697638-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.281693 13691 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T12:35:56.697642-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.293707 13691 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:35:56.697647-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.300367 13691 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:35:56.697664-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.300458 13691 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:35:56.697668-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.310146 13691 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T12:35:56.697671-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.322031 13691 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T12:35:56.697674-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.337417 13691 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:35:56.697676-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.343862 13691 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:35:56.697678-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.343946 13691 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:35:56.697681-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.354058 13691 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T12:35:56.697684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.368599 13691 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T12:35:56.697686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.380046 13691 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:35:56.697801-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.386208 13691 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:35:56.697806-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.386312 13691 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:35:56.697809-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.397181 13691 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T12:35:56.697811-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.408690 13691 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T12:35:56.697813-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.413664 13691 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-etcd-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:35:56.697826-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.422231 13691 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-kubelet-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:35:56.697834-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.432612 13691 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/server.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:35:56.697838-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.441698 13691 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/healthcheck-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:35:56.697842-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.449937 13691 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/peer.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:35:56.697846-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.460053 13691 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/front-proxy-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:35:56.697859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.469474 13691 kubeadm.go:404] StartCluster: {Name:kubernetes-upgrade-496000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:kubernetes-upgrade-496000 Namespace:default APIServerName:minikubeCA"} +{"Time":"2023-05-31T12:35:56.697865-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.67.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false C"} +{"Time":"2023-05-31T12:35:56.697965-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"ustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:35:56.697972-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.469622 13691 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:35:56.697975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.494727 13691 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:35:56.697978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.507811 13691 kubeadm.go:419] found existing configuration files, will attempt cluster restart\n"} +{"Time":"2023-05-31T12:35:56.697981-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.507846 13691 kubeadm.go:636] restartCluster start\n"} +{"Time":"2023-05-31T12:35:56.697985-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.507938 13691 ssh_runner.go:195] Run: sudo test -d /data/minikube\n"} +{"Time":"2023-05-31T12:35:56.69799-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.519585 13691 kubeadm.go:127] /data/minikube skipping compat symlinks: sudo test -d /data/minikube: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.698005-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.698009-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.698011-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698019-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.519685 13691 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.698022-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.586338 13691 kubeconfig.go:92] found \"kubernetes-upgrade-496000\" server: \"https://127.0.0.1:52059\"\n"} +{"Time":"2023-05-31T12:35:56.698026-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.587011 13691 kapi.go:59] client config for kubernetes-upgrade-496000: \u0026rest.Config{Host:\"https://127.0.0.1:52059\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt\", KeyFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key\", CAFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint8(nil), C"} +{"Time":"2023-05-31T12:35:56.698253-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"AData:[]uint8(nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x257d820), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T12:35:56.698259-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.587808 13691 ssh_runner.go:195] Run: sudo diff -u /var/tmp/minikube/kubeadm.yaml /var/tmp/minikube/kubeadm.yaml.new\n"} +{"Time":"2023-05-31T12:35:56.698261-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.599498 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.698264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:35.599555 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.698266-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:35.612818 13691 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.698268-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.698271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.698273-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698275-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:36.113754 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.698277-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:36.113870 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.698279-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:36.128499 13691 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.698281-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.698283-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.698285-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698287-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:36.613759 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.698289-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:36.613900 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.698292-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:36.628415 13691 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.698498-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.698505-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.698509-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698512-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:37.113731 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.698516-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:37.113829 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.698529-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:37.128136 13691 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.698544-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.698548-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.69855-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698552-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:37.613729 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.698555-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:37.613831 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.698557-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:37.626268 13691 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.69857-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.698573-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.698575-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698577-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:38.113734 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.69859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:38.113821 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.698593-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:38.127443 13691 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.698595-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.698597-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.698599-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698601-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:38.613764 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.698609-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:38.613851 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.698686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:38.627561 13691 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.698691-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.698693-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.698695-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698697-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:41.378850 14039 cli_runner.go:217] Completed: docker run --rm --entrypoint /usr/bin/tar -v /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4:/preloaded.tar:ro -v custom-flannel-996000:/extractDir gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -I lz4 -xf /preloaded.tar -C /extractDir: (6.769767411s)\n"} +{"Time":"2023-05-31T12:35:56.6987-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:41.378876 14039 kic.go:199] duration metric: took 6.770046 seconds to extract preloaded images to volume\n"} +{"Time":"2023-05-31T12:35:56.698702-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:41.379010 14039 cli_runner.go:164] Run: docker info --format \"'{{json .SecurityOptions}}'\"\n"} +{"Time":"2023-05-31T12:35:56.698705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:41.497416 14039 cli_runner.go:164] Run: docker run -d -t --privileged --security-opt seccomp=unconfined --tmpfs /tmp --tmpfs /run -v /lib/modules:/lib/modules:ro --hostname custom-flannel-996000 --name custom-flannel-996000 --label created_by.minikube.sigs.k8s.io=true --label name.minikube.sigs.k8s.io=custom-flannel-996000 --label role.minikube.sigs.k8s.io= --label mode.minikube.sigs.k8s.io=custom-flannel-996000 --network custom-flannel-996000 --ip 192.168.76.2 --volume custom-flannel-996000:/var --security-opt apparmor=unconfined --memory=3072mb --memory-swap=3072mb --cpus=2 -e container=docker --expose 8443 --publish=127.0.0.1::8443 --publish=127.0.0.1::22 --publish=127.0.0.1::2376 --publish=127.0.0.1::5000 --publish=127.0.0.1::32443 gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\n"} +{"Time":"2023-05-31T12:35:56.698708-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:41.807148 14039 cli_runner.go:164] Run: docker container inspect custom-flannel-996000 --format={{.State.Running}}\n"} +{"Time":"2023-05-31T12:35:56.698711-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:41.865181 14039 cli_runner.go:164] Run: docker container inspect custom-flannel-996000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:35:56.698713-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:41.925814 14039 cli_runner.go:164] Run: docker exec custom-flannel-996000 stat /var/lib/dpkg/alternatives/iptables\n"} +{"Time":"2023-05-31T12:35:56.698715-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.035023 14039 oci.go:144] the created container \"custom-flannel-996000\" has a running status.\n"} +{"Time":"2023-05-31T12:35:56.698718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.035102 14039 kic.go:221] Creating ssh key for kic: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/custom-flannel-996000/id_rsa...\n"} +{"Time":"2023-05-31T12:35:56.69872-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.177803 14039 kic_runner.go:191] docker (temp): /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/custom-flannel-996000/id_rsa.pub --\u003e /home/docker/.ssh/authorized_keys (381 bytes)\n"} +{"Time":"2023-05-31T12:35:56.698882-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.251319 14039 cli_runner.go:164] Run: docker container inspect custom-flannel-996000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:35:56.69889-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.312632 14039 kic_runner.go:93] Run: chown docker:docker /home/docker/.ssh/authorized_keys\n"} +{"Time":"2023-05-31T12:35:56.698897-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.312652 14039 kic_runner.go:114] Args: [docker exec --privileged custom-flannel-996000 chown docker:docker /home/docker/.ssh/authorized_keys]\n"} +{"Time":"2023-05-31T12:35:56.698907-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.414997 14039 cli_runner.go:164] Run: docker container inspect custom-flannel-996000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:35:56.698911-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.469712 14039 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T12:35:56.698914-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.469758 14039 ubuntu.go:169] provisioning hostname \"custom-flannel-996000\"\n"} +{"Time":"2023-05-31T12:35:56.698918-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.469874 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.698922-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.522679 14039 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:35:56.698925-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.523078 14039 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 52652 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.69893-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.523092 14039 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:35:56.698933-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tsudo hostname custom-flannel-996000 \u0026\u0026 echo \"custom-flannel-996000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T12:35:56.698936-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:39.113766 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.69894-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:39.113873 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.698943-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:39.131998 13691 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.698946-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.69895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.698952-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.698954-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:39.613734 13691 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:35:56.699035-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:39.613826 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.699045-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:39.637568 13691 ssh_runner.go:195] Run: sudo egrep ^[0-9]+:freezer: /proc/12869/cgroup\n"} +{"Time":"2023-05-31T12:35:56.699052-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:39.689698 13691 api_server.go:177] unable to find freezer cgroup: sudo egrep ^[0-9]+:freezer: /proc/12869/cgroup: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.699056-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.69906-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.699065-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.699074-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:39.689787 13691 ssh_runner.go:195] Run: ls\n"} +{"Time":"2023-05-31T12:35:56.699082-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:39.703295 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.699088-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.058930 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 403:\n"} +{"Time":"2023-05-31T12:35:56.699092-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T12:35:56.699098-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.058969 13691 retry.go:31] will retry after 308.178565ms: https://127.0.0.1:52059/healthz returned error 403:\n"} +{"Time":"2023-05-31T12:35:56.699105-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T12:35:56.699117-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.367210 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.699126-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.374508 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 500:\n"} +{"Time":"2023-05-31T12:35:56.69913-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.699134-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.699137-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.69914-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.699225-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.699231-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.699233-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.699235-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.699238-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.69924-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.699242-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.699244-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699248-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.69925-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.699253-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.699255-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699261-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699263-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.699265-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.699267-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699269-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.699271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.699273-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699276-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.69928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.699454-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699468-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699471-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699473-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.699475-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.374537 13691 retry.go:31] will retry after 257.010877ms: https://127.0.0.1:52059/healthz returned error 500:\n"} +{"Time":"2023-05-31T12:35:56.699477-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.699479-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.699481-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.699483-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.699486-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.699488-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.69949-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.699492-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.699494-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.699496-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.699498-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.6995-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699502-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699504-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.699506-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.699508-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.69951-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699512-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699514-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.699901-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.699906-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699908-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.699912-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.699915-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699917-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699919-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.699921-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.699925-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699927-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699929-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.699931-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.699933-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.632075 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.699935-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.638668 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 500:\n"} +{"Time":"2023-05-31T12:35:56.699937-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.699939-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.699941-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.699943-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.699945-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.699948-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.69995-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.699952-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.699956-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.699958-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.700204-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.700212-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700216-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700219-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.700234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.700241-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.700243-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700245-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.700249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.700252-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.700256-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.700258-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.70026-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700262-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.700264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.700267-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700269-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700273-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.700275-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.638691 13691 retry.go:31] will retry after 471.637294ms: https://127.0.0.1:52059/healthz returned error 500:\n"} +{"Time":"2023-05-31T12:35:56.700278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.700611-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.700616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.700619-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.700621-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.700626-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.700628-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.70063-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.700632-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.700634-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.700637-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.700639-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700641-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700643-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.700645-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.700647-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.700649-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700651-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700654-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.700656-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.700658-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.70066-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.700662-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.700664-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700944-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.70095-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.700952-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.700954-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700956-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700961-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.700963-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.110439 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.700965-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.116778 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 500:\n"} +{"Time":"2023-05-31T12:35:56.700967-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.700969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.700971-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.700973-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.700975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.700977-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.70098-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.700982-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.700984-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.70099-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.700992-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.700994-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700996-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.700998-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.701-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T12:35:56.701002-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.701242-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701253-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.701257-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.70126-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.701267-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.70127-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.701281-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.701284-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701287-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701291-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701294-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.701308-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.116812 13691 retry.go:31] will retry after 435.008066ms: https://127.0.0.1:52059/healthz returned error 500:\n"} +{"Time":"2023-05-31T12:35:56.701312-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.701314-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.701316-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.701319-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.701323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.701326-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.701329-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.701332-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.701561-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.701568-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.701572-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.701575-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701579-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701588-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.701596-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T12:35:56.7016-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.701609-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701617-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701623-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.701627-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.70163-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701649-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.701651-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.701653-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701655-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701661-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.701663-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.701665-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701667-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701669-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.701671-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.701742-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.553138 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.701749-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.559999 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 200:\n"} +{"Time":"2023-05-31T12:35:56.701753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tok\n"} +{"Time":"2023-05-31T12:35:56.701757-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575098 13691 system_pods.go:86] 5 kube-system pods found\n"} +{"Time":"2023-05-31T12:35:56.701761-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575117 13691 system_pods.go:89] \"etcd-kubernetes-upgrade-496000\" [6e0d7d93-b663-4be4-a1b3-7ac2d21debfa] Running / Ready:ContainersNotReady (containers with unready status: [etcd]) / ContainersReady:ContainersNotReady (containers with unready status: [etcd])\n"} +{"Time":"2023-05-31T12:35:56.701765-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575123 13691 system_pods.go:89] \"kube-apiserver-kubernetes-upgrade-496000\" [2b55fb4c-cbbe-4569-a076-ad7287b8c8b5] Running\n"} +{"Time":"2023-05-31T12:35:56.70177-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575136 13691 system_pods.go:89] \"kube-controller-manager-kubernetes-upgrade-496000\" [b661d550-5484-4630-b379-fa823891c3fb] Running / Ready:ContainersNotReady (containers with unready status: [kube-controller-manager]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-controller-manager])\n"} +{"Time":"2023-05-31T12:35:56.701774-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575144 13691 system_pods.go:89] \"kube-scheduler-kubernetes-upgrade-496000\" [ca356c66-3251-4dc2-90c2-324bede67ab3] Running / Ready:ContainersNotReady (containers with unready status: [kube-scheduler]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-scheduler])\n"} +{"Time":"2023-05-31T12:35:56.701779-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575148 13691 system_pods.go:89] \"storage-provisioner\" [ae3f933d-3d73-4ebd-8663-ddc792819351] Pending: PodScheduled:Unschedulable (0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..)\n"} +{"Time":"2023-05-31T12:35:56.701784-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575155 13691 kubeadm.go:620] needs reconfigure: missing components: kube-dns, kube-proxy\n"} +{"Time":"2023-05-31T12:35:56.701788-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575160 13691 kubeadm.go:1123] stopping kube-system containers ...\n"} +{"Time":"2023-05-31T12:35:56.701791-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.575231 13691 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:35:56.701795-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.600293 13691 docker.go:459] Stopping containers: [e77b8f6cca9c e9465fe3c0ae d24fa1c9acf9 6bc30c4c9eb7 4d686fd3f1ce 4ee0a5125f2b 4499b3c9c284 5eb7be9c96c3 c53ffb84f31c 1ae6c24e1af4 ad4083b140d9 0815545a2d96 57e0e096679d 03827143bc99 cb14b9266143 f750d5c48675]\n"} +{"Time":"2023-05-31T12:35:56.7018-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.600388 13691 ssh_runner.go:195] Run: docker stop e77b8f6cca9c e9465fe3c0ae d24fa1c9acf9 6bc30c4c9eb7 4d686fd3f1ce 4ee0a5125f2b 4499b3c9c284 5eb7be9c96c3 c53ffb84f31c 1ae6c24e1af4 ad4083b140d9 0815545a2d96 57e0e096679d 03827143bc99 cb14b9266143 f750d5c48675\n"} +{"Time":"2023-05-31T12:35:56.701933-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.649816 14039 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.701938-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.701941-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.649906 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.701945-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.700068 14039 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:35:56.701948-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.700418 14039 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 52652 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.701952-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.700432 14039 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:35:56.701955-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.701957-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\tif ! grep -xq '.*\\scustom-flannel-996000' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:35:56.701959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:35:56.701961-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 custom-flannel-996000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T12:35:56.701963-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T12:35:56.701965-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\t\techo '127.0.1.1 custom-flannel-996000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T12:35:56.701968-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T12:35:56.701969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T12:35:56.701975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.815250 14039 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T12:35:56.701979-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.815271 14039 ubuntu.go:175] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1078/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1078/.minikube}\n"} +{"Time":"2023-05-31T12:35:56.702106-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.815301 14039 ubuntu.go:177] setting up certificates\n"} +{"Time":"2023-05-31T12:35:56.70212-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.815308 14039 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T12:35:56.702125-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.815379 14039 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.70213-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.864943 14039 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T12:35:56.702134-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865046 14039 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T12:35:56.702137-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865053 14039 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T12:35:56.702141-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865170 14039 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:35:56.702153-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865374 14039 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T12:35:56.702158-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865380 14039 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T12:35:56.702162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865441 14039 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:35:56.702164-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865598 14039 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T12:35:56.702167-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865612 14039 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T12:35:56.702169-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865671 14039 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.702175-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.865793 14039 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem org=jenkins.custom-flannel-996000 san=[192.168.76.2 127.0.0.1 localhost 127.0.0.1 minikube custom-flannel-996000]\n"} +{"Time":"2023-05-31T12:35:56.702233-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.949001 14039 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T12:35:56.702238-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.949054 14039 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T12:35:56.702241-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.949106 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.702243-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:42.999659 14039 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:52652 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/custom-flannel-996000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:35:56.702246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.086756 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.702249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.114162 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:35:56.702251-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.142519 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1237 bytes)\n"} +{"Time":"2023-05-31T12:35:56.702253-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.168156 14039 provision.go:86] duration metric: configureAuth took 352.826104ms\n"} +{"Time":"2023-05-31T12:35:56.702255-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.168171 14039 ubuntu.go:193] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T12:35:56.702258-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.168316 14039 config.go:182] Loaded profile config \"custom-flannel-996000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.70226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.168384 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.702262-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.222259 14039 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:35:56.702265-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.222628 14039 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 52652 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.702267-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.222648 14039 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:35:56.70227-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T12:35:56.702272-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.340057 14039 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: overlay\n"} +{"Time":"2023-05-31T12:35:56.702381-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702388-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.340072 14039 ubuntu.go:71] root file system type: overlay\n"} +{"Time":"2023-05-31T12:35:56.702392-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.340157 14039 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T12:35:56.702396-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.340238 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.7024-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.390918 14039 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:35:56.702404-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.391262 14039 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 52652 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.702408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.391311 14039 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:35:56.702412-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %!s(MISSING) \"[Unit]\n"} +{"Time":"2023-05-31T12:35:56.702415-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:35:56.702419-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:35:56.702431-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:35:56.702436-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:35:56.702439-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:35:56.702441-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:35:56.702443-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:35:56.702452-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:35:56.702456-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.70246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:35:56.702463-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:35:56.702466-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:35:56.702468-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.70247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702472-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702474-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:35:56.70264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:35:56.702645-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:35:56.702649-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:35:56.702652-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:35:56.702656-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:35:56.702659-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:35:56.702662-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702668-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:35:56.702671-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:35:56.702674-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:35:56.702678-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:35:56.702688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T12:35:56.702695-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702703-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:35:56.702709-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:35:56.702712-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:35:56.702716-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:35:56.70272-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:35:56.702726-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702731-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:35:56.702737-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:35:56.702743-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:35:56.702846-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:35:56.702852-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702855-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:35:56.702859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:35:56.702862-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702865-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:35:56.702869-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:35:56.702872-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702875-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:35:56.702878-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:35:56.702881-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T12:35:56.702885-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.516210 14039 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T12:35:56.702889-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:35:56.702892-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:35:56.702895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:35:56.702899-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:35:56.702902-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:35:56.702906-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:35:56.702909-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:35:56.702912-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:35:56.702915-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702919-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:35:56.702922-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:35:56.702925-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:35:56.702928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702931-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702934-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.702938-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:35:56.703002-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:35:56.703007-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:35:56.703011-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:35:56.703014-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:35:56.703018-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:35:56.703021-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:35:56.703037-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.703044-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:35:56.703047-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:35:56.703049-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:35:56.703051-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:35:56.703054-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:35:56.703056-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.703059-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:35:56.703061-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:35:56.703063-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:35:56.703066-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:35:56.703068-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:35:56.70307-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.703072-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:35:56.703074-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:35:56.703076-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:35:56.703228-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:35:56.703234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.703238-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:35:56.70324-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:35:56.703242-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.703244-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:35:56.703246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:35:56.703249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.703259-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:35:56.703266-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:35:56.703269-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.703277-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.516308 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.703282-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.568666 14039 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:35:56.703289-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.569020 14039 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 52652 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.703295-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:43.569034 14039 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:35:56.7033-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:35:56.703306-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.249763 14039 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: --- /lib/systemd/system/docker.service\t2023-05-19 18:06:21.000000000 +0000\n"} +{"Time":"2023-05-31T12:35:56.703312-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:35:43.512745205 +0000\n"} +{"Time":"2023-05-31T12:35:56.703334-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t@@ -1,30 +1,32 @@\n"} +{"Time":"2023-05-31T12:35:56.703341-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t [Unit]\n"} +{"Time":"2023-05-31T12:35:56.703344-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Description=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:35:56.703461-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Documentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:35:56.703467-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-After=network-online.target docker.socket firewalld.service containerd.service time-set.target\n"} +{"Time":"2023-05-31T12:35:56.703471-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-Wants=network-online.target containerd.service\n"} +{"Time":"2023-05-31T12:35:56.703474-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+BindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:35:56.703477-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+After=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:35:56.703481-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+Wants=network-online.target\n"} +{"Time":"2023-05-31T12:35:56.703484-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Requires=docker.socket\n"} +{"Time":"2023-05-31T12:35:56.703488-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:35:56.703501-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+StartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:35:56.703522-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:56.70354-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:35:56.703548-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:35:56.703552-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:35:56.703556-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:35:56.70356-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:35:56.703563-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:35:56.703567-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:35:56.70357-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:35:56.703573-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:35:56.703576-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:35:56.70358-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+Restart=on-failure\n"} +{"Time":"2023-05-31T12:35:56.703583-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:56.70359-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:35:56.703594-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:35:56.703598-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:35:56.703601-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:35:56.70377-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:56.703776-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:35:56.703781-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:35:56.703784-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:35:56.703788-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:35:56.703791-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:35:56.703795-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:35:56.703798-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:35:56.703802-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:35:56.703805-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:35:56.703808-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:35:56.703813-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:35:56.703816-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:35:56.70382-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+\n"} +{"Time":"2023-05-31T12:35:56.703828-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:35:56.703832-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:35:56.703835-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:35:56.703839-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:35:56.703843-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:35:56.703846-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:56.703849-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:35:56.703853-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:35:56.704292-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t@@ -32,16 +34,16 @@\n"} +{"Time":"2023-05-31T12:35:56.7043-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:35:56.704307-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:35:56.704312-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:56.704316-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:35:56.704319-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:35:56.704323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:35:56.704328-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:35:56.704335-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:35:56.704339-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:35:56.704342-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:56.704345-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:35:56.704349-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:35:56.704352-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:56.704359-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t # kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:35:56.704364-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t KillMode=process\n"} +{"Time":"2023-05-31T12:35:56.704379-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-OOMScoreAdjust=-500\n"} +{"Time":"2023-05-31T12:35:56.704384-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T12:35:56.704387-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t [Install]\n"} +{"Time":"2023-05-31T12:35:56.704389-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t WantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:35:56.704391-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tSynchronizing state of docker.service with SysV service script with /lib/systemd/systemd-sysv-install.\n"} +{"Time":"2023-05-31T12:35:56.704394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecuting: /lib/systemd/systemd-sysv-install enable docker\n"} +{"Time":"2023-05-31T12:35:56.7044-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.704402-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.249791 14039 machine.go:91] provisioned docker machine in 1.780042334s\n"} +{"Time":"2023-05-31T12:35:56.704404-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.249803 14039 client.go:171] LocalClient.Create took 10.643718386s\n"} +{"Time":"2023-05-31T12:35:56.704407-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.249832 14039 start.go:167] duration metric: libmachine.API.Create for \"custom-flannel-996000\" took 10.643780766s\n"} +{"Time":"2023-05-31T12:35:56.704602-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.249843 14039 start.go:300] post-start starting for \"custom-flannel-996000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:35:56.70461-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.249848 14039 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T12:35:56.704623-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.249930 14039 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:35:56.704639-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.249992 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.704643-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.300448 14039 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:52652 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/custom-flannel-996000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:35:56.704645-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.388713 14039 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T12:35:56.704648-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.393003 14039 main.go:141] libmachine: Couldn't set key VERSION_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:35:56.704652-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.393024 14039 main.go:141] libmachine: Couldn't set key PRIVACY_POLICY_URL, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:35:56.704655-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.393032 14039 main.go:141] libmachine: Couldn't set key UBUNTU_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:35:56.704659-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.393036 14039 info.go:137] Remote host: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T12:35:56.704661-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.393048 14039 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T12:35:56.704665-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.393140 14039 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T12:35:56.704669-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.393308 14039 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e 15662.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:35:56.704677-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.393496 14039 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:35:56.704863-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.402182 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:35:56.704873-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.424453 14039 start.go:303] post-start completed in 174.599252ms\n"} +{"Time":"2023-05-31T12:35:56.704877-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.425015 14039 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.704896-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.475151 14039 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/config.json ...\n"} +{"Time":"2023-05-31T12:35:56.704904-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.475609 14039 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T12:35:56.704907-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.475677 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.704909-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.539036 14039 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:52652 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/custom-flannel-996000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:35:56.704924-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.623840 14039 ssh_runner.go:195] Run: sh -c \"df -BG /var | awk 'NR==2{print $4}'\"\n"} +{"Time":"2023-05-31T12:35:56.704931-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.631199 14039 start.go:128] duration metric: createHost completed in 11.049293447s\n"} +{"Time":"2023-05-31T12:35:56.704935-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.631224 14039 start.go:83] releasing machines lock for \"custom-flannel-996000\", held for 11.049445728s\n"} +{"Time":"2023-05-31T12:35:56.704939-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.631343 14039 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.704943-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.684230 14039 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T12:35:56.704946-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.684232 14039 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T12:35:56.70495-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.684346 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.704954-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.684436 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.704958-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.754330 14039 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:52652 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/custom-flannel-996000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:35:56.705317-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.754374 14039 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:52652 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/custom-flannel-996000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:35:56.705323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.960806 14039 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T12:35:56.705327-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.966814 14039 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T12:35:56.70533-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.972848 14039 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *loopback.conf* -not -name *.mk_disabled -exec sh -c \"grep -q loopback {} \u0026\u0026 ( grep -q name {} || sudo sed -i '/\"type\": \"loopback\"/i \\ \\ \\ \\ \"name\": \"loopback\",' {} ) \u0026\u0026 sudo sed -i 's|\"cniVersion\": \".*\"|\"cniVersion\": \"1.0.0\"|g' {}\" ;\n"} +{"Time":"2023-05-31T12:35:56.705334-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.000855 14039 cni.go:229] loopback cni configuration patched: \"/etc/cni/net.d/*loopback.conf*\" found\n"} +{"Time":"2023-05-31T12:35:56.705338-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.000977 14039 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f ( ( -name *bridge* -or -name *podman* ) -and -not -name *.mk_disabled ) -printf \"%!p(MISSING), \" -exec sh -c \"sudo mv {} {}.mk_disabled\" ;\n"} +{"Time":"2023-05-31T12:35:56.705342-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.029177 14039 cni.go:261] disabled [/etc/cni/net.d/87-podman-bridge.conflist, /etc/cni/net.d/100-crio-bridge.conf] bridge cni config(s)\n"} +{"Time":"2023-05-31T12:35:56.705362-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.029193 14039 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:35:56.705372-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.029209 14039 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:35:56.705379-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.029326 14039 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:35:56.705388-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.705393-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.047866 14039 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.9\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:35:56.705396-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.059438 14039 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:35:56.705399-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.072187 14039 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:35:56.705729-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.072264 14039 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:35:56.705745-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.084584 14039 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:35:56.705751-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.095429 14039 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:35:56.705753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.106555 14039 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:35:56.705756-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.117669 14039 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T12:35:56.705758-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.128580 14039 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:35:56.705761-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.140324 14039 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T12:35:56.705763-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.151852 14039 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T12:35:56.705765-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.161638 14039 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:35:56.705767-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.236186 14039 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T12:35:56.70577-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.316724 14039 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:35:56.705773-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.316744 14039 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:35:56.705775-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.316816 14039 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T12:35:56.705777-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.331733 14039 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T12:35:56.705779-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.331809 14039 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T12:35:56.705781-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.344807 14039 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.705784-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.706072-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.364488 14039 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T12:35:56.706078-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.385778 14039 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T12:35:56.706081-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.397642 14039 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T12:35:56.706083-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.418480 14039 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T12:35:56.706085-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.519797 14039 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T12:35:56.706087-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.612943 14039 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:35:56.70609-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.612966 14039 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T12:35:56.706092-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.632154 14039 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:35:56.706094-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.728736 14039 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:35:56.706096-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.014969 14039 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T12:35:56.706099-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.096452 14039 ssh_runner.go:195] Run: sudo systemctl unmask cri-docker.socket\n"} +{"Time":"2023-05-31T12:35:56.706102-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.176357 14039 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T12:35:56.706108-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.251441 14039 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:35:56.70611-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.327042 14039 ssh_runner.go:195] Run: sudo systemctl restart cri-docker.socket\n"} +{"Time":"2023-05-31T12:35:56.706112-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.340093 14039 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:35:56.706114-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.414632 14039 ssh_runner.go:195] Run: sudo systemctl restart cri-docker\n"} +{"Time":"2023-05-31T12:35:56.706116-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.492866 14039 start.go:528] Will wait 60s for socket path /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.706118-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.492964 14039 ssh_runner.go:195] Run: stat /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.706121-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.498281 14039 start.go:549] Will wait 60s for crictl version\n"} +{"Time":"2023-05-31T12:35:56.706409-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.498346 14039 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T12:35:56.706416-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.503003 14039 ssh_runner.go:195] Run: sudo /usr/bin/crictl version\n"} +{"Time":"2023-05-31T12:35:56.70642-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.552699 14039 start.go:565] Version: 0.1.0\n"} +{"Time":"2023-05-31T12:35:56.706428-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRuntimeName: docker\n"} +{"Time":"2023-05-31T12:35:56.706432-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRuntimeVersion: 24.0.1\n"} +{"Time":"2023-05-31T12:35:56.706435-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRuntimeApiVersion: v1\n"} +{"Time":"2023-05-31T12:35:56.706439-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.552776 14039 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:35:56.706442-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.580042 14039 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:35:56.706445-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.675575 14039 out.go:204] * Preparing Kubernetes v1.27.2 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:35:56.706449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.675731 14039 cli_runner.go:164] Run: docker exec -t custom-flannel-996000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T12:35:56.706452-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.810529 14039 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T12:35:56.706456-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.810707 14039 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:35:56.70646-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.817308 14039 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.65.254\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:35:56.706464-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.835301 14039 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" custom-flannel-996000\n"} +{"Time":"2023-05-31T12:35:56.706468-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.888565 14039 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:35:56.706471-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.888688 14039 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:35:56.706475-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.921349 14039 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:35:56.706479-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.706736-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.706742-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.706746-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.70675-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:35:56.706753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:35:56.706757-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T12:35:56.706763-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:35:56.70677-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.706777-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:35:56.706784-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.921371 14039 docker.go:563] Images already preloaded, skipping extraction\n"} +{"Time":"2023-05-31T12:35:56.706794-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.921482 14039 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:35:56.706811-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.947039 14039 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:35:56.706815-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.706819-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.706822-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.706825-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.706832-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:35:56.706837-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:35:56.706845-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T12:35:56.706851-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:35:56.706859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.706863-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:35:56.706869-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.947060 14039 cache_images.go:84] Images are preloaded, skipping loading\n"} +{"Time":"2023-05-31T12:35:56.706875-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.947152 14039 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T12:35:56.70688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.000068 14039 cni.go:84] Creating CNI manager for \"testdata/kube-flannel.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.706882-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.000124 14039 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:35:56.706978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.000148 14039 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.76.2 APIServerPort:8443 KubernetesVersion:v1.27.2 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:custom-flannel-996000 NodeName:custom-flannel-996000 DNSDomain:cluster.local CRISocket:/var/run/cri-dockerd.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.76.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.76.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt StaticPo"} +{"Time":"2023-05-31T12:35:56.706995-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"dPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:true}\n"} +{"Time":"2023-05-31T12:35:56.707003-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.000272 14039 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T12:35:56.70701-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:35:56.707014-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T12:35:56.707017-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T12:35:56.707021-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t advertiseAddress: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:56.707024-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T12:35:56.707033-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T12:35:56.707042-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - groups:\n"} +{"Time":"2023-05-31T12:35:56.707046-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T12:35:56.70705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T12:35:56.707053-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t usages:\n"} +{"Time":"2023-05-31T12:35:56.707056-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - signing\n"} +{"Time":"2023-05-31T12:35:56.70706-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - authentication\n"} +{"Time":"2023-05-31T12:35:56.707067-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T12:35:56.707071-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t criSocket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.707074-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t name: \"custom-flannel-996000\"\n"} +{"Time":"2023-05-31T12:35:56.707078-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T12:35:56.707081-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t node-ip: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:56.707243-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t taints: []\n"} +{"Time":"2023-05-31T12:35:56.707249-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:35:56.707253-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:35:56.707256-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:35:56.70726-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T12:35:56.707263-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.76.2\"]\n"} +{"Time":"2023-05-31T12:35:56.707267-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:35:56.707271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T12:35:56.707283-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T12:35:56.707288-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:35:56.707294-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:35:56.707296-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:35:56.707298-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T12:35:56.7073-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:35:56.707303-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:35:56.707305-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:35:56.707307-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T12:35:56.707309-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:35:56.707311-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tetcd:\n"} +{"Time":"2023-05-31T12:35:56.707313-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t local:\n"} +{"Time":"2023-05-31T12:35:56.707315-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:35:56.707317-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:35:56.707319-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:35:56.707321-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.707323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T12:35:56.707325-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:35:56.707327-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:35:56.707501-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:35:56.707517-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:35:56.70752-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:35:56.707533-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:35:56.707537-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T12:35:56.70754-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t x509:\n"} +{"Time":"2023-05-31T12:35:56.707543-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:35:56.707557-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:35:56.707565-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:35:56.707569-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T12:35:56.707572-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T12:35:56.707576-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T12:35:56.70758-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:35:56.707584-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T12:35:56.707587-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t nodefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.70759-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t nodefs.inodesFree: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.707594-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t imagefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.707597-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T12:35:56.707601-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:35:56.707604-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t---\n"} +{"Time":"2023-05-31T12:35:56.707608-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:35:56.707616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:35:56.70762-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:35:56.707624-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:35:56.707627-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T12:35:56.707631-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T12:35:56.707634-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T12:35:56.707638-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:56.707823-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T12:35:56.707828-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:35:56.707831-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.707833-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.000362 14039 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T12:35:56.707837-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T12:35:56.70784-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.707843-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:35:56.707846-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:35:56.707849-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=custom-flannel-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\n"} +{"Time":"2023-05-31T12:35:56.707859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.707861-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:35:56.707868-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t config:\n"} +{"Time":"2023-05-31T12:35:56.707872-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{KubernetesVersion:v1.27.2 ClusterName:custom-flannel-996000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:testdata/kube-flannel.yaml NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T12:35:56.707881-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.000427 14039 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.707884-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.012142 14039 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T12:35:56.707886-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.012214 14039 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T12:35:56.707888-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.022844 14039 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (382 bytes)\n"} +{"Time":"2023-05-31T12:35:56.707891-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.042609 14039 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T12:35:56.707895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.061465 14039 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2104 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708097-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.080058 14039 ssh_runner.go:195] Run: grep 192.168.76.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:35:56.708107-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.085266 14039 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.76.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:35:56.708114-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.099568 14039 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000 for IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:35:56.708127-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.099596 14039 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.708132-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.099773 14039 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T12:35:56.708134-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.099861 14039 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T12:35:56.708137-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.099927 14039 certs.go:319] generating minikube-user signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.key\n"} +{"Time":"2023-05-31T12:35:56.708139-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.099949 14039 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt with IP's: []\n"} +{"Time":"2023-05-31T12:35:56.708142-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.477993 14039 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt ...\n"} +{"Time":"2023-05-31T12:35:56.708144-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.478014 14039 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: {Name:mkd1875fbe56bb45f98325df449ed448939db53a Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.708147-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.478326 14039 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.key ...\n"} +{"Time":"2023-05-31T12:35:56.70815-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.478334 14039 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.key: {Name:mk74e065aebfa9b3e3082d67c88f5833a519ece3 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.708152-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.478546 14039 certs.go:319] generating minikube signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.key.31bdca25\n"} +{"Time":"2023-05-31T12:35:56.708162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.478564 14039 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.crt.31bdca25 with IP's: [192.168.76.2 10.96.0.1 127.0.0.1 10.0.0.1]\n"} +{"Time":"2023-05-31T12:35:56.708363-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.590614 14039 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.crt.31bdca25 ...\n"} +{"Time":"2023-05-31T12:35:56.70837-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.590630 14039 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.crt.31bdca25: {Name:mk6acd76d54dc3759898b03d0dfbc705f40add66 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.708374-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.591277 14039 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.key.31bdca25 ...\n"} +{"Time":"2023-05-31T12:35:56.708386-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.591287 14039 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.key.31bdca25: {Name:mkad5662c2d323cb56de79ac56eb90e00233335e Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.708393-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.592379 14039 certs.go:337] copying /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.crt.31bdca25 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.crt\n"} +{"Time":"2023-05-31T12:35:56.708395-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.592887 14039 certs.go:341] copying /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.key.31bdca25 -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.key\n"} +{"Time":"2023-05-31T12:35:56.708398-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.593085 14039 certs.go:319] generating aggregator signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/proxy-client.key\n"} +{"Time":"2023-05-31T12:35:56.7084-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.593101 14039 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/proxy-client.crt with IP's: []\n"} +{"Time":"2023-05-31T12:35:56.708403-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.730902 14039 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/proxy-client.crt ...\n"} +{"Time":"2023-05-31T12:35:56.708408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.730919 14039 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/proxy-client.crt: {Name:mk7778d1cd461657f0023d8e93c7feb98e1f659f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.708411-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.731241 14039 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/proxy-client.key ...\n"} +{"Time":"2023-05-31T12:35:56.70866-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.731250 14039 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/proxy-client.key: {Name:mk61aad1faa1ab03d6fd439ea495252104a9f3e5 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.708665-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.731721 14039 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708668-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:47.731770 14039 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T12:35:56.708671-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.731788 14039 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708673-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.731826 14039 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708688-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.731860 14039 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708693-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.731894 14039 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708697-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.731992 14039 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.732551 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708708-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.757579 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708714-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.780874 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.805982 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708721-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.833358 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708919-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.857519 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708929-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.881837 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708938-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.906352 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708941-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.930317 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708947-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.954396 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708949-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.978789 14039 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708952-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.004435 14039 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T12:35:56.708954-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.023200 14039 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T12:35:56.708956-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.029396 14039 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T12:35:56.708959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.039696 14039 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:35:56.708961-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.044287 14039 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:35:56.708964-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.044339 14039 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:35:56.708966-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.051593 14039 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T12:35:56.708969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.063388 14039 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T12:35:56.709173-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.074101 14039 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:35:56.709179-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.078817 14039 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:35:56.709182-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.078892 14039 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:35:56.709185-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.086654 14039 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T12:35:56.709189-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.097117 14039 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T12:35:56.709192-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.107912 14039 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:35:56.709195-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.113026 14039 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:35:56.709199-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.113098 14039 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:35:56.709203-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.121272 14039 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T12:35:56.709206-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.132017 14039 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T12:35:56.70921-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.137194 14039 certs.go:353] certs directory doesn't exist, likely first start: ls /var/lib/minikube/certs/etcd: Process exited with status 2\n"} +{"Time":"2023-05-31T12:35:56.709226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.70923-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.709234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.709237-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/var/lib/minikube/certs/etcd': No such file or directory\n"} +{"Time":"2023-05-31T12:35:56.709242-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.137237 14039 kubeadm.go:404] StartCluster: {Name:custom-flannel-996000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:custom-flannel-996000 Namespace:default APIServerName:minikubeCA APIServ"} +{"Time":"2023-05-31T12:35:56.709445-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"erNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:testdata/kube-flannel.yaml NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: Dis"} +{"Time":"2023-05-31T12:35:56.709451-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"ableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:35:56.709454-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.137363 14039 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:35:56.70946-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.158933 14039 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:35:56.709464-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.168614 14039 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:35:56.709468-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.177691 14039 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:35:56.709475-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.177745 14039 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:35:56.709479-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.186900 14039 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:35:56.709482-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.709486-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.709489-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.709492-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:35:56.709669-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:35:56.709684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:35:56.709694-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:35:56.709702-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.186933 14039 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,Mem,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:35:56.709712-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.230877 14039 kubeadm.go:322] [init] Using Kubernetes version: v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.709718-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.230928 14039 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:35:56.70972-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.358731 14039 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:35:56.709723-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.358819 14039 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:35:56.709725-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.358969 14039 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:35:56.709727-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.655260 14039 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:35:56.70973-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.717475 13691 ssh_runner.go:235] Completed: docker stop e77b8f6cca9c e9465fe3c0ae d24fa1c9acf9 6bc30c4c9eb7 4d686fd3f1ce 4ee0a5125f2b 4499b3c9c284 5eb7be9c96c3 c53ffb84f31c 1ae6c24e1af4 ad4083b140d9 0815545a2d96 57e0e096679d 03827143bc99 cb14b9266143 f750d5c48675: (1.117020582s)\n"} +{"Time":"2023-05-31T12:35:56.709732-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.717590 13691 ssh_runner.go:195] Run: sudo systemctl stop kubelet\n"} +{"Time":"2023-05-31T12:35:56.709735-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.830534 13691 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:35:56.709737-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.841221 13691 kubeadm.go:155] found existing configuration files:\n"} +{"Time":"2023-05-31T12:35:56.709739-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-rw------- 1 root root 5643 May 31 19:35 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T12:35:56.709858-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-rw------- 1 root root 5652 May 31 19:35 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T12:35:56.709863-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-rw------- 1 root root 2039 May 31 19:35 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T12:35:56.709865-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t-rw------- 1 root root 5604 May 31 19:35 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:35:56.709868-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.70987-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.841276 13691 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T12:35:56.709873-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.883899 13691 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T12:35:56.709875-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.896584 13691 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T12:35:56.70988-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.907665 13691 kubeadm.go:166] \"https://control-plane.minikube.internal:8443\" may not be in /etc/kubernetes/controller-manager.conf - will remove: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/controller-manager.conf: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.709883-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.709885-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.709887-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.709889-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.907744 13691 ssh_runner.go:195] Run: sudo rm -f /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T12:35:56.709891-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.918353 13691 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:35:56.709894-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.928554 13691 kubeadm.go:166] \"https://control-plane.minikube.internal:8443\" may not be in /etc/kubernetes/scheduler.conf - will remove: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/scheduler.conf: Process exited with status 1\n"} +{"Time":"2023-05-31T12:35:56.709896-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:35:56.709898-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.7099-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:35:56.709902-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.928615 13691 ssh_runner.go:195] Run: sudo rm -f /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:35:56.709904-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.938063 13691 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:35:56.709907-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.947930 13691 kubeadm.go:713] reconfiguring cluster from /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:35:56.710029-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:44.947942 13691 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase certs all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.710045-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.003929 13691 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase kubeconfig all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.71005-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.807554 13691 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase kubelet-start --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.710062-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:45.953904 13691 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase control-plane all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.710065-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.015517 13691 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase etcd local --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.71007-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.117854 13691 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T12:35:56.710073-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.117945 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.710075-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:46.683841 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.710077-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.183822 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.710082-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.196667 13691 api_server.go:72] duration metric: took 1.078801729s to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T12:35:56.710086-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.196682 13691 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T12:35:56.710088-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:47.196694 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.710091-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.676847 14039 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:35:56.710093-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.676946 14039 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:35:56.710095-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.677013 14039 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:35:56.710097-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:48.936253 14039 kubeadm.go:322] [certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T12:35:56.71022-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.061756 14039 kubeadm.go:322] [certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T12:35:56.710226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.130275 14039 kubeadm.go:322] [certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T12:35:56.71023-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.381995 14039 kubeadm.go:322] [certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T12:35:56.710234-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.484595 14039 kubeadm.go:322] [certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T12:35:56.710239-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.484917 14039 kubeadm.go:322] [certs] etcd/server serving cert is signed for DNS names [custom-flannel-996000 localhost] and IPs [192.168.76.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:35:56.710246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.658328 14039 kubeadm.go:322] [certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T12:35:56.710251-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.658470 14039 kubeadm.go:322] [certs] etcd/peer serving cert is signed for DNS names [custom-flannel-996000 localhost] and IPs [192.168.76.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:35:56.710254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.733727 14039 kubeadm.go:322] [certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T12:35:56.710258-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.837250 14039 kubeadm.go:322] [certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T12:35:56.710261-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.969202 14039 kubeadm.go:322] [certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T12:35:56.710265-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.969297 14039 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:35:56.710269-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.227675 14039 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:35:56.710272-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.475585 14039 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:35:56.710276-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.630633 14039 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:35:56.710284-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.788801 14039 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:35:56.710288-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.802188 14039 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:35:56.710292-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.802914 14039 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.710743-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.802960 14039 kubeadm.go:322] [kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T12:35:56.710751-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.890575 14039 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:35:56.710756-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:49.685929 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 403:\n"} +{"Time":"2023-05-31T12:35:56.71076-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T12:35:56.710768-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:49.685971 13691 api_server.go:103] status: https://127.0.0.1:52059/healthz returned error 403:\n"} +{"Time":"2023-05-31T12:35:56.710773-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T12:35:56.71078-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.186076 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.710787-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.192381 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 500:\n"} +{"Time":"2023-05-31T12:35:56.710797-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.710801-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.710804-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.710808-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.710811-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.710814-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.710832-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.710851-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.710856-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.710861-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.71087-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.710884-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.710888-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711221-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.711229-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.711232-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.711235-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711237-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.71124-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.711243-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.71125-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711254-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.711257-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.711261-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711264-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711268-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.711271-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.711274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711277-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711279-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711281-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.711283-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:50.192400 13691 api_server.go:103] status: https://127.0.0.1:52059/healthz returned error 500:\n"} +{"Time":"2023-05-31T12:35:56.711286-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.711289-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.711292-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.711295-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.711298-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.711605-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.711616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.711623-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.711627-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.71163-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.711633-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.711636-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.71164-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711644-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.711652-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.711661-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.711667-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711677-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.71168-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.711683-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.711686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711689-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.711692-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.711695-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711698-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.711702-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.711705-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.711708-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712014-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712021-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712025-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.712048-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.686212 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.712057-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.692112 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 500:\n"} +{"Time":"2023-05-31T12:35:56.712064-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.712069-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.712073-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.712076-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.712079-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.712082-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.7121-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.712105-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.712107-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.712122-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.712126-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.712128-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.71213-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712132-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.712153-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T12:35:56.712162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.712169-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712181-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.712338-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.71235-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712355-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.71236-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.712363-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712367-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.71237-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.712374-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.712377-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.71238-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712384-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712387-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.712391-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:50.692127 13691 api_server.go:103] status: https://127.0.0.1:52059/healthz returned error 500:\n"} +{"Time":"2023-05-31T12:35:56.712395-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:35:56.712398-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:35:56.712401-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:35:56.712404-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:35:56.712408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:35:56.712411-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:35:56.712414-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:35:56.712418-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:35:56.712421-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:35:56.712425-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:35:56.712428-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:35:56.712839-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712845-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712849-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:35:56.712853-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T12:35:56.712856-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:35:56.71286-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712863-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712867-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.71287-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:35:56.712874-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712877-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:35:56.712881-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:35:56.712884-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712888-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712891-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:35:56.712894-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:35:56.712897-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:35:56.7129-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712903-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:35:56.712907-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:35:56.71291-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.186155 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.712913-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.192277 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 200:\n"} +{"Time":"2023-05-31T12:35:56.713208-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tok\n"} +{"Time":"2023-05-31T12:35:56.713215-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.199859 13691 api_server.go:141] control plane version: v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.713218-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.199875 13691 api_server.go:131] duration metric: took 4.003159228s to wait for apiserver health ...\n"} +{"Time":"2023-05-31T12:35:56.71322-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.199882 13691 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:35:56.713226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.199889 13691 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:35:56.713228-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.221451 13691 out.go:177] * Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T12:35:56.71323-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.243109 13691 ssh_runner.go:195] Run: sudo mkdir -p /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:35:56.713233-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.253326 13691 ssh_runner.go:362] scp memory --\u003e /etc/cni/net.d/1-k8s.conflist (457 bytes)\n"} +{"Time":"2023-05-31T12:35:56.713235-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.270629 13691 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T12:35:56.713237-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.276282 13691 system_pods.go:59] 5 kube-system pods found\n"} +{"Time":"2023-05-31T12:35:56.713239-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.276296 13691 system_pods.go:61] \"etcd-kubernetes-upgrade-496000\" [6e0d7d93-b663-4be4-a1b3-7ac2d21debfa] Running / Ready:ContainersNotReady (containers with unready status: [etcd]) / ContainersReady:ContainersNotReady (containers with unready status: [etcd])\n"} +{"Time":"2023-05-31T12:35:56.713242-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.276302 13691 system_pods.go:61] \"kube-apiserver-kubernetes-upgrade-496000\" [2b55fb4c-cbbe-4569-a076-ad7287b8c8b5] Running\n"} +{"Time":"2023-05-31T12:35:56.713245-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.276312 13691 system_pods.go:61] \"kube-controller-manager-kubernetes-upgrade-496000\" [b661d550-5484-4630-b379-fa823891c3fb] Running / Ready:ContainersNotReady (containers with unready status: [kube-controller-manager]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-controller-manager])\n"} +{"Time":"2023-05-31T12:35:56.713255-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.276321 13691 system_pods.go:61] \"kube-scheduler-kubernetes-upgrade-496000\" [ca356c66-3251-4dc2-90c2-324bede67ab3] Running / Ready:ContainersNotReady (containers with unready status: [kube-scheduler]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-scheduler])\n"} +{"Time":"2023-05-31T12:35:56.713259-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.276326 13691 system_pods.go:61] \"storage-provisioner\" [ae3f933d-3d73-4ebd-8663-ddc792819351] Pending: PodScheduled:Unschedulable (0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..)\n"} +{"Time":"2023-05-31T12:35:56.713429-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.276331 13691 system_pods.go:74] duration metric: took 5.691407ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T12:35:56.713435-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.276336 13691 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T12:35:56.713438-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.279410 13691 node_conditions.go:122] node storage ephemeral capacity is 107016164Ki\n"} +{"Time":"2023-05-31T12:35:56.713441-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.279425 13691 node_conditions.go:123] node cpu capacity is 6\n"} +{"Time":"2023-05-31T12:35:56.713445-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.279433 13691 node_conditions.go:105] duration metric: took 3.094192ms to run NodePressure ...\n"} +{"Time":"2023-05-31T12:35:56.713449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.279445 13691 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase addon all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:35:56.713453-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.435895 13691 ssh_runner.go:195] Run: /bin/bash -c \"cat /proc/$(pgrep kube-apiserver)/oom_adj\"\n"} +{"Time":"2023-05-31T12:35:56.713457-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.445916 13691 ops.go:34] apiserver oom_adj: -16\n"} +{"Time":"2023-05-31T12:35:56.71346-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.445928 13691 kubeadm.go:640] restartCluster took 15.937939062s\n"} +{"Time":"2023-05-31T12:35:56.713464-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.445933 13691 kubeadm.go:406] StartCluster complete in 15.976352191s\n"} +{"Time":"2023-05-31T12:35:56.713468-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.445948 13691 settings.go:142] acquiring lock: {Name:mkadbf0242c93bf6c2425e391614d45302b1e1dc Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.713476-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446041 13691 settings.go:150] Updating kubeconfig: /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:35:56.713481-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446555 13691 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/kubeconfig: {Name:mk36b1fef13f0c406b5340544ea043a831d9fe53 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:35:56.713485-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446817 13691 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml\"\n"} +{"Time":"2023-05-31T12:35:56.71349-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446848 13691 addons.go:496] enable addons start: toEnable=map[ambassador:false auto-pause:false cloud-spanner:false csi-hostpath-driver:false dashboard:false default-storageclass:true efk:false freshpod:false gcp-auth:false gvisor:false headlamp:false helm-tiller:false inaccel:false ingress:false ingress-dns:false inspektor-gadget:false istio:false istio-provisioner:false kong:false kubevirt:false logviewer:false metallb:false metrics-server:false nvidia-driver-installer:false nvidia-gpu-device-plugin:false olm:false pod-security-policy:false portainer:false registry:false registry-aliases:false registry-creds:false storage-provisioner:true storage-provisioner-gluster:false volumesnapshots:false]\n"} +{"Time":"2023-05-31T12:35:56.713583-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446929 13691 addons.go:66] Setting storage-provisioner=true in profile \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.713587-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446950 13691 addons.go:66] Setting default-storageclass=true in profile \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.713589-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446954 13691 addons.go:228] Setting addon storage-provisioner=true in \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.713591-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:51.446967 13691 addons.go:237] addon storage-provisioner should already be in state true\n"} +{"Time":"2023-05-31T12:35:56.713595-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446976 13691 addons_storage_classes.go:33] enableOrDisableStorageClasses default-storageclass=true on \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.713598-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.446989 13691 config.go:182] Loaded profile config \"kubernetes-upgrade-496000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.713603-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.447003 13691 host.go:66] Checking if \"kubernetes-upgrade-496000\" exists ...\n"} +{"Time":"2023-05-31T12:35:56.713607-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.447262 13691 cli_runner.go:164] Run: docker container inspect kubernetes-upgrade-496000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:35:56.71361-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.447353 13691 cli_runner.go:164] Run: docker container inspect kubernetes-upgrade-496000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:35:56.713616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.447301 13691 kapi.go:59] client config for kubernetes-upgrade-496000: \u0026rest.Config{Host:\"https://127.0.0.1:52059\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt\", KeyFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key\", CAFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint8(nil), C"} +{"Time":"2023-05-31T12:35:56.713629-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"AData:[]uint8(nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x257d820), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T12:35:56.713714-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.455001 13691 kapi.go:248] \"coredns\" deployment in \"kube-system\" namespace and \"kubernetes-upgrade-496000\" context rescaled to 1 replicas\n"} +{"Time":"2023-05-31T12:35:56.713721-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.455047 13691 start.go:223] Will wait 6m0s for node \u0026{Name: IP:192.168.67.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:35:56.713729-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.494904 13691 out.go:177] * Verifying Kubernetes components...\n"} +{"Time":"2023-05-31T12:35:56.713743-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.515962 13691 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:35:56.713746-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.546938 13691 out.go:177] - Using image gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:35:56.71375-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.527455 13691 kapi.go:59] client config for kubernetes-upgrade-496000: \u0026rest.Config{Host:\"https://127.0.0.1:52059\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.crt\", KeyFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubernetes-upgrade-496000/client.key\", CAFile:\"/Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint8(nil), C"} +{"Time":"2023-05-31T12:35:56.713754-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"AData:[]uint8(nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x257d820), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T12:35:56.713758-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.543280 13691 start.go:889] CoreDNS already contains \"host.minikube.internal\" host record, skipping...\n"} +{"Time":"2023-05-31T12:35:56.713762-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.543346 13691 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.713766-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.554364 13691 addons.go:228] Setting addon default-storageclass=true in \"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.713893-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:51.567988 13691 addons.go:237] addon default-storageclass should already be in state true\n"} +{"Time":"2023-05-31T12:35:56.713898-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.568014 13691 addons.go:420] installing /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T12:35:56.713902-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.568029 13691 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storage-provisioner.yaml (2676 bytes)\n"} +{"Time":"2023-05-31T12:35:56.713906-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.568029 13691 host.go:66] Checking if \"kubernetes-upgrade-496000\" exists ...\n"} +{"Time":"2023-05-31T12:35:56.71391-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.568101 13691 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.713913-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.570709 13691 cli_runner.go:164] Run: docker container inspect kubernetes-upgrade-496000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:35:56.713917-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.632710 13691 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T12:35:56.713921-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.632828 13691 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:52060 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:35:56.713928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.632848 13691 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:35:56.713931-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.634296 13691 addons.go:420] installing /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T12:35:56.713935-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.634307 13691 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storageclass.yaml (271 bytes)\n"} +{"Time":"2023-05-31T12:35:56.713939-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.634391 13691 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.713943-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.646595 13691 api_server.go:72] duration metric: took 191.511936ms to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T12:35:56.713946-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.646616 13691 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T12:35:56.71395-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.646632 13691 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:52059/healthz ...\n"} +{"Time":"2023-05-31T12:35:56.713953-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.653090 13691 api_server.go:279] https://127.0.0.1:52059/healthz returned 200:\n"} +{"Time":"2023-05-31T12:35:56.713957-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tok\n"} +{"Time":"2023-05-31T12:35:56.714146-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.654879 13691 api_server.go:141] control plane version: v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.714153-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.654893 13691 api_server.go:131] duration metric: took 8.269615ms to wait for apiserver health ...\n"} +{"Time":"2023-05-31T12:35:56.714159-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.654899 13691 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T12:35:56.714163-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660142 13691 system_pods.go:59] 5 kube-system pods found\n"} +{"Time":"2023-05-31T12:35:56.714178-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660189 13691 system_pods.go:61] \"etcd-kubernetes-upgrade-496000\" [6e0d7d93-b663-4be4-a1b3-7ac2d21debfa] Running / Ready:ContainersNotReady (containers with unready status: [etcd]) / ContainersReady:ContainersNotReady (containers with unready status: [etcd])\n"} +{"Time":"2023-05-31T12:35:56.714182-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660199 13691 system_pods.go:61] \"kube-apiserver-kubernetes-upgrade-496000\" [2b55fb4c-cbbe-4569-a076-ad7287b8c8b5] Running\n"} +{"Time":"2023-05-31T12:35:56.714192-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660210 13691 system_pods.go:61] \"kube-controller-manager-kubernetes-upgrade-496000\" [b661d550-5484-4630-b379-fa823891c3fb] Running / Ready:ContainersNotReady (containers with unready status: [kube-controller-manager]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-controller-manager])\n"} +{"Time":"2023-05-31T12:35:56.714197-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660222 13691 system_pods.go:61] \"kube-scheduler-kubernetes-upgrade-496000\" [ca356c66-3251-4dc2-90c2-324bede67ab3] Running / Ready:ContainersNotReady (containers with unready status: [kube-scheduler]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-scheduler])\n"} +{"Time":"2023-05-31T12:35:56.7142-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660228 13691 system_pods.go:61] \"storage-provisioner\" [ae3f933d-3d73-4ebd-8663-ddc792819351] Pending: PodScheduled:Unschedulable (0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..)\n"} +{"Time":"2023-05-31T12:35:56.714203-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660235 13691 system_pods.go:74] duration metric: took 5.331028ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T12:35:56.714205-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660243 13691 kubeadm.go:581] duration metric: took 205.164939ms to wait for : map[apiserver:true system_pods:true] ...\n"} +{"Time":"2023-05-31T12:35:56.714207-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.660254 13691 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T12:35:56.714209-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.663654 13691 node_conditions.go:122] node storage ephemeral capacity is 107016164Ki\n"} +{"Time":"2023-05-31T12:35:56.714212-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.663667 13691 node_conditions.go:123] node cpu capacity is 6\n"} +{"Time":"2023-05-31T12:35:56.714383-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.663681 13691 node_conditions.go:105] duration metric: took 3.421582ms to run NodePressure ...\n"} +{"Time":"2023-05-31T12:35:56.71439-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.663689 13691 start.go:228] waiting for startup goroutines ...\n"} +{"Time":"2023-05-31T12:35:56.714393-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.693193 13691 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:52060 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/kubernetes-upgrade-496000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:35:56.714397-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.733283 13691 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T12:35:56.714401-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:51.789174 13691 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T12:35:56.714405-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.913784 14039 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:35:56.714408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.913900 14039 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:35:56.714416-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.914012 14039 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:35:56.71442-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.914081 14039 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:35:56.714424-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.914160 14039 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:35:56.714427-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:50.914327 14039 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:35:56.71443-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.554742 13691 out.go:177] * Enabled addons: storage-provisioner, default-storageclass\n"} +{"Time":"2023-05-31T12:35:56.714435-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.576242 13691 addons.go:499] enable addons completed in 1.129385292s: enabled=[storage-provisioner default-storageclass]\n"} +{"Time":"2023-05-31T12:35:56.714439-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.576336 13691 start.go:233] waiting for cluster config update ...\n"} +{"Time":"2023-05-31T12:35:56.714442-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.576362 13691 start.go:242] writing updated cluster config ...\n"} +{"Time":"2023-05-31T12:35:56.714446-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.576920 13691 ssh_runner.go:195] Run: rm -f paused\n"} +{"Time":"2023-05-31T12:35:56.714449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.623676 13691 start.go:573] kubectl: 1.25.9, cluster: 1.27.2 (minor skew: 2)\n"} +{"Time":"2023-05-31T12:35:56.714648-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.645388 13691 out.go:177] \n"} +{"Time":"2023-05-31T12:35:56.714654-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:35:52.667549 13691 out.go:239] ! /usr/local/bin/kubectl is version 1.25.9, which may have incompatibilities with Kubernetes 1.27.2.\n"} +{"Time":"2023-05-31T12:35:56.714656-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.689184 13691 out.go:177] - Want kubectl v1.27.2? Try 'minikube kubectl -- get pods -A'\n"} +{"Time":"2023-05-31T12:35:56.714658-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:35:52.710426 13691 out.go:177] * Done! kubectl is now configured to use \"kubernetes-upgrade-496000\" cluster and \"default\" namespace by default\n"} +{"Time":"2023-05-31T12:35:56.714661-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.714663-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.714665-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e Docker \u003c==\n"} +{"Time":"2023-05-31T12:35:56.714667-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* May 31 19:35:34 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:34Z\" level=info msg=\"Loaded network plugin cni\"\n"} +{"Time":"2023-05-31T12:35:56.71467-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:34 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:34Z\" level=info msg=\"Docker cri networking managed by network plugin cni\"\n"} +{"Time":"2023-05-31T12:35:56.714674-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:34 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:34Z\" level=info msg=\"Docker Info: \u0026{ID:ffad1c1a-a8cd-4411-a973-0e7cd4c212e5 Containers:8 ContainersRunning:0 ContainersPaused:0 ContainersStopped:8 Images:15 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:[] Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:[] Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6tables:true Debug:false NFd:25 OomKillDisable:false NGoroutines:35 SystemTime:2023-05-31T19:35:34.315748446Z LoggingDriver:json-file CgroupDriver:cgroupfs CgroupVersion:2 NEventsListener:0 KernelVersion:5.15.49-linuxkit-pr Oper"} +{"Time":"2023-05-31T12:35:56.714678-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"atingSystem:Ubuntu 22.04.2 LTS OSVersion:22.04 OSType:linux Architecture:x86_64 IndexServerAddress:https://index.docker.io/v1/ RegistryConfig:0xc000462150 NCPU:6 MemTotal:6231715840 GenericResources:[] DockerRootDir:/var/lib/docker HTTPProxy: HTTPSProxy: NoProxy:control-plane.minikube.internal Name:kubernetes-upgrade-496000 Labels:[provider=docker] ExperimentalBuild:false ServerVersion:24.0.1 ClusterStore: ClusterAdvertise: Runtimes:map[io.containerd.runc.v2:{Path:runc Args:[] Shim:\u003cnil\u003e} runc:{Path:runc Args:[] Shim:\u003cnil\u003e}] DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:[] Nodes:0 Managers:0 Cluster:\u003cnil\u003e Warnings:[]} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=builtin name=cgrou"} +{"Time":"2023-05-31T12:35:56.714845-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"pns] ProductLicense: DefaultAddressPools:[] Warnings:[]}\"\n"} +{"Time":"2023-05-31T12:35:56.714852-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:34 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:34Z\" level=info msg=\"Setting cgroupDriver cgroupfs\"\n"} +{"Time":"2023-05-31T12:35:56.714856-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:34 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:34Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:,},}\"\n"} +{"Time":"2023-05-31T12:35:56.714859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:34 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:34Z\" level=info msg=\"Starting the GRPC backend for the Docker CRI interface.\"\n"} +{"Time":"2023-05-31T12:35:56.714861-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:34 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:34Z\" level=info msg=\"Start cri-dockerd grpc backend\"\n"} +{"Time":"2023-05-31T12:35:56.714863-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:34 kubernetes-upgrade-496000 systemd[1]: Started CRI Interface for Docker Application Container Engine.\n"} +{"Time":"2023-05-31T12:35:56.714866-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:38 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:38Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/5eb7be9c96c3d8f3356df2e785f1e2cd0172769e6801113b7ed2ff217435740c/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\n"} +{"Time":"2023-05-31T12:35:56.714869-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:38 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:38Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/4499b3c9c284b4134ed4390c806aee763bc8aeeb55a941ad1dba2d647a95da7f/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\n"} +{"Time":"2023-05-31T12:35:56.714871-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:38 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:38Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/4ee0a5125f2b804dc95c0a4f3fbe547f665c99397f8da909a815775080b5de4b/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\n"} +{"Time":"2023-05-31T12:35:56.714874-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:39 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:39Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/4d686fd3f1cea0823fdb0bcb12cec524f7e2e69a60d24c0a22b3cba7547594ee/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\n"} +{"Time":"2023-05-31T12:35:56.714877-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:43 kubernetes-upgrade-496000 dockerd[11922]: time=\"2023-05-31T19:35:43.693055687Z\" level=info msg=\"ignoring event\" container=4ee0a5125f2b804dc95c0a4f3fbe547f665c99397f8da909a815775080b5de4b module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T12:35:56.71488-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:43 kubernetes-upgrade-496000 dockerd[11922]: time=\"2023-05-31T19:35:43.704796824Z\" level=info msg=\"ignoring event\" container=6bc30c4c9eb7f76a589f7b6f978a2b9985c6be58b3d2dcceb262312660cdf6d1 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T12:35:56.715066-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:43 kubernetes-upgrade-496000 dockerd[11922]: time=\"2023-05-31T19:35:43.708016342Z\" level=info msg=\"ignoring event\" container=5eb7be9c96c3d8f3356df2e785f1e2cd0172769e6801113b7ed2ff217435740c module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T12:35:56.715071-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:43 kubernetes-upgrade-496000 dockerd[11922]: time=\"2023-05-31T19:35:43.708088529Z\" level=info msg=\"ignoring event\" container=4d686fd3f1cea0823fdb0bcb12cec524f7e2e69a60d24c0a22b3cba7547594ee module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T12:35:56.715074-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:43 kubernetes-upgrade-496000 dockerd[11922]: time=\"2023-05-31T19:35:43.713356236Z\" level=info msg=\"ignoring event\" container=4499b3c9c284b4134ed4390c806aee763bc8aeeb55a941ad1dba2d647a95da7f module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T12:35:56.715092-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:43 kubernetes-upgrade-496000 dockerd[11922]: time=\"2023-05-31T19:35:43.715233838Z\" level=info msg=\"ignoring event\" container=e9465fe3c0aecdef526da22eb1bee025633cb1ba1528f2da4d6630d28465581c module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T12:35:56.715103-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:43 kubernetes-upgrade-496000 dockerd[11922]: time=\"2023-05-31T19:35:43.793619410Z\" level=info msg=\"ignoring event\" container=e77b8f6cca9c648f9512c1b0e9390d9d1e6946cb8c73126b2dc594a08ee09a82 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T12:35:56.715108-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:44 kubernetes-upgrade-496000 dockerd[11922]: time=\"2023-05-31T19:35:44.682646757Z\" level=info msg=\"ignoring event\" container=d24fa1c9acf9dcd2174e22188fd0fbd7ae00b3a12ca1be9bf8a96f1192a67f16 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T12:35:56.715112-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:44 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:44Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/8b722faceb200eaa59cbf7ee1d89cdb051e1e13f3ef12438d436cbe494954a8c/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\n"} +{"Time":"2023-05-31T12:35:56.715116-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:44 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:44Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/76436fc6ec9c2be2ec3c54c9bbcce0ae0753ef8ff90b610e33649903ee167317/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\n"} +{"Time":"2023-05-31T12:35:56.715121-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:44 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:44Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/d6127a5ee3d95184047dfee394ee3f21bb13a46681850477c62c206631d0dd06/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\n"} +{"Time":"2023-05-31T12:35:56.715126-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:44 kubernetes-upgrade-496000 cri-dockerd[12216]: time=\"2023-05-31T19:35:44Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/41879d5de50cd0cd8f308637093436413a8a9193b48490b7b46a75660ece8ebb/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\n"} +{"Time":"2023-05-31T12:35:56.71531-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:44 kubernetes-upgrade-496000 cri-dockerd[12216]: W0531 19:35:44.924790 12216 logging.go:59] [core] [Server #1] grpc: Server.processUnaryRPC failed to write status: connection error: desc = \"transport is closing\"\n"} +{"Time":"2023-05-31T12:35:56.71532-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.715329-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.715335-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e container status \u003c==\n"} +{"Time":"2023-05-31T12:35:56.715339-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\n"} +{"Time":"2023-05-31T12:35:56.715343-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t99c4bd37cfbea 89e70da428d29 7 seconds ago Running kube-scheduler 2 76436fc6ec9c2 kube-scheduler-kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715347-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t48a5c1a17491f ac2b7465ebba9 8 seconds ago Running kube-controller-manager 2 d6127a5ee3d95 kube-controller-manager-kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715359-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t9b1a908bb68b3 c5b13e4f7806d 8 seconds ago Running kube-apiserver 2 41879d5de50cd kube-apiserver-kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715366-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t539b384d9fdea 86b6af7dd652c 8 seconds ago Running etcd 2 8b722faceb200 etcd-kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715369-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \te77b8f6cca9c6 86b6af7dd652c 15 seconds ago Exited etcd 1 4d686fd3f1cea etcd-kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715372-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \te9465fe3c0aec ac2b7465ebba9 15 seconds ago Exited kube-controller-manager 1 4ee0a5125f2b8 kube-controller-manager-kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715377-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \td24fa1c9acf9d c5b13e4f7806d 15 seconds ago Exited kube-apiserver 1 4499b3c9c284b kube-apiserver-kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.71538-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t6bc30c4c9eb7f 89e70da428d29 15 seconds ago Exited kube-scheduler 1 5eb7be9c96c3d kube-scheduler-kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715383-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.715386-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.715388-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e describe nodes \u003c==\n"} +{"Time":"2023-05-31T12:35:56.715632-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Name: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715641-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tRoles: control-plane\n"} +{"Time":"2023-05-31T12:35:56.715646-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLabels: beta.kubernetes.io/arch=amd64\n"} +{"Time":"2023-05-31T12:35:56.715649-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t beta.kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:35:56.715652-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kubernetes.io/arch=amd64\n"} +{"Time":"2023-05-31T12:35:56.715654-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kubernetes.io/hostname=kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715657-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:35:56.71566-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140\n"} +{"Time":"2023-05-31T12:35:56.715662-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube.k8s.io/name=kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715666-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube.k8s.io/primary=true\n"} +{"Time":"2023-05-31T12:35:56.715669-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube.k8s.io/updated_at=2023_05_31T12_35_16_0700\n"} +{"Time":"2023-05-31T12:35:56.715671-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube.k8s.io/version=v1.30.1\n"} +{"Time":"2023-05-31T12:35:56.715673-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t node-role.kubernetes.io/control-plane=\n"} +{"Time":"2023-05-31T12:35:56.715675-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t node.kubernetes.io/exclude-from-external-load-balancers=\n"} +{"Time":"2023-05-31T12:35:56.715678-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAnnotations: kubeadm.alpha.kubernetes.io/cri-socket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:35:56.715681-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t volumes.kubernetes.io/controller-managed-attach-detach: true\n"} +{"Time":"2023-05-31T12:35:56.715685-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tCreationTimestamp: Wed, 31 May 2023 19:35:12 +0000\n"} +{"Time":"2023-05-31T12:35:56.715687-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tTaints: node.kubernetes.io/not-ready:NoSchedule\n"} +{"Time":"2023-05-31T12:35:56.715689-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tUnschedulable: false\n"} +{"Time":"2023-05-31T12:35:56.715691-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLease:\n"} +{"Time":"2023-05-31T12:35:56.715694-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t HolderIdentity: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.715696-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t AcquireTime: \u003cunset\u003e\n"} +{"Time":"2023-05-31T12:35:56.715699-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t RenewTime: Wed, 31 May 2023 19:35:49 +0000\n"} +{"Time":"2023-05-31T12:35:56.715702-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tConditions:\n"} +{"Time":"2023-05-31T12:35:56.716142-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Type Status LastHeartbeatTime LastTransitionTime Reason Message\n"} +{"Time":"2023-05-31T12:35:56.716148-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ---- ------ ----------------- ------------------ ------ -------\n"} +{"Time":"2023-05-31T12:35:56.716152-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t MemoryPressure False Wed, 31 May 2023 19:35:49 +0000 Wed, 31 May 2023 19:35:10 +0000 KubeletHasSufficientMemory kubelet has sufficient memory available\n"} +{"Time":"2023-05-31T12:35:56.716157-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t DiskPressure False Wed, 31 May 2023 19:35:49 +0000 Wed, 31 May 2023 19:35:10 +0000 KubeletHasNoDiskPressure kubelet has no disk pressure\n"} +{"Time":"2023-05-31T12:35:56.716161-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t PIDPressure False Wed, 31 May 2023 19:35:49 +0000 Wed, 31 May 2023 19:35:10 +0000 KubeletHasSufficientPID kubelet has sufficient PID available\n"} +{"Time":"2023-05-31T12:35:56.716165-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Ready True Wed, 31 May 2023 19:35:49 +0000 Wed, 31 May 2023 19:35:16 +0000 KubeletReady kubelet is posting ready status\n"} +{"Time":"2023-05-31T12:35:56.716168-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAddresses:\n"} +{"Time":"2023-05-31T12:35:56.716172-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t InternalIP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:35:56.716175-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Hostname: kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:56.716179-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tCapacity:\n"} +{"Time":"2023-05-31T12:35:56.716182-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t cpu: 6\n"} +{"Time":"2023-05-31T12:35:56.716185-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ephemeral-storage: 107016164Ki\n"} +{"Time":"2023-05-31T12:35:56.716189-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T12:35:56.716192-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t memory: 6085660Ki\n"} +{"Time":"2023-05-31T12:35:56.716195-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T12:35:56.716199-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAllocatable:\n"} +{"Time":"2023-05-31T12:35:56.716202-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t cpu: 6\n"} +{"Time":"2023-05-31T12:35:56.716206-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ephemeral-storage: 107016164Ki\n"} +{"Time":"2023-05-31T12:35:56.716209-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T12:35:56.716212-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t memory: 6085660Ki\n"} +{"Time":"2023-05-31T12:35:56.716215-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T12:35:56.716218-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tSystem Info:\n"} +{"Time":"2023-05-31T12:35:56.716226-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Machine ID: c4ff606de7824d409ae09cf1fbc5bed5\n"} +{"Time":"2023-05-31T12:35:56.716496-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t System UUID: c4ff606de7824d409ae09cf1fbc5bed5\n"} +{"Time":"2023-05-31T12:35:56.716504-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Boot ID: 2a6827c0-6742-4103-9f84-2512fe240d98\n"} +{"Time":"2023-05-31T12:35:56.716506-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Kernel Version: 5.15.49-linuxkit-pr\n"} +{"Time":"2023-05-31T12:35:56.716509-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t OS Image: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T12:35:56.716511-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Operating System: linux\n"} +{"Time":"2023-05-31T12:35:56.716513-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Architecture: amd64\n"} +{"Time":"2023-05-31T12:35:56.716515-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Container Runtime Version: docker://24.0.1\n"} +{"Time":"2023-05-31T12:35:56.716517-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Kubelet Version: v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.716519-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Kube-Proxy Version: v1.27.2\n"} +{"Time":"2023-05-31T12:35:56.716521-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tNon-terminated Pods: (4 in total)\n"} +{"Time":"2023-05-31T12:35:56.716523-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Namespace Name CPU Requests CPU Limits Memory Requests Memory Limits Age\n"} +{"Time":"2023-05-31T12:35:56.716527-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t --------- ---- ------------ ---------- --------------- ------------- ---\n"} +{"Time":"2023-05-31T12:35:56.716529-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kube-system etcd-kubernetes-upgrade-496000 100m (1%!)(MISSING) 0 (0%!)(MISSING) 100Mi (1%!)(MISSING) 0 (0%!)(MISSING) 38s\n"} +{"Time":"2023-05-31T12:35:56.716532-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kube-system kube-apiserver-kubernetes-upgrade-496000 250m (4%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 38s\n"} +{"Time":"2023-05-31T12:35:56.716534-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kube-system kube-controller-manager-kubernetes-upgrade-496000 200m (3%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 38s\n"} +{"Time":"2023-05-31T12:35:56.716536-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t kube-system kube-scheduler-kubernetes-upgrade-496000 100m (1%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 39s\n"} +{"Time":"2023-05-31T12:35:56.716539-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tAllocated resources:\n"} +{"Time":"2023-05-31T12:35:56.716541-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t (Total limits may be over 100 percent, i.e., overcommitted.)\n"} +{"Time":"2023-05-31T12:35:56.716543-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Resource Requests Limits\n"} +{"Time":"2023-05-31T12:35:56.716545-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t -------- -------- ------\n"} +{"Time":"2023-05-31T12:35:56.716798-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t cpu 650m (10%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.716809-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t memory 100Mi (1%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.716813-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ephemeral-storage 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.716816-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t hugepages-2Mi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T12:35:56.71682-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tEvents:\n"} +{"Time":"2023-05-31T12:35:56.716823-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:35:56.716826-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:35:56.71683-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal Starting 39s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T12:35:56.716833-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeAllocatableEnforced 39s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T12:35:56.716836-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeHasSufficientMemory 39s kubelet Node kubernetes-upgrade-496000 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T12:35:56.71684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeHasNoDiskPressure 39s kubelet Node kubernetes-upgrade-496000 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T12:35:56.716842-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeHasSufficientPID 39s kubelet Node kubernetes-upgrade-496000 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T12:35:56.716845-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeReady 38s kubelet Node kubernetes-upgrade-496000 status is now: NodeReady\n"} +{"Time":"2023-05-31T12:35:56.716847-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeNotReady 28s kubelet Node kubernetes-upgrade-496000 status is now: NodeNotReady\n"} +{"Time":"2023-05-31T12:35:56.71685-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal Starting 8s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T12:35:56.716853-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeHasSufficientMemory 8s (x8 over 8s) kubelet Node kubernetes-upgrade-496000 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T12:35:56.716856-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeHasNoDiskPressure 8s (x8 over 8s) kubelet Node kubernetes-upgrade-496000 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T12:35:56.716859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeHasSufficientPID 8s (x7 over 8s) kubelet Node kubernetes-upgrade-496000 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T12:35:56.716863-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t Normal NodeAllocatableEnforced 8s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T12:35:56.717065-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.717073-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.717076-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e dmesg \u003c==\n"} +{"Time":"2023-05-31T12:35:56.71708-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.717083-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.717086-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e etcd [539b384d9fde] \u003c==\n"} +{"Time":"2023-05-31T12:35:56.71709-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* {\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.916Z\",\"caller\":\"fileutil/purge.go:44\",\"msg\":\"started to purge file\",\"dir\":\"/var/lib/minikube/etcd/member/snap\",\"suffix\":\"snap\",\"max\":5,\"interval\":\"30s\"}\n"} +{"Time":"2023-05-31T12:35:56.717101-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.916Z\",\"caller\":\"fileutil/purge.go:44\",\"msg\":\"started to purge file\",\"dir\":\"/var/lib/minikube/etcd/member/wal\",\"suffix\":\"wal\",\"max\":5,\"interval\":\"30s\"}\n"} +{"Time":"2023-05-31T12:35:56.717106-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.917Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 switched to configuration voters=(9694253945895198663)\"}\n"} +{"Time":"2023-05-31T12:35:56.71711-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.917Z\",\"caller\":\"membership/cluster.go:421\",\"msg\":\"added member\",\"cluster-id\":\"9d8fdeb88b6def78\",\"local-member-id\":\"8688e899f7831fc7\",\"added-peer-id\":\"8688e899f7831fc7\",\"added-peer-peer-urls\":[\"https://192.168.67.2:2380\"]}\n"} +{"Time":"2023-05-31T12:35:56.717115-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.917Z\",\"caller\":\"membership/cluster.go:584\",\"msg\":\"set initial cluster version\",\"cluster-id\":\"9d8fdeb88b6def78\",\"local-member-id\":\"8688e899f7831fc7\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T12:35:56.71712-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.917Z\",\"caller\":\"api/capability.go:75\",\"msg\":\"enabled capabilities for version\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T12:35:56.717124-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.918Z\",\"caller\":\"embed/etcd.go:687\",\"msg\":\"starting with client TLS\",\"tls-info\":\"cert = /var/lib/minikube/certs/etcd/server.crt, key = /var/lib/minikube/certs/etcd/server.key, client-cert=, client-key=, trusted-ca = /var/lib/minikube/certs/etcd/ca.crt, client-cert-auth = true, crl-file = \",\"cipher-suites\":[]}\n"} +{"Time":"2023-05-31T12:35:56.717134-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.918Z\",\"caller\":\"embed/etcd.go:586\",\"msg\":\"serving peer traffic\",\"address\":\"192.168.67.2:2380\"}\n"} +{"Time":"2023-05-31T12:35:56.717138-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.918Z\",\"caller\":\"embed/etcd.go:558\",\"msg\":\"cmux::serve\",\"address\":\"192.168.67.2:2380\"}\n"} +{"Time":"2023-05-31T12:35:56.717143-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.919Z\",\"caller\":\"embed/etcd.go:275\",\"msg\":\"now serving peer/client/metrics\",\"local-member-id\":\"8688e899f7831fc7\",\"initial-advertise-peer-urls\":[\"https://192.168.67.2:2380\"],\"listen-peer-urls\":[\"https://192.168.67.2:2380\"],\"advertise-client-urls\":[\"https://192.168.67.2:2379\"],\"listen-client-urls\":[\"https://127.0.0.1:2379\",\"https://192.168.67.2:2379\"],\"listen-metrics-urls\":[\"http://127.0.0.1:2381\"]}\n"} +{"Time":"2023-05-31T12:35:56.717378-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:46.919Z\",\"caller\":\"embed/etcd.go:762\",\"msg\":\"serving metrics\",\"address\":\"http://127.0.0.1:2381\"}\n"} +{"Time":"2023-05-31T12:35:56.717385-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.707Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 is starting a new election at term 3\"}\n"} +{"Time":"2023-05-31T12:35:56.71739-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.707Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 became pre-candidate at term 3\"}\n"} +{"Time":"2023-05-31T12:35:56.717394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.707Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 received MsgPreVoteResp from 8688e899f7831fc7 at term 3\"}\n"} +{"Time":"2023-05-31T12:35:56.717399-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.707Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 became candidate at term 4\"}\n"} +{"Time":"2023-05-31T12:35:56.717403-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.707Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 received MsgVoteResp from 8688e899f7831fc7 at term 4\"}\n"} +{"Time":"2023-05-31T12:35:56.717408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.707Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 became leader at term 4\"}\n"} +{"Time":"2023-05-31T12:35:56.717415-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.707Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"raft.node: 8688e899f7831fc7 elected leader 8688e899f7831fc7 at term 4\"}\n"} +{"Time":"2023-05-31T12:35:56.717425-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.708Z\",\"caller\":\"etcdserver/server.go:2062\",\"msg\":\"published local member to cluster through raft\",\"local-member-id\":\"8688e899f7831fc7\",\"local-member-attributes\":\"{Name:kubernetes-upgrade-496000 ClientURLs:[https://192.168.67.2:2379]}\",\"request-path\":\"/0/members/8688e899f7831fc7/attributes\",\"cluster-id\":\"9d8fdeb88b6def78\",\"publish-timeout\":\"7s\"}\n"} +{"Time":"2023-05-31T12:35:56.717439-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.708Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T12:35:56.717448-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.708Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T12:35:56.717455-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.709Z\",\"caller\":\"etcdmain/main.go:44\",\"msg\":\"notifying init daemon\"}\n"} +{"Time":"2023-05-31T12:35:56.717459-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.709Z\",\"caller\":\"etcdmain/main.go:50\",\"msg\":\"successfully notified init daemon\"}\n"} +{"Time":"2023-05-31T12:35:56.717951-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.709Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"192.168.67.2:2379\"}\n"} +{"Time":"2023-05-31T12:35:56.717959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:48.710Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"127.0.0.1:2379\"}\n"} +{"Time":"2023-05-31T12:35:56.717964-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.717967-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.71797-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e etcd [e77b8f6cca9c] \u003c==\n"} +{"Time":"2023-05-31T12:35:56.717974-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* {\"level\":\"info\",\"ts\":\"2023-05-31T19:35:39.505Z\",\"caller\":\"embed/etcd.go:558\",\"msg\":\"cmux::serve\",\"address\":\"192.168.67.2:2380\"}\n"} +{"Time":"2023-05-31T12:35:56.717978-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:39.506Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 switched to configuration voters=(9694253945895198663)\"}\n"} +{"Time":"2023-05-31T12:35:56.717982-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:39.506Z\",\"caller\":\"membership/cluster.go:421\",\"msg\":\"added member\",\"cluster-id\":\"9d8fdeb88b6def78\",\"local-member-id\":\"8688e899f7831fc7\",\"added-peer-id\":\"8688e899f7831fc7\",\"added-peer-peer-urls\":[\"https://192.168.67.2:2380\"]}\n"} +{"Time":"2023-05-31T12:35:56.718025-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:39.506Z\",\"caller\":\"membership/cluster.go:584\",\"msg\":\"set initial cluster version\",\"cluster-id\":\"9d8fdeb88b6def78\",\"local-member-id\":\"8688e899f7831fc7\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T12:35:56.718037-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:39.506Z\",\"caller\":\"api/capability.go:75\",\"msg\":\"enabled capabilities for version\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T12:35:56.718044-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.884Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 is starting a new election at term 2\"}\n"} +{"Time":"2023-05-31T12:35:56.718049-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.884Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 became pre-candidate at term 2\"}\n"} +{"Time":"2023-05-31T12:35:56.718056-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.884Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 received MsgPreVoteResp from 8688e899f7831fc7 at term 2\"}\n"} +{"Time":"2023-05-31T12:35:56.718063-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.884Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 became candidate at term 3\"}\n"} +{"Time":"2023-05-31T12:35:56.718174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.884Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 received MsgVoteResp from 8688e899f7831fc7 at term 3\"}\n"} +{"Time":"2023-05-31T12:35:56.718184-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.884Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"8688e899f7831fc7 became leader at term 3\"}\n"} +{"Time":"2023-05-31T12:35:56.718188-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.884Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"raft.node: 8688e899f7831fc7 elected leader 8688e899f7831fc7 at term 3\"}\n"} +{"Time":"2023-05-31T12:35:56.718193-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.887Z\",\"caller\":\"etcdserver/server.go:2062\",\"msg\":\"published local member to cluster through raft\",\"local-member-id\":\"8688e899f7831fc7\",\"local-member-attributes\":\"{Name:kubernetes-upgrade-496000 ClientURLs:[https://192.168.67.2:2379]}\",\"request-path\":\"/0/members/8688e899f7831fc7/attributes\",\"cluster-id\":\"9d8fdeb88b6def78\",\"publish-timeout\":\"7s\"}\n"} +{"Time":"2023-05-31T12:35:56.718197-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.887Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T12:35:56.718201-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.887Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T12:35:56.718205-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.888Z\",\"caller\":\"etcdmain/main.go:44\",\"msg\":\"notifying init daemon\"}\n"} +{"Time":"2023-05-31T12:35:56.718212-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.888Z\",\"caller\":\"etcdmain/main.go:50\",\"msg\":\"successfully notified init daemon\"}\n"} +{"Time":"2023-05-31T12:35:56.718218-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.888Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"192.168.67.2:2379\"}\n"} +{"Time":"2023-05-31T12:35:56.718223-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:40.890Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"127.0.0.1:2379\"}\n"} +{"Time":"2023-05-31T12:35:56.718228-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:43.688Z\",\"caller\":\"osutil/interrupt_unix.go:64\",\"msg\":\"received signal; shutting down\",\"signal\":\"terminated\"}\n"} +{"Time":"2023-05-31T12:35:56.718236-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:43.688Z\",\"caller\":\"embed/etcd.go:373\",\"msg\":\"closing etcd server\",\"name\":\"kubernetes-upgrade-496000\",\"data-dir\":\"/var/lib/minikube/etcd\",\"advertise-peer-urls\":[\"https://192.168.67.2:2380\"],\"advertise-client-urls\":[\"https://192.168.67.2:2379\"]}\n"} +{"Time":"2023-05-31T12:35:56.718344-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:43.702Z\",\"caller\":\"etcdserver/server.go:1465\",\"msg\":\"skipped leadership transfer for single voting member cluster\",\"local-member-id\":\"8688e899f7831fc7\",\"current-leader-member-id\":\"8688e899f7831fc7\"}\n"} +{"Time":"2023-05-31T12:35:56.718361-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:43.704Z\",\"caller\":\"embed/etcd.go:568\",\"msg\":\"stopping serving peer traffic\",\"address\":\"192.168.67.2:2380\"}\n"} +{"Time":"2023-05-31T12:35:56.718369-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:43.706Z\",\"caller\":\"embed/etcd.go:573\",\"msg\":\"stopped serving peer traffic\",\"address\":\"192.168.67.2:2380\"}\n"} +{"Time":"2023-05-31T12:35:56.718374-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:35:43.706Z\",\"caller\":\"embed/etcd.go:375\",\"msg\":\"closed etcd server\",\"name\":\"kubernetes-upgrade-496000\",\"data-dir\":\"/var/lib/minikube/etcd\",\"advertise-peer-urls\":[\"https://192.168.67.2:2380\"],\"advertise-client-urls\":[\"https://192.168.67.2:2379\"]}\n"} +{"Time":"2023-05-31T12:35:56.718379-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.718383-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.718386-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e kernel \u003c==\n"} +{"Time":"2023-05-31T12:35:56.718394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* 19:35:55 up 1:04, 0 users, load average: 2.43, 1.87, 1.48\n"} +{"Time":"2023-05-31T12:35:56.718398-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tLinux kubernetes-upgrade-496000 5.15.49-linuxkit-pr #1 SMP Thu May 25 07:17:40 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux\n"} +{"Time":"2023-05-31T12:35:56.718402-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tPRETTY_NAME=\"Ubuntu 22.04.2 LTS\"\n"} +{"Time":"2023-05-31T12:35:56.718405-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.718408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.718412-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e kube-apiserver [9b1a908bb68b] \u003c==\n"} +{"Time":"2023-05-31T12:35:56.718415-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* I0531 19:35:49.676862 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:35:56.718419-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.676903 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:35:56.718422-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.676910 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:35:56.718426-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.676916 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:35:56.71843-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.676920 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:35:56.718433-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.676928 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:35:56.718485-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.676951 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:35:56.718491-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.676592 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:35:56.718499-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.719058 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:35:56.718503-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.782038 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:35:56.718507-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.782190 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:35:56.71851-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.782064 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:35:56.718514-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.782079 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:35:56.718517-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.782105 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:35:56.718521-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.782138 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:35:56.718524-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.782159 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:35:56.718528-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.782165 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:35:56.718531-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.813315 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:35:56.718535-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:50.457624 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:35:56.718538-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:50.678566 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:35:56.718543-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.358309 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:35:56.718676-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.366849 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:35:56.7187-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.395366 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:35:56.718738-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.416606 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:35:56.718742-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.425187 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:35:56.718744-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.718746-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.718748-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e kube-apiserver [d24fa1c9acf9] \u003c==\n"} +{"Time":"2023-05-31T12:35:56.718751-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* }. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T12:35:56.718753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:43.694915 1 logging.go:59] [core] [Channel #67 SubChannel #68] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T12:35:56.718756-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T12:35:56.718758-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:56.718761-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Attributes\": null,\n"} +{"Time":"2023-05-31T12:35:56.718764-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T12:35:56.718768-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Type\": 0,\n"} +{"Time":"2023-05-31T12:35:56.718771-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Metadata\": null\n"} +{"Time":"2023-05-31T12:35:56.718774-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t}. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T12:35:56.718782-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:43.695478 1 logging.go:59] [core] [Channel #46 SubChannel #47] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T12:35:56.718786-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T12:35:56.71879-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:56.718793-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Attributes\": null,\n"} +{"Time":"2023-05-31T12:35:56.718796-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T12:35:56.718799-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Type\": 0,\n"} +{"Time":"2023-05-31T12:35:56.71897-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Metadata\": null\n"} +{"Time":"2023-05-31T12:35:56.718979-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t}. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T12:35:56.718985-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:43.695780 1 logging.go:59] [core] [Channel #55 SubChannel #56] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T12:35:56.718992-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T12:35:56.718998-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:35:56.719-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Attributes\": null,\n"} +{"Time":"2023-05-31T12:35:56.719003-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T12:35:56.719005-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Type\": 0,\n"} +{"Time":"2023-05-31T12:35:56.719007-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \"Metadata\": null\n"} +{"Time":"2023-05-31T12:35:56.719009-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t}. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T12:35:56.719011-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.719013-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.719015-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e kube-controller-manager [48a5c1a17491] \u003c==\n"} +{"Time":"2023-05-31T12:35:56.719017-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* I0531 19:35:47.425122 1 serving.go:348] Generated self-signed cert in-memory\n"} +{"Time":"2023-05-31T12:35:56.71902-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:47.817540 1 controllermanager.go:187] \"Starting\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:35:56.719022-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:47.817585 1 controllermanager.go:189] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:35:56.719024-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:47.818742 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:35:56.719027-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:47.818765 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:35:56.719029-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:47.820021 1 secure_serving.go:210] Serving securely on 127.0.0.1:10257\n"} +{"Time":"2023-05-31T12:35:56.719032-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:47.820410 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:35:56.719034-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.711615 1 shared_informer.go:311] Waiting for caches to sync for tokens\n"} +{"Time":"2023-05-31T12:35:56.719036-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.719636 1 controllermanager.go:638] \"Started controller\" controller=\"ttl-after-finished\"\n"} +{"Time":"2023-05-31T12:35:56.719272-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.719693 1 ttlafterfinished_controller.go:109] \"Starting TTL after finished controller\"\n"} +{"Time":"2023-05-31T12:35:56.719278-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.719802 1 shared_informer.go:311] Waiting for caches to sync for TTL after finished\n"} +{"Time":"2023-05-31T12:35:56.71928-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.721590 1 controllermanager.go:638] \"Started controller\" controller=\"endpointslice\"\n"} +{"Time":"2023-05-31T12:35:56.719283-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.721867 1 endpointslice_controller.go:252] Starting endpoint slice controller\n"} +{"Time":"2023-05-31T12:35:56.719285-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.721903 1 shared_informer.go:311] Waiting for caches to sync for endpoint_slice\n"} +{"Time":"2023-05-31T12:35:56.719287-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.723886 1 controllermanager.go:638] \"Started controller\" controller=\"podgc\"\n"} +{"Time":"2023-05-31T12:35:56.719289-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.723933 1 gc_controller.go:103] Starting GC controller\n"} +{"Time":"2023-05-31T12:35:56.719293-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.723941 1 shared_informer.go:311] Waiting for caches to sync for GC\n"} +{"Time":"2023-05-31T12:35:56.719296-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.731079 1 controllermanager.go:638] \"Started controller\" controller=\"ttl\"\n"} +{"Time":"2023-05-31T12:35:56.719298-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.731265 1 ttl_controller.go:124] \"Starting TTL controller\"\n"} +{"Time":"2023-05-31T12:35:56.719304-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.731282 1 shared_informer.go:311] Waiting for caches to sync for TTL\n"} +{"Time":"2023-05-31T12:35:56.719306-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:51.811877 1 shared_informer.go:318] Caches are synced for tokens\n"} +{"Time":"2023-05-31T12:35:56.719309-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.719311-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.719314-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e kube-controller-manager [e9465fe3c0ae] \u003c==\n"} +{"Time":"2023-05-31T12:35:56.719317-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* I0531 19:35:40.035317 1 serving.go:348] Generated self-signed cert in-memory\n"} +{"Time":"2023-05-31T12:35:56.719319-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:40.690799 1 controllermanager.go:187] \"Starting\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:35:56.719321-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:40.690843 1 controllermanager.go:189] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:35:56.719324-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:40.692200 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:35:56.719576-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:40.692223 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:35:56.719585-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:40.693211 1 secure_serving.go:210] Serving securely on 127.0.0.1:10257\n"} +{"Time":"2023-05-31T12:35:56.719589-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:40.693498 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:35:56.719593-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.719596-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.719599-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e kube-scheduler [6bc30c4c9eb7] \u003c==\n"} +{"Time":"2023-05-31T12:35:56.719603-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* I0531 19:35:40.103298 1 serving.go:348] Generated self-signed cert in-memory\n"} +{"Time":"2023-05-31T12:35:56.719608-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:42.075740 1 requestheader_controller.go:193] Unable to get configmap/extension-apiserver-authentication in kube-system. Usually fixed by 'kubectl create rolebinding -n kube-system ROLEBINDING_NAME --role=extension-apiserver-authentication-reader --serviceaccount=YOUR_NS:YOUR_SA'\n"} +{"Time":"2023-05-31T12:35:56.719612-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:42.075868 1 authentication.go:368] Error looking up in-cluster authentication configuration: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T12:35:56.719617-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:42.075878 1 authentication.go:369] Continuing without authentication configuration. This may treat all requests as anonymous.\n"} +{"Time":"2023-05-31T12:35:56.719621-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:42.075887 1 authentication.go:370] To require authentication configuration lookup to succeed, set --authentication-tolerate-lookup-failure=false\n"} +{"Time":"2023-05-31T12:35:56.719624-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:42.104123 1 server.go:154] \"Starting Kubernetes Scheduler\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:35:56.719628-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:42.104319 1 server.go:156] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:35:56.719632-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:42.106577 1 configmap_cafile_content.go:202] \"Starting controller\" name=\"client-ca::kube-system::extension-apiserver-authentication::client-ca-file\"\n"} +{"Time":"2023-05-31T12:35:56.719636-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:42.113494 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T12:35:56.71964-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:42.112178 1 secure_serving.go:210] Serving securely on 127.0.0.1:10259\n"} +{"Time":"2023-05-31T12:35:56.719644-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:42.112195 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:35:56.719708-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:42.214236 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T12:35:56.719715-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:43.637649 1 secure_serving.go:255] Stopped listening on 127.0.0.1:10259\n"} +{"Time":"2023-05-31T12:35:56.719719-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tE0531 19:35:43.637796 1 scheduling_queue.go:1135] \"Error while retrieving next pod from scheduling queue\" err=\"scheduling queue is closed\"\n"} +{"Time":"2023-05-31T12:35:56.719723-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tE0531 19:35:43.638052 1 run.go:74] \"command failed\" err=\"finished without leader elect\"\n"} +{"Time":"2023-05-31T12:35:56.719727-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.71973-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.719733-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e kube-scheduler [99c4bd37cfbe] \u003c==\n"} +{"Time":"2023-05-31T12:35:56.719736-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* I0531 19:35:47.950885 1 serving.go:348] Generated self-signed cert in-memory\n"} +{"Time":"2023-05-31T12:35:56.719741-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:49.704478 1 requestheader_controller.go:193] Unable to get configmap/extension-apiserver-authentication in kube-system. Usually fixed by 'kubectl create rolebinding -n kube-system ROLEBINDING_NAME --role=extension-apiserver-authentication-reader --serviceaccount=YOUR_NS:YOUR_SA'\n"} +{"Time":"2023-05-31T12:35:56.719745-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:49.704555 1 authentication.go:368] Error looking up in-cluster authentication configuration: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T12:35:56.719749-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:49.704633 1 authentication.go:369] Continuing without authentication configuration. This may treat all requests as anonymous.\n"} +{"Time":"2023-05-31T12:35:56.719753-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 19:35:49.704641 1 authentication.go:370] To require authentication configuration lookup to succeed, set --authentication-tolerate-lookup-failure=false\n"} +{"Time":"2023-05-31T12:35:56.71976-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.721091 1 server.go:154] \"Starting Kubernetes Scheduler\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:35:56.719764-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.721143 1 server.go:156] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:35:56.719768-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.722230 1 configmap_cafile_content.go:202] \"Starting controller\" name=\"client-ca::kube-system::extension-apiserver-authentication::client-ca-file\"\n"} +{"Time":"2023-05-31T12:35:56.719772-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.722281 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T12:35:56.719866-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.722528 1 secure_serving.go:210] Serving securely on 127.0.0.1:10259\n"} +{"Time":"2023-05-31T12:35:56.71987-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.722569 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:35:56.719872-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 19:35:49.822828 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T12:35:56.719874-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.719877-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:35:56.719879-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* ==\u003e kubelet \u003c==\n"} +{"Time":"2023-05-31T12:35:56.719882-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* May 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.394840 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/8ea1b607420958325acfe6c6c5dcf6c0-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-kubernetes-upgrade-496000\\\" (UID: \\\"8ea1b607420958325acfe6c6c5dcf6c0\\\") \" pod=\"kube-system/kube-controller-manager-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.719885-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.394933 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/f89299ec3ff60aa52f6df7899e7b7246-kubeconfig\\\") pod \\\"kube-scheduler-kubernetes-upgrade-496000\\\" (UID: \\\"f89299ec3ff60aa52f6df7899e7b7246\\\") \" pod=\"kube-system/kube-scheduler-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.719888-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.394966 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/27eed2298b47fd24cc5f8b217623490c-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-kubernetes-upgrade-496000\\\" (UID: \\\"27eed2298b47fd24cc5f8b217623490c\\\") \" pod=\"kube-system/kube-apiserver-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.719891-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.394982 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/27eed2298b47fd24cc5f8b217623490c-ca-certs\\\") pod \\\"kube-apiserver-kubernetes-upgrade-496000\\\" (UID: \\\"27eed2298b47fd24cc5f8b217623490c\\\") \" pod=\"kube-system/kube-apiserver-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.719899-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.395014 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/27eed2298b47fd24cc5f8b217623490c-k8s-certs\\\") pod \\\"kube-apiserver-kubernetes-upgrade-496000\\\" (UID: \\\"27eed2298b47fd24cc5f8b217623490c\\\") \" pod=\"kube-system/kube-apiserver-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720086-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.395034 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/27eed2298b47fd24cc5f8b217623490c-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-kubernetes-upgrade-496000\\\" (UID: \\\"27eed2298b47fd24cc5f8b217623490c\\\") \" pod=\"kube-system/kube-apiserver-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720095-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.395049 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/8ea1b607420958325acfe6c6c5dcf6c0-flexvolume-dir\\\") pod \\\"kube-controller-manager-kubernetes-upgrade-496000\\\" (UID: \\\"8ea1b607420958325acfe6c6c5dcf6c0\\\") \" pod=\"kube-system/kube-controller-manager-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720105-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.395069 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/585ed66a20776c292e6b9be8c5307c4c-etcd-certs\\\") pod \\\"etcd-kubernetes-upgrade-496000\\\" (UID: \\\"585ed66a20776c292e6b9be8c5307c4c\\\") \" pod=\"kube-system/etcd-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720111-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.395098 13454 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/585ed66a20776c292e6b9be8c5307c4c-etcd-data\\\") pod \\\"etcd-kubernetes-upgrade-496000\\\" (UID: \\\"585ed66a20776c292e6b9be8c5307c4c\\\") \" pod=\"kube-system/etcd-kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720116-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.423894 13454 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.72012-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: E0531 19:35:46.424223 13454 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" node=\"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720125-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.583824 13454 scope.go:115] \"RemoveContainer\" containerID=\"e77b8f6cca9c648f9512c1b0e9390d9d1e6946cb8c73126b2dc594a08ee09a82\"\n"} +{"Time":"2023-05-31T12:35:56.720141-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.594992 13454 scope.go:115] \"RemoveContainer\" containerID=\"d24fa1c9acf9dcd2174e22188fd0fbd7ae00b3a12ca1be9bf8a96f1192a67f16\"\n"} +{"Time":"2023-05-31T12:35:56.720148-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.603548 13454 scope.go:115] \"RemoveContainer\" containerID=\"e9465fe3c0aecdef526da22eb1bee025633cb1ba1528f2da4d6630d28465581c\"\n"} +{"Time":"2023-05-31T12:35:56.720386-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: E0531 19:35:46.697321 13454 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kubernetes-upgrade-496000?timeout=10s\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" interval=\"800ms\"\n"} +{"Time":"2023-05-31T12:35:56.720394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:46.885095 13454 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.7204-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:46 kubernetes-upgrade-496000 kubelet[13454]: E0531 19:35:46.885673 13454 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" node=\"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720408-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:47 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:47.246451 13454 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"5eb7be9c96c3d8f3356df2e785f1e2cd0172769e6801113b7ed2ff217435740c\"\n"} +{"Time":"2023-05-31T12:35:56.720418-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:47 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:47.285196 13454 scope.go:115] \"RemoveContainer\" containerID=\"6bc30c4c9eb7f76a589f7b6f978a2b9985c6be58b3d2dcceb262312660cdf6d1\"\n"} +{"Time":"2023-05-31T12:35:56.720425-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:47 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:47.697118 13454 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720431-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:49 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:49.802964 13454 kubelet_node_status.go:108] \"Node was previously registered\" node=\"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720434-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:49 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:49.803074 13454 kubelet_node_status.go:73] \"Successfully registered node\" node=\"kubernetes-upgrade-496000\"\n"} +{"Time":"2023-05-31T12:35:56.720438-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:50 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:50.084603 13454 apiserver.go:52] \"Watching apiserver\"\n"} +{"Time":"2023-05-31T12:35:56.720441-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:50 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:50.101752 13454 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\n"} +{"Time":"2023-05-31T12:35:56.720445-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tMay 31 19:35:50 kubernetes-upgrade-496000 kubelet[13454]: I0531 19:35:50.116913 13454 reconciler.go:41] \"Reconciler: start to sync state\"\n"} +{"Time":"2023-05-31T12:35:56.720449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:35:56.720747-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:35:56.720754-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:35:56.720758-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:254: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p kubernetes-upgrade-496000 -n kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:35:57.122616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:261: (dbg) Run: kubectl --context kubernetes-upgrade-496000 get po -o=jsonpath={.items[*].metadata.name} -A --field-selector=status.phase!=Running\n"} +{"Time":"2023-05-31T12:35:57.199523-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:272: non-running pods: storage-provisioner\n"} +{"Time":"2023-05-31T12:35:57.199539-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:274: ======\u003e post-mortem[TestKubernetesUpgrade]: describe non-running pods \u003c======\n"} +{"Time":"2023-05-31T12:35:57.1996-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:277: (dbg) Run: kubectl --context kubernetes-upgrade-496000 describe pod storage-provisioner\n"} +{"Time":"2023-05-31T12:35:57.253801-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:277: (dbg) Non-zero exit: kubectl --context kubernetes-upgrade-496000 describe pod storage-provisioner: exit status 1 (54.064281ms)\n"} +{"Time":"2023-05-31T12:35:57.253823-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:35:57.253831-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:35:57.253836-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tError from server (NotFound): pods \"storage-provisioner\" not found\n"} +{"Time":"2023-05-31T12:35:57.25384-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:35:57.253844-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:35:57.253853-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:279: kubectl --context kubernetes-upgrade-496000 describe pod storage-provisioner: exit status 1\n"} +{"Time":"2023-05-31T12:35:57.253857-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:175: Cleaning up \"kubernetes-upgrade-496000\" profile ...\n"} +{"Time":"2023-05-31T12:35:57.25386-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p kubernetes-upgrade-496000\n"} +{"Time":"2023-05-31T12:36:00.015247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p kubernetes-upgrade-496000: (2.761251053s)\n"} +{"Time":"2023-05-31T12:36:00.015275-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"--- FAIL: TestKubernetesUpgrade (582.62s)\n"} +{"Time":"2023-05-31T12:36:00.015286-07:00","Action":"fail","Test":"TestKubernetesUpgrade","Elapsed":582.62} +{"Time":"2023-05-31T12:36:00.015295-07:00","Action":"cont","Test":"TestNetworkPlugins/group/false"} +{"Time":"2023-05-31T12:36:00.0153-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"=== CONT TestNetworkPlugins/group/false\n"} +{"Time":"2023-05-31T12:36:00.015306-07:00","Action":"run","Test":"TestNetworkPlugins/group/false/Start"} +{"Time":"2023-05-31T12:36:00.015309-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":"=== RUN TestNetworkPlugins/group/false/Start\n"} +{"Time":"2023-05-31T12:36:00.015369-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p false-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=false --driver=docker \n"} +{"Time":"2023-05-31T12:36:02.826918-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":"E0531 12:36:02.826878 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:30.422233-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p custom-flannel-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=testdata/kube-flannel.yaml --driver=docker : (57.935732199s)\n"} +{"Time":"2023-05-31T12:36:30.422259-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags"} +{"Time":"2023-05-31T12:36:30.422267-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/KubeletFlags\n"} +{"Time":"2023-05-31T12:36:30.422297-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p custom-flannel-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:36:30.784538-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod"} +{"Time":"2023-05-31T12:36:30.784548-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/NetCatPod\n"} +{"Time":"2023-05-31T12:36:30.784603-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context custom-flannel-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:36:31.013542-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/custom-flannel/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:36:31.018124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-2tln8\" [341c63d3-54e7-440b-ab97-bf98f67ef93d] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:36:31.104021-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:31.103980 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:31.109872-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:31.109849 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:31.120326-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:31.120306 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:31.142511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:31.142412 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:31.182649-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:31.182619 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:31.264163-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:31.264132 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:31.424429-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:31.424398 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:31.744612-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:31.744568 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:32.384697-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:32.384668 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:33.66497-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:33.664940 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:36.225183-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:36.225152 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:38.021897-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-2tln8\" [341c63d3-54e7-440b-ab97-bf98f67ef93d] Running\n"} +{"Time":"2023-05-31T12:36:41.345329-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"E0531 12:36:41.345301 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:41.819803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p false-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=false --driver=docker : (41.804034867s)\n"} +{"Time":"2023-05-31T12:36:41.819869-07:00","Action":"run","Test":"TestNetworkPlugins/group/false/KubeletFlags"} +{"Time":"2023-05-31T12:36:41.819876-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/false/KubeletFlags\n"} +{"Time":"2023-05-31T12:36:41.819884-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p false-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:36:42.180303-07:00","Action":"run","Test":"TestNetworkPlugins/group/false/NetCatPod"} +{"Time":"2023-05-31T12:36:42.180315-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/false/NetCatPod\n"} +{"Time":"2023-05-31T12:36:42.180356-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context false-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:36:42.413492-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/false/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:36:42.417798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-l74g9\" [882062cf-0d8f-4f86-8d58-0fd64d070935] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:36:43.022309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/custom-flannel/NetCatPod: app=netcat healthy within 12.008711483s\n"} +{"Time":"2023-05-31T12:36:43.022328-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/DNS"} +{"Time":"2023-05-31T12:36:43.022331-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/DNS","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/DNS\n"} +{"Time":"2023-05-31T12:36:43.022438-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context custom-flannel-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:36:43.154073-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/Localhost"} +{"Time":"2023-05-31T12:36:43.154087-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Localhost","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/Localhost\n"} +{"Time":"2023-05-31T12:36:43.154222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context custom-flannel-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:36:43.278283-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/HairPin"} +{"Time":"2023-05-31T12:36:43.278295-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/HairPin","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/HairPin\n"} +{"Time":"2023-05-31T12:36:43.278453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context custom-flannel-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:36:43.3929-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net_test.go:209: \"custom-flannel\" test finished in 15m13.591292028s, failed=false\n"} +{"Time":"2023-05-31T12:36:49.42153-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-l74g9\" [882062cf-0d8f-4f86-8d58-0fd64d070935] Running\n"} +{"Time":"2023-05-31T12:36:51.585732-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/NetCatPod","Output":"E0531 12:36:51.585669 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:36:54.423619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/false/NetCatPod: app=netcat healthy within 12.010007075s\n"} +{"Time":"2023-05-31T12:36:54.423715-07:00","Action":"run","Test":"TestNetworkPlugins/group/false/DNS"} +{"Time":"2023-05-31T12:36:54.423723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/DNS","Output":"=== RUN TestNetworkPlugins/group/false/DNS\n"} +{"Time":"2023-05-31T12:36:54.423735-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context false-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:36:54.589367-07:00","Action":"run","Test":"TestNetworkPlugins/group/false/Localhost"} +{"Time":"2023-05-31T12:36:54.589384-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Localhost","Output":"=== RUN TestNetworkPlugins/group/false/Localhost\n"} +{"Time":"2023-05-31T12:36:54.589544-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context false-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:36:54.720654-07:00","Action":"run","Test":"TestNetworkPlugins/group/false/HairPin"} +{"Time":"2023-05-31T12:36:54.720674-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/HairPin","Output":"=== RUN TestNetworkPlugins/group/false/HairPin\n"} +{"Time":"2023-05-31T12:36:54.720842-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context false-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:36:54.850133-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" net_test.go:209: \"false\" test finished in 15m25.048576407s, failed=false\n"} +{"Time":"2023-05-31T12:37:03.693621-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:37:03.693634-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ----------------------- debugLogs start: custom-flannel-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:37:03.69364-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:37:03.693642-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:37:03.693644-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:37:03.693646-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693679-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:37:03.693684-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:37:03.693688-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.69369-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693693-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693696-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:37:03.693699-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:37:03.693705-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693708-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.69371-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:37:03.693713-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:37:03.693716-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693718-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693721-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:37:03.693724-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:37:03.693728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:37:03.693731-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693734-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693737-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:37:03.693743-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:37:03.693749-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:37:03.693752-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:37:03.693756-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:37:03.693759-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:37:03.693766-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:37:03.693772-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:37:03.69378-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 10.244.0.3\tnetcat-7458db8b8-2tln8\n"} +{"Time":"2023-05-31T12:37:03.693786-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.69379-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693793-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:37:03.693796-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:37:03.693798-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:37:03.6938-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:37:03.693802-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693804-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693806-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:37:03.693808-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:37:03.69381-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.693812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:37:03.693814-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:37:03.693817-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:37:03.693819-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.693821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:37:03.693823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:37:03.693825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:37:03.693827-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:37:03.693829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.693831-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:37:03.693833-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:37:03.693835-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.693837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:37:03.693839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:37:03.693841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:37:03.693844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:37:03.693846-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.693848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:37:03.693852-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693854-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693856-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:37:03.693858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:37:03.69386-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:37:03.693863-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:37:03.693865-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:37:03.693867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:37:03.693869-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:37:03.693871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.76.2\tcustom-flannel-996000\r\n"} +{"Time":"2023-05-31T12:37:03.693873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:37:03.693875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.76.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:37:03.693877-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693879-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:37:03.693883-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:37:03.693885-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:37:03.693887-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693888-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.69389-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:37:03.693893-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:37:03.693895-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node/custom-flannel-996000 Ready control-plane 56s v1.27.2 192.168.76.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:37:03.693897-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693899-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:37:03.693902-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 53s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default service/netcat ClusterIP 10.108.196.201 \u003cnone\u003e 8080/TCP 20s app=netcat\n"} +{"Time":"2023-05-31T12:37:03.693906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 52s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:03.693908-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.69391-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:37:03.693913-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default endpoints/kubernetes 192.168.76.2:8443 53s\n"} +{"Time":"2023-05-31T12:37:03.693915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default endpoints/netcat 10.244.0.3:8080 20s\n"} +{"Time":"2023-05-31T12:37:03.693917-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 38s\n"} +{"Time":"2023-05-31T12:37:03.693919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 40s\n"} +{"Time":"2023-05-31T12:37:03.693921-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693924-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:37:03.693926-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-flannel daemonset.apps/kube-flannel-ds 1 1 1 1 1 \u003cnone\u003e 50s kube-flannel docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2 app=flannel\n"} +{"Time":"2023-05-31T12:37:03.693929-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 52s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.693931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693933-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:37:03.693937-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default deployment.apps/netcat 1/1 1 1 20s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:37:03.693942-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system deployment.apps/coredns 1/1 1 1 52s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:03.693948-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693952-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:37:03.693957-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default pod/netcat-7458db8b8-2tln8 1/1 Running 0 20s 10.244.0.3 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693961-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-flannel pod/kube-flannel-ds-pq6l8 1/1 Running 0 39s 192.168.76.2 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693964-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/coredns-5d78c9869d-7k25p 1/1 Running 1 (23s ago) 39s 10.244.0.2 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/etcd-custom-flannel-996000 1/1 Running 0 54s 192.168.76.2 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693971-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/kube-apiserver-custom-flannel-996000 1/1 Running 0 51s 192.168.76.2 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693977-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/kube-controller-manager-custom-flannel-996000 1/1 Running 0 51s 192.168.76.2 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693983-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/kube-proxy-65z59 1/1 Running 0 39s 192.168.76.2 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693987-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/kube-scheduler-custom-flannel-996000 1/1 Running 0 53s 192.168.76.2 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693989-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/storage-provisioner 1/1 Running 0 38s 192.168.76.2 custom-flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.693992-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693994-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.693995-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:37:03.693998-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:37:03.694001-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ce929e72f350d 19 seconds ago Ready netcat-7458db8b8-2tln8 default 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694005-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 73d0db0ce4e66 23 seconds ago Ready coredns-5d78c9869d-7k25p kube-system 1 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694008-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0799ce9e0f1f7 37 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.69401-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 97ca01e881480 38 seconds ago NotReady coredns-5d78c9869d-7k25p kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694012-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 717b36588e3b2 38 seconds ago NotReady coredns-5d78c9869d-cqczh kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694015-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 5c426dd2aa527 39 seconds ago Ready kube-flannel-ds-pq6l8 kube-flannel 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694017-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 5e0cc18ec958c 39 seconds ago Ready kube-proxy-65z59 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694019-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bee8466eb593c 59 seconds ago Ready kube-apiserver-custom-flannel-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694023-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7694d4aa0f88a 59 seconds ago Ready etcd-custom-flannel-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694025-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" eec8e9823ec35 59 seconds ago Ready kube-scheduler-custom-flannel-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.694027-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cb0a582609fa1 59 seconds ago Ready kube-controller-manager-custom-flannel-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:03.69403-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694032-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694034-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:37:03.694036-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:37:03.69404-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 5ae09fb09d04a registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 15 seconds ago Running dnsutils 0 ce929e72f350d netcat-7458db8b8-2tln8\r\n"} +{"Time":"2023-05-31T12:37:03.694044-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 89648078b56f1 ead0a4a53df89 24 seconds ago Running coredns 1 73d0db0ce4e66 coredns-5d78c9869d-7k25p\r\n"} +{"Time":"2023-05-31T12:37:03.694046-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 28e4fc43b34ae b5c6c9203f83e 32 seconds ago Running kube-flannel 0 5c426dd2aa527 kube-flannel-ds-pq6l8\r\n"} +{"Time":"2023-05-31T12:37:03.694048-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 2cfc6e66c5ef8 rancher/mirrored-flannelcni-flannel@sha256:ec0f0b7430c8370c9f33fe76eb0392c1ad2ddf4ccaf2b9f43995cca6c94d3832 33 seconds ago Exited install-cni 0 5c426dd2aa527 kube-flannel-ds-pq6l8\r\n"} +{"Time":"2023-05-31T12:37:03.694051-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 5bc3184181039 rancher/mirrored-flannelcni-flannel-cni-plugin@sha256:28d3a6be9f450282bf42e4dad143d41da23e3d91f66f19c01ee7fd21fd17cb2b 37 seconds ago Exited install-cni-plugin 0 5c426dd2aa527 kube-flannel-ds-pq6l8\r\n"} +{"Time":"2023-05-31T12:37:03.694053-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 602affe758e3d 6e38f40d628db 38 seconds ago Running storage-provisioner 0 0799ce9e0f1f7 storage-provisioner\r\n"} +{"Time":"2023-05-31T12:37:03.694056-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 3fc85d246994e ead0a4a53df89 39 seconds ago Exited coredns 0 97ca01e881480 coredns-5d78c9869d-7k25p\r\n"} +{"Time":"2023-05-31T12:37:03.694058-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 65cacc7b28f63 b8aa50768fd67 39 seconds ago Running kube-proxy 0 5e0cc18ec958c kube-proxy-65z59\r\n"} +{"Time":"2023-05-31T12:37:03.694061-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" db2ff2f62611e 89e70da428d29 59 seconds ago Running kube-scheduler 0 eec8e9823ec35 kube-scheduler-custom-flannel-996000\r\n"} +{"Time":"2023-05-31T12:37:03.694064-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bb2d4b9f03d1c c5b13e4f7806d 59 seconds ago Running kube-apiserver 0 bee8466eb593c kube-apiserver-custom-flannel-996000\r\n"} +{"Time":"2023-05-31T12:37:03.694067-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 108956334e985 86b6af7dd652c 59 seconds ago Running etcd 0 7694d4aa0f88a etcd-custom-flannel-996000\r\n"} +{"Time":"2023-05-31T12:37:03.69407-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" e7a5ed10b97af ac2b7465ebba9 59 seconds ago Running kube-controller-manager 0 cb0a582609fa1 kube-controller-manager-custom-flannel-996000\r\n"} +{"Time":"2023-05-31T12:37:03.694072-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694074-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694076-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:37:03.694078-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:37:03.694081-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:37:03.694084-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CreationTimestamp: Wed, 31 May 2023 12:36:30 -0700\n"} +{"Time":"2023-05-31T12:37:03.694088-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:37:03.694091-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:37:03.694094-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:37:03.694097-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:37:03.694101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:37:03.694104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:37:03.694108-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:37:03.694111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:37:03.694114-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:37:03.694117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.69412-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:37:03.694124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:37:03.694128-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694131-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694134-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.694136-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:37:03.694138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -c\n"} +{"Time":"2023-05-31T12:37:03.69414-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:37:03.694142-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694144-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694146-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694148-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:03.69415-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:37:03.694152-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:37:03.694154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:37:03.694157-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:37:03.69416-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694163-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:37:03.694166-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:03.694168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:03.69417-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:03.694173-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal ScalingReplicaSet 21s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:37:03.694176-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694178-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.69418-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:37:03.694182-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: netcat-7458db8b8-2tln8\n"} +{"Time":"2023-05-31T12:37:03.694184-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:37:03.694186-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:37:03.694188-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:37:03.69419-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.694193-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 12:36:30 -0700\n"} +{"Time":"2023-05-31T12:37:03.694195-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:37:03.694198-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:37:03.6942-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694202-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:03.694204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:37:03.694206-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:03.694207-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:37:03.694209-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:37:03.694211-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.694213-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:37:03.694215-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: docker://5ae09fb09d04a86b3ffe97139e7c457bd16130d9b4d26a7bea2e82fb690bd195\n"} +{"Time":"2023-05-31T12:37:03.694218-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:37:03.69422-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:37:03.694222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694224-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694226-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.694228-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:37:03.69423-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -c\n"} +{"Time":"2023-05-31T12:37:03.694232-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:37:03.694234-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:03.694236-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 12:36:36 -0700\n"} +{"Time":"2023-05-31T12:37:03.694238-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:03.69424-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:03.694242-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694244-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.694246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-nmk5d (ro)\n"} +{"Time":"2023-05-31T12:37:03.694248-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:03.694249-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:03.694251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:03.694254-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:03.694256-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:03.694258-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:03.694261-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:03.694263-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-api-access-nmk5d:\n"} +{"Time":"2023-05-31T12:37:03.694265-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:37:03.694267-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:37:03.694269-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.694271-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:37:03.694273-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:37:03.694275-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:37:03.694277-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694279-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:37:03.694281-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:37:03.694283-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:03.694285-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:03.694287-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:03.694289-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Scheduled 21s default-scheduler Successfully assigned default/netcat-7458db8b8-2tln8 to custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.694292-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulling 20s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:37:03.694294-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 15s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.223886242s (5.223891501s including waiting)\n"} +{"Time":"2023-05-31T12:37:03.694296-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 15s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:37:03.694298-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 15s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:37:03.6943-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694302-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694304-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:37:03.694306-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694308-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694311-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:37:03.694313-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:37:03.694315-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.694317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CreationTimestamp: Wed, 31 May 2023 12:35:58 -0700\n"} +{"Time":"2023-05-31T12:37:03.694319-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:03.694321-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:37:03.694323-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:03.694326-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:37:03.694328-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:37:03.69433-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:37:03.694332-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:37:03.694334-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:37:03.694337-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:03.69434-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:37:03.694343-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.694346-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" coredns:\n"} +{"Time":"2023-05-31T12:37:03.694349-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:37:03.694352-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:37:03.694357-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:37:03.694365-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:03.694372-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -conf\n"} +{"Time":"2023-05-31T12:37:03.69438-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:37:03.694387-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T12:37:03.694392-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:37:03.694398-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:37:03.694404-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:37:03.694407-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:37:03.69441-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:37:03.694416-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:37:03.694419-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694422-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.694425-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:37:03.694429-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:03.694432-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:37:03.694435-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:03.69444-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:37:03.694446-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:03.694452-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:37:03.69446-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:03.694466-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:37:03.69447-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:37:03.694473-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:37:03.694479-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:37:03.694487-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694495-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:37:03.6945-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:03.694504-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:03.694511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:03.694517-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal ScalingReplicaSet 40s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:37:03.69452-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal ScalingReplicaSet 40s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:37:03.694522-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694526-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:37:03.694528-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: coredns-5d78c9869d-7k25p\n"} +{"Time":"2023-05-31T12:37:03.69453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.694532-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:37:03.694534-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:37:03.694536-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:37:03.694538-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.69454-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 12:36:11 -0700\n"} +{"Time":"2023-05-31T12:37:03.694543-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:03.694545-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:37:03.694547-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.69455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:03.694552-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:37:03.694554-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:03.694555-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:37:03.694557-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:37:03.694559-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.694561-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" coredns:\n"} +{"Time":"2023-05-31T12:37:03.694563-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: docker://89648078b56f103423e71628c686f17e0d16e9b1f73ff89ab02a648c4f5a10df\n"} +{"Time":"2023-05-31T12:37:03.694565-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:37:03.694567-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:37:03.694569-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:37:03.694571-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:37:03.694573-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:03.694575-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -conf\n"} +{"Time":"2023-05-31T12:37:03.694577-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:37:03.694579-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:03.694581-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 12:36:27 -0700\n"} +{"Time":"2023-05-31T12:37:03.694583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Last State: Terminated\n"} +{"Time":"2023-05-31T12:37:03.694585-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:37:03.694587-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:37:03.694589-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 12:36:12 -0700\n"} +{"Time":"2023-05-31T12:37:03.694591-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Finished: Wed, 31 May 2023 12:36:27 -0700\n"} +{"Time":"2023-05-31T12:37:03.694593-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:03.694595-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 1\n"} +{"Time":"2023-05-31T12:37:03.694597-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T12:37:03.694599-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:37:03.6946-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:37:03.694602-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:37:03.694604-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:37:03.694606-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:37:03.694608-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:37:03.694611-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.694614-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.694617-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:37:03.69462-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-77hfb (ro)\n"} +{"Time":"2023-05-31T12:37:03.694624-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:03.694627-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:03.694641-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:03.694647-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:03.694649-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:03.694652-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:03.694654-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:03.694656-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:37:03.694658-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:03.69466-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:37:03.694662-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:03.694664-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-api-access-77hfb:\n"} +{"Time":"2023-05-31T12:37:03.694666-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:37:03.694668-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:37:03.69467-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.694674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:37:03.694677-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:37:03.69468-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:37:03.694683-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:37:03.694686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:37:03.694689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:37:03.694692-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:37:03.694694-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:37:03.694697-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:03.694699-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:03.694701-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:03.694704-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Scheduled 40s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-7k25p to custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.694706-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal SandboxChanged 38s kubelet Pod sandbox changed, it will be killed and re-created.\n"} +{"Time":"2023-05-31T12:37:03.694709-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Killing 38s kubelet Stopping container coredns\n"} +{"Time":"2023-05-31T12:37:03.694711-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Warning Unhealthy 29s (x2 over 38s) kubelet Readiness probe failed: Get \"http://:8181/ready\": dial tcp :8181: connect: connection refused\n"} +{"Time":"2023-05-31T12:37:03.694713-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 24s (x2 over 39s) kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:37:03.694717-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 24s (x2 over 39s) kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:37:03.694719-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 24s (x2 over 39s) kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:37:03.694721-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Warning Unhealthy 24s kubelet Readiness probe failed: HTTP probe failed with statuscode: 503\n"} +{"Time":"2023-05-31T12:37:03.694723-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694725-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694727-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:37:03.694729-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T12:37:03.694732-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" .:53\n"} +{"Time":"2023-05-31T12:37:03.694735-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] plugin/reload: Running configuration SHA512 = f869070685748660180df1b7a47d58cdafcf2f368266578c062d1151dc2c900964aecc5975e8882e6de6fdfb6460463e30ebfaad2ec8f0c3c6436f80225b3b5b\n"} +{"Time":"2023-05-31T12:37:03.694738-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:37:03.694741-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:37:03.69475-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 127.0.0.1:38927 - 30968 \"HINFO IN 4634902944539065555.3571395987063940778. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.012318106s\n"} +{"Time":"2023-05-31T12:37:03.694753-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:41898 - 11769 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000231965s\n"} +{"Time":"2023-05-31T12:37:03.694755-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:34039 - 54904 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000136103s\n"} +{"Time":"2023-05-31T12:37:03.694757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:48105 - 11629 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000211963s\n"} +{"Time":"2023-05-31T12:37:03.694759-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:59878 - 64726 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000141982s\n"} +{"Time":"2023-05-31T12:37:03.694762-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:59878 - 64576 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000182866s\n"} +{"Time":"2023-05-31T12:37:03.694767-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:60506 - 49148 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000293336s\n"} +{"Time":"2023-05-31T12:37:03.694771-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:51548 - 47798 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000144274s\n"} +{"Time":"2023-05-31T12:37:03.694774-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:35290 - 6958 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000070657s\n"} +{"Time":"2023-05-31T12:37:03.694777-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.694781-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:37:03.694783-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-apiserver-custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.694786-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.694789-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:37:03.694792-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:37:03.694795-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.694798-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 12:35:59 -0700\n"} +{"Time":"2023-05-31T12:37:03.694802-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:37:03.694805-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:37:03.694808-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.76.2:8443\n"} +{"Time":"2023-05-31T12:37:03.694812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/config.hash: 22647dc02b348c3a38c18438d29224c5\n"} +{"Time":"2023-05-31T12:37:03.694815-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/config.mirror: 22647dc02b348c3a38c18438d29224c5\n"} +{"Time":"2023-05-31T12:37:03.695052-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/config.seen: 2023-05-31T19:35:58.813635940Z\n"} +{"Time":"2023-05-31T12:37:03.695059-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:37:03.695063-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:03.695067-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.69507-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:03.695073-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.695077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: Node/custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.69508-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.695083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:37:03.695086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: docker://bb2d4b9f03d1c18fbf0d4df2103817a219d46005c5199cefd537777d2827ab9f\n"} +{"Time":"2023-05-31T12:37:03.69509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:37:03.695093-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:37:03.695095-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.695107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.695113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.695116-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:37:03.695118-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --advertise-address=192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.695122-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:37:03.695124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:37:03.695127-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:37:03.695131-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:37:03.695135-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:37:03.695138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:37:03.695322-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:37:03.695329-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:37:03.695333-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:37:03.695337-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:37:03.69534-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:37:03.695346-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:37:03.695348-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:37:03.69535-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:37:03.695353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:37:03.695355-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.695357-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:37:03.695359-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:37:03.695362-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:37:03.695365-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:37:03.69537-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:37:03.695377-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:37:03.695381-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:37:03.695384-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:37:03.695387-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:37:03.69539-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:37:03.695586-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:03.695596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 12:35:52 -0700\n"} +{"Time":"2023-05-31T12:37:03.695602-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:03.695609-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:03.695616-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:37:03.695622-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:37:03.695629-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Liveness: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:37:03.695634-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Readiness: http-get https://192.168.76.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:37:03.695638-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Startup: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:37:03.695643-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.695647-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.695651-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:37:03.695654-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:37:03.695659-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:37:03.695666-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:37:03.695669-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:37:03.695671-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:03.695673-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:03.695675-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:03.695677-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:03.695679-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:03.695681-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:03.695926-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:03.695931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:37:03.695933-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.695935-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:37:03.695939-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:03.695941-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:37:03.695944-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.695946-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:37:03.695948-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:03.69595-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:37:03.695952-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.695954-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:37:03.695956-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:03.695958-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:37:03.69596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.695962-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:37:03.695964-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:03.695965-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:37:03.695968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.69597-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:37:03.695972-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:03.695974-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:37:03.695976-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.695978-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:37:03.696078-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.696085-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.696088-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.696091-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:37:03.696095-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:52.483535 1 server.go:551] external host was not specified, using 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.696099-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:52.485456 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:37:03.696102-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:52.485531 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:37:03.696106-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.122649 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:37:03.696123-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.133349 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:37:03.696143-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.133398 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:37:03.69615-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.462313 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.462396 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696158-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.463629 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:37:03.696162-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.633434 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.633693 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:37:03.696169-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.895539 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:37:03.696303-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.917284 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696311-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.917640 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696321-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.917679 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696326-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.919340 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.69633-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.919386 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696346-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.921190 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696355-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.921797 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.69636-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.921834 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696363-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.921839 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696367-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.923854 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696371-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.923895 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696375-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.925800 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696379-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.925861 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696383-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.925868 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696387-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.927585 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.69639-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.927625 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696758-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.928845 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696765-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.929299 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696769-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.931905 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696772-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.931946 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696776-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.931951 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.933563 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696783-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.933614 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696786-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.933620 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.69679-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.935630 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696793-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.935668 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696797-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.938525 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696801-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.938583 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696804-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.938590 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696817-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.940280 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.696823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.940328 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.696827-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.940335 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697182-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.943440 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.697187-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.943496 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697189-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.943503 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697191-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.945905 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.697194-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.947003 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.697198-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.947042 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.6972-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.947051 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697202-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.952146 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.697205-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.952193 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697207-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.952199 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.69721-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.954358 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.697212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.954400 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697214-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.954405 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697219-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.956277 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.697222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.956322 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697227-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:53.965499 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:03.697724-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:53.965547 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:03.697743-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.442940 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:37:03.697747-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.442973 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:37:03.69775-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.443261 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:37:03.697754-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.443777 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:37:03.697757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.443838 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:37:03.69776-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.443908 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:37:03.697764-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.443961 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:37:03.697767-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444056 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:37:03.697769-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444181 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:37:03.697771-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444208 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:37:03.697774-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444258 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:37:03.697777-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444344 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:37:03.697779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444427 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:37:03.697781-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444480 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:37:03.697783-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444493 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:37:03.698163-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444682 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:37:03.69817-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444930 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:37:03.698177-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.444985 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:37:03.698185-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.445015 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:37:03.698191-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.445027 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:37:03.698198-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.445044 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:37:03.698204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.445061 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:37:03.698208-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.445489 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:37:03.698212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.445585 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:37:03.698218-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.446114 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:37:03.698226-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.446180 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:37:03.698231-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.448724 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:37:03.698235-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.448857 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:37:03.698239-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.485797 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:37:03.698243-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.489051 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:37:03.698247-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.487677 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:37:03.698251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.487686 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:37:03.698725-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.487692 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:37:03.698733-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.487697 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:37:03.698737-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.487702 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:37:03.698739-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.523445 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:37:03.698742-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.544302 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:37:03.698744-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.544460 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:37:03.698746-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.544627 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:37:03.698749-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.545240 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:37:03.698752-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.545365 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:37:03.698754-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.546074 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:37:03.698757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.546207 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:37:03.69876-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.546347 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:37:03.698762-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.549480 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:37:03.698764-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" E0531 19:35:54.632252 1 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"namespaces \\\"kube-system\\\" not found\" interval=\"200ms\"\n"} +{"Time":"2023-05-31T12:37:03.698769-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" E0531 19:35:54.632332 1 controller.go:150] while syncing ConfigMap \"kube-system/kube-apiserver-legacy-service-account-token-tracking\", err: namespaces \"kube-system\" not found\n"} +{"Time":"2023-05-31T12:37:03.698771-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:54.846990 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.699238-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:55.227445 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:37:03.699246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:55.488000 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:37:03.699251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:55.561415 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:37:03.699255-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:55.561484 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:37:03.699258-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:56.965911 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.699262-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:57.017618 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.699266-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:57.101893 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:37:03.69927-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:35:57.107364 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.76.2]\n"} +{"Time":"2023-05-31T12:37:03.699274-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:57.108214 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:37:03.699277-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:57.114368 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.69928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:57.511534 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:37:03.699282-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:58.686148 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:37:03.699284-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:58.694951 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:37:03.699287-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:35:58.707253 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:37:03.699289-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:11.165156 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:37:03.699291-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:11.287043 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:37:03.699293-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:30.987168 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.108.196.201]\n"} +{"Time":"2023-05-31T12:37:03.69974-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.699746-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.699749-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:37:03.699751-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:37:03.699754-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.699756-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:37:03.699758-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:37:03.69976-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:37:03.699762-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.699764-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T12:37:03.699767-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.69977-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:37:03.699773-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:37:03.699776-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:37:03.699779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.699782-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:37:03.699784-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:37:03.699786-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:37:03.699788-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:37:03.699791-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:37:03.699793-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:37:03.699795-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:37:03.699798-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:37:03.6998-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:37:03.700075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [\r\n"} +{"Time":"2023-05-31T12:37:03.700092-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.700096-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:37:03.700098-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T12:37:03.700101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700103-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:03.700105-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:03.700107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700109-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:03.700111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.700113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:37:03.700115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:37:03.700117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:37:03.70012-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700123-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:03.700125-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.700127-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:37:03.700129-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:03.700131-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.700133-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:37:03.700136-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:03.700139-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700141-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/10-flannel.conflist\r\n"} +{"Time":"2023-05-31T12:37:03.700143-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.700145-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"name\": \"cbr0\",\r\n"} +{"Time":"2023-05-31T12:37:03.700148-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:37:03.700397-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:37:03.700404-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.70041-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"flannel\",\r\n"} +{"Time":"2023-05-31T12:37:03.700414-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"delegate\": {\r\n"} +{"Time":"2023-05-31T12:37:03.700417-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:37:03.700421-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"isDefaultGateway\": true\r\n"} +{"Time":"2023-05-31T12:37:03.700424-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700428-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:03.700431-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.700435-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:37:03.700438-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:37:03.700442-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:37:03.700445-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700449-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700452-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:03.700455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700469-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/100-crio-bridge.conf.mk_disabled\r\n"} +{"Time":"2023-05-31T12:37:03.700472-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.700474-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:37:03.700476-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:37:03.700479-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:37:03.700481-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:37:03.700483-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:37:03.700485-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:37:03.700487-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:37:03.700489-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:37:03.700741-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:37:03.700746-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:37:03.700748-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" { \"dst\": \"0.0.0.0/0\" },\r\n"} +{"Time":"2023-05-31T12:37:03.70075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" { \"dst\": \"1100:200::1/24\" }\r\n"} +{"Time":"2023-05-31T12:37:03.700753-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ],\r\n"} +{"Time":"2023-05-31T12:37:03.700755-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:37:03.700757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [{ \"subnet\": \"10.85.0.0/16\" }],\r\n"} +{"Time":"2023-05-31T12:37:03.70076-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [{ \"subnet\": \"1100:200::/24\" }]\r\n"} +{"Time":"2023-05-31T12:37:03.700762-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:03.700764-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700766-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.700768-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.70077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.700772-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:37:03.700774-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:37:03.700777-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:37:03.700779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:37:03.700781-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:03.700785-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 2: tunl0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:37:03.700787-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:37:03.700789-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:37:03.700791-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/tunnel6 :: brd :: permaddr 8a05:8f3a:e164::\r\n"} +{"Time":"2023-05-31T12:37:03.700793-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:37:03.700796-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 02:42:b7:ea:fb:da brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:37:03.700938-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:37:03.700945-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:03.700949-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 5: flannel.1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65485 qdisc noqueue state UNKNOWN group default \r\n"} +{"Time":"2023-05-31T12:37:03.700953-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether e2:61:cd:72:d6:9e brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:37:03.700956-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 10.244.0.0/32 scope global flannel.1\r\n"} +{"Time":"2023-05-31T12:37:03.70096-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:03.700963-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 6: cni0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65485 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:37:03.700984-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 4a:ab:81:6a:a3:5e brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:37:03.700991-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 10.244.0.1/24 brd 10.244.0.255 scope global cni0\r\n"} +{"Time":"2023-05-31T12:37:03.700995-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:03.700998-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7: vethdd9a07f5@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65485 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T12:37:03.701001-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether b2:39:cd:cb:47:ca brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:37:03.701004-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 8: veth83a89deb@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65485 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T12:37:03.701006-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 56:7b:f5:ce:2b:cb brd ff:ff:ff:ff:ff:ff link-netnsid 2\r\n"} +{"Time":"2023-05-31T12:37:03.701008-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 297: eth0@if298: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:37:03.70101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 02:42:c0:a8:4c:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:37:03.701012-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 192.168.76.2/24 brd 192.168.76.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:37:03.701014-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:03.70103-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.701204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.701212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:37:03.701219-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default via 192.168.76.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:37:03.701222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 10.244.0.0/24 dev cni0 proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T12:37:03.701234-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:37:03.701242-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.76.0/24 dev eth0 proto kernel scope link src 192.168.76.2 \r\n"} +{"Time":"2023-05-31T12:37:03.701246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.701249-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.701253-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:37:03.701256-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:36:53 2023\r\n"} +{"Time":"2023-05-31T12:37:03.701259-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:37:03.701262-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :PREROUTING ACCEPT [18029:80776541]\r\n"} +{"Time":"2023-05-31T12:37:03.701264-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :INPUT ACCEPT [17994:80773743]\r\n"} +{"Time":"2023-05-31T12:37:03.701266-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :FORWARD ACCEPT [35:2798]\r\n"} +{"Time":"2023-05-31T12:37:03.701268-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :OUTPUT ACCEPT [16416:5647210]\r\n"} +{"Time":"2023-05-31T12:37:03.701272-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :POSTROUTING ACCEPT [16451:5650008]\r\n"} +{"Time":"2023-05-31T12:37:03.701274-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701277-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.70128-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701284-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:37:03.701288-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Completed on Wed May 31 19:36:53 2023\r\n"} +{"Time":"2023-05-31T12:37:03.701291-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:36:53 2023\r\n"} +{"Time":"2023-05-31T12:37:03.701295-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:37:03.701307-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :INPUT ACCEPT [5382:1246585]\r\n"} +{"Time":"2023-05-31T12:37:03.701314-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :FORWARD ACCEPT [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701545-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :OUTPUT ACCEPT [5356:1550615]\r\n"} +{"Time":"2023-05-31T12:37:03.701566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701573-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701577-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701581-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701584-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :FLANNEL-FWD - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701601-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701604-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701607-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701609-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701611-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701613-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701615-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701617-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.701619-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:03.701621-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:37:03.701624-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:03.701626-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:03.701628-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m comment --comment \"flanneld forward\" -j FLANNEL-FWD\r\n"} +{"Time":"2023-05-31T12:37:03.701631-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:03.701634-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:37:03.701636-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:03.701835-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:03.701842-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:37:03.701844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:37:03.701846-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:03.701849-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:37:03.701851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:03.701853-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:03.701855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:03.701862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:03.701866-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:03.701869-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:37:03.701873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:03.701875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:37:03.701877-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:03.701894-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:03.701902-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-FWD -s 10.244.0.0/16 -m comment --comment \"flanneld forward\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:03.701907-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-FWD -d 10.244.0.0/16 -m comment --comment \"flanneld forward\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:03.701911-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:37:03.701915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:37:03.701919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:03.702176-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:03.702192-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:37:03.702198-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Completed on Wed May 31 19:36:53 2023\r\n"} +{"Time":"2023-05-31T12:37:03.702202-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:36:53 2023\r\n"} +{"Time":"2023-05-31T12:37:03.702205-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:37:03.702208-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:37:03.70221-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:37:03.702213-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :OUTPUT ACCEPT [43:2580]\r\n"} +{"Time":"2023-05-31T12:37:03.702217-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :POSTROUTING ACCEPT [52:3255]\r\n"} +{"Time":"2023-05-31T12:37:03.70222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702223-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702226-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702228-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :FLANNEL-POSTRTG - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.70223-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702232-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702234-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702236-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702238-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.70224-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702242-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-M66F6TD25XSFZOMV - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702245-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702248-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-UTWFOSUDHOCXYA2F - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702254-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702452-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.70246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702462-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702464-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:03.702466-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:03.702468-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:37:03.70247-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:37:03.702473-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:03.702475-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:37:03.702477-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:37:03.702479-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A POSTROUTING -m comment --comment \"flanneld masq\" -j FLANNEL-POSTRTG\r\n"} +{"Time":"2023-05-31T12:37:03.702481-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:37:03.702483-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:37:03.702486-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:37:03.702488-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:03.70249-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:37583\r\n"} +{"Time":"2023-05-31T12:37:03.702492-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:37365\r\n"} +{"Time":"2023-05-31T12:37:03.702494-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 37583 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:37:03.702497-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 37365 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:37:03.702499-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG -m mark --mark 0x4000/0x4000 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:03.702643-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/16 -d 10.244.0.0/16 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:03.702651-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/16 ! -d 224.0.0.0/4 -m comment --comment \"flanneld masq\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:37:03.702655-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG ! -s 10.244.0.0/16 -d 10.244.0.0/24 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:03.702659-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG ! -s 10.244.0.0/16 -d 10.244.0.0/16 -m comment --comment \"flanneld masq\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:37:03.702663-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:37:03.702667-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:03.70267-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:37:03.702682-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:37:03.702689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.702695-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:37:03.702699-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -s 192.168.76.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.702703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:37:03.702705-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.702708-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:37:03.702711-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -s 10.244.0.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.702713-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T12:37:03.702716-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.702909-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:37:03.702919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:37:03.702924-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:37:03.702931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.108.196.201/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:37:03.702935-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:37:03.702939-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:37:03.702943-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:37:03.702947-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.702951-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T12:37:03.702955-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.702959-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T12:37:03.702963-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.702968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.76.2:8443\" -j KUBE-SEP-M66F6TD25XSFZOMV\r\n"} +{"Time":"2023-05-31T12:37:03.702973-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.703188-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T12:37:03.703195-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.108.196.201/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:03.703211-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.3:8080\" -j KUBE-SEP-UTWFOSUDHOCXYA2F\r\n"} +{"Time":"2023-05-31T12:37:03.703214-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:37:03.703216-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Completed on Wed May 31 19:36:53 2023\r\n"} +{"Time":"2023-05-31T12:37:03.703218-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.70322-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.703222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:37:03.703224-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:37:03.703227-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703229-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 53 3340 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:37:03.703231-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 85 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:37:03.703233-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 44 2640 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:37:03.703236-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703238-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:37:03.70324-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703242-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703244-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain OUTPUT (policy ACCEPT 43 packets, 2580 bytes)\r\n"} +{"Time":"2023-05-31T12:37:03.703246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703449-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 331 24161 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:37:03.703454-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 100 8262 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:37:03.703457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 100 6000 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:37:03.703459-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703461-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain POSTROUTING (policy ACCEPT 52 packets, 3255 bytes)\r\n"} +{"Time":"2023-05-31T12:37:03.703463-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703466-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 203 14736 FLANNEL-POSTRTG all -- * * 0.0.0.0/0 0.0.0.0/0 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:37:03.703468-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 341 24896 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:37:03.703471-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:37:03.703473-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:37:03.703483-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703491-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703495-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703499-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:37:03.703502-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703514-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703518-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703521-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:37583\r\n"} +{"Time":"2023-05-31T12:37:03.703525-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 101 8347 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:37365\r\n"} +{"Time":"2023-05-31T12:37:03.703684-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703691-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703694-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:37583 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:37:03.703696-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:37365 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:37:03.703699-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703701-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain FLANNEL-POSTRTG (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703705-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 3 140 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0x4000/0x4000 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:37:03.703708-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 14 975 RETURN all -- * * 10.244.0.0/16 10.244.0.0/16 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:37:03.70371-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 MASQUERADE all -- * * 10.244.0.0/16 !224.0.0.0/4 /* flanneld masq */ random-fully\r\n"} +{"Time":"2023-05-31T12:37:03.703712-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 RETURN all -- * * !10.244.0.0/16 10.244.0.0/24 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:37:03.703715-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 MASQUERADE all -- * * !10.244.0.0/16 10.244.0.0/16 /* flanneld masq */ random-fully\r\n"} +{"Time":"2023-05-31T12:37:03.703733-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.70374-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703747-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703755-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.70376-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703763-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:37:03.703931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703933-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703935-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703937-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.70394-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703942-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703944-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 52 3255 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:37:03.703946-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:37:03.70395-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:37:03.703953-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703956-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703959-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703963-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703966-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.703969-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.703973-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:37:03.703977-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:37:03.70398-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.703983-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-M66F6TD25XSFZOMV (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704153-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.704158-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 2 120 KUBE-MARK-MASQ all -- * * 192.168.76.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:37:03.70416-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:37:03.704163-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.704165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.70417-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:37:03.704173-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:37:03.704175-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.704177-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-UTWFOSUDHOCXYA2F (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704179-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.704181-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:37:03.704184-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T12:37:03.704186-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.704188-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.70419-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.704192-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:37:03.704194-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:37:03.70449-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.704497-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704499-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.704502-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:37:03.704504-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:37:03.704507-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.108.196.201 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:37:03.70451-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:37:03.704512-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:37:03.704515-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 78 4680 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:37:03.704517-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.70452-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704522-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.704524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:37:03.704527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:37:03.704529-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.704531-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704533-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.70484-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:37:03.704846-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T12:37:03.704848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.704851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704853-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.704855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 2 120 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:37:03.704858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 3 180 KUBE-SEP-M66F6TD25XSFZOMV all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.76.2:8443 */\r\n"} +{"Time":"2023-05-31T12:37:03.70486-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.704862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704864-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.704867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:37:03.704869-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:37:03.704871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.704873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:37:03.704875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:03.704878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.108.196.201 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:37:03.70488-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-SEP-UTWFOSUDHOCXYA2F all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.3:8080 */\r\n"} +{"Time":"2023-05-31T12:37:03.705185-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.705191-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.705195-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe flannel daemon set:\n"} +{"Time":"2023-05-31T12:37:03.705199-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-flannel-ds\n"} +{"Time":"2023-05-31T12:37:03.705202-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Selector: app=flannel\n"} +{"Time":"2023-05-31T12:37:03.705205-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selector: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705213-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T12:37:03.705218-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T12:37:03.705221-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:37:03.705225-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:37:03.705228-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:37:03.705231-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:37:03.705233-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:37:03.705235-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:37:03.705237-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:37:03.705239-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:37:03.705241-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T12:37:03.705244-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T12:37:03.705246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: flannel\n"} +{"Time":"2023-05-31T12:37:03.705248-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Init Containers:\n"} +{"Time":"2023-05-31T12:37:03.70525-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" install-cni-plugin:\n"} +{"Time":"2023-05-31T12:37:03.705252-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\n"} +{"Time":"2023-05-31T12:37:03.705254-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705256-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705258-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.705548-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cp\n"} +{"Time":"2023-05-31T12:37:03.705552-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:03.705555-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -f\n"} +{"Time":"2023-05-31T12:37:03.705557-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /flannel\n"} +{"Time":"2023-05-31T12:37:03.705559-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/cni/bin/flannel\n"} +{"Time":"2023-05-31T12:37:03.705561-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705563-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.705566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/cni/bin from cni-plugin (rw)\n"} +{"Time":"2023-05-31T12:37:03.705568-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" install-cni:\n"} +{"Time":"2023-05-31T12:37:03.70557-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\n"} +{"Time":"2023-05-31T12:37:03.705572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705574-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705576-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.705578-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cp\n"} +{"Time":"2023-05-31T12:37:03.70558-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:03.705583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -f\n"} +{"Time":"2023-05-31T12:37:03.705584-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/cni-conf.json\n"} +{"Time":"2023-05-31T12:37:03.705587-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/10-flannel.conflist\n"} +{"Time":"2023-05-31T12:37:03.705589-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705591-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.705593-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d from cni (rw)\n"} +{"Time":"2023-05-31T12:37:03.705595-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T12:37:03.705597-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.705599-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-flannel:\n"} +{"Time":"2023-05-31T12:37:03.705601-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\n"} +{"Time":"2023-05-31T12:37:03.705781-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705786-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.705789-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.705793-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/bin/flanneld\n"} +{"Time":"2023-05-31T12:37:03.705797-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:03.7058-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --ip-masq\n"} +{"Time":"2023-05-31T12:37:03.705803-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kube-subnet-mgr\n"} +{"Time":"2023-05-31T12:37:03.705816-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T12:37:03.705819-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:37:03.705821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:37:03.705823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:37:03.705825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:37:03.705827-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:37:03.705829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T12:37:03.705831-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD_NAME: (v1:metadata.name)\n"} +{"Time":"2023-05-31T12:37:03.705834-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD_NAMESPACE: (v1:metadata.namespace)\n"} +{"Time":"2023-05-31T12:37:03.705837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EVENT_QUEUE_DEPTH: 5000\n"} +{"Time":"2023-05-31T12:37:03.705839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.705841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T12:37:03.705843-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/flannel from run (rw)\n"} +{"Time":"2023-05-31T12:37:03.705845-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:37:03.705847-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:03.705849-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" run:\n"} +{"Time":"2023-05-31T12:37:03.705851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.705853-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/flannel\n"} +{"Time":"2023-05-31T12:37:03.705855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:03.706041-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni-plugin:\n"} +{"Time":"2023-05-31T12:37:03.706047-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.706051-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T12:37:03.706055-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:03.706058-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni:\n"} +{"Time":"2023-05-31T12:37:03.706061-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.706075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:37:03.706081-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:03.706084-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" flannel-cfg:\n"} +{"Time":"2023-05-31T12:37:03.706086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:03.706089-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T12:37:03.706091-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:03.706093-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:37:03.706095-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.706097-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:37:03.706099-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:37:03.706102-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:37:03.706105-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:03.706107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:03.706109-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:03.706111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal SuccessfulCreate 42s daemonset-controller Created pod: kube-flannel-ds-pq6l8\n"} +{"Time":"2023-05-31T12:37:03.706113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.706115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.706309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe flannel pod(s):\n"} +{"Time":"2023-05-31T12:37:03.706313-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-flannel-ds-pq6l8\n"} +{"Time":"2023-05-31T12:37:03.706315-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-flannel\n"} +{"Time":"2023-05-31T12:37:03.706318-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:37:03.70632-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:37:03.706322-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: flannel\n"} +{"Time":"2023-05-31T12:37:03.706324-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.706326-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 12:36:11 -0700\n"} +{"Time":"2023-05-31T12:37:03.706328-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T12:37:03.70633-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" controller-revision-hash=68dd6df44b\n"} +{"Time":"2023-05-31T12:37:03.706332-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:37:03.706334-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T12:37:03.706336-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.706338-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:03.70634-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.706342-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:03.706344-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.706347-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: DaemonSet/kube-flannel-ds\n"} +{"Time":"2023-05-31T12:37:03.706349-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Init Containers:\n"} +{"Time":"2023-05-31T12:37:03.706351-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" install-cni-plugin:\n"} +{"Time":"2023-05-31T12:37:03.706353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: docker://5bc3184181039da8e132332dfaf269d8ddd8eab67c0a7a5090b5993b74e30d02\n"} +{"Time":"2023-05-31T12:37:03.706355-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\n"} +{"Time":"2023-05-31T12:37:03.706571-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker-pullable://rancher/mirrored-flannelcni-flannel-cni-plugin@sha256:28d3a6be9f450282bf42e4dad143d41da23e3d91f66f19c01ee7fd21fd17cb2b\n"} +{"Time":"2023-05-31T12:37:03.706576-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.706578-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.70658-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.706582-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cp\n"} +{"Time":"2023-05-31T12:37:03.706585-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:03.706587-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -f\n"} +{"Time":"2023-05-31T12:37:03.706589-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /flannel\n"} +{"Time":"2023-05-31T12:37:03.706591-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/cni/bin/flannel\n"} +{"Time":"2023-05-31T12:37:03.706593-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Terminated\n"} +{"Time":"2023-05-31T12:37:03.706595-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:37:03.706597-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:37:03.706599-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 12:36:14 -0700\n"} +{"Time":"2023-05-31T12:37:03.706601-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Finished: Wed, 31 May 2023 12:36:14 -0700\n"} +{"Time":"2023-05-31T12:37:03.706603-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:03.706605-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:03.706608-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.70661-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.706612-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/cni/bin from cni-plugin (rw)\n"} +{"Time":"2023-05-31T12:37:03.706614-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-2cbld (ro)\n"} +{"Time":"2023-05-31T12:37:03.706616-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" install-cni:\n"} +{"Time":"2023-05-31T12:37:03.706618-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: docker://2cfc6e66c5ef8074c8362fc24ab5471a8fc5d6c08f6533cf6cc3d05ec9058a37\n"} +{"Time":"2023-05-31T12:37:03.706621-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\n"} +{"Time":"2023-05-31T12:37:03.706623-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker-pullable://rancher/mirrored-flannelcni-flannel@sha256:ec0f0b7430c8370c9f33fe76eb0392c1ad2ddf4ccaf2b9f43995cca6c94d3832\n"} +{"Time":"2023-05-31T12:37:03.706814-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.706819-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.706821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.706823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cp\n"} +{"Time":"2023-05-31T12:37:03.706831-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:03.706834-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -f\n"} +{"Time":"2023-05-31T12:37:03.706837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/cni-conf.json\n"} +{"Time":"2023-05-31T12:37:03.706842-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/10-flannel.conflist\n"} +{"Time":"2023-05-31T12:37:03.706846-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Terminated\n"} +{"Time":"2023-05-31T12:37:03.706849-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:37:03.706852-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:37:03.706855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 12:36:18 -0700\n"} +{"Time":"2023-05-31T12:37:03.706859-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Finished: Wed, 31 May 2023 12:36:18 -0700\n"} +{"Time":"2023-05-31T12:37:03.706862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:03.706865-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:03.706868-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.706871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.706875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d from cni (rw)\n"} +{"Time":"2023-05-31T12:37:03.706878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T12:37:03.706881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-2cbld (ro)\n"} +{"Time":"2023-05-31T12:37:03.706883-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.706885-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-flannel:\n"} +{"Time":"2023-05-31T12:37:03.706887-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: docker://28e4fc43b34aed0de498c2f19e1bdf30a503d1fc2a3679924745a15022f51bf9\n"} +{"Time":"2023-05-31T12:37:03.706889-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\n"} +{"Time":"2023-05-31T12:37:03.707066-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker-pullable://rancher/mirrored-flannelcni-flannel@sha256:ec0f0b7430c8370c9f33fe76eb0392c1ad2ddf4ccaf2b9f43995cca6c94d3832\n"} +{"Time":"2023-05-31T12:37:03.707072-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.707074-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.707077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.707079-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/bin/flanneld\n"} +{"Time":"2023-05-31T12:37:03.707081-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:03.707083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --ip-masq\n"} +{"Time":"2023-05-31T12:37:03.707085-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kube-subnet-mgr\n"} +{"Time":"2023-05-31T12:37:03.707087-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:03.707089-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 12:36:19 -0700\n"} +{"Time":"2023-05-31T12:37:03.707091-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:03.707094-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:03.707095-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T12:37:03.707097-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:37:03.707099-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:37:03.707101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:37:03.707103-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:37:03.707105-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:37:03.707107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T12:37:03.707111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD_NAME: kube-flannel-ds-pq6l8 (v1:metadata.name)\n"} +{"Time":"2023-05-31T12:37:03.707113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD_NAMESPACE: kube-flannel (v1:metadata.namespace)\n"} +{"Time":"2023-05-31T12:37:03.707115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EVENT_QUEUE_DEPTH: 5000\n"} +{"Time":"2023-05-31T12:37:03.707117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.707119-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T12:37:03.707278-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/flannel from run (rw)\n"} +{"Time":"2023-05-31T12:37:03.707282-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:37:03.707284-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-2cbld (ro)\n"} +{"Time":"2023-05-31T12:37:03.707286-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:03.707288-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:03.707291-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:03.707292-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:03.707294-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:03.707296-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:03.707298-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:03.7073-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" run:\n"} +{"Time":"2023-05-31T12:37:03.707302-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.707304-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/flannel\n"} +{"Time":"2023-05-31T12:37:03.707307-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:03.707309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni-plugin:\n"} +{"Time":"2023-05-31T12:37:03.707311-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.707313-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T12:37:03.707315-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:03.707317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni:\n"} +{"Time":"2023-05-31T12:37:03.707319-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.707321-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:37:03.707323-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:03.707325-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" flannel-cfg:\n"} +{"Time":"2023-05-31T12:37:03.707327-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:03.707329-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T12:37:03.707502-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:03.707509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:37:03.707513-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.707516-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:37:03.70752-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:37:03.707523-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-api-access-2cbld:\n"} +{"Time":"2023-05-31T12:37:03.707527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:37:03.70753-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:37:03.707534-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.707537-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:37:03.707541-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:37:03.707559-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:37:03.707566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.70757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: :NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.707574-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.707577-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.707579-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.707581-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:37:03.707583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.707585-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:37:03.707588-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.707709-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:03.707716-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:03.707718-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:03.707721-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Scheduled 42s default-scheduler Successfully assigned kube-flannel/kube-flannel-ds-pq6l8 to custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.707723-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulling 41s kubelet Pulling image \"docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\"\n"} +{"Time":"2023-05-31T12:37:03.707725-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 39s kubelet Successfully pulled image \"docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\" in 2.207395619s (2.207401704s including waiting)\n"} +{"Time":"2023-05-31T12:37:03.707729-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 39s kubelet Created container install-cni-plugin\n"} +{"Time":"2023-05-31T12:37:03.707733-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 39s kubelet Started container install-cni-plugin\n"} +{"Time":"2023-05-31T12:37:03.707736-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulling 38s kubelet Pulling image \"docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\"\n"} +{"Time":"2023-05-31T12:37:03.707738-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 35s kubelet Successfully pulled image \"docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\" in 3.391628739s (3.391635047s including waiting)\n"} +{"Time":"2023-05-31T12:37:03.707741-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 35s kubelet Created container install-cni\n"} +{"Time":"2023-05-31T12:37:03.707743-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 35s kubelet Started container install-cni\n"} +{"Time":"2023-05-31T12:37:03.707745-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 34s kubelet Container image \"docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\" already present on machine\n"} +{"Time":"2023-05-31T12:37:03.707748-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 34s kubelet Created container kube-flannel\n"} +{"Time":"2023-05-31T12:37:03.70775-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 34s kubelet Started container kube-flannel\n"} +{"Time":"2023-05-31T12:37:03.707752-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.707754-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.707756-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (current):\n"} +{"Time":"2023-05-31T12:37:03.70776-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:20.698512 1 kube.go:452] Creating the node lease for IPv4. This is the n.Spec.PodCIDRs: [10.244.0.0/24]\n"} +{"Time":"2023-05-31T12:37:03.708026-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:20.699439 1 main.go:416] Current network or subnet (10.244.0.0/16, 10.244.0.0/24) is not equal to previous one (0.0.0.0/0, 0.0.0.0/0), trying to recycle old iptables rules\n"} +{"Time":"2023-05-31T12:37:03.708033-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:20.989446 1 main.go:342] Setting up masking rules\n"} +{"Time":"2023-05-31T12:37:03.708037-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:21.085091 1 main.go:364] Changing default FORWARD chain policy to ACCEPT\n"} +{"Time":"2023-05-31T12:37:03.708041-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:21.182192 1 main.go:379] Wrote subnet file to /run/flannel/subnet.env\n"} +{"Time":"2023-05-31T12:37:03.708045-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:21.182410 1 main.go:383] Running backend.\n"} +{"Time":"2023-05-31T12:37:03.708049-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:21.185521 1 vxlan_network.go:61] watching for new subnet leases\n"} +{"Time":"2023-05-31T12:37:03.708052-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:21.209638 1 main.go:404] Waiting for all goroutines to exit\n"} +{"Time":"2023-05-31T12:37:03.708056-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:21.390218 1 iptables.go:270] bootstrap done\n"} +{"Time":"2023-05-31T12:37:03.708077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-pq6l8/kube-flannel] I0531 19:36:21.485201 1 iptables.go:270] bootstrap done\n"} +{"Time":"2023-05-31T12:37:03.708091-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708095-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.7081-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:37:03.708102-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: previous terminated container \"install-cni-plugin\" in pod \"kube-flannel-ds-pq6l8\" not found\n"} +{"Time":"2023-05-31T12:37:03.708105-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: previous terminated container \"install-cni\" in pod \"kube-flannel-ds-pq6l8\" not found\n"} +{"Time":"2023-05-31T12:37:03.708107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: previous terminated container \"kube-flannel\" in pod \"kube-flannel-ds-pq6l8\" not found\n"} +{"Time":"2023-05-31T12:37:03.708109-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /run/flannel/subnet.env:\n"} +{"Time":"2023-05-31T12:37:03.708279-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" FLANNEL_NETWORK=10.244.0.0/16\r\n"} +{"Time":"2023-05-31T12:37:03.708288-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" FLANNEL_SUBNET=10.244.0.1/24\r\n"} +{"Time":"2023-05-31T12:37:03.708302-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" FLANNEL_MTU=65485\r\n"} +{"Time":"2023-05-31T12:37:03.708308-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" FLANNEL_IPMASQ=true\r\n"} +{"Time":"2023-05-31T12:37:03.708312-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708315-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708319-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/kube-flannel/cni-conf.json:\n"} +{"Time":"2023-05-31T12:37:03.708322-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cat: /etc/kube-flannel/cni-conf.json: No such file or directory\r\n"} +{"Time":"2023-05-31T12:37:03.708326-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T12:37:03.708329-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708332-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708335-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:37:03.708339-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.708342-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.708346-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:37:03.708349-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.708353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:37:03.708356-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:37:03.708359-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:37:03.708363-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:37:03.708366-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:37:03.70837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:37:03.708373-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:37:03.7086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:37:03.708609-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.708614-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.70862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.708626-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:37:03.70863-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:37:03.708634-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.70864-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.708647-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.708649-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.708652-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:37:03.708654-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:37:03.708657-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T12:37:03.70866-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:37:03.708663-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.708666-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:37:03.70867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:37:03.708673-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:37:03.708677-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:03.708681-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:37:03.708684-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:03.708687-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.708691-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:03.708694-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:37:03.708697-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.708853-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:37:03.708858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:37:03.70886-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:37:03.708862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.708864-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:37:03.708866-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:03.708868-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:37:03.70887-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:03.708873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:03.708889-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:03.708891-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal SuccessfulCreate 43s daemonset-controller Created pod: kube-proxy-65z59\n"} +{"Time":"2023-05-31T12:37:03.708893-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708916-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.708919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:37:03.708926-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-proxy-65z59\n"} +{"Time":"2023-05-31T12:37:03.708931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.708938-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:37:03.708942-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:37:03.708945-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.708947-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.708949-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 12:36:11 -0700\n"} +{"Time":"2023-05-31T12:37:03.708966-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:37:03.708982-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.709412-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:37:03.709418-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.709421-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:03.709423-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.709425-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:03.709427-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.709429-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.709431-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:03.709435-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:37:03.709437-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: docker://65cacc7b28f637ea940e5256f3ab84fb95a900fed22e4632da70365f263ed6e6\n"} +{"Time":"2023-05-31T12:37:03.70944-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:37:03.709442-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:37:03.709445-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.709447-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:03.709449-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:03.709451-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.709453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:37:03.709455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:37:03.709457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:03.709459-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 12:36:12 -0700\n"} +{"Time":"2023-05-31T12:37:03.709461-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:03.709463-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:03.730015-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T12:37:03.73005-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:37:03.730059-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:03.730064-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:37:03.730067-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:37:03.730071-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:37:03.730074-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-vlgg9 (ro)\n"} +{"Time":"2023-05-31T12:37:03.730077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:03.730081-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:03.730084-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:03.730086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:03.730088-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:03.730093-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:03.730096-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:03.730099-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:37:03.730102-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:03.730107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.73011-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:03.730113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:37:03.730116-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.73012-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:37:03.730123-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:37:03.730127-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:37:03.73013-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:03.730135-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:37:03.73044-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:03.730455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-api-access-vlgg9:\n"} +{"Time":"2023-05-31T12:37:03.730472-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:37:03.730482-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:37:03.730486-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.73049-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:37:03.730495-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:37:03.730498-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:37:03.730502-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:37:03.730506-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:37:03.730509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.730513-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.730517-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.730522-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:37:03.730526-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.730531-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:37:03.730534-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:03.730538-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:03.730543-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:03.730546-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:03.730551-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Scheduled 43s default-scheduler Successfully assigned kube-system/kube-proxy-65z59 to custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.730791-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 42s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:37:03.730798-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 42s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.730812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 42s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.730818-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.730821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.730825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:37:03.73083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.605121 1 node.go:141] Successfully retrieved node IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.730834-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.605185 1 server_others.go:110] \"Detected node IP\" address=\"192.168.76.2\"\n"} +{"Time":"2023-05-31T12:37:03.730838-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.605232 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:37:03.730842-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.685290 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:37:03.730847-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.685474 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:37:03.730851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.685483 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:37:03.730855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.685493 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:37:03.730859-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.685519 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:37:03.730863-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.686131 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:37:03.730865-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.686169 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:37:03.730868-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.686841 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:37:03.73087-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.686881 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:37:03.731239-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.686895 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:37:03.731262-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.686897 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:37:03.73127-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.687079 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:37:03.731277-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.687092 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:37:03.731283-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.787773 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:37:03.731287-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.787849 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:37:03.731293-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:36:12.787861 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:37:03.731297-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.7313-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.731305-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:37:03.731309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:37:03.731314-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: loaded (\u001b]8;;file://custom-flannel-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:03.731318-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:37:03.731339-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─\u001b]8;;file://custom-flannel-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:03.731345-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:35:58 UTC; 56s ago\r\n"} +{"Time":"2023-05-31T12:37:03.731349-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:03.731353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Main PID: 2347 (kubelet)\r\n"} +{"Time":"2023-05-31T12:37:03.731356-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tasks: 14 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:37:03.73137-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Memory: 33.1M\r\n"} +{"Time":"2023-05-31T12:37:03.731611-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CPU: 2.056s\r\n"} +{"Time":"2023-05-31T12:37:03.731618-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:37:03.731622-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─2347 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=custom-flannel-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:37:03.731624-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.731647-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: E0531 19:36:26.445438 2347 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = Unknown desc = Error: No such container: 36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\" containerID=\"36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\"\r\n"} +{"Time":"2023-05-31T12:37:03.731667-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.445708 2347 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:docker ID:36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39} err=\"failed to get container status \\\"36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\\\": rpc error: code = Unknown desc = Error: No such container: 36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\"\r\n"} +{"Time":"2023-05-31T12:37:03.73169-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.490923 2347 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-cfs6q\\\" (UniqueName: \\\"kubernetes.io/projected/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-kube-api-access-cfs6q\\\") on node \\\"custom-flannel-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:37:03.731729-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.491003 2347 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-config-volume\\\") on node \\\"custom-flannel-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:37:03.731751-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.905059 2347 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=080b1fa2-a285-4cf1-881d-4ea5d6a2b820 path=\"/var/lib/kubelet/pods/080b1fa2-a285-4cf1-881d-4ea5d6a2b820/volumes\"\r\n"} +{"Time":"2023-05-31T12:37:03.731763-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:27 custom-flannel-996000 kubelet[2347]: I0531 19:36:27.448246 2347 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"97ca01e881480aa6ac6155c5960b32bbfafa2ae3a2a34c12950540bbca1a3c8d\"\r\n"} +{"Time":"2023-05-31T12:37:03.731769-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:30 custom-flannel-996000 kubelet[2347]: I0531 19:36:30.995551 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.731785-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:30 custom-flannel-996000 kubelet[2347]: E0531 19:36:30.996083 2347 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:37:03.732039-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:30 custom-flannel-996000 kubelet[2347]: I0531 19:36:30.996156 2347 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:37:03.732047-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:31 custom-flannel-996000 kubelet[2347]: I0531 19:36:31.124004 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-nmk5d\\\" (UniqueName: \\\"kubernetes.io/projected/341c63d3-54e7-440b-ab97-bf98f67ef93d-kube-api-access-nmk5d\\\") pod \\\"netcat-7458db8b8-2tln8\\\" (UID: \\\"341c63d3-54e7-440b-ab97-bf98f67ef93d\\\") \" pod=\"default/netcat-7458db8b8-2tln8\"\r\n"} +{"Time":"2023-05-31T12:37:03.732054-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.732057-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.73206-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:37:03.732064-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732068-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:03.732072-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:37:03.732075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:37:03.732079-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:37:03.732083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.732086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.732109-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:37:03.732115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:03.73212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:37:03.732124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:37:03.732128-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.732131-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:03.732138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:03.732515-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.732529-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732536-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:03.732539-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:37:03.732553-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.732561-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.732563-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:37:03.732566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=custom-flannel-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:37:03.73257-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.732572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:03.732574-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.732576-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.732578-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:37:03.732581-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:50 custom-flannel-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:37:03.732583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732588-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732591-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732593-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732599-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732601-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.732836-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:50 custom-flannel-996000 kubelet[1736]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:37:03.732844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.367182 1736 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:37:03.732848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.367251 1736 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:37:03.732853-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.367434 1736 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:37:03.732858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.370622 1736 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:37:03.732863-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.371490 1736 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.732867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: W0531 19:35:51.374399 1736 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:37:03.732872-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.383317 1736 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:37:03.732876-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.383588 1736 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:37:03.732881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.383660 1736 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:37:03.733149-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.383724 1736 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:37:03.733156-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.383742 1736 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:37:03.733159-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.383820 1736 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:03.733162-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.405932 1736 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:37:03.733165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.405959 1736 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:37:03.733168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.405975 1736 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:37:03.73317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.405990 1736 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:37:03.733173-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: W0531 19:35:51.406648 1736 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.733176-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.406829 1736 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.733182-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: W0531 19:35:51.406658 1736 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcustom-flannel-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.733187-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.406857 1736 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcustom-flannel-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.733395-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.414277 1736 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:37:03.733403-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: W0531 19:35:51.414512 1736 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:37:03.733408-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.415162 1736 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:37:03.733412-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.415726 1736 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:37:03.733419-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.415842 1736 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"custom-flannel-996000.1764517b8015c6f8\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"custom-flannel-996000\", UID:\"custom-flannel-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"custom-flannel-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 35, 51, 4151462"} +{"Time":"2023-05-31T12:37:03.733427-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"32, time.Local), LastTimestamp:time.Date(2023, time.May, 31, 19, 35, 51, 415146232, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.76.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:37:03.733432-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.416015 1736 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:37:03.733436-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.416439 1736 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:37:03.733652-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.416580 1736 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:37:03.733659-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.416628 1736 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:37:03.733664-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.416808 1736 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:37:03.73367-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: W0531 19:35:51.417091 1736 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.733675-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.417157 1736 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.733681-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.417547 1736 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/custom-flannel-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:37:03.733686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.433923 1736 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:37:03.733697-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.437888 1736 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:37:03.733703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.437944 1736 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:37:03.733707-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.437963 1736 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:37:03.733711-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.437999 1736 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:37:03.733718-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: W0531 19:35:51.441604 1736 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.733881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.441656 1736 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.733889-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.454400 1736 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:37:03.733903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.454608 1736 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:37:03.733907-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.454639 1736 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:03.733909-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.495110 1736 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:37:03.733912-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.497880 1736 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:37:03.733915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.498059 1736 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:03.733917-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.527050 1736 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:37:03.73392-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.527269 1736 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:37:03.733922-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.531275 1736 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.733926-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.531929 1736 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.733929-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.538218 1736 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.73411-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.538790 1736 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"custom-flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:37:03.734117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.546895 1736 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.734121-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.555680 1736 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.734126-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.565032 1736 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.73413-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.618523 1736 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/custom-flannel-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:37:03.734136-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.618906 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-etc-ca-certificates\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734143-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.618963 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-k8s-certs\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.73415-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.618981 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-kubeconfig\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734156-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619012 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-ca-certs\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734503-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619063 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-etc-ca-certificates\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734512-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619090 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-ca-certs\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734518-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619111 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619198 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734541-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619357 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/caaaab83b164844ba9ab0d73e9534555-kubeconfig\\\") pod \\\"kube-scheduler-custom-flannel-996000\\\" (UID: \\\"caaaab83b164844ba9ab0d73e9534555\\\") \" pod=\"kube-system/kube-scheduler-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734547-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619447 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734552-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619489 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-flexvolume-dir\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734866-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619524 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/a65937ecdb4b1986c0985830f018cb14-etcd-certs\\\") pod \\\"etcd-custom-flannel-996000\\\" (UID: \\\"a65937ecdb4b1986c0985830f018cb14\\\") \" pod=\"kube-system/etcd-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619542 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/a65937ecdb4b1986c0985830f018cb14-etcd-data\\\") pod \\\"etcd-custom-flannel-996000\\\" (UID: \\\"a65937ecdb4b1986c0985830f018cb14\\\") \" pod=\"kube-system/etcd-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619578 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734887-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.619639 1736 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-k8s-certs\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.73491-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: I0531 19:35:51.741809 1736 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.734916-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:51 custom-flannel-996000 kubelet[1736]: E0531 19:35:51.742205 1736 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.73492-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: E0531 19:35:52.019878 1736 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/custom-flannel-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:37:03.735221-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: I0531 19:35:52.182548 1736 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.73523-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: E0531 19:35:52.182893 1736 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.735236-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: W0531 19:35:52.214090 1736 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcustom-flannel-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.735241-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: E0531 19:35:52.214135 1736 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcustom-flannel-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.735248-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: W0531 19:35:52.226283 1736 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.735253-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: E0531 19:35:52.226351 1736 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.735259-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: W0531 19:35:52.435115 1736 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.735264-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: E0531 19:35:52.435194 1736 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:03.73527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:52 custom-flannel-996000 kubelet[1736]: I0531 19:35:52.994518 1736 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.73552-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:54 custom-flannel-996000 kubelet[1736]: E0531 19:35:54.490889 1736 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"custom-flannel-996000\\\" not found\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.735548-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:54 custom-flannel-996000 kubelet[1736]: I0531 19:35:54.631306 1736 kubelet_node_status.go:73] \"Successfully registered node\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.735553-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:55 custom-flannel-996000 kubelet[1736]: E0531 19:35:55.282151 1736 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-custom-flannel-996000\\\" is forbidden: no PriorityClass with name system-node-critical was found\" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.735556-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:55 custom-flannel-996000 kubelet[1736]: I0531 19:35:55.408917 1736 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:37:03.735559-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:55 custom-flannel-996000 kubelet[1736]: I0531 19:35:55.417898 1736 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:37:03.735561-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:55 custom-flannel-996000 kubelet[1736]: I0531 19:35:55.448636 1736 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:37:03.735564-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:37:03.735567-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735585-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735588-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735592-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735615-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735621-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735625-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735628-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[1736]: I0531 19:35:58.621568 1736 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:37:03.735823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:37:03.73583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735835-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735846-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:37:03.735866-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.73587-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735883-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735886-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735898-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:37:03.735907-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.735911-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.736094-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.736102-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.736104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.736108-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.736111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.736114-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:37:03.736117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.730468 2347 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:37:03.73612-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.730538 2347 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:37:03.736124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.730718 2347 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:37:03.736133-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.732260 2347 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:37:03.736138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.733310 2347 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:37:03.736142-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: W0531 19:35:58.738023 2347 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:37:03.736147-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.745334 2347 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:37:03.736151-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.745669 2347 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:37:03.736291-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.745848 2347 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:37:03.7363-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.745899 2347 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:37:03.736305-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.745919 2347 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:37:03.736309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.745941 2347 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:03.736313-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.808843 2347 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:37:03.736317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.808895 2347 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:37:03.736323-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.808913 2347 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:37:03.736327-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.808929 2347 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:37:03.736331-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.829380 2347 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:37:03.736335-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.829951 2347 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:37:03.736339-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.830090 2347 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:37:03.73648-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.831133 2347 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:37:03.736496-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.832435 2347 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:37:03.736503-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.832565 2347 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:37:03.736509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.841401 2347 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:37:03.736513-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.842196 2347 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:37:03.736516-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.897400 2347 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:37:03.73652-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.899031 2347 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:37:03.736524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.899056 2347 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:37:03.736529-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.899074 2347 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:37:03.736543-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: E0531 19:35:58.899235 2347 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:37:03.736547-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.932548 2347 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:37:03.736549-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.932614 2347 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:37:03.736552-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.932628 2347 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:03.736706-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.932860 2347 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:37:03.736722-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.932936 2347 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:37:03.736728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.932943 2347 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:37:03.736732-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.938057 2347 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:37:03.736736-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.938149 2347 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:03.73674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.938288 2347 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:37:03.736745-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.939163 2347 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:37:03.736749-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.939410 2347 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:37:03.736752-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.982839 2347 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.736755-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.991565 2347 kubelet_node_status.go:108] \"Node was previously registered\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.736771-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.991652 2347 kubelet_node_status.go:73] \"Successfully registered node\" node=\"custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.736774-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:58 custom-flannel-996000 kubelet[2347]: I0531 19:35:58.999771 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.736777-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.000163 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.736837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.000898 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.736851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.001451 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.736855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: E0531 19:35:59.011482 2347 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-scheduler-custom-flannel-996000\\\" already exists\" pod=\"kube-system/kube-scheduler-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.73686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: E0531 19:35:59.012547 2347 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-custom-flannel-996000\\\" already exists\" pod=\"kube-system/etcd-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.736865-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183249 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-etc-ca-certificates\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.736872-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183358 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-ca-certs\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.736879-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183377 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/caaaab83b164844ba9ab0d73e9534555-kubeconfig\\\") pod \\\"kube-scheduler-custom-flannel-996000\\\" (UID: \\\"caaaab83b164844ba9ab0d73e9534555\\\") \" pod=\"kube-system/kube-scheduler-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.736885-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183394 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/a65937ecdb4b1986c0985830f018cb14-etcd-certs\\\") pod \\\"etcd-custom-flannel-996000\\\" (UID: \\\"a65937ecdb4b1986c0985830f018cb14\\\") \" pod=\"kube-system/etcd-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.736892-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183410 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/a65937ecdb4b1986c0985830f018cb14-etcd-data\\\") pod \\\"etcd-custom-flannel-996000\\\" (UID: \\\"a65937ecdb4b1986c0985830f018cb14\\\") \" pod=\"kube-system/etcd-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737043-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183426 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-ca-certs\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737053-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183444 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-k8s-certs\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.73706-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183587 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737066-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183631 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/22647dc02b348c3a38c18438d29224c5-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-custom-flannel-996000\\\" (UID: \\\"22647dc02b348c3a38c18438d29224c5\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183754 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-etc-ca-certificates\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737087-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183778 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-flexvolume-dir\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737091-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183795 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-kubeconfig\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737272-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183823 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737279-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183842 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-k8s-certs\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737283-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.183861 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/ffbbf1d2f9d82ef77b146e994903c96f-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-custom-flannel-996000\\\" (UID: \\\"ffbbf1d2f9d82ef77b146e994903c96f\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737287-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.810128 2347 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:37:03.73729-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.833101 2347 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:37:03.737292-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:59 custom-flannel-996000 kubelet[2347]: I0531 19:35:59.888792 2347 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:37:03.737295-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:00 custom-flannel-996000 kubelet[2347]: E0531 19:36:00.021626 2347 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-scheduler-custom-flannel-996000\\\" already exists\" pod=\"kube-system/kube-scheduler-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737298-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:00 custom-flannel-996000 kubelet[2347]: E0531 19:36:00.022006 2347 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-custom-flannel-996000\\\" already exists\" pod=\"kube-system/kube-apiserver-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737435-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:00 custom-flannel-996000 kubelet[2347]: E0531 19:36:00.023554 2347 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-custom-flannel-996000\\\" already exists\" pod=\"kube-system/etcd-custom-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:37:03.737442-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:00 custom-flannel-996000 kubelet[2347]: I0531 19:36:00.028806 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-custom-flannel-996000\" podStartSLOduration=3.028709355 podCreationTimestamp=\"2023-05-31 19:35:57 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:00.020586841 +0000 UTC m=+1.354818100\" watchObservedRunningTime=\"2023-05-31 19:36:00.028709355 +0000 UTC m=+1.362940606\"\r\n"} +{"Time":"2023-05-31T12:37:03.737446-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:00 custom-flannel-996000 kubelet[2347]: I0531 19:36:00.041411 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-custom-flannel-996000\" podStartSLOduration=1.041382685 podCreationTimestamp=\"2023-05-31 19:35:59 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:00.041320703 +0000 UTC m=+1.375551962\" watchObservedRunningTime=\"2023-05-31 19:36:00.041382685 +0000 UTC m=+1.375613945\"\r\n"} +{"Time":"2023-05-31T12:37:03.737451-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:00 custom-flannel-996000 kubelet[2347]: I0531 19:36:00.041583 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-custom-flannel-996000\" podStartSLOduration=4.041566808 podCreationTimestamp=\"2023-05-31 19:35:56 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:00.029037948 +0000 UTC m=+1.363269207\" watchObservedRunningTime=\"2023-05-31 19:36:00.041566808 +0000 UTC m=+1.375798065\"\r\n"} +{"Time":"2023-05-31T12:37:03.737455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:00 custom-flannel-996000 kubelet[2347]: I0531 19:36:00.231693 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-custom-flannel-996000\" podStartSLOduration=1.231657824 podCreationTimestamp=\"2023-05-31 19:35:59 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:00.053120955 +0000 UTC m=+1.387352209\" watchObservedRunningTime=\"2023-05-31 19:36:00.231657824 +0000 UTC m=+1.565889093\"\r\n"} +{"Time":"2023-05-31T12:37:03.737459-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.310228 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.737463-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.313030 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.737466-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.408826 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.737564-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.419669 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.737572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.485532 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"run\\\" (UniqueName: \\\"kubernetes.io/host-path/9061a1cd-65ac-41cc-98a4-ec6ed022bcd5-run\\\") pod \\\"kube-flannel-ds-pq6l8\\\" (UID: \\\"9061a1cd-65ac-41cc-98a4-ec6ed022bcd5\\\") \" pod=\"kube-flannel/kube-flannel-ds-pq6l8\"\r\n"} +{"Time":"2023-05-31T12:37:03.737578-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.487142 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/9061a1cd-65ac-41cc-98a4-ec6ed022bcd5-xtables-lock\\\") pod \\\"kube-flannel-ds-pq6l8\\\" (UID: \\\"9061a1cd-65ac-41cc-98a4-ec6ed022bcd5\\\") \" pod=\"kube-flannel/kube-flannel-ds-pq6l8\"\r\n"} +{"Time":"2023-05-31T12:37:03.737581-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.488691 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/cbfb4052-b516-484f-b891-1206ef5822c3-lib-modules\\\") pod \\\"kube-proxy-65z59\\\" (UID: \\\"cbfb4052-b516-484f-b891-1206ef5822c3\\\") \" pod=\"kube-system/kube-proxy-65z59\"\r\n"} +{"Time":"2023-05-31T12:37:03.737584-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.488775 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni\\\" (UniqueName: \\\"kubernetes.io/host-path/9061a1cd-65ac-41cc-98a4-ec6ed022bcd5-cni\\\") pod \\\"kube-flannel-ds-pq6l8\\\" (UID: \\\"9061a1cd-65ac-41cc-98a4-ec6ed022bcd5\\\") \" pod=\"kube-flannel/kube-flannel-ds-pq6l8\"\r\n"} +{"Time":"2023-05-31T12:37:03.737588-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.488800 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-2cbld\\\" (UniqueName: \\\"kubernetes.io/projected/9061a1cd-65ac-41cc-98a4-ec6ed022bcd5-kube-api-access-2cbld\\\") pod \\\"kube-flannel-ds-pq6l8\\\" (UID: \\\"9061a1cd-65ac-41cc-98a4-ec6ed022bcd5\\\") \" pod=\"kube-flannel/kube-flannel-ds-pq6l8\"\r\n"} +{"Time":"2023-05-31T12:37:03.737591-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.488820 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/cbfb4052-b516-484f-b891-1206ef5822c3-kube-proxy\\\") pod \\\"kube-proxy-65z59\\\" (UID: \\\"cbfb4052-b516-484f-b891-1206ef5822c3\\\") \" pod=\"kube-system/kube-proxy-65z59\"\r\n"} +{"Time":"2023-05-31T12:37:03.737596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.488835 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-vlgg9\\\" (UniqueName: \\\"kubernetes.io/projected/cbfb4052-b516-484f-b891-1206ef5822c3-kube-api-access-vlgg9\\\") pod \\\"kube-proxy-65z59\\\" (UID: \\\"cbfb4052-b516-484f-b891-1206ef5822c3\\\") \" pod=\"kube-system/kube-proxy-65z59\"\r\n"} +{"Time":"2023-05-31T12:37:03.737663-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.488853 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-plugin\\\" (UniqueName: \\\"kubernetes.io/host-path/9061a1cd-65ac-41cc-98a4-ec6ed022bcd5-cni-plugin\\\") pod \\\"kube-flannel-ds-pq6l8\\\" (UID: \\\"9061a1cd-65ac-41cc-98a4-ec6ed022bcd5\\\") \" pod=\"kube-flannel/kube-flannel-ds-pq6l8\"\r\n"} +{"Time":"2023-05-31T12:37:03.737669-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.488873 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flannel-cfg\\\" (UniqueName: \\\"kubernetes.io/configmap/9061a1cd-65ac-41cc-98a4-ec6ed022bcd5-flannel-cfg\\\") pod \\\"kube-flannel-ds-pq6l8\\\" (UID: \\\"9061a1cd-65ac-41cc-98a4-ec6ed022bcd5\\\") \" pod=\"kube-flannel/kube-flannel-ds-pq6l8\"\r\n"} +{"Time":"2023-05-31T12:37:03.737674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.488889 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/cbfb4052-b516-484f-b891-1206ef5822c3-xtables-lock\\\") pod \\\"kube-proxy-65z59\\\" (UID: \\\"cbfb4052-b516-484f-b891-1206ef5822c3\\\") \" pod=\"kube-system/kube-proxy-65z59\"\r\n"} +{"Time":"2023-05-31T12:37:03.737677-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.591261 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-77hfb\\\" (UniqueName: \\\"kubernetes.io/projected/470d3479-bc17-4adf-a413-9187556e44e4-kube-api-access-77hfb\\\") pod \\\"coredns-5d78c9869d-7k25p\\\" (UID: \\\"470d3479-bc17-4adf-a413-9187556e44e4\\\") \" pod=\"kube-system/coredns-5d78c9869d-7k25p\"\r\n"} +{"Time":"2023-05-31T12:37:03.737681-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.591461 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-cfs6q\\\" (UniqueName: \\\"kubernetes.io/projected/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-kube-api-access-cfs6q\\\") pod \\\"coredns-5d78c9869d-cqczh\\\" (UID: \\\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\\\") \" pod=\"kube-system/coredns-5d78c9869d-cqczh\"\r\n"} +{"Time":"2023-05-31T12:37:03.737685-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.591534 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/470d3479-bc17-4adf-a413-9187556e44e4-config-volume\\\") pod \\\"coredns-5d78c9869d-7k25p\\\" (UID: \\\"470d3479-bc17-4adf-a413-9187556e44e4\\\") \" pod=\"kube-system/coredns-5d78c9869d-7k25p\"\r\n"} +{"Time":"2023-05-31T12:37:03.737771-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:11 custom-flannel-996000 kubelet[2347]: I0531 19:36:11.591595 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-config-volume\\\") pod \\\"coredns-5d78c9869d-cqczh\\\" (UID: \\\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\\\") \" pod=\"kube-system/coredns-5d78c9869d-cqczh\"\r\n"} +{"Time":"2023-05-31T12:37:03.737778-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:12 custom-flannel-996000 kubelet[2347]: I0531 19:36:12.120425 2347 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"5c426dd2aa5273c5bc0609f873ca30f94181fadd7b3d9268ffaff7cdd49a51ed\"\r\n"} +{"Time":"2023-05-31T12:37:03.737782-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:12 custom-flannel-996000 kubelet[2347]: I0531 19:36:12.125512 2347 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"5e0cc18ec958cb2835b78642c7f7e65f46e53fdb58f254912d86e3e01bba3baf\"\r\n"} +{"Time":"2023-05-31T12:37:03.737785-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:12 custom-flannel-996000 kubelet[2347]: I0531 19:36:12.514770 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.737788-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:12 custom-flannel-996000 kubelet[2347]: I0531 19:36:12.701725 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-tsnls\\\" (UniqueName: \\\"kubernetes.io/projected/8513a266-feb1-40a5-a378-f324b064495c-kube-api-access-tsnls\\\") pod \\\"storage-provisioner\\\" (UID: \\\"8513a266-feb1-40a5-a378-f324b064495c\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:37:03.737792-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:12 custom-flannel-996000 kubelet[2347]: I0531 19:36:12.701794 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/8513a266-feb1-40a5-a378-f324b064495c-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"8513a266-feb1-40a5-a378-f324b064495c\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:37:03.737795-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:13 custom-flannel-996000 kubelet[2347]: I0531 19:36:13.167149 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-cqczh\" podStartSLOduration=2.167118418 podCreationTimestamp=\"2023-05-31 19:36:11 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:13.167033807 +0000 UTC m=+14.501032917\" watchObservedRunningTime=\"2023-05-31 19:36:13.167118418 +0000 UTC m=+14.501117525\"\r\n"} +{"Time":"2023-05-31T12:37:03.737799-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:13 custom-flannel-996000 kubelet[2347]: I0531 19:36:13.211627 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-7k25p\" podStartSLOduration=2.211597864 podCreationTimestamp=\"2023-05-31 19:36:11 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:13.211411987 +0000 UTC m=+14.545411090\" watchObservedRunningTime=\"2023-05-31 19:36:13.211597864 +0000 UTC m=+14.545596983\"\r\n"} +{"Time":"2023-05-31T12:37:03.737904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:13 custom-flannel-996000 kubelet[2347]: I0531 19:36:13.211740 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-65z59\" podStartSLOduration=2.211725912 podCreationTimestamp=\"2023-05-31 19:36:11 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:13.180175942 +0000 UTC m=+14.514175054\" watchObservedRunningTime=\"2023-05-31 19:36:13.211725912 +0000 UTC m=+14.545725017\"\r\n"} +{"Time":"2023-05-31T12:37:03.737911-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:15 custom-flannel-996000 kubelet[2347]: I0531 19:36:15.235672 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=3.235633007 podCreationTimestamp=\"2023-05-31 19:36:12 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:14.219552577 +0000 UTC m=+15.553551686\" watchObservedRunningTime=\"2023-05-31 19:36:15.235633007 +0000 UTC m=+16.569632112\"\r\n"} +{"Time":"2023-05-31T12:37:03.737915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:19 custom-flannel-996000 kubelet[2347]: I0531 19:36:19.508550 2347 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:37:03.737918-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:19 custom-flannel-996000 kubelet[2347]: I0531 19:36:19.514476 2347 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:37:03.737921-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.222175 2347 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-flannel/kube-flannel-ds-pq6l8\" podStartSLOduration=8.735389623 podCreationTimestamp=\"2023-05-31 19:36:11 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:36:12.125006179 +0000 UTC m=+13.459005280\" lastFinishedPulling=\"2023-05-31 19:36:18.611764991 +0000 UTC m=+19.945764091\" observedRunningTime=\"2023-05-31 19:36:20.3431661 +0000 UTC m=+21.677165210\" watchObservedRunningTime=\"2023-05-31 19:36:26.222148434 +0000 UTC m=+27.556147539\"\r\n"} +{"Time":"2023-05-31T12:37:03.737925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.390508 2347 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-cfs6q\\\" (UniqueName: \\\"kubernetes.io/projected/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-kube-api-access-cfs6q\\\") pod \\\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\\\" (UID: \\\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\\\") \"\r\n"} +{"Time":"2023-05-31T12:37:03.737928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.390548 2347 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-config-volume\\\") pod \\\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\\\" (UID: \\\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\\\") \"\r\n"} +{"Time":"2023-05-31T12:37:03.73799-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: W0531 19:36:26.390806 2347 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/080b1fa2-a285-4cf1-881d-4ea5d6a2b820/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:37:03.738006-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.391025 2347 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\" (UID: \"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.73801-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.392975 2347 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-kube-api-access-cfs6q\" (OuterVolumeSpecName: \"kube-api-access-cfs6q\") pod \"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\" (UID: \"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\"). InnerVolumeSpecName \"kube-api-access-cfs6q\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.738014-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.427183 2347 scope.go:115] \"RemoveContainer\" containerID=\"36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\"\r\n"} +{"Time":"2023-05-31T12:37:03.738017-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.444389 2347 scope.go:115] \"RemoveContainer\" containerID=\"36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\"\r\n"} +{"Time":"2023-05-31T12:37:03.73802-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: E0531 19:36:26.445438 2347 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = Unknown desc = Error: No such container: 36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\" containerID=\"36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\"\r\n"} +{"Time":"2023-05-31T12:37:03.738023-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.445708 2347 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:docker ID:36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39} err=\"failed to get container status \\\"36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\\\": rpc error: code = Unknown desc = Error: No such container: 36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39\"\r\n"} +{"Time":"2023-05-31T12:37:03.738026-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.490923 2347 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-cfs6q\\\" (UniqueName: \\\"kubernetes.io/projected/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-kube-api-access-cfs6q\\\") on node \\\"custom-flannel-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:37:03.738077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.491003 2347 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/080b1fa2-a285-4cf1-881d-4ea5d6a2b820-config-volume\\\") on node \\\"custom-flannel-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:37:03.738082-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 kubelet[2347]: I0531 19:36:26.905059 2347 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=080b1fa2-a285-4cf1-881d-4ea5d6a2b820 path=\"/var/lib/kubelet/pods/080b1fa2-a285-4cf1-881d-4ea5d6a2b820/volumes\"\r\n"} +{"Time":"2023-05-31T12:37:03.738085-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:27 custom-flannel-996000 kubelet[2347]: I0531 19:36:27.448246 2347 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"97ca01e881480aa6ac6155c5960b32bbfafa2ae3a2a34c12950540bbca1a3c8d\"\r\n"} +{"Time":"2023-05-31T12:37:03.738088-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:30 custom-flannel-996000 kubelet[2347]: I0531 19:36:30.995551 2347 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:03.738091-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:30 custom-flannel-996000 kubelet[2347]: E0531 19:36:30.996083 2347 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:37:03.738094-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:30 custom-flannel-996000 kubelet[2347]: I0531 19:36:30.996156 2347 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"080b1fa2-a285-4cf1-881d-4ea5d6a2b820\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:37:03.738098-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:31 custom-flannel-996000 kubelet[2347]: I0531 19:36:31.124004 2347 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-nmk5d\\\" (UniqueName: \\\"kubernetes.io/projected/341c63d3-54e7-440b-ab97-bf98f67ef93d-kube-api-access-nmk5d\\\") pod \\\"netcat-7458db8b8-2tln8\\\" (UID: \\\"341c63d3-54e7-440b-ab97-bf98f67ef93d\\\") \" pod=\"default/netcat-7458db8b8-2tln8\"\r\n"} +{"Time":"2023-05-31T12:37:03.738101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.738104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.738106-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:37:03.738108-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:37:03.738201-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:37:03.738206-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:37:03.738212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:37:03.738217-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:37:03.73822-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:37:03.738222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:37:03.738225-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:37:03.738227-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:37:03.738229-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:37:03.738232-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user: system:node:custom-flannel-996000\r\n"} +{"Time":"2023-05-31T12:37:03.738234-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: system:node:custom-flannel-996000@mk\r\n"} +{"Time":"2023-05-31T12:37:03.738237-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: system:node:custom-flannel-996000@mk\r\n"} +{"Time":"2023-05-31T12:37:03.738239-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:37:03.738241-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:37:03.738243-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users:\r\n"} +{"Time":"2023-05-31T12:37:03.738246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - name: system:node:custom-flannel-996000\r\n"} +{"Time":"2023-05-31T12:37:03.738333-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user:\r\n"} +{"Time":"2023-05-31T12:37:03.738341-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:37:03.738345-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:37:03.738348-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.738352-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.738356-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:37:03.73836-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:37:03.738364-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:37:03.738367-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:37:03.73837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:37:03.738374-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:37:03.738379-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738382-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:37:03.738386-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:37:03.738389-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:37:03.738392-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:37:03.738395-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:37:03.738398-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:37:03.738402-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738405-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738407-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:37:03.738419-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:37:03.738422-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:37:03.738426-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:37:03.73858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.738596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738599-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:37:03.738602-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:37:03.738604-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:37:03.738606-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:37:03.738609-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738611-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:37:03.738614-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738616-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:37:03.738618-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:37:03.73862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:37:03.738623-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738625-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:37:03.738627-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738629-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:37:03.738633-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:37:03.738635-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:37:03.738637-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" options:\r\n"} +{"Time":"2023-05-31T12:37:03.738639-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" json:\r\n"} +{"Time":"2023-05-31T12:37:03.738642-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:37:03.738644-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:37:03.738646-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:37:03.738648-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738651-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738653-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:37:03.738751-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:37:03.738758-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738761-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738763-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:37:03.738766-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738768-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.73877-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:37:03.738773-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.738775-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.738777-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:37:03.73878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.738782-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T12:37:03.738784-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:37:03.738787-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:37:03.73879-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T12:37:03.738792-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T12:37:03.738794-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" last-update: Wed, 31 May 2023 12:36:11 PDT\n"} +{"Time":"2023-05-31T12:37:03.738796-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.738799-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:37:03.738801-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:37:03.738803-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://127.0.0.1:52651\n"} +{"Time":"2023-05-31T12:37:03.738805-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.738807-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:37:03.73881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:37:03.738814-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T12:37:03.738883-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T12:37:03.738887-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" last-update: Wed, 31 May 2023 12:36:37 PDT\n"} +{"Time":"2023-05-31T12:37:03.73889-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.738893-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:37:03.738895-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:37:03.738897-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://127.0.0.1:52699\n"} +{"Time":"2023-05-31T12:37:03.7389-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: false-996000\n"} +{"Time":"2023-05-31T12:37:03.738903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts:\n"} +{"Time":"2023-05-31T12:37:03.738906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - context:\n"} +{"Time":"2023-05-31T12:37:03.738909-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cluster: custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.738913-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T12:37:03.738915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T12:37:03.738917-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" last-update: Wed, 31 May 2023 12:36:11 PDT\n"} +{"Time":"2023-05-31T12:37:03.738919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.738921-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:37:03.738923-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:37:03.738925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:37:03.738927-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user: custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.73893-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.738933-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - context:\n"} +{"Time":"2023-05-31T12:37:03.738937-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cluster: false-996000\n"} +{"Time":"2023-05-31T12:37:03.738941-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T12:37:03.738944-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T12:37:03.738991-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" last-update: Wed, 31 May 2023 12:36:37 PDT\n"} +{"Time":"2023-05-31T12:37:03.738995-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.738997-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:37:03.739001-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:37:03.739003-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:37:03.739005-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user: false-996000\n"} +{"Time":"2023-05-31T12:37:03.739008-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: false-996000\n"} +{"Time":"2023-05-31T12:37:03.73901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: false-996000\n"} +{"Time":"2023-05-31T12:37:03.739014-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:37:03.739016-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:37:03.739018-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users:\n"} +{"Time":"2023-05-31T12:37:03.739021-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - name: custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:03.739023-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user:\n"} +{"Time":"2023-05-31T12:37:03.739026-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt\n"} +{"Time":"2023-05-31T12:37:03.739028-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.key\n"} +{"Time":"2023-05-31T12:37:03.739031-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - name: false-996000\n"} +{"Time":"2023-05-31T12:37:03.739033-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user:\n"} +{"Time":"2023-05-31T12:37:03.739035-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt\n"} +{"Time":"2023-05-31T12:37:03.739037-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.key\n"} +{"Time":"2023-05-31T12:37:03.73904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.739042-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.739044-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:37:03.739047-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.739049-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" items:\n"} +{"Time":"2023-05-31T12:37:03.739142-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.739147-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.73915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:03.739153-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.739155-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:03.739158-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:03.73916-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:03.739162-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:03.739165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:03.739167-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:03.739169-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:03.739172-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:03.739175-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:03.739177-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:03.739179-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:03.739181-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:03.739183-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:03.739185-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:03.739187-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:03.739189-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:03.739192-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:03.739195-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.739271-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.739288-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.73929-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:03.739302-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:03.739305-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:03.739308-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:03.739311-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:03.739316-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:36:10Z\"\n"} +{"Time":"2023-05-31T12:37:03.73932-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.739323-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:37:03.739325-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"306\"\n"} +{"Time":"2023-05-31T12:37:03.739331-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: e2d7387b-21a7-4f53-99ec-7edb45324a2d\n"} +{"Time":"2023-05-31T12:37:03.739334-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.739337-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.739341-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni-conf.json: |\n"} +{"Time":"2023-05-31T12:37:03.739344-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\n"} +{"Time":"2023-05-31T12:37:03.739348-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"name\": \"cbr0\",\n"} +{"Time":"2023-05-31T12:37:03.739351-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"cniVersion\": \"0.3.1\",\n"} +{"Time":"2023-05-31T12:37:03.739355-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"plugins\": [\n"} +{"Time":"2023-05-31T12:37:03.739359-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\n"} +{"Time":"2023-05-31T12:37:03.739365-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"flannel\",\n"} +{"Time":"2023-05-31T12:37:03.739371-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"delegate\": {\n"} +{"Time":"2023-05-31T12:37:03.739373-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"hairpinMode\": true,\n"} +{"Time":"2023-05-31T12:37:03.739377-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"isDefaultGateway\": true\n"} +{"Time":"2023-05-31T12:37:03.739381-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.739384-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\n"} +{"Time":"2023-05-31T12:37:03.739388-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\n"} +{"Time":"2023-05-31T12:37:03.739393-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"portmap\",\n"} +{"Time":"2023-05-31T12:37:03.739396-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"capabilities\": {\n"} +{"Time":"2023-05-31T12:37:03.739401-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"portMappings\": true\n"} +{"Time":"2023-05-31T12:37:03.739404-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.739407-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.739409-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\n"} +{"Time":"2023-05-31T12:37:03.739411-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.739413-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net-conf.json: |\n"} +{"Time":"2023-05-31T12:37:03.739416-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\n"} +{"Time":"2023-05-31T12:37:03.739419-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"Network\": \"10.244.0.0/16\",\n"} +{"Time":"2023-05-31T12:37:03.739437-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"Backend\": {\n"} +{"Time":"2023-05-31T12:37:03.739445-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"Type\": \"vxlan\"\n"} +{"Time":"2023-05-31T12:37:03.739447-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.73945-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.739452-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.739455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.739457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:03.739459-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubectl.kubernetes.io/last-applied-configuration: |\n"} +{"Time":"2023-05-31T12:37:03.739462-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\"apiVersion\":\"v1\",\"data\":{\"cni-conf.json\":\"{\\n \\\"name\\\": \\\"cbr0\\\",\\n \\\"cniVersion\\\": \\\"0.3.1\\\",\\n \\\"plugins\\\": [\\n {\\n \\\"type\\\": \\\"flannel\\\",\\n \\\"delegate\\\": {\\n \\\"hairpinMode\\\": true,\\n \\\"isDefaultGateway\\\": true\\n }\\n },\\n {\\n \\\"type\\\": \\\"portmap\\\",\\n \\\"capabilities\\\": {\\n \\\"portMappings\\\": true\\n }\\n }\\n ]\\n}\\n\",\"net-conf.json\":\"{\\n \\\"Network\\\": \\\"10.244.0.0/16\\\",\\n \\\"Backend\\\": {\\n \\\"Type\\\": \\\"vxlan\\\"\\n }\\n}\\n\"},\"kind\":\"ConfigMap\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"flannel\",\"tier\":\"node\"},\"name\":\"kube-flannel-cfg\",\"namespace\":\"kube-flannel\"}}\n"} +{"Time":"2023-05-31T12:37:03.739468-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:36:00Z\"\n"} +{"Time":"2023-05-31T12:37:03.739471-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" labels:\n"} +{"Time":"2023-05-31T12:37:03.739473-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" app: flannel\n"} +{"Time":"2023-05-31T12:37:03.739486-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier: node\n"} +{"Time":"2023-05-31T12:37:03.73949-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T12:37:03.739492-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-flannel\n"} +{"Time":"2023-05-31T12:37:03.739494-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"268\"\n"} +{"Time":"2023-05-31T12:37:03.739498-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: c843ce0b-36e2-4164-849a-630bff71e5f0\n"} +{"Time":"2023-05-31T12:37:03.739501-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.739504-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.739507-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:03.739511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.739523-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:03.73953-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:03.739532-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:03.739535-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:03.739538-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:03.73954-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:03.739542-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:03.739544-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:03.739547-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:03.739549-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:03.739551-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:03.739558-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:03.739562-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:03.739567-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:03.739569-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:03.739572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:03.739574-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:03.739577-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.73958-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.739592-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.7396-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:03.739604-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:03.739608-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:03.739612-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:03.739617-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:03.739621-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:36:10Z\"\n"} +{"Time":"2023-05-31T12:37:03.739625-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.739629-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-flannel\n"} +{"Time":"2023-05-31T12:37:03.739633-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"311\"\n"} +{"Time":"2023-05-31T12:37:03.739637-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 4ce6fac0-74f8-4349-a469-8c7969dd6e18\n"} +{"Time":"2023-05-31T12:37:03.739641-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.739643-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.739645-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:03.739647-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.73965-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:03.739652-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:03.739655-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:03.739659-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:03.739662-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:03.739667-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:03.739671-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:03.739675-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:03.739679-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:03.739683-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:03.739686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:03.739688-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:03.739691-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:03.739741-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:03.739748-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:03.739753-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:03.739756-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:03.73976-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.739764-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.739767-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.739771-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:03.739775-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:03.739779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:03.739783-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:03.739788-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:03.739791-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:36:10Z\"\n"} +{"Time":"2023-05-31T12:37:03.739796-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.739799-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:37:03.739804-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"315\"\n"} +{"Time":"2023-05-31T12:37:03.739808-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 7ac9e3aa-8cea-431f-ada0-21c7aee5c991\n"} +{"Time":"2023-05-31T12:37:03.739812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.739816-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.73982-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" jws-kubeconfig-3sugqr: eyJhbGciOiJIUzI1NiIsImtpZCI6IjNzdWdxciJ9..LdKDzx9wZlaWyAvrQ7ef3qgbZ2LzUrj9eFxHrd2ules\n"} +{"Time":"2023-05-31T12:37:03.739858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:37:03.739862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.739864-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T12:37:03.739867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:37:03.739872-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:37:03.739878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"FLWk9LdUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\n"} +{"Time":"2023-05-31T12:37:03.739881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:37:03.739884-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:37:03.739886-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:37:03.739888-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:37:03.73989-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:37:03.739892-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:37:03.739895-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users: null\n"} +{"Time":"2023-05-31T12:37:03.739899-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.739902-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.739905-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:35:58Z\"\n"} +{"Time":"2023-05-31T12:37:03.740101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:37:03.740109-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:37:03.740145-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"319\"\n"} +{"Time":"2023-05-31T12:37:03.740151-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 8a64fdec-fde3-4ef2-b0b6-d35f4fd607d4\n"} +{"Time":"2023-05-31T12:37:03.740154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.740156-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.740158-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:03.740161-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.740166-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:03.74017-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:03.740173-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:03.740176-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:03.740178-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:03.740183-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:03.740186-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:03.740189-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:03.740192-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:03.740195-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:03.740197-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:03.740199-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:03.740202-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:03.740206-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:03.740209-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:03.740212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:03.740215-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:03.740219-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.740223-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.740226-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.740229-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:03.740232-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:03.740235-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:03.740238-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:03.74024-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:03.740243-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:36:10Z\"\n"} +{"Time":"2023-05-31T12:37:03.740245-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.740248-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:37:03.740251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"317\"\n"} +{"Time":"2023-05-31T12:37:03.740256-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 53fcdd85-d6c3-4cde-b00c-1280db9bc855\n"} +{"Time":"2023-05-31T12:37:03.740259-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.740263-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.740265-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:37:03.740267-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:37:03.74027-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" log\n"} +{"Time":"2023-05-31T12:37:03.740272-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" errors\n"} +{"Time":"2023-05-31T12:37:03.740328-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" health {\n"} +{"Time":"2023-05-31T12:37:03.740334-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:37:03.740337-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.740341-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ready\n"} +{"Time":"2023-05-31T12:37:03.740344-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:37:03.740348-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:37:03.740351-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:37:03.740353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:37:03.740355-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.740358-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:37:03.74036-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hosts {\n"} +{"Time":"2023-05-31T12:37:03.740362-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:37:03.740364-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:37:03.740366-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.740369-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:37:03.740371-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:37:03.740374-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.740377-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cache 30\n"} +{"Time":"2023-05-31T12:37:03.740379-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" loop\n"} +{"Time":"2023-05-31T12:37:03.740381-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" reload\n"} +{"Time":"2023-05-31T12:37:03.740383-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:37:03.740386-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T12:37:03.740389-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.740391-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.740393-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:35:58Z\"\n"} +{"Time":"2023-05-31T12:37:03.740505-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:37:03.740512-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.740514-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"361\"\n"} +{"Time":"2023-05-31T12:37:03.740517-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 0b29cf66-e094-4afa-b073-6796b134b37d\n"} +{"Time":"2023-05-31T12:37:03.740519-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.740521-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.740524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:37:03.740526-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.740528-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:03.740531-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:03.740533-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:03.740536-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:03.740538-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:03.740541-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:03.740543-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:03.740545-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:03.740548-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:03.740551-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:03.740553-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:03.740555-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:03.740557-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:03.740562-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:03.740789-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:03.740794-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:03.740797-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:03.7408-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.740813-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:37:03.740818-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:37:03.740821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.740823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:37:03.740825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM1NDlaFw0zMzA1MjgxOTM1NDlaMBkxFzAV\n"} +{"Time":"2023-05-31T12:37:03.740827-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:37:03.740829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CgKCAQEA4dkZxUWzkImXCVvHXWtg1F5psSsx41oVSC9hpkFSUauabJ6waNQmRRoJ\n"} +{"Time":"2023-05-31T12:37:03.740832-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" F4nVBsnoJFcXzh1EO50DxGpue4INVhndWOB/PoChzKIxnlEBSRJk9ldqUY4vu/9J\n"} +{"Time":"2023-05-31T12:37:03.740834-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bCiFRwBA/LjyYG9/AuyRS7z/In/fitmZwYP6GArU2ZS7rhgxtld84LjO4Wgt75LM\n"} +{"Time":"2023-05-31T12:37:03.740837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" +x2S8p6TdtlJyz2Ik8P0AYfJJPDj3kXLeF1WTthmseAnMRQrN8gyqok3HaKdMnah\n"} +{"Time":"2023-05-31T12:37:03.740839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 9rDY48CRlO6efhTjgWxygw66OnWdE7Sg6p0gE1aHvWqlYW7dH6reHpk0xN5Npc2n\n"} +{"Time":"2023-05-31T12:37:03.740841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LbgwULxmkE0FMjeu39peTLAHo7yUaQIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:37:03.740844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU0pAW4xYF4PCMOIOqjTAqgTwzN70w\n"} +{"Time":"2023-05-31T12:37:03.740846-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBALGF\n"} +{"Time":"2023-05-31T12:37:03.740849-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" jQa4QdU/beWSB6hezyh69dVTzTtF061l24J8OTkkJ+cxFxL9Vw0iLdd+edRKvdOq\n"} +{"Time":"2023-05-31T12:37:03.740852-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TOh6jJ13sZQPKYcFDL8Z/kjXkID4LRk0vLNiXE6GRVaXBCnwIWaAUlpC3a5OxONe\n"} +{"Time":"2023-05-31T12:37:03.741008-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WhFwsvZc4ZIuH6Z36V41Hx/vErknZ0sUrLMQV6K9EFX/vuaQG3c0gct+W3lJyp+M\n"} +{"Time":"2023-05-31T12:37:03.741016-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" YU2/b4sG/PqJoBxd/hLfA2DAgNYvjf0r1sWSLlD5DtkF4OQQVZgPce8ytpl+wWHy\n"} +{"Time":"2023-05-31T12:37:03.741018-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" JykVfbFQOxQ6iVPfjW7WrLnpBSYLlOxuXu3vXyPt+tKHqSbLkF7L8QZc6DJqXS0p\n"} +{"Time":"2023-05-31T12:37:03.74102-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PCQ+VGPNAjTwGNSaoxg=\n"} +{"Time":"2023-05-31T12:37:03.741023-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.741025-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:37:03.741028-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:37:03.741031-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:37:03.741033-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.741035-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.741037-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:35:54Z\"\n"} +{"Time":"2023-05-31T12:37:03.74104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:37:03.741042-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.741044-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"36\"\n"} +{"Time":"2023-05-31T12:37:03.741047-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 8bcb6431-dfce-44f4-ae2b-8bec1631df47\n"} +{"Time":"2023-05-31T12:37:03.741049-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.741051-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.741054-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:37:03.741056-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.741058-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.74106-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:35:54Z\"\n"} +{"Time":"2023-05-31T12:37:03.741063-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:37:03.741065-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.741067-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"21\"\n"} +{"Time":"2023-05-31T12:37:03.741233-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 208a5867-37ea-4ad5-82f8-2c484a8028c8\n"} +{"Time":"2023-05-31T12:37:03.74124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.741246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.741251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:37:03.741255-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:37:03.741258-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:37:03.741261-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:37:03.741265-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:37:03.741268-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741272-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:37:03.741277-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741285-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:37:03.74129-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:37:03.741294-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:37:03.741297-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.741303-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:37:03.741309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:37:03.741317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" min: null\n"} +{"Time":"2023-05-31T12:37:03.741323-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:03.741327-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:03.74133-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:37:03.741334-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741349-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741352-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741356-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:37:03.741444-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741458-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" iptables:\n"} +{"Time":"2023-05-31T12:37:03.74147-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:37:03.741478-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:37:03.74148-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:37:03.741484-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.741486-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.741488-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:37:03.741491-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:37:03.741493-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.741496-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741498-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:37:03.7415-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.741502-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:03.741505-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:03.741507-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:03.741509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:37:03.741511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:37:03.741515-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741517-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:37:03.74152-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:37:03.741522-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:37:03.741529-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:37:03.74165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:37:03.741654-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741657-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741659-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:37:03.741663-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:37:03.741666-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.741668-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:37:03.74167-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T12:37:03.741672-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:37:03.741674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:37:03.741677-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:37:03.741679-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: default\n"} +{"Time":"2023-05-31T12:37:03.741681-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts:\n"} +{"Time":"2023-05-31T12:37:03.741683-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - context:\n"} +{"Time":"2023-05-31T12:37:03.741685-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:37:03.741687-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:37:03.741689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user: default\n"} +{"Time":"2023-05-31T12:37:03.741691-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: default\n"} +{"Time":"2023-05-31T12:37:03.741693-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:37:03.741696-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users:\n"} +{"Time":"2023-05-31T12:37:03.741698-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - name: default\n"} +{"Time":"2023-05-31T12:37:03.741701-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user:\n"} +{"Time":"2023-05-31T12:37:03.741703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:37:03.741705-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.741862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.741869-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:35:58Z\"\n"} +{"Time":"2023-05-31T12:37:03.741873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" labels:\n"} +{"Time":"2023-05-31T12:37:03.741876-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.741879-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:37:03.741884-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.741887-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"240\"\n"} +{"Time":"2023-05-31T12:37:03.74189-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 0fa6ba8b-3538-4a65-86c8-272951262d7d\n"} +{"Time":"2023-05-31T12:37:03.741894-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.741898-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.741901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:03.741903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.741906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:03.741908-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:03.741911-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:03.741913-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:03.741916-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:03.741918-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:03.74192-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:03.741923-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:03.741925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:03.741927-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:03.74193-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:03.74204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:03.742047-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:03.742051-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:03.74207-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:03.742083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:03.742089-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:03.742092-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:03.742094-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.742096-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.7421-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:03.742102-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:03.742104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:03.742106-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:03.742108-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:03.742111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:36:10Z\"\n"} +{"Time":"2023-05-31T12:37:03.742113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:03.742115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.742118-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"318\"\n"} +{"Time":"2023-05-31T12:37:03.74212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: bbae782b-12c2-4076-8c8f-0d36f3ac7c47\n"} +{"Time":"2023-05-31T12:37:03.742122-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.742126-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.742128-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:37:03.742247-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:37:03.742252-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:37:03.742257-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:37:03.742262-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - localhost\n"} +{"Time":"2023-05-31T12:37:03.742266-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - 192.168.76.2\n"} +{"Time":"2023-05-31T12:37:03.742269-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:37:03.74228-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:37:03.742285-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:37:03.742289-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:37:03.742292-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:37:03.742294-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:37:03.742297-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:37:03.742301-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:37:03.742303-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:37:03.742307-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:37:03.74231-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:37:03.742312-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:37:03.742314-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:37:03.742316-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" etcd:\n"} +{"Time":"2023-05-31T12:37:03.742319-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" local:\n"} +{"Time":"2023-05-31T12:37:03.742321-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:37:03.742324-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:37:03.742327-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:37:03.742331-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:37:03.742433-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:37:03.742439-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:37:03.742442-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" networking:\n"} +{"Time":"2023-05-31T12:37:03.742444-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:37:03.742446-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:37:03.742448-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:37:03.74245-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:37:03.742452-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:37:03.742455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:37:03.742457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.74246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.742462-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:35:57Z\"\n"} +{"Time":"2023-05-31T12:37:03.742464-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:37:03.742466-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.742468-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"199\"\n"} +{"Time":"2023-05-31T12:37:03.742471-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 7e8b4d01-0188-415a-8083-06261c710f4d\n"} +{"Time":"2023-05-31T12:37:03.742473-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:03.742475-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:37:03.742477-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:37:03.74248-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:37:03.742482-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authentication:\n"} +{"Time":"2023-05-31T12:37:03.742484-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:37:03.742486-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:37:03.742488-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" webhook:\n"} +{"Time":"2023-05-31T12:37:03.74249-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:37:03.742627-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:37:03.742634-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" x509:\n"} +{"Time":"2023-05-31T12:37:03.742639-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:37:03.742642-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authorization:\n"} +{"Time":"2023-05-31T12:37:03.742647-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:37:03.742651-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" webhook:\n"} +{"Time":"2023-05-31T12:37:03.742655-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:37:03.742659-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:37:03.742663-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:37:03.742667-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:37:03.74267-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:37:03.742674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:37:03.742678-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:37:03.742682-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.742685-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:37:03.742689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:37:03.742692-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:37:03.742696-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:37:03.7427-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.742703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:37:03.742708-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:03.742711-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:37:03.742716-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:37:03.74272-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:37:03.742725-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:03.74283-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:37:03.742839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:37:03.742844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:37:03.742848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" logging:\n"} +{"Time":"2023-05-31T12:37:03.742852-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:37:03.742856-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" options:\n"} +{"Time":"2023-05-31T12:37:03.742859-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" json:\n"} +{"Time":"2023-05-31T12:37:03.742862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:37:03.742866-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:37:03.74287-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:37:03.742873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:03.742877-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:03.74288-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:37:03.742884-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:37:03.742888-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.742892-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:37:03.742895-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:37:03.742899-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:03.742903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:03.742906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:03.74291-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:03.742914-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.742918-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:35:57Z\"\n"} +{"Time":"2023-05-31T12:37:03.742921-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:37:03.742925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:03.743092-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"202\"\n"} +{"Time":"2023-05-31T12:37:03.7431-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 91bd415c-6c1c-4f29-ba5c-6991f3508bdc\n"} +{"Time":"2023-05-31T12:37:03.743104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: List\n"} +{"Time":"2023-05-31T12:37:03.743107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:03.743111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:37:03.743114-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.743118-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.743122-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:37:03.743126-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:03.74313-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: loaded (\u001b]8;;file://custom-flannel-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:03.743134-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:35:46 UTC; 1min 10s ago\r\n"} +{"Time":"2023-05-31T12:37:03.743138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:37:03.743141-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:03.743145-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Main PID: 1036 (dockerd)\r\n"} +{"Time":"2023-05-31T12:37:03.743152-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tasks: 22\r\n"} +{"Time":"2023-05-31T12:37:03.743155-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Memory: 251.4M\r\n"} +{"Time":"2023-05-31T12:37:03.743158-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CPU: 12.219s\r\n"} +{"Time":"2023-05-31T12:37:03.743162-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:37:03.743166-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─1036 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:37:03.74317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743176-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:45 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:35:45.976671744Z\" level=info msg=\"Daemon has completed initialization\"\r\n"} +{"Time":"2023-05-31T12:37:03.743272-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:46 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:35:46.012556870Z\" level=info msg=\"API listen on [::]:2376\"\r\n"} +{"Time":"2023-05-31T12:37:03.743281-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:46 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:35:46.012625492Z\" level=info msg=\"API listen on /var/run/docker.sock\"\r\n"} +{"Time":"2023-05-31T12:37:03.743286-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:35:46 custom-flannel-996000 systemd[1]: Started Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T12:37:03.743291-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:14 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:36:14.454359148Z\" level=info msg=\"ignoring event\" container=5bc3184181039da8e132332dfaf269d8ddd8eab67c0a7a5090b5993b74e30d02 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:37:03.743296-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:18 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:36:18.764089826Z\" level=info msg=\"ignoring event\" container=2cfc6e66c5ef8074c8362fc24ab5471a8fc5d6c08f6533cf6cc3d05ec9058a37 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:37:03.7433-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:36:26.037475676Z\" level=info msg=\"ignoring event\" container=36d40875cbfa2c211687ec348468dcd0d729d6e3fa834c6df4df7b87684c0f39 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:37:03.743308-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:26 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:36:26.142784377Z\" level=info msg=\"ignoring event\" container=717b36588e3b2b3896c65827905c5f76d1aa90570228916fdbbf181c136752bb module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:37:03.743312-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:27 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:36:27.033479051Z\" level=info msg=\"ignoring event\" container=3fc85d246994e715678e2a7b0b9d82f44c8dd6fa0daa518a4629e1c51d7ef394 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:37:03.743317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:27 custom-flannel-996000 dockerd[1036]: time=\"2023-05-31T19:36:27.086320174Z\" level=info msg=\"ignoring event\" container=97ca01e881480aa6ac6155c5960b32bbfafa2ae3a2a34c12950540bbca1a3c8d module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:37:03.743322-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.743325-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.743328-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:37:03.743471-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.743487-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:03.743491-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:03.743493-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:37:03.743496-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:37:03.743499-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:37:03.743503-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:03.743506-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:37:03.743509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:37:03.743511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:37:03.743524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743528-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.74353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:03.743532-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:37:03.743536-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743538-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.74354-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743542-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:37:03.743545-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:37:03.743548-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:37:03.743551-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:37:03.743553-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:37:03.743555-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:37:03.743651-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:37:03.74366-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743665-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:37:03.743669-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:37:03.743673-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:37:03.743686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:37:03.743719-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:37:03.743727-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743731-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:03.743736-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:03.74374-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.743745-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.743748-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.743752-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743756-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:37:03.743759-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:37:03.743761-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.743763-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:37:03.743766-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743768-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:37:03.74377-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:03.743772-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.74389-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:37:03.743897-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:03.743901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.743904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:03.743917-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:03.743923-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.743925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.743928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:37:03.74393-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:03.743932-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:37:03.743935-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:37:03.743938-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:37:03.74394-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:37:03.743943-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:03.743945-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:37:03.743947-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:03.743954-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.743957-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.743959-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:37:03.743961-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:37:03.743963-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:37:03.743966-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:37:03.743968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:37:03.74397-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:37:03.743973-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:37:03.743975-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:37:03.744098-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:37:03.744142-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.744168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:37:03.744172-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers: 23\r\n"} +{"Time":"2023-05-31T12:37:03.744175-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Running: 18\r\n"} +{"Time":"2023-05-31T12:37:03.744179-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:37:03.744182-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Stopped: 5\r\n"} +{"Time":"2023-05-31T12:37:03.744186-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Images: 11\r\n"} +{"Time":"2023-05-31T12:37:03.74419-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:37:03.744193-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:37:03.744197-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:37:03.744201-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:37:03.744204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:37:03.744208-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:37:03.744211-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:37:03.744215-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:37:03.744219-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:37:03.744222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:37:03.744226-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:37:03.74423-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:37:03.744233-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:37:03.744237-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:37:03.744241-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:37:03.744246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Runtimes: io.containerd.runc.v2 runc\r\n"} +{"Time":"2023-05-31T12:37:03.74425-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:37:03.744378-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:37:03.744386-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:37:03.744391-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:37:03.744394-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:37:03.744399-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:37:03.744403-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:37:03.744417-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:37:03.744423-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:37:03.744426-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:37:03.744428-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:37:03.74443-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:37:03.744433-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:37:03.744435-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:37:03.744437-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:37:03.74444-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: custom-flannel-996000\r\n"} +{"Time":"2023-05-31T12:37:03.744442-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ID: a6b2a588-8ec8-4dd7-9c5a-85ef93c66568\r\n"} +{"Time":"2023-05-31T12:37:03.744444-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:37:03.744446-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:37:03.744448-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:37:03.744451-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:37:03.744453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:37:03.744455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:37:03.744457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:37:03.744459-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:37:03.744463-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:37:03.744465-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:37:03.744717-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.744726-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.744744-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.744767-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:37:03.744775-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:03.744778-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: loaded (\u001b]8;;file://custom-flannel-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:03.744782-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:37:03.744784-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─\u001b]8;;file://custom-flannel-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:03.744787-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:35:46 UTC; 1min 12s ago\r\n"} +{"Time":"2023-05-31T12:37:03.744789-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:37:03.744791-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:03.744794-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Main PID: 1257 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:37:03.744797-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tasks: 11\r\n"} +{"Time":"2023-05-31T12:37:03.744799-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Memory: 20.3M\r\n"} +{"Time":"2023-05-31T12:37:03.744801-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CPU: 1.749s\r\n"} +{"Time":"2023-05-31T12:37:03.744803-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:37:03.744806-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─1257 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:37:03.744809-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.744811-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:13 custom-flannel-996000 cri-dockerd[1257]: time=\"2023-05-31T19:36:13Z\" level=info msg=\"Failed to read pod IP from plugin/docker: networkPlugin cni failed on the status hook for pod \\\"coredns-5d78c9869d-7k25p_kube-system\\\": unexpected command output Device \\\"eth0\\\" does not exist.\\n with error: exit status 1\"\r\n"} +{"Time":"2023-05-31T12:37:03.744944-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:13 custom-flannel-996000 cri-dockerd[1257]: time=\"2023-05-31T19:36:13Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/0799ce9e0f1f76fe1784be5bc615184f1b5ef1cca032d245839d086610d690ce/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:03.744953-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:14 custom-flannel-996000 cri-dockerd[1257]: time=\"2023-05-31T19:36:14Z\" level=info msg=\"Stop pulling image docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0: Status: Downloaded newer image for rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\"\r\n"} +{"Time":"2023-05-31T12:37:03.74496-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:18 custom-flannel-996000 cri-dockerd[1257]: time=\"2023-05-31T19:36:18Z\" level=info msg=\"Stop pulling image docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2: Status: Downloaded newer image for rancher/mirrored-flannelcni-flannel:v0.20.2\"\r\n"} +{"Time":"2023-05-31T12:37:03.744974-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:19 custom-flannel-996000 cri-dockerd[1257]: time=\"2023-05-31T19:36:19Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/24,},}\"\r\n"} +{"Time":"2023-05-31T12:37:03.74498-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:27 custom-flannel-996000 cri-dockerd[1257]: time=\"2023-05-31T19:36:27Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/73d0db0ce4e66a8eba2d6addbc0ab651c156b428a8837954ccd0a155ed234d09/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:03.744985-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:27 custom-flannel-996000 cri-dockerd[1257]: map[string]interface {}{\"cniVersion\":\"0.3.1\", \"hairpinMode\":true, \"ipMasq\":false, \"ipam\":map[string]interface {}{\"ranges\":[][]map[string]interface {}{[]map[string]interface {}{map[string]interface {}{\"subnet\":\"10.244.0.0/24\"}}}, \"routes\":[]types.Route{types.Route{Dst:net.IPNet{IP:net.IP{0xa, 0xf4, 0x0, 0x0}, Mask:net.IPMask{0xff, 0xff, 0x0, 0x0}}, GW:net.IP(nil)}}, \"type\":\"host-local\"}, \"isDefaultGateway\":true, \"isGateway\":true, \"mtu\":(*uint)(0xc0000b48e8), \"name\":\"cbr0\", \"type\":\"bridge\"}\r\n"} +{"Time":"2023-05-31T12:37:03.744995-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:31 custom-flannel-996000 cri-dockerd[1257]: {\"cniVersion\":\"0.3.1\",\"hairpinMode\":true,\"ipMasq\":false,\"ipam\":{\"ranges\":[[{\"subnet\":\"10.244.0.0/24\"}]],\"routes\":[{\"dst\":\"10.244.0.0/16\"}],\"type\":\"host-local\"},\"isDefaultGateway\":true,\"isGateway\":true,\"mtu\":65485,\"name\":\"cbr0\",\"type\":\"bridge\"}time=\"2023-05-31T19:36:31Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/ce929e72f350dc91d786ad57f8e66e7263a8e67668553d4bfc82f61dd331022a/resolv.conf as [nameserver 10.96.0.10 search default.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\r\n"} +{"Time":"2023-05-31T12:37:03.74501-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:31 custom-flannel-996000 cri-dockerd[1257]: map[string]interface {}{\"cniVersion\":\"0.3.1\", \"hairpinMode\":true, \"ipMasq\":false, \"ipam\":map[string]interface {}{\"ranges\":[][]map[string]interface {}{[]map[string]interface {}{map[string]interface {}{\"subnet\":\"10.244.0.0/24\"}}}, \"routes\":[]types.Route{types.Route{Dst:net.IPNet{IP:net.IP{0xa, 0xf4, 0x0, 0x0}, Mask:net.IPMask{0xff, 0xff, 0x0, 0x0}}, GW:net.IP(nil)}}, \"type\":\"host-local\"}, \"isDefaultGateway\":true, \"isGateway\":true, \"mtu\":(*uint)(0xc00012e8e8), \"name\":\"cbr0\", \"type\":\"bridge\"}\r\n"} +{"Time":"2023-05-31T12:37:03.745173-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:36 custom-flannel-996000 cri-dockerd[1257]: {\"cniVersion\":\"0.3.1\",\"hairpinMode\":true,\"ipMasq\":false,\"ipam\":{\"ranges\":[[{\"subnet\":\"10.244.0.0/24\"}]],\"routes\":[{\"dst\":\"10.244.0.0/16\"}],\"type\":\"host-local\"},\"isDefaultGateway\":true,\"isGateway\":true,\"mtu\":65485,\"name\":\"cbr0\",\"type\":\"bridge\"}time=\"2023-05-31T19:36:36Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:37:03.745182-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.745185-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.745188-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:37:03.745191-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.745193-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:03.745196-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:03.745199-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:37:03.745201-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:37:03.745204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:03.745206-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:37:03.745208-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745211-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.745213-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:03.745215-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:37:03.745218-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:37:03.74522-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:37:03.745222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:37:03.745224-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:03.745227-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745382-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:37:03.7454-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:37:03.745416-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:37:03.74542-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:37:03.745422-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745425-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:37:03.745427-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:37:03.745429-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:37:03.745433-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:37:03.745436-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745439-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:03.745443-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:03.745449-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.745454-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.745457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.745461-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745467-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:37:03.74547-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:37:03.745474-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.745477-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:03.745483-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:03.745485-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745487-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:03.745624-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:03.745632-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745636-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.745649-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.745655-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:37:03.745658-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:37:03.745661-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.745663-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.745666-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:37:03.745668-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.74567-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:37:03.745673-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:37:03.745675-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.745678-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:37:03.745681-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:03.745686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:03.745689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:37:03.745693-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:37:03.745696-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:03.745698-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:37:03.7457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745704-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.745707-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:03.745804-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:37:03.745811-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:37:03.745822-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:37:03.745834-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:37:03.745839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:03.745843-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745847-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:37:03.745851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:37:03.745855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:37:03.745859-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:37:03.745862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745866-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:37:03.74587-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:37:03.745874-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:37:03.745878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:37:03.745881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745886-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:03.745891-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:03.745894-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.745897-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.745901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.745904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.745906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:37:03.745909-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:37:03.746003-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.746012-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:03.746019-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:03.746025-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.746035-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:03.746039-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:03.746066-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.746075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.746079-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:37:03.746083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:37:03.746087-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.74609-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.746095-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:37:03.746098-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:37:03.746103-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: loaded (\u001b]8;;file://custom-flannel-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:03.746107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:35:45 UTC; 1min 15s ago\r\n"} +{"Time":"2023-05-31T12:37:03.746111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:03.746115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Main PID: 817 (containerd)\r\n"} +{"Time":"2023-05-31T12:37:03.746118-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tasks: 205\r\n"} +{"Time":"2023-05-31T12:37:03.746122-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Memory: 75.3M\r\n"} +{"Time":"2023-05-31T12:37:03.746126-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CPU: 3.326s\r\n"} +{"Time":"2023-05-31T12:37:03.74613-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:37:03.746134-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─ 817 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:37:03.746344-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─1893 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 7694d4aa0f88a57eac1ced3185cc0bc6b84f4b3fc671c450a30c8b8fb4a3c03a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746354-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─1908 /usr/bin/containerd-shim-runc-v2 -namespace moby -id cb0a582609fa1379f409bdbc5fe1f685def719b821e71e73aac2929c87d24c12 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746359-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─1952 /usr/bin/containerd-shim-runc-v2 -namespace moby -id bee8466eb593c18b4e9896a40143c2335040b04d213befee1fbb2c9d96df3923 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746363-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─1978 /usr/bin/containerd-shim-runc-v2 -namespace moby -id eec8e9823ec35fd3540c0b048c160e17848834fe296fb746782f7cba32981adf -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.74637-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─2075 /usr/bin/containerd-shim-runc-v2 -namespace moby -id e7a5ed10b97afd1a1b542c25b0398496bdae49110d4901fb8087cfe3c5348440 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746375-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─2098 /usr/bin/containerd-shim-runc-v2 -namespace moby -id bb2d4b9f03d1c18fbf0d4df2103817a219d46005c5199cefd537777d2827ab9f -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746379-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─2107 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 108956334e98523030887b8f7d628a664da7ebb559e18aed7c810c0f3dc39a87 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746383-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─2134 /usr/bin/containerd-shim-runc-v2 -namespace moby -id db2ff2f62611e9a969e424584b399cf321a8d98785caf547159c7fd5e811a27b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746388-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─2838 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5c426dd2aa5273c5bc0609f873ca30f94181fadd7b3d9268ffaff7cdd49a51ed -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746391-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─2860 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5e0cc18ec958cb2835b78642c7f7e65f46e53fdb58f254912d86e3e01bba3baf -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746396-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─2959 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 65cacc7b28f637ea940e5256f3ab84fb95a900fed22e4632da70365f263ed6e6 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746412-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─3311 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 0799ce9e0f1f76fe1784be5bc615184f1b5ef1cca032d245839d086610d690ce -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746418-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─3365 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 602affe758e3d995d8eb929b0b68ba341aaae17e36b11fcbeae48565a3049a5c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746827-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─3581 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 28e4fc43b34aed0de498c2f19e1bdf30a503d1fc2a3679924745a15022f51bf9 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746835-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─3976 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 73d0db0ce4e66a8eba2d6addbc0ab651c156b428a8837954ccd0a155ed234d09 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─4054 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 89648078b56f103423e71628c686f17e0d16e9b1f73ff89ab02a648c4f5a10df -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─4138 /usr/bin/containerd-shim-runc-v2 -namespace moby -id ce929e72f350dc91d786ad57f8e66e7263a8e67668553d4bfc82f61dd331022a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746864-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─4392 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5ae09fb09d04a86b3ffe97139e7c457bd16130d9b4d26a7bea2e82fb690bd195 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:03.746873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.746877-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:27 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:27.316689354Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:37:03.74689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:27 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:27.317119634Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/89648078b56f103423e71628c686f17e0d16e9b1f73ff89ab02a648c4f5a10df pid=4054 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:37:03.746898-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:31 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:31.339123219Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:37:03.746903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:31 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:31.339210670Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:37:03.746908-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:31 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:31.339220566Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:37:03.746912-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:31 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:31.339461013Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/ce929e72f350dc91d786ad57f8e66e7263a8e67668553d4bfc82f61dd331022a pid=4138 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:37:03.747237-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:36 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:36.790704929Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:37:03.747246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:36 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:36.790791669Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:37:03.747252-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:36 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:36.790802302Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:37:03.747258-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:36:36 custom-flannel-996000 containerd[817]: time=\"2023-05-31T19:36:36.791132975Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/5ae09fb09d04a86b3ffe97139e7c457bd16130d9b4d26a7bea2e82fb690bd195 pid=4392 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:37:03.747264-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.747268-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.747271-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:37:03.747275-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.74728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:37:03.747284-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.747288-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:37:03.747293-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:37:03.747297-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:37:03.747302-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.747305-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:37:03.747309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.747312-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:37:03.747631-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:37:03.747639-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:37:03.747644-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:37:03.747648-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:37:03.747654-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.747659-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:03.747663-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:37:03.747666-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:37:03.74767-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:37:03.747674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.747679-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.747683-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:37:03.74769-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:37:03.747693-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.747697-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:03.747701-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:03.747707-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:03.747711-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:03.747728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:37:03.747733-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:03.747737-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:03.74774-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.747743-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.747747-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.74775-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:37:03.747821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:37:03.747829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.747832-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:37:03.747836-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.747839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:03.747843-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:03.747848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.747855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.74786-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:37:03.747868-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:37:03.747873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.747879-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:37:03.747886-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:37:03.747892-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:37:03.747896-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.747899-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:37:03.747903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.747906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:37:03.747912-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:37:03.747916-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:37:03.747921-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:37:03.747924-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:37:03.747928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:03.748136-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:37:03.748146-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:37:03.748152-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:37:03.748156-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748161-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.748168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:37:03.748174-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:37:03.748178-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748181-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:03.748186-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:03.748189-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:03.748193-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:03.748196-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:37:03.748198-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:03.748201-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:03.748204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.748207-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.74821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.748213-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:37:03.748216-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:37:03.74822-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.748223-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:37:03.748229-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748236-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:03.7485-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:03.748505-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.748508-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.748511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:37:03.748515-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:37:03.748518-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:03.748521-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:03.748525-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:37:03.748527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:37:03.74853-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748532-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:37:03.748535-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:37:03.748537-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.748541-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.748545-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:37:03.748548-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:37:03.748551-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748558-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:37:03.748564-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.748568-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.748572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.748576-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.74858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748586-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:37:03.748593-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.748597-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:37:03.748599-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.74881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:37:03.748817-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.748821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:37:03.748829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:37:03.748833-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:37:03.748837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:37:03.748841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.748844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:37:03.748849-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:37:03.748862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:37:03.748867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:37:03.748871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:37:03.748875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:37:03.748879-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:37:03.748882-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.748885-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:37:03.74889-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:37:03.748894-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:37:03.748898-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.748901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:37:03.748906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.74891-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.748914-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.748918-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:37:03.749138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:03.749156-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:37:03.749165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:37:03.749169-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:37:03.749173-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.749187-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:37:03.749208-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:37:03.749215-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:37:03.749222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749227-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:37:03.74923-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:37:03.749234-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.749237-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:37:03.74924-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:37:03.749242-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:37:03.749244-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:37:03.749247-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:37:03.74925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:37:03.749253-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:37:03.749256-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:37:03.749261-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.749265-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.749269-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:37:03.749273-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:37:03.749539-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:37:03.749547-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:37:03.749551-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749555-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:37:03.749557-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:03.749559-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:03.749562-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749564-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:37:03.749567-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.74957-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:37:03.749572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749575-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.749579-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:37:03.749583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749586-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.74959-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.749593-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.7496-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.749604-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:37:03.749606-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:37:03.749608-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.749619-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:37:03.749628-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:37:03.749632-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.74965-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749768-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749776-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.74978-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.749783-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.749796-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:37:03.7498-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749802-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:37:03.749812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.74982-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:37:03.749824-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.749836-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:37:03.749839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:37:03.749842-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:37:03.749844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:37:03.749848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:37:03.749851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:37:03.749855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.749858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:37:03.749861-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:37:03.749864-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:37:03.749867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:37:03.749869-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:37:03.749871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:37:03.749873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:37:03.749876-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:37:03.749878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:37:03.749881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:37:03.749884-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:37:03.749888-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:37:03.749891-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:37:03.749893-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:37:03.749896-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:37:03.749898-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:37:03.7499-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:37:03.749903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:37:03.749906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:37:03.749914-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:37:03.749918-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.74992-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:37:03.749924-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:37:03.749928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:37:03.749931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749939-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.749946-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:37:03.749953-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:37:03.749959-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:37:03.749964-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.749967-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.74997-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:37:03.750102-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:37:03.750118-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.750121-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:37:03.750125-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:37:03.750128-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:37:03.750131-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:37:03.750135-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:37:03.750139-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750143-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:37:03.750146-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750151-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:37:03.750158-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:03.750162-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:03.750165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:03.750169-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750172-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750175-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750179-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750182-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750186-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:37:03.750189-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750195-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:37:03.750199-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:03.750473-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750476-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750479-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:37:03.750481-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:03.750484-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:03.750486-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:03.750488-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750491-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750493-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750495-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:37:03.750497-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750499-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:37:03.750502-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:37:03.750504-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750506-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:37:03.750511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750514-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750518-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:37:03.750523-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:03.750527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:03.75053-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:03.750534-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750831-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750835-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750842-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:37:03.750846-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750849-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:37:03.750853-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:37:03.750858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750861-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:37:03.750865-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:37:03.750868-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:37:03.750875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:37:03.750881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750885-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:37:03.750888-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750892-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:37:03.750895-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.750898-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:37:03.750902-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750905-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.750908-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75116-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:03.751173-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751176-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751181-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:37:03.751185-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751189-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751192-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:37:03.751196-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:37:03.751199-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751208-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:37:03.751212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751215-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751219-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:37:03.751223-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751226-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751231-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:37:03.751235-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.751239-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751243-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:37:03.751247-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:37:03.75125-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751254-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751257-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751475-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:37:03.751484-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751488-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751492-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751496-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751499-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751503-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751507-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75151-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751514-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751517-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751522-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751526-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751529-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751533-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751536-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:37:03.75154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751544-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:37:03.751558-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751569-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751591-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751599-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.75175-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751759-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751764-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751769-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:37:03.751773-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751777-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751782-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751785-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751789-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751793-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751798-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:37:03.751802-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751805-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751808-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:37:03.751813-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751817-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:37:03.75182-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751834-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:37:03.751844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:37:03.751847-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751908-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751918-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751924-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:37:03.751928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:37:03.751931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:37:03.751934-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751939-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:37:03.751942-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:37:03.751954-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:37:03.751962-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:37:03.751966-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:37:03.75197-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:37:03.751973-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.751976-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:37:03.751979-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.751982-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.751984-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:03.751986-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.751989-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.751991-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:37:03.751994-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:37:03.752082-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: loaded (\u001b]8;;file://custom-flannel-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:03.752098-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:37:03.752104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:03.752109-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:37:03.752111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.752113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.752115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:37:03.752118-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:03.75212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:03.752123-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:37:03.752125-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:37:03.752127-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:03.752129-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:37:03.752131-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:03.752152-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752156-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:03.752159-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:03.752161-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:37:03.752163-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:37:03.752165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:37:03.752167-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:37:03.75217-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:37:03.752172-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:37:03.752372-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:37:03.752385-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:37:03.752391-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:37:03.752394-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.752399-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:37:03.752403-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:37:03.752407-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:03.75241-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:37:03.752414-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:37:03.752417-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:37:03.75242-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752422-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:03.752426-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:03.75243-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:37:03.752433-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.752437-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.752441-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:37:03.752445-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:37:03.752449-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:03.752453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.752457-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:03.752462-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.752466-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:37:03.752469-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:37:03.752474-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.752644-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752662-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:37:03.752667-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.752669-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752671-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:37:03.752674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.752678-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:37:03.752685-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:37:03.752689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:37:03.752692-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:37:03.752696-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.7527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:37:03.752704-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752707-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:37:03.752711-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:37:03.752714-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:37:03.752718-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:37:03.752722-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752725-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:37:03.752727-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:37:03.75273-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:37:03.752732-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:37:03.752735-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:37:03.752876-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752882-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:37:03.752885-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:37:03.752887-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:37:03.75289-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752892-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:37:03.752895-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:37:03.752897-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752899-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:37:03.752902-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:37:03.752904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:37:03.752907-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752909-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:37:03.752911-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:37:03.752913-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:37:03.752915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.752918-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75292-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:37:03.752923-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:37:03.752925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:37:03.752927-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.752929-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:37:03.752931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:37:03.75309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:37:03.753097-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:37:03.753101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:37:03.753117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:37:03.75312-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:37:03.753122-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:37:03.753124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753127-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:37:03.753129-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:37:03.753132-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:37:03.753134-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:37:03.75314-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:37:03.753142-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:37:03.753144-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:37:03.753149-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753152-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:37:03.753156-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:37:03.75316-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753163-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:37:03.753168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:37:03.753319-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753328-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:37:03.753332-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:37:03.753336-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753339-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:37:03.753344-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:37:03.753349-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:37:03.753354-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753358-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:37:03.753361-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:37:03.753365-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753378-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:37:03.753384-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.753387-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753389-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:37:03.753395-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:37:03.753398-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:37:03.753402-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.753406-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753409-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:37:03.753413-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:37:03.753417-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.753421-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753424-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:37:03.75396-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:37:03.753968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:37:03.753971-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.753975-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.753979-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:37:03.753983-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:37:03.753986-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754001-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:37:03.754022-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:37:03.754026-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75403-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:37:03.754034-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:37:03.754037-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:37:03.754041-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754044-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:37:03.75405-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:37:03.754054-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:37:03.754059-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:37:03.754064-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:37:03.754068-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.754071-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754076-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:37:03.754516-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:37:03.754523-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:37:03.754545-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.75455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:37:03.754553-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754557-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:37:03.75456-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:37:03.754564-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:37:03.754568-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.754572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754577-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:37:03.754582-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:37:03.754586-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.754592-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754595-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:37:03.7546-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:37:03.754602-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:37:03.754605-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:37:03.754607-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.75461-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754613-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:37:03.754615-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:37:03.754618-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:37:03.754772-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:37:03.754791-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.754795-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754798-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:37:03.754801-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:37:03.754805-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754807-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:37:03.75481-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:37:03.754812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.754815-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.754819-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754822-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:37:03.754826-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:37:03.75483-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:37:03.754834-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:37:03.754838-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:37:03.754841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:37:03.75485-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:37:03.754854-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:37:03.754858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:37:03.754972-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.75498-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:37:03.754984-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.754989-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:37:03.754992-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:37:03.754996-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.755-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755003-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:37:03.755006-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:37:03.75501-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:37:03.755015-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755019-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:37:03.755023-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.755026-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.755029-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755033-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:37:03.755036-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:37:03.755039-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755052-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:37:03.75506-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.755066-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755076-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:37:03.755082-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:37:03.755085-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:37:03.755255-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:37:03.755265-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:37:03.75527-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:37:03.755274-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:37:03.755278-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:37:03.755281-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:37:03.755284-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:37:03.755287-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:37:03.75529-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:37:03.755293-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:37:03.755296-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.7553-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755304-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:37:03.755309-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:37:03.755313-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:37:03.755316-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75532-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:37:03.755323-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:37:03.755327-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:37:03.75533-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.755334-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755336-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:37:03.755339-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:37:03.755342-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:37:03.755471-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:37:03.755485-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.755489-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755493-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:37:03.755497-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:37:03.755501-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:37:03.755505-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:37:03.755509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:37:03.755514-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.755544-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755549-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:37:03.755551-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:37:03.755554-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:37:03.755558-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:37:03.755562-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.755564-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:37:03.755569-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:37:03.755571-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:37:03.755574-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:37:03.755576-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755578-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:37:03.75558-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:37:03.755584-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:37:03.755777-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:37:03.755785-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.755799-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755802-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:37:03.755806-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:37:03.755809-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:37:03.755812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.755814-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:37:03.755816-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:37:03.755819-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:37:03.755821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.755823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:37:03.755826-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:37:03.755829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:37:03.755832-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:37:03.755834-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.755836-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.755838-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.755841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:37:03.755843-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:37:03.755845-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:37:03.755848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75585-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:37:03.755996-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:37:03.756002-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:37:03.756006-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:37:03.75601-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:37:03.756014-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756017-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:37:03.756031-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:37:03.75604-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756044-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:37:03.756048-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:37:03.756052-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756057-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:37:03.756061-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:37:03.756064-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756069-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:37:03.756073-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.756079-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:37:03.756086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:37:03.756089-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756093-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:37:03.756097-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:37:03.756237-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.756246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:37:03.756251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756255-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:37:03.756259-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.756263-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.756267-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756271-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:37:03.756274-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:37:03.756279-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:37:03.756283-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.756286-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75629-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:37:03.756294-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:37:03.7563-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:37:03.756304-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.756308-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756312-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:37:03.756316-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:37:03.756324-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:37:03.756328-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:37:03.756332-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756336-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:37:03.756341-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:37:03.756579-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:37:03.756587-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:37:03.756591-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:37:03.7566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:37:03.756604-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:37:03.756608-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:37:03.756612-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756615-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:37:03.75662-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:37:03.756624-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:37:03.756628-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:37:03.756633-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:37:03.756636-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75664-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:37:03.756644-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:37:03.756648-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:37:03.756654-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.756658-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756661-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:37:03.756665-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:37:03.756669-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:37:03.756985-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.756993-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:37:03.756997-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.757002-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757006-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:37:03.757011-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:37:03.757015-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:37:03.757019-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.757023-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757027-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:37:03.757031-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:37:03.757035-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:37:03.75704-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:37:03.757044-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:37:03.757049-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:37:03.757053-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:37:03.757059-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.757063-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757067-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:37:03.757072-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:37:03.757076-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:37:03.757244-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:37:03.757249-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.757251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:37:03.757253-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:37:03.757256-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:03.757258-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:37:03.757261-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:03.757263-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:03.757265-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:37:03.757268-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:37:03.75727-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:37:03.757273-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:37:03.757277-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:37:03.75728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:37:03.757284-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:37:03.757288-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:37:03.75729-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:37:03.757292-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:37:03.757296-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:37:03.757299-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:37:03.757303-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:37:03.757543-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:37:03.757559-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:37:03.757565-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:37:03.757568-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:37:03.75757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:37:03.757572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:37:03.757576-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:37:03.757578-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:37:03.757581-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:37:03.757583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:37:03.757602-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:37:03.757605-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:37:03.757608-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:37:03.75761-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757612-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757615-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:03.757617-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.757619-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:03.757623-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.757625-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.757628-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757631-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:03.757803-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:37:03.757811-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:37:03.757815-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.757819-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:03.757822-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.757825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:03.757829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:37:03.757833-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:37:03.757837-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.757841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:03.757844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:37:03.757848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.757851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:03.757855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:37:03.757882-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:37:03.757888-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:37:03.757891-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757895-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:37:03.757898-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:37:03.757901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:37:03.757903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.757906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:37:03.757909-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:37:03.757912-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758032-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:37:03.758039-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:37:03.758043-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758046-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:37:03.75805-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:37:03.758054-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758058-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:37:03.758062-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:37:03.758067-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:37:03.758071-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:37:03.758074-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:37:03.758077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:37:03.75809-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:37:03.758099-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:37:03.758104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:37:03.758108-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:37:03.758112-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:37:03.758114-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:37:03.758117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:37:03.75812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:37:03.758307-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:37:03.758313-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:37:03.758317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:37:03.758322-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:37:03.758326-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:37:03.75833-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:37:03.758335-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:37:03.758338-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:37:03.758342-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:37:03.758346-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:37:03.758349-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:03.758353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758356-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:37:03.75836-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.758363-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:37:03.758367-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:37:03.758371-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:37:03.758374-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:37:03.758378-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:37:03.758382-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:37:03.758385-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758664-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:37:03.758671-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:37:03.758675-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758679-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:37:03.758683-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:37:03.758687-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.758691-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758695-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:37:03.758699-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.758703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:37:03.758706-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.75871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:37:03.758714-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:37:03.758722-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.758728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.758732-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758736-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:37:03.758741-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:37:03.758745-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:37:03.75875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.758756-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:37:03.758759-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.758763-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:37:03.758986-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:37:03.758996-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:37:03.759001-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:37:03.759006-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:37:03.75901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.759013-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759018-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:37:03.759022-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:37:03.759026-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:37:03.75903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:37:03.759033-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.759037-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759041-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:37:03.759045-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:37:03.759048-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:37:03.759052-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759056-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:37:03.75906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.759063-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759067-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:37:03.75907-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:37:03.759074-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:37:03.759078-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759344-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:37:03.759353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:37:03.759357-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.759361-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759365-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:37:03.759368-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:37:03.759372-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759375-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:37:03.759385-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:37:03.759396-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:37:03.759403-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.759408-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759414-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:37:03.759419-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:37:03.759426-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759432-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:37:03.759437-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:37:03.759441-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759446-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:37:03.759452-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:37:03.759459-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:37:03.759464-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:37:03.759468-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:37:03.759473-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:37:03.759629-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:37:03.759634-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759637-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:37:03.759639-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:37:03.759642-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:37:03.759646-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:37:03.75965-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:37:03.759655-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:37:03.759658-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:37:03.759662-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:37:03.759666-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:37:03.75967-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759672-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:37:03.759674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:37:03.759678-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.75968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:37:03.759684-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759687-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759691-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759695-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759698-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759702-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759706-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759709-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.759919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.759925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:37:03.759929-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:37:03.759931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759934-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:37:03.759937-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.75994-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759942-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:37:03.759946-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:37:03.759948-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:37:03.759951-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:37:03.759955-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.759958-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759961-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:37:03.759964-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:37:03.759967-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.759969-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759971-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:37:03.759974-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:37:03.759976-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759978-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:37:03.759981-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:37:03.759993-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.759999-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:37:03.760002-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:37:03.760493-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.7605-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:37:03.760504-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:37:03.760507-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:37:03.760514-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:37:03.760517-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760521-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:37:03.760526-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:37:03.760529-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:37:03.760532-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760535-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.760538-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.760541-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:37:03.760545-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:37:03.633314999Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:37:03.760549-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:37:03.760554-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:37:03.76056-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:37:03.760566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:37:03.760571-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.760578-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:37:03.760583-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760704-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:37:03.760714-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:37:03.760718-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:37:03.760722-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:37:03.760726-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760731-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:37:03.760735-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:37:03.760764-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:37:03.760771-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:37:03.760775-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:37:03.760779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760783-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:37:03.760787-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:37:03.76079-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:37:03.760795-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760801-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:37:03.760805-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:37:03.76081-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760813-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:37:03.760817-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:37:03.760821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.760825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760921-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:37:03.760928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:37:03.760931-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:37:03.760935-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.760938-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760943-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:37:03.760947-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:37:03.760951-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:37:03.760957-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760961-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:37:03.760966-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:37:03.76097-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:37:03.760973-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:37:03.760978-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76098-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:37:03.760982-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:37:03.760984-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:37:03.760987-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:37:03.760989-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.760992-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:37:03.760996-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:37:03.760999-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:37:03.761001-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:37:03.761126-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:37:03.761129-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:37:03.761132-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:37:03.761134-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761137-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:37:03.761139-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:37:03.761141-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761144-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:37:03.761147-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:37:03.761149-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761151-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:37:03.761154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:37:03.761156-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761159-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:37:03.761161-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:37:03.761164-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:37:03.761167-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761169-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:37:03.761172-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:37:03.761174-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761176-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:37:03.761179-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.761331-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76134-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:37:03.761344-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:37:03.761349-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:37:03.761353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.761359-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761364-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:37:03.761368-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:37:03.761372-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.761375-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761389-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:37:03.761399-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:37:03.761404-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:37:03.761408-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.761412-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761417-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:37:03.761422-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:37:03.761426-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76143-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:37:03.761434-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:37:03.761443-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761449-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:37:03.761453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:37:03.761635-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:37:03.761648-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761656-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:37:03.761664-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:37:03.761672-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:37:03.761678-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:37:03.761682-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:37:03.761686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.761689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761693-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:37:03.761697-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:37:03.761701-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:37:03.761706-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.761711-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:37:03.761715-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761718-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:37:03.761722-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:37:03.761726-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:37:03.761728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.761731-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761734-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:37:03.761737-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:37:03.761881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.761889-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761894-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:37:03.761897-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:37:03.761901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:37:03.761905-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:37:03.761908-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.761911-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:37:03.761919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:37:03.761922-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:37:03.761926-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:37:03.761929-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.761932-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761936-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:37:03.761941-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:37:03.761944-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761947-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:37:03.761953-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:37:03.761957-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.761961-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.761964-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.761968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:37:03.762106-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:37:03.762124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:37:03.762128-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:37:03.762134-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:37:03.762137-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762141-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:37:03.762144-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:37:03.76215-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:37:03.762154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:37:03.762161-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.762164-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:37:03.762166-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:37:03.762174-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:37:03.762177-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.76218-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762182-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:37:03.762185-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:37:03.762188-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:37:03.76219-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762193-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:37:03.762198-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.762383-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.762393-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762397-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:37:03.7624-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:37:03.762405-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762409-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:37:03.762417-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.762424-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762428-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:37:03.762434-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:37:03.762438-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:37:03.762443-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:37:03.762447-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:37:03.762451-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:37:03.762455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:37:03.762459-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:37:03.762463-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:37:03.762466-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:37:03.76247-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:37:03.762474-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:37:03.762477-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:37:03.76248-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.762482-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762485-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:37:03.762514-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:37:03.762788-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:37:03.762795-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.7628-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:37:03.762806-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:37:03.76281-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:37:03.762813-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.762817-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762821-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:37:03.762825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:37:03.762829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:37:03.762833-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:37:03.762838-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.762841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762845-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:37:03.76285-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:37:03.762854-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:37:03.762859-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:37:03.762863-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:37:03.762867-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.762872-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.762875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:37:03.762879-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:37:03.762883-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:37:03.763114-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:37:03.763133-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.763138-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763142-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:37:03.763145-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:37:03.76315-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:37:03.763154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:37:03.763157-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763161-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:37:03.763165-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:37:03.763169-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:37:03.763173-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:37:03.763177-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.763181-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763187-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:37:03.763191-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:37:03.763195-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:37:03.763198-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.763201-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:37:03.763205-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:37:03.763207-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:37:03.763209-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.763497-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:37:03.763504-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:37:03.763508-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:37:03.763511-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:37:03.763517-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.763522-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.763526-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76353-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:37:03.763535-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:37:03.763539-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:37:03.763542-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763546-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:37:03.763564-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:37:03.763568-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:37:03.763572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:37:03.763574-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:37:03.763576-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76358-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:37:03.763582-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:37:03.763584-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763587-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:37:03.763589-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:37:03.763863-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76387-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:37:03.763874-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:37:03.763878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763881-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:37:03.763885-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.763889-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763894-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:37:03.763898-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:37:03.763902-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:37:03.76392-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:37:03.763927-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.76393-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:37:03.76394-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763946-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:37:03.76395-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.763956-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.763959-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.763963-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:37:03.763967-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:37:03.763972-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:37:03.763975-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.763979-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76421-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:37:03.764217-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:37:03.764222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:37:03.764227-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.76423-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764233-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:37:03.764238-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:37:03.764241-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:37:03.764244-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:37:03.764247-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764251-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:37:03.764254-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:37:03.764259-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:37:03.764261-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:37:03.764264-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764266-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:37:03.764268-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:37:03.764272-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:37:03.76429-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:37:03.764295-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764299-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:37:03.764304-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:37:03.764566-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:37:03.764598-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:37:03.764605-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:37:03.764623-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764629-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:37:03.764633-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:37:03.764636-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:37:03.764651-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.764661-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764666-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:37:03.76467-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:37:03.764674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:37:03.764678-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764682-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:37:03.764685-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.764689-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764693-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:37:03.764696-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:37:03.7647-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:37:03.764704-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.764707-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764711-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:37:03.764714-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:37:03.764915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:37:03.764933-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:37:03.764936-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:37:03.764939-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:37:03.764942-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:37:03.764945-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.764949-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.764952-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:37:03.764956-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:37:03.764961-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:37:03.764965-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:37:03.764976-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.76498-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:37:03.764987-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:37:03.764991-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:03.764995-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:37:03.765004-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:03.765008-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:03.765011-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:37:03.765014-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:37:03.765018-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:37:03.765167-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:37:03.765174-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:37:03.765178-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:37:03.765183-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:37:03.765197-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:37:03.765202-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:37:03.765212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:37:03.765218-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:37:03.765222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:37:03.765226-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:37:03.765231-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:37:03.765235-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:37:03.765239-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:37:03.765243-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:37:03.765246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:37:03.76525-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:37:03.765255-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:37:03.765258-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:37:03.765263-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:37:03.765268-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:37:03.765473-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:37:03.765499-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:37:03.765508-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:37:03.765512-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765516-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765519-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:03.765524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.765528-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:03.765532-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:37:03.765536-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.765541-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765544-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765548-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.765552-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765556-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.765576-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.765581-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765585-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765589-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:37:03.765594-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:37:03.765597-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:37:03.765617-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765621-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:37:03.765624-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:37:03.765692-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:37:03.7657-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765704-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:37:03.765707-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:37:03.765713-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765716-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:37:03.765721-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:37:03.765724-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:37:03.765732-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:37:03.765737-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765741-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:37:03.765745-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:37:03.765748-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:37:03.765753-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:37:03.765757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:37:03.765774-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:37:03.76578-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:37:03.765786-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:37:03.76579-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:37:03.765911-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:37:03.765919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:37:03.765924-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:37:03.765928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:37:03.765932-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:37:03.765936-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:37:03.765941-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:37:03.765945-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:37:03.765948-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:37:03.765952-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:37:03.765956-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:37:03.76596-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:37:03.765964-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:37:03.765968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:37:03.765973-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:37:03.765976-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:03.765979-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.765983-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:37:03.765987-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:03.76599-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:37:03.765993-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:37:03.765998-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:37:03.766162-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:37:03.766171-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:37:03.766177-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:37:03.766181-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766186-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:37:03.76619-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:37:03.766194-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766198-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:37:03.766202-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:37:03.766207-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.766211-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766217-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:37:03.766221-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.76623-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:37:03.766234-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766239-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:37:03.766242-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:37:03.766246-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.76625-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.766255-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766259-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:37:03.766263-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:37:03.766269-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:37:03.766378-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:03.766387-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:37:03.766392-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766395-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:37:03.766401-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:37:03.766406-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:37:03.76641-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:37:03.766414-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:37:03.766426-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.766433-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766436-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:37:03.76644-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:37:03.766443-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:37:03.766446-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:37:03.766448-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.766451-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:37:03.766455-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:37:03.766469-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:37:03.766479-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766483-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:37:03.766503-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.766735-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766743-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:37:03.766746-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:37:03.766749-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:37:03.766751-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766754-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:37:03.766757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:37:03.76676-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.766763-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766765-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:37:03.766768-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:37:03.76677-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766773-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:37:03.766776-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:37:03.766778-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:37:03.766782-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.766784-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766787-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:37:03.766789-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:37:03.766792-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766794-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:37:03.766797-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:37:03.766799-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.766802-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:37:03.766804-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:37:03.76703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:37:03.76704-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:37:03.767045-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:37:03.767049-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:37:03.767053-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:37:03.767058-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767062-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:37:03.767066-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:37:03.76707-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:37:03.767075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:37:03.767078-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:37:03.767082-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:37:03.767086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:37:03.767092-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:37:03.767096-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:37:03.767101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767105-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:37:03.767109-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:37:03.767114-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:37:03.767121-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767126-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767129-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767227-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767237-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767241-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767245-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767248-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:37:03.767252-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:03.767256-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:37:03.76726-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:37:03.767265-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.767269-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:37:03.767272-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.767276-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:37:03.767284-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:37:03.767288-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:37:03.767292-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:37:03.767296-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.7673-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.767303-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:37:03.767307-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:37:03.767312-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:03.767317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.767321-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:37:03.767335-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:37:03.767453-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.76747-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:37:03.767475-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:37:03.76748-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.767483-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:37:03.767487-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:37:03.767492-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.767494-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:37:03.767498-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:37:03.767501-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.767505-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:37:03.767509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:37:03.767512-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.767516-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:37:03.767521-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:37:03.767524-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:37:03.767528-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:37:03.767531-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:37:03.767534-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ----------------------- debugLogs end: custom-flannel-996000 [took: 20.299477143s] --------------------------------\n"} +{"Time":"2023-05-31T12:37:03.767539-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:175: Cleaning up \"custom-flannel-996000\" profile ...\n"} +{"Time":"2023-05-31T12:37:03.767542-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p custom-flannel-996000\n"} +{"Time":"2023-05-31T12:37:06.595424-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p custom-flannel-996000: (2.846122573s)\n"} +{"Time":"2023-05-31T12:37:06.595439-07:00","Action":"cont","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T12:37:06.595442-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== CONT TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T12:37:06.595472-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/Start"} +{"Time":"2023-05-31T12:37:06.595478-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/Start\n"} +{"Time":"2023-05-31T12:37:06.595516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p enable-default-cni-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --enable-default-cni=true --driver=docker \n"} +{"Time":"2023-05-31T12:37:12.066152-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":"E0531 12:37:12.066109 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:16.046482-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:37:16.046495-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ----------------------- debugLogs start: false-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:37:16.046498-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:37:16.046501-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:37:16.046503-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:37:16.046506-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046511-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:37:16.046514-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:37:16.046518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046521-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046525-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:37:16.046528-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:37:16.04653-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046532-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046533-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:37:16.046536-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:37:16.046538-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.04654-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046541-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:37:16.046544-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:37:16.046546-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:37:16.046547-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046549-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:37:16.046553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:37:16.046555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:37:16.046557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:37:16.046562-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:37:16.046564-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:37:16.046566-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:37:16.046568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:37:16.046571-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 10.244.0.3\tnetcat-7458db8b8-l74g9\n"} +{"Time":"2023-05-31T12:37:16.046573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046575-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046577-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:37:16.046579-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:37:16.046581-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:37:16.046583-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:37:16.046585-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046587-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046589-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:37:16.046592-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:37:16.046595-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.046599-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:37:16.046602-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:37:16.046606-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:37:16.046609-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.046611-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:37:16.046613-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:37:16.046615-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:37:16.046617-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:37:16.046619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.046621-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:37:16.046623-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:37:16.046625-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.046627-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:37:16.04664-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:37:16.046644-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:37:16.046647-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:37:16.046649-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.046651-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:37:16.046653-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046655-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046658-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:37:16.046663-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:37:16.046666-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:37:16.046683-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:37:16.046686-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:37:16.04669-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:37:16.046692-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:37:16.046694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 192.168.85.2\tfalse-996000\r\n"} +{"Time":"2023-05-31T12:37:16.046696-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:37:16.046698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 192.168.85.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:37:16.0467-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046702-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046705-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:37:16.046707-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:37:16.046709-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:37:16.046711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046713-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046715-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:37:16.046718-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:37:16.046742-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node/false-996000 Ready control-plane 40s v1.27.2 192.168.85.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:37:16.046746-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046749-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:37:16.046752-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 39s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046754-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default service/netcat ClusterIP 10.109.110.74 \u003cnone\u003e 8080/TCP 19s app=netcat\n"} +{"Time":"2023-05-31T12:37:16.046757-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 37s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:16.046759-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046761-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:37:16.046765-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default endpoints/kubernetes 192.168.85.2:8443 39s\n"} +{"Time":"2023-05-31T12:37:16.046767-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default endpoints/netcat 10.244.0.3:8080 19s\n"} +{"Time":"2023-05-31T12:37:16.046769-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 22s\n"} +{"Time":"2023-05-31T12:37:16.046772-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 24s\n"} +{"Time":"2023-05-31T12:37:16.046774-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046777-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:37:16.046781-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 37s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.046783-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:37:16.046789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default deployment.apps/netcat 1/1 1 1 19s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:37:16.046791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system deployment.apps/coredns 1/1 1 1 37s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:16.046793-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046795-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:37:16.046798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default pod/netcat-7458db8b8-l74g9 1/1 Running 0 19s 10.244.0.3 false-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046801-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system pod/coredns-5d78c9869d-pdl9j 1/1 Running 0 24s 10.244.0.2 false-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system pod/etcd-false-996000 1/1 Running 0 37s 192.168.85.2 false-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046806-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system pod/kube-apiserver-false-996000 1/1 Running 0 38s 192.168.85.2 false-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046809-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system pod/kube-controller-manager-false-996000 1/1 Running 0 38s 192.168.85.2 false-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046812-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system pod/kube-proxy-skq8w 1/1 Running 0 24s 192.168.85.2 false-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046814-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system pod/kube-scheduler-false-996000 1/1 Running 0 37s 192.168.85.2 false-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-system pod/storage-provisioner 1/1 Running 0 22s 192.168.85.2 false-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046819-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046821-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046823-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:37:16.046826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:37:16.046828-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" c7ae8da418e8d 20 seconds ago Ready netcat-7458db8b8-l74g9 default 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:16.046831-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 51cb88bf601dd 23 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:16.046833-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 29185f3dfe8eb 23 seconds ago Ready coredns-5d78c9869d-pdl9j kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:16.046836-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ed81c09f90afa 25 seconds ago Ready kube-proxy-skq8w kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:16.046838-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1b2ffc29fd98e 44 seconds ago Ready kube-apiserver-false-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:16.046841-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1ef3271f69abd 44 seconds ago Ready etcd-false-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:16.046843-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 158c18362a0dd 44 seconds ago Ready kube-scheduler-false-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:16.046845-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" bcbb693ff66ad 44 seconds ago Ready kube-controller-manager-false-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:37:16.046848-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.04685-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046852-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:37:16.046854-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:37:16.046857-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 358a5f10f55e8 registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 14 seconds ago Running dnsutils 0 c7ae8da418e8d netcat-7458db8b8-l74g9\r\n"} +{"Time":"2023-05-31T12:37:16.04686-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 7f7e0ea065c73 6e38f40d628db 23 seconds ago Running storage-provisioner 0 51cb88bf601dd storage-provisioner\r\n"} +{"Time":"2023-05-31T12:37:16.046863-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" c4363f8b446c6 ead0a4a53df89 23 seconds ago Running coredns 0 29185f3dfe8eb coredns-5d78c9869d-pdl9j\r\n"} +{"Time":"2023-05-31T12:37:16.046865-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" b8b482c537aeb b8aa50768fd67 24 seconds ago Running kube-proxy 0 ed81c09f90afa kube-proxy-skq8w\r\n"} +{"Time":"2023-05-31T12:37:16.046868-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" b0c345074bbbd ac2b7465ebba9 44 seconds ago Running kube-controller-manager 0 bcbb693ff66ad kube-controller-manager-false-996000\r\n"} +{"Time":"2023-05-31T12:37:16.046871-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 86d214377803b 89e70da428d29 44 seconds ago Running kube-scheduler 0 158c18362a0dd kube-scheduler-false-996000\r\n"} +{"Time":"2023-05-31T12:37:16.046873-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cdf121873df00 86b6af7dd652c 44 seconds ago Running etcd 0 1ef3271f69abd etcd-false-996000\r\n"} +{"Time":"2023-05-31T12:37:16.046876-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 34687a54fd110 c5b13e4f7806d 44 seconds ago Running kube-apiserver 0 1b2ffc29fd98e kube-apiserver-false-996000\r\n"} +{"Time":"2023-05-31T12:37:16.046878-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.04688-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046882-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:37:16.046885-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:37:16.046887-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:37:16.046889-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CreationTimestamp: Wed, 31 May 2023 12:36:42 -0700\n"} +{"Time":"2023-05-31T12:37:16.046891-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:37:16.046893-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:37:16.046896-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:37:16.046898-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:37:16.0469-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:37:16.046902-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:37:16.046905-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:37:16.046908-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:37:16.04691-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:37:16.046913-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:16.046915-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:37:16.046917-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:37:16.046919-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046921-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:16.046926-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:37:16.046928-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -c\n"} +{"Time":"2023-05-31T12:37:16.046931-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:37:16.046934-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046936-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046938-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.04694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:16.046942-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:37:16.046944-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:37:16.046947-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:37:16.046949-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:37:16.046951-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046953-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:37:16.046955-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:16.046958-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:16.04696-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:16.046962-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal ScalingReplicaSet 20s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:37:16.046964-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046966-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.046969-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:37:16.046971-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: netcat-7458db8b8-l74g9\n"} +{"Time":"2023-05-31T12:37:16.046973-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:37:16.046975-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:37:16.046977-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:37:16.04698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node: false-996000/192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.046982-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Start Time: Wed, 31 May 2023 12:36:42 -0700\n"} +{"Time":"2023-05-31T12:37:16.046984-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:37:16.046987-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:37:16.046989-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.046991-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:16.046993-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:37:16.046995-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:16.046997-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:37:16.046999-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:37:16.047002-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:16.047004-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:37:16.047006-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Container ID: docker://358a5f10f55e81e95543a57e241b231aaaaac9783df69a063c9d77dda2120aa7\n"} +{"Time":"2023-05-31T12:37:16.047008-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:37:16.047011-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:37:16.047013-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047015-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047017-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:16.04702-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:37:16.047022-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -c\n"} +{"Time":"2023-05-31T12:37:16.047024-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:37:16.047026-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:16.047029-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Started: Wed, 31 May 2023 12:36:48 -0700\n"} +{"Time":"2023-05-31T12:37:16.047031-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:16.047033-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:16.047035-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047037-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:16.047039-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-zxl82 (ro)\n"} +{"Time":"2023-05-31T12:37:16.047042-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:16.047044-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:16.047046-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:16.047048-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:16.04705-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:16.047052-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:16.047054-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:16.047056-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-api-access-zxl82:\n"} +{"Time":"2023-05-31T12:37:16.047058-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:37:16.047061-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:37:16.047063-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:16.047065-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:37:16.047067-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:37:16.047069-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:37:16.047071-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047074-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:37:16.047076-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:37:16.047078-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:16.04708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:16.047082-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:16.047085-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Scheduled 20s default-scheduler Successfully assigned default/netcat-7458db8b8-l74g9 to false-996000\n"} +{"Time":"2023-05-31T12:37:16.047088-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Pulling 20s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:37:16.04709-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Pulled 14s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.191754327s (5.191793922s including waiting)\n"} +{"Time":"2023-05-31T12:37:16.047093-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Created 14s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:37:16.047095-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Started 14s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:37:16.047097-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047099-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047101-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:37:16.047103-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047105-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047107-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:37:16.04711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:37:16.047112-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.047114-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CreationTimestamp: Wed, 31 May 2023 12:36:24 -0700\n"} +{"Time":"2023-05-31T12:37:16.047116-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:16.047118-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:37:16.04712-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:16.047122-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:37:16.047125-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:37:16.047127-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:37:16.047129-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:37:16.047131-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:37:16.047133-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:16.047135-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:37:16.047138-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:16.04714-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" coredns:\n"} +{"Time":"2023-05-31T12:37:16.047142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:37:16.047144-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:37:16.047146-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:37:16.047148-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:16.04715-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -conf\n"} +{"Time":"2023-05-31T12:37:16.047152-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:37:16.047155-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Limits:\n"} +{"Time":"2023-05-31T12:37:16.047157-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:37:16.04716-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Requests:\n"} +{"Time":"2023-05-31T12:37:16.047162-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:37:16.047164-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:37:16.047166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:37:16.047169-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:37:16.047171-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047173-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:16.047175-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:37:16.047177-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:16.047179-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:37:16.047182-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:16.047184-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:37:16.047186-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:16.047188-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:37:16.047191-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:16.047193-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:37:16.047195-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:37:16.047197-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:37:16.047199-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:37:16.047201-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047204-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:37:16.047206-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:16.047208-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:16.04721-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:16.047212-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal ScalingReplicaSet 26s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:37:16.047215-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal ScalingReplicaSet 26s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:37:16.047217-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047219-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047221-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:37:16.047223-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: coredns-5d78c9869d-pdl9j\n"} +{"Time":"2023-05-31T12:37:16.047225-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.047228-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:37:16.04723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:37:16.047232-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:37:16.047234-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node: false-996000/192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.047236-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Start Time: Wed, 31 May 2023 12:36:38 -0700\n"} +{"Time":"2023-05-31T12:37:16.047238-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:37:16.04724-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:37:16.047243-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047245-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:16.047247-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:37:16.047249-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:16.047251-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:37:16.047253-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:37:16.047255-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:16.047257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" coredns:\n"} +{"Time":"2023-05-31T12:37:16.04726-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Container ID: docker://c4363f8b446c61ff4da774e0829053af849b64e7631a3e25495e0f035b12a959\n"} +{"Time":"2023-05-31T12:37:16.047262-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:37:16.047264-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:37:16.047267-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:37:16.047269-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:37:16.047271-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Args:\n"} +{"Time":"2023-05-31T12:37:16.047273-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -conf\n"} +{"Time":"2023-05-31T12:37:16.047275-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:37:16.047277-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:16.047279-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Started: Wed, 31 May 2023 12:36:39 -0700\n"} +{"Time":"2023-05-31T12:37:16.047282-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:16.047284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:16.047286-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Limits:\n"} +{"Time":"2023-05-31T12:37:16.047288-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:37:16.04729-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Requests:\n"} +{"Time":"2023-05-31T12:37:16.047292-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:37:16.047294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:37:16.047296-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:37:16.047299-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:37:16.047301-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047303-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:16.047305-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:37:16.047307-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-p7pzw (ro)\n"} +{"Time":"2023-05-31T12:37:16.047309-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:16.047311-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:16.047314-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:16.047316-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:16.047318-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:16.04732-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:16.047322-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:16.047324-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:37:16.047327-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:16.047329-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:37:16.047331-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:16.047333-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-api-access-p7pzw:\n"} +{"Time":"2023-05-31T12:37:16.047335-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:37:16.047337-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:37:16.047339-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:16.047341-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:37:16.047344-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:37:16.047346-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:37:16.047348-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:37:16.047351-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:37:16.047353-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:37:16.047355-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:37:16.047358-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:37:16.04736-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:16.047362-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:16.047364-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:16.047367-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Warning FailedScheduling 26s default-scheduler 0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..\n"} +{"Time":"2023-05-31T12:37:16.047369-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Scheduled 25s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-pdl9j to false-996000\n"} +{"Time":"2023-05-31T12:37:16.047372-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Pulled 24s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:37:16.047374-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Created 24s kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:37:16.047376-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Started 24s kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:37:16.047378-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.04738-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047382-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:37:16.047384-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" .:53\n"} +{"Time":"2023-05-31T12:37:16.047386-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] plugin/reload: Running configuration SHA512 = f869070685748660180df1b7a47d58cdafcf2f368266578c062d1151dc2c900964aecc5975e8882e6de6fdfb6460463e30ebfaad2ec8f0c3c6436f80225b3b5b\n"} +{"Time":"2023-05-31T12:37:16.047389-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:37:16.047391-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:37:16.047394-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 127.0.0.1:55881 - 8557 \"HINFO IN 7160515996595296142.7524335345427583705. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.013339454s\n"} +{"Time":"2023-05-31T12:37:16.047396-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 10.244.0.3:36426 - 11725 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000146064s\n"} +{"Time":"2023-05-31T12:37:16.047399-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 10.244.0.3:40474 - 536 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.0001649s\n"} +{"Time":"2023-05-31T12:37:16.047401-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 10.244.0.3:58771 - 61613 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000197316s\n"} +{"Time":"2023-05-31T12:37:16.047404-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 10.244.0.3:58173 - 46420 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000268892s\n"} +{"Time":"2023-05-31T12:37:16.047407-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 10.244.0.3:58173 - 46624 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000462566s\n"} +{"Time":"2023-05-31T12:37:16.047409-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 10.244.0.3:38113 - 52313 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000120614s\n"} +{"Time":"2023-05-31T12:37:16.047412-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 10.244.0.3:60643 - 34276 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.00015419s\n"} +{"Time":"2023-05-31T12:37:16.047414-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [INFO] 10.244.0.3:44989 - 43940 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000105222s\n"} +{"Time":"2023-05-31T12:37:16.047417-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047419-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047421-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:37:16.047423-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: kube-apiserver-false-996000\n"} +{"Time":"2023-05-31T12:37:16.047425-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.047427-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:37:16.04743-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:37:16.047434-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node: false-996000/192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.047437-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Start Time: Wed, 31 May 2023 12:36:24 -0700\n"} +{"Time":"2023-05-31T12:37:16.04744-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:37:16.047444-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:37:16.047447-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.85.2:8443\n"} +{"Time":"2023-05-31T12:37:16.047451-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes.io/config.hash: a3767bb2f945b1f08595028a2358768c\n"} +{"Time":"2023-05-31T12:37:16.047455-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes.io/config.mirror: a3767bb2f945b1f08595028a2358768c\n"} +{"Time":"2023-05-31T12:37:16.047458-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes.io/config.seen: 2023-05-31T19:36:17.976586150Z\n"} +{"Time":"2023-05-31T12:37:16.047462-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:37:16.047466-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:16.047469-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.047473-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:16.047476-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.047479-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Controlled By: Node/false-996000\n"} +{"Time":"2023-05-31T12:37:16.047482-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:16.047485-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:37:16.047488-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Container ID: docker://34687a54fd1100a6cb8579939784bce8c87b085a6daa3efe9e7e7a5045c30df3\n"} +{"Time":"2023-05-31T12:37:16.047491-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:37:16.047493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:37:16.047495-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047498-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.0475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:16.047502-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:37:16.047504-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --advertise-address=192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.047506-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:37:16.047509-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:37:16.047511-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:37:16.047513-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:37:16.047516-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:37:16.047518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:37:16.04752-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:37:16.047522-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:37:16.047524-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:37:16.047527-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:37:16.047529-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:37:16.047531-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:37:16.047533-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:37:16.047536-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:37:16.047538-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:37:16.04754-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:37:16.047548-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:37:16.04755-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:37:16.047552-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:37:16.047555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:37:16.047557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:37:16.047559-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:37:16.047561-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:37:16.047563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:37:16.047565-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:37:16.047568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:37:16.04757-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:16.047572-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Started: Wed, 31 May 2023 12:36:18 -0700\n"} +{"Time":"2023-05-31T12:37:16.047574-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:16.047576-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:16.047578-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Requests:\n"} +{"Time":"2023-05-31T12:37:16.04758-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:37:16.047582-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Liveness: http-get https://192.168.85.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:37:16.047585-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Readiness: http-get https://192.168.85.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:37:16.047587-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Startup: http-get https://192.168.85.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:37:16.047589-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047591-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:16.047593-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:37:16.047596-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:37:16.047598-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:37:16.0476-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:37:16.047603-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:37:16.047606-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:16.04761-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:16.047612-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:16.047614-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:16.047616-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:16.047619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:16.047621-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:16.047623-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:37:16.047625-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.047627-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:37:16.04763-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:16.047632-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:37:16.047634-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.047637-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:37:16.04764-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:16.047642-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:37:16.047644-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.047646-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:37:16.047649-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:16.047651-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:37:16.047653-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.047655-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:37:16.047657-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:16.047659-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:37:16.047661-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.047664-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:37:16.047666-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:37:16.047669-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:37:16.047671-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047673-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:37:16.047675-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.047677-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047679-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.047681-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:37:16.047684-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:19.095059 1 server.go:551] external host was not specified, using 192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.047731-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:19.095972 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:37:16.047742-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:19.095993 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:37:16.047749-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:19.705995 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:37:16.047757-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:19.728722 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:37:16.047762-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:19.728949 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:37:16.047767-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:19.832223 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047769-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:19.832244 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047771-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:19.833482 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:37:16.047774-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.123348 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047778-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.123719 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:37:16.047782-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.583669 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:37:16.04779-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.603205 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047799-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.603575 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047805-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.603683 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.605464 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047816-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.605538 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.607219 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047934-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.607747 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047937-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.607802 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047939-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.607808 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047941-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.610682 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047943-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.610854 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047946-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.612650 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047948-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.612696 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.04795-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.612701 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047953-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.614179 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047956-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.614216 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047959-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.615282 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047962-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.615734 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047972-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.618338 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.047978-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.618385 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047983-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.618392 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.047987-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.620103 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048078-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.620145 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048084-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.620150 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048088-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.622058 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048091-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.622096 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048094-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.624912 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048098-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.624980 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048101-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.624988 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048105-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.626679 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048108-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.626729 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048112-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.626735 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048116-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.629629 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048119-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.629669 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048122-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.629674 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048125-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.632207 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048128-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.633194 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048131-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.633235 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048309-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.633240 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048317-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.637987 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.04832-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.638024 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048324-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.638030 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048332-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.640454 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048335-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.640491 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048347-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.640496 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048355-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.642151 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048365-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.642187 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048376-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:20.652218 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:37:16.048381-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:20.652292 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:37:16.048385-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.157574 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:37:16.04839-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.157674 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:37:16.048395-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.157872 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:37:16.048399-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.158464 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:37:16.048405-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.158502 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:37:16.048409-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.158547 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:37:16.048519-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.158560 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:37:16.048525-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.158750 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:37:16.048542-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159000 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:37:16.048549-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159060 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:37:16.048553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159074 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:37:16.048556-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.158563 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:37:16.04856-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159110 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:37:16.048564-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.158624 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:37:16.048568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159179 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:37:16.048572-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159213 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:37:16.048576-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159225 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:37:16.048581-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159239 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:37:16.048585-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.159241 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:37:16.048588-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160319 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:37:16.048591-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160505 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:37:16.048593-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160538 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:37:16.048596-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160655 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:37:16.048766-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160699 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:37:16.048771-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160701 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:37:16.048773-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160712 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:37:16.048775-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160719 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:37:16.048778-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160726 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:37:16.04878-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160737 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:37:16.048783-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160775 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:37:16.048785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160794 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:37:16.048788-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160837 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:37:16.048792-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160893 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:37:16.048794-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160899 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:37:16.048797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.160972 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:37:16.048799-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.206683 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:37:16.048803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.259340 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:37:16.048807-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.259379 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:37:16.04881-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.259385 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:37:16.048814-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.259396 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:37:16.048818-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.259397 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:37:16.048972-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.259401 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:37:16.048979-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.260118 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:37:16.048982-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.260593 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:37:16.048985-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.261114 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:37:16.048987-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.301895 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:37:16.04899-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:21.918712 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:37:16.048992-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:22.164826 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:37:16.048995-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:22.168272 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:37:16.048998-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:22.168286 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:37:16.049002-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:22.648899 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:37:16.049004-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:22.684605 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:37:16.049007-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:22.867681 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:37:16.049009-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W0531 19:36:22.872815 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.85.2]\n"} +{"Time":"2023-05-31T12:37:16.049012-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:22.873617 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:37:16.049014-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:22.879119 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:37:16.049016-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:23.195519 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:37:16.049019-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:24.329844 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:37:16.049224-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:24.339985 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:37:16.04923-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:24.358998 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:37:16.049233-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:37.404085 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:37:16.049235-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:37.412328 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:37:16.049238-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:42.392535 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.109.110.74]\n"} +{"Time":"2023-05-31T12:37:16.04924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.049242-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.049245-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:37:16.049247-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/cni/net.d/87-podman-bridge.conflist\r\n"} +{"Time":"2023-05-31T12:37:16.049249-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.049252-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:37:16.049254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:37:16.049257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:37:16.049259-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.049261-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:37:16.049263-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:37:16.049266-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:37:16.04927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:37:16.049273-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:37:16.049277-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:37:16.049282-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:37:16.049284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:37:16.049286-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:37:16.049436-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [\r\n"} +{"Time":"2023-05-31T12:37:16.049441-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.049445-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"subnet\": \"10.244.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:37:16.049448-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"gateway\": \"10.244.0.1\"\r\n"} +{"Time":"2023-05-31T12:37:16.04945-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.049452-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:16.049454-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:16.049457-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.049459-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:16.049461-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.049475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:37:16.04948-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:37:16.049483-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:37:16.049485-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.049487-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:16.04949-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.049493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:37:16.049497-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:16.049502-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.049509-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:37:16.049513-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.049519-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:16.049526-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.049542-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:37:16.049549-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.049552-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:37:16.049554-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:37:16.049557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:37:16.049663-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.04967-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/cni/net.d/100-crio-bridge.conf\r\n"} +{"Time":"2023-05-31T12:37:16.049674-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.049678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:37:16.04968-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:37:16.049685-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:37:16.049687-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:37:16.049691-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:37:16.049694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:37:16.049697-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:37:16.049701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:37:16.049704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:37:16.049706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:37:16.049708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" { \"dst\": \"0.0.0.0/0\" }\r\n"} +{"Time":"2023-05-31T12:37:16.049711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ],\r\n"} +{"Time":"2023-05-31T12:37:16.049713-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:37:16.049716-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [{ \"subnet\": \"10.244.0.0/16\" }]\r\n"} +{"Time":"2023-05-31T12:37:16.049719-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ]\r\n"} +{"Time":"2023-05-31T12:37:16.049723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.049743-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.049748-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.049752-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.049759-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:37:16.049765-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:37:16.04977-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:37:16.049773-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:37:16.049776-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:16.049899-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 2: tunl0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:37:16.049906-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:37:16.049908-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:37:16.049911-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" link/tunnel6 :: brd :: permaddr 1a27:61b8:6a27::\r\n"} +{"Time":"2023-05-31T12:37:16.049913-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:37:16.049916-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" link/ether 02:42:23:4d:7f:50 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:37:16.049918-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:37:16.04992-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:16.049922-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 5: cni0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:37:16.049925-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" link/ether ca:45:f3:ff:4b:c7 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:37:16.049928-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" inet 10.244.0.1/16 brd 10.244.255.255 scope global cni0\r\n"} +{"Time":"2023-05-31T12:37:16.049932-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:16.049935-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 6: veth4d8e5f3d@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T12:37:16.049938-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" link/ether 5a:63:14:d2:f4:91 brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:37:16.04994-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 7: vethb12279f2@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T12:37:16.049942-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" link/ether e6:f3:c2:1c:f0:01 brd ff:ff:ff:ff:ff:ff link-netnsid 2\r\n"} +{"Time":"2023-05-31T12:37:16.049946-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 304: eth0@if305: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:37:16.049949-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" link/ether 02:42:c0:a8:55:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:37:16.049952-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" inet 192.168.85.2/24 brd 192.168.85.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:37:16.050082-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:37:16.050088-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.05009-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.050093-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:37:16.050095-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default via 192.168.85.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:37:16.050097-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 10.244.0.0/16 dev cni0 proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T12:37:16.050104-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:37:16.050106-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 192.168.85.0/24 dev eth0 proto kernel scope link src 192.168.85.2 \r\n"} +{"Time":"2023-05-31T12:37:16.050109-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.050111-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.050113-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:37:16.050116-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:37:04 2023\r\n"} +{"Time":"2023-05-31T12:37:16.050118-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:37:16.05012-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :PREROUTING ACCEPT [13395:57773124]\r\n"} +{"Time":"2023-05-31T12:37:16.050122-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :INPUT ACCEPT [13360:57770326]\r\n"} +{"Time":"2023-05-31T12:37:16.050125-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :FORWARD ACCEPT [35:2798]\r\n"} +{"Time":"2023-05-31T12:37:16.050127-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :OUTPUT ACCEPT [12157:7145961]\r\n"} +{"Time":"2023-05-31T12:37:16.050129-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :POSTROUTING ACCEPT [12192:7148759]\r\n"} +{"Time":"2023-05-31T12:37:16.050132-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050134-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050136-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050138-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:37:16.050141-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Completed on Wed May 31 19:37:04 2023\r\n"} +{"Time":"2023-05-31T12:37:16.050143-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:37:04 2023\r\n"} +{"Time":"2023-05-31T12:37:16.050145-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:37:16.050147-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :INPUT ACCEPT [5600:1222489]\r\n"} +{"Time":"2023-05-31T12:37:16.050264-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :FORWARD ACCEPT [16:927]\r\n"} +{"Time":"2023-05-31T12:37:16.050268-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :OUTPUT ACCEPT [5535:1506942]\r\n"} +{"Time":"2023-05-31T12:37:16.05027-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050272-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050275-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050277-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050279-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050281-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050283-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050288-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.05029-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050292-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050295-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050297-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050299-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:16.050302-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:37:16.050305-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:16.050307-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:16.05031-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:16.050312-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:37:16.050314-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:16.050317-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:16.050319-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:37:16.050479-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:37:16.050483-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:16.050485-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:37:16.050487-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:16.050491-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:16.050494-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:16.050496-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:16.050498-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:37:16.0505-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:37:16.050503-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:16.050505-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:37:16.050507-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:16.050509-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:16.050511-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:37:16.050514-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:37:16.050516-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:16.05052-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:16.050522-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:37:16.050524-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Completed on Wed May 31 19:37:04 2023\r\n"} +{"Time":"2023-05-31T12:37:16.050526-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:37:04 2023\r\n"} +{"Time":"2023-05-31T12:37:16.050528-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:37:16.05053-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:37:16.050674-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:37:16.050679-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :OUTPUT ACCEPT [43:2580]\r\n"} +{"Time":"2023-05-31T12:37:16.050681-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :POSTROUTING ACCEPT [43:2580]\r\n"} +{"Time":"2023-05-31T12:37:16.050683-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :CNI-bff0681249d31286e316d0ec - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050685-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :CNI-f73ce917cfe5f46f399cd6b0 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.05069-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050693-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050697-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050699-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SEP-BL4BN7UU5M2OIW4P - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.05071-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050712-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050714-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SEP-UTWFOSUDHOCXYA2F - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050716-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050718-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.05072-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050722-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050724-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050726-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050729-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:37:16.050731-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:16.050733-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:37:16.051053-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:37:16.051059-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:37:16.051063-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:37:16.051067-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:37:16.05107-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:37:16.051083-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:37:16.05109-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:37:16.051094-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A POSTROUTING -s 10.244.0.2/32 -m comment --comment \"name: \\\"crio\\\" id: \\\"29185f3dfe8ebf370bfe83b27aade2e4dfd9cc51918032baaf9ad70901904097\\\"\" -j CNI-f73ce917cfe5f46f399cd6b0\r\n"} +{"Time":"2023-05-31T12:37:16.051099-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A POSTROUTING -s 10.244.0.3/32 -m comment --comment \"name: \\\"crio\\\" id: \\\"c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18\\\"\" -j CNI-bff0681249d31286e316d0ec\r\n"} +{"Time":"2023-05-31T12:37:16.051104-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A CNI-bff0681249d31286e316d0ec -d 10.244.0.0/16 -m comment --comment \"name: \\\"crio\\\" id: \\\"c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:16.051109-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A CNI-bff0681249d31286e316d0ec ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"crio\\\" id: \\\"c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:37:16.051113-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A CNI-f73ce917cfe5f46f399cd6b0 -d 10.244.0.0/16 -m comment --comment \"name: \\\"crio\\\" id: \\\"29185f3dfe8ebf370bfe83b27aade2e4dfd9cc51918032baaf9ad70901904097\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:37:16.051117-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A CNI-f73ce917cfe5f46f399cd6b0 ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"crio\\\" id: \\\"29185f3dfe8ebf370bfe83b27aade2e4dfd9cc51918032baaf9ad70901904097\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:37:16.051119-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:16.051121-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:44581\r\n"} +{"Time":"2023-05-31T12:37:16.051123-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:42384\r\n"} +{"Time":"2023-05-31T12:37:16.051126-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 44581 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:37:16.051129-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 42384 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:37:16.051132-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:37:16.051136-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:37:16.051139-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:37:16.051143-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:37:16.051157-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-BL4BN7UU5M2OIW4P -s 192.168.85.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051164-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-BL4BN7UU5M2OIW4P -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.85.2:8443\r\n"} +{"Time":"2023-05-31T12:37:16.051169-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051172-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:37:16.051174-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051177-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:37:16.051179-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -s 10.244.0.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051182-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T12:37:16.051187-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.05119-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:37:16.051192-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:37:16.051195-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:37:16.051271-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:37:16.051276-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:37:16.051281-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SERVICES -d 10.109.110.74/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:37:16.051284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:37:16.051286-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051289-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T12:37:16.051292-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T12:37:16.051296-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051301-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.85.2:8443\" -j KUBE-SEP-BL4BN7UU5M2OIW4P\r\n"} +{"Time":"2023-05-31T12:37:16.051304-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051308-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T12:37:16.051312-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.109.110.74/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:37:16.051316-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.3:8080\" -j KUBE-SEP-UTWFOSUDHOCXYA2F\r\n"} +{"Time":"2023-05-31T12:37:16.051469-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:37:16.051475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Completed on Wed May 31 19:37:04 2023\r\n"} +{"Time":"2023-05-31T12:37:16.051479-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.051482-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.051486-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:37:16.051489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:37:16.051493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051497-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 53 3340 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:37:16.0515-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 85 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:37:16.051504-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 44 2640 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:37:16.051507-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051511-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:37:16.051514-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051517-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051521-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain OUTPUT (policy ACCEPT 44 packets, 2640 bytes)\r\n"} +{"Time":"2023-05-31T12:37:16.051524-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051528-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 186 13849 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:37:16.051531-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 50 4382 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:37:16.051535-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 86 5160 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:37:16.051538-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051542-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain POSTROUTING (policy ACCEPT 44 packets, 2640 bytes)\r\n"} +{"Time":"2023-05-31T12:37:16.051545-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051638-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 196 14584 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:37:16.051643-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:37:16.051645-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:37:16.051648-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 CNI-f73ce917cfe5f46f399cd6b0 all -- * * 10.244.0.2 0.0.0.0/0 /* name: \"crio\" id: \"29185f3dfe8ebf370bfe83b27aade2e4dfd9cc51918032baaf9ad70901904097\" */\r\n"} +{"Time":"2023-05-31T12:37:16.051651-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 9 675 CNI-bff0681249d31286e316d0ec all -- * * 10.244.0.3 0.0.0.0/0 /* name: \"crio\" id: \"c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18\" */\r\n"} +{"Time":"2023-05-31T12:37:16.051653-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051655-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain CNI-bff0681249d31286e316d0ec (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.051658-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.05166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 9 675 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"crio\" id: \"c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18\" */\r\n"} +{"Time":"2023-05-31T12:37:16.051662-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"crio\" id: \"c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18\" */\r\n"} +{"Time":"2023-05-31T12:37:16.051665-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051667-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain CNI-f73ce917cfe5f46f399cd6b0 (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.05167-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051674-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"crio\" id: \"29185f3dfe8ebf370bfe83b27aade2e4dfd9cc51918032baaf9ad70901904097\" */\r\n"} +{"Time":"2023-05-31T12:37:16.051678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"crio\" id: \"29185f3dfe8ebf370bfe83b27aade2e4dfd9cc51918032baaf9ad70901904097\" */\r\n"} +{"Time":"2023-05-31T12:37:16.051681-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051686-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:37:16.051774-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.05178-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:37:16.051783-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:37:16.051787-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:44581\r\n"} +{"Time":"2023-05-31T12:37:16.051793-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 51 4467 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:42384\r\n"} +{"Time":"2023-05-31T12:37:16.051795-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.051799-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051801-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:44581 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:37:16.051803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:42384 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:37:16.051805-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051807-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:37:16.05181-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051819-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:37:16.051822-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051824-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:37:16.051826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051828-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.051957-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051964-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.051978-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.051983-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.051987-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 53 3315 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:37:16.051991-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:37:16.051994-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:37:16.051997-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052001-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052004-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052007-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052009-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SEP-BL4BN7UU5M2OIW4P (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052012-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052014-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 KUBE-MARK-MASQ all -- * * 192.168.85.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:37:16.052016-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 2 120 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.85.2:8443\r\n"} +{"Time":"2023-05-31T12:37:16.052019-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052021-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052023-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052025-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:37:16.052035-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:37:16.052112-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052126-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052131-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052135-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:37:16.052139-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:37:16.052144-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052148-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SEP-UTWFOSUDHOCXYA2F (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052152-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052156-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:37:16.052159-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T12:37:16.052163-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.05217-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052173-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:37:16.052177-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:37:16.052181-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052184-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052188-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052192-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:37:16.052251-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:37:16.052257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:37:16.052261-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:37:16.052265-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.109.110.74 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:37:16.052278-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 79 4740 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:37:16.052284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052287-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052289-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052291-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:37:16.052294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:37:16.052296-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052298-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.0523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052303-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:37:16.052305-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T12:37:16.052307-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052441-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052446-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052449-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:37:16.052452-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 2 120 KUBE-SEP-BL4BN7UU5M2OIW4P all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.85.2:8443 */\r\n"} +{"Time":"2023-05-31T12:37:16.052454-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.052456-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052458-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052461-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:37:16.052463-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:37:16.052466-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.05247-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:37:16.052473-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:37:16.052475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.109.110.74 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:37:16.052478-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1 60 KUBE-SEP-UTWFOSUDHOCXYA2F all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.3:8080 */\r\n"} +{"Time":"2023-05-31T12:37:16.05248-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.052482-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.052484-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:37:16.052487-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.052489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.052492-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:37:16.052495-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.052669-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:37:16.052673-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:37:16.052676-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:37:16.052678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:37:16.052681-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:37:16.052683-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:37:16.052685-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:37:16.052688-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:37:16.05269-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.052692-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.052694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:16.052696-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:37:16.052698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:37:16.0527-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.052702-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.052704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:16.052707-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.052709-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:37:16.052711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:37:16.052713-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Environment:\n"} +{"Time":"2023-05-31T12:37:16.052716-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:37:16.052718-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:16.05272-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:37:16.052722-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:37:16.052724-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:37:16.052927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:16.052933-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:37:16.052937-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:16.052941-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.052944-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:16.052947-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:37:16.052951-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.052954-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:37:16.052957-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:37:16.052959-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:37:16.052961-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.052963-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:37:16.052965-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:16.052967-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:37:16.05297-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:16.052972-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:16.052974-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:16.052976-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal SuccessfulCreate 28s daemonset-controller Created pod: kube-proxy-skq8w\n"} +{"Time":"2023-05-31T12:37:16.052978-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.05298-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.052982-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:37:16.052985-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: kube-proxy-skq8w\n"} +{"Time":"2023-05-31T12:37:16.052987-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.052989-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:37:16.052991-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:37:16.05313-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.053136-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node: false-996000/192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.053139-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Start Time: Wed, 31 May 2023 12:36:37 -0700\n"} +{"Time":"2023-05-31T12:37:16.053141-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:37:16.053143-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.053145-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:37:16.053148-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.05315-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:37:16.053152-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.053154-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IPs:\n"} +{"Time":"2023-05-31T12:37:16.053156-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.053158-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.05316-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Containers:\n"} +{"Time":"2023-05-31T12:37:16.053162-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:37:16.053165-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Container ID: docker://b8b482c537aebebd93c4758939c088545fe80154afd45082e0d23bef80e71ce3\n"} +{"Time":"2023-05-31T12:37:16.053167-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:37:16.053169-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:37:16.053172-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.053175-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:37:16.053177-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Command:\n"} +{"Time":"2023-05-31T12:37:16.053179-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.053181-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:37:16.053183-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:37:16.053186-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" State: Running\n"} +{"Time":"2023-05-31T12:37:16.053319-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Started: Wed, 31 May 2023 12:36:38 -0700\n"} +{"Time":"2023-05-31T12:37:16.053324-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:37:16.053326-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:37:16.05333-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Environment:\n"} +{"Time":"2023-05-31T12:37:16.053333-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:37:16.053336-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:37:16.05334-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:37:16.053343-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:37:16.053347-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:37:16.05335-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-wgfln (ro)\n"} +{"Time":"2023-05-31T12:37:16.053353-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:37:16.053355-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Status\n"} +{"Time":"2023-05-31T12:37:16.053357-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:37:16.053359-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Ready True \n"} +{"Time":"2023-05-31T12:37:16.053361-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:37:16.053363-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:37:16.053365-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:37:16.053367-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:37:16.053369-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:37:16.053371-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.053373-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:37:16.053376-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:37:16.053378-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.05338-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:37:16.053382-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:37:16.053384-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:37:16.053386-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:37:16.053543-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:37:16.053555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:37:16.053576-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-api-access-wgfln:\n"} +{"Time":"2023-05-31T12:37:16.053583-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:37:16.053587-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:37:16.053591-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:16.053609-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:37:16.053616-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:37:16.053619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:37:16.053621-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:37:16.053623-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:37:16.053625-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:16.053628-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:16.05363-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:16.053633-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:37:16.053635-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:16.053638-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:37:16.053641-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:37:16.053643-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Events:\n"} +{"Time":"2023-05-31T12:37:16.053645-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:37:16.053648-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:37:16.05365-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Scheduled 28s default-scheduler Successfully assigned kube-system/kube-proxy-skq8w to false-996000\n"} +{"Time":"2023-05-31T12:37:16.053758-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Pulled 27s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:37:16.053764-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Created 27s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.053768-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Normal Started 27s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.053772-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.053775-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.053778-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:37:16.053782-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.487565 1 node.go:141] Successfully retrieved node IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.053784-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.487685 1 server_others.go:110] \"Detected node IP\" address=\"192.168.85.2\"\n"} +{"Time":"2023-05-31T12:37:16.053786-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.487703 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:37:16.053789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.592659 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:37:16.053791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.592683 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:37:16.053793-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.592688 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:37:16.053796-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.592698 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:37:16.053799-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.592720 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:37:16.053801-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.593461 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:37:16.053803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.593474 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:37:16.053809-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.593894 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:37:16.053812-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.593977 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:37:16.054012-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.594183 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:37:16.05402-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.594190 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:37:16.054025-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.594200 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:37:16.054028-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.594202 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:37:16.05403-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.694818 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:37:16.054032-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.694902 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:37:16.054034-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" I0531 19:36:38.694990 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:37:16.054037-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.054039-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.054041-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:37:16.054044-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:37:16.054046-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Loaded: loaded (\u001b]8;;file://false-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:16.054049-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:37:16.054051-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" └─\u001b]8;;file://false-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:16.054054-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:36:24 UTC; 41s ago\r\n"} +{"Time":"2023-05-31T12:37:16.054056-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:16.054059-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Main PID: 2399 (kubelet)\r\n"} +{"Time":"2023-05-31T12:37:16.054061-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Tasks: 14 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:37:16.054063-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Memory: 31.3M\r\n"} +{"Time":"2023-05-31T12:37:16.054065-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CPU: 1.550s\r\n"} +{"Time":"2023-05-31T12:37:16.054068-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:37:16.054299-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" └─2399 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=false-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.85.2\r\n"} +{"Time":"2023-05-31T12:37:16.054306-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.054309-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.036388 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.054313-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.101556 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/ea63f7a8-4862-470f-8f65-e3d076decd9f-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"ea63f7a8-4862-470f-8f65-e3d076decd9f\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:37:16.054319-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.101614 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-ct9xf\\\" (UniqueName: \\\"kubernetes.io/projected/ea63f7a8-4862-470f-8f65-e3d076decd9f-kube-api-access-ct9xf\\\") pod \\\"storage-provisioner\\\" (UID: \\\"ea63f7a8-4862-470f-8f65-e3d076decd9f\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:37:16.054334-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.718033 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-pdl9j\" podStartSLOduration=2.718005121 podCreationTimestamp=\"2023-05-31 19:36:37 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:39.717711759 +0000 UTC m=+15.414494047\" watchObservedRunningTime=\"2023-05-31 19:36:39.718005121 +0000 UTC m=+15.414787403\"\r\n"} +{"Time":"2023-05-31T12:37:16.05434-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.735183 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=0.73515274 podCreationTimestamp=\"2023-05-31 19:36:39 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:39.734660691 +0000 UTC m=+15.431442978\" watchObservedRunningTime=\"2023-05-31 19:36:39.73515274 +0000 UTC m=+15.431935022\"\r\n"} +{"Time":"2023-05-31T12:37:16.054343-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 kubelet[2399]: I0531 19:36:42.394889 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.054346-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 kubelet[2399]: I0531 19:36:42.427163 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-zxl82\\\" (UniqueName: \\\"kubernetes.io/projected/882062cf-0d8f-4f86-8d58-0fd64d070935-kube-api-access-zxl82\\\") pod \\\"netcat-7458db8b8-l74g9\\\" (UID: \\\"882062cf-0d8f-4f86-8d58-0fd64d070935\\\") \" pod=\"default/netcat-7458db8b8-l74g9\"\r\n"} +{"Time":"2023-05-31T12:37:16.054518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 kubelet[2399]: I0531 19:36:42.888939 2399 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18\"\r\n"} +{"Time":"2023-05-31T12:37:16.054523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:45 false-996000 kubelet[2399]: I0531 19:36:45.083860 2399 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:37:16.054526-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:45 false-996000 kubelet[2399]: I0531 19:36:45.084468 2399 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:37:16.054528-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.054531-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.054533-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:37:16.054535-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;34m# \u001b]8;;file://false-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.054538-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:16.05454-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:37:16.054542-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:37:16.054544-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:37:16.054547-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.054549-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.054551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:37:16.054553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:16.054557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:37:16.054559-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:37:16.054561-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.054564-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:16.054566-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:16.054568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.05457-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;34m# \u001b]8;;file://false-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.054664-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:16.054671-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:37:16.054684-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.05469-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.054692-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:37:16.054695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=false-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.85.2\r\n"} +{"Time":"2023-05-31T12:37:16.054699-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.054702-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:16.054704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.054706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.054708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:37:16.054712-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:37:16.054716-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.05472-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.054724-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.054728-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.054733-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.054737-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.05474-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.054743-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:37:16.054747-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.938860 1747 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:37:16.054834-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.938925 1747 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:37:16.05484-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.939193 1747 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:37:16.054845-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.941920 1747 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:37:16.054849-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: E0531 19:36:17.942970 1747 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.054854-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: W0531 19:36:17.945864 1747 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:37:16.054857-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.952059 1747 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:37:16.054872-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.952363 1747 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:37:16.054879-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.952427 1747 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:37:16.054885-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.952444 1747 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:37:16.054893-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.952453 1747 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:37:16.055071-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.952510 1747 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:16.055086-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.970517 1747 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:37:16.055091-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.970567 1747 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:37:16.055094-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.970585 1747 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:37:16.055097-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.970598 1747 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:37:16.0551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: W0531 19:36:17.971163 1747 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.055103-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: W0531 19:36:17.971142 1747 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dfalse-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.055106-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: E0531 19:36:17.971443 1747 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dfalse-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.055109-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: E0531 19:36:17.971349 1747 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.055112-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.978206 1747 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:37:16.055115-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: W0531 19:36:17.978463 1747 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:37:16.055328-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.979005 1747 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:37:16.055335-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.979101 1747 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:37:16.055339-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.979190 1747 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:37:16.055342-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.979811 1747 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:37:16.055347-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: E0531 19:36:17.979842 1747 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"false-996000.17645181af6934eb\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"false-996000\", UID:\"false-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"false-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 36, 17, 978946795, time.Local), LastTimestamp:time.Date(2023"} +{"Time":"2023-05-31T12:37:16.055353-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":", time.May, 31, 19, 36, 17, 978946795, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.85.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:37:16.055357-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.980899 1747 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:37:16.055362-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.981019 1747 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:37:16.055365-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: I0531 19:36:17.981293 1747 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:37:16.055377-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: E0531 19:36:17.981412 1747 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"false-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:37:16.055543-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: W0531 19:36:17.981751 1747 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.055551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: E0531 19:36:17.981808 1747 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.055565-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:17 false-996000 kubelet[1747]: E0531 19:36:17.981811 1747 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/false-996000?timeout=10s\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:37:16.055569-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.002450 1747 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:37:16.055572-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.003871 1747 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:37:16.055589-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.003991 1747 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:37:16.055595-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.004012 1747 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:37:16.0556-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.004068 1747 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:37:16.055605-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: W0531 19:36:18.005283 1747 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.05561-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.005403 1747 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.055785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.007723 1747 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:37:16.055792-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.007761 1747 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:37:16.055795-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.007773 1747 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:16.055797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.009636 1747 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:37:16.0558-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.011488 1747 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:37:16.055802-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.011610 1747 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:16.055805-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.021675 1747 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:37:16.055808-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.021812 1747 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:37:16.05581-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.034626 1747 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"false-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:37:16.055813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.090232 1747 kubelet_node_status.go:70] \"Attempting to register node\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.055822-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.090531 1747 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.055827-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.105272 1747 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.055832-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.113112 1747 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.055835-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.121444 1747 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.055954-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.133215 1747 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.055962-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.182728 1747 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/false-996000?timeout=10s\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:37:16.055966-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282512 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-k8s-certs\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.055971-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282648 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-ca-certs\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.055974-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282681 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-etc-ca-certificates\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.055977-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282709 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.055981-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282748 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-ca-certs\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.055984-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282775 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-etc-ca-certificates\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056116-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282803 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056125-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282834 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/020aa1f9634a55c4e992620964a25551-kubeconfig\\\") pod \\\"kube-scheduler-false-996000\\\" (UID: \\\"020aa1f9634a55c4e992620964a25551\\\") \" pod=\"kube-system/kube-scheduler-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056129-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282863 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/c5edc7a90ea434af62177e3c9573a1a5-etcd-certs\\\") pod \\\"etcd-false-996000\\\" (UID: \\\"c5edc7a90ea434af62177e3c9573a1a5\\\") \" pod=\"kube-system/etcd-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056132-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.282900 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/c5edc7a90ea434af62177e3c9573a1a5-etcd-data\\\") pod \\\"etcd-false-996000\\\" (UID: \\\"c5edc7a90ea434af62177e3c9573a1a5\\\") \" pod=\"kube-system/etcd-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056135-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.283027 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-k8s-certs\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056139-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.283066 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.283097 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-flexvolume-dir\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056321-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.283134 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-kubeconfig\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056327-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.283162 1747 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.05633-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.299288 1747 kubelet_node_status.go:70] \"Attempting to register node\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056333-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.299644 1747 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056337-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.589315 1747 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/false-996000?timeout=10s\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:37:16.056342-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: I0531 19:36:18.715137 1747 kubelet_node_status.go:70] \"Attempting to register node\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056346-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.715779 1747 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.05635-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: W0531 19:36:18.837380 1747 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.056354-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 kubelet[1747]: E0531 19:36:18.837461 1747 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.056551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:19 false-996000 kubelet[1747]: W0531 19:36:19.079391 1747 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.056558-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:19 false-996000 kubelet[1747]: E0531 19:36:19.079465 1747 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:37:16.056563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:19 false-996000 kubelet[1747]: I0531 19:36:19.589265 1747 kubelet_node_status.go:70] \"Attempting to register node\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056566-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:21 false-996000 kubelet[1747]: E0531 19:36:21.202513 1747 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"false-996000\\\" not found\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.05657-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:21 false-996000 kubelet[1747]: I0531 19:36:21.289114 1747 kubelet_node_status.go:73] \"Successfully registered node\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.056575-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:21 false-996000 kubelet[1747]: I0531 19:36:21.344501 1747 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T12:37:16.056578-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:21 false-996000 kubelet[1747]: I0531 19:36:21.994161 1747 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:37:16.056581-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:22 false-996000 kubelet[1747]: I0531 19:36:22.082298 1747 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:37:16.056585-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:22 false-996000 kubelet[1747]: I0531 19:36:22.123589 1747 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:37:16.056589-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:37:16.056592-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056594-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056597-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056599-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056898-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056905-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056909-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056914-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[1747]: I0531 19:36:24.259123 1747 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:37:16.056918-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:37:16.056922-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056925-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.05693-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056932-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056934-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:37:16.056938-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.05694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056942-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056945-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056947-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056949-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056951-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.056954-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:37:16.057578-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.057592-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.057611-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.057617-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.057621-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.057625-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.057629-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.057633-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:37:16.057639-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.402365 2399 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:37:16.057644-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.402447 2399 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:37:16.057648-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.403050 2399 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:37:16.057651-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.404591 2399 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:37:16.057655-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.406038 2399 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:37:16.057659-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: W0531 19:36:24.408953 2399 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:37:16.057664-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.416464 2399 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:37:16.057668-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.416738 2399 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:37:16.058287-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.416800 2399 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:37:16.058294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.416818 2399 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:37:16.058297-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.416828 2399 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:37:16.058299-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.416847 2399 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:16.058302-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.439100 2399 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:37:16.058304-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.439152 2399 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:37:16.058306-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.439171 2399 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:37:16.058309-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.439188 2399 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:37:16.058311-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.455177 2399 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:37:16.058314-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.457004 2399 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:37:16.058317-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.459388 2399 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:37:16.058806-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.459770 2399 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:37:16.058813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.460637 2399 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:37:16.058816-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.461508 2399 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:37:16.058821-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.463523 2399 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:37:16.058823-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.465247 2399 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:37:16.058826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.504128 2399 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:37:16.058828-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.505695 2399 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:37:16.058831-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.505762 2399 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:37:16.058833-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.505817 2399 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:37:16.058837-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: E0531 19:36:24.505883 2399 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:37:16.058839-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.526342 2399 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:37:16.058842-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.526385 2399 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:37:16.058845-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.526402 2399 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:16.058847-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.526548 2399 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:37:16.05885-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.526592 2399 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:37:16.059355-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.526599 2399 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:37:16.059365-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.529438 2399 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:37:16.059369-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.529487 2399 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:37:16.059373-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.529597 2399 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:37:16.059377-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.531082 2399 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:37:16.059392-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.531398 2399 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:37:16.059401-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.605218 2399 kubelet_node_status.go:70] \"Attempting to register node\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059406-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.608139 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.059411-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.608305 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.059414-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.608342 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.059418-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.608365 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.059422-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.621251 2399 kubelet_node_status.go:108] \"Node was previously registered\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059427-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.621337 2399 kubelet_node_status.go:73] \"Successfully registered node\" node=\"false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059431-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: E0531 19:36:24.623702 2399 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-false-996000\\\" already exists\" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059436-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: E0531 19:36:24.632606 2399 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-false-996000\\\" already exists\" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784417 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-k8s-certs\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059814-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784482 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-etc-ca-certificates\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059821-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784499 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-k8s-certs\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059827-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784515 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059837-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784528 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-ca-certs\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.059847-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784541 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-etc-ca-certificates\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060211-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784558 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-kubeconfig\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060223-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784575 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/020aa1f9634a55c4e992620964a25551-kubeconfig\\\") pod \\\"kube-scheduler-false-996000\\\" (UID: \\\"020aa1f9634a55c4e992620964a25551\\\") \" pod=\"kube-system/kube-scheduler-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060233-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784589 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/c5edc7a90ea434af62177e3c9573a1a5-etcd-certs\\\") pod \\\"etcd-false-996000\\\" (UID: \\\"c5edc7a90ea434af62177e3c9573a1a5\\\") \" pod=\"kube-system/etcd-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.06024-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784705 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/c5edc7a90ea434af62177e3c9573a1a5-etcd-data\\\") pod \\\"etcd-false-996000\\\" (UID: \\\"c5edc7a90ea434af62177e3c9573a1a5\\\") \" pod=\"kube-system/etcd-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060246-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784740 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060252-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784757 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/a3767bb2f945b1f08595028a2358768c-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-false-996000\\\" (UID: \\\"a3767bb2f945b1f08595028a2358768c\\\") \" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060258-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784773 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-ca-certs\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060263-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784845 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-flexvolume-dir\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.06092-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:24 false-996000 kubelet[2399]: I0531 19:36:24.784868 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/62e8a49d86d24cf51fef075f02fcc595-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-false-996000\\\" (UID: \\\"62e8a49d86d24cf51fef075f02fcc595\\\") \" pod=\"kube-system/kube-controller-manager-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:25 false-996000 kubelet[2399]: I0531 19:36:25.441409 2399 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:37:16.06093-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:25 false-996000 kubelet[2399]: I0531 19:36:25.466257 2399 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:37:16.060933-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:25 false-996000 kubelet[2399]: I0531 19:36:25.492225 2399 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:37:16.060935-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:25 false-996000 kubelet[2399]: E0531 19:36:25.595915 2399 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-false-996000\\\" already exists\" pod=\"kube-system/kube-apiserver-false-996000\"\r\n"} +{"Time":"2023-05-31T12:37:16.060938-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:25 false-996000 kubelet[2399]: I0531 19:36:25.648437 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-false-996000\" podStartSLOduration=1.64832615 podCreationTimestamp=\"2023-05-31 19:36:24 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:25.639113926 +0000 UTC m=+1.335896208\" watchObservedRunningTime=\"2023-05-31 19:36:25.64832615 +0000 UTC m=+1.345108432\"\r\n"} +{"Time":"2023-05-31T12:37:16.06095-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:25 false-996000 kubelet[2399]: I0531 19:36:25.659003 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-false-996000\" podStartSLOduration=1.658968243 podCreationTimestamp=\"2023-05-31 19:36:24 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:25.648285996 +0000 UTC m=+1.345068284\" watchObservedRunningTime=\"2023-05-31 19:36:25.658968243 +0000 UTC m=+1.355750524\"\r\n"} +{"Time":"2023-05-31T12:37:16.060954-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:25 false-996000 kubelet[2399]: I0531 19:36:25.666818 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-false-996000\" podStartSLOduration=2.666778203 podCreationTimestamp=\"2023-05-31 19:36:23 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:25.659197791 +0000 UTC m=+1.355980073\" watchObservedRunningTime=\"2023-05-31 19:36:25.666778203 +0000 UTC m=+1.363560484\"\r\n"} +{"Time":"2023-05-31T12:37:16.061564-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:25 false-996000 kubelet[2399]: I0531 19:36:25.689663 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-false-996000\" podStartSLOduration=2.689634004 podCreationTimestamp=\"2023-05-31 19:36:23 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:25.66722508 +0000 UTC m=+1.364007367\" watchObservedRunningTime=\"2023-05-31 19:36:25.689634004 +0000 UTC m=+1.386416286\"\r\n"} +{"Time":"2023-05-31T12:37:16.061572-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:37 false-996000 kubelet[2399]: I0531 19:36:37.426468 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.061589-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:37 false-996000 kubelet[2399]: I0531 19:36:37.584030 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/dd0b5d79-e757-4bc8-b7b4-9fe4762e5892-lib-modules\\\") pod \\\"kube-proxy-skq8w\\\" (UID: \\\"dd0b5d79-e757-4bc8-b7b4-9fe4762e5892\\\") \" pod=\"kube-system/kube-proxy-skq8w\"\r\n"} +{"Time":"2023-05-31T12:37:16.061605-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:37 false-996000 kubelet[2399]: I0531 19:36:37.584107 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/dd0b5d79-e757-4bc8-b7b4-9fe4762e5892-xtables-lock\\\") pod \\\"kube-proxy-skq8w\\\" (UID: \\\"dd0b5d79-e757-4bc8-b7b4-9fe4762e5892\\\") \" pod=\"kube-system/kube-proxy-skq8w\"\r\n"} +{"Time":"2023-05-31T12:37:16.061613-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:37 false-996000 kubelet[2399]: I0531 19:36:37.584139 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/dd0b5d79-e757-4bc8-b7b4-9fe4762e5892-kube-proxy\\\") pod \\\"kube-proxy-skq8w\\\" (UID: \\\"dd0b5d79-e757-4bc8-b7b4-9fe4762e5892\\\") \" pod=\"kube-system/kube-proxy-skq8w\"\r\n"} +{"Time":"2023-05-31T12:37:16.061618-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:37 false-996000 kubelet[2399]: I0531 19:36:37.584176 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-wgfln\\\" (UniqueName: \\\"kubernetes.io/projected/dd0b5d79-e757-4bc8-b7b4-9fe4762e5892-kube-api-access-wgfln\\\") pod \\\"kube-proxy-skq8w\\\" (UID: \\\"dd0b5d79-e757-4bc8-b7b4-9fe4762e5892\\\") \" pod=\"kube-system/kube-proxy-skq8w\"\r\n"} +{"Time":"2023-05-31T12:37:16.061623-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:38 false-996000 kubelet[2399]: I0531 19:36:38.697296 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.061629-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:38 false-996000 kubelet[2399]: I0531 19:36:38.792433 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-skq8w\" podStartSLOduration=1.792403617 podCreationTimestamp=\"2023-05-31 19:36:37 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:38.71053449 +0000 UTC m=+14.407316768\" watchObservedRunningTime=\"2023-05-31 19:36:38.792403617 +0000 UTC m=+14.489185899\"\r\n"} +{"Time":"2023-05-31T12:37:16.061934-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:38 false-996000 kubelet[2399]: I0531 19:36:38.799284 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-p7pzw\\\" (UniqueName: \\\"kubernetes.io/projected/e983c7c6-25c4-46a6-9776-8079c8166800-kube-api-access-p7pzw\\\") pod \\\"coredns-5d78c9869d-pdl9j\\\" (UID: \\\"e983c7c6-25c4-46a6-9776-8079c8166800\\\") \" pod=\"kube-system/coredns-5d78c9869d-pdl9j\"\r\n"} +{"Time":"2023-05-31T12:37:16.061941-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:38 false-996000 kubelet[2399]: I0531 19:36:38.799370 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/e983c7c6-25c4-46a6-9776-8079c8166800-config-volume\\\") pod \\\"coredns-5d78c9869d-pdl9j\\\" (UID: \\\"e983c7c6-25c4-46a6-9776-8079c8166800\\\") \" pod=\"kube-system/coredns-5d78c9869d-pdl9j\"\r\n"} +{"Time":"2023-05-31T12:37:16.061945-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.036388 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.061947-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.101556 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/ea63f7a8-4862-470f-8f65-e3d076decd9f-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"ea63f7a8-4862-470f-8f65-e3d076decd9f\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:37:16.061952-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.101614 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-ct9xf\\\" (UniqueName: \\\"kubernetes.io/projected/ea63f7a8-4862-470f-8f65-e3d076decd9f-kube-api-access-ct9xf\\\") pod \\\"storage-provisioner\\\" (UID: \\\"ea63f7a8-4862-470f-8f65-e3d076decd9f\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:37:16.061956-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.718033 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-pdl9j\" podStartSLOduration=2.718005121 podCreationTimestamp=\"2023-05-31 19:36:37 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:39.717711759 +0000 UTC m=+15.414494047\" watchObservedRunningTime=\"2023-05-31 19:36:39.718005121 +0000 UTC m=+15.414787403\"\r\n"} +{"Time":"2023-05-31T12:37:16.061962-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 kubelet[2399]: I0531 19:36:39.735183 2399 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=0.73515274 podCreationTimestamp=\"2023-05-31 19:36:39 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:39.734660691 +0000 UTC m=+15.431442978\" watchObservedRunningTime=\"2023-05-31 19:36:39.73515274 +0000 UTC m=+15.431935022\"\r\n"} +{"Time":"2023-05-31T12:37:16.062183-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 kubelet[2399]: I0531 19:36:42.394889 2399 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:37:16.062196-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 kubelet[2399]: I0531 19:36:42.427163 2399 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-zxl82\\\" (UniqueName: \\\"kubernetes.io/projected/882062cf-0d8f-4f86-8d58-0fd64d070935-kube-api-access-zxl82\\\") pod \\\"netcat-7458db8b8-l74g9\\\" (UID: \\\"882062cf-0d8f-4f86-8d58-0fd64d070935\\\") \" pod=\"default/netcat-7458db8b8-l74g9\"\r\n"} +{"Time":"2023-05-31T12:37:16.062203-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 kubelet[2399]: I0531 19:36:42.888939 2399 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18\"\r\n"} +{"Time":"2023-05-31T12:37:16.062206-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:45 false-996000 kubelet[2399]: I0531 19:36:45.083860 2399 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:37:16.062209-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:45 false-996000 kubelet[2399]: I0531 19:36:45.084468 2399 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:37:16.062211-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.062214-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.062216-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:37:16.062221-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:37:16.062225-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:37:16.062228-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:37:16.062232-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:37:16.062411-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:37:16.062418-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:37:16.062422-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:37:16.062426-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:37:16.062429-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:37:16.062432-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:37:16.062435-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" user: system:node:false-996000\r\n"} +{"Time":"2023-05-31T12:37:16.06244-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: system:node:false-996000@mk\r\n"} +{"Time":"2023-05-31T12:37:16.062447-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" current-context: system:node:false-996000@mk\r\n"} +{"Time":"2023-05-31T12:37:16.062451-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:37:16.062455-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:37:16.062457-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" users:\r\n"} +{"Time":"2023-05-31T12:37:16.062459-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - name: system:node:false-996000\r\n"} +{"Time":"2023-05-31T12:37:16.062462-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" user:\r\n"} +{"Time":"2023-05-31T12:37:16.062464-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:37:16.062467-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:37:16.06247-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.062472-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.062474-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:37:16.062826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:37:16.062845-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:37:16.062852-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:37:16.062856-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:37:16.062859-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:37:16.062863-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.062867-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:37:16.06287-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:37:16.062874-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:37:16.062878-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:37:16.062881-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:37:16.062885-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:37:16.062888-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.062892-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.062896-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:37:16.0629-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:37:16.062904-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:37:16.062908-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:37:16.062911-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.062915-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.062919-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:37:16.062922-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:37:16.062926-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:37:16.062929-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:37:16.062933-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.062936-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:37:16.06294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063246-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:37:16.063253-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:37:16.063257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:37:16.063261-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063263-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:37:16.063265-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063267-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:37:16.06327-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:37:16.063272-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:37:16.063274-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" options:\r\n"} +{"Time":"2023-05-31T12:37:16.063277-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" json:\r\n"} +{"Time":"2023-05-31T12:37:16.06328-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:37:16.063284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:37:16.063287-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:37:16.063291-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063298-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:37:16.063301-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:37:16.063309-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063312-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063314-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:37:16.063318-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063321-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063325-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:37:16.063478-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.063493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.06351-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:37:16.063524-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.06353-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusters:\n"} +{"Time":"2023-05-31T12:37:16.063535-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:37:16.063544-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:37:16.063553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" extensions:\n"} +{"Time":"2023-05-31T12:37:16.063561-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - extension:\n"} +{"Time":"2023-05-31T12:37:16.063567-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" last-update: Wed, 31 May 2023 12:36:37 PDT\n"} +{"Time":"2023-05-31T12:37:16.06357-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:37:16.063573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:37:16.063576-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:37:16.06358-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" server: https://127.0.0.1:52699\n"} +{"Time":"2023-05-31T12:37:16.063583-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: false-996000\n"} +{"Time":"2023-05-31T12:37:16.063587-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" contexts:\n"} +{"Time":"2023-05-31T12:37:16.06359-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - context:\n"} +{"Time":"2023-05-31T12:37:16.063593-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cluster: false-996000\n"} +{"Time":"2023-05-31T12:37:16.063596-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" extensions:\n"} +{"Time":"2023-05-31T12:37:16.063599-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - extension:\n"} +{"Time":"2023-05-31T12:37:16.063601-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" last-update: Wed, 31 May 2023 12:36:37 PDT\n"} +{"Time":"2023-05-31T12:37:16.063603-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:37:16.063606-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:37:16.063609-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:37:16.063612-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:37:16.063614-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" user: false-996000\n"} +{"Time":"2023-05-31T12:37:16.063616-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: false-996000\n"} +{"Time":"2023-05-31T12:37:16.063752-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" current-context: false-996000\n"} +{"Time":"2023-05-31T12:37:16.063758-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:37:16.06376-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:37:16.063762-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" users:\n"} +{"Time":"2023-05-31T12:37:16.063765-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - name: false-996000\n"} +{"Time":"2023-05-31T12:37:16.063767-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" user:\n"} +{"Time":"2023-05-31T12:37:16.063769-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt\n"} +{"Time":"2023-05-31T12:37:16.063772-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.key\n"} +{"Time":"2023-05-31T12:37:16.063774-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.063776-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.063778-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:37:16.063781-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.063783-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" items:\n"} +{"Time":"2023-05-31T12:37:16.063785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.063787-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.063789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:16.063791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.063793-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:16.063795-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:16.063798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:16.0638-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:16.063802-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:16.063804-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:16.063806-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:16.064032-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:16.064037-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:16.064039-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:16.064041-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:16.064044-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:16.064046-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:16.064048-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:16.06405-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:16.064053-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:16.064055-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:16.064057-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.06406-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.064062-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.064064-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:16.064066-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:16.064068-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:16.06407-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:16.064073-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:16.064075-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:37Z\"\n"} +{"Time":"2023-05-31T12:37:16.064077-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:16.06408-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:37:16.064082-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"318\"\n"} +{"Time":"2023-05-31T12:37:16.064518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: 03184c1b-4bd5-485e-ac6f-dbf4a2c55dd9\n"} +{"Time":"2023-05-31T12:37:16.064523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.064525-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.064528-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:16.06453-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.064533-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:16.064536-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:16.064538-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:16.064541-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:16.064543-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:16.064545-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:16.064547-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:16.064549-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:16.064552-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:16.064554-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:16.064556-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:16.064558-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:16.06456-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:16.064563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:16.064565-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:16.064567-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:16.064569-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:16.065102-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.065108-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.065112-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.065116-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:16.065119-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:16.065124-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:16.065128-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:16.065131-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:16.065135-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:37Z\"\n"} +{"Time":"2023-05-31T12:37:16.065138-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:16.065142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:37:16.065145-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"323\"\n"} +{"Time":"2023-05-31T12:37:16.065148-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: a4f949b3-44c0-4825-bbbd-53f4eeb87061\n"} +{"Time":"2023-05-31T12:37:16.065151-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.065155-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.065159-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" jws-kubeconfig-g6nqpc: eyJhbGciOiJIUzI1NiIsImtpZCI6Imc2bnFwYyJ9..gJHdYLViO40x5vswF8yHM1aKhxfJe3_it4Rs-fpv13Y\n"} +{"Time":"2023-05-31T12:37:16.065163-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:37:16.065166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.065171-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusters:\n"} +{"Time":"2023-05-31T12:37:16.065175-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:37:16.065182-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCakNDQWU2Z0F3SUJBZ0lCQVRBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwdGFXNXAKYTNWaVpVTkJNQjRYRFRJek1EVXpNREU0TkRReE5Gb1hEVE16TURVeU9ERTRORFF4TkZvd0ZURVRNQkVHQTFVRQpBeE1LYldsdWFXdDFZbVZEUVRDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTCtXCitneFltMnNKQjJPdWkrbUxpY3FKUU1wbDNQMTdDUmVvak4xQWNBdngrK2Z3S1djTTZud042SmZmNTA3Q05HamcKTm1Cdzh1UC9sU1ZBSGY5dG5tN3g0Kytub1dBL0FsYncvMkJRTHhOb0FMTEJ1YnFrNmgrcW9jQm9pSkNJZGpSLwpVOHRoTmhXM0xScElmdHF5VktKQTRJc2ZrOHZvOFUzdXFKT04yd1FlS1RKMUgvbnJyMjQ0S3NhUFgwWW92elVPCnIwK05PeXhWdTFJL2k3ckdNaHVNNzV5TVoxeE9WWloyNnZPaFVOS092OVk0cFRjRzMvT0NtKzk0aDU4dnhuTTcKQ2JEZEozMnREL2YrWjVrS3VnV0Z0RWRtOEg2QnJqckxqcFlqR0k3OUJjMlpFVFRxQmtCaUpXdi80K1hyblUvUQpwTzNtMnJ5cmhBMUxOSFRyMEc4Q0F3RUFBYU5oTUY4d0RnWURWUjBQQVFIL0JBUURBZ0trTUIwR0ExVWRKUVFXCk1CUUdDQ3NHQVFVRkJ3TUNCZ2dyQmdFRkJRY0RBVEFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVcKQkJUYVlvOHZkanRNS1lqUkpXaXpHRGQ3d0Z4Z296QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRU"} +{"Time":"2023-05-31T12:37:16.065632-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"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\n"} +{"Time":"2023-05-31T12:37:16.065642-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:37:16.065662-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:37:16.065668-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:37:16.065671-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:37:16.065673-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:37:16.065676-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:37:16.065678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" users: null\n"} +{"Time":"2023-05-31T12:37:16.065681-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.065685-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.065688-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:24Z\"\n"} +{"Time":"2023-05-31T12:37:16.065691-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:37:16.065695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:37:16.065698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"291\"\n"} +{"Time":"2023-05-31T12:37:16.065701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: f19c9c93-dd4e-4ea6-b32a-077a947f8068\n"} +{"Time":"2023-05-31T12:37:16.065705-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.065708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.065711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:16.065714-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.065717-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:16.066023-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:16.066028-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:16.066031-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:16.066033-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:16.066035-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:16.066039-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:16.066041-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:16.066043-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:16.066045-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:16.066047-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:16.066049-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:16.066051-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:16.066054-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:16.066056-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:16.066058-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:16.06606-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:16.066063-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.066067-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.066071-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.066078-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:16.066083-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:16.066504-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:16.066512-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:16.066516-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:16.066519-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:37Z\"\n"} +{"Time":"2023-05-31T12:37:16.066524-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:16.066531-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:37:16.066534-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"327\"\n"} +{"Time":"2023-05-31T12:37:16.066551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: 32fd73a3-397d-4956-afab-5239fa1a54eb\n"} +{"Time":"2023-05-31T12:37:16.066553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.066556-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.066558-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:37:16.06656-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:37:16.066565-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" log\n"} +{"Time":"2023-05-31T12:37:16.066567-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" errors\n"} +{"Time":"2023-05-31T12:37:16.066569-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" health {\n"} +{"Time":"2023-05-31T12:37:16.066573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:37:16.066576-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\n"} +{"Time":"2023-05-31T12:37:16.066583-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ready\n"} +{"Time":"2023-05-31T12:37:16.066588-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:37:16.066591-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:37:16.066594-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:37:16.066598-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:37:16.066601-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\n"} +{"Time":"2023-05-31T12:37:16.066605-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:37:16.066608-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" hosts {\n"} +{"Time":"2023-05-31T12:37:16.066611-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:37:16.066615-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:37:16.066868-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\n"} +{"Time":"2023-05-31T12:37:16.066878-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:37:16.066887-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:37:16.066896-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\n"} +{"Time":"2023-05-31T12:37:16.066904-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cache 30\n"} +{"Time":"2023-05-31T12:37:16.066908-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" loop\n"} +{"Time":"2023-05-31T12:37:16.066912-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" reload\n"} +{"Time":"2023-05-31T12:37:16.066916-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:37:16.066921-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\n"} +{"Time":"2023-05-31T12:37:16.066925-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.066933-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.066942-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:24Z\"\n"} +{"Time":"2023-05-31T12:37:16.06695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:37:16.066956-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.066959-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"357\"\n"} +{"Time":"2023-05-31T12:37:16.066962-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: 167d548d-d3dd-4011-80a9-5730c3fd1da3\n"} +{"Time":"2023-05-31T12:37:16.066965-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.066969-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.066972-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:37:16.066975-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.066978-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:16.066982-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:16.066985-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:16.066988-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:16.066991-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:16.067055-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:16.06706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:16.067063-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:16.067065-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:16.067067-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:16.067069-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:16.067071-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:16.067076-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:16.067078-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:16.06708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:16.067083-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:16.067085-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:16.067087-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.067091-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:37:16.067093-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:37:16.067096-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.067098-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:37:16.0671-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM2MTVaFw0zMzA1MjgxOTM2MTVaMBkxFzAV\n"} +{"Time":"2023-05-31T12:37:16.067102-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:37:16.067104-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CgKCAQEAvgIBWWPEQfakb0RJ/dDlJqS5wkxsjroDfQKX8PMYFupHkK3OuK6fXwzM\n"} +{"Time":"2023-05-31T12:37:16.067255-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ApCsREk8dxVj5e1jiGMSgo4vWc6OiKZL2KxfKSq3WGKSob3MRJeUR6MCmf1fj+HD\n"} +{"Time":"2023-05-31T12:37:16.06726-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" eFs7BJ3h+42aPBgNZRwhIYe3aFv30QMqTg1LakPGxJMM5pdBW43Z3g1U+0C7EbFA\n"} +{"Time":"2023-05-31T12:37:16.067263-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Cswm7qEyypFXHk7flblt6uS0lIhjgs7f9XsTGc4+Ys0FZD/7Zs+L8gxbS4IJrCjz\n"} +{"Time":"2023-05-31T12:37:16.067266-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 4yS9gy8VS3ry9+v0nQ5iOy+Q732Xse8FFwxZ3t8H19I8aRVoeTuxTXpnhed8a3Q2\n"} +{"Time":"2023-05-31T12:37:16.067268-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" sd+sO9wU+F1ISKy+nbNb24dvP1IIOQIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:37:16.06727-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUd0aJuJN8v6qKpWB5cMLFgmHQ7zgw\n"} +{"Time":"2023-05-31T12:37:16.067272-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAADN\n"} +{"Time":"2023-05-31T12:37:16.067275-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Zy0sEELk5IWbE4mzPbDT6a2X1bg4bNMkzOUI3TjOxW34ppJX2TNU89GOIFpwKR+f\n"} +{"Time":"2023-05-31T12:37:16.067277-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" K0rnnDkKzGqLWO+pXgc4qklXNxfP7tfGwe6Ay2uGVM93AT13hX07+afBk0xSlcz1\n"} +{"Time":"2023-05-31T12:37:16.067279-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" y1vYf+LiLCXHliYlCRhjlTn1aHcXO21rP5ZUDZILZm3gkLN60gWLQEUEvMfusAMV\n"} +{"Time":"2023-05-31T12:37:16.067281-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" RYystYl9M7Q5RQgNuRTolfisF1AsH6rRmc5I5UkpCpPfxVin/1Hp0R4IDXrNkXNU\n"} +{"Time":"2023-05-31T12:37:16.067284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" z+7dYdGOZmYekoy4yyGhTWluLE3rnTj6RJu78aHVOpsgz8ZQMUOTsBoZZljA+AP0\n"} +{"Time":"2023-05-31T12:37:16.067289-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" W5VSpEvs+rqPxwjk6Tg=\n"} +{"Time":"2023-05-31T12:37:16.067292-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.067294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:37:16.067297-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:37:16.067299-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:37:16.067301-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.067304-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.067306-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:21Z\"\n"} +{"Time":"2023-05-31T12:37:16.067309-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:37:16.067474-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.067481-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"32\"\n"} +{"Time":"2023-05-31T12:37:16.067485-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: f200a172-f7d2-4960-b692-f3b3006356bf\n"} +{"Time":"2023-05-31T12:37:16.067489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.067492-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.067495-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:37:16.067497-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.067499-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.067501-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:21Z\"\n"} +{"Time":"2023-05-31T12:37:16.067504-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:37:16.067506-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.067508-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"28\"\n"} +{"Time":"2023-05-31T12:37:16.06751-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: e66f8fd6-8681-43b8-a437-9e6858463045\n"} +{"Time":"2023-05-31T12:37:16.067512-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.067515-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.067517-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:37:16.067519-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:37:16.067522-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:37:16.067524-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:37:16.067527-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:37:16.067529-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:37:16.067531-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:37:16.067533-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:37:16.067535-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:37:16.067658-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:37:16.067663-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:37:16.067665-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.067667-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:37:16.067669-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:37:16.067672-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" min: null\n"} +{"Time":"2023-05-31T12:37:16.067674-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:16.067676-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:16.067678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:37:16.067682-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:37:16.067684-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:37:16.067686-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:37:16.067688-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:37:16.06769-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:37:16.067693-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:37:16.067695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" iptables:\n"} +{"Time":"2023-05-31T12:37:16.067697-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:37:16.067699-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:37:16.067701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:37:16.067719-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.067721-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.067723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:37:16.067725-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:37:16.067729-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.067732-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:37:16.067735-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:37:16.067738-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.068011-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:16.068016-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:16.06802-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:16.068022-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:37:16.068025-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:37:16.068027-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:37:16.068029-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:37:16.068031-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:37:16.068034-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:37:16.068036-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:37:16.068038-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:37:16.068041-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:37:16.068043-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:37:16.068045-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:37:16.068048-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:37:16.068052-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:37:16.068056-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:37:16.068065-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.06807-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:37:16.068074-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusters:\n"} +{"Time":"2023-05-31T12:37:16.068077-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:37:16.06808-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:37:16.068084-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:37:16.068087-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: default\n"} +{"Time":"2023-05-31T12:37:16.068089-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" contexts:\n"} +{"Time":"2023-05-31T12:37:16.068294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - context:\n"} +{"Time":"2023-05-31T12:37:16.068301-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:37:16.068303-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:37:16.068306-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" user: default\n"} +{"Time":"2023-05-31T12:37:16.068308-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: default\n"} +{"Time":"2023-05-31T12:37:16.068311-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:37:16.068313-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" users:\n"} +{"Time":"2023-05-31T12:37:16.068315-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - name: default\n"} +{"Time":"2023-05-31T12:37:16.068317-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" user:\n"} +{"Time":"2023-05-31T12:37:16.06832-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:37:16.068322-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.068325-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.068327-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:24Z\"\n"} +{"Time":"2023-05-31T12:37:16.068329-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" labels:\n"} +{"Time":"2023-05-31T12:37:16.068332-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.068334-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:37:16.068336-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.068338-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"241\"\n"} +{"Time":"2023-05-31T12:37:16.068341-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: ee102b55-56b4-4530-9ef6-2ce446ee6657\n"} +{"Time":"2023-05-31T12:37:16.068343-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.068345-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.068347-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:37:16.068652-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.068658-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:37:16.06866-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:37:16.068663-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:37:16.068666-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:37:16.068669-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:37:16.068671-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:37:16.068673-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:37:16.068676-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:37:16.068678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:37:16.06868-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:37:16.068682-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:37:16.068684-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:37:16.068687-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:37:16.068689-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:37:16.068691-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:37:16.068695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:37:16.068697-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:37:16.068699-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:37:16.068701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.068704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.068706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" annotations:\n"} +{"Time":"2023-05-31T12:37:16.068708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:37:16.06912-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:37:16.069125-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:37:16.069128-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:37:16.069131-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:37Z\"\n"} +{"Time":"2023-05-31T12:37:16.069133-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:37:16.069136-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.069138-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"330\"\n"} +{"Time":"2023-05-31T12:37:16.06914-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: f8d92559-67d8-4204-9ccf-466436ecf8fe\n"} +{"Time":"2023-05-31T12:37:16.069142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.069145-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.069147-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:37:16.069149-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:37:16.069151-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:37:16.069154-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:37:16.069156-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - localhost\n"} +{"Time":"2023-05-31T12:37:16.069158-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - 192.168.85.2\n"} +{"Time":"2023-05-31T12:37:16.06916-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:37:16.069162-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:37:16.069165-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:37:16.069168-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:37:16.06917-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:37:16.069172-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:37:16.069174-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:37:16.0697-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:37:16.069706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:37:16.069709-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:37:16.069711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:37:16.069714-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:37:16.069717-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:37:16.06972-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" etcd:\n"} +{"Time":"2023-05-31T12:37:16.069722-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" local:\n"} +{"Time":"2023-05-31T12:37:16.069724-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:37:16.069726-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:37:16.069728-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:37:16.069731-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:37:16.069733-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:37:16.069735-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:37:16.069738-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" networking:\n"} +{"Time":"2023-05-31T12:37:16.06974-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:37:16.069742-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:37:16.069744-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:37:16.069746-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:37:16.069749-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:37:16.069751-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:37:16.069753-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.069756-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.069758-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:23Z\"\n"} +{"Time":"2023-05-31T12:37:16.069761-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:37:16.069766-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.06977-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"198\"\n"} +{"Time":"2023-05-31T12:37:16.070487-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: 90d5ae1e-65f6-4425-b39f-45e1480393b1\n"} +{"Time":"2023-05-31T12:37:16.070495-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:37:16.070499-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" data:\n"} +{"Time":"2023-05-31T12:37:16.070502-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:37:16.070506-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:37:16.070509-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" authentication:\n"} +{"Time":"2023-05-31T12:37:16.070513-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:37:16.070516-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:37:16.070519-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" webhook:\n"} +{"Time":"2023-05-31T12:37:16.070523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:37:16.070526-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:37:16.07053-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" x509:\n"} +{"Time":"2023-05-31T12:37:16.070534-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:37:16.070537-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" authorization:\n"} +{"Time":"2023-05-31T12:37:16.07054-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:37:16.070543-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" webhook:\n"} +{"Time":"2023-05-31T12:37:16.070548-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:37:16.07055-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:37:16.070553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:37:16.070555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:37:16.070557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:37:16.070561-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:37:16.070565-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:37:16.070568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.070572-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:37:16.070575-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:37:16.070594-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:37:16.071165-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:37:16.071196-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.0712-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:37:16.071202-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:16.071205-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:37:16.071207-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:37:16.071211-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:37:16.071213-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:16.071215-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:37:16.071218-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:37:16.07122-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:37:16.071222-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" logging:\n"} +{"Time":"2023-05-31T12:37:16.071224-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:37:16.071227-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" options:\n"} +{"Time":"2023-05-31T12:37:16.071229-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" json:\n"} +{"Time":"2023-05-31T12:37:16.071231-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:37:16.071234-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:37:16.071236-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:37:16.071238-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:16.07124-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:16.071242-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:37:16.071245-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:37:16.071247-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.071249-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:37:16.071251-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:37:16.071254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:37:16.071868-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:37:16.071875-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:37:16.071879-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:37:16.071883-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.071893-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" creationTimestamp: \"2023-05-31T19:36:23Z\"\n"} +{"Time":"2023-05-31T12:37:16.071896-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:37:16.071899-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:37:16.071901-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"202\"\n"} +{"Time":"2023-05-31T12:37:16.071903-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid: 658f381e-5669-4bf4-8b8b-2d2f0bab6923\n"} +{"Time":"2023-05-31T12:37:16.071905-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: List\n"} +{"Time":"2023-05-31T12:37:16.071908-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" metadata:\n"} +{"Time":"2023-05-31T12:37:16.07191-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:37:16.071912-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.071916-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.071918-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:37:16.071921-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:16.071924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Loaded: loaded (\u001b]8;;file://false-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:16.071927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:36:13 UTC; 55s ago\r\n"} +{"Time":"2023-05-31T12:37:16.07193-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:37:16.071932-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:16.071935-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Main PID: 1045 (dockerd)\r\n"} +{"Time":"2023-05-31T12:37:16.071937-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Tasks: 20\r\n"} +{"Time":"2023-05-31T12:37:16.071939-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Memory: 173.6M\r\n"} +{"Time":"2023-05-31T12:37:16.071941-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CPU: 7.680s\r\n"} +{"Time":"2023-05-31T12:37:16.071944-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:37:16.07253-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" └─1045 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:37:16.072536-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.072539-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:12 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:12.840195098Z\" level=info msg=\"Starting up\"\r\n"} +{"Time":"2023-05-31T12:37:16.072542-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:12 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:12.869801502Z\" level=info msg=\"[graphdriver] trying configured driver: overlay2\"\r\n"} +{"Time":"2023-05-31T12:37:16.072545-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:12 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:12.884123013Z\" level=info msg=\"Loading containers: start.\"\r\n"} +{"Time":"2023-05-31T12:37:16.072547-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:12 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:12.995263294Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\r\n"} +{"Time":"2023-05-31T12:37:16.07255-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:13 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:13.042221187Z\" level=info msg=\"Loading containers: done.\"\r\n"} +{"Time":"2023-05-31T12:37:16.072553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:13 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:13.053966876Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\r\n"} +{"Time":"2023-05-31T12:37:16.072555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:13 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:13.054031846Z\" level=info msg=\"Daemon has completed initialization\"\r\n"} +{"Time":"2023-05-31T12:37:16.072558-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:13 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:13.084496205Z\" level=info msg=\"API listen on /var/run/docker.sock\"\r\n"} +{"Time":"2023-05-31T12:37:16.07256-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:13 false-996000 dockerd[1045]: time=\"2023-05-31T19:36:13.084588541Z\" level=info msg=\"API listen on [::]:2376\"\r\n"} +{"Time":"2023-05-31T12:37:16.072563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:13 false-996000 systemd[1]: Started Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T12:37:16.072565-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.072568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.07257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:37:16.072573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;34m# \u001b]8;;file://false-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.072898-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:16.072907-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:16.072922-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:37:16.072926-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:37:16.072929-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:37:16.072931-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:16.072933-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:37:16.072937-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:37:16.07294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:37:16.072942-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.072946-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.072948-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:16.072951-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:37:16.072962-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.072971-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.072975-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.072978-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:37:16.072983-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:37:16.072987-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:37:16.072992-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:37:16.072996-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:37:16.073-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:37:16.073005-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:37:16.073008-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.073012-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:37:16.073332-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:37:16.073338-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:37:16.073341-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:37:16.073343-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:37:16.073346-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.073348-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:16.073351-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:16.073353-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.073356-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.073358-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.07336-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.073362-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:37:16.073365-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:37:16.073367-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.073369-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:37:16.073371-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.073373-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:37:16.073376-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:16.073378-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.07338-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:37:16.073382-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:16.073385-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.073387-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:16.073389-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:16.073727-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.073732-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.073736-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:37:16.07374-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" {\r\n"} +{"Time":"2023-05-31T12:37:16.073753-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:37:16.07376-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:37:16.073763-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:37:16.073765-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:37:16.073768-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" },\r\n"} +{"Time":"2023-05-31T12:37:16.073771-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:37:16.073773-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" }\r\n"} +{"Time":"2023-05-31T12:37:16.073775-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.073777-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.07378-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:37:16.073783-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:37:16.073785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:37:16.073787-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:37:16.07379-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:37:16.073792-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:37:16.073794-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:37:16.073796-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:37:16.073798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:37:16.073801-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.073803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:37:16.073805-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Containers: 16\r\n"} +{"Time":"2023-05-31T12:37:16.073808-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Running: 16\r\n"} +{"Time":"2023-05-31T12:37:16.073811-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:37:16.073813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Stopped: 0\r\n"} +{"Time":"2023-05-31T12:37:16.074223-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Images: 9\r\n"} +{"Time":"2023-05-31T12:37:16.074231-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:37:16.074235-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:37:16.074239-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:37:16.074242-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:37:16.074247-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:37:16.07425-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:37:16.074254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:37:16.074257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:37:16.074261-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:37:16.074265-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:37:16.074268-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:37:16.074271-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:37:16.074274-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:37:16.074276-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:37:16.074279-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:37:16.074281-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Runtimes: runc io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:37:16.074285-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:37:16.074288-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:37:16.074292-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:37:16.074295-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:37:16.074299-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:37:16.074303-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:37:16.074306-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:37:16.074309-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:37:16.074313-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:37:16.074727-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:37:16.074734-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:37:16.074738-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:37:16.074742-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:37:16.074745-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:37:16.074749-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:37:16.074754-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Name: false-996000\r\n"} +{"Time":"2023-05-31T12:37:16.074758-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ID: 93186b12-02c4-4728-9cc4-9fc75fb75db7\r\n"} +{"Time":"2023-05-31T12:37:16.074762-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:37:16.074765-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:37:16.074769-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:37:16.074772-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:37:16.074776-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:37:16.074779-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:37:16.074782-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:37:16.074786-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:37:16.074789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:37:16.074794-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:37:16.074797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.074801-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.074804-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.074807-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:37:16.074811-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:16.074815-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Loaded: loaded (\u001b]8;;file://false-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:16.07482-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:37:16.074824-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" └─\u001b]8;;file://false-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:16.075135-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:36:13 UTC; 56s ago\r\n"} +{"Time":"2023-05-31T12:37:16.075143-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:37:16.075148-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:16.075165-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Main PID: 1265 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:37:16.075172-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Tasks: 11\r\n"} +{"Time":"2023-05-31T12:37:16.075176-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Memory: 17.4M\r\n"} +{"Time":"2023-05-31T12:37:16.07518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CPU: 1.333s\r\n"} +{"Time":"2023-05-31T12:37:16.075184-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:37:16.075187-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" └─1265 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:37:16.075191-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.075194-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:18Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/1b2ffc29fd98e76609c367f9a3ace1911295e9147d235d811229462de40d637f/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:16.075198-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:18Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/1ef3271f69abdad588003d99d955ad927c11e5e68b3758671feafa366e35704f/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:16.075202-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:18Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/158c18362a0dd2413270c545feb9f563249a1dab83928c1d21b74e504a5a5a24/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:16.075207-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:18 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:18Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/bcbb693ff66ad89339cb0700d191c0da389fb83cc1c5387aaa59b0ceee3851a1/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:16.075211-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:38 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:38Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/ed81c09f90afae48612e032f8878a140cb62e1413c8214e7907698cd23ff9b9b/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:16.075215-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:39Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/29185f3dfe8ebf370bfe83b27aade2e4dfd9cc51918032baaf9ad70901904097/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:16.075776-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:39Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/51cb88bf601dd33c3d823c411928f4798697b8cc821a3ffa6294d97f7b8cab07/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:37:16.075782-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:42Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18/resolv.conf as [nameserver 10.96.0.10 search default.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\r\n"} +{"Time":"2023-05-31T12:37:16.075785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:45 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:45Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/24,},}\"\r\n"} +{"Time":"2023-05-31T12:37:16.075789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:48 false-996000 cri-dockerd[1265]: time=\"2023-05-31T19:36:48Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:37:16.075791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.075793-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.075796-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:37:16.075798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;34m# \u001b]8;;file://false-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.075801-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:16.075803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:16.075805-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:37:16.075808-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:37:16.07581-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:16.075812-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:37:16.075816-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.075821-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.075824-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:16.076317-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:37:16.076322-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:37:16.076324-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:37:16.076327-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:37:16.076329-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:16.076332-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.076335-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:37:16.076339-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:37:16.076343-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:37:16.076352-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:37:16.076355-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.076357-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:37:16.07636-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:37:16.076362-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:37:16.076364-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:37:16.076366-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.076368-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:16.076371-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:16.076373-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.076375-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.076378-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.076381-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.076384-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:37:16.076388-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:37:16.076989-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.076995-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:16.076997-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:16.077002-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.077004-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:16.077006-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:16.077009-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.077011-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;34m# \u001b]8;;file://false-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.077014-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.077016-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:37:16.077019-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:37:16.077021-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.077023-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.077025-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:37:16.077028-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.07703-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:37:16.077032-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:37:16.077035-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.077037-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:37:16.077039-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:16.077042-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:37:16.077044-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:37:16.077046-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:37:16.077049-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:16.077474-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:37:16.077481-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.077484-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.077487-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:16.077489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:37:16.077492-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:37:16.077494-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:37:16.077496-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:37:16.077499-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:16.077501-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.077503-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:37:16.077506-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:37:16.07751-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:37:16.077512-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:37:16.077514-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.077517-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:37:16.077519-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:37:16.077521-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:37:16.077524-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:37:16.077526-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.077528-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:16.07753-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:16.077533-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.077535-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.077951-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.077957-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.077959-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:37:16.077962-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:37:16.077964-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.077966-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:16.077968-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:16.07797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.077972-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:16.077974-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:16.077977-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.07798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.077982-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:37:16.077985-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:37:16.077987-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.077989-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.077991-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:37:16.077993-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:37:16.077996-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Loaded: loaded (\u001b]8;;file://false-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:16.077999-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:36:12 UTC; 1min 0s ago\r\n"} +{"Time":"2023-05-31T12:37:16.078002-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:16.078004-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Main PID: 826 (containerd)\r\n"} +{"Time":"2023-05-31T12:37:16.078006-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Tasks: 181\r\n"} +{"Time":"2023-05-31T12:37:16.078008-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Memory: 67.5M\r\n"} +{"Time":"2023-05-31T12:37:16.078011-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CPU: 2.255s\r\n"} +{"Time":"2023-05-31T12:37:16.078313-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:37:16.078318-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─ 826 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:37:16.07832-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─1911 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 1ef3271f69abdad588003d99d955ad927c11e5e68b3758671feafa366e35704f -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078323-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─1920 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 1b2ffc29fd98e76609c367f9a3ace1911295e9147d235d811229462de40d637f -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078327-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─1965 /usr/bin/containerd-shim-runc-v2 -namespace moby -id bcbb693ff66ad89339cb0700d191c0da389fb83cc1c5387aaa59b0ceee3851a1 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.07833-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─1966 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 158c18362a0dd2413270c545feb9f563249a1dab83928c1d21b74e504a5a5a24 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078332-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─2092 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 34687a54fd1100a6cb8579939784bce8c87b085a6daa3efe9e7e7a5045c30df3 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078335-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─2122 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 86d214377803bd4d5547cd743031862cb3fa688da08afa3f32e12b212f392993 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078337-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─2126 /usr/bin/containerd-shim-runc-v2 -namespace moby -id cdf121873df00e80a5360636ac601dd8cdfaa2c7fa5d2cd13ced23e9b9c9dedb -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.07834-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─2179 /usr/bin/containerd-shim-runc-v2 -namespace moby -id b0c345074bbbde58bb8ab87f81d724bad7c2513c3108d0a167903b25b3ee8229 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078342-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─2897 /usr/bin/containerd-shim-runc-v2 -namespace moby -id ed81c09f90afae48612e032f8878a140cb62e1413c8214e7907698cd23ff9b9b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078345-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─2946 /usr/bin/containerd-shim-runc-v2 -namespace moby -id b8b482c537aebebd93c4758939c088545fe80154afd45082e0d23bef80e71ce3 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078347-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─3118 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 29185f3dfe8ebf370bfe83b27aade2e4dfd9cc51918032baaf9ad70901904097 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.07835-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─3195 /usr/bin/containerd-shim-runc-v2 -namespace moby -id c4363f8b446c61ff4da774e0829053af849b64e7631a3e25495e0f035b12a959 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078753-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─3242 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 51cb88bf601dd33c3d823c411928f4798697b8cc821a3ffa6294d97f7b8cab07 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078761-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─3281 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 7f7e0ea065c7354e054c6cc8ffaa0bb7fd4879aa1b19294187ea628746ccf501 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078767-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ├─3354 /usr/bin/containerd-shim-runc-v2 -namespace moby -id c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078771-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" └─3549 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 358a5f10f55e81e95543a57e241b231aaaaac9783df69a063c9d77dda2120aa7 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:37:16.078775-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.078779-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 containerd[826]: time=\"2023-05-31T19:36:39.490057811Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:37:16.078785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:39 false-996000 containerd[826]: time=\"2023-05-31T19:36:39.490491270Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/7f7e0ea065c7354e054c6cc8ffaa0bb7fd4879aa1b19294187ea628746ccf501 pid=3281 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:37:16.078788-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 containerd[826]: time=\"2023-05-31T19:36:42.740245394Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:37:16.078792-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 containerd[826]: time=\"2023-05-31T19:36:42.740332365Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:37:16.078794-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 containerd[826]: time=\"2023-05-31T19:36:42.740342154Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:37:16.078797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:42 false-996000 containerd[826]: time=\"2023-05-31T19:36:42.740653668Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/c7ae8da418e8dd17744fa6e7fc40688535e04e3ae8ffed26206943d18a7ecb18 pid=3354 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:37:16.0788-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:48 false-996000 containerd[826]: time=\"2023-05-31T19:36:48.165398445Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:37:16.078803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:48 false-996000 containerd[826]: time=\"2023-05-31T19:36:48.165572347Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:37:16.079234-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:48 false-996000 containerd[826]: time=\"2023-05-31T19:36:48.165582018Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:37:16.079241-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" May 31 19:36:48 false-996000 containerd[826]: time=\"2023-05-31T19:36:48.165816613Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/358a5f10f55e81e95543a57e241b231aaaaac9783df69a063c9d77dda2120aa7 pid=3549 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:37:16.079244-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.079246-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.079248-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:37:16.079251-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;34m# \u001b]8;;file://false-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.079253-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:37:16.079257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.07926-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:37:16.079262-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:37:16.079264-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:37:16.079266-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.079269-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:37:16.079271-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.079273-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:37:16.079275-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:37:16.079278-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:37:16.07928-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:37:16.079282-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:37:16.079284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.079811-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:16.079817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:37:16.079819-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:37:16.079822-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:37:16.079824-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.079826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.079828-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:37:16.079832-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:37:16.079834-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.079836-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:16.07984-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:16.079843-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:16.079847-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:16.07985-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:37:16.079854-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:16.079858-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:16.079862-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.079867-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.079871-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.079875-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:37:16.079879-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:37:16.079882-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.079885-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:37:16.079887-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.079889-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:16.079891-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:16.079894-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.080721-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.08073-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:37:16.080734-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:37:16.080737-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.080739-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:37:16.080742-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:37:16.080744-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:37:16.080747-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.08075-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:37:16.080752-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.080755-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:37:16.080758-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:37:16.080761-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:37:16.080763-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:37:16.080765-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:37:16.080768-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.080771-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:16.080773-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:37:16.080776-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:37:16.080778-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:37:16.08078-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.080783-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.080785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:37:16.080788-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:37:16.081188-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.081195-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:16.0812-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:37:16.081202-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:37:16.081205-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:37:16.081207-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:37:16.081209-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:37:16.081212-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:37:16.081214-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.081217-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.08122-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.081223-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:37:16.081225-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:37:16.081228-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.08123-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:37:16.081232-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.081235-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:16.081237-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:16.081239-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.081242-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.081244-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:37:16.081246-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:37:16.081248-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:16.081251-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:16.081254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:37:16.081256-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:37:16.081889-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.081897-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:37:16.0819-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:37:16.081903-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.081905-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.081907-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:37:16.081911-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:37:16.081913-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.081915-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:37:16.081917-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.081919-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.081924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.081927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.081931-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.081934-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:37:16.081936-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.08194-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:37:16.081945-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.081948-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:37:16.081952-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.081955-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.081959-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:37:16.081963-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:37:16.081967-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:37:16.08197-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:37:16.081974-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.081978-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:37:16.081982-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:37:16.082366-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:37:16.082376-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:37:16.08238-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:37:16.082384-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:37:16.08239-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:37:16.082395-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.082398-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:37:16.082404-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:37:16.082408-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:37:16.082412-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.082416-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:37:16.08242-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.082424-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.082428-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.082456-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:37:16.082462-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:16.082466-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:37:16.082474-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:37:16.082487-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:37:16.082496-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.082505-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:37:16.082527-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:37:16.082536-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:37:16.08254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.083681-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:37:16.083694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:37:16.083699-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.083704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:37:16.083708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:37:16.083711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:37:16.083726-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:37:16.083737-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:37:16.083741-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:37:16.083745-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:37:16.083749-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:37:16.083757-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.083761-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.083764-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:37:16.083767-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:37:16.08377-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:37:16.083774-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:37:16.083778-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.083781-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:37:16.083787-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:16.083791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:16.083797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.083801-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:37:16.083804-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.083808-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:37:16.083811-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.083815-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.08479-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:37:16.084813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.084832-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.08484-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.084844-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.084848-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.084852-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.084856-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:37:16.08486-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:37:16.084865-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.084869-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:37:16.084873-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:37:16.084876-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.084881-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.084886-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.08489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.084894-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.084899-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.084903-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:37:16.084906-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.08491-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:37:16.084914-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.084917-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:37:16.084921-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.084925-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:37:16.084929-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:37:16.084934-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:37:16.084938-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:37:16.085548-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:37:16.085559-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:37:16.085563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.085582-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:37:16.085587-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:37:16.085591-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:37:16.085597-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:37:16.085606-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:37:16.085613-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:37:16.085619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:37:16.085623-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:37:16.085626-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:37:16.08563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:37:16.085634-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:37:16.085638-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:37:16.085641-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:37:16.085645-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:37:16.085652-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:37:16.085656-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:37:16.08566-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:37:16.085663-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:37:16.085668-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:37:16.085676-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:37:16.085697-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.085711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:37:16.08639-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:37:16.0864-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:37:16.086407-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.086414-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.086418-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:37:16.086422-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:37:16.086426-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:37:16.08643-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.086433-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.086436-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:37:16.086439-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.086443-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:37:16.086447-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.08645-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:37:16.086455-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:37:16.086459-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:37:16.086462-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:37:16.086465-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:37:16.086468-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.086472-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:37:16.086475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.086479-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.086484-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:37:16.086488-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:16.086493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:16.087332-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:16.087347-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087352-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087357-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087362-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087366-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.087375-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:37:16.08738-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.087384-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:37:16.087389-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.087393-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:16.087398-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087402-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087406-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:37:16.087411-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:16.087415-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:16.087419-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:16.087424-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087428-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087432-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.087436-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:37:16.087442-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.087449-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:37:16.087455-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:37:16.087462-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.088698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:37:16.088731-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.088738-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.088747-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:37:16.088751-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:16.088756-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:16.088794-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:16.088802-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.088806-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.088812-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.088819-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.088825-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.08883-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:37:16.088835-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.088839-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:37:16.088843-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:37:16.088848-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.088851-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:37:16.088856-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:37:16.08886-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.088864-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:37:16.08887-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.088875-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:37:16.088878-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.088882-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:37:16.089787-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.089802-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:37:16.089812-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.089819-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:37:16.089828-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.089834-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.089855-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.089859-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:37:16.089863-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:37:16.089867-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.08987-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:37:16.089874-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:37:16.089878-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.089882-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:37:16.089886-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:37:16.089889-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:37:16.089893-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.089897-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:37:16.089901-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:37:16.089904-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.089908-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:37:16.089911-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:37:16.089916-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.08992-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:37:16.089924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:37:16.089928-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.089932-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.090414-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:37:16.090423-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:37:16.090429-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.090435-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:37:16.09044-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:37:16.090444-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:37:16.090448-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.090452-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:37:16.090456-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:37:16.09046-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.090463-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:37:16.090467-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.090472-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.090476-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:37:16.09048-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.090484-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.090488-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:37:16.090492-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.090496-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.0905-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:37:16.090504-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:37:16.090508-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.090512-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:37:16.090516-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.09052-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.090523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.090527-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.091327-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.091338-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:37:16.091343-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.091347-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.091351-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:37:16.091355-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.091359-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:37:16.091363-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.091367-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:37:16.091371-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.091375-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.091379-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:37:16.091382-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.091387-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:37:16.091413-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.09142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.091427-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:37:16.091431-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.091435-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:37:16.091439-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.091443-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:37:16.091447-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:37:16.091451-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:37:16.091456-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:37:16.091461-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:37:16.091466-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:37:16.092198-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.09221-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:37:16.092215-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:37:16.09222-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:37:16.092226-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:37:16.092258-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:37:16.092265-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:37:16.09227-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.092274-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:37:16.09228-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:37:16.092284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:37:16.092289-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:37:16.092293-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:37:16.092298-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:37:16.092302-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.092306-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:37:16.09231-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.092314-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.092318-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:37:16.092323-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.092327-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.092331-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:37:16.092335-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:37:16.092341-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Loaded: loaded (\u001b]8;;file://false-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:37:16.094019-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:37:16.094079-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:37:16.094093-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:37:16.094102-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.094107-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.094121-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:37:16.094127-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[0;1;34m# \u001b]8;;file://false-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:37:16.094132-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:37:16.094137-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:37:16.094141-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:37:16.094145-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:16.09415-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:37:16.094155-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:37:16.094159-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.094162-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:37:16.094166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:37:16.094172-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:37:16.094176-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:37:16.09418-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:37:16.094184-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:37:16.094187-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:37:16.094191-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:37:16.094195-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:37:16.094198-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:37:16.094202-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:37:16.094814-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.094823-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:37:16.09483-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:37:16.094834-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:37:16.094839-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:37:16.094843-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:37:16.094847-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:37:16.094851-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.094857-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:37:16.094861-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:37:16.094866-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:37:16.094872-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.094876-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.09488-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:37:16.094885-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:37:16.094889-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:16.094894-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.094898-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:16.094902-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.094906-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:37:16.09491-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:37:16.094915-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.094919-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.094923-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:37:16.094928-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.094933-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.094937-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:37:16.095603-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.095613-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:37:16.095618-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:37:16.095641-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:37:16.095645-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:37:16.095649-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.095653-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:37:16.095657-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.095661-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:37:16.095665-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:37:16.095671-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:37:16.095675-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:37:16.095677-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.095679-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:37:16.095682-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:37:16.095686-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:37:16.09569-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:37:16.095694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:37:16.095698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.095701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:37:16.095705-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:37:16.095712-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:37:16.095723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.09573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:37:16.096199-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:37:16.096211-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.096217-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:37:16.096222-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:37:16.096226-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:37:16.09623-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.096235-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:37:16.09624-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:37:16.096243-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:37:16.096249-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.096253-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.096257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:37:16.096261-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:37:16.096265-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:37:16.09627-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.096274-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:37:16.096278-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:37:16.096282-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:37:16.096286-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:37:16.096291-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.096295-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:37:16.096299-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:37:16.096304-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:37:16.097035-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:37:16.09705-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.09706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:37:16.097066-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:37:16.09707-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:37:16.097076-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.097082-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:37:16.09709-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:37:16.0971-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:37:16.097103-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:37:16.097106-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.097108-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:37:16.097112-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:37:16.097128-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.097136-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:37:16.097142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:37:16.097146-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.09715-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:37:16.097155-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:37:16.097159-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.097163-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:37:16.097167-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:37:16.097174-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:37:16.097178-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.097182-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:37:16.098382-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:37:16.098393-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.098398-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:37:16.098401-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.098405-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.098412-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:37:16.098417-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:37:16.098423-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:37:16.098427-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.098431-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.098434-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:37:16.098438-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:37:16.098442-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.098446-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.09845-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:37:16.098454-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:37:16.098458-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:37:16.098462-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.098465-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.098469-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:37:16.098475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:37:16.098479-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.098499-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:37:16.098503-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:37:16.09909-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099101-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:37:16.099107-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:37:16.099111-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:37:16.099115-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.09912-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:37:16.099125-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:37:16.099133-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:37:16.099138-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:37:16.099142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:37:16.099146-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.099151-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099156-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:37:16.09916-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:37:16.099164-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099168-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:37:16.099173-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.099178-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:37:16.099182-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099187-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:37:16.099191-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:37:16.099196-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:37:16.099201-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.099205-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099211-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:37:16.099688-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:37:16.099717-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.099725-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099729-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:37:16.099735-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:37:16.099739-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:37:16.099743-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:37:16.099748-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.099752-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099756-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:37:16.099762-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:37:16.099767-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:37:16.099771-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:37:16.099775-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.099779-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:37:16.099789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:37:16.099793-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.099797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:37:16.099802-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:37:16.099806-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.099811-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.099816-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.09982-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:37:16.100282-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:37:16.100292-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:37:16.100297-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:37:16.100302-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:37:16.100306-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.100311-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:37:16.100315-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:37:16.10032-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:37:16.100326-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:37:16.10033-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.100334-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:37:16.100339-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.100344-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:37:16.100348-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:37:16.100352-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.100356-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.100362-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:37:16.100366-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:37:16.10037-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:37:16.100375-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.100379-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:37:16.100384-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.100388-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.100392-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.100396-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:37:16.100926-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:37:16.100936-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.100941-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:37:16.100946-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.10095-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.100958-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:37:16.100963-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:37:16.100966-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:37:16.10097-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:37:16.100975-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:37:16.10098-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:37:16.100985-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:37:16.100989-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:37:16.100993-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:37:16.100998-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:37:16.101002-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:37:16.101006-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:37:16.10101-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:37:16.101016-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.10102-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.101024-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:37:16.101028-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:37:16.101037-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:37:16.101044-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.101049-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:37:16.101566-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:37:16.101578-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:37:16.101583-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.101588-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.101594-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:37:16.101598-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:37:16.101603-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:37:16.101622-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:37:16.101627-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.101633-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.101645-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:37:16.101652-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:37:16.101666-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:37:16.101678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:37:16.101687-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:37:16.101696-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.101701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.101705-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:37:16.101709-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:37:16.101714-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:37:16.101719-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:37:16.101723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.101731-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.101736-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:37:16.10174-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:37:16.102095-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:37:16.102101-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:37:16.102125-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.10213-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:37:16.102135-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:37:16.102139-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:37:16.102143-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:37:16.102147-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.102155-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.102159-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:37:16.102164-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:37:16.102168-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:37:16.102173-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.102177-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:37:16.102181-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:37:16.102185-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:37:16.10219-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.102193-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:37:16.102196-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:37:16.102199-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:37:16.102202-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:37:16.102204-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.102207-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.102872-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.10288-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:37:16.102884-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:37:16.102886-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:37:16.102889-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.102892-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:37:16.102894-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:37:16.102898-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:37:16.1029-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:37:16.102903-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:37:16.102905-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.102908-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:37:16.10291-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:37:16.102914-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.102917-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:37:16.102922-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:37:16.102924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.102927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:37:16.102929-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:37:16.102932-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.102934-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:37:16.102937-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.10294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.102942-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:37:16.103535-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:37:16.103546-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.10355-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:37:16.103555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:37:16.103559-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.103563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:37:16.103568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.103572-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:37:16.103576-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.10358-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.103584-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.103588-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:37:16.103592-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:37:16.103597-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:37:16.103603-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.103607-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.103611-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:37:16.103615-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:37:16.103619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:37:16.103622-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.103631-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.103642-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:37:16.103649-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:37:16.103657-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:37:16.104205-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:37:16.104218-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.104227-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:37:16.104233-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:37:16.104239-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:37:16.104245-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:37:16.104249-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.104254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:37:16.104259-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:37:16.104263-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:37:16.104268-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:37:16.104272-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.104277-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:37:16.104283-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:37:16.104288-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:37:16.104292-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:37:16.104296-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:37:16.104302-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.104319-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:37:16.104329-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:37:16.104335-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:37:16.104342-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.104347-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.105112-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:37:16.105123-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:37:16.105127-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:37:16.105131-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.105136-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:37:16.10514-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.105144-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.105148-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:37:16.105153-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:37:16.105161-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:37:16.105168-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.105173-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.105177-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:37:16.105182-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:37:16.105186-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:37:16.10519-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:37:16.105198-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:37:16.105205-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:37:16.105209-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:37:16.105213-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.10522-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.105224-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:37:16.105228-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:37:16.106056-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:37:16.106074-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:37:16.106084-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.106091-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:37:16.106098-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:37:16.106103-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:16.106108-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:37:16.106113-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:16.106123-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:16.106129-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:37:16.106135-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:37:16.106139-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:37:16.106144-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:37:16.106149-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:37:16.106158-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:37:16.106164-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:37:16.106169-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:37:16.106173-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:37:16.106178-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:37:16.106182-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:37:16.106186-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:37:16.10619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:37:16.106642-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:37:16.106664-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:37:16.106678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:37:16.106687-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:37:16.106695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:37:16.106701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:37:16.106706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:37:16.106715-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:37:16.106723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:37:16.106728-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:37:16.106733-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:37:16.106738-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:37:16.106762-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:37:16.106777-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.106789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.106798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:16.106807-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.106812-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:16.106836-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.106842-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.106846-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.106849-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:16.106853-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:37:16.107655-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:37:16.107673-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.107684-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:16.107692-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.107698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:16.107702-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:37:16.10771-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:37:16.107723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.107734-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:16.10774-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:37:16.107746-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.107755-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:16.107762-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.107768-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:37:16.107772-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:37:16.107776-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:37:16.10778-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.107784-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:37:16.107791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:37:16.107795-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:37:16.1078-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.107804-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:37:16.107809-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:37:16.107813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.107817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:37:16.107823-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:37:16.108163-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.108171-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:37:16.108175-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:37:16.10818-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.108184-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:37:16.108189-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:37:16.108194-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:37:16.108199-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:37:16.108203-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:37:16.108207-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:37:16.108212-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:37:16.108216-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:37:16.108227-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:37:16.108237-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:37:16.108242-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:37:16.108246-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:37:16.108254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:37:16.108261-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:37:16.108265-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:37:16.108268-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:37:16.108272-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:37:16.108276-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:37:16.108622-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:37:16.10863-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:37:16.108635-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:37:16.108639-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:37:16.108643-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:37:16.108648-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:37:16.108653-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:16.108656-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.10866-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:37:16.108665-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.10867-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:37:16.108674-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:37:16.108679-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:37:16.108683-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:37:16.108687-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:37:16.108692-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:37:16.108696-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.108701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:37:16.108704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:37:16.108708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.108712-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:37:16.108717-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:37:16.10887-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.108879-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.108884-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:37:16.108889-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.108897-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:37:16.108901-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.108905-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:37:16.108909-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:37:16.108913-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.108918-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.108922-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.108927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:37:16.108931-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:37:16.108936-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:37:16.10894-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.108943-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:37:16.108946-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.10895-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:37:16.108954-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:37:16.10896-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:37:16.10897-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:37:16.108979-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:37:16.108984-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.10934-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109348-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:37:16.109353-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:37:16.109356-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:37:16.10936-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:37:16.109364-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.109368-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109372-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:37:16.109389-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:37:16.109395-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:37:16.109403-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109407-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:37:16.109411-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.109414-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109418-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:37:16.109422-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:37:16.109425-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:37:16.109429-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109432-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:37:16.109436-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:37:16.10944-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.109444-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109448-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:37:16.109451-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:37:16.109455-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109459-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:37:16.10972-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:37:16.109731-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:37:16.109738-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.109751-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109757-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:37:16.109762-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:37:16.109791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.10985-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:37:16.109861-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:37:16.109866-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.109872-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:37:16.109876-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:37:16.10988-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:37:16.109885-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:37:16.109889-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:37:16.109893-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:37:16.109897-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:37:16.109901-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.109904-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:37:16.109907-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:37:16.109911-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:37:16.109916-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:37:16.109921-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:37:16.109924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:37:16.109927-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:37:16.11-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:37:16.11001-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:37:16.110016-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.11002-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:37:16.110024-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:37:16.110028-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.110032-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:37:16.11004-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.110045-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.110051-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.110056-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.11006-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.110065-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.110069-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.110075-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.110081-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.110089-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:37:16.110098-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:37:16.110103-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110111-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:37:16.110119-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.110123-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110133-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:37:16.110137-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:37:16.110142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:37:16.110404-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:37:16.110414-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.110419-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110424-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:37:16.110428-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:37:16.110432-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.11044-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110448-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:37:16.110455-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:37:16.110461-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110469-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:37:16.110475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:37:16.110497-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110503-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:37:16.110507-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:37:16.11051-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110514-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:37:16.110518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:37:16.110522-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110526-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:37:16.11053-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:37:16.110534-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110538-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:37:16.110544-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:37:16.110547-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:37:16.110752-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110759-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.110763-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.110768-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:37:16.110774-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:37:15.990448663Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:37:16.11078-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:37:16.110789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:37:16.110797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:37:16.110806-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:37:16.110811-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.110819-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:37:16.110829-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110837-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:37:16.110843-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:37:16.110846-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:37:16.110849-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:37:16.110853-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.110855-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:37:16.110859-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:37:16.110864-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:37:16.110868-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:37:16.110873-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:37:16.111115-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111125-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:37:16.11113-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:37:16.111134-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:37:16.111138-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:37:16.111164-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:37:16.111173-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111179-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:37:16.111184-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:37:16.111188-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.111192-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111195-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:37:16.111199-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:37:16.111201-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:37:16.111204-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.111212-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111216-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:37:16.111219-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:37:16.111222-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:37:16.111224-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111226-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:37:16.11123-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:37:16.111234-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:37:16.111627-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:37:16.111639-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111646-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:37:16.11166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:37:16.111683-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:37:16.111688-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:37:16.111691-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111693-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:37:16.111697-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:37:16.1117-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:37:16.111704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:37:16.111726-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:37:16.111729-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:37:16.111732-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:37:16.111735-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111737-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:37:16.11174-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:37:16.111743-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111746-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:37:16.111748-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:37:16.111751-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.111753-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:37:16.111755-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:37:16.112038-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112048-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:37:16.112053-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:37:16.112058-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:37:16.112063-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112067-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:37:16.112072-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:37:16.112076-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11208-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:37:16.112085-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.11209-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112094-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:37:16.112098-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:37:16.112102-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:37:16.112107-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.112111-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112115-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:37:16.112119-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:37:16.112124-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.112128-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112132-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:37:16.112136-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:37:16.112141-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:37:16.112145-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.112149-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112512-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:37:16.112524-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:37:16.112532-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112537-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:37:16.112542-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:37:16.112546-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112549-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:37:16.112552-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:37:16.112556-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:37:16.112559-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112561-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:37:16.112564-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:37:16.112567-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:37:16.112571-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:37:16.112573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:37:16.112576-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.112579-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112581-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:37:16.112585-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:37:16.112589-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112591-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:37:16.112594-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.112597-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:37:16.1126-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:37:16.112808-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:37:16.112813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:37:16.112817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.112822-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:37:16.112831-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:37:16.112835-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.112839-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112844-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:37:16.112848-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:37:16.112852-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:37:16.112858-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:37:16.112861-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.112865-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11287-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:37:16.112874-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:37:16.112898-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:37:16.112904-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:37:16.112907-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.11291-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.112912-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:37:16.112915-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:37:16.112918-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11292-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:37:16.11313-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:37:16.11314-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.113144-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.113149-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113154-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:37:16.113158-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:37:16.113162-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:37:16.113166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:37:16.11317-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:37:16.113174-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113179-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:37:16.113183-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:37:16.113196-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:37:16.113203-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:37:16.113206-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.113209-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:37:16.113211-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113214-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:37:16.113217-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:37:16.11322-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.113222-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113225-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:37:16.113228-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:37:16.113426-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:37:16.113436-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113452-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:37:16.113463-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.113468-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.113472-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113477-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:37:16.113482-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:37:16.113486-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:37:16.113493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.113497-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113501-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:37:16.113507-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:37:16.113511-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:37:16.113515-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:37:16.113523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:37:16.113528-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:37:16.113532-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:37:16.113536-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:37:16.11354-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:37:16.113543-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:37:16.113547-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:37:16.113551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:37:16.113555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:37:16.113558-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.113792-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:37:16.113803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:37:16.113809-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:37:16.113813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:37:16.113822-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:37:16.113826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:37:16.11383-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.113834-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113839-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:37:16.113842-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:37:16.113847-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:37:16.113851-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:37:16.113855-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.113862-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113867-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:37:16.113871-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:37:16.113877-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:37:16.113881-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:37:16.113888-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:37:16.113893-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.113897-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.113901-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:37:16.114382-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:37:16.114406-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:37:16.114417-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:37:16.114422-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.114445-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.114452-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:37:16.114458-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:37:16.114463-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:37:16.114467-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:37:16.114471-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.114477-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:37:16.114481-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:37:16.114485-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:37:16.114489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:37:16.114493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.114497-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.1145-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:37:16.114505-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:37:16.11451-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:37:16.114516-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.114519-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:37:16.114523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:37:16.114526-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:37:16.11453-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.114841-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:37:16.114851-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:37:16.114856-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:37:16.114859-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:37:16.114864-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.114868-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.114872-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.114876-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:37:16.114883-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:37:16.114887-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:37:16.114891-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.114895-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:37:16.114903-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:37:16.114908-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:37:16.114913-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:37:16.114917-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:37:16.114921-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.114925-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:37:16.11493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:37:16.114936-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.114943-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:37:16.114953-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:37:16.115118-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115128-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:37:16.115132-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:37:16.115153-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:37:16.115171-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.115176-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:37:16.115184-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:37:16.115189-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115193-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:37:16.115198-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:37:16.115203-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.115207-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:37:16.115221-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115226-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:37:16.11523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.115235-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.115241-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115245-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:37:16.11525-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:37:16.115254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:37:16.115257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.115261-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115266-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:37:16.115422-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:37:16.115451-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:37:16.115461-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.115483-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:37:16.115493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:37:16.115497-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:37:16.115501-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:37:16.115505-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115509-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:37:16.115513-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:37:16.115515-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:37:16.115518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:37:16.11552-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115523-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:37:16.115527-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:37:16.115557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:37:16.115563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:37:16.115567-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:37:16.115574-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:37:16.11558-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:37:16.115588-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:37:16.115725-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:37:16.115736-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11574-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:37:16.115745-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:37:16.115749-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:37:16.115753-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.115764-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11577-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:37:16.115774-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:37:16.115778-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:37:16.115782-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:37:16.11579-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.115793-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:37:16.1158-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:37:16.115805-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:37:16.115809-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.115813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.115817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:37:16.115822-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:37:16.115826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:37:16.11583-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:37:16.116212-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:37:16.116229-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:37:16.116233-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:37:16.116236-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.116241-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.116245-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:37:16.116249-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:37:16.116253-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:37:16.116258-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:37:16.116269-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.116271-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:37:16.116274-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:37:16.116277-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:16.11628-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:37:16.116282-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:37:16.116285-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:37:16.116288-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:37:16.116291-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:37:16.116294-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:37:16.116297-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:37:16.1163-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:37:16.116304-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:37:16.116308-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:37:16.116629-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:37:16.11664-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:37:16.116655-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:37:16.116666-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:37:16.116672-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:37:16.116676-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:37:16.11668-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:37:16.116685-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:37:16.11669-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:37:16.116694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:37:16.1167-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:37:16.116706-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:37:16.116711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:37:16.116715-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:37:16.116721-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:37:16.116726-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:37:16.11673-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:37:16.116736-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:37:16.11674-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:37:16.116745-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.116749-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.116947-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:37:16.116957-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.116962-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:37:16.116978-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:37:16.116986-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.116991-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.116995-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.116999-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.117003-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117007-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.11701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.117014-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117018-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117021-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:37:16.117025-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:37:16.117029-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:37:16.117032-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117036-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:37:16.117041-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:37:16.117047-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:37:16.117051-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117054-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:37:16.117058-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:37:16.117061-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117065-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:37:16.117069-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:37:16.117073-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117196-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:37:16.117203-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:37:16.117207-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11721-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:37:16.117214-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:37:16.117217-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:37:16.117221-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:37:16.117225-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:37:16.117229-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:37:16.117234-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:37:16.117237-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:37:16.117241-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:37:16.117245-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:37:16.117249-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:37:16.117254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:37:16.117257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:37:16.117262-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:37:16.117266-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:37:16.117269-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:37:16.117273-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:37:16.117276-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:37:16.117438-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:37:16.117446-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:37:16.117491-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:37:16.117514-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:37:16.117538-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:37:16.117548-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:37:16.117553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \r\n"} +{"Time":"2023-05-31T12:37:16.117557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117562-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:37:16.117566-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" #\r\n"} +{"Time":"2023-05-31T12:37:16.117573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:37:16.117577-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:37:16.117582-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:37:16.117586-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:37:16.11759-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:37:16.117596-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:37:16.1176-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117604-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:37:16.11761-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:37:16.117614-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117618-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:37:16.117623-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:37:16.117781-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.117791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117796-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:37:16.117802-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.117807-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:37:16.117811-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:37:16.117821-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:37:16.117825-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.117834-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.117841-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117845-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:37:16.11785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:37:16.117854-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:37:16.11786-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:37:16.117864-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:37:16.11787-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.117874-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:37:16.11788-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:37:16.117884-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:37:16.117888-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:37:16.117892-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:37:16.117896-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.118142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.118152-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:37:16.118157-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:37:16.118161-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:37:16.118166-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:37:16.11817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.118174-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.118178-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:37:16.118182-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:37:16.118187-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:37:16.118203-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.118212-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:37:16.118217-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.118222-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.118226-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:37:16.11823-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:37:16.118235-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:37:16.118239-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.118243-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:37:16.118247-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:37:16.118253-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.118257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:37:16.118264-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:37:16.118276-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.118283-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:37:16.118557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:37:16.118568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:37:16.118575-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.118584-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.118588-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:37:16.118592-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:37:16.118595-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.118599-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:37:16.118602-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:37:16.118606-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.11861-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:37:16.118614-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:37:16.11864-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:37:16.11865-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:37:16.118655-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:37:16.118661-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:37:16.118665-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:37:16.118669-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.118673-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:37:16.118679-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:37:16.118683-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:37:16.118687-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:37:16.11869-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:37:16.118695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:37:16.1187-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:37:16.119142-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:37:16.119161-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:37:16.11919-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119199-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:37:16.119204-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:37:16.119208-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119214-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:37:16.119218-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119228-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119235-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119242-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.11925-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119254-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119259-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119269-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:37:16.119278-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:37:16.119287-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:37:16.119296-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:37:16.119306-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119312-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:37:16.119318-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.119326-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119331-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:37:16.119349-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:37:16.119357-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:37:16.119536-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:37:16.119544-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.119548-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:37:16.119557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:37:16.119562-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:37:16.119567-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119589-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:37:16.119595-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:37:16.119599-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119603-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:37:16.119608-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:37:16.119612-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119615-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:37:16.119619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:37:16.119623-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119627-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:37:16.119634-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:37:16.119639-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119643-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:37:16.119648-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:37:16.119652-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119656-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:37:16.119662-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:37:16.119667-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:37:16.119672-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \r\n"} +{"Time":"2023-05-31T12:37:16.119983-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:37:16.120003-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ----------------------- debugLogs end: false-996000 [took: 21.195292553s] --------------------------------\n"} +{"Time":"2023-05-31T12:37:16.120013-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:175: Cleaning up \"false-996000\" profile ...\n"} +{"Time":"2023-05-31T12:37:16.120018-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p false-996000\n"} +{"Time":"2023-05-31T12:37:18.460516-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"E0531 12:37:18.460473 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:18.791121-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p false-996000: (2.718975443s)\n"} +{"Time":"2023-05-31T12:37:18.791138-07:00","Action":"cont","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T12:37:18.79114-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== CONT TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T12:37:18.791163-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel/Start"} +{"Time":"2023-05-31T12:37:18.791166-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"=== RUN TestNetworkPlugins/group/flannel/Start\n"} +{"Time":"2023-05-31T12:37:18.791224-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p flannel-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=flannel --driver=docker \n"} +{"Time":"2023-05-31T12:37:31.711697-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:37:31.711641 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:53.02666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:37:53.026617 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:59.793916-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:37:59.793847 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:59.799154-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:37:59.799130 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:59.809287-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:37:59.809239 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:59.829406-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:37:59.829373 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:59.870523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:37:59.870473 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:37:59.950584-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:37:59.950540 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:00.112758-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:38:00.112708 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:00.433063-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:38:00.433032 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:01.073295-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:38:01.073255 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:02.353467-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:38:02.353436 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:04.9149-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:38:04.914850 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:10.035058-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:38:10.035023 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:14.218445-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p flannel-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=flannel --driver=docker : (55.426671286s)\n"} +{"Time":"2023-05-31T12:38:14.218485-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel/ControllerPod"} +{"Time":"2023-05-31T12:38:14.21849-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":"=== RUN TestNetworkPlugins/group/flannel/ControllerPod\n"} +{"Time":"2023-05-31T12:38:14.220023-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/flannel/ControllerPod: waiting 10m0s for pods matching \"app=flannel\" in namespace \"kube-flannel\" ...\n"} +{"Time":"2023-05-31T12:38:14.23049-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":" helpers_test.go:344: \"kube-flannel-ds-w8tzn\" [ea3cb72e-3709-45fa-8659-b980fcbb13fb] Running\n"} +{"Time":"2023-05-31T12:38:19.236383-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/flannel/ControllerPod: app=flannel healthy within 5.016312097s\n"} +{"Time":"2023-05-31T12:38:19.236403-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel/KubeletFlags"} +{"Time":"2023-05-31T12:38:19.236407-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/flannel/KubeletFlags\n"} +{"Time":"2023-05-31T12:38:19.236446-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p flannel-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:38:19.594559-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel/NetCatPod"} +{"Time":"2023-05-31T12:38:19.59457-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/flannel/NetCatPod\n"} +{"Time":"2023-05-31T12:38:19.594641-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context flannel-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:38:19.894888-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/flannel/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:38:19.897795-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-zzs2h\" [f0f3d72b-0f0c-428c-b307-a37e6f30263c] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:38:20.275321-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":"E0531 12:38:20.275288 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:26.90189-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-zzs2h\" [f0f3d72b-0f0c-428c-b307-a37e6f30263c] Running\n"} +{"Time":"2023-05-31T12:38:28.925153-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p enable-default-cni-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --enable-default-cni=true --driver=docker : (1m22.328949314s)\n"} +{"Time":"2023-05-31T12:38:28.925176-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags"} +{"Time":"2023-05-31T12:38:28.92518-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/KubeletFlags\n"} +{"Time":"2023-05-31T12:38:28.925206-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p enable-default-cni-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:38:29.287366-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod"} +{"Time":"2023-05-31T12:38:29.287377-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/NetCatPod\n"} +{"Time":"2023-05-31T12:38:29.287437-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context enable-default-cni-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:38:29.474396-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/enable-default-cni/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:38:29.486131-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-n2ncl\" [7a013e31-310e-46a8-89f8-6b9ca4a49262] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:38:32.901494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/flannel/NetCatPod: app=netcat healthy within 13.00651003s\n"} +{"Time":"2023-05-31T12:38:32.901534-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel/DNS"} +{"Time":"2023-05-31T12:38:32.901541-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/DNS","Output":"=== RUN TestNetworkPlugins/group/flannel/DNS\n"} +{"Time":"2023-05-31T12:38:32.901631-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context flannel-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:38:33.035675-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel/Localhost"} +{"Time":"2023-05-31T12:38:33.035692-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Localhost","Output":"=== RUN TestNetworkPlugins/group/flannel/Localhost\n"} +{"Time":"2023-05-31T12:38:33.035839-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context flannel-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:38:33.158461-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel/HairPin"} +{"Time":"2023-05-31T12:38:33.158479-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/HairPin","Output":"=== RUN TestNetworkPlugins/group/flannel/HairPin\n"} +{"Time":"2023-05-31T12:38:33.158598-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context flannel-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:38:33.280809-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net_test.go:209: \"flannel\" test finished in 17m3.479624357s, failed=false\n"} +{"Time":"2023-05-31T12:38:36.490163-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-n2ncl\" [7a013e31-310e-46a8-89f8-6b9ca4a49262] Running\n"} +{"Time":"2023-05-31T12:38:40.756302-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":"E0531 12:38:40.756245 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:38:42.489777-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/enable-default-cni/NetCatPod: app=netcat healthy within 13.01528463s\n"} +{"Time":"2023-05-31T12:38:42.489794-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/DNS"} +{"Time":"2023-05-31T12:38:42.489797-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/DNS","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/DNS\n"} +{"Time":"2023-05-31T12:38:42.489976-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context enable-default-cni-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:38:42.632111-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost"} +{"Time":"2023-05-31T12:38:42.632131-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/Localhost\n"} +{"Time":"2023-05-31T12:38:42.632236-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context enable-default-cni-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:38:42.76278-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin"} +{"Time":"2023-05-31T12:38:42.762793-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/HairPin\n"} +{"Time":"2023-05-31T12:38:42.76296-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context enable-default-cni-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:38:42.882629-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" net_test.go:209: \"enable-default-cni\" test finished in 17m13.081400795s, failed=false\n"} +{"Time":"2023-05-31T12:38:53.619444-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:38:53.619459-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ----------------------- debugLogs start: flannel-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:38:53.619465-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:38:53.619473-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:38:53.61948-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:38:53.619484-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619487-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:38:53.619491-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:38:53.619494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619499-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619505-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619509-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:38:53.619512-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:38:53.619515-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619519-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619522-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:38:53.619528-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:38:53.619534-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619537-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:38:53.619548-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:38:53.619557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:38:53.619566-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619571-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619578-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:38:53.619585-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:38:53.619594-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:38:53.619598-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:38:53.619602-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:38:53.619606-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:38:53.619612-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:38:53.619616-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:38:53.619618-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 10.244.0.3\tnetcat-7458db8b8-zzs2h\n"} +{"Time":"2023-05-31T12:38:53.61962-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619622-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:38:53.619626-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:38:53.619628-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:38:53.61963-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:38:53.619632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619634-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619636-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:38:53.619639-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:38:53.619642-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.619645-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:38:53.61965-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:38:53.619654-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:38:53.619657-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.61966-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:38:53.619663-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:38:53.619666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:38:53.619669-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:38:53.619671-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.619674-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:38:53.619677-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:38:53.61968-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.619683-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:38:53.619687-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:38:53.61969-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:38:53.619697-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:38:53.619704-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.61971-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:38:53.619716-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.61972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619724-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:38:53.619727-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:38:53.619731-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:38:53.619734-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:38:53.619737-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:38:53.619741-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:38:53.619744-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:38:53.619747-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.76.2\tflannel-996000\r\n"} +{"Time":"2023-05-31T12:38:53.61975-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:38:53.619754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.76.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:38:53.619756-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619759-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619762-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:38:53.619764-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:38:53.619767-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:38:53.61977-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619772-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619775-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:38:53.619778-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:38:53.619782-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node/flannel-996000 Ready control-plane 59s v1.27.2 192.168.76.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:38:53.619788-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619796-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:38:53.619804-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 58s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.61981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default service/netcat ClusterIP 10.98.107.118 \u003cnone\u003e 8080/TCP 21s app=netcat\n"} +{"Time":"2023-05-31T12:38:53.619814-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 56s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:38:53.61982-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619825-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:38:53.61983-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default endpoints/kubernetes 192.168.76.2:8443 58s\n"} +{"Time":"2023-05-31T12:38:53.619835-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default endpoints/netcat 10.244.0.3:8080 21s\n"} +{"Time":"2023-05-31T12:38:53.619838-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 42s\n"} +{"Time":"2023-05-31T12:38:53.619843-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 44s\n"} +{"Time":"2023-05-31T12:38:53.619846-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.61985-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:38:53.619857-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-flannel daemonset.apps/kube-flannel-ds 1 1 1 1 1 \u003cnone\u003e 55s kube-flannel docker.io/flannel/flannel:v0.21.5 app=flannel\n"} +{"Time":"2023-05-31T12:38:53.619866-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 56s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.619874-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.61988-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:38:53.619888-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default deployment.apps/netcat 1/1 1 1 21s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:38:53.619897-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system deployment.apps/coredns 1/1 1 1 56s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:38:53.619904-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619912-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:38:53.61992-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default pod/netcat-7458db8b8-zzs2h 1/1 Running 0 21s 10.244.0.3 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.619927-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-flannel pod/kube-flannel-ds-w8tzn 1/1 Running 0 44s 192.168.76.2 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.619933-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/coredns-5d78c9869d-85wf5 1/1 Running 1 (29s ago) 44s 10.244.0.2 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.619939-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/etcd-flannel-996000 1/1 Running 0 56s 192.168.76.2 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.619946-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/kube-apiserver-flannel-996000 1/1 Running 0 56s 192.168.76.2 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.619952-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/kube-controller-manager-flannel-996000 1/1 Running 0 56s 192.168.76.2 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.619957-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/kube-proxy-r7j6k 1/1 Running 0 44s 192.168.76.2 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.61996-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/kube-scheduler-flannel-996000 1/1 Running 0 56s 192.168.76.2 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.619962-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/storage-provisioner 1/1 Running 0 42s 192.168.76.2 flannel-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.619966-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619971-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.619977-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:38:53.619981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:38:53.619987-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 742ebfd312c95 20 seconds ago Ready netcat-7458db8b8-zzs2h default 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.619993-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 41e98f7ea8137 29 seconds ago Ready coredns-5d78c9869d-85wf5 kube-system 1 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.62-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 819c28e14a573 42 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.620005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1d5400ae35e4d 43 seconds ago NotReady coredns-5d78c9869d-85wf5 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.620008-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8e7b16390be85 43 seconds ago NotReady coredns-5d78c9869d-kq9r2 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.62001-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 408dcc81d0820 44 seconds ago Ready kube-flannel-ds-w8tzn kube-flannel 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.620013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 405f5ae01ed3d 44 seconds ago Ready kube-proxy-r7j6k kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.620015-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 6904c3e24629a About a minute ago Ready kube-scheduler-flannel-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.620017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 81b54b88dd099 About a minute ago Ready kube-controller-manager-flannel-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.62002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" d8430110ac25f About a minute ago Ready kube-apiserver-flannel-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.620022-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 16f486491d459 About a minute ago Ready etcd-flannel-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:38:53.620024-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620026-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620028-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:38:53.620031-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:38:53.620034-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bb0d9c8788f03 registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 15 seconds ago Running dnsutils 0 742ebfd312c95 netcat-7458db8b8-zzs2h\r\n"} +{"Time":"2023-05-31T12:38:53.620038-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ee00892b110a6 ead0a4a53df89 29 seconds ago Running coredns 1 41e98f7ea8137 coredns-5d78c9869d-85wf5\r\n"} +{"Time":"2023-05-31T12:38:53.62004-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a7bada4efa153 a6c0cb5dbd211 36 seconds ago Running kube-flannel 0 408dcc81d0820 kube-flannel-ds-w8tzn\r\n"} +{"Time":"2023-05-31T12:38:53.620043-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 59c1f42a1bbd1 flannel/flannel@sha256:2d5c29e591eab6e40a2959f96edf22e45a254f27769fdd2f03b5bc7f849c0de7 37 seconds ago Exited install-cni 0 408dcc81d0820 kube-flannel-ds-w8tzn\r\n"} +{"Time":"2023-05-31T12:38:53.620045-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cb8231ac7177d flannel/flannel-cni-plugin@sha256:bf4b62b131666d040f35a327d906ee5a3418280b68a88d9b9c7e828057210443 41 seconds ago Exited install-cni-plugin 0 408dcc81d0820 kube-flannel-ds-w8tzn\r\n"} +{"Time":"2023-05-31T12:38:53.620048-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" c4d23eafba1d4 6e38f40d628db 42 seconds ago Running storage-provisioner 0 819c28e14a573 storage-provisioner\r\n"} +{"Time":"2023-05-31T12:38:53.62005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 334c036f48c2a ead0a4a53df89 42 seconds ago Exited coredns 0 1d5400ae35e4d coredns-5d78c9869d-85wf5\r\n"} +{"Time":"2023-05-31T12:38:53.620052-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" d8104a4354c63 b8aa50768fd67 43 seconds ago Running kube-proxy 0 405f5ae01ed3d kube-proxy-r7j6k\r\n"} +{"Time":"2023-05-31T12:38:53.620056-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bb0ae02739c26 ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 81b54b88dd099 kube-controller-manager-flannel-996000\r\n"} +{"Time":"2023-05-31T12:38:53.620058-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7e88dfe12609d 89e70da428d29 About a minute ago Running kube-scheduler 0 6904c3e24629a kube-scheduler-flannel-996000\r\n"} +{"Time":"2023-05-31T12:38:53.620061-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 07641deca1e5b 86b6af7dd652c About a minute ago Running etcd 0 16f486491d459 etcd-flannel-996000\r\n"} +{"Time":"2023-05-31T12:38:53.620068-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 32d2e2c11c81b c5b13e4f7806d About a minute ago Running kube-apiserver 0 d8430110ac25f kube-apiserver-flannel-996000\r\n"} +{"Time":"2023-05-31T12:38:53.620071-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620072-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620074-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:38:53.620077-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:38:53.620079-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:38:53.620081-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CreationTimestamp: Wed, 31 May 2023 12:38:19 -0700\n"} +{"Time":"2023-05-31T12:38:53.620083-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:38:53.620086-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:38:53.620089-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:38:53.620092-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:38:53.620095-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:38:53.620097-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:38:53.620099-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:38:53.620102-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:38:53.620106-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:38:53.620113-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.620121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:38:53.620129-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:38:53.620136-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620144-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620149-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.620155-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:38:53.620161-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -c\n"} +{"Time":"2023-05-31T12:38:53.620164-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:38:53.620167-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.62017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620175-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:38:53.620178-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:38:53.620181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:38:53.620184-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:38:53.620188-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:38:53.620194-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620203-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:38:53.620209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.620212-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.620216-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.620219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal ScalingReplicaSet 22s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:38:53.620222-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620228-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:38:53.620231-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: netcat-7458db8b8-zzs2h\n"} +{"Time":"2023-05-31T12:38:53.620235-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:38:53.620238-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:38:53.620241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:38:53.620244-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.620246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 12:38:19 -0700\n"} +{"Time":"2023-05-31T12:38:53.620251-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:38:53.620256-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:38:53.620261-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620265-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:38:53.620268-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:38:53.620275-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:38:53.620282-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:38:53.620288-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:38:53.620296-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.620302-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:38:53.620308-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: docker://bb0d9c8788f036b5d6dfac596f792f4f50c0415e297dfc984a8ed6211bf3099a\n"} +{"Time":"2023-05-31T12:38:53.620312-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:38:53.620316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:38:53.620319-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620332-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.620335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:38:53.620341-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -c\n"} +{"Time":"2023-05-31T12:38:53.620345-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:38:53.620349-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:38:53.620352-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 12:38:25 -0700\n"} +{"Time":"2023-05-31T12:38:53.620355-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:38:53.620357-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:38:53.620359-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620361-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.620363-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-k29w6 (ro)\n"} +{"Time":"2023-05-31T12:38:53.620365-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:38:53.620367-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:38:53.620369-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:38:53.620371-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:38:53.620373-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:38:53.620375-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:38:53.620377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:38:53.620379-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-api-access-k29w6:\n"} +{"Time":"2023-05-31T12:38:53.620381-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:38:53.620384-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:38:53.620387-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.62039-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:38:53.620396-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:38:53.620402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:38:53.620408-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620414-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:38:53.620419-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:38:53.620423-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.620426-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.620429-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.620433-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Scheduled 22s default-scheduler Successfully assigned default/netcat-7458db8b8-zzs2h to flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.620438-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulling 21s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:38:53.620446-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 16s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.274330541s (5.274368939s including waiting)\n"} +{"Time":"2023-05-31T12:38:53.620452-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 16s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:38:53.620456-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 16s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:38:53.62046-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620463-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620466-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:38:53.620472-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.62048-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620485-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:38:53.62049-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:38:53.620497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.620501-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CreationTimestamp: Wed, 31 May 2023 12:37:44 -0700\n"} +{"Time":"2023-05-31T12:38:53.620505-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:38:53.620508-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:38:53.620511-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:38:53.620514-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:38:53.620517-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:38:53.62052-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:38:53.620523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:38:53.620527-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:38:53.62053-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:38:53.620537-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:38:53.62054-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.620544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" coredns:\n"} +{"Time":"2023-05-31T12:38:53.620547-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:38:53.620551-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:38:53.620554-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:38:53.620557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:38:53.620561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -conf\n"} +{"Time":"2023-05-31T12:38:53.620564-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:38:53.620567-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T12:38:53.620571-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:38:53.620574-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:38:53.620577-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:38:53.620581-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:38:53.620584-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:38:53.620587-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:38:53.620589-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620591-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.620593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:38:53.620595-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:38:53.620597-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:38:53.620599-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:38:53.620601-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:38:53.620603-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:38:53.620605-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:38:53.620607-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:38:53.620608-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:38:53.62061-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:38:53.620612-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:38:53.620614-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:38:53.620616-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.62062-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:38:53.620623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.620626-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.620629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.620632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal ScalingReplicaSet 45s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:38:53.620635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal ScalingReplicaSet 44s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:38:53.620638-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620641-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620644-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:38:53.620647-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: coredns-5d78c9869d-85wf5\n"} +{"Time":"2023-05-31T12:38:53.62065-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.620653-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:38:53.620656-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:38:53.62066-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:38:53.620662-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.620667-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 12:37:57 -0700\n"} +{"Time":"2023-05-31T12:38:53.620669-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:38:53.620672-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:38:53.620675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620679-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:38:53.620682-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:38:53.620685-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:38:53.620688-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:38:53.620691-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:38:53.620695-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.620698-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" coredns:\n"} +{"Time":"2023-05-31T12:38:53.620702-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: docker://ee00892b110a6ecd080b8023696fe01aa2f2dad695fe083b8dcb99d0e4e9b4a7\n"} +{"Time":"2023-05-31T12:38:53.620708-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:38:53.620714-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:38:53.62072-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:38:53.620725-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:38:53.620729-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:38:53.620733-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -conf\n"} +{"Time":"2023-05-31T12:38:53.620735-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:38:53.620737-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:38:53.620739-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 12:38:11 -0700\n"} +{"Time":"2023-05-31T12:38:53.620741-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Last State: Terminated\n"} +{"Time":"2023-05-31T12:38:53.620743-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:38:53.620746-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:38:53.620748-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 12:37:58 -0700\n"} +{"Time":"2023-05-31T12:38:53.620751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Finished: Wed, 31 May 2023 12:38:11 -0700\n"} +{"Time":"2023-05-31T12:38:53.620753-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:38:53.620755-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 1\n"} +{"Time":"2023-05-31T12:38:53.620757-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T12:38:53.620759-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:38:53.620761-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:38:53.620763-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:38:53.620765-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:38:53.620767-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:38:53.620769-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:38:53.620771-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.620773-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.620775-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:38:53.620777-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-2bspt (ro)\n"} +{"Time":"2023-05-31T12:38:53.620779-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:38:53.620781-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:38:53.620783-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:38:53.620785-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:38:53.620787-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:38:53.620789-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:38:53.620791-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:38:53.620793-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:38:53.620795-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:38:53.620797-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:38:53.620801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:38:53.620804-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-api-access-2bspt:\n"} +{"Time":"2023-05-31T12:38:53.620807-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:38:53.620811-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:38:53.620818-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.620825-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:38:53.62083-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:38:53.620836-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:38:53.620841-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:38:53.620847-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:38:53.620855-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:38:53.620861-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:38:53.620868-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:38:53.620876-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.620884-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.620889-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.620893-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Scheduled 44s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-85wf5 to flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.620896-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal SandboxChanged 42s kubelet Pod sandbox changed, it will be killed and re-created.\n"} +{"Time":"2023-05-31T12:38:53.6209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Killing 42s kubelet Stopping container coredns\n"} +{"Time":"2023-05-31T12:38:53.620904-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Warning Unhealthy 34s (x2 over 42s) kubelet Readiness probe failed: Get \"http://:8181/ready\": dial tcp :8181: connect: connection refused\n"} +{"Time":"2023-05-31T12:38:53.62091-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 30s (x2 over 43s) kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:38:53.620915-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 30s (x2 over 43s) kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:38:53.620918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 30s (x2 over 43s) kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:38:53.62092-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620923-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620925-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:38:53.620927-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" .:53\n"} +{"Time":"2023-05-31T12:38:53.620929-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] plugin/reload: Running configuration SHA512 = f869070685748660180df1b7a47d58cdafcf2f368266578c062d1151dc2c900964aecc5975e8882e6de6fdfb6460463e30ebfaad2ec8f0c3c6436f80225b3b5b\n"} +{"Time":"2023-05-31T12:38:53.620932-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:38:53.620934-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:38:53.620936-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 127.0.0.1:40315 - 31604 \"HINFO IN 1787728553241411989.7329727564708500467. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.012721931s\n"} +{"Time":"2023-05-31T12:38:53.62094-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:60000 - 9849 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.00027685s\n"} +{"Time":"2023-05-31T12:38:53.620942-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:57076 - 41674 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000183031s\n"} +{"Time":"2023-05-31T12:38:53.620944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:58153 - 10640 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000092956s\n"} +{"Time":"2023-05-31T12:38:53.620947-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:59300 - 30356 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000222115s\n"} +{"Time":"2023-05-31T12:38:53.620949-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:59300 - 30543 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000367924s\n"} +{"Time":"2023-05-31T12:38:53.620951-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:41156 - 42104 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000188086s\n"} +{"Time":"2023-05-31T12:38:53.620954-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:45068 - 62814 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000052212s\n"} +{"Time":"2023-05-31T12:38:53.620956-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:47355 - 40229 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000082295s\n"} +{"Time":"2023-05-31T12:38:53.620959-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620962-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.620965-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:38:53.620968-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-apiserver-flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.62097-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.620972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:38:53.620974-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:38:53.620976-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.620978-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 12:37:44 -0700\n"} +{"Time":"2023-05-31T12:38:53.62098-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:38:53.620982-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:38:53.620984-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.76.2:8443\n"} +{"Time":"2023-05-31T12:38:53.620986-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/config.hash: 10155c872311873e4b28db0de46d12e5\n"} +{"Time":"2023-05-31T12:38:53.620988-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/config.mirror: 10155c872311873e4b28db0de46d12e5\n"} +{"Time":"2023-05-31T12:38:53.62099-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/config.seen: 2023-05-31T19:37:44.249735771Z\n"} +{"Time":"2023-05-31T12:38:53.620992-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:38:53.620994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:38:53.620996-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.620998-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:38:53.621-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.621002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: Node/flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.621004-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.621006-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:38:53.621008-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: docker://32d2e2c11c81bc470a5e833aa69f58cf30e305913c544cdee651b20f3e9cfff5\n"} +{"Time":"2023-05-31T12:38:53.62101-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:38:53.621012-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:38:53.621026-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.621035-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.621039-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.621042-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:38:53.621046-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --advertise-address=192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.621049-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:38:53.621053-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:38:53.621056-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:38:53.62106-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:38:53.621063-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:38:53.621067-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:38:53.62107-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:38:53.621074-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:38:53.621077-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:38:53.621081-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:38:53.621084-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:38:53.621088-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:38:53.621091-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:38:53.621095-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:38:53.621098-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:38:53.621347-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.621353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:38:53.621357-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:38:53.62136-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:38:53.621363-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:38:53.621381-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:38:53.621385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:38:53.621388-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:38:53.621391-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:38:53.621394-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:38:53.621397-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:38:53.621401-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:38:53.621404-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 12:37:38 -0700\n"} +{"Time":"2023-05-31T12:38:53.621407-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:38:53.62141-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:38:53.621414-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:38:53.621417-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:38:53.621421-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Liveness: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:38:53.621425-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Readiness: http-get https://192.168.76.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:38:53.621428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Startup: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:38:53.621432-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.621435-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.621668-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:38:53.621676-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:38:53.62168-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:38:53.621682-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:38:53.621685-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:38:53.621688-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:38:53.621693-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:38:53.621697-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:38:53.6217-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:38:53.621703-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:38:53.621707-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:38:53.62171-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:38:53.621713-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:38:53.621716-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.621722-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:38:53.621727-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:38:53.621731-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:38:53.621735-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.621738-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:38:53.621742-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:38:53.621745-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:38:53.621763-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.621766-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:38:53.621769-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:38:53.622061-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:38:53.622067-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.622073-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:38:53.622076-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:38:53.622079-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:38:53.622082-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.622086-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:38:53.622088-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:38:53.622092-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:38:53.622095-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.622098-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:38:53.622101-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.622104-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.622107-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.622111-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 63s kubelet Container image \"registry.k8s.io/kube-apiserver:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:38:53.622115-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 63s kubelet Created container kube-apiserver\n"} +{"Time":"2023-05-31T12:38:53.622118-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 63s kubelet Started container kube-apiserver\n"} +{"Time":"2023-05-31T12:38:53.622121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.622124-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.622127-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:38:53.62213-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:38.919881 1 server.go:551] external host was not specified, using 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.622134-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:38.921129 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:38:53.622138-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:38.921193 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:38:53.622378-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:39.415716 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:38:53.622386-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:39.426657 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:38:53.622402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:39.426708 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:38:53.622407-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:39.826187 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622411-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:39.826226 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622414-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:39.827070 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:38:53.622418-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.108486 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622421-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.108748 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:38:53.622425-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.443257 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:38:53.622428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.489055 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622432-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.489094 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622435-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.489100 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622439-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.490613 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622442-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.490649 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622446-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.497930 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.498517 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622638-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.498556 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622642-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.498606 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622646-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.500822 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622649-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.500858 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622652-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.502618 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622656-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.502656 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622659-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.502661 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622663-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.503963 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622668-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.504002 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622672-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.505017 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.505395 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622679-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.508107 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622682-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.508144 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622686-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.508149 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.622689-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.509644 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.622693-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.509680 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623091-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.509685 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623099-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.511390 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623116-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.511427 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.513778 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623124-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.513819 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.513825 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623132-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.515268 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623136-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.515309 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.62314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.515315 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623143-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.518499 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623147-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.518542 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.62315-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.518549 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623153-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.521107 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623155-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.522285 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623159-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.522329 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623161-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.522335 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623496-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.527327 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623501-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.527367 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623503-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.527374 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.529558 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623549-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.529645 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623555-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.529653 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.62356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.531508 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623564-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.531548 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623566-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:40.547181 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:38:53.623569-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:40.547220 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:38:53.623572-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.011505 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:38:53.623588-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.011598 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:38:53.623591-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.011965 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:38:53.623593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.012321 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:38:53.623617-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013130 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:38:53.623619-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013149 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:38:53.623623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013153 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:38:53.624128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013326 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:38:53.624135-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013336 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:38:53.624139-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013347 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:38:53.624143-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013456 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:38:53.624146-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013609 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:38:53.624149-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013617 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:38:53.624151-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013629 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:38:53.624154-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013632 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:38:53.624158-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013647 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:38:53.624162-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013855 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:38:53.624169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013930 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:38:53.624174-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.013943 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:38:53.624181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.014307 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:38:53.624185-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.014390 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:38:53.624188-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.014404 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:38:53.624192-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.014408 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:38:53.624207-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.017556 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:38:53.62458-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.017706 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:38:53.624589-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.018498 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:38:53.624593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.018535 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:38:53.624597-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.019234 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:38:53.6246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.019253 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:38:53.624606-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.019262 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:38:53.624609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.019293 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:38:53.624613-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.019300 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:38:53.624617-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.019307 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:38:53.62462-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.019315 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:38:53.624624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.023434 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:38:53.624628-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.113276 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:38:53.624631-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.113381 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:38:53.624635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.113398 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:38:53.624639-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.113402 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:38:53.624642-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.113631 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:38:53.624646-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.113662 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:38:53.625165-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.114939 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:38:53.625174-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.115713 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:38:53.625178-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.116524 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:38:53.625182-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.120172 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:38:53.6252-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.125712 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[system node-high catch-all] items=[{target:161 lowerBound:161 upperBound:840} {target:240 lowerBound:240 upperBound:920} {target:NaN lowerBound:40 upperBound:640}]\n"} +{"Time":"2023-05-31T12:38:53.625219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.131509 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[leader-election catch-all system node-high] items=[{target:71 lowerBound:71 upperBound:671} {target:NaN lowerBound:36 upperBound:636} {target:142 lowerBound:142 upperBound:812} {target:212 lowerBound:212 upperBound:883}]\n"} +{"Time":"2023-05-31T12:38:53.62523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.184311 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.625233-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.190743 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[node-high leader-election workload-high catch-all system] items=[{target:144 lowerBound:144 upperBound:792} {target:48 lowerBound:48 upperBound:648} {target:96 lowerBound:96 upperBound:792} {target:NaN lowerBound:24 upperBound:624} {target:96 lowerBound:96 upperBound:744}]\n"} +{"Time":"2023-05-31T12:38:53.625237-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.194767 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[node-high leader-election workload-high workload-low system catch-all] items=[{target:80 lowerBound:80 upperBound:707} {target:27 lowerBound:27 upperBound:627} {target:53 lowerBound:53 upperBound:707} {target:27 lowerBound:27 upperBound:867} {target:54 lowerBound:54 upperBound:680} {target:NaN lowerBound:14 upperBound:614}]\n"} +{"Time":"2023-05-31T12:38:53.625244-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.197935 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[system node-high leader-election catch-all workload-high workload-low global-default] items=[{target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:NaN lowerBound:13 upperBound:613} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649}]\n"} +{"Time":"2023-05-31T12:38:53.625483-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.203926 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[global-default system node-high leader-election workload-high catch-all workload-low] items=[{target:24 lowerBound:24 upperBound:649} {target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698} {target:NaN lowerBound:13 upperBound:613} {target:24 lowerBound:24 upperBound:845}]\n"} +{"Time":"2023-05-31T12:38:53.625489-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.217534 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[workload-high workload-low global-default system catch-all node-high leader-election] items=[{target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:50 lowerBound:50 upperBound:674} {target:NaN lowerBound:13 upperBound:613} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625}]\n"} +{"Time":"2023-05-31T12:38:53.625493-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.222186 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[catch-all workload-high workload-low global-default system node-high leader-election] items=[{target:NaN lowerBound:13 upperBound:613} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625}]\n"} +{"Time":"2023-05-31T12:38:53.625497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.284834 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[workload-high workload-low global-default system node-high leader-election catch-all] items=[{target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:NaN lowerBound:13 upperBound:613}]\n"} +{"Time":"2023-05-31T12:38:53.625501-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.293435 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[catch-all workload-high workload-low global-default system node-high leader-election] items=[{target:NaN lowerBound:13 upperBound:613} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625}]\n"} +{"Time":"2023-05-31T12:38:53.625506-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.303397 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[catch-all global-default system node-high leader-election workload-high workload-low] items=[{target:NaN lowerBound:13 upperBound:613} {target:24 lowerBound:24 upperBound:649} {target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845}]\n"} +{"Time":"2023-05-31T12:38:53.625906-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.314344 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[workload-high workload-low global-default catch-all system node-high leader-election] items=[{target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:NaN lowerBound:13 upperBound:613} {target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625}]\n"} +{"Time":"2023-05-31T12:38:53.625913-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:41.325050 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[system node-high leader-election workload-high workload-low global-default catch-all] items=[{target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:NaN lowerBound:13 upperBound:613}]\n"} +{"Time":"2023-05-31T12:38:53.625917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:41.811400 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:38:53.625919-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:42.018527 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:38:53.625922-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:42.021464 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:38:53.625924-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:42.021501 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:38:53.625928-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:42.500303 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.625931-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:42.531080 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.625937-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:42.647118 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:38:53.625944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:37:42.652812 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.76.2]\n"} +{"Time":"2023-05-31T12:38:53.625948-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:42.653640 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:38:53.625956-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:42.658139 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.62629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:43.046633 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:38:53.6263-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:44.146779 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:38:53.626306-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:44.155180 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:38:53.62631-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:44.162054 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:38:53.626319-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:37:51.114208 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[node-high leader-election workload-high workload-low global-default catch-all system] items=[{target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:NaN lowerBound:13 upperBound:613} {target:50 lowerBound:50 upperBound:674}]\n"} +{"Time":"2023-05-31T12:38:53.626327-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:56.500398 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:38:53.626333-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:56.602150 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:38:53.626337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:38:01.114750 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[node-high leader-election workload-high workload-low global-default catch-all system] items=[{target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:NaN lowerBound:13 upperBound:613} {target:50 lowerBound:50 upperBound:674}]\n"} +{"Time":"2023-05-31T12:38:53.626343-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:38:11.115988 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[workload-low global-default catch-all system node-high leader-election workload-high] items=[{target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:NaN lowerBound:13 upperBound:613} {target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698}]\n"} +{"Time":"2023-05-31T12:38:53.626346-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:38:19.786193 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.98.107.118]\n"} +{"Time":"2023-05-31T12:38:53.626349-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:38:21.116311 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[system node-high leader-election workload-high workload-low global-default catch-all] items=[{target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:NaN lowerBound:13 upperBound:613}]\n"} +{"Time":"2023-05-31T12:38:53.626801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:38:31.117275 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[catch-all system node-high leader-election workload-high workload-low global-default] items=[{target:NaN lowerBound:13 upperBound:613} {target:50 lowerBound:50 upperBound:674} {target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649}]\n"} +{"Time":"2023-05-31T12:38:53.626813-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:38:41.118021 1 apf_controller.go:411] \"Unable to derive new concurrency limits\" err=\"impossible: ran out of bounds to consider in bound-constrained problem\" plNames=[node-high leader-election workload-high workload-low global-default catch-all system] items=[{target:73 lowerBound:73 upperBound:698} {target:25 lowerBound:25 upperBound:625} {target:49 lowerBound:49 upperBound:698} {target:24 lowerBound:24 upperBound:845} {target:24 lowerBound:24 upperBound:649} {target:NaN lowerBound:13 upperBound:613} {target:50 lowerBound:50 upperBound:674}]\n"} +{"Time":"2023-05-31T12:38:53.626822-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.626826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.62683-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:38:53.626833-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:38:53.626847-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.626854-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:38:53.626859-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:38:53.626863-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:38:53.626866-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.62687-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T12:38:53.626874-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.626878-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:38:53.626881-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:38:53.626884-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:38:53.626887-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.627166-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:38:53.627174-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:38:53.627178-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:38:53.627181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:38:53.627196-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:38:53.627205-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:38:53.62721-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:38:53.627213-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:38:53.627219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:38:53.627223-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [\r\n"} +{"Time":"2023-05-31T12:38:53.627227-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.62723-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:38:53.627234-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T12:38:53.627237-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.627241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:38:53.627244-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:38:53.627247-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.627251-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:38:53.627254-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.627257-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:38:53.62726-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:38:53.627264-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:38:53.627267-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.62727-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:38:53.627274-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.627277-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:38:53.627281-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:38:53.627502-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.627509-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:38:53.627513-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.62752-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:38:53.627524-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.627528-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/10-flannel.conflist\r\n"} +{"Time":"2023-05-31T12:38:53.627536-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.627541-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"name\": \"cbr0\",\r\n"} +{"Time":"2023-05-31T12:38:53.627546-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:38:53.627549-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:38:53.627551-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.627553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"flannel\",\r\n"} +{"Time":"2023-05-31T12:38:53.627556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"delegate\": {\r\n"} +{"Time":"2023-05-31T12:38:53.627558-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:38:53.62756-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"isDefaultGateway\": true\r\n"} +{"Time":"2023-05-31T12:38:53.627563-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.627565-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:38:53.627568-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.627571-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:38:53.627574-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:38:53.627576-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:38:53.627578-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.627581-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.627582-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:38:53.627584-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.627587-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/100-crio-bridge.conf.mk_disabled\r\n"} +{"Time":"2023-05-31T12:38:53.62759-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.627593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:38:53.627779-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:38:53.627785-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:38:53.627789-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:38:53.627793-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:38:53.627796-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:38:53.627799-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:38:53.627803-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:38:53.627806-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:38:53.627809-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:38:53.627813-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" { \"dst\": \"0.0.0.0/0\" },\r\n"} +{"Time":"2023-05-31T12:38:53.627816-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" { \"dst\": \"1100:200::1/24\" }\r\n"} +{"Time":"2023-05-31T12:38:53.62782-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ],\r\n"} +{"Time":"2023-05-31T12:38:53.627823-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:38:53.627826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [{ \"subnet\": \"10.85.0.0/16\" }],\r\n"} +{"Time":"2023-05-31T12:38:53.62783-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [{ \"subnet\": \"1100:200::/24\" }]\r\n"} +{"Time":"2023-05-31T12:38:53.627833-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T12:38:53.627837-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.62784-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.627843-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.627846-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.627849-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:38:53.627851-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:38:53.627854-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:38:53.627856-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:38:53.627858-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:38:53.62786-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 2: tunl0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:38:53.628131-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:38:53.62814-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:38:53.628144-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/tunnel6 :: brd :: permaddr 52a1:5e49:2302::\r\n"} +{"Time":"2023-05-31T12:38:53.628148-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:38:53.628165-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 02:42:63:c6:80:ed brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:38:53.628169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:38:53.628192-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:38:53.628196-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 5: flannel.1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65485 qdisc noqueue state UNKNOWN group default \r\n"} +{"Time":"2023-05-31T12:38:53.628199-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether a2:33:55:c4:8b:f6 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:38:53.628203-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 10.244.0.0/32 scope global flannel.1\r\n"} +{"Time":"2023-05-31T12:38:53.628206-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:38:53.628209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 6: cni0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65485 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:38:53.628213-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 9a:82:7d:ee:11:99 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:38:53.628216-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 10.244.0.1/24 brd 10.244.0.255 scope global cni0\r\n"} +{"Time":"2023-05-31T12:38:53.62822-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:38:53.628223-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7: vethacc01934@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65485 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T12:38:53.628227-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether b6:a1:26:69:ef:35 brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:38:53.62823-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8: vethdeac57d1@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65485 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T12:38:53.628234-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether e2:9a:33:2c:93:b3 brd ff:ff:ff:ff:ff:ff link-netnsid 2\r\n"} +{"Time":"2023-05-31T12:38:53.628591-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 318: eth0@if319: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:38:53.628597-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 02:42:c0:a8:4c:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:38:53.6286-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 192.168.76.2/24 brd 192.168.76.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:38:53.628602-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:38:53.628605-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.628608-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.62861-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:38:53.628613-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default via 192.168.76.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:38:53.628615-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 10.244.0.0/24 dev cni0 proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T12:38:53.628617-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:38:53.628619-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.76.0/24 dev eth0 proto kernel scope link src 192.168.76.2 \r\n"} +{"Time":"2023-05-31T12:38:53.628621-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.628623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.628625-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:38:53.628627-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:38:42 2023\r\n"} +{"Time":"2023-05-31T12:38:53.62863-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:38:53.628632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :PREROUTING ACCEPT [20041:86856260]\r\n"} +{"Time":"2023-05-31T12:38:53.628634-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :INPUT ACCEPT [20006:86853462]\r\n"} +{"Time":"2023-05-31T12:38:53.628636-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :FORWARD ACCEPT [35:2798]\r\n"} +{"Time":"2023-05-31T12:38:53.628638-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :OUTPUT ACCEPT [18211:6318552]\r\n"} +{"Time":"2023-05-31T12:38:53.62864-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :POSTROUTING ACCEPT [18246:6321350]\r\n"} +{"Time":"2023-05-31T12:38:53.628642-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.628644-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.628646-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.628648-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:38:53.629061-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Completed on Wed May 31 19:38:42 2023\r\n"} +{"Time":"2023-05-31T12:38:53.629069-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:38:42 2023\r\n"} +{"Time":"2023-05-31T12:38:53.629073-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:38:53.629076-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :INPUT ACCEPT [5823:1301268]\r\n"} +{"Time":"2023-05-31T12:38:53.62908-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :FORWARD ACCEPT [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629083-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :OUTPUT ACCEPT [5793:1620338]\r\n"} +{"Time":"2023-05-31T12:38:53.629086-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629089-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629093-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629096-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629099-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :FLANNEL-FWD - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629104-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629107-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.62911-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629113-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629118-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629125-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629131-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629137-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629141-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:38:53.629146-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:38:53.629152-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:38:53.629158-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:38:53.629162-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:38:53.629332-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:38:53.629336-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:38:53.629339-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:38:53.629343-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:38:53.629345-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:38:53.629347-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:38:53.629349-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:38:53.629352-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:38:53.629354-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:38:53.629356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m comment --comment \"flanneld forward\" -j FLANNEL-FWD\r\n"} +{"Time":"2023-05-31T12:38:53.629358-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:38:53.62936-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:38:53.629362-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:38:53.629364-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:38:53.629367-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.629369-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:38:53.629371-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.629373-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.629375-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-FWD -s 10.244.0.0/16 -m comment --comment \"flanneld forward\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:38:53.629377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-FWD -d 10.244.0.0/16 -m comment --comment \"flanneld forward\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:38:53.629614-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:38:53.629621-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:38:53.62964-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:38:53.629646-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:38:53.629649-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:38:53.629651-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Completed on Wed May 31 19:38:42 2023\r\n"} +{"Time":"2023-05-31T12:38:53.629653-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:38:42 2023\r\n"} +{"Time":"2023-05-31T12:38:53.629655-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:38:53.629659-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:38:53.629661-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:38:53.629663-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :OUTPUT ACCEPT [43:2580]\r\n"} +{"Time":"2023-05-31T12:38:53.629665-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :POSTROUTING ACCEPT [52:3255]\r\n"} +{"Time":"2023-05-31T12:38:53.629668-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629671-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629673-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :FLANNEL-POSTRTG - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629677-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629679-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629681-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629683-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629685-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629687-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629689-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-M66F6TD25XSFZOMV - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629706-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629977-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-UTWFOSUDHOCXYA2F - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629984-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629986-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629988-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.62999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629992-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629995-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:38:53.629998-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:38:53.630002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:38:53.630006-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:38:53.630013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:38:53.63002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:38:53.630027-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:38:53.630035-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:38:53.630043-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:38:53.63005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:38:53.630054-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A POSTROUTING -m comment --comment \"flanneld masq\" -j FLANNEL-POSTRTG\r\n"} +{"Time":"2023-05-31T12:38:53.63006-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.630066-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:38951\r\n"} +{"Time":"2023-05-31T12:38:53.630068-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:38995\r\n"} +{"Time":"2023-05-31T12:38:53.63007-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 38951 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:38:53.630073-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 38995 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:38:53.630202-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG -m mark --mark 0x4000/0x4000 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.630209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/24 -d 10.244.0.0/16 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.630212-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/16 -d 10.244.0.0/24 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.630214-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG ! -s 10.244.0.0/16 -d 10.244.0.0/24 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.630218-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/16 ! -d 224.0.0.0/4 -m comment --comment \"flanneld masq\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:38:53.63022-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG ! -s 10.244.0.0/16 -d 10.244.0.0/16 -m comment --comment \"flanneld masq\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:38:53.630223-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:38:53.630225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:38:53.630227-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:38:53.630229-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:38:53.630231-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630234-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:38:53.630236-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -s 192.168.76.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630239-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:38:53.630241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630244-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:38:53.630413-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -s 10.244.0.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.63042-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T12:38:53.630428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630432-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:38:53.630436-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:38:53.63044-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:38:53.630445-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:38:53.630449-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:38:53.630453-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.98.107.118/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:38:53.630458-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:38:53.630463-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630466-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T12:38:53.63047-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630474-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T12:38:53.6307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630707-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.76.2:8443\" -j KUBE-SEP-M66F6TD25XSFZOMV\r\n"} +{"Time":"2023-05-31T12:38:53.630712-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630725-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T12:38:53.630729-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.98.107.118/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:38:53.630732-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.3:8080\" -j KUBE-SEP-UTWFOSUDHOCXYA2F\r\n"} +{"Time":"2023-05-31T12:38:53.630734-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:38:53.630736-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Completed on Wed May 31 19:38:42 2023\r\n"} +{"Time":"2023-05-31T12:38:53.630738-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.63074-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.630743-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:38:53.630745-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:38:53.630747-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.63075-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 53 3340 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:38:53.630752-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 85 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:38:53.630754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 44 2640 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:38:53.630757-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.630759-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:38:53.630761-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.630901-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.630906-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain OUTPUT (policy ACCEPT 44 packets, 2640 bytes)\r\n"} +{"Time":"2023-05-31T12:38:53.630909-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.630911-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 346 25445 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:38:53.630914-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 106 8842 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:38:53.630916-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 98 5880 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:38:53.630918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.63092-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain POSTROUTING (policy ACCEPT 53 packets, 3315 bytes)\r\n"} +{"Time":"2023-05-31T12:38:53.630922-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.630924-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 356 26180 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:38:53.630926-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:38:53.630929-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:38:53.630931-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 211 15524 FLANNEL-POSTRTG all -- * * 0.0.0.0/0 0.0.0.0/0 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:38:53.630933-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.630935-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:38:53.630937-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.630939-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:38:53.630942-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.630943-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:38:53.630946-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.630989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:38951\r\n"} +{"Time":"2023-05-31T12:38:53.630994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 107 8927 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:38995\r\n"} +{"Time":"2023-05-31T12:38:53.630997-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.630999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631001-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631004-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:38951 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:38:53.631006-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:38995 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:38:53.631008-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.63101-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain FLANNEL-POSTRTG (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631012-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631014-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0x4000/0x4000 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:38:53.631017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 13 915 RETURN all -- * * 10.244.0.0/24 10.244.0.0/16 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:38:53.631019-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 RETURN all -- * * 10.244.0.0/16 10.244.0.0/24 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:38:53.631021-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 RETURN all -- * * !10.244.0.0/16 10.244.0.0/24 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T12:38:53.631023-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 MASQUERADE all -- * * 10.244.0.0/16 !224.0.0.0/4 /* flanneld masq */ random-fully\r\n"} +{"Time":"2023-05-31T12:38:53.631025-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 MASQUERADE all -- * * !10.244.0.0/16 10.244.0.0/16 /* flanneld masq */ random-fully\r\n"} +{"Time":"2023-05-31T12:38:53.631028-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.63103-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631032-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631081-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631098-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631105-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.63111-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:38:53.631117-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631125-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631132-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631137-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.63114-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 53 3315 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:38:53.631143-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:38:53.631147-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:38:53.63115-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631154-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631157-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631166-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631194-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.6312-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:38:53.631212-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:38:53.631281-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631288-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-M66F6TD25XSFZOMV (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631292-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631296-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 2 120 KUBE-MARK-MASQ all -- * * 192.168.76.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:38:53.631299-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:38:53.631303-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631311-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:38:53.631318-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:38:53.631322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631325-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-UTWFOSUDHOCXYA2F (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631329-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631333-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:38:53.631336-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T12:38:53.631341-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631348-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631352-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:38:53.631355-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:38:53.631455-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631462-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631466-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631471-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:38:53.631475-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:38:53.631479-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:38:53.631483-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:38:53.631487-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.98.107.118 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:38:53.6315-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 79 4740 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:38:53.631506-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631518-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631525-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631529-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:38:53.631533-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:38:53.631537-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.63154-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.63184-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:38:53.631854-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T12:38:53.631861-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631865-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631868-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631871-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 2 120 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:38:53.631874-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 3 180 KUBE-SEP-M66F6TD25XSFZOMV all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.76.2:8443 */\r\n"} +{"Time":"2023-05-31T12:38:53.631889-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631894-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631898-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631901-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:38:53.631905-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:38:53.631909-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.631912-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:38:53.631916-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:38:53.631919-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.98.107.118 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:38:53.631923-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-SEP-UTWFOSUDHOCXYA2F all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.3:8080 */\r\n"} +{"Time":"2023-05-31T12:38:53.631927-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.632151-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.632167-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe flannel daemon set:\n"} +{"Time":"2023-05-31T12:38:53.632172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-flannel-ds\n"} +{"Time":"2023-05-31T12:38:53.632175-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Selector: app=flannel\n"} +{"Time":"2023-05-31T12:38:53.632178-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selector: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.632191-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T12:38:53.632195-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" k8s-app=flannel\n"} +{"Time":"2023-05-31T12:38:53.632198-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T12:38:53.632202-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:38:53.632205-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:38:53.632209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:38:53.632212-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:38:53.632215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:38:53.632219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:38:53.632222-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:38:53.632225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:38:53.632228-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T12:38:53.632231-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T12:38:53.632234-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: flannel\n"} +{"Time":"2023-05-31T12:38:53.632237-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Init Containers:\n"} +{"Time":"2023-05-31T12:38:53.63224-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" install-cni-plugin:\n"} +{"Time":"2023-05-31T12:38:53.632243-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel-cni-plugin:v1.1.2\n"} +{"Time":"2023-05-31T12:38:53.632246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.632248-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.63225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.632505-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cp\n"} +{"Time":"2023-05-31T12:38:53.632512-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:38:53.632515-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -f\n"} +{"Time":"2023-05-31T12:38:53.632518-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /flannel\n"} +{"Time":"2023-05-31T12:38:53.63252-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/cni/bin/flannel\n"} +{"Time":"2023-05-31T12:38:53.632522-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.632524-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.632526-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/cni/bin from cni-plugin (rw)\n"} +{"Time":"2023-05-31T12:38:53.632529-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" install-cni:\n"} +{"Time":"2023-05-31T12:38:53.632531-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel:v0.21.5\n"} +{"Time":"2023-05-31T12:38:53.632533-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.632535-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.632537-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.632539-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cp\n"} +{"Time":"2023-05-31T12:38:53.632541-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:38:53.632543-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -f\n"} +{"Time":"2023-05-31T12:38:53.632545-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/cni-conf.json\n"} +{"Time":"2023-05-31T12:38:53.632558-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/10-flannel.conflist\n"} +{"Time":"2023-05-31T12:38:53.632572-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.63258-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.632586-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d from cni (rw)\n"} +{"Time":"2023-05-31T12:38:53.632589-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T12:38:53.632592-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.632595-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-flannel:\n"} +{"Time":"2023-05-31T12:38:53.632599-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel:v0.21.5\n"} +{"Time":"2023-05-31T12:38:53.632602-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.632605-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.632787-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.632794-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/bin/flanneld\n"} +{"Time":"2023-05-31T12:38:53.632798-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:38:53.632801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --ip-masq\n"} +{"Time":"2023-05-31T12:38:53.632804-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kube-subnet-mgr\n"} +{"Time":"2023-05-31T12:38:53.632808-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:38:53.632811-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:38:53.632815-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:38:53.632818-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T12:38:53.632821-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD_NAME: (v1:metadata.name)\n"} +{"Time":"2023-05-31T12:38:53.632826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD_NAMESPACE: (v1:metadata.namespace)\n"} +{"Time":"2023-05-31T12:38:53.63283-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EVENT_QUEUE_DEPTH: 5000\n"} +{"Time":"2023-05-31T12:38:53.632833-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.632837-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T12:38:53.63284-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/flannel from run (rw)\n"} +{"Time":"2023-05-31T12:38:53.632843-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:38:53.632847-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:38:53.63285-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" run:\n"} +{"Time":"2023-05-31T12:38:53.632853-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.632857-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/flannel\n"} +{"Time":"2023-05-31T12:38:53.63286-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:38:53.632863-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni-plugin:\n"} +{"Time":"2023-05-31T12:38:53.632867-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.63287-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T12:38:53.632873-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:38:53.632876-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni:\n"} +{"Time":"2023-05-31T12:38:53.632879-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.633084-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:38:53.633097-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:38:53.633101-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" flannel-cfg:\n"} +{"Time":"2023-05-31T12:38:53.633112-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:38:53.633118-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T12:38:53.63312-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:38:53.633122-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:38:53.633125-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.633127-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:38:53.633129-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:38:53.633142-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:38:53.633144-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.633146-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.633159-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.633165-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal SuccessfulCreate 47s daemonset-controller Created pod: kube-flannel-ds-w8tzn\n"} +{"Time":"2023-05-31T12:38:53.633169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.633175-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.63318-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe flannel pod(s):\n"} +{"Time":"2023-05-31T12:38:53.633183-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-flannel-ds-w8tzn\n"} +{"Time":"2023-05-31T12:38:53.633185-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-flannel\n"} +{"Time":"2023-05-31T12:38:53.633187-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:38:53.633189-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:38:53.633191-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: flannel\n"} +{"Time":"2023-05-31T12:38:53.633193-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.633195-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 12:37:56 -0700\n"} +{"Time":"2023-05-31T12:38:53.633422-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T12:38:53.633426-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" controller-revision-hash=64f7f74f6b\n"} +{"Time":"2023-05-31T12:38:53.633429-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:38:53.633431-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T12:38:53.633433-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.633435-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:38:53.633437-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.633439-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:38:53.633443-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.633445-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: DaemonSet/kube-flannel-ds\n"} +{"Time":"2023-05-31T12:38:53.633447-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Init Containers:\n"} +{"Time":"2023-05-31T12:38:53.633449-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" install-cni-plugin:\n"} +{"Time":"2023-05-31T12:38:53.633451-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: docker://cb8231ac7177d31245b5f011cef515a1a31ade5ed1417907506c460573b02f5b\n"} +{"Time":"2023-05-31T12:38:53.633454-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel-cni-plugin:v1.1.2\n"} +{"Time":"2023-05-31T12:38:53.633456-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker-pullable://flannel/flannel-cni-plugin@sha256:bf4b62b131666d040f35a327d906ee5a3418280b68a88d9b9c7e828057210443\n"} +{"Time":"2023-05-31T12:38:53.633458-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.633461-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.633463-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.633465-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cp\n"} +{"Time":"2023-05-31T12:38:53.633467-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:38:53.633469-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -f\n"} +{"Time":"2023-05-31T12:38:53.633471-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /flannel\n"} +{"Time":"2023-05-31T12:38:53.633473-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/cni/bin/flannel\n"} +{"Time":"2023-05-31T12:38:53.633475-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Terminated\n"} +{"Time":"2023-05-31T12:38:53.633477-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:38:53.633694-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:38:53.6337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 12:37:59 -0700\n"} +{"Time":"2023-05-31T12:38:53.633702-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Finished: Wed, 31 May 2023 12:37:59 -0700\n"} +{"Time":"2023-05-31T12:38:53.633711-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:38:53.633713-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:38:53.633715-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.63372-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.633722-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/cni/bin from cni-plugin (rw)\n"} +{"Time":"2023-05-31T12:38:53.633724-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-mntxg (ro)\n"} +{"Time":"2023-05-31T12:38:53.633728-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" install-cni:\n"} +{"Time":"2023-05-31T12:38:53.633731-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: docker://59c1f42a1bbd1f4297a5befa54ae998d85f5e2c4c9a41462cd21606f85a751ac\n"} +{"Time":"2023-05-31T12:38:53.633733-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel:v0.21.5\n"} +{"Time":"2023-05-31T12:38:53.633735-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker-pullable://flannel/flannel@sha256:2d5c29e591eab6e40a2959f96edf22e45a254f27769fdd2f03b5bc7f849c0de7\n"} +{"Time":"2023-05-31T12:38:53.633738-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.63374-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.633742-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.633744-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cp\n"} +{"Time":"2023-05-31T12:38:53.633746-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:38:53.633748-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -f\n"} +{"Time":"2023-05-31T12:38:53.63375-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/cni-conf.json\n"} +{"Time":"2023-05-31T12:38:53.633752-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/10-flannel.conflist\n"} +{"Time":"2023-05-31T12:38:53.633754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Terminated\n"} +{"Time":"2023-05-31T12:38:53.633756-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T12:38:53.633758-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T12:38:53.63376-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 12:38:03 -0700\n"} +{"Time":"2023-05-31T12:38:53.633972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Finished: Wed, 31 May 2023 12:38:03 -0700\n"} +{"Time":"2023-05-31T12:38:53.633979-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:38:53.633983-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:38:53.633985-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.633987-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.633989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d from cni (rw)\n"} +{"Time":"2023-05-31T12:38:53.633991-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T12:38:53.633995-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-mntxg (ro)\n"} +{"Time":"2023-05-31T12:38:53.633997-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.633999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-flannel:\n"} +{"Time":"2023-05-31T12:38:53.634002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: docker://a7bada4efa1536c8e0315d44385d9d52f0d52b64d54d5e0e8682dd99e0897382\n"} +{"Time":"2023-05-31T12:38:53.634004-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel:v0.21.5\n"} +{"Time":"2023-05-31T12:38:53.634007-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker-pullable://flannel/flannel@sha256:2d5c29e591eab6e40a2959f96edf22e45a254f27769fdd2f03b5bc7f849c0de7\n"} +{"Time":"2023-05-31T12:38:53.634009-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.634024-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.634026-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.634029-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/bin/flanneld\n"} +{"Time":"2023-05-31T12:38:53.634031-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T12:38:53.634033-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --ip-masq\n"} +{"Time":"2023-05-31T12:38:53.634035-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kube-subnet-mgr\n"} +{"Time":"2023-05-31T12:38:53.634052-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:38:53.634056-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 12:38:04 -0700\n"} +{"Time":"2023-05-31T12:38:53.634059-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:38:53.634061-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:38:53.634324-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T12:38:53.634331-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:38:53.634335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T12:38:53.634338-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T12:38:53.634341-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD_NAME: kube-flannel-ds-w8tzn (v1:metadata.name)\n"} +{"Time":"2023-05-31T12:38:53.634343-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD_NAMESPACE: kube-flannel (v1:metadata.namespace)\n"} +{"Time":"2023-05-31T12:38:53.634345-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EVENT_QUEUE_DEPTH: 5000\n"} +{"Time":"2023-05-31T12:38:53.634347-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.634349-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T12:38:53.634351-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/flannel from run (rw)\n"} +{"Time":"2023-05-31T12:38:53.634353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:38:53.634356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-mntxg (ro)\n"} +{"Time":"2023-05-31T12:38:53.634358-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:38:53.63436-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:38:53.634362-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:38:53.634364-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:38:53.634366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:38:53.634368-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:38:53.63437-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:38:53.634372-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" run:\n"} +{"Time":"2023-05-31T12:38:53.634374-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.634376-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/flannel\n"} +{"Time":"2023-05-31T12:38:53.634378-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:38:53.63438-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni-plugin:\n"} +{"Time":"2023-05-31T12:38:53.634383-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.634385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T12:38:53.634585-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:38:53.634589-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni:\n"} +{"Time":"2023-05-31T12:38:53.634591-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.634594-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:38:53.634596-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:38:53.634599-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" flannel-cfg:\n"} +{"Time":"2023-05-31T12:38:53.634601-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:38:53.634603-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T12:38:53.634605-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:38:53.634607-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:38:53.634609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.634611-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:38:53.634613-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:38:53.634615-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-api-access-mntxg:\n"} +{"Time":"2023-05-31T12:38:53.634617-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:38:53.63462-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:38:53.634622-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.634624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:38:53.634626-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:38:53.634628-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:38:53.63463-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.634632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: :NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.634634-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.634637-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.634793-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.634799-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:38:53.634802-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.634804-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:38:53.634806-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.634808-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.634812-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.634814-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.634816-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Scheduled 47s default-scheduler Successfully assigned kube-flannel/kube-flannel-ds-w8tzn to flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.634818-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulling 46s kubelet Pulling image \"docker.io/flannel/flannel-cni-plugin:v1.1.2\"\n"} +{"Time":"2023-05-31T12:38:53.634821-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 44s kubelet Successfully pulled image \"docker.io/flannel/flannel-cni-plugin:v1.1.2\" in 2.344765318s (2.344800383s including waiting)\n"} +{"Time":"2023-05-31T12:38:53.634823-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 44s kubelet Created container install-cni-plugin\n"} +{"Time":"2023-05-31T12:38:53.634825-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 44s kubelet Started container install-cni-plugin\n"} +{"Time":"2023-05-31T12:38:53.634827-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulling 43s kubelet Pulling image \"docker.io/flannel/flannel:v0.21.5\"\n"} +{"Time":"2023-05-31T12:38:53.63483-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 40s kubelet Successfully pulled image \"docker.io/flannel/flannel:v0.21.5\" in 3.567563465s (3.567569011s including waiting)\n"} +{"Time":"2023-05-31T12:38:53.634832-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 40s kubelet Created container install-cni\n"} +{"Time":"2023-05-31T12:38:53.634834-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 40s kubelet Started container install-cni\n"} +{"Time":"2023-05-31T12:38:53.634836-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 39s kubelet Container image \"docker.io/flannel/flannel:v0.21.5\" already present on machine\n"} +{"Time":"2023-05-31T12:38:53.635017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 39s kubelet Created container kube-flannel\n"} +{"Time":"2023-05-31T12:38:53.635021-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 39s kubelet Started container kube-flannel\n"} +{"Time":"2023-05-31T12:38:53.635023-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635025-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635027-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (current):\n"} +{"Time":"2023-05-31T12:38:53.635029-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.397253 1 main.go:356] Setting up masking rules\n"} +{"Time":"2023-05-31T12:38:53.635033-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.401244 1 main.go:407] Changing default FORWARD chain policy to ACCEPT\n"} +{"Time":"2023-05-31T12:38:53.635036-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.402376 1 iptables.go:290] generated 7 rules\n"} +{"Time":"2023-05-31T12:38:53.635038-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.403695 1 main.go:435] Wrote subnet file to /run/flannel/subnet.env\n"} +{"Time":"2023-05-31T12:38:53.63504-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.403730 1 iptables.go:290] generated 3 rules\n"} +{"Time":"2023-05-31T12:38:53.635043-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.403737 1 main.go:439] Running backend.\n"} +{"Time":"2023-05-31T12:38:53.635045-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.403939 1 vxlan_network.go:64] watching for new subnet leases\n"} +{"Time":"2023-05-31T12:38:53.635047-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.410895 1 main.go:460] Waiting for all goroutines to exit\n"} +{"Time":"2023-05-31T12:38:53.635049-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.419514 1 iptables.go:283] bootstrap done\n"} +{"Time":"2023-05-31T12:38:53.635051-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-w8tzn/kube-flannel] I0531 19:38:05.485924 1 iptables.go:283] bootstrap done\n"} +{"Time":"2023-05-31T12:38:53.635053-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635055-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635057-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:38:53.635059-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: previous terminated container \"install-cni-plugin\" in pod \"kube-flannel-ds-w8tzn\" not found\n"} +{"Time":"2023-05-31T12:38:53.635061-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: previous terminated container \"install-cni\" in pod \"kube-flannel-ds-w8tzn\" not found\n"} +{"Time":"2023-05-31T12:38:53.635283-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: previous terminated container \"kube-flannel\" in pod \"kube-flannel-ds-w8tzn\" not found\n"} +{"Time":"2023-05-31T12:38:53.635289-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635297-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /run/flannel/subnet.env:\n"} +{"Time":"2023-05-31T12:38:53.6353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" FLANNEL_NETWORK=10.244.0.0/16\r\n"} +{"Time":"2023-05-31T12:38:53.635304-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" FLANNEL_SUBNET=10.244.0.1/24\r\n"} +{"Time":"2023-05-31T12:38:53.635307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" FLANNEL_MTU=65485\r\n"} +{"Time":"2023-05-31T12:38:53.635311-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" FLANNEL_IPMASQ=true\r\n"} +{"Time":"2023-05-31T12:38:53.635314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635317-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.63532-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/kube-flannel/cni-conf.json:\n"} +{"Time":"2023-05-31T12:38:53.635324-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cat: /etc/kube-flannel/cni-conf.json: No such file or directory\r\n"} +{"Time":"2023-05-31T12:38:53.635344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T12:38:53.635349-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635352-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635355-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:38:53.635365-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.635368-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.635372-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:38:53.635375-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.635377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:38:53.635379-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:38:53.635381-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:38:53.635383-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:38:53.635553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:38:53.635557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:38:53.63556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:38:53.635562-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:38:53.635564-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.635566-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.635576-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.635578-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:38:53.63558-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:38:53.635582-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.635584-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.635587-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.635589-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.635591-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:38:53.635593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:38:53.635595-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T12:38:53.635598-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:38:53.6356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.635602-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:38:53.635605-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:38:53.635607-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:38:53.635609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:38:53.635611-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:38:53.635613-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:38:53.635615-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.635795-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:38:53.635799-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:38:53.635804-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.635806-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:38:53.635808-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:38:53.63581-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:38:53.635812-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.635815-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:38:53.635817-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:38:53.635819-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:38:53.635821-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.635823-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.635825-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.635827-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal SuccessfulCreate 48s daemonset-controller Created pod: kube-proxy-r7j6k\n"} +{"Time":"2023-05-31T12:38:53.635829-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635832-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.635834-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:38:53.635836-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-proxy-r7j6k\n"} +{"Time":"2023-05-31T12:38:53.635838-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.63584-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:38:53.635842-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:38:53.635844-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.635846-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.635849-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 12:37:56 -0700\n"} +{"Time":"2023-05-31T12:38:53.63605-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:38:53.636055-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.636057-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:38:53.636059-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.636061-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:38:53.636063-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.636065-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T12:38:53.636068-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.63607-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.636072-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T12:38:53.636074-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:38:53.636076-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: docker://d8104a4354c634ba0976517eb5254ec690836c7dc0fd5e1b76cf82c2cedf7f51\n"} +{"Time":"2023-05-31T12:38:53.636079-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:38:53.636081-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:38:53.636083-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.636085-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:38:53.636088-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T12:38:53.63609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.636092-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:38:53.636094-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:38:53.636096-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T12:38:53.636098-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 12:37:57 -0700\n"} +{"Time":"2023-05-31T12:38:53.6361-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:38:53.636102-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:38:53.636104-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T12:38:53.636288-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:38:53.636293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:38:53.636295-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:38:53.636298-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:38:53.636301-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:38:53.636303-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-c6wvf (ro)\n"} +{"Time":"2023-05-31T12:38:53.636305-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:38:53.636307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T12:38:53.63631-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:38:53.636312-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T12:38:53.636314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:38:53.636316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:38:53.636318-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:38:53.63632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:38:53.636322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:38:53.636324-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.636326-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:38:53.636329-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:38:53.636331-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.636333-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:38:53.636335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:38:53.636337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:38:53.636339-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:38:53.636341-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:38:53.636544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:38:53.636548-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-api-access-c6wvf:\n"} +{"Time":"2023-05-31T12:38:53.636551-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:38:53.636554-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:38:53.636556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.636558-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:38:53.636561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:38:53.636563-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:38:53.636565-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:38:53.636567-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:38:53.636571-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.636573-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.636575-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.636577-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:38:53.63658-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.636582-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:38:53.636585-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:38:53.636587-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T12:38:53.636589-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:38:53.636591-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:38:53.636593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Scheduled 48s default-scheduler Successfully assigned kube-system/kube-proxy-r7j6k to flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.636596-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 47s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:38:53.636801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 47s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.636807-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 47s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.636822-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.636824-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.63684-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:38:53.636844-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.593829 1 node.go:141] Successfully retrieved node IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.636847-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.593915 1 server_others.go:110] \"Detected node IP\" address=\"192.168.76.2\"\n"} +{"Time":"2023-05-31T12:38:53.636849-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.593930 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:38:53.636851-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.712774 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:38:53.636854-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.712803 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:38:53.636856-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.712813 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:38:53.636859-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.712823 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:38:53.636861-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.712847 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:38:53.636864-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.713984 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:38:53.636866-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.714017 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:38:53.636869-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.714682 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:38:53.636872-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.714699 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:38:53.636878-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.714714 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:38:53.637131-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.714717 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:38:53.637136-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.715271 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:38:53.637139-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.715331 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:38:53.637142-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.883181 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:38:53.637144-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.883269 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:38:53.637148-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:37:57.883516 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:38:53.637151-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.637154-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.637158-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:38:53.637165-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:38:53.637172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: loaded (\u001b]8;;file://flannel-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:38:53.637178-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:38:53.637185-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─\u001b]8;;file://flannel-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:38:53.637193-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:44 UTC; 1min 0s ago\r\n"} +{"Time":"2023-05-31T12:38:53.637208-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:38:53.637215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Main PID: 2376 (kubelet)\r\n"} +{"Time":"2023-05-31T12:38:53.637217-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tasks: 14 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:38:53.63722-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Memory: 33.5M\r\n"} +{"Time":"2023-05-31T12:38:53.637222-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CPU: 2.215s\r\n"} +{"Time":"2023-05-31T12:38:53.637224-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:38:53.637227-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─2376 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=flannel-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:38:53.637466-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.63747-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.205209 2376 scope.go:115] \"RemoveContainer\" containerID=\"0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\"\r\n"} +{"Time":"2023-05-31T12:38:53.637473-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.222232 2376 scope.go:115] \"RemoveContainer\" containerID=\"0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\"\r\n"} +{"Time":"2023-05-31T12:38:53.637478-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: E0531 19:38:12.223145 2376 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = Unknown desc = Error: No such container: 0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\" containerID=\"0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\"\r\n"} +{"Time":"2023-05-31T12:38:53.637481-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.223235 2376 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:docker ID:0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83} err=\"failed to get container status \\\"0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\\\": rpc error: code = Unknown desc = Error: No such container: 0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\"\r\n"} +{"Time":"2023-05-31T12:38:53.637484-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.224837 2376 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"1d5400ae35e4dc7a33118a3f7908b3120cf78a0fa4c2b9746d86fba6eeb6e907\"\r\n"} +{"Time":"2023-05-31T12:38:53.637487-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.304630 2376 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3 path=\"/var/lib/kubelet/pods/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3/volumes\"\r\n"} +{"Time":"2023-05-31T12:38:53.63749-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:19 flannel-996000 kubelet[2376]: I0531 19:38:19.795958 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.637492-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:19 flannel-996000 kubelet[2376]: E0531 19:38:19.796027 2376 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:38:53.637495-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:19 flannel-996000 kubelet[2376]: I0531 19:38:19.796054 2376 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:38:53.637498-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:19 flannel-996000 kubelet[2376]: I0531 19:38:19.798502 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-k29w6\\\" (UniqueName: \\\"kubernetes.io/projected/f0f3d72b-0f0c-428c-b307-a37e6f30263c-kube-api-access-k29w6\\\") pod \\\"netcat-7458db8b8-zzs2h\\\" (UID: \\\"f0f3d72b-0f0c-428c-b307-a37e6f30263c\\\") \" pod=\"default/netcat-7458db8b8-zzs2h\"\r\n"} +{"Time":"2023-05-31T12:38:53.637785-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.63779-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.637792-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:38:53.637795-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.637798-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:38:53.637801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:38:53.637803-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:38:53.637805-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:38:53.637808-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.63781-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.637813-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:38:53.637815-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:38:53.637817-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:38:53.637819-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:38:53.637821-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.637824-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:38:53.637826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:38:53.637828-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.63783-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.637833-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:38:53.637835-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:38:53.638062-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.638078-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.638084-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:38:53.638086-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=flannel-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:38:53.638089-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.638091-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:38:53.638094-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.638096-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.638099-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:38:53.638104-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:38:53.638107-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.638109-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.638112-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.638114-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.638117-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.638121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.638123-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.638126-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:38:53.638128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.849897 1739 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:38:53.638131-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.849964 1739 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:38:53.638344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.850135 1739 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:38:53.638352-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.853699 1739 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:38:53.638357-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: W0531 19:37:37.856937 1739 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:38:53.638361-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.858374 1739 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.638366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.863339 1739 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:38:53.63837-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.863901 1739 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:38:53.638377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.863966 1739 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:38:53.638385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.863987 1739 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:38:53.63839-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.863997 1739 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:38:53.638393-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.864070 1739 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:38:53.638624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.884038 1739 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:38:53.638632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.884211 1739 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:38:53.638637-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.884238 1739 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:38:53.63864-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.884253 1739 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:38:53.638645-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: W0531 19:37:37.884530 1739 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dflannel-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.63865-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.884710 1739 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dflannel-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.638655-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: W0531 19:37:37.884827 1739 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.63866-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.884892 1739 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.638663-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.893446 1739 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:38:53.638666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: W0531 19:37:37.893668 1739 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:38:53.638668-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.894223 1739 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:38:53.638918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.894825 1739 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:38:53.638926-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.894883 1739 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:38:53.63893-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.895247 1739 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:38:53.638934-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.895580 1739 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:38:53.638938-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.895975 1739 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:38:53.638942-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.896296 1739 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:38:53.638948-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: W0531 19:37:37.896526 1739 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.638953-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.897437 1739 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.63896-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.896903 1739 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"flannel-996000.176451944abb5390\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"flannel-996000\", UID:\"flannel-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"flannel-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 37, 37, 894208400, time.Local), LastTimestamp:time"} +{"Time":"2023-05-31T12:38:53.638968-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":".Date(2023, time.May, 31, 19, 37, 37, 894208400, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.76.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:38:53.639204-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.898680 1739 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/flannel-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:38:53.639212-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.914560 1739 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:38:53.639217-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.916265 1739 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:38:53.639221-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.916346 1739 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:38:53.639241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.916383 1739 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:38:53.639246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.916449 1739 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:38:53.639251-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: W0531 19:37:37.917436 1739 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.639256-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.917641 1739 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.63926-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.927774 1739 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:38:53.639264-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.927823 1739 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:38:53.639268-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.927838 1739 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:38:53.639573-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.931202 1739 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:38:53.639579-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.933073 1739 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:38:53.639582-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.933158 1739 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:38:53.639584-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.952578 1739 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.639587-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: I0531 19:37:37.952867 1739 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:38:53.63959-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:37 flannel-996000 kubelet[1739]: E0531 19:37:37.961614 1739 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.639592-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.004892 1739 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639595-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: E0531 19:37:38.005292 1739 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639598-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.016731 1739 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.6396-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.025295 1739 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.639603-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.034884 1739 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.639605-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.043445 1739 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.639608-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.097817 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-etc-ca-certificates\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639788-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098002 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639795-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098045 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098111 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-k8s-certs\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639807-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098353 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-kubeconfig\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639813-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098433 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/ac9f80dfdbd8cd40a6ded3682c412455-etcd-certs\\\") pod \\\"etcd-flannel-996000\\\" (UID: \\\"ac9f80dfdbd8cd40a6ded3682c412455\\\") \" pod=\"kube-system/etcd-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639818-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098484 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-ca-certs\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.639823-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098527 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-etc-ca-certificates\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640054-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098654 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/ac9f80dfdbd8cd40a6ded3682c412455-etcd-data\\\") pod \\\"etcd-flannel-996000\\\" (UID: \\\"ac9f80dfdbd8cd40a6ded3682c412455\\\") \" pod=\"kube-system/etcd-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640061-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098777 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-k8s-certs\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640065-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098801 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-flexvolume-dir\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640068-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098819 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/183d888aef7e4f3c1f5e672f9c3d107d-kubeconfig\\\") pod \\\"kube-scheduler-flannel-996000\\\" (UID: \\\"183d888aef7e4f3c1f5e672f9c3d107d\\\") \" pod=\"kube-system/kube-scheduler-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640072-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098852 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640081-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098871 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-ca-certs\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640085-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.098890 1739 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640358-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: E0531 19:37:38.099364 1739 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/flannel-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:38:53.640366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.214037 1739 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.64037-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: E0531 19:37:38.214477 1739 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640374-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: E0531 19:37:38.501045 1739 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/flannel-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:38:53.640377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: I0531 19:37:38.627718 1739 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.64038-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: E0531 19:37:38.628219 1739 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640383-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: W0531 19:37:38.890440 1739 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dflannel-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.640386-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: E0531 19:37:38.890499 1739 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dflannel-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.640389-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: W0531 19:37:38.899792 1739 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.640684-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:38 flannel-996000 kubelet[1739]: E0531 19:37:38.899835 1739 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:38:53.640691-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:39 flannel-996000 kubelet[1739]: I0531 19:37:39.436466 1739 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640694-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.083939 1739 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"flannel-996000\\\" not found\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640697-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: I0531 19:37:41.128551 1739 kubelet_node_status.go:73] \"Successfully registered node\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.640701-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.191727 1739 event.go:280] Server rejected event '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"flannel-996000.176451944abb5390\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"flannel-996000\", UID:\"flannel-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"flannel-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 37, 37, 894208400, time.Local), LastTimestamp:time."} +{"Time":"2023-05-31T12:38:53.640706-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"Date(2023, time.May, 31, 19, 37, 37, 894208400, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'namespaces \"default\" not found' (will not retry!)\r\n"} +{"Time":"2023-05-31T12:38:53.640709-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.204069 1739 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.640712-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.304619 1739 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.640979-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.404714 1739 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.640985-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.504900 1739 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.640988-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.605353 1739 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.640991-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.705717 1739 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.640993-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.806835 1739 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.640997-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:41 flannel-996000 kubelet[1739]: E0531 19:37:41.907142 1739 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"flannel-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.640999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:42 flannel-996000 kubelet[1739]: I0531 19:37:42.024008 1739 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T12:38:53.641002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:42 flannel-996000 kubelet[1739]: I0531 19:37:42.887699 1739 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:38:53.641004-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:42 flannel-996000 kubelet[1739]: I0531 19:37:42.897308 1739 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:38:53.641007-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:42 flannel-996000 kubelet[1739]: I0531 19:37:42.996844 1739 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:38:53.64101-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:38:53.641012-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641015-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641018-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641272-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641276-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641279-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641282-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641284-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[1739]: I0531 19:37:44.083336 1739 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:38:53.641287-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:38:53.64129-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641292-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641294-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641297-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641299-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641302-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:38:53.641304-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641306-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641309-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641311-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641313-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641319-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:38:53.641556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.64156-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641562-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641565-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641567-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.64157-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641572-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.641575-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:38:53.641577-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.202866 2376 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:38:53.64158-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.202932 2376 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:38:53.641583-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.203061 2376 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:38:53.641585-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.204249 2376 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:38:53.641588-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.205086 2376 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:38:53.641591-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: W0531 19:37:44.208722 2376 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:38:53.641594-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.215784 2376 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:38:53.641796-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.216137 2376 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:38:53.641801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.216204 2376 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:38:53.641805-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.216220 2376 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:38:53.641807-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.216229 2376 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:38:53.64181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.216250 2376 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:38:53.641812-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.235317 2376 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:38:53.641815-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.235362 2376 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:38:53.641817-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.235379 2376 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:38:53.64182-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.235412 2376 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:38:53.641822-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.243470 2376 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:38:53.642032-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.244358 2376 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:38:53.642038-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.246824 2376 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:38:53.642041-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.246936 2376 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:38:53.642044-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.250811 2376 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:38:53.642048-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.250984 2376 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:38:53.64205-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.251247 2376 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:38:53.642055-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.283197 2376 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:38:53.642057-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.296636 2376 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:38:53.64206-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.298953 2376 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:38:53.642063-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.299000 2376 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:38:53.642065-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.299016 2376 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:38:53.642084-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: E0531 19:37:44.299057 2376 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:38:53.64209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.318427 2376 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:38:53.642093-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.318812 2376 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:38:53.642095-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.318830 2376 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:38:53.642248-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.319083 2376 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:38:53.642254-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.319101 2376 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:38:53.642272-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.319106 2376 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:38:53.642274-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.322441 2376 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:38:53.642277-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.322486 2376 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:38:53.642279-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.322625 2376 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:38:53.642282-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.323600 2376 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:38:53.642286-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.323779 2376 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:38:53.642288-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.395512 2376 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642291-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.401686 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.642293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.401807 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.642296-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.401851 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.642298-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.401888 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.642301-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.462963 2376 kubelet_node_status.go:108] \"Node was previously registered\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642472-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.463028 2376 kubelet_node_status.go:73] \"Successfully registered node\" node=\"flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642477-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484152 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-etc-ca-certificates\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642481-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484206 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-flexvolume-dir\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642485-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484225 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/183d888aef7e4f3c1f5e672f9c3d107d-kubeconfig\\\") pod \\\"kube-scheduler-flannel-996000\\\" (UID: \\\"183d888aef7e4f3c1f5e672f9c3d107d\\\") \" pod=\"kube-system/kube-scheduler-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642488-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484239 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/ac9f80dfdbd8cd40a6ded3682c412455-etcd-certs\\\") pod \\\"etcd-flannel-996000\\\" (UID: \\\"ac9f80dfdbd8cd40a6ded3682c412455\\\") \" pod=\"kube-system/etcd-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642492-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484258 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484272 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-k8s-certs\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642501-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484289 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642748-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484301 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-ca-certs\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642756-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484312 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-k8s-certs\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.64276-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484324 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/ac9f80dfdbd8cd40a6ded3682c412455-etcd-data\\\") pod \\\"etcd-flannel-996000\\\" (UID: \\\"ac9f80dfdbd8cd40a6ded3682c412455\\\") \" pod=\"kube-system/etcd-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642763-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484338 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-ca-certs\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642771-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.484352 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/10155c872311873e4b28db0de46d12e5-etc-ca-certificates\\\") pod \\\"kube-apiserver-flannel-996000\\\" (UID: \\\"10155c872311873e4b28db0de46d12e5\\\") \" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642778-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.585175 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642784-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.585251 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-kubeconfig\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642927-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:44 flannel-996000 kubelet[2376]: I0531 19:37:44.585282 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/877fe3603123200afb1073587cfa195c-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-flannel-996000\\\" (UID: \\\"877fe3603123200afb1073587cfa195c\\\") \" pod=\"kube-system/kube-controller-manager-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642934-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:45 flannel-996000 kubelet[2376]: I0531 19:37:45.236804 2376 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:38:53.642937-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:45 flannel-996000 kubelet[2376]: I0531 19:37:45.284411 2376 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:38:53.642941-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:45 flannel-996000 kubelet[2376]: I0531 19:37:45.290739 2376 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:38:53.642948-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:45 flannel-996000 kubelet[2376]: E0531 19:37:45.338270 2376 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-flannel-996000\\\" already exists\" pod=\"kube-system/kube-apiserver-flannel-996000\"\r\n"} +{"Time":"2023-05-31T12:38:53.642952-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:45 flannel-996000 kubelet[2376]: I0531 19:37:45.351015 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-flannel-996000\" podStartSLOduration=1.350977756 podCreationTimestamp=\"2023-05-31 19:37:44 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:45.3506675 +0000 UTC m=+1.224307838\" watchObservedRunningTime=\"2023-05-31 19:37:45.350977756 +0000 UTC m=+1.224618087\"\r\n"} +{"Time":"2023-05-31T12:38:53.642956-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:45 flannel-996000 kubelet[2376]: I0531 19:37:45.364946 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-flannel-996000\" podStartSLOduration=1.36491775 podCreationTimestamp=\"2023-05-31 19:37:44 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:45.364737235 +0000 UTC m=+1.238377569\" watchObservedRunningTime=\"2023-05-31 19:37:45.36491775 +0000 UTC m=+1.238558089\"\r\n"} +{"Time":"2023-05-31T12:38:53.64296-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:45 flannel-996000 kubelet[2376]: I0531 19:37:45.365072 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-flannel-996000\" podStartSLOduration=1.365056732 podCreationTimestamp=\"2023-05-31 19:37:44 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:45.357951365 +0000 UTC m=+1.231591704\" watchObservedRunningTime=\"2023-05-31 19:37:45.365056732 +0000 UTC m=+1.238697065\"\r\n"} +{"Time":"2023-05-31T12:38:53.643063-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:45 flannel-996000 kubelet[2376]: I0531 19:37:45.372352 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-flannel-996000\" podStartSLOduration=1.372323808 podCreationTimestamp=\"2023-05-31 19:37:44 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:45.372311891 +0000 UTC m=+1.245952225\" watchObservedRunningTime=\"2023-05-31 19:37:45.372323808 +0000 UTC m=+1.245964146\"\r\n"} +{"Time":"2023-05-31T12:38:53.643072-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.512798 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.643077-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.513546 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.64308-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.584783 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"run\\\" (UniqueName: \\\"kubernetes.io/host-path/ea3cb72e-3709-45fa-8659-b980fcbb13fb-run\\\") pod \\\"kube-flannel-ds-w8tzn\\\" (UID: \\\"ea3cb72e-3709-45fa-8659-b980fcbb13fb\\\") \" pod=\"kube-flannel/kube-flannel-ds-w8tzn\"\r\n"} +{"Time":"2023-05-31T12:38:53.643083-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.584844 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flannel-cfg\\\" (UniqueName: \\\"kubernetes.io/configmap/ea3cb72e-3709-45fa-8659-b980fcbb13fb-flannel-cfg\\\") pod \\\"kube-flannel-ds-w8tzn\\\" (UID: \\\"ea3cb72e-3709-45fa-8659-b980fcbb13fb\\\") \" pod=\"kube-flannel/kube-flannel-ds-w8tzn\"\r\n"} +{"Time":"2023-05-31T12:38:53.643086-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.584868 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-mntxg\\\" (UniqueName: \\\"kubernetes.io/projected/ea3cb72e-3709-45fa-8659-b980fcbb13fb-kube-api-access-mntxg\\\") pod \\\"kube-flannel-ds-w8tzn\\\" (UID: \\\"ea3cb72e-3709-45fa-8659-b980fcbb13fb\\\") \" pod=\"kube-flannel/kube-flannel-ds-w8tzn\"\r\n"} +{"Time":"2023-05-31T12:38:53.64309-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.584884 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-plugin\\\" (UniqueName: \\\"kubernetes.io/host-path/ea3cb72e-3709-45fa-8659-b980fcbb13fb-cni-plugin\\\") pod \\\"kube-flannel-ds-w8tzn\\\" (UID: \\\"ea3cb72e-3709-45fa-8659-b980fcbb13fb\\\") \" pod=\"kube-flannel/kube-flannel-ds-w8tzn\"\r\n"} +{"Time":"2023-05-31T12:38:53.643229-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.585078 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-c6wvf\\\" (UniqueName: \\\"kubernetes.io/projected/50dde7c1-d5cf-4ae2-8865-4c93bf6fd63e-kube-api-access-c6wvf\\\") pod \\\"kube-proxy-r7j6k\\\" (UID: \\\"50dde7c1-d5cf-4ae2-8865-4c93bf6fd63e\\\") \" pod=\"kube-system/kube-proxy-r7j6k\"\r\n"} +{"Time":"2023-05-31T12:38:53.643238-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.585164 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/ea3cb72e-3709-45fa-8659-b980fcbb13fb-xtables-lock\\\") pod \\\"kube-flannel-ds-w8tzn\\\" (UID: \\\"ea3cb72e-3709-45fa-8659-b980fcbb13fb\\\") \" pod=\"kube-flannel/kube-flannel-ds-w8tzn\"\r\n"} +{"Time":"2023-05-31T12:38:53.643253-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.585194 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni\\\" (UniqueName: \\\"kubernetes.io/host-path/ea3cb72e-3709-45fa-8659-b980fcbb13fb-cni\\\") pod \\\"kube-flannel-ds-w8tzn\\\" (UID: \\\"ea3cb72e-3709-45fa-8659-b980fcbb13fb\\\") \" pod=\"kube-flannel/kube-flannel-ds-w8tzn\"\r\n"} +{"Time":"2023-05-31T12:38:53.643271-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.585208 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/50dde7c1-d5cf-4ae2-8865-4c93bf6fd63e-kube-proxy\\\") pod \\\"kube-proxy-r7j6k\\\" (UID: \\\"50dde7c1-d5cf-4ae2-8865-4c93bf6fd63e\\\") \" pod=\"kube-system/kube-proxy-r7j6k\"\r\n"} +{"Time":"2023-05-31T12:38:53.643278-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.585222 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/50dde7c1-d5cf-4ae2-8865-4c93bf6fd63e-xtables-lock\\\") pod \\\"kube-proxy-r7j6k\\\" (UID: \\\"50dde7c1-d5cf-4ae2-8865-4c93bf6fd63e\\\") \" pod=\"kube-system/kube-proxy-r7j6k\"\r\n"} +{"Time":"2023-05-31T12:38:53.643291-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.585241 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/50dde7c1-d5cf-4ae2-8865-4c93bf6fd63e-lib-modules\\\") pod \\\"kube-proxy-r7j6k\\\" (UID: \\\"50dde7c1-d5cf-4ae2-8865-4c93bf6fd63e\\\") \" pod=\"kube-system/kube-proxy-r7j6k\"\r\n"} +{"Time":"2023-05-31T12:38:53.643296-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.920931 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.643301-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.988144 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-dm5mx\\\" (UniqueName: \\\"kubernetes.io/projected/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3-kube-api-access-dm5mx\\\") pod \\\"coredns-5d78c9869d-kq9r2\\\" (UID: \\\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\\\") \" pod=\"kube-system/coredns-5d78c9869d-kq9r2\"\r\n"} +{"Time":"2023-05-31T12:38:53.643353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:56 flannel-996000 kubelet[2376]: I0531 19:37:56.988204 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3-config-volume\\\") pod \\\"coredns-5d78c9869d-kq9r2\\\" (UID: \\\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\\\") \" pod=\"kube-system/coredns-5d78c9869d-kq9r2\"\r\n"} +{"Time":"2023-05-31T12:38:53.643361-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:57 flannel-996000 kubelet[2376]: I0531 19:37:57.019041 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.643365-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:57 flannel-996000 kubelet[2376]: I0531 19:37:57.089964 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-2bspt\\\" (UniqueName: \\\"kubernetes.io/projected/24202eb1-6d20-47fe-9c51-541a95382d67-kube-api-access-2bspt\\\") pod \\\"coredns-5d78c9869d-85wf5\\\" (UID: \\\"24202eb1-6d20-47fe-9c51-541a95382d67\\\") \" pod=\"kube-system/coredns-5d78c9869d-85wf5\"\r\n"} +{"Time":"2023-05-31T12:38:53.643369-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:57 flannel-996000 kubelet[2376]: I0531 19:37:57.090021 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/24202eb1-6d20-47fe-9c51-541a95382d67-config-volume\\\") pod \\\"coredns-5d78c9869d-85wf5\\\" (UID: \\\"24202eb1-6d20-47fe-9c51-541a95382d67\\\") \" pod=\"kube-system/coredns-5d78c9869d-85wf5\"\r\n"} +{"Time":"2023-05-31T12:38:53.643372-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:57 flannel-996000 kubelet[2376]: I0531 19:37:57.895538 2376 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"8e7b16390be85ba6ff90af5d66f91140cd4c60cb653f710b403eb9578f579c41\"\r\n"} +{"Time":"2023-05-31T12:38:53.643376-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:58 flannel-996000 kubelet[2376]: I0531 19:37:58.523434 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-r7j6k\" podStartSLOduration=2.523401457 podCreationTimestamp=\"2023-05-31 19:37:56 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:57.92164969 +0000 UTC m=+13.795290028\" watchObservedRunningTime=\"2023-05-31 19:37:58.523401457 +0000 UTC m=+14.397041790\"\r\n"} +{"Time":"2023-05-31T12:38:53.643388-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:58 flannel-996000 kubelet[2376]: I0531 19:37:58.523584 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.643392-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:58 flannel-996000 kubelet[2376]: I0531 19:37:58.604642 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-swxqc\\\" (UniqueName: \\\"kubernetes.io/projected/97421270-3364-4882-92c4-ff6723b8426d-kube-api-access-swxqc\\\") pod \\\"storage-provisioner\\\" (UID: \\\"97421270-3364-4882-92c4-ff6723b8426d\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:38:53.643395-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:58 flannel-996000 kubelet[2376]: I0531 19:37:58.604705 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/97421270-3364-4882-92c4-ff6723b8426d-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"97421270-3364-4882-92c4-ff6723b8426d\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:38:53.643506-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:58 flannel-996000 kubelet[2376]: I0531 19:37:58.984971 2376 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"819c28e14a573111a9e661a7e42c897fb7e0b1f3e64a80c692c2c2d547b6186d\"\r\n"} +{"Time":"2023-05-31T12:38:53.643528-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:59 flannel-996000 kubelet[2376]: I0531 19:37:59.016522 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-85wf5\" podStartSLOduration=3.016495805 podCreationTimestamp=\"2023-05-31 19:37:56 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:59.016206821 +0000 UTC m=+14.889847154\" watchObservedRunningTime=\"2023-05-31 19:37:59.016495805 +0000 UTC m=+14.890136143\"\r\n"} +{"Time":"2023-05-31T12:38:53.643533-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:59 flannel-996000 kubelet[2376]: I0531 19:37:59.016794 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-kq9r2\" podStartSLOduration=3.016773727 podCreationTimestamp=\"2023-05-31 19:37:56 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:58.940395843 +0000 UTC m=+14.814036182\" watchObservedRunningTime=\"2023-05-31 19:37:59.016773727 +0000 UTC m=+14.890414057\"\r\n"} +{"Time":"2023-05-31T12:38:53.643538-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:00 flannel-996000 kubelet[2376]: I0531 19:38:00.024246 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=2.024220646 podCreationTimestamp=\"2023-05-31 19:37:58 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:00.024090906 +0000 UTC m=+15.897731246\" watchObservedRunningTime=\"2023-05-31 19:38:00.024220646 +0000 UTC m=+15.897860980\"\r\n"} +{"Time":"2023-05-31T12:38:53.643541-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:04 flannel-996000 kubelet[2376]: I0531 19:38:04.717895 2376 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:38:53.643544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:04 flannel-996000 kubelet[2376]: I0531 19:38:04.718512 2376 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:38:53.643547-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:05 flannel-996000 kubelet[2376]: I0531 19:38:05.125297 2376 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-flannel/kube-flannel-ds-w8tzn\" podStartSLOduration=2.6369346890000003 podCreationTimestamp=\"2023-05-31 19:37:56 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:37:57.103424645 +0000 UTC m=+12.977064974\" lastFinishedPulling=\"2023-05-31 19:38:03.591704853 +0000 UTC m=+19.465345185\" observedRunningTime=\"2023-05-31 19:38:05.125205561 +0000 UTC m=+20.998845899\" watchObservedRunningTime=\"2023-05-31 19:38:05.1252149 +0000 UTC m=+20.998855235\"\r\n"} +{"Time":"2023-05-31T12:38:53.643669-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 kubelet[2376]: I0531 19:38:11.636818 2376 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3-config-volume\\\") pod \\\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\\\" (UID: \\\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\\\") \"\r\n"} +{"Time":"2023-05-31T12:38:53.643675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 kubelet[2376]: I0531 19:38:11.636885 2376 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-dm5mx\\\" (UniqueName: \\\"kubernetes.io/projected/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3-kube-api-access-dm5mx\\\") pod \\\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\\\" (UID: \\\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\\\") \"\r\n"} +{"Time":"2023-05-31T12:38:53.643679-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 kubelet[2376]: W0531 19:38:11.637066 2376 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:38:53.643682-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 kubelet[2376]: I0531 19:38:11.637185 2376 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\" (UID: \"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.643686-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 kubelet[2376]: I0531 19:38:11.639146 2376 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3-kube-api-access-dm5mx\" (OuterVolumeSpecName: \"kube-api-access-dm5mx\") pod \"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\" (UID: \"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\"). InnerVolumeSpecName \"kube-api-access-dm5mx\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.643689-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 kubelet[2376]: I0531 19:38:11.737394 2376 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3-config-volume\\\") on node \\\"flannel-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:38:53.643692-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 kubelet[2376]: I0531 19:38:11.737446 2376 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-dm5mx\\\" (UniqueName: \\\"kubernetes.io/projected/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3-kube-api-access-dm5mx\\\") on node \\\"flannel-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:38:53.64377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.205209 2376 scope.go:115] \"RemoveContainer\" containerID=\"0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\"\r\n"} +{"Time":"2023-05-31T12:38:53.643775-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.222232 2376 scope.go:115] \"RemoveContainer\" containerID=\"0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\"\r\n"} +{"Time":"2023-05-31T12:38:53.643778-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: E0531 19:38:12.223145 2376 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = Unknown desc = Error: No such container: 0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\" containerID=\"0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\"\r\n"} +{"Time":"2023-05-31T12:38:53.643781-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.223235 2376 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:docker ID:0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83} err=\"failed to get container status \\\"0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\\\": rpc error: code = Unknown desc = Error: No such container: 0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83\"\r\n"} +{"Time":"2023-05-31T12:38:53.643784-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.224837 2376 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"1d5400ae35e4dc7a33118a3f7908b3120cf78a0fa4c2b9746d86fba6eeb6e907\"\r\n"} +{"Time":"2023-05-31T12:38:53.643787-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:12 flannel-996000 kubelet[2376]: I0531 19:38:12.304630 2376 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3 path=\"/var/lib/kubelet/pods/7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3/volumes\"\r\n"} +{"Time":"2023-05-31T12:38:53.643791-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:19 flannel-996000 kubelet[2376]: I0531 19:38:19.795958 2376 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:38:53.643794-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:19 flannel-996000 kubelet[2376]: E0531 19:38:19.796027 2376 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:38:53.643797-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:19 flannel-996000 kubelet[2376]: I0531 19:38:19.796054 2376 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"7cf5dcfa-29af-4c2b-9c66-eb45bdd51df3\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:38:53.643802-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:19 flannel-996000 kubelet[2376]: I0531 19:38:19.798502 2376 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-k29w6\\\" (UniqueName: \\\"kubernetes.io/projected/f0f3d72b-0f0c-428c-b307-a37e6f30263c-kube-api-access-k29w6\\\") pod \\\"netcat-7458db8b8-zzs2h\\\" (UID: \\\"f0f3d72b-0f0c-428c-b307-a37e6f30263c\\\") \" pod=\"default/netcat-7458db8b8-zzs2h\"\r\n"} +{"Time":"2023-05-31T12:38:53.643872-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.643878-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.643881-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:38:53.643885-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:38:53.643888-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:38:53.64389-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:38:53.643894-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCakNDQWU2Z0F3SUJBZ0lCQVRBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwdGFXNXAKYTNWaVpVTkJNQjRYRFRJek1EVXpNREU0TkRReE5Gb1hEVE16TURVeU9ERTRORFF4TkZvd0ZURVRNQkVHQTFVRQpBeE1LYldsdWFXdDFZbVZEUVRDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTCtXCitneFltMnNKQjJPdWkrbUxpY3FKUU1wbDNQMTdDUmVvak4xQWNBdngrK2Z3S1djTTZud042SmZmNTA3Q05HamcKTm1Cdzh1UC9sU1ZBSGY5dG5tN3g0Kytub1dBL0FsYncvMkJRTHhOb0FMTEJ1YnFrNmgrcW9jQm9pSkNJZGpSLwpVOHRoTmhXM0xScElmdHF5VktKQTRJc2ZrOHZvOFUzdXFKT04yd1FlS1RKMUgvbnJyMjQ0S3NhUFgwWW92elVPCnIwK05PeXhWdTFJL2k3ckdNaHVNNzV5TVoxeE9WWloyNnZPaFVOS092OVk0cFRjRzMvT0NtKzk0aDU4dnhuTTcKQ2JEZEozMnREL2YrWjVrS3VnV0Z0RWRtOEg2QnJqckxqcFlqR0k3OUJjMlpFVFRxQmtCaUpXdi80K1hyblUvUQpwTzNtMnJ5cmhBMUxOSFRyMEc4Q0F3RUFBYU5oTUY4d0RnWURWUjBQQVFIL0JBUURBZ0trTUIwR0ExVWRKUVFXCk1CUUdDQ3NHQVFVRkJ3TUNCZ2dyQmdFRkJRY0RBVEFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVcKQkJUYVlvOHZkanRNS1lqUkpXaXpHRGQ3d0Z4Z296QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFLWk9L"} +{"Time":"2023-05-31T12:38:53.643898-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:38:53.6439-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:38:53.643903-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:38:53.643905-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:38:53.643907-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:38:53.64391-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:38:53.643914-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user: system:node:flannel-996000\r\n"} +{"Time":"2023-05-31T12:38:53.643917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: system:node:flannel-996000@mk\r\n"} +{"Time":"2023-05-31T12:38:53.643921-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: system:node:flannel-996000@mk\r\n"} +{"Time":"2023-05-31T12:38:53.643989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:38:53.643994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:38:53.643996-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users:\r\n"} +{"Time":"2023-05-31T12:38:53.643998-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - name: system:node:flannel-996000\r\n"} +{"Time":"2023-05-31T12:38:53.644-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user:\r\n"} +{"Time":"2023-05-31T12:38:53.644002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:38:53.644006-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:38:53.644011-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.644013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.644016-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:38:53.644018-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:38:53.64402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:38:53.644022-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:38:53.644024-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:38:53.644027-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:38:53.644029-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644032-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:38:53.644034-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:38:53.644036-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:38:53.644038-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:38:53.64404-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:38:53.644042-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:38:53.644045-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644047-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644049-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:38:53.644052-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:38:53.644055-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:38:53.644113-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:38:53.644115-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.644118-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:38:53.644123-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:38:53.644125-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:38:53.644127-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:38:53.644129-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644132-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:38:53.644135-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644138-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:38:53.644141-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:38:53.644143-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:38:53.644145-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644147-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:38:53.644149-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644152-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:38:53.644155-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:38:53.644159-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:38:53.644161-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" options:\r\n"} +{"Time":"2023-05-31T12:38:53.644163-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" json:\r\n"} +{"Time":"2023-05-31T12:38:53.644165-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:38:53.644167-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:38:53.644169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:38:53.644171-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644174-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644309-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:38:53.644316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:38:53.644319-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644326-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:38:53.64433-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644334-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:38:53.644341-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.644344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.644348-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:38:53.64435-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.644352-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T12:38:53.644354-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:38:53.644356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:38:53.644358-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T12:38:53.644361-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T12:38:53.644363-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" last-update: Wed, 31 May 2023 12:37:46 PDT\n"} +{"Time":"2023-05-31T12:38:53.644365-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.644368-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:38:53.64437-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:38:53.644372-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://127.0.0.1:52951\n"} +{"Time":"2023-05-31T12:38:53.644374-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:38:53.644376-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:38:53.644379-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:38:53.64439-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T12:38:53.644538-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T12:38:53.644546-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" last-update: Wed, 31 May 2023 12:37:56 PDT\n"} +{"Time":"2023-05-31T12:38:53.644549-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.644552-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:38:53.644556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:38:53.644559-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://127.0.0.1:52973\n"} +{"Time":"2023-05-31T12:38:53.644563-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.644567-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts:\n"} +{"Time":"2023-05-31T12:38:53.64457-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - context:\n"} +{"Time":"2023-05-31T12:38:53.644573-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cluster: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:38:53.644576-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T12:38:53.644579-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T12:38:53.644582-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" last-update: Wed, 31 May 2023 12:37:46 PDT\n"} +{"Time":"2023-05-31T12:38:53.644584-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.644586-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:38:53.644588-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:38:53.64459-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:38:53.644592-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:38:53.644595-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:38:53.644597-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - context:\n"} +{"Time":"2023-05-31T12:38:53.644599-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cluster: flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.644601-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T12:38:53.644603-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T12:38:53.644605-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" last-update: Wed, 31 May 2023 12:37:56 PDT\n"} +{"Time":"2023-05-31T12:38:53.644607-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.644609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:38:53.644717-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:38:53.644725-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:38:53.644729-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user: flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.644732-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.644736-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.644739-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:38:53.644743-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:38:53.644746-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users:\n"} +{"Time":"2023-05-31T12:38:53.64475-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - name: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:38:53.644753-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user:\n"} +{"Time":"2023-05-31T12:38:53.644756-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt\n"} +{"Time":"2023-05-31T12:38:53.644762-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.key\n"} +{"Time":"2023-05-31T12:38:53.644765-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - name: flannel-996000\n"} +{"Time":"2023-05-31T12:38:53.644769-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user:\n"} +{"Time":"2023-05-31T12:38:53.644772-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt\n"} +{"Time":"2023-05-31T12:38:53.644776-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.key\n"} +{"Time":"2023-05-31T12:38:53.64478-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.644783-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.644787-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:38:53.64479-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.644794-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" items:\n"} +{"Time":"2023-05-31T12:38:53.644797-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.6448-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.644804-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:38:53.644922-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.644929-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:38:53.644933-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:38:53.644936-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:38:53.64494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:38:53.644943-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:38:53.644947-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:38:53.64495-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:38:53.644954-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:38:53.644957-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:38:53.644961-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:38:53.644964-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:38:53.644968-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:38:53.644971-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:38:53.644975-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:38:53.644978-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:38:53.644982-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:38:53.644985-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:38:53.644989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.644992-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.644996-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.645188-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:38:53.645194-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:38:53.645196-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:38:53.645199-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:38:53.645201-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:38:53.645203-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:56Z\"\n"} +{"Time":"2023-05-31T12:38:53.645206-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.645208-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:38:53.64521-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"365\"\n"} +{"Time":"2023-05-31T12:38:53.645212-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 5778bf3f-9d6b-448c-a3fa-f44ca2bbeebf\n"} +{"Time":"2023-05-31T12:38:53.645214-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.645216-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.645219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni-conf.json: |\n"} +{"Time":"2023-05-31T12:38:53.645221-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\n"} +{"Time":"2023-05-31T12:38:53.645223-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"name\": \"cbr0\",\n"} +{"Time":"2023-05-31T12:38:53.645225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"cniVersion\": \"0.3.1\",\n"} +{"Time":"2023-05-31T12:38:53.645227-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"plugins\": [\n"} +{"Time":"2023-05-31T12:38:53.64523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\n"} +{"Time":"2023-05-31T12:38:53.645232-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"flannel\",\n"} +{"Time":"2023-05-31T12:38:53.645234-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"delegate\": {\n"} +{"Time":"2023-05-31T12:38:53.645236-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"hairpinMode\": true,\n"} +{"Time":"2023-05-31T12:38:53.645239-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"isDefaultGateway\": true\n"} +{"Time":"2023-05-31T12:38:53.645241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.645243-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\n"} +{"Time":"2023-05-31T12:38:53.645366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\n"} +{"Time":"2023-05-31T12:38:53.645371-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"portmap\",\n"} +{"Time":"2023-05-31T12:38:53.645374-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"capabilities\": {\n"} +{"Time":"2023-05-31T12:38:53.645376-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"portMappings\": true\n"} +{"Time":"2023-05-31T12:38:53.645379-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.645382-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.645385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\n"} +{"Time":"2023-05-31T12:38:53.645389-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.645392-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net-conf.json: |\n"} +{"Time":"2023-05-31T12:38:53.645395-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\n"} +{"Time":"2023-05-31T12:38:53.645399-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Network\": \"10.244.0.0/16\",\n"} +{"Time":"2023-05-31T12:38:53.645402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Backend\": {\n"} +{"Time":"2023-05-31T12:38:53.645404-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Type\": \"vxlan\"\n"} +{"Time":"2023-05-31T12:38:53.645408-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.64541-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.645412-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.645414-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.645416-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:38:53.645418-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubectl.kubernetes.io/last-applied-configuration: |\n"} +{"Time":"2023-05-31T12:38:53.645421-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\"apiVersion\":\"v1\",\"data\":{\"cni-conf.json\":\"{\\n \\\"name\\\": \\\"cbr0\\\",\\n \\\"cniVersion\\\": \\\"0.3.1\\\",\\n \\\"plugins\\\": [\\n {\\n \\\"type\\\": \\\"flannel\\\",\\n \\\"delegate\\\": {\\n \\\"hairpinMode\\\": true,\\n \\\"isDefaultGateway\\\": true\\n }\\n },\\n {\\n \\\"type\\\": \\\"portmap\\\",\\n \\\"capabilities\\\": {\\n \\\"portMappings\\\": true\\n }\\n }\\n ]\\n}\\n\",\"net-conf.json\":\"{\\n \\\"Network\\\": \\\"10.244.0.0/16\\\",\\n \\\"Backend\\\": {\\n \\\"Type\\\": \\\"vxlan\\\"\\n }\\n}\\n\"},\"kind\":\"ConfigMap\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"flannel\",\"k8s-app\":\"flannel\",\"tier\":\"node\"},\"name\":\"kube-flannel-cfg\",\"namespace\":\"kube-flannel\"}}\n"} +{"Time":"2023-05-31T12:38:53.645427-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:45Z\"\n"} +{"Time":"2023-05-31T12:38:53.645484-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" labels:\n"} +{"Time":"2023-05-31T12:38:53.645492-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" app: flannel\n"} +{"Time":"2023-05-31T12:38:53.645498-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" k8s-app: flannel\n"} +{"Time":"2023-05-31T12:38:53.645502-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier: node\n"} +{"Time":"2023-05-31T12:38:53.645506-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T12:38:53.64551-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-flannel\n"} +{"Time":"2023-05-31T12:38:53.645514-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"296\"\n"} +{"Time":"2023-05-31T12:38:53.645518-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: c3467bc5-8230-42f1-897c-2a4b6884d3b9\n"} +{"Time":"2023-05-31T12:38:53.645521-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.645524-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.645528-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:38:53.645531-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.645535-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:38:53.645538-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:38:53.645542-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:38:53.645545-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:38:53.645549-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:38:53.645552-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:38:53.645556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:38:53.64556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:38:53.645563-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:38:53.645567-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:38:53.64557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:38:53.645598-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:38:53.645604-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:38:53.645609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:38:53.645612-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:38:53.645615-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:38:53.645618-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:38:53.64562-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.645623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.645625-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.645627-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:38:53.645629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:38:53.645633-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:38:53.645635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:38:53.645638-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:38:53.64564-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:56Z\"\n"} +{"Time":"2023-05-31T12:38:53.645642-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.645644-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-flannel\n"} +{"Time":"2023-05-31T12:38:53.645646-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"366\"\n"} +{"Time":"2023-05-31T12:38:53.645649-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 89652335-8279-4f52-a8c6-93101f340fa1\n"} +{"Time":"2023-05-31T12:38:53.645651-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.645653-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.645655-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:38:53.645657-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.645711-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:38:53.645718-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:38:53.645723-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:38:53.645726-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:38:53.64573-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:38:53.645735-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:38:53.645738-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:38:53.64574-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:38:53.645742-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:38:53.645744-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:38:53.645747-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:38:53.645749-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:38:53.645751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:38:53.645754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:38:53.645757-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:38:53.64576-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:38:53.645764-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:38:53.645773-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.645787-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.645791-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.645793-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:38:53.64584-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:38:53.645848-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:38:53.645852-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:38:53.645855-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:38:53.645859-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:56Z\"\n"} +{"Time":"2023-05-31T12:38:53.645872-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.645878-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:38:53.645881-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"367\"\n"} +{"Time":"2023-05-31T12:38:53.645883-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 9d4819a4-06c2-494c-84fd-70a5d91746a2\n"} +{"Time":"2023-05-31T12:38:53.645885-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.645888-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.64589-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" jws-kubeconfig-r9wefg: eyJhbGciOiJIUzI1NiIsImtpZCI6InI5d2VmZyJ9..OzeqNj72fjRGtGV2FQ8y5Cmiwmp5Jlc1gvF4Q-1iynE\n"} +{"Time":"2023-05-31T12:38:53.645892-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:38:53.645894-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.645897-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T12:38:53.645899-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:38:53.645903-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:38:53.645907-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"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\n"} +{"Time":"2023-05-31T12:38:53.645944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:38:53.645957-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:38:53.645961-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:38:53.645964-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:38:53.645966-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:38:53.645968-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:38:53.64597-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users: null\n"} +{"Time":"2023-05-31T12:38:53.645972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.645974-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.645977-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:43Z\"\n"} +{"Time":"2023-05-31T12:38:53.645979-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:38:53.645981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:38:53.645983-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"371\"\n"} +{"Time":"2023-05-31T12:38:53.645986-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 37f71a6b-ba7b-49ea-81b8-591f962670b2\n"} +{"Time":"2023-05-31T12:38:53.645988-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.64599-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.645992-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:38:53.645994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.645998-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:38:53.646001-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:38:53.646003-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:38:53.646005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:38:53.646064-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:38:53.646069-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:38:53.646072-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:38:53.646074-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:38:53.646076-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:38:53.646078-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:38:53.646081-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:38:53.646083-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:38:53.646085-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:38:53.646087-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:38:53.646089-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:38:53.646092-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:38:53.646094-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:38:53.646096-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.646098-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.6461-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.646103-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:38:53.646107-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:38:53.646112-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:38:53.646115-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:38:53.646119-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:38:53.646162-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:56Z\"\n"} +{"Time":"2023-05-31T12:38:53.646172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.646176-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:38:53.646179-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"368\"\n"} +{"Time":"2023-05-31T12:38:53.646186-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 69e7e7f5-2cd2-444a-996a-0c4769b11d59\n"} +{"Time":"2023-05-31T12:38:53.646204-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.646209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.646211-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:38:53.646214-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:38:53.646216-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" log\n"} +{"Time":"2023-05-31T12:38:53.646218-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" errors\n"} +{"Time":"2023-05-31T12:38:53.64622-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" health {\n"} +{"Time":"2023-05-31T12:38:53.646222-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:38:53.646224-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.646227-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ready\n"} +{"Time":"2023-05-31T12:38:53.646229-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:38:53.646231-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:38:53.646233-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:38:53.646236-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:38:53.646238-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.64624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:38:53.646242-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hosts {\n"} +{"Time":"2023-05-31T12:38:53.646244-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:38:53.646246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:38:53.646294-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.646302-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:38:53.646306-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:38:53.646319-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.646326-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cache 30\n"} +{"Time":"2023-05-31T12:38:53.646329-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" loop\n"} +{"Time":"2023-05-31T12:38:53.646333-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" reload\n"} +{"Time":"2023-05-31T12:38:53.646337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:38:53.64634-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T12:38:53.646344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.646347-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.64635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:44Z\"\n"} +{"Time":"2023-05-31T12:38:53.646355-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:38:53.646357-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.646359-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"406\"\n"} +{"Time":"2023-05-31T12:38:53.646362-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 768c9f3b-5eb9-40c6-8c8a-017492c3f956\n"} +{"Time":"2023-05-31T12:38:53.646377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.64638-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.646382-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:38:53.646384-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.646386-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:38:53.646399-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:38:53.646402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:38:53.646405-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:38:53.646407-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:38:53.646443-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:38:53.646445-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:38:53.646448-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:38:53.64645-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:38:53.646453-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:38:53.646455-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:38:53.646478-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:38:53.646485-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:38:53.646488-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:38:53.64649-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:38:53.646492-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:38:53.646494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:38:53.646497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.646499-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:38:53.646501-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:38:53.646504-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.646506-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:38:53.646508-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM3MzVaFw0zMzA1MjgxOTM3MzVaMBkxFzAV\n"} +{"Time":"2023-05-31T12:38:53.64651-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:38:53.646512-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CgKCAQEAveja5SdUHWn8InI7B14KpmQKV4T5BYhWdlsHNP9Qjyk7AIdzyXCAIMz9\n"} +{"Time":"2023-05-31T12:38:53.646515-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KcyNuezkqkzvsaGvmBAnywM9yV9+MUjb6NdhgUnb4F8T3nwipNLZjACn8etLT5RV\n"} +{"Time":"2023-05-31T12:38:53.646654-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" eWpuOWFY+MXn4rugSqFYE0S0R3JfM55c70ZmMnUIU0sylH3dH3Z8t9un61rXxPzv\n"} +{"Time":"2023-05-31T12:38:53.64666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 3NsM7tjXB5hgFosadXLjjItr5k1qC/86f08TI1gyJGNeY+G2wE/KCNPjTbRIPWUp\n"} +{"Time":"2023-05-31T12:38:53.646664-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7OrMhE0KILxBSzQfO15kRoWdjzoRAGWzD3r427cyWunjGlN8frFjqXEJTV6N5zTX\n"} +{"Time":"2023-05-31T12:38:53.646668-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 5ANxkRFe5tI8uTP8jhFb20mwCVu9QQIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:38:53.646672-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU9YnjTRVYdNoCyr/U9rmuYW6CmZ0w\n"} +{"Time":"2023-05-31T12:38:53.646675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAFkT\n"} +{"Time":"2023-05-31T12:38:53.64668-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pCo9cFleRhJgbGSURmA7/3P5zBOz24IYD/WVjCNIIyC4AVOL+bKt3/w7afarMzA9\n"} +{"Time":"2023-05-31T12:38:53.646684-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NEe3rxqwi/7gM5IFiJAuyw4pSjbYf2t31/Rmmlm/1HRAkUSX86egwT4eerj4rZUD\n"} +{"Time":"2023-05-31T12:38:53.646687-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" +rW2Q91pniYAkHgiQ4zl9ccrilbsPA+lNkK40w9jVKuOnpY1DGQxOPfIem0E3kqi\n"} +{"Time":"2023-05-31T12:38:53.646691-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AS7cJIPNv6sqk1xfwXPGxHippl9su9QIeUywoYrLfDxTGxBzBZLYembqMisubMFF\n"} +{"Time":"2023-05-31T12:38:53.646695-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Xh+jtel4uJ9KlOkKvLVybQe+ElBaH2cMlRC9xI8m7/jWBjLgS68hlEFdu+NlDHtN\n"} +{"Time":"2023-05-31T12:38:53.646698-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" aH6g4MhBqxL2odMAB4Q=\n"} +{"Time":"2023-05-31T12:38:53.646702-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.646705-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:38:53.646723-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:38:53.64674-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:38:53.646742-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.646745-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.646747-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:41Z\"\n"} +{"Time":"2023-05-31T12:38:53.646749-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:38:53.646751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.646754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"36\"\n"} +{"Time":"2023-05-31T12:38:53.646756-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: adef508d-b3d1-4a54-a308-ebe6a02c0482\n"} +{"Time":"2023-05-31T12:38:53.646962-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.646969-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.646972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:38:53.646975-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.646978-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.64698-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:41Z\"\n"} +{"Time":"2023-05-31T12:38:53.646983-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:38:53.646985-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.646987-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"28\"\n"} +{"Time":"2023-05-31T12:38:53.64699-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: c3033b5a-89c5-4330-868f-493d3642f55f\n"} +{"Time":"2023-05-31T12:38:53.646992-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.646994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.646996-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:38:53.646999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:38:53.647001-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:38:53.647003-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:38:53.647005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:38:53.647007-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647009-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:38:53.647012-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647014-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:38:53.647016-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:38:53.647018-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:38:53.647021-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.647023-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:38:53.647025-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:38:53.647271-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" min: null\n"} +{"Time":"2023-05-31T12:38:53.647276-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:38:53.647278-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:38:53.64728-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:38:53.647283-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647287-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:38:53.64729-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647294-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:38:53.647297-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647299-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647301-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" iptables:\n"} +{"Time":"2023-05-31T12:38:53.647303-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:38:53.647307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:38:53.647309-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:38:53.647311-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.647313-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.647315-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:38:53.647318-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:38:53.64732-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.647322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647326-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:38:53.647329-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.647344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:38:53.647356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:38:53.647363-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:38:53.647368-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:38:53.647372-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:38:53.647608-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647613-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:38:53.647616-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:38:53.647618-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:38:53.64762-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647622-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:38:53.647624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:38:53.647626-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:38:53.647629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647631-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647633-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:38:53.647635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:38:53.647637-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.647639-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:38:53.647641-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T12:38:53.647643-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:38:53.647645-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:38:53.647648-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:38:53.64765-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: default\n"} +{"Time":"2023-05-31T12:38:53.647652-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts:\n"} +{"Time":"2023-05-31T12:38:53.647667-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - context:\n"} +{"Time":"2023-05-31T12:38:53.64767-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:38:53.647672-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:38:53.647674-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user: default\n"} +{"Time":"2023-05-31T12:38:53.647676-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: default\n"} +{"Time":"2023-05-31T12:38:53.647678-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:38:53.647936-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users:\n"} +{"Time":"2023-05-31T12:38:53.647942-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - name: default\n"} +{"Time":"2023-05-31T12:38:53.647944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user:\n"} +{"Time":"2023-05-31T12:38:53.647947-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:38:53.647949-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.647951-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.647953-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:44Z\"\n"} +{"Time":"2023-05-31T12:38:53.647955-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" labels:\n"} +{"Time":"2023-05-31T12:38:53.647958-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.64796-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:38:53.647962-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.647964-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"275\"\n"} +{"Time":"2023-05-31T12:38:53.647967-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 34ac4841-c10f-47cf-8ee1-df57b06845f3\n"} +{"Time":"2023-05-31T12:38:53.64797-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.647972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.647974-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:38:53.647976-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.647978-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:38:53.64798-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:38:53.647983-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:38:53.647985-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:38:53.647987-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:38:53.647989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:38:53.647991-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:38:53.647993-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:38:53.648242-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:38:53.648246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:38:53.648249-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:38:53.648251-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:38:53.648254-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:38:53.648256-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:38:53.648258-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:38:53.648261-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:38:53.648263-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:38:53.648266-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:38:53.648268-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.64827-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.648272-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T12:38:53.648274-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:38:53.648277-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:38:53.64828-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:38:53.648282-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:38:53.648284-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:56Z\"\n"} +{"Time":"2023-05-31T12:38:53.648286-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:38:53.648288-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.648291-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"369\"\n"} +{"Time":"2023-05-31T12:38:53.648293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: bb503f1c-c77d-4d49-8354-3f3e01eac071\n"} +{"Time":"2023-05-31T12:38:53.648295-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.648511-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.648514-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:38:53.648517-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:38:53.648519-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:38:53.648521-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:38:53.648523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - localhost\n"} +{"Time":"2023-05-31T12:38:53.648525-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - 192.168.76.2\n"} +{"Time":"2023-05-31T12:38:53.648527-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:38:53.64853-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:38:53.648532-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:38:53.648535-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:38:53.648537-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:38:53.648539-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:38:53.648542-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:38:53.648544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:38:53.648546-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:38:53.648548-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:38:53.64855-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:38:53.648553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:38:53.648555-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:38:53.648557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" etcd:\n"} +{"Time":"2023-05-31T12:38:53.648559-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" local:\n"} +{"Time":"2023-05-31T12:38:53.648561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:38:53.648563-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:38:53.648565-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:38:53.648901-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:38:53.648908-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:38:53.648913-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:38:53.648917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" networking:\n"} +{"Time":"2023-05-31T12:38:53.64892-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:38:53.648923-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:38:53.648925-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:38:53.648928-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:38:53.648932-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:38:53.648935-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:38:53.648963-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.648968-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.648972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:42Z\"\n"} +{"Time":"2023-05-31T12:38:53.648974-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:38:53.648977-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.648979-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"235\"\n"} +{"Time":"2023-05-31T12:38:53.648981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: d8600e82-fa39-465b-aa1a-6b1a455bdb33\n"} +{"Time":"2023-05-31T12:38:53.648983-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:38:53.648985-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T12:38:53.648987-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:38:53.648989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:38:53.648992-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authentication:\n"} +{"Time":"2023-05-31T12:38:53.648994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:38:53.648996-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:38:53.649002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" webhook:\n"} +{"Time":"2023-05-31T12:38:53.649006-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:38:53.649164-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:38:53.64917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" x509:\n"} +{"Time":"2023-05-31T12:38:53.649173-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:38:53.649175-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authorization:\n"} +{"Time":"2023-05-31T12:38:53.649178-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:38:53.64918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" webhook:\n"} +{"Time":"2023-05-31T12:38:53.649182-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:38:53.649184-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:38:53.649188-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:38:53.649191-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:38:53.649193-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:38:53.649196-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:38:53.649199-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:38:53.649201-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.649208-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:38:53.64921-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:38:53.649213-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:38:53.649215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:38:53.649218-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.649221-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:38:53.649225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:38:53.649228-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:38:53.649232-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:38:53.649235-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:38:53.649238-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:38:53.649242-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:38:53.649245-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:38:53.649413-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:38:53.649419-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" logging:\n"} +{"Time":"2023-05-31T12:38:53.649423-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:38:53.64944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" options:\n"} +{"Time":"2023-05-31T12:38:53.649443-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" json:\n"} +{"Time":"2023-05-31T12:38:53.649447-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:38:53.649449-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:38:53.649451-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:38:53.649453-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:38:53.649456-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:38:53.649458-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:38:53.64946-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:38:53.649463-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.649465-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:38:53.649467-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:38:53.649469-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:38:53.649471-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:38:53.649474-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:38:53.649476-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:38:53.649478-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.64948-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:37:42Z\"\n"} +{"Time":"2023-05-31T12:38:53.649482-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:38:53.649484-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:38:53.649487-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"238\"\n"} +{"Time":"2023-05-31T12:38:53.649489-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 06e94b7e-7d94-4079-9bee-f0fe148136b2\n"} +{"Time":"2023-05-31T12:38:53.649491-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: List\n"} +{"Time":"2023-05-31T12:38:53.649662-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T12:38:53.649666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:38:53.649668-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.64967-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.649673-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:38:53.649675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:38:53.649678-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: loaded (\u001b]8;;file://flannel-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:38:53.649681-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:32 UTC; 1min 14s ago\r\n"} +{"Time":"2023-05-31T12:38:53.649683-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:38:53.649686-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:38:53.649689-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Main PID: 1040 (dockerd)\r\n"} +{"Time":"2023-05-31T12:38:53.649692-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tasks: 18\r\n"} +{"Time":"2023-05-31T12:38:53.649695-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Memory: 257.6M\r\n"} +{"Time":"2023-05-31T12:38:53.6497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CPU: 12.615s\r\n"} +{"Time":"2023-05-31T12:38:53.649708-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:38:53.649712-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─1040 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:38:53.64972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.649727-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:32 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:37:32.508487784Z\" level=info msg=\"Daemon has completed initialization\"\r\n"} +{"Time":"2023-05-31T12:38:53.649734-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:32 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:37:32.538781773Z\" level=info msg=\"API listen on /var/run/docker.sock\"\r\n"} +{"Time":"2023-05-31T12:38:53.649739-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:32 flannel-996000 systemd[1]: Started Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T12:38:53.649917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:32 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:37:32.538980561Z\" level=info msg=\"API listen on [::]:2376\"\r\n"} +{"Time":"2023-05-31T12:38:53.649927-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:59 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:37:59.555027565Z\" level=info msg=\"ignoring event\" container=cb8231ac7177d31245b5f011cef515a1a31ade5ed1417907506c460573b02f5b module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:38:53.649933-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:03 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:38:03.822810284Z\" level=info msg=\"ignoring event\" container=59c1f42a1bbd1f4297a5befa54ae998d85f5e2c4c9a41462cd21606f85a751ac module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:38:53.649936-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:38:11.344085283Z\" level=info msg=\"ignoring event\" container=0f3bae074981fa292a987874f77d369ad1fe3a8b1e0dbec299157c86ecb77e83 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:38:53.649939-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:38:11.442209310Z\" level=info msg=\"ignoring event\" container=8e7b16390be85ba6ff90af5d66f91140cd4c60cb653f710b403eb9578f579c41 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:38:53.649942-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:38:11.502845464Z\" level=info msg=\"ignoring event\" container=334c036f48c2ab2f12f98c23baf2d4761561bf7b7a03dde380dd5462b8eaa281 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:38:53.649944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 dockerd[1040]: time=\"2023-05-31T19:38:11.553051715Z\" level=info msg=\"ignoring event\" container=1d5400ae35e4dc7a33118a3f7908b3120cf78a0fa4c2b9746d86fba6eeb6e907 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:38:53.649947-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.649949-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.649951-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:38:53.649954-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.649958-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:38:53.649962-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:38:53.649969-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:38:53.649976-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:38:53.650111-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:38:53.650117-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:38:53.650119-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:38:53.650121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:38:53.650124-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:38:53.650126-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.65013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:38:53.650132-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:38:53.650134-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650136-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650138-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650141-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:38:53.650145-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:38:53.650147-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:38:53.650158-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:38:53.650164-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:38:53.650167-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:38:53.650169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:38:53.650172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650174-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:38:53.650176-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:38:53.650179-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:38:53.650181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:38:53.650368-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:38:53.650383-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650388-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:38:53.650391-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:38:53.650396-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.650399-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.650401-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.650403-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650405-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:38:53.650408-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:38:53.65041-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.650412-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:38:53.650416-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650419-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:38:53.650422-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:38:53.650424-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650426-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:38:53.650428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:38:53.65043-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650432-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:38:53.650434-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:38:53.650436-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.650439-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.650441-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:38:53.650666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T12:38:53.650671-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:38:53.650674-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:38:53.650676-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:38:53.65068-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:38:53.650683-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T12:38:53.650685-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:38:53.650687-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T12:38:53.65069-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.650692-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.650695-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:38:53.650697-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:38:53.6507-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:38:53.650702-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:38:53.650704-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:38:53.650706-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:38:53.650708-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:38:53.65071-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:38:53.650712-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:38:53.650715-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.650717-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:38:53.650719-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers: 22\r\n"} +{"Time":"2023-05-31T12:38:53.650721-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Running: 18\r\n"} +{"Time":"2023-05-31T12:38:53.650723-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:38:53.650725-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Stopped: 4\r\n"} +{"Time":"2023-05-31T12:38:53.650727-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Images: 11\r\n"} +{"Time":"2023-05-31T12:38:53.650729-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:38:53.650981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:38:53.650987-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:38:53.650999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:38:53.651005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:38:53.651008-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:38:53.651011-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:38:53.651013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:38:53.651015-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:38:53.651017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:38:53.651019-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:38:53.651021-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:38:53.651023-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:38:53.651044-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:38:53.65105-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:38:53.651053-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Runtimes: io.containerd.runc.v2 runc\r\n"} +{"Time":"2023-05-31T12:38:53.651055-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:38:53.651058-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:38:53.65106-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:38:53.651062-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:38:53.651064-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:38:53.651067-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:38:53.651069-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:38:53.651071-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:38:53.651073-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:38:53.651075-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:38:53.651077-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:38:53.65123-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:38:53.651235-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:38:53.651237-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:38:53.651239-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:38:53.651241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: flannel-996000\r\n"} +{"Time":"2023-05-31T12:38:53.651245-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ID: 5604f931-6626-466c-8d24-22a0e22e76bc\r\n"} +{"Time":"2023-05-31T12:38:53.651249-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:38:53.651253-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:38:53.651256-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:38:53.651258-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:38:53.65126-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:38:53.651262-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:38:53.651264-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:38:53.651267-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:38:53.651269-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:38:53.651271-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:38:53.651273-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.651276-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.651278-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.65128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:38:53.651282-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:38:53.651285-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: loaded (\u001b]8;;file://flannel-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:38:53.651288-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:38:53.65129-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─\u001b]8;;file://flannel-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:38:53.651293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:33 UTC; 1min 15s ago\r\n"} +{"Time":"2023-05-31T12:38:53.651479-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:38:53.651483-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:38:53.651486-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Main PID: 1261 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:38:53.651488-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tasks: 12\r\n"} +{"Time":"2023-05-31T12:38:53.65149-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Memory: 20.2M\r\n"} +{"Time":"2023-05-31T12:38:53.651493-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CPU: 1.798s\r\n"} +{"Time":"2023-05-31T12:38:53.651495-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:38:53.651497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─1261 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:38:53.6515-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.651502-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:37:59 flannel-996000 cri-dockerd[1261]: time=\"2023-05-31T19:37:59Z\" level=info msg=\"Stop pulling image docker.io/flannel/flannel-cni-plugin:v1.1.2: Status: Downloaded newer image for flannel/flannel-cni-plugin:v1.1.2\"\r\n"} +{"Time":"2023-05-31T12:38:53.651505-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:03 flannel-996000 cri-dockerd[1261]: time=\"2023-05-31T19:38:03Z\" level=info msg=\"Stop pulling image docker.io/flannel/flannel:v0.21.5: Status: Downloaded newer image for flannel/flannel:v0.21.5\"\r\n"} +{"Time":"2023-05-31T12:38:53.651508-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:04 flannel-996000 cri-dockerd[1261]: time=\"2023-05-31T19:38:04Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/24,},}\"\r\n"} +{"Time":"2023-05-31T12:38:53.65151-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 cri-dockerd[1261]: time=\"2023-05-31T19:38:11Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/41e98f7ea81374e11c4f8f989d3cbcfc921274584199a7f2101954a2a9ef9e47/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:38:53.651513-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 cri-dockerd[1261]: map[string]interface {}{\"cniVersion\":\"0.3.1\", \"hairpinMode\":true, \"ipMasq\":false, \"ipam\":map[string]interface {}{\"ranges\":[][]map[string]interface {}{[]map[string]interface {}{map[string]interface {}{\"subnet\":\"10.244.0.0/24\"}}}, \"routes\":[]types.Route{types.Route{Dst:net.IPNet{IP:net.IP{0xa, 0xf4, 0x0, 0x0}, Mask:net.IPMask{0xff, 0xff, 0x0, 0x0}}, GW:net.IP(nil)}}, \"type\":\"host-local\"}, \"isDefaultGateway\":true, \"isGateway\":true, \"mtu\":(*uint)(0xc00001a948), \"name\":\"cbr0\", \"type\":\"bridge\"}\r\n"} +{"Time":"2023-05-31T12:38:53.651913-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 cri-dockerd[1261]: delegateAdd: netconf sent to delegate plugin:\r\n"} +{"Time":"2023-05-31T12:38:53.651923-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:20 flannel-996000 cri-dockerd[1261]: {\"cniVersion\":\"0.3.1\",\"hairpinMode\":true,\"ipMasq\":false,\"ipam\":{\"ranges\":[[{\"subnet\":\"10.244.0.0/24\"}]],\"routes\":[{\"dst\":\"10.244.0.0/16\"}],\"type\":\"host-local\"},\"isDefaultGateway\":true,\"isGateway\":true,\"mtu\":65485,\"name\":\"cbr0\",\"type\":\"bridge\"}time=\"2023-05-31T19:38:20Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/742ebfd312c959641770e8f923bf8c6d36636ebe09b7dc851aa5907d85871cdf/resolv.conf as [nameserver 10.96.0.10 search default.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\r\n"} +{"Time":"2023-05-31T12:38:53.651932-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:20 flannel-996000 cri-dockerd[1261]: map[string]interface {}{\"cniVersion\":\"0.3.1\", \"hairpinMode\":true, \"ipMasq\":false, \"ipam\":map[string]interface {}{\"ranges\":[][]map[string]interface {}{[]map[string]interface {}{map[string]interface {}{\"subnet\":\"10.244.0.0/24\"}}}, \"routes\":[]types.Route{types.Route{Dst:net.IPNet{IP:net.IP{0xa, 0xf4, 0x0, 0x0}, Mask:net.IPMask{0xff, 0xff, 0x0, 0x0}}, GW:net.IP(nil)}}, \"type\":\"host-local\"}, \"isDefaultGateway\":true, \"isGateway\":true, \"mtu\":(*uint)(0xc0000ae8e8), \"name\":\"cbr0\", \"type\":\"bridge\"}\r\n"} +{"Time":"2023-05-31T12:38:53.651938-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:20 flannel-996000 cri-dockerd[1261]: delegateAdd: netconf sent to delegate plugin:\r\n"} +{"Time":"2023-05-31T12:38:53.651943-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:25 flannel-996000 cri-dockerd[1261]: {\"cniVersion\":\"0.3.1\",\"hairpinMode\":true,\"ipMasq\":false,\"ipam\":{\"ranges\":[[{\"subnet\":\"10.244.0.0/24\"}]],\"routes\":[{\"dst\":\"10.244.0.0/16\"}],\"type\":\"host-local\"},\"isDefaultGateway\":true,\"isGateway\":true,\"mtu\":65485,\"name\":\"cbr0\",\"type\":\"bridge\"}time=\"2023-05-31T19:38:25Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:38:53.651949-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.651953-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.651957-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:38:53.651962-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.651967-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:38:53.65197-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:38:53.651974-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:38:53.651978-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:38:53.651981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:38:53.652309-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:38:53.652314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652317-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.652331-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:38:53.652335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:38:53.652339-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:38:53.652342-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:38:53.652345-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:38:53.652348-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:38:53.652351-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:38:53.652356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:38:53.652359-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:38:53.652362-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:38:53.652366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652368-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:38:53.65237-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:38:53.652373-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:38:53.652375-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:38:53.652377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652379-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:38:53.652382-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:38:53.652384-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.652387-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.652597-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.652603-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652606-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:38:53.652608-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:38:53.652611-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.652613-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:38:53.652615-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:38:53.652617-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652619-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:38:53.652622-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:38:53.652624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652626-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.652629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.652631-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:38:53.652633-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:38:53.652635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.652637-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.65264-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:38:53.652642-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.652645-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:38:53.652649-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:38:53.652651-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.652654-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:38:53.652887-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:38:53.652893-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:38:53.652896-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:38:53.652898-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:38:53.6529-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:38:53.652902-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:38:53.652904-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652907-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.652909-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:38:53.652911-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:38:53.652913-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:38:53.652915-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:38:53.652917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:38:53.652919-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:38:53.652921-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652924-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:38:53.652926-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:38:53.652928-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:38:53.65293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:38:53.652933-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.652935-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:38:53.652938-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:38:53.65294-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:38:53.652942-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:38:53.652944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.653134-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:38:53.653139-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:38:53.653142-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.653145-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.653148-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.65315-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.653152-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:38:53.653154-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:38:53.653156-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.653159-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:38:53.653161-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:38:53.653163-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.653165-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:38:53.653167-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:38:53.653169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.653171-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.653173-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:38:53.653175-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:38:53.653177-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.653179-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.653181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:38:53.653183-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:38:53.653186-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: loaded (\u001b]8;;file://flannel-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:38:53.653188-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:31 UTC; 1min 18s ago\r\n"} +{"Time":"2023-05-31T12:38:53.653804-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:38:53.653813-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Main PID: 821 (containerd)\r\n"} +{"Time":"2023-05-31T12:38:53.653818-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tasks: 207\r\n"} +{"Time":"2023-05-31T12:38:53.653822-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Memory: 75.4M\r\n"} +{"Time":"2023-05-31T12:38:53.653826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CPU: 3.333s\r\n"} +{"Time":"2023-05-31T12:38:53.65383-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:38:53.653834-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─ 821 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:38:53.653838-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─1900 /usr/bin/containerd-shim-runc-v2 -namespace moby -id d8430110ac25f27d7ae9172b0663d54afd6eb36c28e01b2504207ac50fac55ca -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.653842-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─1940 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 6904c3e24629a86e27c0d97f6864afe74dabf2abd9107116644181e8dfbd07db -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.653847-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─1948 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 16f486491d459db03bd0c326ee45d50b2cffa6a10581f36bc857282ef4e33406 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.653852-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─1967 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 81b54b88dd0991ebb2917719c3f0f3eae00f96ca5c6b6ad0df9e0f919d7b6a03 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.653856-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─2072 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 32d2e2c11c81bc470a5e833aa69f58cf30e305913c544cdee651b20f3e9cfff5 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.653862-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─2116 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 07641deca1e5b30c44539d848a02262498dd3e26b4bcef0c870cd6db7057a87e -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.653867-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─2117 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 7e88dfe12609d4ef7047a4fa66bcdc70e4e77cda00a4de044b28cdf7243eaeeb -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.653872-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─2153 /usr/bin/containerd-shim-runc-v2 -namespace moby -id bb0ae02739c26b0b02dbf7f1d27d5997c5b8c93ea632472f1180ef05ab1f6430 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.653876-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─2819 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 408dcc81d0820083e80f35a7f6ecab437680c0c392667b8e0c720860e1850f50 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.65388-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─2827 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 405f5ae01ed3dbd9b86b3554e9ae2cb20f887d4a70a9657fa7d01284a13a60f9 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.6542-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─2911 /usr/bin/containerd-shim-runc-v2 -namespace moby -id d8104a4354c634ba0976517eb5254ec690836c7dc0fd5e1b76cf82c2cedf7f51 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.654206-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─3363 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 819c28e14a573111a9e661a7e42c897fb7e0b1f3e64a80c692c2c2d547b6186d -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.654209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─3417 /usr/bin/containerd-shim-runc-v2 -namespace moby -id c4d23eafba1d496c66bd1846b7422759276a136c96bdf46581c71aa1799cfb57 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.654214-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─3639 /usr/bin/containerd-shim-runc-v2 -namespace moby -id a7bada4efa1536c8e0315d44385d9d52f0d52b64d54d5e0e8682dd99e0897382 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.654217-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─4034 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 41e98f7ea81374e11c4f8f989d3cbcfc921274584199a7f2101954a2a9ef9e47 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.654221-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─4115 /usr/bin/containerd-shim-runc-v2 -namespace moby -id ee00892b110a6ecd080b8023696fe01aa2f2dad695fe083b8dcb99d0e4e9b4a7 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.654236-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─4333 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 742ebfd312c959641770e8f923bf8c6d36636ebe09b7dc851aa5907d85871cdf -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.654242-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─4520 /usr/bin/containerd-shim-runc-v2 -namespace moby -id bb0d9c8788f036b5d6dfac596f792f4f50c0415e297dfc984a8ed6211bf3099a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:38:53.654246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.654249-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:11.791015352Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:38:53.654254-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:11 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:11.791317291Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/ee00892b110a6ecd080b8023696fe01aa2f2dad695fe083b8dcb99d0e4e9b4a7 pid=4115 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:38:53.654258-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:20 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:20.137625629Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:38:53.654263-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:20 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:20.137740368Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:38:53.654529-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:20 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:20.137750329Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:38:53.654534-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:20 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:20.138194163Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/742ebfd312c959641770e8f923bf8c6d36636ebe09b7dc851aa5907d85871cdf pid=4333 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:38:53.654537-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:25 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:25.661947386Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:38:53.65454-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:25 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:25.662031188Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:38:53.654543-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:25 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:25.662041131Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:38:53.654546-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:25 flannel-996000 containerd[821]: time=\"2023-05-31T19:38:25.662453450Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/bb0d9c8788f036b5d6dfac596f792f4f50c0415e297dfc984a8ed6211bf3099a pid=4520 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:38:53.654549-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.654551-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.654554-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:38:53.654556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.654559-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:38:53.654561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.654564-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:38:53.654567-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:38:53.654569-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:38:53.654835-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.654842-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:38:53.654845-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.654847-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:38:53.65485-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:38:53.654853-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:38:53.654855-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:38:53.654859-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:38:53.654863-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.654866-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:38:53.65487-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:38:53.654875-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:38:53.654879-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:38:53.654884-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.654887-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.654891-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:38:53.654895-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:38:53.654899-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.654902-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:38:53.654907-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:38:53.65491-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:38:53.654914-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:38:53.654918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:38:53.654922-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:38:53.654926-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:38:53.655121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.655128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.655133-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.655136-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:38:53.655141-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:38:53.655148-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.655153-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:38:53.655157-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.655161-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:38:53.655165-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:38:53.655169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.655172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.655176-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:38:53.655183-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:38:53.655187-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.65519-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:38:53.655195-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:38:53.655199-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:38:53.655202-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.655207-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:38:53.655211-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.655215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:38:53.655219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:38:53.655224-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:38:53.655228-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:38:53.655355-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:38:53.65537-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.655378-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:38:53.655394-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:38:53.655397-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:38:53.6554-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:38:53.655402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.655406-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.655409-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:38:53.655411-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:38:53.655414-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.655416-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:38:53.655418-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:38:53.65542-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:38:53.655422-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:38:53.655426-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:38:53.655428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:38:53.65543-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:38:53.655433-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.655436-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.655438-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.65544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:38:53.655443-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:38:53.655447-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.655449-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:38:53.655664-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.655673-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:38:53.655677-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:38:53.655681-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.655685-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.655689-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:38:53.655693-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:38:53.655697-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:38:53.655701-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:38:53.655705-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:38:53.655713-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:38:53.655718-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.655723-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:38:53.655733-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:38:53.655738-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.655742-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.655746-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:38:53.655749-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:38:53.655754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.655763-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:38:53.655771-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.655775-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.655779-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.655783-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.655796-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.655805-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:38:53.655809-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.655813-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:38:53.656078-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.656085-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:38:53.656088-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.65609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.656093-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:38:53.656096-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:38:53.656101-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:38:53.656106-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:38:53.65611-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656113-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:38:53.656116-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:38:53.656119-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:38:53.656121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:38:53.656124-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:38:53.656126-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:38:53.656128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:38:53.65613-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.656133-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:38:53.656135-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:38:53.656138-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:38:53.656141-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.656144-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:38:53.656146-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656149-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656151-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656543-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:38:53.65655-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:38:53.656553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:38:53.656555-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:38:53.656558-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:38:53.656561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.656563-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:38:53.656566-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:38:53.656569-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:38:53.656571-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656573-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:38:53.656576-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:38:53.656578-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.65658-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:38:53.656583-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:38:53.656586-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:38:53.65659-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:38:53.656593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:38:53.656596-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:38:53.656598-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:38:53.656601-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:38:53.656603-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.656606-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.656608-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:38:53.656917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:38:53.656934-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:38:53.65694-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:38:53.656944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656947-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:38:53.65695-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:38:53.656953-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:38:53.656957-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656964-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:38:53.656968-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.656971-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:38:53.656975-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.65698-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.656984-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:38:53.656988-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656993-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.656999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.657002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657007-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.65701-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:38:53.657017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:38:53.657022-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.657025-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:38:53.657029-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:38:53.657033-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657036-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657041-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657371-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657381-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.657385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657389-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:38:53.657393-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657397-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:38:53.657401-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657405-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:38:53.657408-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657412-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:38:53.657416-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:38:53.65742-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:38:53.657424-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:38:53.657428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:38:53.657431-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:38:53.657435-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.65744-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:38:53.657444-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:38:53.657449-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:38:53.657453-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:38:53.657457-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:38:53.657461-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:38:53.657465-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:38:53.657468-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:38:53.65747-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:38:53.657472-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:38:53.657475-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:38:53.657667-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:38:53.657676-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:38:53.657681-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:38:53.657685-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:38:53.657689-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:38:53.657693-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:38:53.657697-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:38:53.657702-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:38:53.657706-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:38:53.657725-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657731-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:38:53.657736-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:38:53.65774-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:38:53.657744-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657748-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:38:53.657754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:38:53.657758-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:38:53.657761-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657765-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657768-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:38:53.657772-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657776-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:38:53.657781-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.657786-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:38:53.657838-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:38:53.657848-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:38:53.657852-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:38:53.657857-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:38:53.657861-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657865-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:38:53.657869-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657874-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657878-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:38:53.657882-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:38:53.657886-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:38:53.657892-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:38:53.657896-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657902-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657906-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.65791-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.657913-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:38:53.657921-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657925-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:38:53.657929-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.657933-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:38:53.657938-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658196-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658206-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:38:53.658211-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:38:53.658215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:38:53.65822-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:38:53.658224-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.65823-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658236-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.65824-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:38:53.658245-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658252-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:38:53.658256-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:38:53.658262-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658266-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:38:53.65827-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658273-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658277-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:38:53.658281-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:38:53.658285-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:38:53.658288-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:38:53.658293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658297-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658301-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658304-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658727-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658735-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:38:53.65874-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658744-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:38:53.658748-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:38:53.658752-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658756-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:38:53.65876-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:38:53.658764-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658767-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:38:53.658782-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.65879-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:38:53.658794-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658798-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:38:53.658801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658803-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:38:53.658806-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658809-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:38:53.658811-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658814-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.658816-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.658819-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:38:53.658821-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:38:53.658824-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659182-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659191-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:38:53.659195-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659199-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659204-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:38:53.659207-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:38:53.659211-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659214-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659218-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:38:53.659233-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:38:53.659249-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659264-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659277-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:38:53.659282-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.659286-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.65929-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:38:53.659294-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:38:53.659298-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659302-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659306-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:38:53.65931-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:38:53.659314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659317-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659653-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659662-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659667-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659671-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659679-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659684-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659687-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659691-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659695-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659699-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659703-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:38:53.659707-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.65971-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:38:53.659714-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659717-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659721-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659725-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659728-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659732-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659736-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659739-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.659743-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:38:53.659747-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.659751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:38:53.659755-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660139-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:38:53.66015-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.660155-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660159-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:38:53.660164-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.660168-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:38:53.660173-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.660177-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660184-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:38:53.660188-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660193-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:38:53.660209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:38:53.660248-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:38:53.660267-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:38:53.660274-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:38:53.660291-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:38:53.660299-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:38:53.660302-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660305-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:38:53.660307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:38:53.66031-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:38:53.660313-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:38:53.660316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:38:53.660322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:38:53.660423-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660432-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:38:53.660437-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:38:53.660441-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:38:53.660447-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:38:53.660453-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:38:53.660457-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:38:53.660461-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660465-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:38:53.660468-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.660473-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.660476-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:38:53.66048-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.660484-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.66049-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:38:53.660494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:38:53.660499-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: loaded (\u001b]8;;file://flannel-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:38:53.660504-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:38:53.660507-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:38:53.660512-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:38:53.660516-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.660519-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.660523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:38:53.660528-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:38:53.660611-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:38:53.660621-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:38:53.660626-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:38:53.660631-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:38:53.660635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:38:53.66064-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:38:53.660643-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660648-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:38:53.660651-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:38:53.660658-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:38:53.660662-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:38:53.660666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:38:53.660673-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:38:53.660677-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:38:53.660682-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:38:53.660686-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:38:53.66069-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:38:53.660693-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:38:53.660697-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.660701-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:38:53.660704-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:38:53.660708-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:38:53.660712-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:38:53.660716-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:38:53.660719-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:38:53.660722-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.660726-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:38:53.660968-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:38:53.660978-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:38:53.660983-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.660986-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.66099-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:38:53.660994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:38:53.660999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:38:53.661002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.661006-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:38:53.66101-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.661014-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:38:53.661018-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:38:53.661022-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.661024-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661029-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:38:53.661033-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.661038-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661042-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:38:53.661046-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.66105-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:38:53.661054-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:38:53.661062-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:38:53.661066-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:38:53.66107-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.661075-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:38:53.661303-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661312-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:38:53.661317-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:38:53.661322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:38:53.661326-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:38:53.66133-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661334-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:38:53.661337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:38:53.661341-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:38:53.661346-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:38:53.661353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:38:53.661358-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661361-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:38:53.661367-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:38:53.661371-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:38:53.661376-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66138-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:38:53.661385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:38:53.661389-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661393-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:38:53.661397-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:38:53.661402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:38:53.661406-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661707-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:38:53.661715-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:38:53.661719-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:38:53.661722-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.661726-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66173-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:38:53.661734-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:38:53.661739-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:38:53.661743-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661746-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:38:53.661751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:38:53.661754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:38:53.661758-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:38:53.661762-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661766-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:38:53.661771-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:38:53.661774-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:38:53.661778-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:38:53.661782-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.6618-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:38:53.661806-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:38:53.661826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:38:53.661846-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.661852-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:38:53.662125-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:38:53.662145-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:38:53.662153-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:38:53.662157-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662159-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:38:53.662163-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:38:53.662166-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:38:53.662171-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:38:53.662175-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662179-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:38:53.662183-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:38:53.662187-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662191-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:38:53.662196-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:38:53.6622-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:38:53.662204-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662208-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:38:53.662215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:38:53.662219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662223-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:38:53.662231-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.662235-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662239-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:38:53.662478-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:38:53.662487-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:38:53.662492-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.662496-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662501-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:38:53.662505-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:38:53.662509-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.662513-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662518-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:38:53.662522-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:38:53.662525-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:38:53.662528-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.662531-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662534-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:38:53.662538-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:38:53.66254-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662543-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:38:53.662546-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:38:53.662548-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66255-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:38:53.662553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:38:53.662556-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:38:53.662558-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:38:53.662819-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:38:53.662826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:38:53.662831-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:38:53.662835-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:38:53.662839-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.662843-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662847-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:38:53.662864-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:38:53.662868-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662872-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:38:53.662875-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.662878-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:38:53.662881-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662883-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:38:53.662886-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:38:53.662888-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:38:53.662892-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.662895-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662897-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:38:53.6629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:38:53.662903-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.662907-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.662911-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:38:53.662915-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:38:53.663175-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:38:53.663183-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:38:53.663196-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.663203-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663206-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:38:53.663209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:38:53.663212-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:38:53.663219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:38:53.663225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.663229-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663231-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:38:53.663234-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:38:53.663236-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663239-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:38:53.663241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:38:53.663244-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.663246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.663249-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663251-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:38:53.663253-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:38:53.663256-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:38:53.663258-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:38:53.663261-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:38:53.663263-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663622-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:38:53.663629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:38:53.663637-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:38:53.663641-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:38:53.663643-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.663648-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:38:53.66365-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663653-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:38:53.663657-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:38:53.66366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.663664-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663669-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:38:53.663673-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:38:53.663679-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:38:53.663683-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663687-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:38:53.663691-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.663698-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.663702-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663705-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:38:53.663707-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:38:53.663709-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.663712-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:38:53.663714-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.664005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664014-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:38:53.664028-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:38:53.664036-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:38:53.664039-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:38:53.664042-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:38:53.664045-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:38:53.664049-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:38:53.664051-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:38:53.664053-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:38:53.664055-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:38:53.664058-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:38:53.66406-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:38:53.664063-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:38:53.664065-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.664068-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664071-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:38:53.664073-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:38:53.664076-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:38:53.664078-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664081-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:38:53.664084-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:38:53.664086-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:38:53.664089-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.664092-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:38:53.664514-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:38:53.664523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:38:53.664526-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:38:53.664529-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.664531-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664534-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:38:53.664537-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:38:53.66454-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:38:53.664542-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:38:53.664545-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:38:53.664547-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.664549-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:38:53.664555-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:38:53.664558-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:38:53.664561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:38:53.664563-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.664566-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664568-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:38:53.664571-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:38:53.664575-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:38:53.664578-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:38:53.66458-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664583-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:38:53.664921-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:38:53.664931-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:38:53.664935-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:38:53.66494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.664944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.664948-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:38:53.664953-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:38:53.664957-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:38:53.664961-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.664965-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:38:53.664969-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:38:53.664973-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:38:53.664977-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.664981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:38:53.664984-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:38:53.664988-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:38:53.664993-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:38:53.664996-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.665-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.665005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665009-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:38:53.665013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:38:53.665017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:38:53.665021-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665229-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:38:53.665248-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:38:53.665252-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:38:53.665255-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:38:53.665258-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:38:53.665261-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665264-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:38:53.665266-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:38:53.66527-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665273-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:38:53.665276-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:38:53.665279-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665281-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:38:53.66529-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:38:53.665294-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665296-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:38:53.665299-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.665301-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665304-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:38:53.665307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:38:53.665309-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665312-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:38:53.665324-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:38:53.665557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.66557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:38:53.665579-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66559-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:38:53.665598-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.665607-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.665623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665628-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:38:53.665632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:38:53.665637-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:38:53.665641-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.665649-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665658-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:38:53.665665-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:38:53.66567-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:38:53.665674-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.665682-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665692-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:38:53.6657-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:38:53.665704-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:38:53.665711-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:38:53.665715-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.665719-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:38:53.665723-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:38:53.666154-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:38:53.666163-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:38:53.666168-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.666172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:38:53.666176-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:38:53.66618-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:38:53.666183-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:38:53.666185-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.666188-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:38:53.666194-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:38:53.666197-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:38:53.6662-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:38:53.666203-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:38:53.666205-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.666208-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:38:53.666211-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:38:53.666213-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:38:53.666216-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.666218-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.666221-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:38:53.666223-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:38:53.666226-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:38:53.666229-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.666614-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:38:53.666623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.666628-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.666632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:38:53.66664-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:38:53.666644-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:38:53.666649-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.666653-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.666658-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:38:53.666686-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:38:53.666696-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:38:53.666702-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:38:53.666706-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:38:53.666725-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:38:53.666733-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:38:53.666737-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.666741-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.666746-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:38:53.666751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:38:53.666757-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:38:53.66676-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:38:53.666764-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.666905-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:38:53.666922-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:38:53.666932-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:38:53.66695-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:38:53.666957-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:38:53.666961-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:38:53.666965-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:38:53.666972-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:38:53.666977-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:38:53.666981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:38:53.666985-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:38:53.666989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:38:53.666993-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:38:53.666998-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:38:53.667002-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:38:53.667006-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:38:53.66701-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:38:53.667014-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:38:53.667017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:38:53.667022-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:38:53.667026-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:38:53.66703-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:38:53.667252-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:38:53.667268-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:38:53.667277-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:38:53.667284-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:38:53.66729-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:38:53.667294-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:38:53.667299-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:38:53.667304-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:38:53.66731-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:38:53.667314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:38:53.667319-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.667323-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.667328-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:38:53.667332-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.667335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:38:53.66736-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.66737-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.667373-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.667375-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:38:53.667378-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:38:53.667381-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:38:53.667384-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.667386-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:38:53.667577-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.667586-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:38:53.66759-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:38:53.667594-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:38:53.667599-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.667602-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:38:53.667606-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:38:53.66761-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.667614-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:38:53.667618-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.667623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:38:53.667627-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:38:53.66763-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:38:53.667634-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.667638-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:38:53.667644-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:38:53.667648-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:38:53.667653-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.667657-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:38:53.667661-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:38:53.667665-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.667668-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:38:53.667672-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:38:53.667676-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66768-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:38:53.667864-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:38:53.667877-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.667887-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:38:53.667901-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:38:53.667907-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:38:53.667913-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:38:53.667919-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:38:53.66793-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:38:53.667938-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:38:53.667943-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:38:53.667947-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:38:53.667952-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:38:53.667957-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:38:53.66796-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:38:53.667967-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:38:53.667971-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:38:53.667976-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:38:53.66798-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:38:53.667984-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:38:53.667989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:38:53.667993-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:38:53.667997-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:38:53.668185-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:38:53.668194-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:38:53.668209-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:38:53.668219-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:38:53.668225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:38:53.668229-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668234-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:38:53.668238-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.668243-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:38:53.668247-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:38:53.668251-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:38:53.668255-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:38:53.668263-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:38:53.668284-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:38:53.66829-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:38:53.668296-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:38:53.668299-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668301-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:38:53.668303-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:38:53.668306-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.668308-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668486-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:38:53.668497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.668501-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:38:53.668505-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66851-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:38:53.668514-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:38:53.668518-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.668522-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.668526-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66853-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:38:53.668534-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:38:53.668539-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:38:53.668543-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.668548-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:38:53.668551-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668555-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:38:53.668561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:38:53.668566-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:38:53.66857-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:38:53.668575-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:38:53.668581-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.668585-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668781-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:38:53.668789-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:38:53.668794-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:38:53.668799-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:38:53.668803-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.668806-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668812-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:38:53.668815-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:38:53.668819-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:38:53.668822-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:38:53.66883-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.668833-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668837-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:38:53.668841-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:38:53.668844-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:38:53.668848-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668851-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:38:53.668855-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:38:53.668861-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.668865-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668869-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:38:53.668874-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:38:53.668879-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.668891-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:38:53.669069-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:38:53.669077-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:38:53.669082-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.669085-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669089-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:38:53.669093-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:38:53.669098-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669103-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:38:53.669108-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:38:53.669111-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669115-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:38:53.669119-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:38:53.669123-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:38:53.669127-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:38:53.669131-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:38:53.669136-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:38:53.669148-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:38:53.669158-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669162-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:38:53.66918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:38:53.669186-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:38:53.669206-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:38:53.669211-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:38:53.669215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:38:53.669221-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:38:53.66937-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:38:53.669378-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:38:53.669382-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:38:53.669387-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:38:53.66939-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669392-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:38:53.669395-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669397-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.6694-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669403-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669406-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669408-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669411-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669414-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.669416-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.669419-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:38:53.669423-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:38:53.669425-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:38:53.669431-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.669442-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66945-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:38:53.669454-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:38:53.669459-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:38:53.669656-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:38:53.669666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.669672-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:38:53.669679-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:38:53.669684-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.669688-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669693-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:38:53.669696-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:38:53.669701-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669704-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:38:53.669708-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:38:53.669712-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669716-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:38:53.669722-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:38:53.669727-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66973-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:38:53.669734-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:38:53.669737-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669741-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:38:53.669745-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:38:53.669749-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.669752-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:38:53.669754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:38:53.669757-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:38:53.669971-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.66998-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.669984-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.669988-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:38:53.669994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:38:53.576645352Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:38:53.669999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:38:53.670003-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:38:53.670009-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:38:53.670014-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:38:53.670018-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.670022-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:38:53.670026-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67003-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:38:53.670036-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:38:53.67004-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:38:53.670044-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:38:53.670048-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670053-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:38:53.670057-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:38:53.670062-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:38:53.670066-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:38:53.67007-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:38:53.670255-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67027-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:38:53.670275-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:38:53.670291-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:38:53.670295-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670298-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:38:53.670302-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:38:53.670311-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670313-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:38:53.670316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:38:53.670319-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.670321-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670325-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:38:53.670327-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:38:53.67033-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:38:53.670332-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.670334-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:38:53.670339-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:38:53.670343-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:38:53.670345-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670347-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:38:53.670351-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:38:53.670353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:38:53.670548-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:38:53.670577-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670583-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:38:53.670587-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:38:53.670592-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:38:53.670596-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:38:53.670603-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670607-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:38:53.670612-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:38:53.670616-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:38:53.67062-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:38:53.67063-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:38:53.670634-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:38:53.670638-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:38:53.670642-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670645-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:38:53.670659-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:38:53.670669-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670674-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:38:53.670679-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:38:53.670684-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670691-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:38:53.670695-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:38:53.670867-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670878-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:38:53.670883-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:38:53.670888-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:38:53.670891-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670895-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:38:53.670898-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:38:53.670903-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670908-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:38:53.670912-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.670917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670921-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:38:53.670925-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:38:53.670929-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:38:53.670933-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.670938-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670942-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:38:53.670946-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:38:53.67095-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.670954-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.670973-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:38:53.670981-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:38:53.670984-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:38:53.670989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.671268-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671303-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:38:53.671309-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:38:53.671313-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671317-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:38:53.671321-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:38:53.671324-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671328-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:38:53.671335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:38:53.671339-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:38:53.671343-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671348-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:38:53.671352-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:38:53.671356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:38:53.671358-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:38:53.671362-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:38:53.671365-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.671368-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671372-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:38:53.671385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:38:53.671395-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671398-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:38:53.671401-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.671614-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:38:53.671623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671628-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:38:53.671643-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:38:53.671651-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:38:53.671654-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.671659-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671663-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:38:53.671667-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:38:53.671671-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.671675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67168-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:38:53.671684-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:38:53.671688-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:38:53.671692-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:38:53.671696-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.671701-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671705-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:38:53.67171-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:38:53.671715-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:38:53.671723-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:38:53.671727-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.671731-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671735-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:38:53.671903-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:38:53.671913-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:38:53.671923-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:38:53.671928-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.671932-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.671937-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671941-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:38:53.671945-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:38:53.671951-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:38:53.671955-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:38:53.671959-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:38:53.671963-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.671969-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:38:53.671973-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:38:53.671978-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:38:53.671982-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:38:53.671986-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.671992-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:38:53.671997-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672001-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:38:53.672005-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:38:53.672009-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.672013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672204-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:38:53.672212-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:38:53.672215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:38:53.672218-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672221-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:38:53.672223-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.672226-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.672228-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672231-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:38:53.672233-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:38:53.672236-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67224-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:38:53.672242-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.672245-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672247-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:38:53.67225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:38:53.672253-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:38:53.672256-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:38:53.672258-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:38:53.672261-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:38:53.672263-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:38:53.672266-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:38:53.672268-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:38:53.672271-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:38:53.672273-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:38:53.672276-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:38:53.672465-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:38:53.672472-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.672475-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672478-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:38:53.672482-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:38:53.672486-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:38:53.672489-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672492-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:38:53.672494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:38:53.672497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:38:53.672501-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.672504-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672507-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:38:53.672511-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:38:53.672515-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:38:53.672519-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:38:53.672522-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.672526-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672531-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:38:53.672535-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:38:53.67254-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:38:53.672546-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:38:53.67255-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:38:53.672554-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.672801-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672811-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:38:53.672815-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:38:53.67283-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:38:53.672842-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:38:53.672845-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.67285-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672853-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:38:53.672858-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:38:53.672862-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:38:53.672866-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:38:53.67287-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672873-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:38:53.672877-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:38:53.672881-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:38:53.672885-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:38:53.672889-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.672893-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.672896-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:38:53.6729-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:38:53.672904-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:38:53.672908-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.672914-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:38:53.67292-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:38:53.673055-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:38:53.673064-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.673069-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:38:53.673074-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:38:53.673079-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:38:53.673085-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:38:53.673089-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.673093-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.673099-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673105-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:38:53.673109-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:38:53.673113-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:38:53.673117-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:38:53.673126-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:38:53.67313-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:38:53.673134-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:38:53.67314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:38:53.673144-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673147-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:38:53.673149-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:38:53.673151-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673317-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:38:53.673327-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:38:53.673332-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673336-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:38:53.67334-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:38:53.673344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673349-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:38:53.673353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.673356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67336-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:38:53.673365-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:38:53.673369-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673374-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:38:53.673379-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:38:53.673383-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.673387-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:38:53.673391-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673396-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:38:53.6734-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.673405-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.673409-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673413-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:38:53.673417-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:38:53.673433-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:38:53.673639-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.673655-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:38:53.673664-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:38:53.673669-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:38:53.673673-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.673677-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673681-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:38:53.673685-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:38:53.673689-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:38:53.673691-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:38:53.673705-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673711-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:38:53.673715-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:38:53.673717-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:38:53.673721-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:38:53.673723-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673726-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:38:53.673728-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:38:53.673731-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:38:53.673733-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:38:53.673736-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673739-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:38:53.673875-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:38:53.67388-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:38:53.673883-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:38:53.673887-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:38:53.67389-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673894-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:38:53.673898-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:38:53.673902-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:38:53.673908-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.673912-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673916-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:38:53.67392-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:38:53.673923-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:38:53.673926-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673928-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:38:53.67393-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.673933-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673937-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:38:53.673939-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:38:53.673941-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:38:53.673944-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.673946-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.673948-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:38:53.673955-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:38:53.674139-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:38:53.674148-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:38:53.674152-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:38:53.674158-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:38:53.674162-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:38:53.674166-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.674169-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674173-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:38:53.674177-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:38:53.674181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:38:53.674185-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:38:53.674189-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.674192-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:38:53.674194-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:38:53.674198-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:38:53.6742-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:38:53.674203-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:38:53.674208-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:38:53.674211-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:38:53.674215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:38:53.674217-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:38:53.67422-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:38:53.674431-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:38:53.674438-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:38:53.674441-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:38:53.674444-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:38:53.674447-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:38:53.674451-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:38:53.674453-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:38:53.674456-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:38:53.674458-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:38:53.674461-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:38:53.674464-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:38:53.674466-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:38:53.674468-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:38:53.674471-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:38:53.674474-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:38:53.674477-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:38:53.674479-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:38:53.674482-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:38:53.674484-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:38:53.674487-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:38:53.674738-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:38:53.674746-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:38:53.674751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674764-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674771-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:38:53.674773-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.674776-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:38:53.674778-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:38:53.674781-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.674784-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674787-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674789-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.674792-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674794-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.674797-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.674802-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674805-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67481-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:38:53.674816-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:38:53.67482-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:38:53.674824-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674828-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:38:53.674832-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:38:53.674837-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:38:53.674841-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.674995-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:38:53.675004-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:38:53.675009-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675013-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:38:53.675016-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:38:53.67502-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675024-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:38:53.675029-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:38:53.675033-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67504-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:38:53.675045-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:38:53.67505-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:38:53.675054-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:38:53.675058-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:38:53.675062-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:38:53.675066-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:38:53.675073-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:38:53.675077-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:38:53.675081-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:38:53.675085-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:38:53.675088-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:38:53.675094-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:38:53.675331-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:38:53.67534-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:38:53.675346-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:38:53.675351-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:38:53.675369-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:38:53.675377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:38:53.675381-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:38:53.675386-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:38:53.67539-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:38:53.675393-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:38:53.675398-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:38:53.675402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \r\n"} +{"Time":"2023-05-31T12:38:53.675406-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67541-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:38:53.675414-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T12:38:53.675418-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:38:53.67542-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:38:53.675423-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:38:53.675426-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:38:53.675428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:38:53.675432-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:38:53.67544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:38:53.675644-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:38:53.675648-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675652-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:38:53.675657-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:38:53.675661-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.675665-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67567-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:38:53.675674-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.675687-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:38:53.675713-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67572-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:38:53.675725-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:38:53.67573-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.675734-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.675737-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675741-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:38:53.675746-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:38:53.675749-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:38:53.675751-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:38:53.675754-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:38:53.675757-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675759-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:38:53.675884-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:38:53.67589-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:38:53.675894-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:38:53.675898-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:38:53.675902-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.675905-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675907-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:38:53.67591-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:38:53.675914-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:38:53.675918-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:38:53.675922-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.675926-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:38:53.675932-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:38:53.675935-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:38:53.675937-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675941-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:38:53.675945-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.675949-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.675953-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:38:53.675958-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:38:53.675962-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:38:53.675966-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67597-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:38:53.676139-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:38:53.676147-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.676152-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676155-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:38:53.67616-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:38:53.676164-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676168-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:38:53.676187-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:38:53.676194-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:38:53.676199-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.676203-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676206-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:38:53.676211-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:38:53.676215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676218-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:38:53.676222-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:38:53.676226-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67623-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:38:53.676235-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:38:53.676239-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:38:53.676243-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:38:53.676249-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:38:53.676253-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:38:53.676257-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:38:53.676262-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676511-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:38:53.676519-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:38:53.676524-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:38:53.676528-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:38:53.676532-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:38:53.676535-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:38:53.676538-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:38:53.676541-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:38:53.676545-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:38:53.676549-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:38:53.676557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:38:53.676561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676565-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:38:53.676569-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676573-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676576-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676578-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676581-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676595-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676621-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:38:53.676628-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:38:53.676632-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:38:53.676636-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:38:53.676757-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.67677-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:38:53.676776-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.676781-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676786-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:38:53.676791-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:38:53.676796-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:38:53.6768-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:38:53.676805-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.676808-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676812-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:38:53.676817-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:38:53.676821-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:38:53.676825-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676829-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:38:53.676834-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:38:53.676838-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676842-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:38:53.676846-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:38:53.67685-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676854-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:38:53.676859-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:38:53.676865-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676869-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:38:53.676873-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:38:53.676977-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.676989-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:38:53.676994-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:38:53.676998-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.677004-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:38:53.677008-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:38:53.677012-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:38:53.677017-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T12:38:53.677034-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:38:53.677045-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ----------------------- debugLogs end: flannel-996000 [took: 20.337323166s] --------------------------------\n"} +{"Time":"2023-05-31T12:38:53.67705-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:175: Cleaning up \"flannel-996000\" profile ...\n"} +{"Time":"2023-05-31T12:38:53.677055-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p flannel-996000\n"} +{"Time":"2023-05-31T12:38:56.485047-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p flannel-996000: (2.830587647s)\n"} +{"Time":"2023-05-31T12:38:56.48507-07:00","Action":"cont","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T12:38:56.485073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== CONT TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T12:38:56.485116-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge/Start"} +{"Time":"2023-05-31T12:38:56.485122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":"=== RUN TestNetworkPlugins/group/bridge/Start\n"} +{"Time":"2023-05-31T12:38:56.485192-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p bridge-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=bridge --driver=docker \n"} +{"Time":"2023-05-31T12:39:03.902797-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:39:03.90281-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ----------------------- debugLogs start: enable-default-cni-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:39:03.902812-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:39:03.902815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:39:03.902817-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:39:03.902819-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902822-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:39:03.902832-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:39:03.902834-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.90284-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:39:03.902843-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:39:03.902845-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902847-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902849-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:39:03.902851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:39:03.902853-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902855-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902857-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:39:03.902859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:39:03.902862-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:39:03.902864-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902866-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902869-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:39:03.902871-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:39:03.902874-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:39:03.902876-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:39:03.902878-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:39:03.90288-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:39:03.902882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:39:03.902885-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:39:03.90289-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 10.244.0.4\tnetcat-7458db8b8-n2ncl\n"} +{"Time":"2023-05-31T12:39:03.902893-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.9029-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:39:03.902903-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:39:03.902905-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:39:03.902907-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:39:03.902909-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902911-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902913-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:39:03.902915-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:39:03.902917-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.90292-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:39:03.902922-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:39:03.902924-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:39:03.902929-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.902934-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:39:03.902936-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:39:03.902938-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:39:03.90294-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:39:03.902942-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.902944-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:39:03.902946-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:39:03.902948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.902951-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:39:03.902953-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:39:03.902955-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:39:03.902957-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:39:03.902959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.902961-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:39:03.902964-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902966-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902968-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:39:03.90297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:39:03.902973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:39:03.902975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:39:03.902977-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:39:03.902979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:39:03.902981-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:39:03.902983-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.67.2\tenable-default-cni-996000\r\n"} +{"Time":"2023-05-31T12:39:03.902985-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:39:03.902988-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.67.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:39:03.90299-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902992-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.902996-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:39:03.902999-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:39:03.903003-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:39:03.903006-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.90301-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903014-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:39:03.903018-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:39:03.903035-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node/enable-default-cni-996000 Ready control-plane 78s v1.27.2 192.168.67.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:39:03.903043-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903048-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:39:03.903052-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 77s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903056-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default service/netcat ClusterIP 10.104.230.107 \u003cnone\u003e 8080/TCP 20s app=netcat\n"} +{"Time":"2023-05-31T12:39:03.903061-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 75s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:39:03.903064-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903068-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:39:03.903072-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default endpoints/kubernetes 192.168.67.2:8443 77s\n"} +{"Time":"2023-05-31T12:39:03.903075-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default endpoints/netcat 10.244.0.4:8080 20s\n"} +{"Time":"2023-05-31T12:39:03.903079-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 61s\n"} +{"Time":"2023-05-31T12:39:03.903085-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 64s\n"} +{"Time":"2023-05-31T12:39:03.903089-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903093-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:39:03.903098-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 75s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.903102-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903105-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:39:03.903109-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default deployment.apps/netcat 1/1 1 1 20s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:39:03.903113-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system deployment.apps/coredns 1/1 1 1 75s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:39:03.903117-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.90312-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:39:03.903124-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default pod/netcat-7458db8b8-n2ncl 1/1 Running 0 20s 10.244.0.4 enable-default-cni-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903128-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/coredns-5d78c9869d-n6lj8 1/1 Running 0 63s 10.244.0.2 enable-default-cni-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903133-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/etcd-enable-default-cni-996000 1/1 Running 0 75s 192.168.67.2 enable-default-cni-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903137-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/kube-apiserver-enable-default-cni-996000 1/1 Running 0 75s 192.168.67.2 enable-default-cni-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903141-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/kube-controller-manager-enable-default-cni-996000 1/1 Running 0 75s 192.168.67.2 enable-default-cni-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903143-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/kube-proxy-k9qcn 1/1 Running 0 63s 192.168.67.2 enable-default-cni-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903146-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/kube-scheduler-enable-default-cni-996000 1/1 Running 0 75s 192.168.67.2 enable-default-cni-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903149-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/storage-provisioner 1/1 Running 0 61s 192.168.67.2 enable-default-cni-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903152-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903156-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903159-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:39:03.903163-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:39:03.903169-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 5f471f76682cd 21 seconds ago Ready netcat-7458db8b8-n2ncl default 0 (default)\r\n"} +{"Time":"2023-05-31T12:39:03.903176-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 54db07dbab086 About a minute ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:39:03.903183-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 81cc41aff077a About a minute ago Ready kube-proxy-k9qcn kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:39:03.903192-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 5b82e0dad275e About a minute ago Ready coredns-5d78c9869d-n6lj8 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:39:03.903196-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cb3104bb5252a About a minute ago Ready kube-scheduler-enable-default-cni-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:39:03.903204-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 6de64ff2ff012 About a minute ago Ready kube-controller-manager-enable-default-cni-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:39:03.903209-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" b5d33a4b30b18 About a minute ago Ready kube-apiserver-enable-default-cni-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:39:03.903214-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 688355dfec204 About a minute ago Ready etcd-enable-default-cni-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:39:03.903221-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903236-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903239-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:39:03.903243-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:39:03.903246-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ef8cda3c6e786 registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 15 seconds ago Running dnsutils 0 5f471f76682cd netcat-7458db8b8-n2ncl\r\n"} +{"Time":"2023-05-31T12:39:03.903249-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 2665f8739c5e0 6e38f40d628db About a minute ago Running storage-provisioner 0 54db07dbab086 storage-provisioner\r\n"} +{"Time":"2023-05-31T12:39:03.903251-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7668604a097fe b8aa50768fd67 About a minute ago Running kube-proxy 0 81cc41aff077a kube-proxy-k9qcn\r\n"} +{"Time":"2023-05-31T12:39:03.903254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 50315cc401d71 ead0a4a53df89 About a minute ago Running coredns 0 5b82e0dad275e coredns-5d78c9869d-n6lj8\r\n"} +{"Time":"2023-05-31T12:39:03.903257-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 3625e0c5b97f2 c5b13e4f7806d About a minute ago Running kube-apiserver 0 b5d33a4b30b18 kube-apiserver-enable-default-cni-996000\r\n"} +{"Time":"2023-05-31T12:39:03.90326-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" f48f6405056cf ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 6de64ff2ff012 kube-controller-manager-enable-default-cni-996000\r\n"} +{"Time":"2023-05-31T12:39:03.903262-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" f5598887fc2ec 89e70da428d29 About a minute ago Running kube-scheduler 0 cb3104bb5252a kube-scheduler-enable-default-cni-996000\r\n"} +{"Time":"2023-05-31T12:39:03.903265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ac2062e9ea4c3 86b6af7dd652c About a minute ago Running etcd 0 688355dfec204 etcd-enable-default-cni-996000\r\n"} +{"Time":"2023-05-31T12:39:03.903268-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.90327-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903272-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:39:03.903274-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:39:03.903278-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:39:03.90328-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CreationTimestamp: Wed, 31 May 2023 12:38:29 -0700\n"} +{"Time":"2023-05-31T12:39:03.903282-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:39:03.903284-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:39:03.903287-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:39:03.903289-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:39:03.903291-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:39:03.903293-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:39:03.903295-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:39:03.903297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:39:03.903299-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:39:03.903302-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T12:39:03.903304-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:39:03.903306-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:39:03.903308-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.90331-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903313-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T12:39:03.903315-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:39:03.903317-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -c\n"} +{"Time":"2023-05-31T12:39:03.90332-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:39:03.903323-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903325-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903327-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.90333-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:39:03.903332-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:39:03.903335-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:39:03.903337-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:39:03.903339-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:39:03.903341-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903343-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:39:03.903346-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T12:39:03.903348-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:39:03.90335-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:39:03.903353-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal ScalingReplicaSet 21s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:39:03.903357-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.90336-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903364-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:39:03.903367-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: netcat-7458db8b8-n2ncl\n"} +{"Time":"2023-05-31T12:39:03.903369-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:39:03.903371-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:39:03.903373-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:39:03.903375-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node: enable-default-cni-996000/192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.903378-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Start Time: Wed, 31 May 2023 12:38:29 -0700\n"} +{"Time":"2023-05-31T12:39:03.90338-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:39:03.903382-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:39:03.903384-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:39:03.903389-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T12:39:03.903391-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IPs:\n"} +{"Time":"2023-05-31T12:39:03.903393-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T12:39:03.903395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:39:03.903397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T12:39:03.903399-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:39:03.903401-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Container ID: docker://ef8cda3c6e7869fabca17738fc818af9ff3253c6273b0c2ec3718d94a7db6795\n"} +{"Time":"2023-05-31T12:39:03.903404-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:39:03.903406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:39:03.903408-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.90341-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903412-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T12:39:03.903415-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:39:03.903417-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -c\n"} +{"Time":"2023-05-31T12:39:03.903419-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:39:03.903421-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" State: Running\n"} +{"Time":"2023-05-31T12:39:03.903424-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Started: Wed, 31 May 2023 12:38:35 -0700\n"} +{"Time":"2023-05-31T12:39:03.903426-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:39:03.903428-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:39:03.903431-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:39:03.903436-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-28jkm (ro)\n"} +{"Time":"2023-05-31T12:39:03.903439-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:39:03.903441-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status\n"} +{"Time":"2023-05-31T12:39:03.903443-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:39:03.903445-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready True \n"} +{"Time":"2023-05-31T12:39:03.903447-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:39:03.903449-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:39:03.903451-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:39:03.903453-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-api-access-28jkm:\n"} +{"Time":"2023-05-31T12:39:03.903456-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:39:03.903458-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:39:03.90346-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:39:03.903462-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:39:03.903465-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:39:03.903468-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:39:03.903472-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:39:03.903481-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:39:03.903488-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T12:39:03.903493-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:39:03.903497-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:39:03.903505-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Scheduled 21s default-scheduler Successfully assigned default/netcat-7458db8b8-n2ncl to enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.90351-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulling 21s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:39:03.903515-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulled 15s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.317338409s (5.317374589s including waiting)\n"} +{"Time":"2023-05-31T12:39:03.903523-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Created 15s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:39:03.903528-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Started 15s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:39:03.903535-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.90354-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903544-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:39:03.903547-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903549-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903551-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:39:03.903554-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:39:03.903556-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.903558-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CreationTimestamp: Wed, 31 May 2023 12:37:34 -0700\n"} +{"Time":"2023-05-31T12:39:03.90356-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:39:03.903562-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:39:03.903565-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:39:03.903567-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:39:03.903569-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:39:03.903571-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:39:03.903575-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:39:03.903577-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:39:03.903579-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:39:03.903582-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:39:03.903584-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T12:39:03.903586-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" coredns:\n"} +{"Time":"2023-05-31T12:39:03.903588-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:39:03.90359-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:39:03.903595-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:39:03.903597-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Args:\n"} +{"Time":"2023-05-31T12:39:03.903599-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -conf\n"} +{"Time":"2023-05-31T12:39:03.903602-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:39:03.903604-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Limits:\n"} +{"Time":"2023-05-31T12:39:03.903606-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:39:03.903608-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requests:\n"} +{"Time":"2023-05-31T12:39:03.90361-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:39:03.903612-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:39:03.903614-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:39:03.903618-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:39:03.903621-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903626-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:39:03.903628-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:39:03.90363-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:39:03.903633-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:39:03.903635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:39:03.903637-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:39:03.903646-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:39:03.903658-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:39:03.903663-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:39:03.903667-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:39:03.903671-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:39:03.903675-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:39:03.903678-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:39:03.903682-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903686-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:39:03.903691-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T12:39:03.903695-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:39:03.903699-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:39:03.903702-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal ScalingReplicaSet 65s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:39:03.903708-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal ScalingReplicaSet 65s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:39:03.903712-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903715-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.903732-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:39:03.90374-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: coredns-5d78c9869d-n6lj8\n"} +{"Time":"2023-05-31T12:39:03.903743-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.903747-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:39:03.903771-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:39:03.90378-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:39:03.903785-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node: enable-default-cni-996000/192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.903789-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Start Time: Wed, 31 May 2023 12:37:46 -0700\n"} +{"Time":"2023-05-31T12:39:03.903792-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:39:03.903794-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:39:03.903796-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.9038-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:39:03.903803-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:39:03.903806-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IPs:\n"} +{"Time":"2023-05-31T12:39:03.903809-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:39:03.903811-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:39:03.903813-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T12:39:03.903815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" coredns:\n"} +{"Time":"2023-05-31T12:39:03.903817-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Container ID: docker://50315cc401d714bf4954a72492b78dfafaf33c1a3475e68c2daf04018a575eba\n"} +{"Time":"2023-05-31T12:39:03.90382-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:39:03.903824-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:39:03.903827-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:39:03.903831-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:39:03.903834-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Args:\n"} +{"Time":"2023-05-31T12:39:03.903838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -conf\n"} +{"Time":"2023-05-31T12:39:03.903841-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:39:03.903859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" State: Running\n"} +{"Time":"2023-05-31T12:39:03.903867-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Started: Wed, 31 May 2023 12:37:48 -0700\n"} +{"Time":"2023-05-31T12:39:03.903877-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:39:03.903886-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:39:03.903893-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Limits:\n"} +{"Time":"2023-05-31T12:39:03.903896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:39:03.9039-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requests:\n"} +{"Time":"2023-05-31T12:39:03.903904-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:39:03.90391-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:39:03.903918-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:39:03.903927-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:39:03.903933-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.903937-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:39:03.903941-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:39:03.903945-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-24rp8 (ro)\n"} +{"Time":"2023-05-31T12:39:03.903952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:39:03.903962-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status\n"} +{"Time":"2023-05-31T12:39:03.903966-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:39:03.903968-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready True \n"} +{"Time":"2023-05-31T12:39:03.90397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:39:03.903973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:39:03.903975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:39:03.903977-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:39:03.903979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:39:03.903982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:39:03.903984-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:39:03.903995-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-api-access-24rp8:\n"} +{"Time":"2023-05-31T12:39:03.904001-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:39:03.904005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:39:03.904008-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:39:03.90401-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:39:03.904013-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:39:03.904015-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:39:03.904017-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:39:03.904019-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:39:03.904022-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:39:03.904024-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:39:03.904028-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:39:03.90403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T12:39:03.904032-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:39:03.904036-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:39:03.904039-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Scheduled 65s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-n6lj8 to enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.904043-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulled 64s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:39:03.904047-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Created 64s kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:39:03.904051-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Started 63s kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:39:03.904055-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Warning Unhealthy 34s (x6 over 63s) kubelet Readiness probe failed: HTTP probe failed with statuscode: 503\n"} +{"Time":"2023-05-31T12:39:03.904058-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.904062-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.904065-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:39:03.904069-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T12:39:03.904073-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.904076-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.90408-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T12:39:03.904084-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.904087-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.904091-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T12:39:03.904096-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.9041-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.904103-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.904107-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.904109-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T12:39:03.904111-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [WARNING] plugin/kubernetes: starting server with unsynced Kubernetes API\n"} +{"Time":"2023-05-31T12:39:03.904115-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" .:53\n"} +{"Time":"2023-05-31T12:39:03.904119-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/reload: Running configuration SHA512 = 591cf328cccc12bc490481273e738df59329c62c0b729d94e8b61db9961c2fa5f046dd37f1cf888b953814040d180f52594972691cd6ff41be96639138a43908\n"} +{"Time":"2023-05-31T12:39:03.904122-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:39:03.904126-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:39:03.904129-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T12:39:03.904132-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T12:39:03.904135-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T12:39:03.904139-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [WARNING] plugin/kubernetes: Kubernetes API connection failure: Get \"https://10.96.0.1:443/version\": dial tcp 10.96.0.1:443: i/o timeout\n"} +{"Time":"2023-05-31T12:39:03.904143-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] Reloading\n"} +{"Time":"2023-05-31T12:39:03.904147-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/reload: Running configuration SHA512 = f869070685748660180df1b7a47d58cdafcf2f368266578c062d1151dc2c900964aecc5975e8882e6de6fdfb6460463e30ebfaad2ec8f0c3c6436f80225b3b5b\n"} +{"Time":"2023-05-31T12:39:03.90415-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] Reloading complete\n"} +{"Time":"2023-05-31T12:39:03.904154-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:49663 - 34462 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000202452s\n"} +{"Time":"2023-05-31T12:39:03.904158-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:50573 - 2422 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000082752s\n"} +{"Time":"2023-05-31T12:39:03.904162-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:44407 - 49919 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000120521s\n"} +{"Time":"2023-05-31T12:39:03.904165-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:36655 - 27478 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000309634s\n"} +{"Time":"2023-05-31T12:39:03.904169-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:36655 - 27287 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000414298s\n"} +{"Time":"2023-05-31T12:39:03.904173-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:46786 - 22076 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000193692s\n"} +{"Time":"2023-05-31T12:39:03.904177-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:54695 - 49836 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000125746s\n"} +{"Time":"2023-05-31T12:39:03.90418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:36387 - 32835 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000046402s\n"} +{"Time":"2023-05-31T12:39:03.904184-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.904187-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.904191-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:39:03.904194-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-apiserver-enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.904197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.904224-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:39:03.90423-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:39:03.904238-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node: enable-default-cni-996000/192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.904243-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Start Time: Wed, 31 May 2023 12:37:34 -0700\n"} +{"Time":"2023-05-31T12:39:03.904247-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:39:03.904252-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:39:03.904256-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.67.2:8443\n"} +{"Time":"2023-05-31T12:39:03.904259-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/config.hash: 83225ef9dc50cce95648517d5282a29c\n"} +{"Time":"2023-05-31T12:39:03.904387-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/config.mirror: 83225ef9dc50cce95648517d5282a29c\n"} +{"Time":"2023-05-31T12:39:03.904395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/config.seen: 2023-05-31T19:37:34.313882913Z\n"} +{"Time":"2023-05-31T12:39:03.904403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:39:03.904407-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:39:03.90441-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.904414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IPs:\n"} +{"Time":"2023-05-31T12:39:03.904419-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.904423-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Controlled By: Node/enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.904426-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T12:39:03.90443-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:39:03.904434-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Container ID: docker://3625e0c5b97f2deb857189cf5c6c9006971ce1ecb5a49a72bcdb878d8522039e\n"} +{"Time":"2023-05-31T12:39:03.904453-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:39:03.904458-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:39:03.904462-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.904466-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.90447-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T12:39:03.904473-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:39:03.904477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --advertise-address=192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.90448-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:39:03.904496-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:39:03.9045-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:39:03.904514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:39:03.90463-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:39:03.904637-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:39:03.904641-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:39:03.904645-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:39:03.904649-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:39:03.904653-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:39:03.904665-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:39:03.90467-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:39:03.904674-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:39:03.904677-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:39:03.904681-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:39:03.904684-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:39:03.904688-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:39:03.904692-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:39:03.904695-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:39:03.904699-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:39:03.904703-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:39:03.904707-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:39:03.904822-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:39:03.904838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:39:03.904843-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:39:03.904847-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:39:03.904851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" State: Running\n"} +{"Time":"2023-05-31T12:39:03.904854-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Started: Wed, 31 May 2023 12:37:28 -0700\n"} +{"Time":"2023-05-31T12:39:03.90486-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:39:03.904863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:39:03.904866-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requests:\n"} +{"Time":"2023-05-31T12:39:03.90487-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:39:03.904873-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Liveness: http-get https://192.168.67.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:39:03.904877-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Readiness: http-get https://192.168.67.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:39:03.904881-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Startup: http-get https://192.168.67.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:39:03.904885-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.904889-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:39:03.904892-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:39:03.904896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:39:03.904899-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:39:03.904903-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:39:03.904907-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:39:03.90491-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:39:03.904913-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status\n"} +{"Time":"2023-05-31T12:39:03.905166-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:39:03.905172-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready True \n"} +{"Time":"2023-05-31T12:39:03.905176-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:39:03.905179-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:39:03.905185-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:39:03.90519-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:39:03.905194-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.905197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:39:03.905201-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:39:03.905204-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:39:03.905209-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.905212-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:39:03.905216-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:39:03.905219-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:39:03.905223-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.905227-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:39:03.905231-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:39:03.905235-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:39:03.905239-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.905247-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:39:03.905253-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:39:03.905257-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:39:03.905264-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.905386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:39:03.905393-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:39:03.905396-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:39:03.9054-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.905404-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:39:03.905409-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T12:39:03.905416-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:39:03.905425-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:39:03.905442-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulled 83s kubelet Container image \"registry.k8s.io/kube-apiserver:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:39:03.90545-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Created 83s kubelet Created container kube-apiserver\n"} +{"Time":"2023-05-31T12:39:03.905455-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Started 83s kubelet Started container kube-apiserver\n"} +{"Time":"2023-05-31T12:39:03.905459-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.905462-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.905465-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:39:03.905469-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:29.113106 1 server.go:551] external host was not specified, using 192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.905473-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:29.114242 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:39:03.905477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:29.114374 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:39:03.905481-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:29.734139 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:39:03.905485-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:29.788277 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:39:03.905775-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:29.788312 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:39:03.905782-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:29.827509 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.905787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:29.827553 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.905791-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:29.828805 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:39:03.905795-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.097618 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.905797-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.097861 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:39:03.905823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.353640 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:39:03.905839-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.369506 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.905843-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.369549 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.905846-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.369555 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.905848-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.370906 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.905851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.370946 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.905853-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.384175 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.905856-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.384803 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.905858-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.384838 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906264-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.384844 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906272-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.387403 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906277-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.387440 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906283-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.389370 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906289-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.389406 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906293-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.389411 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906295-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.391174 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906299-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.391210 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906303-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.392443 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906306-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.393016 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906311-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.396096 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906314-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.396161 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906318-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.396166 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906323-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.397780 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906327-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.397917 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906331-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.397976 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906776-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.402154 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906782-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.402248 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906785-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.405612 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906788-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.405678 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906792-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.405684 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906796-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.407788 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.9068-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.407832 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906804-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.407865 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906809-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.411858 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906813-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.411923 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906816-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.411958 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.415237 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906821-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.416441 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.906823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.416480 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906825-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.416486 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.906828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.421393 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.907183-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.421429 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.907194-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.421434 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.907201-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.423623 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.907205-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.423659 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.90721-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.423664 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.907215-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.425498 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.907219-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.425532 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.907223-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.434735 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:39:03.907227-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:30.434794 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:39:03.907231-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.945373 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:39:03.907236-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.945406 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:39:03.90724-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.945591 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:39:03.907245-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.946076 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:39:03.907249-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.946160 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:39:03.907253-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.946219 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:39:03.907531-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.946280 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:39:03.907539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.946300 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:39:03.907544-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.946340 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:39:03.907547-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.946344 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:39:03.907551-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.947061 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:39:03.907556-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.947095 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:39:03.90756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.947436 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:39:03.907564-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.947556 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:39:03.907568-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948513 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:39:03.907573-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948604 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:39:03.907577-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948610 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:39:03.90758-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948620 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:39:03.907584-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948634 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:39:03.907591-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948679 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:39:03.907595-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948793 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:39:03.907599-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948824 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:39:03.907603-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.948899 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:39:03.907811-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.949239 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:39:03.907819-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.949315 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:39:03.907825-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.949324 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:39:03.907828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.949765 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:39:03.907831-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.951448 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:39:03.907833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.951495 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:39:03.907836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.951506 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:39:03.907838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.951531 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:39:03.90784-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.984734 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:39:03.907843-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.984970 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:39:03.907847-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.985074 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:39:03.90785-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:30.985113 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:39:03.907854-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.034590 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:39:03.907857-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.046613 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:39:03.907861-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.047206 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:39:03.907865-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.048654 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:39:03.908071-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.048841 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:39:03.908078-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.049340 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:39:03.908082-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.049447 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:39:03.908086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.049479 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:39:03.908088-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.050160 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:39:03.90809-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.082441 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:39:03.908093-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" E0531 19:37:31.087116 1 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"namespaces \\\"kube-system\\\" not found\" interval=\"200ms\"\n"} +{"Time":"2023-05-31T12:39:03.908096-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.291108 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.908098-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.710054 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:39:03.908102-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.954849 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:39:03.908106-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.959750 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:39:03.908112-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:31.959797 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:39:03.908116-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:32.442693 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.90812-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:32.499233 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.908124-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:32.614272 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:39:03.908128-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:37:32.623458 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.67.2]\n"} +{"Time":"2023-05-31T12:39:03.908351-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:32.624403 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:39:03.908356-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:32.629065 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.908369-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:33.015865 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:39:03.908372-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:34.204918 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:39:03.908375-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:34.214102 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:39:03.908378-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:34.222858 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:39:03.90838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:46.470149 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:39:03.908383-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:46.671215 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:39:03.908387-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:38:29.448603 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.104.230.107]\n"} +{"Time":"2023-05-31T12:39:03.908391-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.908394-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.908398-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:39:03.908401-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:39:03.908405-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.908408-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:39:03.908411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:39:03.908413-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:39:03.908415-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.908418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T12:39:03.90842-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.908628-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:39:03.908635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:39:03.908639-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:39:03.908643-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.908647-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:39:03.90865-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:39:03.908654-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.908657-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.908661-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.908664-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:39:03.908668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:39:03.908672-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:39:03.908676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:39:03.908678-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [\r\n"} +{"Time":"2023-05-31T12:39:03.908695-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.9087-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:39:03.908705-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T12:39:03.908709-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.908712-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T12:39:03.908716-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T12:39:03.908719-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.908723-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T12:39:03.908727-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.90873-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:39:03.908734-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:39:03.908891-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:39:03.908899-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.908905-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T12:39:03.908909-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.908913-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:39:03.908917-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T12:39:03.908921-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.908925-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:39:03.908929-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.908934-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T12:39:03.90895-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.908955-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/cni/net.d/100-crio-bridge.conf.mk_disabled\r\n"} +{"Time":"2023-05-31T12:39:03.908957-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.90896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:39:03.908983-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:39:03.908987-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:39:03.908989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:39:03.908992-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.908994-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.908996-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.908998-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:39:03.909002-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:39:03.909004-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:39:03.909007-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" { \"dst\": \"0.0.0.0/0\" },\r\n"} +{"Time":"2023-05-31T12:39:03.909009-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" { \"dst\": \"1100:200::1/24\" }\r\n"} +{"Time":"2023-05-31T12:39:03.909215-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ],\r\n"} +{"Time":"2023-05-31T12:39:03.909221-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:39:03.909225-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [{ \"subnet\": \"10.85.0.0/16\" }],\r\n"} +{"Time":"2023-05-31T12:39:03.909229-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [{ \"subnet\": \"1100:200::/24\" }]\r\n"} +{"Time":"2023-05-31T12:39:03.909233-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T12:39:03.909236-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.909239-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.909243-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/cni/net.d/1-k8s.conflist\r\n"} +{"Time":"2023-05-31T12:39:03.909245-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.909247-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.909249-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:39:03.909252-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"name\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:39:03.909256-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:39:03.909259-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.909275-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:39:03.909284-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"bridge\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:39:03.909288-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"addIf\": \"true\",\r\n"} +{"Time":"2023-05-31T12:39:03.909292-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"isDefaultGateway\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.909297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"forceAddress\": false,\r\n"} +{"Time":"2023-05-31T12:39:03.909303-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.909306-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:39:03.90931-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:39:03.909314-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:39:03.909318-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"subnet\": \"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T12:39:03.909323-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.90949-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T12:39:03.909496-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.9095-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:39:03.909504-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:39:03.909507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:39:03.909511-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.909514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.909516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T12:39:03.909518-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.90952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.909522-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.909525-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:39:03.909527-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:39:03.909532-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:39:03.909535-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:39:03.909539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:39:03.909552-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 2: tunl0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:39:03.909558-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:39:03.909561-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:39:03.909563-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/tunnel6 :: brd :: permaddr 2b8:62a3:5609::\r\n"} +{"Time":"2023-05-31T12:39:03.909565-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:39:03.909568-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether 02:42:89:26:f4:37 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:39:03.90957-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:39:03.90998-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:39:03.909986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 5: bridge: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:39:03.909989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether 12:1c:20:77:b8:92 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:39:03.909991-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" inet 10.244.0.1/16 brd 10.244.255.255 scope global bridge\r\n"} +{"Time":"2023-05-31T12:39:03.909994-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:39:03.909996-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 6: veth72b4ec7d@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T12:39:03.909999-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether 92:30:28:e9:f8:81 brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:39:03.910002-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 8: veth3ddf67e5@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T12:39:03.910005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether 9a:3f:31:34:57:50 brd ff:ff:ff:ff:ff:ff link-netnsid 2\r\n"} +{"Time":"2023-05-31T12:39:03.910007-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 311: eth0@if312: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:39:03.91001-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether 02:42:c0:a8:43:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:39:03.910012-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" inet 192.168.67.2/24 brd 192.168.67.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:39:03.910014-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:39:03.910016-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.910019-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.910021-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:39:03.910023-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default via 192.168.67.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:39:03.910026-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 10.244.0.0/16 dev bridge proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T12:39:03.910028-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:39:03.91003-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.67.0/24 dev eth0 proto kernel scope link src 192.168.67.2 \r\n"} +{"Time":"2023-05-31T12:39:03.910339-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.910347-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.910353-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:39:03.910355-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:38:52 2023\r\n"} +{"Time":"2023-05-31T12:39:03.910358-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:39:03.910361-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :PREROUTING ACCEPT [21844:56453797]\r\n"} +{"Time":"2023-05-31T12:39:03.910363-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :INPUT ACCEPT [21802:56450579]\r\n"} +{"Time":"2023-05-31T12:39:03.910366-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :FORWARD ACCEPT [42:3218]\r\n"} +{"Time":"2023-05-31T12:39:03.910368-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :OUTPUT ACCEPT [20474:6564559]\r\n"} +{"Time":"2023-05-31T12:39:03.91037-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :POSTROUTING ACCEPT [20516:6567777]\r\n"} +{"Time":"2023-05-31T12:39:03.910374-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910394-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910399-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:39:03.910403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Completed on Wed May 31 19:38:52 2023\r\n"} +{"Time":"2023-05-31T12:39:03.910407-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:38:52 2023\r\n"} +{"Time":"2023-05-31T12:39:03.910411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:39:03.910414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :INPUT ACCEPT [5987:1319372]\r\n"} +{"Time":"2023-05-31T12:39:03.910418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :FORWARD ACCEPT [16:927]\r\n"} +{"Time":"2023-05-31T12:39:03.910422-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :OUTPUT ACCEPT [5955:1615254]\r\n"} +{"Time":"2023-05-31T12:39:03.910426-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910429-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910436-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.91071-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910721-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.91073-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910735-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910739-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910743-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.91075-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910754-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.910758-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:39:03.910762-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:39:03.910769-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:39:03.910787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:39:03.910796-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:39:03.9108-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:39:03.910803-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:39:03.910805-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:39:03.910808-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:39:03.910823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:39:03.910826-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:39:03.910828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:39:03.91083-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:39:03.911008-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:39:03.911016-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:39:03.911021-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:39:03.911025-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:39:03.911029-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:39:03.911038-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:39:03.911041-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:39:03.911045-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:39:03.911048-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:39:03.911052-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:39:03.911056-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:39:03.911059-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:39:03.911063-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:39:03.911067-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:39:03.911071-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Completed on Wed May 31 19:38:52 2023\r\n"} +{"Time":"2023-05-31T12:39:03.911074-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:38:52 2023\r\n"} +{"Time":"2023-05-31T12:39:03.911078-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:39:03.911082-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:39:03.911085-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:39:03.911089-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :OUTPUT ACCEPT [45:2700]\r\n"} +{"Time":"2023-05-31T12:39:03.911322-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :POSTROUTING ACCEPT [45:2700]\r\n"} +{"Time":"2023-05-31T12:39:03.911327-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :CNI-06783a1eb2c0744b90e4c41d - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911331-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :CNI-ea8c3386d9353c06cc63c700 - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911335-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911341-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911347-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911353-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911361-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911365-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.91137-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911374-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911377-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-4VOVYHSEGBUSB3N2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.91138-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911383-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911387-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-XPTUC4FRAFEFDBGF - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.91139-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911394-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911401-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911404-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911407-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:39:03.911414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:39:03.911418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:39:03.911525-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:39:03.911531-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:39:03.911534-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:39:03.911536-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:39:03.911539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:39:03.911542-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:39:03.911544-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:39:03.911546-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A POSTROUTING -s 10.244.0.2/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6\\\"\" -j CNI-ea8c3386d9353c06cc63c700\r\n"} +{"Time":"2023-05-31T12:39:03.911549-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A POSTROUTING -s 10.244.0.4/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f\\\"\" -j CNI-06783a1eb2c0744b90e4c41d\r\n"} +{"Time":"2023-05-31T12:39:03.911552-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A CNI-06783a1eb2c0744b90e4c41d -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:39:03.911555-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A CNI-06783a1eb2c0744b90e4c41d ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:39:03.911558-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A CNI-ea8c3386d9353c06cc63c700 -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:39:03.911562-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A CNI-ea8c3386d9353c06cc63c700 ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:39:03.911565-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:39:03.911567-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:46111\r\n"} +{"Time":"2023-05-31T12:39:03.91157-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:49133\r\n"} +{"Time":"2023-05-31T12:39:03.91175-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 46111 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:39:03.911757-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 49133 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:39:03.911761-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:39:03.911765-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:39:03.911769-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:39:03.911773-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:39:03.911778-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-4VOVYHSEGBUSB3N2 -s 192.168.67.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.911782-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-4VOVYHSEGBUSB3N2 -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.67.2:8443\r\n"} +{"Time":"2023-05-31T12:39:03.911786-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.91179-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:39:03.911794-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.911798-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:39:03.911802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -s 10.244.0.4/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.911806-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T12:39:03.911811-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.911816-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:39:03.91195-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:39:03.911956-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.104.230.107/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:39:03.911959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:39:03.911962-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:39:03.911964-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:39:03.911967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:39:03.911969-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.911973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T12:39:03.911976-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.911978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T12:39:03.911981-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.911985-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.67.2:8443\" -j KUBE-SEP-4VOVYHSEGBUSB3N2\r\n"} +{"Time":"2023-05-31T12:39:03.911988-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.91199-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T12:39:03.91214-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.104.230.107/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:39:03.912148-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.4:8080\" -j KUBE-SEP-XPTUC4FRAFEFDBGF\r\n"} +{"Time":"2023-05-31T12:39:03.912163-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:39:03.912167-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Completed on Wed May 31 19:38:52 2023\r\n"} +{"Time":"2023-05-31T12:39:03.912169-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.912172-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.912174-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:39:03.912178-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:39:03.91218-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912183-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 55 3509 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:39:03.912186-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 3 254 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:39:03.912188-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 44 2640 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:39:03.91219-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912193-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:39:03.912195-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.9122-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain OUTPUT (policy ACCEPT 46 packets, 2760 bytes)\r\n"} +{"Time":"2023-05-31T12:39:03.912202-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912204-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 248 17658 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:39:03.912387-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 50 4382 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:39:03.912394-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 130 7800 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:39:03.912398-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912402-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain POSTROUTING (policy ACCEPT 46 packets, 2760 bytes)\r\n"} +{"Time":"2023-05-31T12:39:03.912406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.91241-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 258 18393 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:39:03.912414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:39:03.912418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:39:03.912422-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 CNI-ea8c3386d9353c06cc63c700 all -- * * 10.244.0.2 0.0.0.0/0 /* name: \"bridge\" id: \"5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6\" */\r\n"} +{"Time":"2023-05-31T12:39:03.912426-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 9 675 CNI-06783a1eb2c0744b90e4c41d all -- * * 10.244.0.4 0.0.0.0/0 /* name: \"bridge\" id: \"5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f\" */\r\n"} +{"Time":"2023-05-31T12:39:03.912431-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912434-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain CNI-06783a1eb2c0744b90e4c41d (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.912438-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912442-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 9 675 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f\" */\r\n"} +{"Time":"2023-05-31T12:39:03.912447-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f\" */\r\n"} +{"Time":"2023-05-31T12:39:03.912451-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912455-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain CNI-ea8c3386d9353c06cc63c700 (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.912632-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.91265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6\" */\r\n"} +{"Time":"2023-05-31T12:39:03.912657-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6\" */\r\n"} +{"Time":"2023-05-31T12:39:03.912661-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912665-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:39:03.912669-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912673-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:39:03.912676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.91268-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:39:03.912684-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912688-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:46111\r\n"} +{"Time":"2023-05-31T12:39:03.912692-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 53 4636 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:49133\r\n"} +{"Time":"2023-05-31T12:39:03.912696-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912701-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.912704-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912708-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:46111 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:39:03.912712-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:49133 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:39:03.912716-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912913-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:39:03.91292-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912925-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.91293-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:39:03.912934-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912938-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:39:03.912945-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912949-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.912952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912956-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.91296-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.912969-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.912973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 55 3435 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:39:03.912977-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:39:03.912981-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:39:03.912989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.912998-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:39:03.913008-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.913016-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.913021-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-4VOVYHSEGBUSB3N2 (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.913314-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.913323-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-MARK-MASQ all -- * * 192.168.67.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:39:03.913328-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 2 120 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.67.2:8443\r\n"} +{"Time":"2023-05-31T12:39:03.913332-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.913336-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.91334-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.913344-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:39:03.913348-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:39:03.913352-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.913378-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.913388-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.913391-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:39:03.913395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:39:03.913398-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.913401-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-XPTUC4FRAFEFDBGF (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.913404-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.913409-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.4 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:39:03.913417-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T12:39:03.913933-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.913939-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.913942-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.913945-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:39:03.913948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:39:03.91395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.913952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:39:03.913956-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.913959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:39:03.913961-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.104.230.107 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:39:03.913964-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:39:03.913966-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:39:03.913969-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:39:03.913972-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 81 4860 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:39:03.913975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.913978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.913982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.914722-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:39:03.914728-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:39:03.914731-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.914733-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.914736-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.91474-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:39:03.914743-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T12:39:03.914746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.914748-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.91475-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.914753-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:39:03.914756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 2 120 KUBE-SEP-4VOVYHSEGBUSB3N2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.67.2:8443 */\r\n"} +{"Time":"2023-05-31T12:39:03.914758-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.914761-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.914763-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.914766-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:39:03.914769-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:39:03.915363-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.915373-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:39:03.915379-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:39:03.915383-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.104.230.107 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:39:03.915388-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-SEP-XPTUC4FRAFEFDBGF all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.4:8080 */\r\n"} +{"Time":"2023-05-31T12:39:03.915392-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.915395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.915399-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:39:03.915403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.915406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.91541-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:39:03.915413-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.915415-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:39:03.915418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:39:03.915421-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:39:03.915424-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:39:03.915428-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:39:03.915431-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:39:03.915435-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:39:03.915439-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:39:03.915443-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.915446-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.91575-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T12:39:03.915758-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:39:03.915762-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:39:03.915767-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.915771-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.915775-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T12:39:03.915788-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.915799-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:39:03.915806-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:39:03.91581-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment:\n"} +{"Time":"2023-05-31T12:39:03.915815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:39:03.915818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:39:03.915822-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:39:03.915826-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:39:03.91583-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:39:03.915834-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:39:03.915838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:39:03.91584-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:39:03.915844-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.915847-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:39:03.915851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:39:03.915855-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.915859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:39:03.915862-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:39:03.916206-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:39:03.916229-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.916237-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:39:03.916241-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:39:03.916262-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:39:03.916268-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T12:39:03.916272-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:39:03.916292-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:39:03.916296-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal SuccessfulCreate 67s daemonset-controller Created pod: kube-proxy-k9qcn\n"} +{"Time":"2023-05-31T12:39:03.9163-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.916303-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.916307-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:39:03.916311-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-proxy-k9qcn\n"} +{"Time":"2023-05-31T12:39:03.916315-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.916319-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:39:03.916323-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:39:03.916326-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.91633-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node: enable-default-cni-996000/192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.916334-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Start Time: Wed, 31 May 2023 12:37:46 -0700\n"} +{"Time":"2023-05-31T12:39:03.916348-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:39:03.916357-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.916366-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:39:03.916372-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.916737-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:39:03.916745-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.916749-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IPs:\n"} +{"Time":"2023-05-31T12:39:03.916753-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.916756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.91676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T12:39:03.916765-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:39:03.916769-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Container ID: docker://7668604a097fefb6b97223948daef1cde5acf171c86282791c75aad1dc3e24e1\n"} +{"Time":"2023-05-31T12:39:03.916773-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:39:03.916777-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:39:03.916781-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.916784-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:39:03.916788-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T12:39:03.916792-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.916795-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:39:03.916798-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:39:03.916801-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" State: Running\n"} +{"Time":"2023-05-31T12:39:03.916805-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Started: Wed, 31 May 2023 12:37:48 -0700\n"} +{"Time":"2023-05-31T12:39:03.916808-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:39:03.916812-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:39:03.916815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment:\n"} +{"Time":"2023-05-31T12:39:03.916818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:39:03.916821-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:39:03.916823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:39:03.917222-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:39:03.917229-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:39:03.917232-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-rslxd (ro)\n"} +{"Time":"2023-05-31T12:39:03.917235-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:39:03.917239-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status\n"} +{"Time":"2023-05-31T12:39:03.917241-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:39:03.917243-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready True \n"} +{"Time":"2023-05-31T12:39:03.917247-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:39:03.917249-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:39:03.917252-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:39:03.917254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:39:03.917256-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:39:03.917259-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.917262-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:39:03.917265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:39:03.917268-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.917272-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:39:03.917276-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:39:03.917279-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:39:03.917283-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:39:03.917287-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:39:03.91729-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:39:03.917294-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-api-access-rslxd:\n"} +{"Time":"2023-05-31T12:39:03.917298-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:39:03.917504-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:39:03.917511-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:39:03.917515-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:39:03.917519-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:39:03.917523-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:39:03.917527-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:39:03.91753-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:39:03.917534-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:39:03.917538-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:39:03.917543-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:39:03.917547-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:39:03.917551-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:39:03.917555-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:39:03.917558-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:39:03.917562-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T12:39:03.917566-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:39:03.91757-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:39:03.917575-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Scheduled 67s default-scheduler Successfully assigned kube-system/kube-proxy-k9qcn to enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.917581-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Warning FailedMount 67s kubelet MountVolume.SetUp failed for volume \"kube-api-access-rslxd\" : configmap \"kube-root-ca.crt\" not found\n"} +{"Time":"2023-05-31T12:39:03.91777-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulled 66s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:39:03.917778-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Created 66s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.917783-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Started 65s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.917786-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.91779-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.917794-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:39:03.9178-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.497726 1 node.go:141] Successfully retrieved node IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.917808-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.497810 1 server_others.go:110] \"Detected node IP\" address=\"192.168.67.2\"\n"} +{"Time":"2023-05-31T12:39:03.917814-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.497826 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:39:03.917821-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.518677 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:39:03.917826-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.518731 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:39:03.917831-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.518739 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:39:03.917836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.518752 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:39:03.917841-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.518774 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:39:03.917848-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.519517 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:39:03.917854-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.519660 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:39:03.917859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.520217 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:39:03.918238-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.520244 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:39:03.918246-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.520250 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:39:03.918251-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.520255 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:39:03.918256-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.520272 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:39:03.91826-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.520275 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:39:03.918266-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.621391 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:39:03.91827-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.621443 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:39:03.918274-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:37:48.621522 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:39:03.918278-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.918281-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.918285-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:39:03.918289-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:39:03.918294-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: loaded (\u001b]8;;file://enable-default-cni-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:39:03.918298-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:39:03.918302-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─\u001b]8;;file://enable-default-cni-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:39:03.918307-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:34 UTC; 1min 19s ago\r\n"} +{"Time":"2023-05-31T12:39:03.918311-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:39:03.918315-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Main PID: 2381 (kubelet)\r\n"} +{"Time":"2023-05-31T12:39:03.918525-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tasks: 14 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:39:03.918533-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Memory: 33.5M\r\n"} +{"Time":"2023-05-31T12:39:03.918537-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CPU: 2.620s\r\n"} +{"Time":"2023-05-31T12:39:03.918554-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:39:03.918575-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─2381 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=enable-default-cni-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.67.2\r\n"} +{"Time":"2023-05-31T12:39:03.918582-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.918588-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.664666 2381 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-2mmwt\\\" (UniqueName: \\\"kubernetes.io/projected/91e095b0-ea3f-4031-9216-4f184f88bfa6-kube-api-access-2mmwt\\\") on node \\\"enable-default-cni-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:39:03.918594-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.820252 2381 scope.go:115] \"RemoveContainer\" containerID=\"615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\"\r\n"} +{"Time":"2023-05-31T12:39:03.918599-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.836304 2381 scope.go:115] \"RemoveContainer\" containerID=\"615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\"\r\n"} +{"Time":"2023-05-31T12:39:03.918603-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: E0531 19:37:58.837311 2381 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = Unknown desc = Error: No such container: 615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\" containerID=\"615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\"\r\n"} +{"Time":"2023-05-31T12:39:03.91861-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.837365 2381 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:docker ID:615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3} err=\"failed to get container status \\\"615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\\\": rpc error: code = Unknown desc = Error: No such container: 615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\"\r\n"} +{"Time":"2023-05-31T12:39:03.918616-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:00 enable-default-cni-996000 kubelet[2381]: I0531 19:38:00.354022 2381 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=91e095b0-ea3f-4031-9216-4f184f88bfa6 path=\"/var/lib/kubelet/pods/91e095b0-ea3f-4031-9216-4f184f88bfa6/volumes\"\r\n"} +{"Time":"2023-05-31T12:39:03.918863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 kubelet[2381]: I0531 19:38:29.462300 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.918871-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 kubelet[2381]: E0531 19:38:29.462383 2381 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"91e095b0-ea3f-4031-9216-4f184f88bfa6\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:39:03.918876-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 kubelet[2381]: I0531 19:38:29.462407 2381 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"91e095b0-ea3f-4031-9216-4f184f88bfa6\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:39:03.918899-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 kubelet[2381]: I0531 19:38:29.562518 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-28jkm\\\" (UniqueName: \\\"kubernetes.io/projected/7a013e31-310e-46a8-89f8-6b9ca4a49262-kube-api-access-28jkm\\\") pod \\\"netcat-7458db8b8-n2ncl\\\" (UID: \\\"7a013e31-310e-46a8-89f8-6b9ca4a49262\\\") \" pod=\"default/netcat-7458db8b8-n2ncl\"\r\n"} +{"Time":"2023-05-31T12:39:03.918908-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.918913-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.918916-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:39:03.91892-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.918925-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:39:03.918928-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:39:03.918932-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:39:03.918935-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:39:03.918939-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.918961-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.91898-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:39:03.918989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:39:03.918993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:39:03.919277-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:39:03.919284-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.919304-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:39:03.919308-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:39:03.919311-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.919316-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.91932-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:39:03.919324-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:39:03.919328-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.919331-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.919335-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:39:03.919339-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=enable-default-cni-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.67.2\r\n"} +{"Time":"2023-05-31T12:39:03.919345-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.91935-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:39:03.919353-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.919357-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.919376-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:39:03.919386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:39:03.919392-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.919397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.919401-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.919817-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.919828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.919837-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.919842-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.919848-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:39:03.919854-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.877115 1744 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:39:03.919859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.877227 1744 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:39:03.919866-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.877410 1744 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:39:03.919871-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.880371 1744 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:39:03.919876-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.883933 1744 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.919881-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: W0531 19:37:27.885072 1744 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:39:03.919885-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.890079 1744 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:39:03.91989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.890429 1744 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:39:03.920305-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.890493 1744 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:39:03.920318-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.890512 1744 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:39:03.920329-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.890522 1744 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:39:03.920338-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.890575 1744 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:39:03.920361-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.910601 1744 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:39:03.920368-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.910679 1744 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:39:03.920374-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.910700 1744 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:39:03.920379-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.910716 1744 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:39:03.920384-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: W0531 19:37:27.911057 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Denable-default-cni-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.92039-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.911097 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Denable-default-cni-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.920878-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: W0531 19:37:27.911244 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.92089-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.911275 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.920901-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.918769 1744 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:39:03.920909-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: W0531 19:37:27.919018 1744 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:39:03.920916-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.919525 1744 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:39:03.920921-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.919808 1744 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:39:03.920926-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.919887 1744 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:39:03.920936-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.919952 1744 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"enable-default-cni-996000.17645191f8318d16\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"enable-default-cni-996000\", UID:\"enable-default-cni-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"enable-default-cni-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31,"} +{"Time":"2023-05-31T12:39:03.921256-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 19, 37, 27, 919512854, time.Local), LastTimestamp:time.Date(2023, time.May, 31, 19, 37, 27, 919512854, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.67.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:39:03.921266-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.920802 1744 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:39:03.921271-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.920972 1744 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:39:03.921276-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.921001 1744 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:39:03.921281-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.921007 1744 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"enable-default-cni-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:39:03.921286-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: W0531 19:37:27.921805 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.921316-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.921839 1744 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:39:03.921333-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.921855 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.921344-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.922016 1744 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/enable-default-cni-996000?timeout=10s\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:39:03.921349-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.938781 1744 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:39:03.921733-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.941290 1744 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:39:03.921741-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.941320 1744 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:39:03.921746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.941337 1744 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:39:03.921751-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.941374 1744 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:39:03.921756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: W0531 19:37:27.942386 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.921762-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.942456 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.921767-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.950745 1744 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:39:03.921772-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.950765 1744 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:39:03.921776-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.950780 1744 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:39:03.921781-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.951914 1744 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:39:03.921785-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.954133 1744 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:39:03.92179-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.954207 1744 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:39:03.922172-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.962972 1744 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:39:03.922182-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: I0531 19:37:27.963264 1744 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:39:03.922185-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:27 enable-default-cni-996000 kubelet[1744]: E0531 19:37:27.986622 1744 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"enable-default-cni-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:39:03.922189-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.030723 1744 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.922192-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: E0531 19:37:28.031300 1744 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.922197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.042035 1744 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.9222-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.053614 1744 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.922202-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.061478 1744 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.922205-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.070382 1744 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.922228-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: E0531 19:37:28.122980 1744 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/enable-default-cni-996000?timeout=10s\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:39:03.922234-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.222873 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.922815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223052 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-k8s-certs\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.922828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223112 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.922836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223252 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/538c22e52163db471e540bb41a92cb25-kubeconfig\\\") pod \\\"kube-scheduler-enable-default-cni-996000\\\" (UID: \\\"538c22e52163db471e540bb41a92cb25\\\") \" pod=\"kube-system/kube-scheduler-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.922842-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223281 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/9253379e57e1c608bd1fe0a39bee22d6-etcd-data\\\") pod \\\"etcd-enable-default-cni-996000\\\" (UID: \\\"9253379e57e1c608bd1fe0a39bee22d6\\\") \" pod=\"kube-system/etcd-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.92285-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223325 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-k8s-certs\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.922861-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223478 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.92287-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223531 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-ca-certs\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.923532-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223579 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-etc-ca-certificates\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.923546-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223599 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-flexvolume-dir\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.923561-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223614 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-kubeconfig\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.923572-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.223946 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/9253379e57e1c608bd1fe0a39bee22d6-etcd-certs\\\") pod \\\"etcd-enable-default-cni-996000\\\" (UID: \\\"9253379e57e1c608bd1fe0a39bee22d6\\\") \" pod=\"kube-system/etcd-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.923583-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.224077 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-ca-certs\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.923593-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.224125 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924139-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.224188 1744 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-etc-ca-certificates\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924149-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.243480 1744 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924155-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: E0531 19:37:28.243831 1744 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924162-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: E0531 19:37:28.523811 1744 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/enable-default-cni-996000?timeout=10s\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:39:03.924167-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: I0531 19:37:28.689408 1744 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924172-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: E0531 19:37:28.689708 1744 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.67.2:8443: connect: connection refused\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924195-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: W0531 19:37:28.825277 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Denable-default-cni-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.924222-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: E0531 19:37:28.825367 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Denable-default-cni-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.924698-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: W0531 19:37:28.983720 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.924708-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 kubelet[1744]: E0531 19:37:28.983841 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.924715-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:29 enable-default-cni-996000 kubelet[1744]: W0531 19:37:29.083531 1744 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.924724-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:29 enable-default-cni-996000 kubelet[1744]: E0531 19:37:29.083601 1744 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.67.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:39:03.924729-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:29 enable-default-cni-996000 kubelet[1744]: I0531 19:37:29.500186 1744 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924735-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:31 enable-default-cni-996000 kubelet[1744]: E0531 19:37:31.003988 1744 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"enable-default-cni-996000\\\" not found\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:31 enable-default-cni-996000 kubelet[1744]: I0531 19:37:31.095376 1744 kubelet_node_status.go:73] \"Successfully registered node\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.924754-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:31 enable-default-cni-996000 kubelet[1744]: I0531 19:37:31.435339 1744 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T12:39:03.92476-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:31 enable-default-cni-996000 kubelet[1744]: I0531 19:37:31.913242 1744 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:39:03.924765-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:31 enable-default-cni-996000 kubelet[1744]: I0531 19:37:31.922264 1744 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:39:03.925317-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:32 enable-default-cni-996000 kubelet[1744]: I0531 19:37:32.002273 1744 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:39:03.92537-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:39:03.92538-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925402-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925417-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925427-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925434-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925439-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925461-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925472-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[1744]: I0531 19:37:34.139327 1744 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:39:03.925478-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:39:03.925482-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925492-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925502-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925512-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925534-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925543-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:39:03.925883-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925936-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925943-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925947-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925954-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925958-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:39:03.925967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925972-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925983-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.925993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:39:03.926261-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.251451 2381 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:39:03.926282-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.251515 2381 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:39:03.926289-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.251642 2381 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:39:03.926296-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.252892 2381 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:39:03.926309-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.253934 2381 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:39:03.926317-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: W0531 19:37:34.258145 2381 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:39:03.926323-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.286487 2381 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:39:03.926327-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.286817 2381 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:39:03.926336-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.286883 2381 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:39:03.926346-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.286899 2381 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:39:03.926695-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.286907 2381 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:39:03.926704-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.286930 2381 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:39:03.92672-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.309483 2381 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:39:03.92673-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.309539 2381 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:39:03.926737-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.309609 2381 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:39:03.926741-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.309629 2381 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:39:03.926749-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.321614 2381 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:39:03.926754-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.322154 2381 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:39:03.926759-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.322274 2381 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:39:03.926767-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.322345 2381 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:39:03.926777-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.322886 2381 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:39:03.926786-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.324502 2381 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:39:03.926795-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.325750 2381 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:39:03.926803-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.326819 2381 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:39:03.927221-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.345667 2381 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:39:03.927233-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.347766 2381 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:39:03.927242-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.347836 2381 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:39:03.927252-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.347856 2381 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:39:03.927255-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: E0531 19:37:34.347904 2381 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:39:03.927258-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.420356 2381 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:39:03.927261-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.420402 2381 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:39:03.927264-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.420424 2381 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:39:03.927268-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.420725 2381 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:39:03.927271-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.420738 2381 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:39:03.927273-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.420743 2381 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:39:03.927276-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.424718 2381 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:39:03.927278-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.424844 2381 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:39:03.927281-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.425033 2381 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:39:03.927507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.425683 2381 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:39:03.927516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.425951 2381 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:39:03.927521-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.482987 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.927527-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.483176 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.927532-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.483216 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.927537-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.483336 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.927541-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.484921 2381 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.927546-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.504043 2381 kubelet_node_status.go:108] \"Node was previously registered\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.927551-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.504263 2381 kubelet_node_status.go:73] \"Successfully registered node\" node=\"enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.927557-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527651 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-ca-certs\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.927567-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527704 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-k8s-certs\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928032-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527725 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.92806-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527741 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-etc-ca-certificates\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928065-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527762 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.92807-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527776 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/9253379e57e1c608bd1fe0a39bee22d6-etcd-certs\\\") pod \\\"etcd-enable-default-cni-996000\\\" (UID: \\\"9253379e57e1c608bd1fe0a39bee22d6\\\") \" pod=\"kube-system/etcd-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928076-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527844 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/9253379e57e1c608bd1fe0a39bee22d6-etcd-data\\\") pod \\\"etcd-enable-default-cni-996000\\\" (UID: \\\"9253379e57e1c608bd1fe0a39bee22d6\\\") \" pod=\"kube-system/etcd-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928082-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527885 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-k8s-certs\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527912 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527930 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-etc-ca-certificates\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928415-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527949 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-ca-certs\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928419-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.527995 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-flexvolume-dir\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928423-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.528037 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/67cafa54615390cf4a3260cd051339ce-kubeconfig\\\") pod \\\"kube-controller-manager-enable-default-cni-996000\\\" (UID: \\\"67cafa54615390cf4a3260cd051339ce\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928427-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.528099 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/83225ef9dc50cce95648517d5282a29c-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-enable-default-cni-996000\\\" (UID: \\\"83225ef9dc50cce95648517d5282a29c\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928431-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:34 enable-default-cni-996000 kubelet[2381]: I0531 19:37:34.528120 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/538c22e52163db471e540bb41a92cb25-kubeconfig\\\") pod \\\"kube-scheduler-enable-default-cni-996000\\\" (UID: \\\"538c22e52163db471e540bb41a92cb25\\\") \" pod=\"kube-system/kube-scheduler-enable-default-cni-996000\"\r\n"} +{"Time":"2023-05-31T12:39:03.928687-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:35 enable-default-cni-996000 kubelet[2381]: I0531 19:37:35.309850 2381 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:39:03.928696-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:35 enable-default-cni-996000 kubelet[2381]: I0531 19:37:35.327045 2381 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:39:03.928702-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:35 enable-default-cni-996000 kubelet[2381]: I0531 19:37:35.334300 2381 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:39:03.928708-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:35 enable-default-cni-996000 kubelet[2381]: I0531 19:37:35.484779 2381 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-enable-default-cni-996000\" podStartSLOduration=1.484741503 podCreationTimestamp=\"2023-05-31 19:37:34 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:35.484441073 +0000 UTC m=+1.302000334\" watchObservedRunningTime=\"2023-05-31 19:37:35.484741503 +0000 UTC m=+1.302300764\"\r\n"} +{"Time":"2023-05-31T12:39:03.928715-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:35 enable-default-cni-996000 kubelet[2381]: I0531 19:37:35.494091 2381 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-enable-default-cni-996000\" podStartSLOduration=1.4940643009999999 podCreationTimestamp=\"2023-05-31 19:37:34 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:35.494029613 +0000 UTC m=+1.311588872\" watchObservedRunningTime=\"2023-05-31 19:37:35.494064301 +0000 UTC m=+1.311623561\"\r\n"} +{"Time":"2023-05-31T12:39:03.928721-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:35 enable-default-cni-996000 kubelet[2381]: I0531 19:37:35.510081 2381 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-enable-default-cni-996000\" podStartSLOduration=1.510049175 podCreationTimestamp=\"2023-05-31 19:37:34 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:35.503997787 +0000 UTC m=+1.321557048\" watchObservedRunningTime=\"2023-05-31 19:37:35.510049175 +0000 UTC m=+1.327608442\"\r\n"} +{"Time":"2023-05-31T12:39:03.928728-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:35 enable-default-cni-996000 kubelet[2381]: I0531 19:37:35.518707 2381 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-enable-default-cni-996000\" podStartSLOduration=1.51867917 podCreationTimestamp=\"2023-05-31 19:37:34 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:35.510601499 +0000 UTC m=+1.328160766\" watchObservedRunningTime=\"2023-05-31 19:37:35.51867917 +0000 UTC m=+1.336238432\"\r\n"} +{"Time":"2023-05-31T12:39:03.928958-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.483451 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.92897-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.521263 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/d4331eea-eab7-4195-bf5e-75c7bd3f165b-lib-modules\\\") pod \\\"kube-proxy-k9qcn\\\" (UID: \\\"d4331eea-eab7-4195-bf5e-75c7bd3f165b\\\") \" pod=\"kube-system/kube-proxy-k9qcn\"\r\n"} +{"Time":"2023-05-31T12:39:03.928982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.521325 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/d4331eea-eab7-4195-bf5e-75c7bd3f165b-kube-proxy\\\") pod \\\"kube-proxy-k9qcn\\\" (UID: \\\"d4331eea-eab7-4195-bf5e-75c7bd3f165b\\\") \" pod=\"kube-system/kube-proxy-k9qcn\"\r\n"} +{"Time":"2023-05-31T12:39:03.928991-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.521342 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-rslxd\\\" (UniqueName: \\\"kubernetes.io/projected/d4331eea-eab7-4195-bf5e-75c7bd3f165b-kube-api-access-rslxd\\\") pod \\\"kube-proxy-k9qcn\\\" (UID: \\\"d4331eea-eab7-4195-bf5e-75c7bd3f165b\\\") \" pod=\"kube-system/kube-proxy-k9qcn\"\r\n"} +{"Time":"2023-05-31T12:39:03.928996-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.521369 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/d4331eea-eab7-4195-bf5e-75c7bd3f165b-xtables-lock\\\") pod \\\"kube-proxy-k9qcn\\\" (UID: \\\"d4331eea-eab7-4195-bf5e-75c7bd3f165b\\\") \" pod=\"kube-system/kube-proxy-k9qcn\"\r\n"} +{"Time":"2023-05-31T12:39:03.929-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: E0531 19:37:46.626723 2381 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap \"kube-root-ca.crt\" not found\r\n"} +{"Time":"2023-05-31T12:39:03.929006-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: E0531 19:37:46.626770 2381 projected.go:198] Error preparing data for projected volume kube-api-access-rslxd for pod kube-system/kube-proxy-k9qcn: configmap \"kube-root-ca.crt\" not found\r\n"} +{"Time":"2023-05-31T12:39:03.929012-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: E0531 19:37:46.626843 2381 nestedpendingoperations.go:348] Operation for \"{volumeName:kubernetes.io/projected/d4331eea-eab7-4195-bf5e-75c7bd3f165b-kube-api-access-rslxd podName:d4331eea-eab7-4195-bf5e-75c7bd3f165b nodeName:}\" failed. No retries permitted until 2023-05-31 19:37:47.126828968 +0000 UTC m=+12.943968243 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume \"kube-api-access-rslxd\" (UniqueName: \"kubernetes.io/projected/d4331eea-eab7-4195-bf5e-75c7bd3f165b-kube-api-access-rslxd\") pod \"kube-proxy-k9qcn\" (UID: \"d4331eea-eab7-4195-bf5e-75c7bd3f165b\") : configmap \"kube-root-ca.crt\" not found\r\n"} +{"Time":"2023-05-31T12:39:03.929155-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.879787 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.929164-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.887000 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.929167-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.924236 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/91e095b0-ea3f-4031-9216-4f184f88bfa6-config-volume\\\") pod \\\"coredns-5d78c9869d-x8bdg\\\" (UID: \\\"91e095b0-ea3f-4031-9216-4f184f88bfa6\\\") \" pod=\"kube-system/coredns-5d78c9869d-x8bdg\"\r\n"} +{"Time":"2023-05-31T12:39:03.929171-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.924350 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-2mmwt\\\" (UniqueName: \\\"kubernetes.io/projected/91e095b0-ea3f-4031-9216-4f184f88bfa6-kube-api-access-2mmwt\\\") pod \\\"coredns-5d78c9869d-x8bdg\\\" (UID: \\\"91e095b0-ea3f-4031-9216-4f184f88bfa6\\\") \" pod=\"kube-system/coredns-5d78c9869d-x8bdg\"\r\n"} +{"Time":"2023-05-31T12:39:03.929177-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.924428 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-24rp8\\\" (UniqueName: \\\"kubernetes.io/projected/dd37a764-dcd7-46f6-98a7-e03f4b361ada-kube-api-access-24rp8\\\") pod \\\"coredns-5d78c9869d-n6lj8\\\" (UID: \\\"dd37a764-dcd7-46f6-98a7-e03f4b361ada\\\") \" pod=\"kube-system/coredns-5d78c9869d-n6lj8\"\r\n"} +{"Time":"2023-05-31T12:39:03.929181-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:46 enable-default-cni-996000 kubelet[2381]: I0531 19:37:46.924494 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/dd37a764-dcd7-46f6-98a7-e03f4b361ada-config-volume\\\") pod \\\"coredns-5d78c9869d-n6lj8\\\" (UID: \\\"dd37a764-dcd7-46f6-98a7-e03f4b361ada\\\") \" pod=\"kube-system/coredns-5d78c9869d-n6lj8\"\r\n"} +{"Time":"2023-05-31T12:39:03.929185-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:47 enable-default-cni-996000 kubelet[2381]: I0531 19:37:47.496898 2381 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"81cc41aff077ae63ce24ccec5903f47223a9055a53926f5ba5db708360cdf878\"\r\n"} +{"Time":"2023-05-31T12:39:03.929188-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:47 enable-default-cni-996000 kubelet[2381]: I0531 19:37:47.716317 2381 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6\"\r\n"} +{"Time":"2023-05-31T12:39:03.929334-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:47 enable-default-cni-996000 kubelet[2381]: I0531 19:37:47.720988 2381 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"f9722879e9c4ddd13f66ae5f8951f4cf573b15a1149240c33263a070b2979799\"\r\n"} +{"Time":"2023-05-31T12:39:03.929343-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:48 enable-default-cni-996000 kubelet[2381]: I0531 19:37:48.637082 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.929352-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:48 enable-default-cni-996000 kubelet[2381]: I0531 19:37:48.756009 2381 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-n6lj8\" podStartSLOduration=2.7559776559999998 podCreationTimestamp=\"2023-05-31 19:37:46 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:48.75587909 +0000 UTC m=+14.573018372\" watchObservedRunningTime=\"2023-05-31 19:37:48.755977656 +0000 UTC m=+14.573116932\"\r\n"} +{"Time":"2023-05-31T12:39:03.929362-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:48 enable-default-cni-996000 kubelet[2381]: I0531 19:37:48.791573 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/24ab98f7-669b-47d9-9c55-887a42872ee4-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"24ab98f7-669b-47d9-9c55-887a42872ee4\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:39:03.929366-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:48 enable-default-cni-996000 kubelet[2381]: I0531 19:37:48.792801 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-z5sz5\\\" (UniqueName: \\\"kubernetes.io/projected/24ab98f7-669b-47d9-9c55-887a42872ee4-kube-api-access-z5sz5\\\") pod \\\"storage-provisioner\\\" (UID: \\\"24ab98f7-669b-47d9-9c55-887a42872ee4\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:39:03.92937-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:48 enable-default-cni-996000 kubelet[2381]: I0531 19:37:48.799380 2381 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-k9qcn\" podStartSLOduration=2.799353869 podCreationTimestamp=\"2023-05-31 19:37:46 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:48.799252435 +0000 UTC m=+14.616391712\" watchObservedRunningTime=\"2023-05-31 19:37:48.799353869 +0000 UTC m=+14.616493144\"\r\n"} +{"Time":"2023-05-31T12:39:03.929374-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:49 enable-default-cni-996000 kubelet[2381]: I0531 19:37:49.771909 2381 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-x8bdg\" podStartSLOduration=3.771880013 podCreationTimestamp=\"2023-05-31 19:37:46 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:48.811727704 +0000 UTC m=+14.628866981\" watchObservedRunningTime=\"2023-05-31 19:37:49.771880013 +0000 UTC m=+15.589019290\"\r\n"} +{"Time":"2023-05-31T12:39:03.929654-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:49 enable-default-cni-996000 kubelet[2381]: I0531 19:37:49.772026 2381 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=1.772012976 podCreationTimestamp=\"2023-05-31 19:37:48 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:49.771713249 +0000 UTC m=+15.588852525\" watchObservedRunningTime=\"2023-05-31 19:37:49.772012976 +0000 UTC m=+15.589152253\"\r\n"} +{"Time":"2023-05-31T12:39:03.929668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:55 enable-default-cni-996000 kubelet[2381]: I0531 19:37:55.167636 2381 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:39:03.929679-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:55 enable-default-cni-996000 kubelet[2381]: I0531 19:37:55.168170 2381 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:39:03.929686-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.563598 2381 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/91e095b0-ea3f-4031-9216-4f184f88bfa6-config-volume\\\") pod \\\"91e095b0-ea3f-4031-9216-4f184f88bfa6\\\" (UID: \\\"91e095b0-ea3f-4031-9216-4f184f88bfa6\\\") \"\r\n"} +{"Time":"2023-05-31T12:39:03.929693-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.563695 2381 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-2mmwt\\\" (UniqueName: \\\"kubernetes.io/projected/91e095b0-ea3f-4031-9216-4f184f88bfa6-kube-api-access-2mmwt\\\") pod \\\"91e095b0-ea3f-4031-9216-4f184f88bfa6\\\" (UID: \\\"91e095b0-ea3f-4031-9216-4f184f88bfa6\\\") \"\r\n"} +{"Time":"2023-05-31T12:39:03.9297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: W0531 19:37:58.563766 2381 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/91e095b0-ea3f-4031-9216-4f184f88bfa6/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:39:03.929707-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.563889 2381 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/91e095b0-ea3f-4031-9216-4f184f88bfa6-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"91e095b0-ea3f-4031-9216-4f184f88bfa6\" (UID: \"91e095b0-ea3f-4031-9216-4f184f88bfa6\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.929725-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.565661 2381 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/91e095b0-ea3f-4031-9216-4f184f88bfa6-kube-api-access-2mmwt\" (OuterVolumeSpecName: \"kube-api-access-2mmwt\") pod \"91e095b0-ea3f-4031-9216-4f184f88bfa6\" (UID: \"91e095b0-ea3f-4031-9216-4f184f88bfa6\"). InnerVolumeSpecName \"kube-api-access-2mmwt\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.929904-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.664503 2381 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/91e095b0-ea3f-4031-9216-4f184f88bfa6-config-volume\\\") on node \\\"enable-default-cni-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:39:03.929914-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.664666 2381 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-2mmwt\\\" (UniqueName: \\\"kubernetes.io/projected/91e095b0-ea3f-4031-9216-4f184f88bfa6-kube-api-access-2mmwt\\\") on node \\\"enable-default-cni-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:39:03.92992-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.820252 2381 scope.go:115] \"RemoveContainer\" containerID=\"615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\"\r\n"} +{"Time":"2023-05-31T12:39:03.929925-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.836304 2381 scope.go:115] \"RemoveContainer\" containerID=\"615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\"\r\n"} +{"Time":"2023-05-31T12:39:03.92993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: E0531 19:37:58.837311 2381 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = Unknown desc = Error: No such container: 615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\" containerID=\"615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\"\r\n"} +{"Time":"2023-05-31T12:39:03.929936-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 kubelet[2381]: I0531 19:37:58.837365 2381 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:docker ID:615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3} err=\"failed to get container status \\\"615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\\\": rpc error: code = Unknown desc = Error: No such container: 615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3\"\r\n"} +{"Time":"2023-05-31T12:39:03.929972-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:00 enable-default-cni-996000 kubelet[2381]: I0531 19:38:00.354022 2381 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=91e095b0-ea3f-4031-9216-4f184f88bfa6 path=\"/var/lib/kubelet/pods/91e095b0-ea3f-4031-9216-4f184f88bfa6/volumes\"\r\n"} +{"Time":"2023-05-31T12:39:03.929995-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 kubelet[2381]: I0531 19:38:29.462300 2381 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:39:03.930005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 kubelet[2381]: E0531 19:38:29.462383 2381 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"91e095b0-ea3f-4031-9216-4f184f88bfa6\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:39:03.930045-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 kubelet[2381]: I0531 19:38:29.462407 2381 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"91e095b0-ea3f-4031-9216-4f184f88bfa6\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:39:03.930054-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 kubelet[2381]: I0531 19:38:29.562518 2381 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-28jkm\\\" (UniqueName: \\\"kubernetes.io/projected/7a013e31-310e-46a8-89f8-6b9ca4a49262-kube-api-access-28jkm\\\") pod \\\"netcat-7458db8b8-n2ncl\\\" (UID: \\\"7a013e31-310e-46a8-89f8-6b9ca4a49262\\\") \" pod=\"default/netcat-7458db8b8-n2ncl\"\r\n"} +{"Time":"2023-05-31T12:39:03.930059-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.930061-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.930065-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:39:03.930067-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:39:03.93007-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:39:03.930072-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:39:03.930076-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:39:03.93008-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:39:03.93029-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:39:03.930298-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:39:03.930303-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:39:03.930308-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:39:03.930312-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:39:03.930316-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user: system:node:enable-default-cni-996000\r\n"} +{"Time":"2023-05-31T12:39:03.93032-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: system:node:enable-default-cni-996000@mk\r\n"} +{"Time":"2023-05-31T12:39:03.930328-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: system:node:enable-default-cni-996000@mk\r\n"} +{"Time":"2023-05-31T12:39:03.930336-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:39:03.930342-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:39:03.930346-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users:\r\n"} +{"Time":"2023-05-31T12:39:03.930354-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - name: system:node:enable-default-cni-996000\r\n"} +{"Time":"2023-05-31T12:39:03.930358-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user:\r\n"} +{"Time":"2023-05-31T12:39:03.930362-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:39:03.930368-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:39:03.930376-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.93038-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.930384-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:39:03.930388-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:39:03.930392-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:39:03.930396-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:39:03.9304-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:39:03.930403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:39:03.930407-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:39:03.930496-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:39:03.930507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:39:03.930514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:39:03.930519-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:39:03.930523-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:39:03.93053-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930534-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:39:03.930543-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:39:03.930585-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:39:03.930598-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:39:03.930607-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.930627-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930636-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:39:03.93064-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:39:03.930645-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:39:03.930649-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:39:03.930654-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930658-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:39:03.930662-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930666-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:39:03.93067-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:39:03.930673-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:39:03.930677-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930912-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:39:03.930922-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930927-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:39:03.930931-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:39:03.930934-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:39:03.930938-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" options:\r\n"} +{"Time":"2023-05-31T12:39:03.930942-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" json:\r\n"} +{"Time":"2023-05-31T12:39:03.930948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:39:03.930952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:39:03.930955-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:39:03.930959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:39:03.930975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:39:03.930981-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930985-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:39:03.930993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.930997-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.931001-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:39:03.931005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.931009-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.931013-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:39:03.931017-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.931022-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters:\n"} +{"Time":"2023-05-31T12:39:03.931336-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:39:03.931344-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:39:03.931382-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extensions:\n"} +{"Time":"2023-05-31T12:39:03.931392-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - extension:\n"} +{"Time":"2023-05-31T12:39:03.931398-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" last-update: Wed, 31 May 2023 12:37:46 PDT\n"} +{"Time":"2023-05-31T12:39:03.931402-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.931406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:39:03.93141-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:39:03.931414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://127.0.0.1:52951\n"} +{"Time":"2023-05-31T12:39:03.931418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.931422-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:39:03.931426-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:39:03.93143-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extensions:\n"} +{"Time":"2023-05-31T12:39:03.931439-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - extension:\n"} +{"Time":"2023-05-31T12:39:03.931444-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" last-update: Wed, 31 May 2023 12:37:56 PDT\n"} +{"Time":"2023-05-31T12:39:03.931461-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.93147-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:39:03.931473-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:39:03.931476-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://127.0.0.1:52973\n"} +{"Time":"2023-05-31T12:39:03.931478-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: flannel-996000\n"} +{"Time":"2023-05-31T12:39:03.931482-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts:\n"} +{"Time":"2023-05-31T12:39:03.931484-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - context:\n"} +{"Time":"2023-05-31T12:39:03.931486-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cluster: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.931567-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extensions:\n"} +{"Time":"2023-05-31T12:39:03.931595-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - extension:\n"} +{"Time":"2023-05-31T12:39:03.931604-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" last-update: Wed, 31 May 2023 12:37:46 PDT\n"} +{"Time":"2023-05-31T12:39:03.931611-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.931615-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:39:03.931624-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:39:03.931629-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:39:03.931633-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.931637-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.931642-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - context:\n"} +{"Time":"2023-05-31T12:39:03.931671-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cluster: flannel-996000\n"} +{"Time":"2023-05-31T12:39:03.931676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extensions:\n"} +{"Time":"2023-05-31T12:39:03.931679-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - extension:\n"} +{"Time":"2023-05-31T12:39:03.931683-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" last-update: Wed, 31 May 2023 12:37:56 PDT\n"} +{"Time":"2023-05-31T12:39:03.931686-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.931688-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:39:03.931691-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:39:03.931693-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:39:03.931695-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user: flannel-996000\n"} +{"Time":"2023-05-31T12:39:03.931698-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: flannel-996000\n"} +{"Time":"2023-05-31T12:39:03.931701-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: flannel-996000\n"} +{"Time":"2023-05-31T12:39:03.931705-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:39:03.931708-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:39:03.931712-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users:\n"} +{"Time":"2023-05-31T12:39:03.931779-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - name: enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:03.931787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user:\n"} +{"Time":"2023-05-31T12:39:03.931792-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt\n"} +{"Time":"2023-05-31T12:39:03.931797-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.key\n"} +{"Time":"2023-05-31T12:39:03.931801-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - name: flannel-996000\n"} +{"Time":"2023-05-31T12:39:03.931805-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user:\n"} +{"Time":"2023-05-31T12:39:03.931809-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt\n"} +{"Time":"2023-05-31T12:39:03.931815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.key\n"} +{"Time":"2023-05-31T12:39:03.931823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.93183-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.931836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:39:03.931844-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.93185-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" items:\n"} +{"Time":"2023-05-31T12:39:03.931858-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.931863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.931867-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:39:03.931873-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.931895-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:39:03.9319-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:39:03.931906-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:39:03.931914-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:39:03.93194-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:39:03.931947-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:39:03.931952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:39:03.931955-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:39:03.931959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:39:03.931963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:39:03.931967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:39:03.931971-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:39:03.931975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:39:03.931979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:39:03.931983-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:39:03.931986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:39:03.93199-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:39:03.931994-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.931998-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.932002-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.932017-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" annotations:\n"} +{"Time":"2023-05-31T12:39:03.932025-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:39:03.93203-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:39:03.932034-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:39:03.932268-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:39:03.932277-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:46Z\"\n"} +{"Time":"2023-05-31T12:39:03.932281-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:39:03.932285-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:39:03.932289-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"357\"\n"} +{"Time":"2023-05-31T12:39:03.932293-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 0f5b8287-ac19-4324-bd10-e3fa51e68081\n"} +{"Time":"2023-05-31T12:39:03.932297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.9323-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.932318-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:39:03.932338-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.932342-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:39:03.932345-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:39:03.932347-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:39:03.93235-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:39:03.932353-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:39:03.932355-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:39:03.932358-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:39:03.932361-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:39:03.932363-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:39:03.932366-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:39:03.932368-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:39:03.932475-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:39:03.932482-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:39:03.932486-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:39:03.93249-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:39:03.932494-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:39:03.932498-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:39:03.932502-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.932506-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.93251-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.932514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" annotations:\n"} +{"Time":"2023-05-31T12:39:03.932518-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:39:03.932522-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:39:03.932528-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:39:03.932532-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:39:03.932536-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:46Z\"\n"} +{"Time":"2023-05-31T12:39:03.93254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:39:03.932544-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:39:03.932549-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"358\"\n"} +{"Time":"2023-05-31T12:39:03.932553-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: b85dc92e-bcac-4236-bf27-31d2070e03c8\n"} +{"Time":"2023-05-31T12:39:03.932625-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.932636-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.932642-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" jws-kubeconfig-5309uw: eyJhbGciOiJIUzI1NiIsImtpZCI6IjUzMDl1dyJ9..ahhptAvDzL6J4kUEnK2mXXqzaq9WX5QoUqHNHOVRl4c\n"} +{"Time":"2023-05-31T12:39:03.932646-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:39:03.93265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.932655-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters:\n"} +{"Time":"2023-05-31T12:39:03.932661-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:39:03.932689-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:39:03.932702-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"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\n"} +{"Time":"2023-05-31T12:39:03.93271-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:39:03.932715-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:39:03.93272-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:39:03.932727-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:39:03.932776-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:39:03.932786-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:39:03.932791-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users: null\n"} +{"Time":"2023-05-31T12:39:03.932794-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.932802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.932806-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:33Z\"\n"} +{"Time":"2023-05-31T12:39:03.93281-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:39:03.932814-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:39:03.932818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"335\"\n"} +{"Time":"2023-05-31T12:39:03.932822-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: bbd91fb7-aa1a-470f-919f-8de92d4b047d\n"} +{"Time":"2023-05-31T12:39:03.932826-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.93283-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.932834-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:39:03.932838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.932842-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:39:03.932846-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:39:03.93285-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:39:03.932854-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:39:03.932861-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:39:03.93287-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:39:03.932889-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:39:03.932895-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:39:03.932935-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:39:03.932944-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:39:03.932948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:39:03.932954-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:39:03.932958-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:39:03.932962-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:39:03.932965-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:39:03.93297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:39:03.932974-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:39:03.932978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.932982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.932985-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.932989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" annotations:\n"} +{"Time":"2023-05-31T12:39:03.932993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:39:03.932997-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:39:03.933001-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:39:03.933005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:39:03.933009-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:46Z\"\n"} +{"Time":"2023-05-31T12:39:03.933152-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:39:03.933159-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:39:03.933164-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"359\"\n"} +{"Time":"2023-05-31T12:39:03.933168-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: ea6299bf-767a-45fe-b7a2-d51eaa1fd3fb\n"} +{"Time":"2023-05-31T12:39:03.933172-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.933176-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.93318-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:39:03.933184-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:39:03.933188-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" log\n"} +{"Time":"2023-05-31T12:39:03.933192-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" errors\n"} +{"Time":"2023-05-31T12:39:03.933195-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" health {\n"} +{"Time":"2023-05-31T12:39:03.933199-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:39:03.933205-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T12:39:03.933209-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ready\n"} +{"Time":"2023-05-31T12:39:03.933213-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:39:03.933217-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:39:03.933242-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:39:03.933247-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:39:03.933251-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T12:39:03.933255-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:39:03.933259-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hosts {\n"} +{"Time":"2023-05-31T12:39:03.933264-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:39:03.933268-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:39:03.933272-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T12:39:03.933275-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:39:03.933384-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:39:03.933397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T12:39:03.933405-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cache 30\n"} +{"Time":"2023-05-31T12:39:03.933411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" loop\n"} +{"Time":"2023-05-31T12:39:03.933416-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" reload\n"} +{"Time":"2023-05-31T12:39:03.93342-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:39:03.933424-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T12:39:03.933428-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.933436-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.933444-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:34Z\"\n"} +{"Time":"2023-05-31T12:39:03.93345-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:39:03.93347-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.933474-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"398\"\n"} +{"Time":"2023-05-31T12:39:03.93348-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: d3d61cdb-309a-46c1-b75b-73d9807dbb5b\n"} +{"Time":"2023-05-31T12:39:03.933487-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.933492-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.933496-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:39:03.9335-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.933504-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:39:03.933514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:39:03.933522-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:39:03.933526-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:39:03.933643-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:39:03.933655-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:39:03.933659-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:39:03.933662-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:39:03.933668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:39:03.933674-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:39:03.933695-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:39:03.9337-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:39:03.933704-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:39:03.933708-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:39:03.933712-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:39:03.933716-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:39:03.933746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:39:03.933754-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.933759-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:39:03.933763-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:39:03.933767-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.933774-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:39:03.933779-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM3MjVaFw0zMzA1MjgxOTM3MjVaMBkxFzAV\n"} +{"Time":"2023-05-31T12:39:03.933784-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:39:03.933792-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CgKCAQEAv0PTbnjMJjimOlU8K+QnRzI0x9TBuEHLiqS1LvjLjOkAgBc7C8+HaWxn\n"} +{"Time":"2023-05-31T12:39:03.933796-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" qX+j5TwDMPSOs/lacSjHHlCnt9zyKWSbdmNoL2JpP89RPunAmmlgs/AAoU13eBNU\n"} +{"Time":"2023-05-31T12:39:03.933815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" m1vkG3WU/BXt92M0M9F4juDObtKFRAdMQ//u9jT3svu9CqlZGynr/3LVfHCFvx1l\n"} +{"Time":"2023-05-31T12:39:03.933824-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" xGwOkh4ZHABPx7mXmksDm3fmMEXeq+r86zJmJ4QSu9QjVrpDXuUPjG6oFx9Mso6m\n"} +{"Time":"2023-05-31T12:39:03.933829-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QK8MSxvBKWMj6nEwP2v9iZHrnBbnYMBx2vEfP/K0X3+4ySltItvJ4AR/vLwSbb5Q\n"} +{"Time":"2023-05-31T12:39:03.933833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ApbQMFRF2P9CXjFSWzy5Gu8D+rN+uwIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:39:03.933837-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU14UdHdRrW8owv9CVx3gqNp1cTnIw\n"} +{"Time":"2023-05-31T12:39:03.933841-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAGAa\n"} +{"Time":"2023-05-31T12:39:03.933845-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" v1pKG+qPrV9H4Xi+udonwmx4Kk/ZpIBj8juNc6hb1IeAtHninmfULR0vY9EDkUZb\n"} +{"Time":"2023-05-31T12:39:03.933848-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gmSdxseZYc2n69kp/2EkXlOlgYQ87gOJgN3xIzWDBYNVZsWfwEYtMM5WammNlXPx\n"} +{"Time":"2023-05-31T12:39:03.933852-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" yJ+mUhzIhywVW/6uS6pkg5/9kG+pDYR6d7CLFguy565WJq3ZGvZ4NZ+phOpy4Bzj\n"} +{"Time":"2023-05-31T12:39:03.933855-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" FhlYLUe8DpeQs8YaNl/o6n0w52MLwdbQnYLxx6O2GFdrRjLomCBNRS38gsYq3TgO\n"} +{"Time":"2023-05-31T12:39:03.933859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CBNCJ6QeH0v9zLLarsRLoujP2UMAURsMZ+JRncGK/JTCTrmSETninO4qJzsoHw2Y\n"} +{"Time":"2023-05-31T12:39:03.933865-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Vv1lHZLtUHHPQ2oPMew=\n"} +{"Time":"2023-05-31T12:39:03.933869-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.933896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:39:03.933918-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:39:03.933928-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:39:03.933934-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.933938-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.933946-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:31Z\"\n"} +{"Time":"2023-05-31T12:39:03.933953-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:39:03.933959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.933963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"28\"\n"} +{"Time":"2023-05-31T12:39:03.933967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: ee0e3921-5d8e-4ec3-be4e-ce8ae732db53\n"} +{"Time":"2023-05-31T12:39:03.933973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.933978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.933982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:39:03.933986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.934005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.934011-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:31Z\"\n"} +{"Time":"2023-05-31T12:39:03.934015-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:39:03.934019-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.934023-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"44\"\n"} +{"Time":"2023-05-31T12:39:03.934026-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 970e0b2a-d1e9-4782-8333-fb4e1bc26486\n"} +{"Time":"2023-05-31T12:39:03.934029-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.934032-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.934034-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:39:03.934038-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:39:03.934041-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:39:03.934044-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:39:03.934048-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:39:03.934101-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934109-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:39:03.934113-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934117-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:39:03.934125-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:39:03.934133-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:39:03.934141-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.934148-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:39:03.934153-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:39:03.93416-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" min: null\n"} +{"Time":"2023-05-31T12:39:03.934165-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:39:03.93417-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:39:03.934177-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:39:03.934182-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934187-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934193-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934199-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:39:03.934203-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934207-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934211-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" iptables:\n"} +{"Time":"2023-05-31T12:39:03.934215-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:39:03.934221-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:39:03.934227-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:39:03.93423-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.934234-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.934355-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:39:03.934376-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:39:03.934382-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.934386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934389-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:39:03.934393-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.934397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:39:03.9344-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:39:03.934404-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:39:03.934408-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:39:03.934411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:39:03.934414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:39:03.934421-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:39:03.934425-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934429-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:39:03.934436-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:39:03.934482-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:39:03.934486-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:39:03.93449-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:39:03.934503-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:39:03.93451-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:39:03.934519-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.934761-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:39:03.934783-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters:\n"} +{"Time":"2023-05-31T12:39:03.93479-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:39:03.934795-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:39:03.934803-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:39:03.934811-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: default\n"} +{"Time":"2023-05-31T12:39:03.934816-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts:\n"} +{"Time":"2023-05-31T12:39:03.934823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - context:\n"} +{"Time":"2023-05-31T12:39:03.934829-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:39:03.934838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:39:03.934844-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user: default\n"} +{"Time":"2023-05-31T12:39:03.934851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: default\n"} +{"Time":"2023-05-31T12:39:03.934859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:39:03.934869-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users:\n"} +{"Time":"2023-05-31T12:39:03.934877-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - name: default\n"} +{"Time":"2023-05-31T12:39:03.934881-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user:\n"} +{"Time":"2023-05-31T12:39:03.934884-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:39:03.934888-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.934891-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.934894-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:34Z\"\n"} +{"Time":"2023-05-31T12:39:03.934897-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" labels:\n"} +{"Time":"2023-05-31T12:39:03.9349-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.934905-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:39:03.934928-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.934936-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"274\"\n"} +{"Time":"2023-05-31T12:39:03.935189-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 7535f916-62d7-41d6-b7c7-3fff57bc7658\n"} +{"Time":"2023-05-31T12:39:03.935197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.935203-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.93521-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:39:03.935214-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.935218-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:39:03.935222-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:39:03.935226-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:39:03.93523-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:39:03.935235-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:39:03.935242-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:39:03.935249-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:39:03.935253-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:39:03.935257-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:39:03.935261-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:39:03.935276-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:39:03.935285-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:39:03.935289-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:39:03.935294-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:39:03.935298-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:39:03.935794-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:39:03.935802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:39:03.935806-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:39:03.93581-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.935814-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.935817-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" annotations:\n"} +{"Time":"2023-05-31T12:39:03.935821-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:39:03.935826-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:39:03.93583-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:39:03.935833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:39:03.93584-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:46Z\"\n"} +{"Time":"2023-05-31T12:39:03.935846-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:39:03.93585-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.935853-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"360\"\n"} +{"Time":"2023-05-31T12:39:03.935857-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 4924bd4e-7a69-46db-9af0-7ef23b5dc5b0\n"} +{"Time":"2023-05-31T12:39:03.935861-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.935865-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.935869-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:39:03.935872-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:39:03.935876-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:39:03.93588-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:39:03.935884-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - localhost\n"} +{"Time":"2023-05-31T12:39:03.935888-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - 192.168.67.2\n"} +{"Time":"2023-05-31T12:39:03.935892-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:39:03.936478-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:39:03.93649-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:39:03.936497-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:39:03.936503-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:39:03.93651-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:39:03.936557-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:39:03.936573-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:39:03.93658-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:39:03.936585-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:39:03.936589-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:39:03.936593-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:39:03.936597-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:39:03.936601-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" etcd:\n"} +{"Time":"2023-05-31T12:39:03.936604-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" local:\n"} +{"Time":"2023-05-31T12:39:03.936608-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:39:03.936612-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:39:03.936616-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:39:03.936621-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:39:03.936625-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:39:03.936629-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:39:03.936632-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" networking:\n"} +{"Time":"2023-05-31T12:39:03.936637-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:39:03.93664-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:39:03.936804-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:39:03.936814-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:39:03.936821-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:39:03.936826-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:39:03.936831-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.936835-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.936839-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:32Z\"\n"} +{"Time":"2023-05-31T12:39:03.936843-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:39:03.936848-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.936851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"199\"\n"} +{"Time":"2023-05-31T12:39:03.936855-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 168dd666-49f6-4f43-8118-fecea9d654a1\n"} +{"Time":"2023-05-31T12:39:03.936859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:39:03.936863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T12:39:03.936867-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:39:03.93687-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:39:03.936874-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authentication:\n"} +{"Time":"2023-05-31T12:39:03.936878-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:39:03.936882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:39:03.936886-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" webhook:\n"} +{"Time":"2023-05-31T12:39:03.93689-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:39:03.936895-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:39:03.936899-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" x509:\n"} +{"Time":"2023-05-31T12:39:03.936902-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:39:03.936906-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authorization:\n"} +{"Time":"2023-05-31T12:39:03.937074-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:39:03.937081-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" webhook:\n"} +{"Time":"2023-05-31T12:39:03.937086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:39:03.93709-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:39:03.937094-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:39:03.937098-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:39:03.937101-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:39:03.937105-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:39:03.937109-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:39:03.937113-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.937117-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:39:03.937123-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:39:03.937127-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:39:03.937131-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:39:03.937135-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.937139-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:39:03.937142-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:39:03.937146-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:39:03.937149-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:39:03.937153-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:39:03.937157-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:39:03.937161-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:39:03.937165-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:39:03.937168-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:39:03.93776-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" logging:\n"} +{"Time":"2023-05-31T12:39:03.937772-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:39:03.937781-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" options:\n"} +{"Time":"2023-05-31T12:39:03.937802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" json:\n"} +{"Time":"2023-05-31T12:39:03.937809-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:39:03.937814-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:39:03.937818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:39:03.937822-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:39:03.937825-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:39:03.937829-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:39:03.937833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:39:03.937837-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.937841-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:39:03.937863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:39:03.937872-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:39:03.93788-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:39:03.937885-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:39:03.937889-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:39:03.937893-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.937897-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:37:32Z\"\n"} +{"Time":"2023-05-31T12:39:03.937901-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:39:03.937923-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:39:03.937931-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"202\"\n"} +{"Time":"2023-05-31T12:39:03.937956-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: a940ee29-4180-436c-8916-f5d6a4dc6e4d\n"} +{"Time":"2023-05-31T12:39:03.938336-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: List\n"} +{"Time":"2023-05-31T12:39:03.938344-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T12:39:03.938348-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:39:03.938352-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.938357-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.93836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:39:03.938364-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:39:03.938369-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: loaded (\u001b]8;;file://enable-default-cni-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:39:03.938376-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:21 UTC; 1min 34s ago\r\n"} +{"Time":"2023-05-31T12:39:03.93838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:39:03.938384-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:39:03.938389-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Main PID: 1042 (dockerd)\r\n"} +{"Time":"2023-05-31T12:39:03.938394-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tasks: 16\r\n"} +{"Time":"2023-05-31T12:39:03.938398-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Memory: 172.6M\r\n"} +{"Time":"2023-05-31T12:39:03.938402-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CPU: 8.750s\r\n"} +{"Time":"2023-05-31T12:39:03.938405-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:39:03.938409-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─1042 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:39:03.938414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.938418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:21 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:21.041690234Z\" level=info msg=\"Loading containers: start.\"\r\n"} +{"Time":"2023-05-31T12:39:03.938423-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:21 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:21.169289834Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\r\n"} +{"Time":"2023-05-31T12:39:03.938663-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:21 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:21.223622543Z\" level=info msg=\"Loading containers: done.\"\r\n"} +{"Time":"2023-05-31T12:39:03.938673-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:21 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:21.256098211Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\r\n"} +{"Time":"2023-05-31T12:39:03.938678-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:21 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:21.256255798Z\" level=info msg=\"Daemon has completed initialization\"\r\n"} +{"Time":"2023-05-31T12:39:03.938683-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:21 enable-default-cni-996000 systemd[1]: Started Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T12:39:03.93873-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:21 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:21.299357923Z\" level=info msg=\"API listen on /var/run/docker.sock\"\r\n"} +{"Time":"2023-05-31T12:39:03.93874-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:21 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:21.299301605Z\" level=info msg=\"API listen on [::]:2376\"\r\n"} +{"Time":"2023-05-31T12:39:03.938751-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:58.311857913Z\" level=info msg=\"ignoring event\" container=615081eb72a482b79618b409c587fea15a0c91b7526b225dcd713e97e242c6f3 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:39:03.938757-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 dockerd[1042]: time=\"2023-05-31T19:37:58.409167958Z\" level=info msg=\"ignoring event\" container=f9722879e9c4ddd13f66ae5f8951f4cf573b15a1149240c33263a070b2979799 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:39:03.938762-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.938766-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.93877-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:39:03.938774-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.938779-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:39:03.938783-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:39:03.938787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:39:03.938999-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:39:03.939007-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:39:03.939011-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:39:03.939015-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:39:03.939019-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:39:03.939023-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:39:03.939027-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939031-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.939036-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:39:03.939039-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:39:03.939044-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939047-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939051-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939055-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:39:03.939059-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:39:03.939064-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:39:03.939069-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:39:03.939073-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:39:03.939077-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:39:03.939081-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:39:03.939085-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939089-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:39:03.939372-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:39:03.939381-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:39:03.939386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:39:03.939391-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:39:03.939407-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:39:03.939413-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:39:03.939416-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.93942-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.939422-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.939424-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939427-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:39:03.939429-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:39:03.939432-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.939434-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:39:03.939436-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939439-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:39:03.939443-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:39:03.939447-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.939451-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:39:03.939454-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:39:03.939458-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.93974-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:39:03.939747-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:39:03.93975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.939753-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.939755-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:39:03.939758-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T12:39:03.93978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:39:03.939785-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:39:03.939788-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:39:03.93979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:39:03.939793-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T12:39:03.939795-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:39:03.939798-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T12:39:03.9398-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.939813-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.939823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:39:03.939828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:39:03.939833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:39:03.939837-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:39:03.939841-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:39:03.939845-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:39:03.939849-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:39:03.939867-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:39:03.939876-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:39:03.93988-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.940058-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:39:03.940066-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers: 16\r\n"} +{"Time":"2023-05-31T12:39:03.94007-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Running: 16\r\n"} +{"Time":"2023-05-31T12:39:03.940074-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:39:03.940077-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Stopped: 0\r\n"} +{"Time":"2023-05-31T12:39:03.940081-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Images: 9\r\n"} +{"Time":"2023-05-31T12:39:03.940084-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:39:03.940089-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:39:03.940093-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:39:03.940097-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:39:03.940101-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:39:03.940105-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:39:03.940108-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:39:03.940112-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:39:03.940116-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:39:03.940133-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:39:03.940143-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:39:03.940146-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:39:03.940148-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:39:03.940151-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:39:03.940153-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:39:03.940156-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Runtimes: io.containerd.runc.v2 runc\r\n"} +{"Time":"2023-05-31T12:39:03.940158-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:39:03.940161-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:39:03.940163-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:39:03.940433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:39:03.940442-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:39:03.940447-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:39:03.940465-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:39:03.940473-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:39:03.940476-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:39:03.94048-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:39:03.940484-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:39:03.940488-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:39:03.940491-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:39:03.940495-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:39:03.940499-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:39:03.940503-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: enable-default-cni-996000\r\n"} +{"Time":"2023-05-31T12:39:03.940506-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ID: da78ca6c-03d5-4eaa-8ee7-acb5d296656d\r\n"} +{"Time":"2023-05-31T12:39:03.94051-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:39:03.940514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:39:03.940517-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:39:03.940519-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:39:03.940522-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:39:03.940525-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:39:03.940529-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:39:03.940532-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:39:03.940536-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:39:03.940541-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:39:03.940773-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.94078-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.940784-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.940787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:39:03.940792-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:39:03.940797-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: loaded (\u001b]8;;file://enable-default-cni-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:39:03.940802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:39:03.940806-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─\u001b]8;;file://enable-default-cni-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:39:03.94081-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:21 UTC; 1min 36s ago\r\n"} +{"Time":"2023-05-31T12:39:03.940815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:39:03.940819-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:39:03.940823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Main PID: 1263 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:39:03.940827-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tasks: 11\r\n"} +{"Time":"2023-05-31T12:39:03.940831-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Memory: 18.1M\r\n"} +{"Time":"2023-05-31T12:39:03.940834-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CPU: 2.035s\r\n"} +{"Time":"2023-05-31T12:39:03.940838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:39:03.940842-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─1263 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:39:03.940847-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.940851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:37:28Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/cb3104bb5252a33b749b872cb4abac2f215ce0120a809ad88ae0badfded7f661/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:39:03.941141-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:37:28Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/6de64ff2ff012db1b1b25a27607a2c45be2936b0154ef200b88d434b9e07e21c/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:39:03.941162-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:28 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:37:28Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/b5d33a4b30b18095f7145b69352f47143d50de1487df1fd2ad95c3fb2c99471e/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:39:03.941169-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:47 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:37:47Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:39:03.941175-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:47 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:37:47Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/f9722879e9c4ddd13f66ae5f8951f4cf573b15a1149240c33263a070b2979799/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:39:03.94118-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:47 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:37:47Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/81cc41aff077ae63ce24ccec5903f47223a9055a53926f5ba5db708360cdf878/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:39:03.941184-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:49 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:37:49Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/54db07dbab086fbb270089b87de64cffd949dfb788979ac5f9335cb4315d5d75/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:39:03.9412-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:55 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:37:55Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/24,},}\"\r\n"} +{"Time":"2023-05-31T12:39:03.941208-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:38:29Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f/resolv.conf as [nameserver 10.96.0.10 search default.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\r\n"} +{"Time":"2023-05-31T12:39:03.941213-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:35 enable-default-cni-996000 cri-dockerd[1263]: time=\"2023-05-31T19:38:35Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:39:03.941218-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.941567-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.941575-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:39:03.941578-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.941581-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:39:03.941583-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:39:03.941586-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:39:03.941588-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:39:03.941591-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:39:03.941593-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:39:03.941595-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.941598-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.9416-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:39:03.941602-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:39:03.941605-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:39:03.941607-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:39:03.941609-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:39:03.941612-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:39:03.941615-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.94162-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:39:03.941624-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:39:03.941627-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:39:03.94163-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:39:03.941633-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.941948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:39:03.941955-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:39:03.941958-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:39:03.94196-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:39:03.941963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.941965-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:39:03.941968-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:39:03.94197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.941974-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.941977-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.941979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.941981-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:39:03.941984-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:39:03.941986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.941988-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:39:03.94199-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:39:03.941993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.941995-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:39:03.941997-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:39:03.941999-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.942002-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.942005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.942008-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:39:03.942507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:39:03.942515-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.94252-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.942524-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:39:03.942528-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.942532-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:39:03.942535-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:39:03.942539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.942542-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:39:03.942546-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:39:03.94255-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:39:03.942554-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:39:03.942558-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:39:03.942561-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:39:03.942565-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:39:03.942569-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.942572-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.942576-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:39:03.94258-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:39:03.942583-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:39:03.942587-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:39:03.94259-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:39:03.942594-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:39:03.94305-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.943058-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:39:03.943063-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:39:03.943068-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:39:03.94307-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:39:03.943072-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.943075-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:39:03.943077-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:39:03.94308-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:39:03.943082-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:39:03.943085-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.943088-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:39:03.94309-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:39:03.943093-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.943095-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.943097-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.943099-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.943101-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:39:03.943114-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:39:03.943122-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.943126-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:39:03.94313-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:39:03.943138-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.943561-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:39:03.943584-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:39:03.94359-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.943594-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.943598-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:39:03.943603-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:39:03.943608-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.943615-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.943623-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:39:03.943628-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:39:03.943633-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: loaded (\u001b]8;;file://enable-default-cni-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:39:03.943639-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:20 UTC; 1min 39s ago\r\n"} +{"Time":"2023-05-31T12:39:03.943647-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:39:03.943653-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Main PID: 823 (containerd)\r\n"} +{"Time":"2023-05-31T12:39:03.94366-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tasks: 187\r\n"} +{"Time":"2023-05-31T12:39:03.943664-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Memory: 69.7M\r\n"} +{"Time":"2023-05-31T12:39:03.943668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CPU: 2.691s\r\n"} +{"Time":"2023-05-31T12:39:03.943672-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:39:03.943676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─ 823 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:39:03.943681-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─1900 /usr/bin/containerd-shim-runc-v2 -namespace moby -id cb3104bb5252a33b749b872cb4abac2f215ce0120a809ad88ae0badfded7f661 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.943686-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─1908 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 688355dfec20470b1537323cc1e6eea8d8600a38ed32d0b2324f676fb1b9a9d6 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944025-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─1949 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 6de64ff2ff012db1b1b25a27607a2c45be2936b0154ef200b88d434b9e07e21c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944036-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─1959 /usr/bin/containerd-shim-runc-v2 -namespace moby -id b5d33a4b30b18095f7145b69352f47143d50de1487df1fd2ad95c3fb2c99471e -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944041-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─2075 /usr/bin/containerd-shim-runc-v2 -namespace moby -id ac2062e9ea4c35161e5666ff940dda6cdc543d5c90ee9bddcdf03ce62abb798c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944059-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─2076 /usr/bin/containerd-shim-runc-v2 -namespace moby -id f5598887fc2ec6f72b63f9dde2a431b1926a2e583120052bdab70d63b8512ac0 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944071-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─2121 /usr/bin/containerd-shim-runc-v2 -namespace moby -id f48f6405056cf12dd53a7c7616f0724041bffb071096971cba2efe70a5937c85 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944077-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─2158 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 3625e0c5b97f2deb857189cf5c6c9006971ce1ecb5a49a72bcdb878d8522039e -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944081-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─2906 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5b82e0dad275e85ee41e26039cb930fa3e8c6e3b84cf71a89e605c63131d23f6 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─2994 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 81cc41aff077ae63ce24ccec5903f47223a9055a53926f5ba5db708360cdf878 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944092-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─3115 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 50315cc401d714bf4954a72492b78dfafaf33c1a3475e68c2daf04018a575eba -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944096-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─3157 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 7668604a097fefb6b97223948daef1cde5acf171c86282791c75aad1dc3e24e1 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944101-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─3392 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 54db07dbab086fbb270089b87de64cffd949dfb788979ac5f9335cb4315d5d75 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944105-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─3432 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 2665f8739c5e00d0bd37fdb19d3114481107ec1456871d9886320d74cf80beba -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.94411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─3989 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944434-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─4137 /usr/bin/containerd-shim-runc-v2 -namespace moby -id ef8cda3c6e7869fabca17738fc818af9ff3253c6273b0c2ec3718d94a7db6795 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:39:03.944443-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.944446-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:37:58.409208246Z\" level=info msg=\"cleaning up dead shim\"\r\n"} +{"Time":"2023-05-31T12:39:03.944449-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:37:58 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:37:58.422050490Z\" level=warning msg=\"cleanup warnings time=\\\"2023-05-31T19:37:58Z\\\" level=info msg=\\\"starting signal loop\\\" namespace=moby pid=3639 runtime=io.containerd.runc.v2\\n\"\r\n"} +{"Time":"2023-05-31T12:39:03.944453-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:38:29.807543799Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:39:03.944456-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:38:29.807613426Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:39:03.944459-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:38:29.807623122Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:39:03.944462-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:29 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:38:29.808210358Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/5f471f76682cd3f6729ea1eda0a3adab953bd00daec3a4093cf425b6e993800f pid=3989 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:39:03.944465-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:35 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:38:35.332727211Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:39:03.944468-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:35 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:38:35.332994579Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:39:03.944471-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:35 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:38:35.333004289Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:39:03.944874-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:38:35 enable-default-cni-996000 containerd[823]: time=\"2023-05-31T19:38:35.333171233Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/ef8cda3c6e7869fabca17738fc818af9ff3253c6273b0c2ec3718d94a7db6795 pid=4137 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:39:03.944879-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.944882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.944884-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:39:03.944888-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.944891-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:39:03.944893-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.944896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:39:03.944898-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:39:03.944904-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:39:03.944906-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.944908-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:39:03.94491-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.944912-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:39:03.944915-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:39:03.944917-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:39:03.94492-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:39:03.944922-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:39:03.944924-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.944926-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:39:03.945406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:39:03.945413-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:39:03.945418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:39:03.945421-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.945425-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.945429-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:39:03.945433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:39:03.945437-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.94544-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:39:03.945444-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:39:03.945449-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:39:03.945453-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:39:03.945456-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:39:03.94546-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:39:03.945464-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:39:03.945468-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.945472-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.945476-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.94548-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:39:03.945484-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:39:03.945487-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.945491-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:39:03.945495-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.945499-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:39:03.945503-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:39:03.945845-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.945851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.945854-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:39:03.945857-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:39:03.945859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.945862-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:39:03.945864-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:39:03.945867-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:39:03.945869-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.945872-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:39:03.945875-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.945877-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:39:03.945879-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:39:03.945882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:39:03.945884-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:39:03.945886-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:39:03.945889-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.945891-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:39:03.945894-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:39:03.945897-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:39:03.945901-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:39:03.945904-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.946333-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.946342-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:39:03.946346-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:39:03.94635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.946354-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:39:03.946357-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:39:03.94636-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:39:03.946363-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:39:03.946366-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:39:03.946369-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:39:03.946373-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:39:03.946377-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.94638-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.946384-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.946387-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:39:03.946391-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:39:03.946395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.946399-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:39:03.946402-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.946406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:39:03.946411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:39:03.946415-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.946419-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.946423-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:39:03.946736-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:39:03.946742-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:39:03.946745-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:39:03.946747-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:39:03.946749-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:39:03.946751-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.946754-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:39:03.946756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:39:03.946759-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.946761-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.946763-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:39:03.946765-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:39:03.946769-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.946772-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:39:03.946775-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.946779-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.946783-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.946786-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.94679-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.946793-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:39:03.946796-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.946799-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:39:03.946803-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.946806-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:39:03.94681-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.946814-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.946817-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:39:03.947185-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:39:03.947213-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:39:03.947219-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:39:03.947223-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.947226-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:39:03.947229-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:39:03.947232-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:39:03.947236-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:39:03.947239-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:39:03.947242-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:39:03.947245-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:39:03.947248-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.947251-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:39:03.947254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:39:03.947257-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:39:03.947261-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.947265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:39:03.94727-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.947275-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.947279-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.947283-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:39:03.947291-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:39:03.947656-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:39:03.947665-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:39:03.947669-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:39:03.947674-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.947678-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:39:03.947682-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:39:03.947686-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:39:03.94769-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.947694-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:39:03.947698-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:39:03.947702-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.947706-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:39:03.94771-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:39:03.947728-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:39:03.947738-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:39:03.947743-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:39:03.947746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:39:03.94775-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:39:03.947754-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:39:03.947757-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.947761-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.947765-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:39:03.947782-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:39:03.947789-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:39:03.947968-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:39:03.947974-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.947977-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:39:03.94798-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:39:03.947982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:39:03.947984-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.947986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:39:03.947989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.947991-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:39:03.947993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.947996-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.947998-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:39:03.948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948015-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.94802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.948023-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948025-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.948027-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948031-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:39:03.948034-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:39:03.948036-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.948038-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:39:03.948041-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:39:03.948043-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948045-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948229-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948236-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948239-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.948242-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948245-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:39:03.948249-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948252-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:39:03.948255-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948259-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:39:03.948262-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:39:03.94827-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:39:03.948275-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:39:03.948278-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:39:03.948282-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:39:03.948286-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:39:03.9483-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948309-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:39:03.948314-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:39:03.948319-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:39:03.948323-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:39:03.948326-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:39:03.948328-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:39:03.94833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:39:03.948333-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:39:03.948335-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:39:03.948414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:39:03.948422-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:39:03.948427-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:39:03.948431-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:39:03.948434-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:39:03.948451-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:39:03.948459-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:39:03.948462-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:39:03.948464-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:39:03.948483-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:39:03.948485-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:39:03.948488-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.94849-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:39:03.948492-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:39:03.948495-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:39:03.948497-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.9485-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948502-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:39:03.948505-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:39:03.948507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:39:03.94851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948657-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948665-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:39:03.94867-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948674-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:39:03.948678-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.948696-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:39:03.9487-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:39:03.948702-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:39:03.948705-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:39:03.948707-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:39:03.94871-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948713-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:39:03.948717-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948721-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948728-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:39:03.948734-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:39:03.948739-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:39:03.948743-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:39:03.94875-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.94876-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948764-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948767-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.94877-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:39:03.948942-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948951-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:39:03.948955-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.948959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:39:03.948963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948971-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:39:03.948975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:39:03.948979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:39:03.948983-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:39:03.948986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.94899-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948994-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.948998-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:39:03.949001-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:39:03.949009-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:39:03.949012-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949016-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:39:03.94902-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.949024-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.949027-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:39:03.949412-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:39:03.949419-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:39:03.949425-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:39:03.949433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.949437-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.949453-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.94946-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.949463-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949465-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:39:03.949468-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.94947-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:39:03.949473-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:39:03.949475-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:39:03.94948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:39:03.949485-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949489-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:39:03.949495-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949503-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:39:03.94951-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:39:03.94952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949524-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:39:03.949833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949842-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:39:03.949847-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.949851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.949855-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949858-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:39:03.949863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:39:03.949866-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.94987-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:39:03.949874-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:39:03.949878-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:39:03.949885-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:39:03.949889-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:39:03.949893-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949897-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:39:03.949901-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:39:03.949904-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949908-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:39:03.949915-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:39:03.949918-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.949922-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:39:03.949926-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:39:03.94993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.949934-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950121-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:39:03.950127-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:39:03.95013-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950132-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950135-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950138-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:39:03.95014-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950142-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950145-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950147-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.95015-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950153-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950172-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.95018-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950185-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950189-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950193-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950201-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950205-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950209-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:39:03.950212-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950216-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:39:03.950389-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950423-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950428-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950435-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.95044-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950445-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950449-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950454-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950459-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950464-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950468-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:39:03.950473-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950482-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950498-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950504-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950508-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950512-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:39:03.950518-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.950522-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950526-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:39:03.950529-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950533-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:39:03.950536-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950675-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950682-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950685-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950688-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:39:03.95069-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:39:03.950693-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950695-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950698-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:39:03.9507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950703-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:39:03.950706-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:39:03.950709-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:39:03.950711-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950713-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:39:03.950716-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:39:03.950719-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:39:03.950721-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:39:03.950724-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:39:03.950726-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:39:03.950729-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.950731-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:39:03.950734-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.95093-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.950942-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:39:03.95095-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.950959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.950966-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:39:03.950971-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:39:03.950976-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: loaded (\u001b]8;;file://enable-default-cni-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:39:03.950985-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:39:03.950994-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:39:03.951-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:39:03.951005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.951011-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.951018-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:39:03.951025-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:39:03.951035-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:39:03.951042-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:39:03.951046-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:39:03.95105-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:39:03.951054-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:39:03.951059-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:39:03.951064-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.951068-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:39:03.951073-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:39:03.951274-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:39:03.951284-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:39:03.951288-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:39:03.951291-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:39:03.951295-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:39:03.951299-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:39:03.951303-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:39:03.951306-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:39:03.951324-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:39:03.951329-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.951333-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:39:03.951338-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:39:03.951342-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:39:03.951346-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:39:03.95135-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:39:03.951353-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:39:03.951357-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.951361-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:39:03.951365-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:39:03.951369-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:39:03.951372-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.951376-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.951381-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:39:03.951386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:39:03.95139-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:39:03.951394-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.951931-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:39:03.951938-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.951941-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:39:03.951944-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:39:03.951946-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.951949-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.951951-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:39:03.951954-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.951957-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.951959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:39:03.951961-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.951964-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:39:03.951966-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:39:03.951969-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:39:03.951971-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:39:03.951973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.951976-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:39:03.951978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.951983-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:39:03.951985-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:39:03.951987-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:39:03.95199-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:39:03.951992-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.952571-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:39:03.952581-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:39:03.952586-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:39:03.952606-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:39:03.952616-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:39:03.952621-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.952625-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:39:03.952629-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:39:03.952632-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:39:03.952636-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.952642-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:39:03.952646-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:39:03.95265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.952654-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:39:03.952658-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:39:03.952661-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:39:03.952665-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.952668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:39:03.952672-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:39:03.952676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:39:03.95268-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.952683-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.952689-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:39:03.953305-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:39:03.953314-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:39:03.953318-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.953322-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:39:03.953327-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:39:03.953331-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:39:03.953339-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:39:03.953344-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.953349-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:39:03.953354-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:39:03.953358-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:39:03.953362-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:39:03.953385-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.95339-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:39:03.953395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:39:03.953399-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:39:03.953403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.953411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:39:03.953419-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:39:03.953429-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:39:03.953436-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:39:03.953967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.953979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:39:03.95401-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:39:03.954022-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.95405-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:39:03.95406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:39:03.954068-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954073-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:39:03.954076-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:39:03.954082-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:39:03.95409-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:39:03.954094-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:39:03.954098-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954102-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:39:03.954106-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:39:03.954109-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954113-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:39:03.954119-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.954122-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954126-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:39:03.95413-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:39:03.954133-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:39:03.954587-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.954598-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954604-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:39:03.954609-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:39:03.954612-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.954616-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954619-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:39:03.954623-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:39:03.954628-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:39:03.954632-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.954636-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.95464-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:39:03.954644-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:39:03.954648-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954655-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:39:03.954659-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:39:03.954664-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:39:03.954672-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:39:03.954681-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:39:03.954686-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.954693-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:39:03.955267-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:39:03.955276-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:39:03.955281-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:39:03.955284-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:39:03.955287-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.95529-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.955294-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:39:03.955297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:39:03.955301-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.955305-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:39:03.955309-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.955313-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:39:03.955317-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.955321-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:39:03.955325-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:39:03.955329-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:39:03.955334-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.955338-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.955342-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:39:03.955349-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:39:03.955355-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.955359-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.955917-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:39:03.955923-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:39:03.955926-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:39:03.95593-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:39:03.955933-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.955937-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.955941-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:39:03.955945-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:39:03.955951-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:39:03.955955-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:39:03.955959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.955963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.955967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:39:03.955971-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:39:03.955974-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.955978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:39:03.955985-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:39:03.955989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.955993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.955997-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.956001-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:39:03.956005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:39:03.956009-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:39:03.957035-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:39:03.957046-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:39:03.957053-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.957058-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:39:03.957062-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:39:03.957067-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:39:03.957071-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:39:03.957075-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.957079-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:39:03.957083-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.957086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:39:03.957107-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:39:03.957115-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.957134-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.957144-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:39:03.957153-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:39:03.957158-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:39:03.957163-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.957166-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:39:03.957171-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.957175-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.958054-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.958094-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:39:03.958099-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:39:03.958104-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.958109-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:39:03.958113-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.958117-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.958122-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:39:03.958129-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:39:03.958188-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:39:03.958208-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:39:03.958214-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:39:03.958221-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:39:03.958246-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:39:03.958257-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:39:03.958261-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:39:03.958264-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:39:03.958267-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:39:03.958283-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:39:03.95829-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:39:03.958295-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.958299-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.958305-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:39:03.958312-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:39:03.958317-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:39:03.958667-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.958676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:39:03.958681-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:39:03.958685-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:39:03.958693-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.958697-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.958701-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:39:03.958706-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:39:03.958711-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:39:03.958715-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:39:03.958719-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.958722-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.958729-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:39:03.958733-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:39:03.958739-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:39:03.958742-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:39:03.958746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:39:03.95875-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.958754-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.958759-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:39:03.958762-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:39:03.958766-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:39:03.959262-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:39:03.959285-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.959312-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.959317-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:39:03.959321-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:39:03.959326-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:39:03.95933-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:39:03.959374-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.959382-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:39:03.959387-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:39:03.959392-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:39:03.959396-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:39:03.959419-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.959424-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.959429-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:39:03.959433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:39:03.959438-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:39:03.959453-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.95946-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:39:03.959464-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:39:03.959468-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:39:03.959472-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.959476-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:39:03.959903-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:39:03.959911-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:39:03.959915-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:39:03.95992-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.959925-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.959929-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.959933-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:39:03.959937-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:39:03.959941-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:39:03.959946-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.95995-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:39:03.959954-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:39:03.959959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:39:03.959963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:39:03.959968-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:39:03.959974-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.959978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:39:03.959984-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:39:03.959987-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.959993-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:39:03.96-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:39:03.960378-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.960388-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:39:03.960393-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:39:03.960397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.960402-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:39:03.960406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.960411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.960415-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:39:03.96042-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:39:03.960424-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.960428-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:39:03.960433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:39:03.960437-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.960441-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:39:03.960445-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.960452-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:39:03.960476-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.960483-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.960487-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.960493-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:39:03.960497-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:39:03.960501-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:39:03.960504-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.961141-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.961191-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:39:03.961197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:39:03.961201-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:39:03.961206-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.96121-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.961213-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:39:03.961217-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:39:03.961223-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:39:03.961228-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:39:03.961233-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.961237-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:39:03.961241-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:39:03.961245-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:39:03.961249-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:39:03.961254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.961257-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:39:03.961261-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:39:03.961265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:39:03.961269-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:39:03.961273-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.961277-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:39:03.961878-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:39:03.961902-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:39:03.961928-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:39:03.961938-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:39:03.961943-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.961948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:39:03.961953-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:39:03.961958-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:39:03.961962-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.961966-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.96197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:39:03.961976-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:39:03.96198-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:39:03.961984-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.961989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:39:03.962006-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.962012-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.962016-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:39:03.962021-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:39:03.962025-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:39:03.962032-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.962036-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.962517-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:39:03.962526-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:39:03.962531-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:39:03.962536-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:39:03.96254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:39:03.962544-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:39:03.96257-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:39:03.962577-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.962581-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.962586-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:39:03.96259-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:39:03.962594-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:39:03.962598-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:39:03.962602-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.962606-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:39:03.962611-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:39:03.962617-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:39:03.962625-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:39:03.96263-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:39:03.962635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:39:03.962639-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:39:03.963124-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:39:03.963135-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:39:03.963141-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:39:03.963147-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:39:03.963151-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:39:03.963156-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:39:03.963161-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:39:03.963165-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:39:03.96317-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:39:03.963174-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:39:03.963178-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:39:03.963182-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:39:03.963186-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:39:03.963191-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:39:03.963196-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:39:03.9632-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:39:03.963205-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:39:03.963209-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:39:03.963214-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:39:03.963218-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:39:03.963746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:39:03.963777-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:39:03.963788-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:39:03.963793-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:39:03.963798-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:39:03.963802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.963842-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.963868-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:39:03.963882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.963895-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:39:03.963926-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.96395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.963955-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.963959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \r\n"} +{"Time":"2023-05-31T12:39:03.963963-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:39:03.963968-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:39:03.963977-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.964012-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \r\n"} +{"Time":"2023-05-31T12:39:03.964017-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.964021-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \r\n"} +{"Time":"2023-05-31T12:39:03.964026-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:39:03.96403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:39:03.964036-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.964302-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \r\n"} +{"Time":"2023-05-31T12:39:03.964328-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:39:03.964337-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.964346-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \r\n"} +{"Time":"2023-05-31T12:39:03.964352-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.964357-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:39:03.964361-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:39:03.964365-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:39:03.964369-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.964373-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:39:03.964377-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:39:03.964382-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:39:03.964386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.96439-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:39:03.964395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:39:03.9644-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.964404-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:39:03.964408-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:39:03.964412-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.964415-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:39:03.964421-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:39:03.964425-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.964429-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:39:03.964433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:39:03.964979-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:39:03.96499-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:39:03.965053-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:39:03.965064-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:39:03.96507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:39:03.965075-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:39:03.96508-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:39:03.965107-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:39:03.965118-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:39:03.965144-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:39:03.965155-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:39:03.96516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:39:03.965164-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:39:03.965168-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:39:03.965172-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:39:03.965176-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:39:03.965181-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:39:03.965185-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:39:03.965189-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:39:03.96548-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:39:03.965507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:39:03.965513-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:39:03.965518-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \r\n"} +{"Time":"2023-05-31T12:39:03.965522-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.965527-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:39:03.965581-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.96559-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:39:03.965594-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:39:03.965604-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:39:03.965611-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:39:03.965615-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:39:03.96562-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:39:03.965631-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.965651-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:39:03.965695-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:39:03.965706-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.965712-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:39:03.965716-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:39:03.96572-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.965724-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.965729-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:39:03.966125-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.966134-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:39:03.966137-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.96617-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:39:03.96618-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:39:03.966186-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.96619-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.966194-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.966198-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:39:03.966203-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:39:03.966207-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:39:03.966211-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.966216-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:39:03.966221-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.966226-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:39:03.96623-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:39:03.966234-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:39:03.966238-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:39:03.966243-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:39:03.966247-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.966251-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.966255-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:39:03.96681-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:39:03.96682-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:39:03.966828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:39:03.966835-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.966839-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.966848-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:39:03.966852-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:39:03.966856-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:39:03.966861-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.966865-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:39:03.966871-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.966875-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.966885-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:39:03.966896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:39:03.966905-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:39:03.966915-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.966924-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:39:03.966944-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:39:03.966953-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.966959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.966964-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:39:03.966969-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:39:03.966973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.967545-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:39:03.967566-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:39:03.967572-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:39:03.967579-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.967584-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.967588-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:39:03.967592-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:39:03.967596-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.967601-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:39:03.967606-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:39:03.967611-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.967617-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:39:03.967623-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:39:03.967628-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:39:03.967633-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:39:03.967637-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:39:03.967641-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:39:03.967645-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:39:03.96765-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.967654-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:39:03.967658-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:39:03.967662-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:39:03.967666-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:39:03.968124-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:39:03.968136-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:39:03.968145-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:39:03.968151-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:39:03.968156-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:39:03.96816-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.968164-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:39:03.96818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:39:03.968188-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.968192-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:39:03.968197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.968202-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.968205-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.96821-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.968214-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.968218-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.968222-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.968226-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.96823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.968234-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:39:03.968238-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:39:03.968243-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.96825-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:39:03.968254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.968863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.968882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:39:03.968895-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:39:03.968905-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:39:03.968913-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:39:03.968922-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.968931-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.96894-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:39:03.968948-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:39:03.968956-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.968961-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.968965-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:39:03.968969-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:39:03.968973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.968977-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:39:03.968982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:39:03.968986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.96899-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:39:03.968995-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:39:03.968999-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.969003-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:39:03.969007-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:39:03.96901-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.969017-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:39:03.969708-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:39:03.969718-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.969723-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:39:03.969728-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:39:03.969732-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:39:03.969737-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.969741-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.969746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.96975-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:39:03.969768-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:39:03.855008791Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:39:03.96978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:39:03.969787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:39:03.969794-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:39:03.969798-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:39:03.969802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.969807-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:39:03.969811-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.969815-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:39:03.96982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:39:03.969825-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:39:03.970549-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:39:03.97056-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.970593-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:39:03.970604-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:39:03.970608-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:39:03.970612-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:39:03.970615-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:39:03.970622-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.970626-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:39:03.97063-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:39:03.970635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:39:03.970639-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.970643-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:39:03.970653-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:39:03.970663-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.970669-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:39:03.970676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:39:03.970684-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.970697-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.970704-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:39:03.970711-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:39:03.97072-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:39:03.970943-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.970951-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.970956-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:39:03.97096-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:39:03.970964-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:39:03.97097-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.970974-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:39:03.970978-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:39:03.970982-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:39:03.970989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:39:03.971016-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971026-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:39:03.971048-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:39:03.971077-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:39:03.971086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:39:03.971094-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971099-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:39:03.971104-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:39:03.97111-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:39:03.971114-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971118-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:39:03.971124-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:39:03.971444-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:39:03.971453-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:39:03.971457-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971462-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:39:03.971467-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:39:03.971472-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:39:03.971481-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:39:03.971486-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.97149-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:39:03.971494-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:39:03.971498-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971502-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:39:03.971507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:39:03.97153-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:39:03.971535-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:39:03.971544-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:39:03.971549-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971554-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:39:03.971559-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.971563-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971568-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:39:03.971839-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:39:03.971858-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:39:03.971864-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.971868-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971873-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:39:03.971879-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:39:03.971885-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.971889-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971893-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:39:03.971898-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:39:03.971903-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:39:03.971907-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.971915-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971924-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:39:03.971929-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:39:03.971933-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971954-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:39:03.971962-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:39:03.971967-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.971973-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:39:03.971977-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:39:03.971981-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:39:03.972416-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.972427-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:39:03.972431-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:39:03.972439-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:39:03.972444-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:39:03.972448-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:39:03.972452-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.972456-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.97246-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:39:03.972466-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:39:03.97247-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.972474-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:39:03.972494-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.972504-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:39:03.972509-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.972514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:39:03.972534-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:39:03.972548-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:39:03.972554-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.972558-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.972565-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:39:03.97257-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:39:03.972574-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.97291-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.972919-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:39:03.972925-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:39:03.972929-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:39:03.97295-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:39:03.97297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.97298-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.972986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:39:03.973022-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:39:03.97303-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:39:03.973067-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:39:03.973075-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.973082-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.973086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:39:03.973091-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:39:03.973095-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.973099-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:39:03.973104-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:39:03.973108-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.973112-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.973116-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.97312-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:39:03.973386-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:39:03.973396-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:39:03.973401-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:39:03.973405-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:39:03.973409-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.973414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:39:03.973418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:39:03.973422-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:39:03.973427-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:39:03.973432-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.973436-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:39:03.973441-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.973445-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:39:03.973451-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:39:03.973455-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.973459-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.973463-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:39:03.973469-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:39:03.973474-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:39:03.973479-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.973483-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:39:03.973488-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.973985-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.973997-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.974002-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:39:03.974006-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:39:03.974013-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.974022-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:39:03.974028-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.974032-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.974036-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:39:03.97404-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:39:03.974044-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:39:03.974048-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:39:03.974052-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:39:03.974056-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:39:03.97406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:39:03.974064-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:39:03.974072-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:39:03.974078-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:39:03.974083-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:39:03.974087-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:39:03.974091-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:39:03.974095-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.974099-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.974103-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:39:03.974635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:39:03.974646-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:39:03.974651-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.974655-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:39:03.97466-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:39:03.974664-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:39:03.974668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.974672-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.974676-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:39:03.97468-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:39:03.974684-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:39:03.974688-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:39:03.974692-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.974696-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.9747-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:39:03.974705-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:39:03.974713-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:39:03.974718-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:39:03.974749-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:39:03.974756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.974761-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.974765-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:39:03.975108-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:39:03.975116-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:39:03.97512-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:39:03.975125-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.975129-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.975134-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:39:03.975138-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:39:03.975143-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:39:03.975147-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:39:03.975152-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.975156-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:39:03.97516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:39:03.975176-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:39:03.975186-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:39:03.975191-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.975195-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.975199-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:39:03.975203-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:39:03.975224-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:39:03.975229-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.975233-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:39:03.975237-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:39:03.975241-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:39:03.97568-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.975705-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:39:03.975718-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:39:03.975726-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:39:03.975747-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:39:03.975754-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.975759-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.975764-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.975768-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:39:03.975772-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:39:03.975833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:39:03.975846-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.975868-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:39:03.975873-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:39:03.975878-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:39:03.975882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:39:03.975886-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:39:03.975904-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.97593-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:39:03.975943-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:39:03.975954-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:39:03.976264-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:39:03.976269-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976273-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:39:03.976286-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:39:03.976291-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976294-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:39:03.976303-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.976307-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976311-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:39:03.976315-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:39:03.976319-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976324-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:39:03.976328-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:39:03.976333-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.976337-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:39:03.976342-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976346-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:39:03.97635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.976354-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.976358-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976362-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:39:03.976368-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:39:03.976772-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:39:03.976782-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.976787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976791-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:39:03.976796-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:39:03.9768-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:39:03.976803-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.976809-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976813-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:39:03.976817-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:39:03.976821-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:39:03.976824-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:39:03.976828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976832-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:39:03.976836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:39:03.97684-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:39:03.976844-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:39:03.976847-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.976851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:39:03.976855-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:39:03.976859-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:39:03.976863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:39:03.977477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.977487-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:39:03.977492-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:39:03.9775-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:39:03.977505-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:39:03.97751-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:39:03.977514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.977519-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:39:03.977524-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:39:03.97753-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:39:03.977535-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.977539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.977544-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:39:03.977549-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:39:03.977553-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:39:03.977557-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.977561-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:39:03.977566-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.977569-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.977574-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:39:03.977578-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:39:03.977583-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:39:03.978002-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.978013-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.978018-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:39:03.978023-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:39:03.978039-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:39:03.978048-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:39:03.978054-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:39:03.978059-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:39:03.978063-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:39:03.978068-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.978072-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.978076-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:39:03.978079-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:39:03.978081-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:39:03.978084-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:39:03.978088-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.978093-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:39:03.978097-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:39:03.978101-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:39:03.978109-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:39:03.978142-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:39:03.97856-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:39:03.978571-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:39:03.978576-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:39:03.978596-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:39:03.978601-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:39:03.978605-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:39:03.97861-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:39:03.978614-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:39:03.978621-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:39:03.978626-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:39:03.978631-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:39:03.978634-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:39:03.978638-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:39:03.978642-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:39:03.978647-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:39:03.978652-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:39:03.978656-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:39:03.978687-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:39:03.978696-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:39:03.978701-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:39:03.979217-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:39:03.979245-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:39:03.979251-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:39:03.979255-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:39:03.97926-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:39:03.979264-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:39:03.979287-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:39:03.979319-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979343-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979354-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:39:03.979361-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.979366-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:39:03.97937-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:39:03.979374-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.979378-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979381-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979388-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.979393-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979397-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.979402-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.979406-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.97941-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979414-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:39:03.979865-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:39:03.979877-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:39:03.979882-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979886-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:39:03.97989-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:39:03.979896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:39:03.9799-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979904-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:39:03.979908-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:39:03.979912-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979916-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:39:03.979936-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:39:03.979942-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979946-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:39:03.979954-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:39:03.979959-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.979968-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:39:03.979976-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:39:03.979984-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:39:03.97999-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:39:03.979995-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:39:03.980499-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:39:03.980511-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:39:03.980516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:39:03.980521-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:39:03.980525-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:39:03.98053-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:39:03.980536-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:39:03.980545-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:39:03.98056-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:39:03.980567-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:39:03.980572-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:39:03.980577-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:39:03.980618-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:39:03.980628-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:39:03.980633-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:39:03.980637-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:39:03.980642-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:39:03.980648-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:39:03.980653-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:39:03.981144-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \r\n"} +{"Time":"2023-05-31T12:39:03.981154-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.981182-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:39:03.981189-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T12:39:03.981195-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:39:03.9812-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:39:03.981205-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:39:03.98121-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:39:03.981214-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:39:03.981221-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:39:03.981232-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.981239-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:39:03.981244-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:39:03.981254-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.981265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:39:03.981276-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:39:03.981284-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.981289-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.981294-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:39:03.981298-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.981302-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:39:03.981307-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.981778-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:39:03.981789-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:39:03.981794-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.981798-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.981804-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.981808-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:39:03.981813-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:39:03.981818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:39:03.981823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:39:03.981828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:39:03.981832-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.981837-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:39:03.981841-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:39:03.981845-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:39:03.981868-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:39:03.981874-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:39:03.981879-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.981883-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.981887-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:39:03.981891-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:39:03.981896-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:39:03.982411-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:39:03.982421-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.982426-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.98243-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:39:03.98244-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:39:03.982445-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:39:03.982482-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.982493-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:39:03.982499-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.982503-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.982508-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:39:03.982512-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:39:03.982516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:39:03.982521-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.982525-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:39:03.98253-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:39:03.982534-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.982539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.982543-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:39:03.982547-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:39:03.982551-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.982556-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:39:03.98256-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:39:03.982565-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:39:03.982971-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.982981-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.982986-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:39:03.982991-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:39:03.982996-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.983001-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:39:03.983005-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:39:03.983009-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.983013-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:39:03.983017-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:39:03.983022-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:39:03.983029-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:39:03.983037-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:39:03.983042-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:39:03.983046-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:39:03.983051-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.983056-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:39:03.98306-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:39:03.983064-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:39:03.983069-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:39:03.983073-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:39:03.983078-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:39:03.983082-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:39:03.983086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:39:03.983537-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:39:03.983548-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.983553-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:39:03.983558-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:39:03.983563-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.983567-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:39:03.983585-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.98359-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.983595-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.9836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.98362-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.98363-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.983635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.983639-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:39:03.983643-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:39:03.983648-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:39:03.983652-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:39:03.983657-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.983677-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:39:03.983686-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.98369-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.983694-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:39:03.983698-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:39:03.983702-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:39:03.984129-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:39:03.984138-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.984144-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.984148-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:39:03.984152-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:39:03.984158-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:39:03.984161-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.984165-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:39:03.984169-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:39:03.984173-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.984177-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:39:03.984181-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:39:03.984184-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.984188-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:39:03.984192-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:39:03.984196-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.984216-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:39:03.984225-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:39:03.98423-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.984234-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:39:03.984239-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:39:03.984243-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.984247-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:39:03.984691-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:39:03.984701-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:39:03.984706-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T12:39:03.98471-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:39:03.984739-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ----------------------- debugLogs end: enable-default-cni-996000 [took: 21.019029798s] --------------------------------\n"} +{"Time":"2023-05-31T12:39:03.984748-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:175: Cleaning up \"enable-default-cni-996000\" profile ...\n"} +{"Time":"2023-05-31T12:39:03.984779-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p enable-default-cni-996000\n"} +{"Time":"2023-05-31T12:39:06.988309-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p enable-default-cni-996000: (3.044426533s)\n"} +{"Time":"2023-05-31T12:39:06.98834-07:00","Action":"cont","Test":"TestNetworkPlugins/group/kubenet"} +{"Time":"2023-05-31T12:39:06.988343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"=== CONT TestNetworkPlugins/group/kubenet\n"} +{"Time":"2023-05-31T12:39:06.988392-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet/Start"} +{"Time":"2023-05-31T12:39:06.9884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"=== RUN TestNetworkPlugins/group/kubenet/Start\n"} +{"Time":"2023-05-31T12:39:06.988475-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-amd64 start -p kubenet-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --network-plugin=kubenet --driver=docker \n"} +{"Time":"2023-05-31T12:39:14.94761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"E0531 12:39:14.947574 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:21.716824-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"E0531 12:39:21.716774 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:49.407121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"E0531 12:39:49.407073 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:49.412271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"E0531 12:39:49.412225 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:49.422374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"E0531 12:39:49.422351 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:49.442921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"E0531 12:39:49.442883 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:49.484025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"E0531 12:39:49.483983 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:49.565733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"E0531 12:39:49.565675 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:49.597606-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p bridge-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=bridge --driver=docker : (53.111952828s)\n"} +{"Time":"2023-05-31T12:39:49.597623-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge/KubeletFlags"} +{"Time":"2023-05-31T12:39:49.597627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/bridge/KubeletFlags\n"} +{"Time":"2023-05-31T12:39:49.597664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p bridge-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:39:49.621106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-darwin-amd64 start -p kubenet-996000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --network-plugin=kubenet --driver=docker : (42.632259045s)\n"} +{"Time":"2023-05-31T12:39:49.621142-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet/KubeletFlags"} +{"Time":"2023-05-31T12:39:49.621146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/kubenet/KubeletFlags\n"} +{"Time":"2023-05-31T12:39:49.621188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-darwin-amd64 ssh -p kubenet-996000 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T12:39:49.725871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/KubeletFlags","Output":"E0531 12:39:49.725839 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:49.973525-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge/NetCatPod"} +{"Time":"2023-05-31T12:39:49.973537-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/bridge/NetCatPod\n"} +{"Time":"2023-05-31T12:39:49.973628-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context bridge-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:39:49.997698-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet/NetCatPod"} +{"Time":"2023-05-31T12:39:49.99771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/kubenet/NetCatPod\n"} +{"Time":"2023-05-31T12:39:49.997763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context kubenet-996000 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T12:39:50.046114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":"E0531 12:39:50.046066 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:50.242253-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/bridge/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:39:50.251581-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-727p5\" [0f465fa8-e058-40d3-8bc3-3a4b7e1078e6] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:39:50.263693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/kubenet/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:39:50.268287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-xsx7b\" [321d7268-1806-47f3-beca-9bd5a788d63b] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T12:39:50.686246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":"E0531 12:39:50.686202 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:51.967756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":"E0531 12:39:51.967697 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:54.527932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":"E0531 12:39:54.527902 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:39:57.258093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-727p5\" [0f465fa8-e058-40d3-8bc3-3a4b7e1078e6] Running\n"} +{"Time":"2023-05-31T12:39:58.274143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-xsx7b\" [321d7268-1806-47f3-beca-9bd5a788d63b] Running\n"} +{"Time":"2023-05-31T12:39:59.649289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":"E0531 12:39:59.649251 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:40:03.256504-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/bridge/NetCatPod: app=netcat healthy within 13.014175044s\n"} +{"Time":"2023-05-31T12:40:03.256519-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge/DNS"} +{"Time":"2023-05-31T12:40:03.256522-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/DNS","Output":"=== RUN TestNetworkPlugins/group/bridge/DNS\n"} +{"Time":"2023-05-31T12:40:03.256631-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context bridge-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:40:03.38893-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge/Localhost"} +{"Time":"2023-05-31T12:40:03.388943-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Localhost","Output":"=== RUN TestNetworkPlugins/group/bridge/Localhost\n"} +{"Time":"2023-05-31T12:40:03.389015-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context bridge-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:40:03.515008-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge/HairPin"} +{"Time":"2023-05-31T12:40:03.51502-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/HairPin","Output":"=== RUN TestNetworkPlugins/group/bridge/HairPin\n"} +{"Time":"2023-05-31T12:40:03.515162-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context bridge-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:40:03.634207-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" net_test.go:209: \"bridge\" test finished in 18m33.832414072s, failed=false\n"} +{"Time":"2023-05-31T12:40:04.271903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/kubenet/NetCatPod: app=netcat healthy within 14.008116434s\n"} +{"Time":"2023-05-31T12:40:04.271937-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet/DNS"} +{"Time":"2023-05-31T12:40:04.271944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/DNS","Output":"=== RUN TestNetworkPlugins/group/kubenet/DNS\n"} +{"Time":"2023-05-31T12:40:04.27205-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context kubenet-996000 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T12:40:04.4052-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet/Localhost"} +{"Time":"2023-05-31T12:40:04.405218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Localhost","Output":"=== RUN TestNetworkPlugins/group/kubenet/Localhost\n"} +{"Time":"2023-05-31T12:40:04.40533-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context kubenet-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T12:40:04.522952-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet/HairPin"} +{"Time":"2023-05-31T12:40:04.522964-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/HairPin","Output":"=== RUN TestNetworkPlugins/group/kubenet/HairPin\n"} +{"Time":"2023-05-31T12:40:04.52311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context kubenet-996000 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T12:40:04.635012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" net_test.go:209: \"kubenet\" test finished in 18m34.833236531s, failed=false\n"} +{"Time":"2023-05-31T12:40:09.889517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"E0531 12:40:09.889472 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:40:23.34219-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:40:23.342202-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ----------------------- debugLogs start: bridge-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:40:23.342207-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:40:23.34221-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:40:23.342212-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:40:23.342214-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342216-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:40:23.342218-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:40:23.34222-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342222-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342224-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342226-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:40:23.342228-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:40:23.34223-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342233-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:40:23.342236-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:40:23.342238-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.34224-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342242-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:40:23.342244-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:40:23.342246-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:40:23.342248-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.34225-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342252-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:40:23.342254-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:40:23.342256-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:40:23.342258-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:40:23.34226-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:40:23.342262-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:40:23.342264-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:40:23.342266-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:40:23.342268-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 10.244.0.4\tnetcat-7458db8b8-727p5\n"} +{"Time":"2023-05-31T12:40:23.34227-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342272-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342274-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:40:23.342276-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:40:23.342278-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:40:23.34228-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:40:23.342281-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342283-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342285-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:40:23.342287-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:40:23.342289-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.342291-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:40:23.342293-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:40:23.342295-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:40:23.342297-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.342299-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:40:23.342301-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:40:23.342303-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:40:23.342305-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:40:23.342307-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.342309-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:40:23.342311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:40:23.342314-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.342316-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:40:23.342318-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:40:23.34232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:40:23.342322-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:40:23.342325-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.342329-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:40:23.342332-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342335-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342337-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:40:23.34234-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:40:23.342343-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:40:23.342345-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:40:23.342347-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:40:23.342349-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:40:23.342351-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:40:23.342353-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.76.2\tbridge-996000\r\n"} +{"Time":"2023-05-31T12:40:23.342355-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:40:23.342357-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.76.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:40:23.34236-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342363-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342366-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:40:23.342369-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:40:23.342372-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:40:23.342375-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342378-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342381-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:40:23.342384-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:40:23.342388-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node/bridge-996000 Ready control-plane 50s v1.27.2 192.168.76.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:40:23.342391-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342395-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:40:23.342399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 49s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342403-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default service/netcat ClusterIP 10.106.234.70 \u003cnone\u003e 8080/TCP 20s app=netcat\n"} +{"Time":"2023-05-31T12:40:23.342406-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 47s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:23.342409-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342412-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:40:23.342416-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default endpoints/kubernetes 192.168.76.2:8443 49s\n"} +{"Time":"2023-05-31T12:40:23.342422-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default endpoints/netcat 10.244.0.4:8080 20s\n"} +{"Time":"2023-05-31T12:40:23.342429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 33s\n"} +{"Time":"2023-05-31T12:40:23.342436-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system endpoints/kube-dns 10.244.0.3:53,10.244.0.3:53,10.244.0.3:9153 35s\n"} +{"Time":"2023-05-31T12:40:23.342444-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342453-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:40:23.34246-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 47s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.342468-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342472-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:40:23.342476-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default deployment.apps/netcat 1/1 1 1 20s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:40:23.34248-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system deployment.apps/coredns 1/1 1 1 47s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:23.342484-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342488-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:40:23.342492-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default pod/netcat-7458db8b8-727p5 1/1 Running 0 20s 10.244.0.4 bridge-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342496-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/coredns-5d78c9869d-bwspj 1/1 Running 0 34s 10.244.0.3 bridge-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.3425-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/etcd-bridge-996000 1/1 Running 0 46s 192.168.76.2 bridge-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342504-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/kube-apiserver-bridge-996000 1/1 Running 0 46s 192.168.76.2 bridge-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342508-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/kube-controller-manager-bridge-996000 1/1 Running 0 46s 192.168.76.2 bridge-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342512-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/kube-proxy-6g7sn 1/1 Running 0 35s 192.168.76.2 bridge-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342516-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/kube-scheduler-bridge-996000 1/1 Running 0 48s 192.168.76.2 bridge-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/storage-provisioner 1/1 Running 0 33s 192.168.76.2 bridge-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342521-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342524-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342525-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:40:23.342528-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:40:23.34253-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ff723205c4fbc 20 seconds ago Ready netcat-7458db8b8-727p5 default 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.342532-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 392401e34a7d6 32 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.342535-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 578cc80b60403 34 seconds ago Ready coredns-5d78c9869d-bwspj kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.342537-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7c0d4297b5718 34 seconds ago NotReady coredns-5d78c9869d-ghsxs kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.34254-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 4f33bfc727dc9 34 seconds ago Ready kube-proxy-6g7sn kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.342542-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 4dbbb0ffa8a97 53 seconds ago Ready kube-scheduler-bridge-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.342545-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" de285886d7727 53 seconds ago Ready kube-controller-manager-bridge-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.342547-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 904c9b316bbc6 53 seconds ago Ready kube-apiserver-bridge-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.342549-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" c46aecfa20363 53 seconds ago Ready etcd-bridge-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:23.342551-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342553-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342555-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:40:23.342557-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:40:23.34256-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" acd2a815eb0da registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 16 seconds ago Running dnsutils 0 ff723205c4fbc netcat-7458db8b8-727p5\r\n"} +{"Time":"2023-05-31T12:40:23.342563-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" d85e610614691 6e38f40d628db 33 seconds ago Running storage-provisioner 0 392401e34a7d6 storage-provisioner\r\n"} +{"Time":"2023-05-31T12:40:23.342565-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 96da6b5457e7d ead0a4a53df89 34 seconds ago Running coredns 0 578cc80b60403 coredns-5d78c9869d-bwspj\r\n"} +{"Time":"2023-05-31T12:40:23.342568-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7a93b9e068f50 b8aa50768fd67 35 seconds ago Running kube-proxy 0 4f33bfc727dc9 kube-proxy-6g7sn\r\n"} +{"Time":"2023-05-31T12:40:23.34257-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" b1a3dc34780a7 89e70da428d29 54 seconds ago Running kube-scheduler 0 4dbbb0ffa8a97 kube-scheduler-bridge-996000\r\n"} +{"Time":"2023-05-31T12:40:23.342573-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 67784a64edd66 ac2b7465ebba9 54 seconds ago Running kube-controller-manager 0 de285886d7727 kube-controller-manager-bridge-996000\r\n"} +{"Time":"2023-05-31T12:40:23.342575-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 6a13d44e97e99 c5b13e4f7806d 54 seconds ago Running kube-apiserver 0 904c9b316bbc6 kube-apiserver-bridge-996000\r\n"} +{"Time":"2023-05-31T12:40:23.342578-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 9c60c490cf663 86b6af7dd652c 54 seconds ago Running etcd 0 c46aecfa20363 etcd-bridge-996000\r\n"} +{"Time":"2023-05-31T12:40:23.342581-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342583-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342585-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:40:23.342587-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:40:23.342589-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:40:23.342591-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CreationTimestamp: Wed, 31 May 2023 12:39:50 -0700\n"} +{"Time":"2023-05-31T12:40:23.342593-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:40:23.342595-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:40:23.342597-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:40:23.342599-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:40:23.342601-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:40:23.342603-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:40:23.342605-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:40:23.342608-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:40:23.34261-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:40:23.342613-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:23.342616-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:40:23.342619-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:40:23.342622-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.34263-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:23.342634-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:40:23.342637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -c\n"} +{"Time":"2023-05-31T12:40:23.34264-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:40:23.342643-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342646-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342652-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:23.342658-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:40:23.342661-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:40:23.342664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:40:23.342667-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:40:23.34267-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342673-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:40:23.342675-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:23.342677-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:23.342679-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:23.342681-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal ScalingReplicaSet 21s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:40:23.342683-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342685-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:40:23.342689-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: netcat-7458db8b8-727p5\n"} +{"Time":"2023-05-31T12:40:23.342692-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:40:23.342693-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:40:23.342695-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:40:23.342699-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node: bridge-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.342701-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Start Time: Wed, 31 May 2023 12:39:50 -0700\n"} +{"Time":"2023-05-31T12:40:23.342703-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:40:23.342706-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:40:23.342708-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.34271-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:40:23.342712-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T12:40:23.342714-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IPs:\n"} +{"Time":"2023-05-31T12:40:23.342716-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T12:40:23.342718-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:40:23.34272-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:23.342722-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:40:23.342724-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Container ID: docker://acd2a815eb0da24f8db4373aec2f186330956089cd911561ea17447ba0817b21\n"} +{"Time":"2023-05-31T12:40:23.342726-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:40:23.342729-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:40:23.342731-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342733-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342735-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:23.342737-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:40:23.342739-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -c\n"} +{"Time":"2023-05-31T12:40:23.342741-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:40:23.342743-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" State: Running\n"} +{"Time":"2023-05-31T12:40:23.342745-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Started: Wed, 31 May 2023 12:39:56 -0700\n"} +{"Time":"2023-05-31T12:40:23.342747-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:40:23.342749-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:40:23.342751-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342753-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:23.342756-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-qpgqp (ro)\n"} +{"Time":"2023-05-31T12:40:23.342759-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:23.342764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status\n"} +{"Time":"2023-05-31T12:40:23.342769-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:40:23.342773-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready True \n"} +{"Time":"2023-05-31T12:40:23.342776-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:40:23.342783-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:40:23.342792-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:23.342798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-api-access-qpgqp:\n"} +{"Time":"2023-05-31T12:40:23.342804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:40:23.34281-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:40:23.342814-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:23.342817-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:40:23.34282-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:40:23.342822-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:40:23.342824-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342826-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:40:23.342829-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:40:23.342831-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:23.342833-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:23.342836-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:23.34284-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Scheduled 21s default-scheduler Successfully assigned default/netcat-7458db8b8-727p5 to bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.342842-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulling 21s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:40:23.342845-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulled 16s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.114012193s (5.114018389s including waiting)\n"} +{"Time":"2023-05-31T12:40:23.34285-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Created 15s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:40:23.342853-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Started 15s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:40:23.342856-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342859-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342861-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:40:23.342863-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342865-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.342867-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:40:23.342869-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:40:23.342872-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.342876-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CreationTimestamp: Wed, 31 May 2023 12:39:23 -0700\n"} +{"Time":"2023-05-31T12:40:23.342879-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:23.342882-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:40:23.342885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:23.342891-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:40:23.342897-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:40:23.3429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:40:23.342904-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:40:23.34291-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:40:23.342916-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:23.342924-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:40:23.34293-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:23.342933-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" coredns:\n"} +{"Time":"2023-05-31T12:40:23.342935-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:40:23.342937-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:40:23.342939-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:40:23.342941-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Args:\n"} +{"Time":"2023-05-31T12:40:23.342943-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -conf\n"} +{"Time":"2023-05-31T12:40:23.342945-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:40:23.342947-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Limits:\n"} +{"Time":"2023-05-31T12:40:23.342949-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:40:23.342951-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requests:\n"} +{"Time":"2023-05-31T12:40:23.342953-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:40:23.342955-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:40:23.342957-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:40:23.34296-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:40:23.342962-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.342963-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:23.342965-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:40:23.342968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:23.34297-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:40:23.342973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:40:23.342979-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:40:23.342985-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:40:23.342988-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:40:23.342992-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:23.342996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:40:23.343-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:40:23.343004-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:40:23.343007-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:40:23.34301-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.343014-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:40:23.343017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:23.34302-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:23.343024-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:23.343027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal ScalingReplicaSet 36s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:40:23.34303-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal ScalingReplicaSet 36s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:40:23.343032-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.343034-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.343036-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:40:23.343038-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: coredns-5d78c9869d-bwspj\n"} +{"Time":"2023-05-31T12:40:23.34304-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.343042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:40:23.343044-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:40:23.343046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:40:23.34305-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node: bridge-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.343054-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Start Time: Wed, 31 May 2023 12:39:36 -0700\n"} +{"Time":"2023-05-31T12:40:23.343057-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:23.343061-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:40:23.343066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.343072-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:40:23.343075-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:40:23.343078-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IPs:\n"} +{"Time":"2023-05-31T12:40:23.34308-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T12:40:23.343083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:40:23.343085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:23.343087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" coredns:\n"} +{"Time":"2023-05-31T12:40:23.343089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Container ID: docker://96da6b5457e7d7fdbb87d8b23e69ea264d6af41ca3f144cc61e084a20b0e369b\n"} +{"Time":"2023-05-31T12:40:23.343091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:40:23.343093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:40:23.343096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:40:23.343102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:40:23.343104-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Args:\n"} +{"Time":"2023-05-31T12:40:23.343106-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -conf\n"} +{"Time":"2023-05-31T12:40:23.343108-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:40:23.343325-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" State: Running\n"} +{"Time":"2023-05-31T12:40:23.343485-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Started: Wed, 31 May 2023 12:39:37 -0700\n"} +{"Time":"2023-05-31T12:40:23.343493-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:40:23.343514-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:40:23.343522-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Limits:\n"} +{"Time":"2023-05-31T12:40:23.343526-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:40:23.343529-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requests:\n"} +{"Time":"2023-05-31T12:40:23.343531-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:40:23.343543-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:40:23.343552-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:40:23.343567-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:40:23.343573-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.343575-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:23.343578-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:40:23.34358-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-jwgnt (ro)\n"} +{"Time":"2023-05-31T12:40:23.343583-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:23.343585-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status\n"} +{"Time":"2023-05-31T12:40:23.343587-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:40:23.343589-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready True \n"} +{"Time":"2023-05-31T12:40:23.343591-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:40:23.343594-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:40:23.343597-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:23.3436-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:40:23.343604-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:40:23.343607-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:40:23.343611-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:40:23.343614-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-api-access-jwgnt:\n"} +{"Time":"2023-05-31T12:40:23.343617-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:40:23.343621-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:40:23.343625-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:23.343629-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:40:23.343632-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:40:23.343636-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:40:23.343639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:40:23.343643-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:40:23.343646-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:40:23.34365-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:40:23.343653-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:40:23.343656-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:23.343659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:23.343663-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:23.343666-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Scheduled 35s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-bwspj to bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.343669-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulled 34s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:40:23.343674-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Created 34s kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:40:23.343677-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Started 34s kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:40:23.34368-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.343684-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.343687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:40:23.34369-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" .:53\n"} +{"Time":"2023-05-31T12:40:23.343694-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/reload: Running configuration SHA512 = 591cf328cccc12bc490481273e738df59329c62c0b729d94e8b61db9961c2fa5f046dd37f1cf888b953814040d180f52594972691cd6ff41be96639138a43908\n"} +{"Time":"2023-05-31T12:40:23.343698-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:40:23.343704-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:40:23.343707-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] Reloading\n"} +{"Time":"2023-05-31T12:40:23.34371-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/reload: Running configuration SHA512 = f869070685748660180df1b7a47d58cdafcf2f368266578c062d1151dc2c900964aecc5975e8882e6de6fdfb6460463e30ebfaad2ec8f0c3c6436f80225b3b5b\n"} +{"Time":"2023-05-31T12:40:23.343713-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] Reloading complete\n"} +{"Time":"2023-05-31T12:40:23.343716-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 127.0.0.1:42839 - 31179 \"HINFO IN 2544814102066174002.2967154238383232434. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.012571215s\n"} +{"Time":"2023-05-31T12:40:23.343719-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.34372-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.343722-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:40:23.343725-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-apiserver-bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.343726-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.343728-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:40:23.34373-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:40:23.343733-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node: bridge-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.343735-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Start Time: Wed, 31 May 2023 12:39:24 -0700\n"} +{"Time":"2023-05-31T12:40:23.343737-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:40:23.343739-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:40:23.343741-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.76.2:8443\n"} +{"Time":"2023-05-31T12:40:23.343757-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/config.hash: 1147292586c1fdb4483c665242e4b7f7\n"} +{"Time":"2023-05-31T12:40:23.343766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/config.mirror: 1147292586c1fdb4483c665242e4b7f7\n"} +{"Time":"2023-05-31T12:40:23.34377-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/config.seen: 2023-05-31T19:39:23.824295618Z\n"} +{"Time":"2023-05-31T12:40:23.343774-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:40:23.343777-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:40:23.343781-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.343784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IPs:\n"} +{"Time":"2023-05-31T12:40:23.343788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.343802-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Controlled By: Node/bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.34381-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:23.343814-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:40:23.343818-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Container ID: docker://6a13d44e97e9916c8be6286a6613cd37d32419fa3eed0d31ca1bdfb2d2eb3819\n"} +{"Time":"2023-05-31T12:40:23.343825-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:40:23.343829-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:40:23.343833-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.343836-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.34384-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:23.343843-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:40:23.343849-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --advertise-address=192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.343851-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:40:23.343853-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:40:23.343856-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:40:23.343859-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:40:23.343863-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:40:23.343866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:40:23.34387-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:40:23.343873-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:40:23.343876-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:40:23.34388-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:40:23.343884-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:40:23.343887-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:40:23.343891-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:40:23.343894-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:40:23.343898-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:40:23.343902-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:40:23.343905-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:40:23.343908-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:40:23.343912-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:40:23.343915-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:40:23.343918-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:40:23.343921-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:40:23.343925-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:40:23.343928-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:40:23.343931-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:40:23.343934-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:40:23.343937-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" State: Running\n"} +{"Time":"2023-05-31T12:40:23.343941-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Started: Wed, 31 May 2023 12:39:17 -0700\n"} +{"Time":"2023-05-31T12:40:23.343944-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:40:23.343947-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:40:23.34395-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requests:\n"} +{"Time":"2023-05-31T12:40:23.343953-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:40:23.343956-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Liveness: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:40:23.343962-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Readiness: http-get https://192.168.76.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:40:23.343965-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Startup: http-get https://192.168.76.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:40:23.343968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.343972-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:23.343975-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:40:23.343983-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:40:23.34399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:40:23.343994-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:40:23.344-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:40:23.344003-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:23.344006-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status\n"} +{"Time":"2023-05-31T12:40:23.344009-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:40:23.344013-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready True \n"} +{"Time":"2023-05-31T12:40:23.344016-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:40:23.344019-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:40:23.344022-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:23.344025-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:40:23.344028-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.344031-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:40:23.344035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:23.344038-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:40:23.344041-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.344045-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:40:23.344048-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:23.344051-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:40:23.344055-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.344058-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:40:23.344061-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:23.344065-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:40:23.344068-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.344071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:40:23.344075-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:23.344078-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:40:23.344081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.344083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:40:23.344085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:23.344087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:40:23.344089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.344091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:40:23.344093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:23.344095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:23.34429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:23.344297-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulled 54s kubelet Container image \"registry.k8s.io/kube-apiserver:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:40:23.344301-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Created 54s kubelet Created container kube-apiserver\n"} +{"Time":"2023-05-31T12:40:23.344318-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Started 54s kubelet Started container kube-apiserver\n"} +{"Time":"2023-05-31T12:40:23.344326-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.344329-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.344333-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:40:23.344336-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:18.004436 1 server.go:551] external host was not specified, using 192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.34434-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:18.005616 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:40:23.344344-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:18.005845 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:40:23.344349-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:18.514211 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:40:23.344367-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:18.536383 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:40:23.344375-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:18.536427 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:40:23.344378-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:18.728160 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344382-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:18.728963 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344386-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:18.729753 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:40:23.34439-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.098861 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344582-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.099368 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:40:23.34459-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.504799 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:40:23.344593-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.527023 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344611-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.527072 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344616-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.527079 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.34462-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.529252 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344623-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.529295 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.531273 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.34463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.531832 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344634-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.531871 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.531877 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.534282 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344641-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.534337 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344643-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.536170 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344645-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.536184 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344648-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.536209 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.34465-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.585146 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344863-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.585229 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344869-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.586893 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344871-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.587512 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344874-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.589773 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344876-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.589810 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344878-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.589816 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344881-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.591308 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344884-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.591343 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344899-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.591349 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344906-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.593050 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344914-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.593088 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344919-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.595638 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344926-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.595679 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344938-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.595684 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344947-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.597162 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.344952-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.597207 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.344959-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.597213 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345224-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.600740 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.345234-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.600780 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345239-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.600785 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345242-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.603045 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.345246-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.604336 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.345249-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.604369 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345253-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.604374 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345257-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.609165 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.34526-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.609180 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345264-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.609185 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345267-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.611781 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.345272-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.611796 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345275-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.611801 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345279-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.614155 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.345282-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.614189 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345286-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:19.627015 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:23.34529-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:19.627056 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:23.345595-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.172759 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:40:23.345602-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.172832 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:40:23.345606-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.173152 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:40:23.34561-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.173767 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:40:23.345614-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.173817 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:40:23.345633-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.173865 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:40:23.345637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.173932 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:40:23.345639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.173939 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:40:23.345641-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174007 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:40:23.345644-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174095 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:40:23.345646-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174005 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:40:23.345648-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174274 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:40:23.34565-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174278 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:40:23.345652-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174289 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:40:23.345655-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174292 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:40:23.345657-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174464 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:40:23.345926-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.174470 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:40:23.345943-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.175113 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:40:23.345947-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.180738 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:40:23.345949-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.180772 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:40:23.345951-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.180805 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:40:23.345953-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.180937 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:40:23.345956-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.183261 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:40:23.345958-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.183273 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:40:23.34596-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.183491 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:40:23.345962-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.183509 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:40:23.345968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.183589 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:40:23.345971-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.183764 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:40:23.345973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.184097 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:40:23.345975-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.184129 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:40:23.345978-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.184144 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:40:23.34598-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.184155 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:40:23.345982-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.184162 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:40:23.345985-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.184218 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:40:23.346289-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.184230 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:40:23.346296-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.283431 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:40:23.3463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.283473 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:40:23.346317-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.283444 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:40:23.346323-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.283594 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:40:23.346328-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.284434 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:40:23.346334-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.284485 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:40:23.346339-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.284501 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:40:23.346345-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.284543 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:40:23.346352-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.285241 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:40:23.346358-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" E0531 19:39:20.287641 1 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"namespaces \\\"kube-system\\\" not found\" interval=\"200ms\"\n"} +{"Time":"2023-05-31T12:40:23.346364-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.317736 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:40:23.346368-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.494255 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.34637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:20.945708 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:40:23.346373-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:21.179316 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:40:23.346399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:21.183651 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:40:23.346403-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:21.183729 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:40:23.346633-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:21.755003 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.346642-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:21.803059 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.346645-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:21.900527 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:40:23.346647-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:39:21.906766 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.76.2]\n"} +{"Time":"2023-05-31T12:40:23.346649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:21.907582 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:40:23.346653-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:21.911759 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.346655-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:22.231483 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:40:23.346657-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:23.698773 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:40:23.346659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:23.708438 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:40:23.346662-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:23.716854 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:40:23.346664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:35.687717 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:40:23.346666-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:35.838075 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:40:23.346668-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:50.205686 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.106.234.70]\n"} +{"Time":"2023-05-31T12:40:23.34667-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.346672-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.346674-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:40:23.346677-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:40:23.346679-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.346682-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:40:23.34709-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:40:23.347095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:40:23.347098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.3471-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T12:40:23.347103-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:40:23.347108-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:40:23.34711-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:40:23.347112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347114-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:40:23.347116-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:40:23.347118-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.34712-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.347122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.347124-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:40:23.347127-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:40:23.347129-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:40:23.347131-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:40:23.347133-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [\r\n"} +{"Time":"2023-05-31T12:40:23.347135-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347137-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:40:23.347139-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T12:40:23.347141-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.347143-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:23.347145-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:23.347147-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.347149-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:23.34749-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347495-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:40:23.347497-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:40:23.347499-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:40:23.347501-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.347503-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:23.347505-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347507-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:40:23.347509-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:23.347511-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347513-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:40:23.347515-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.347517-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:23.347519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.347522-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/cni/net.d/100-crio-bridge.conf.mk_disabled\r\n"} +{"Time":"2023-05-31T12:40:23.347525-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347527-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:40:23.347531-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:40:23.347534-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:40:23.347537-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:40:23.347539-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.347541-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.347544-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.347546-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:40:23.347548-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:40:23.34755-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:40:23.347552-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" { \"dst\": \"0.0.0.0/0\" },\r\n"} +{"Time":"2023-05-31T12:40:23.34782-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" { \"dst\": \"1100:200::1/24\" }\r\n"} +{"Time":"2023-05-31T12:40:23.347838-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ],\r\n"} +{"Time":"2023-05-31T12:40:23.347842-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:40:23.347845-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [{ \"subnet\": \"10.85.0.0/16\" }],\r\n"} +{"Time":"2023-05-31T12:40:23.347847-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [{ \"subnet\": \"1100:200::/24\" }]\r\n"} +{"Time":"2023-05-31T12:40:23.347849-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:23.347851-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.347853-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.347855-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/cni/net.d/1-k8s.conflist\r\n"} +{"Time":"2023-05-31T12:40:23.347857-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.347859-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347861-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:40:23.347864-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"name\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:40:23.347866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:40:23.347868-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.347871-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:40:23.347874-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"bridge\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:40:23.347877-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"addIf\": \"true\",\r\n"} +{"Time":"2023-05-31T12:40:23.347879-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"isDefaultGateway\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.347882-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"forceAddress\": false,\r\n"} +{"Time":"2023-05-31T12:40:23.347884-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.347886-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:40:23.347888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:40:23.34789-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:40:23.347892-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"subnet\": \"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T12:40:23.347894-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.347896-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:23.348115-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.348119-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:40:23.348122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:40:23.348124-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:40:23.348126-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.348128-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.34813-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:23.348132-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.348134-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.348136-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.348138-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:40:23.348142-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:40:23.348145-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:40:23.348149-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:40:23.348152-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:40:23.348154-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 2: tunl0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:40:23.348156-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:40:23.348158-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:40:23.34816-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/tunnel6 :: brd :: permaddr ce96:64a8:6c76::\r\n"} +{"Time":"2023-05-31T12:40:23.348162-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:40:23.348165-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether 02:42:f1:07:8f:fb brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:40:23.348167-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:40:23.34817-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:40:23.348172-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 5: bridge: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:40:23.348422-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether 62:89:c3:fa:f6:46 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:40:23.348449-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" inet 10.244.0.1/16 brd 10.244.255.255 scope global bridge\r\n"} +{"Time":"2023-05-31T12:40:23.348464-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:40:23.348467-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7: vethe46a9b1c@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T12:40:23.348469-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether 62:39:66:ef:9e:47 brd ff:ff:ff:ff:ff:ff link-netnsid 2\r\n"} +{"Time":"2023-05-31T12:40:23.348487-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 8: veth87ea1e97@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T12:40:23.34849-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether be:fa:10:a4:5e:52 brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:40:23.348493-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 325: eth0@if326: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:40:23.348516-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether 02:42:c0:a8:4c:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:40:23.348518-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" inet 192.168.76.2/24 brd 192.168.76.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:40:23.34852-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:40:23.348522-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.348525-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.348527-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:40:23.348529-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default via 192.168.76.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:40:23.348531-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 10.244.0.0/16 dev bridge proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T12:40:23.348534-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:40:23.348536-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.76.0/24 dev eth0 proto kernel scope link src 192.168.76.2 \r\n"} +{"Time":"2023-05-31T12:40:23.348539-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.348541-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.348543-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:40:23.348545-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:40:13 2023\r\n"} +{"Time":"2023-05-31T12:40:23.348973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:40:23.348996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :PREROUTING ACCEPT [15846:57056319]\r\n"} +{"Time":"2023-05-31T12:40:23.348999-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :INPUT ACCEPT [15811:57053521]\r\n"} +{"Time":"2023-05-31T12:40:23.349002-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :FORWARD ACCEPT [35:2798]\r\n"} +{"Time":"2023-05-31T12:40:23.349004-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :OUTPUT ACCEPT [14534:6698274]\r\n"} +{"Time":"2023-05-31T12:40:23.349006-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :POSTROUTING ACCEPT [14569:6701072]\r\n"} +{"Time":"2023-05-31T12:40:23.349009-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349012-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349014-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349016-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:40:23.349019-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Completed on Wed May 31 19:40:13 2023\r\n"} +{"Time":"2023-05-31T12:40:23.349021-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:40:13 2023\r\n"} +{"Time":"2023-05-31T12:40:23.349023-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:40:23.349025-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :INPUT ACCEPT [5740:1285102]\r\n"} +{"Time":"2023-05-31T12:40:23.349027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :FORWARD ACCEPT [16:927]\r\n"} +{"Time":"2023-05-31T12:40:23.349029-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :OUTPUT ACCEPT [5703:1582738]\r\n"} +{"Time":"2023-05-31T12:40:23.349031-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349034-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349036-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349038-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349041-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349044-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349047-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349051-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349055-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349334-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349341-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349346-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:23.349349-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:40:23.349368-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:23.349372-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:23.349395-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:23.349399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:40:23.349413-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:23.349431-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:23.349434-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:40:23.349437-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:40:23.349462-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:23.349465-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:40:23.349468-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:23.349472-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:23.349474-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:23.349476-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:23.349478-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:23.349481-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:40:23.349913-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:23.34992-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:40:23.349922-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:23.349924-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:23.349927-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:40:23.34993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:40:23.349932-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:23.349934-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:23.349937-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:40:23.349939-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Completed on Wed May 31 19:40:13 2023\r\n"} +{"Time":"2023-05-31T12:40:23.349941-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:40:13 2023\r\n"} +{"Time":"2023-05-31T12:40:23.349944-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:40:23.349947-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:40:23.34995-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :INPUT ACCEPT [37:2245]\r\n"} +{"Time":"2023-05-31T12:40:23.349954-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :OUTPUT ACCEPT [46:2785]\r\n"} +{"Time":"2023-05-31T12:40:23.349957-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :POSTROUTING ACCEPT [46:2785]\r\n"} +{"Time":"2023-05-31T12:40:23.34996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :CNI-6ac28df0a7c3227b8bf10f4c - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349963-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :CNI-f4b2724f5d9ab927d131988b - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349967-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.34997-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349977-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.34998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349983-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.349986-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350428-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350464-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-6E7XQMQ4RAYOWTTM - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350474-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-M66F6TD25XSFZOMV - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350476-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-XPTUC4FRAFEFDBGF - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350478-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-ZP3FB6NMPNCO4VBJ - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350482-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-ZXMNUKOKXUTL2MK2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350484-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350486-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350488-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.35049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350492-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350494-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:23.350497-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:23.3505-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:40:23.350503-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:40:23.350505-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:23.350508-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:40:23.35051-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:40:23.350512-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:40:23.350514-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:40:23.350516-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:40:23.350519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A POSTROUTING -s 10.244.0.3/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"578cc80b60403d19ce9ba2a6a305ff1353bd1b372ec0386a99fe300e77644dbf\\\"\" -j CNI-6ac28df0a7c3227b8bf10f4c\r\n"} +{"Time":"2023-05-31T12:40:23.350798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A POSTROUTING -s 10.244.0.4/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349\\\"\" -j CNI-f4b2724f5d9ab927d131988b\r\n"} +{"Time":"2023-05-31T12:40:23.350808-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A CNI-6ac28df0a7c3227b8bf10f4c -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"578cc80b60403d19ce9ba2a6a305ff1353bd1b372ec0386a99fe300e77644dbf\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:23.350813-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A CNI-6ac28df0a7c3227b8bf10f4c ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"578cc80b60403d19ce9ba2a6a305ff1353bd1b372ec0386a99fe300e77644dbf\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:40:23.350817-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A CNI-f4b2724f5d9ab927d131988b -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:23.350821-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A CNI-f4b2724f5d9ab927d131988b ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:40:23.350825-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:23.350829-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:34667\r\n"} +{"Time":"2023-05-31T12:40:23.350831-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:44319\r\n"} +{"Time":"2023-05-31T12:40:23.350833-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 34667 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:40:23.350836-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 44319 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:40:23.350838-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:40:23.35084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:23.350843-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:40:23.350846-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:40:23.350848-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-6E7XQMQ4RAYOWTTM -s 10.244.0.3/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.35085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-6E7XQMQ4RAYOWTTM -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.3:53\r\n"} +{"Time":"2023-05-31T12:40:23.350987-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -s 192.168.76.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.350994-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-M66F6TD25XSFZOMV -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:40:23.350998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -s 10.244.0.4/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.351-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T12:40:23.351016-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-ZP3FB6NMPNCO4VBJ -s 10.244.0.3/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.351019-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-ZP3FB6NMPNCO4VBJ -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.3:9153\r\n"} +{"Time":"2023-05-31T12:40:23.351022-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-ZXMNUKOKXUTL2MK2 -s 10.244.0.3/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.351024-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-ZXMNUKOKXUTL2MK2 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.3:53\r\n"} +{"Time":"2023-05-31T12:40:23.351027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.106.234.70/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:40:23.351029-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:40:23.351032-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:40:23.351034-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:40:23.351037-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:40:23.351039-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:40:23.351042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.351045-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.3:53\" -j KUBE-SEP-ZXMNUKOKXUTL2MK2\r\n"} +{"Time":"2023-05-31T12:40:23.351213-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.351219-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.3:9153\" -j KUBE-SEP-ZP3FB6NMPNCO4VBJ\r\n"} +{"Time":"2023-05-31T12:40:23.351224-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.351226-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.76.2:8443\" -j KUBE-SEP-M66F6TD25XSFZOMV\r\n"} +{"Time":"2023-05-31T12:40:23.351229-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.351231-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.3:53\" -j KUBE-SEP-6E7XQMQ4RAYOWTTM\r\n"} +{"Time":"2023-05-31T12:40:23.351249-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.106.234.70/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:23.351251-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.4:8080\" -j KUBE-SEP-XPTUC4FRAFEFDBGF\r\n"} +{"Time":"2023-05-31T12:40:23.351254-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:40:23.351256-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Completed on Wed May 31 19:40:13 2023\r\n"} +{"Time":"2023-05-31T12:40:23.351281-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.351283-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.351285-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:40:23.351287-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:40:23.351289-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351292-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 56 3570 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:40:23.351294-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 3 255 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:40:23.351459-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 44 2640 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:40:23.351466-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.35147-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain INPUT (policy ACCEPT 38 packets, 2305 bytes)\r\n"} +{"Time":"2023-05-31T12:40:23.351474-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351478-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.351481-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain OUTPUT (policy ACCEPT 46 packets, 2785 bytes)\r\n"} +{"Time":"2023-05-31T12:40:23.351497-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351501-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 204 15019 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:40:23.351503-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 50 4382 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:40:23.351506-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 99 5940 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:40:23.351508-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.35151-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain POSTROUTING (policy ACCEPT 46 packets, 2785 bytes)\r\n"} +{"Time":"2023-05-31T12:40:23.351512-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351515-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 214 15754 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:40:23.351517-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:40:23.351519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:40:23.351522-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 CNI-6ac28df0a7c3227b8bf10f4c all -- * * 10.244.0.3 0.0.0.0/0 /* name: \"bridge\" id: \"578cc80b60403d19ce9ba2a6a305ff1353bd1b372ec0386a99fe300e77644dbf\" */\r\n"} +{"Time":"2023-05-31T12:40:23.351524-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 9 675 CNI-f4b2724f5d9ab927d131988b all -- * * 10.244.0.4 0.0.0.0/0 /* name: \"bridge\" id: \"ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349\" */\r\n"} +{"Time":"2023-05-31T12:40:23.351719-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.351725-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain CNI-6ac28df0a7c3227b8bf10f4c (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.351728-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351731-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"578cc80b60403d19ce9ba2a6a305ff1353bd1b372ec0386a99fe300e77644dbf\" */\r\n"} +{"Time":"2023-05-31T12:40:23.351734-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"578cc80b60403d19ce9ba2a6a305ff1353bd1b372ec0386a99fe300e77644dbf\" */\r\n"} +{"Time":"2023-05-31T12:40:23.351736-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.351738-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain CNI-f4b2724f5d9ab927d131988b (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.351741-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351744-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 9 675 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349\" */\r\n"} +{"Time":"2023-05-31T12:40:23.351749-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349\" */\r\n"} +{"Time":"2023-05-31T12:40:23.351756-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.351761-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:40:23.351766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351773-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:40:23.351777-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.351782-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:40:23.351788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:34667\r\n"} +{"Time":"2023-05-31T12:40:23.351801-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 53 4637 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:44319\r\n"} +{"Time":"2023-05-31T12:40:23.351937-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.351943-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.351947-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.35195-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:34667 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:40:23.351954-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:44319 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:40:23.351957-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.351971-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:40:23.351979-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351984-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.351987-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:40:23.351991-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.351994-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:40:23.351998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352001-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352004-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352007-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352011-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352014-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 55 3460 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:40:23.352021-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:40:23.352024-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:40:23.352138-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352144-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352159-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352163-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352175-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-6E7XQMQ4RAYOWTTM (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352181-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352186-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:40:23.352199-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.3:53\r\n"} +{"Time":"2023-05-31T12:40:23.352203-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352206-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-M66F6TD25XSFZOMV (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.35221-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352213-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-MARK-MASQ all -- * * 192.168.76.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:40:23.352217-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.76.2:8443\r\n"} +{"Time":"2023-05-31T12:40:23.352219-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352221-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-XPTUC4FRAFEFDBGF (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352223-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352226-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.4 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:40:23.352228-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T12:40:23.35223-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-ZP3FB6NMPNCO4VBJ (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352234-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352292-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:40:23.352298-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.3:9153\r\n"} +{"Time":"2023-05-31T12:40:23.3523-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352302-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-ZXMNUKOKXUTL2MK2 (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352305-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352307-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:40:23.352309-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.3:53\r\n"} +{"Time":"2023-05-31T12:40:23.352311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352314-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352316-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352318-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.106.234.70 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:40:23.35232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:40:23.352323-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:40:23.352325-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:40:23.352327-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:40:23.35233-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 81 4860 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:40:23.352485-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352491-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352495-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352499-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:40:23.352503-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-SEP-ZXMNUKOKXUTL2MK2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.3:53 */\r\n"} +{"Time":"2023-05-31T12:40:23.352507-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.35251-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352513-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352517-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:40:23.352521-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-SEP-ZP3FB6NMPNCO4VBJ all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.3:9153 */\r\n"} +{"Time":"2023-05-31T12:40:23.352524-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352528-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352532-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352536-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:40:23.352539-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 3 180 KUBE-SEP-M66F6TD25XSFZOMV all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.76.2:8443 */\r\n"} +{"Time":"2023-05-31T12:40:23.352543-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352545-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352547-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.35255-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:40:23.352745-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 8 615 KUBE-SEP-6E7XQMQ4RAYOWTTM all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.3:53 */\r\n"} +{"Time":"2023-05-31T12:40:23.35275-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.352752-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:40:23.352755-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:23.352757-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.106.234.70 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:40:23.35276-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-SEP-XPTUC4FRAFEFDBGF all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.4:8080 */\r\n"} +{"Time":"2023-05-31T12:40:23.352762-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.352764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.352766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:40:23.352768-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.35277-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.352772-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:40:23.352775-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.352779-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:40:23.352782-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:40:23.352784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:40:23.352789-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:40:23.352792-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:40:23.352798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:40:23.352804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:40:23.352809-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:40:23.352815-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.352819-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.353002-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:23.35301-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:40:23.353014-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:40:23.353028-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.353032-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.353035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:23.353039-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.353042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:40:23.353046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:40:23.353049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment:\n"} +{"Time":"2023-05-31T12:40:23.353064-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:40:23.353067-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:23.353079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:40:23.353081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:40:23.353092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:40:23.353094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:23.353097-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:40:23.3531-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:40:23.353104-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.353107-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:40:23.35311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:40:23.353112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.353114-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:40:23.353117-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:40:23.35312-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:40:23.353123-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.353246-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:40:23.353255-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:40:23.353261-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:40:23.353267-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:23.35327-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:23.353273-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:23.353277-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal SuccessfulCreate 38s daemonset-controller Created pod: kube-proxy-6g7sn\n"} +{"Time":"2023-05-31T12:40:23.35328-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.353283-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.353287-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:40:23.35329-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-proxy-6g7sn\n"} +{"Time":"2023-05-31T12:40:23.353293-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.353297-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:40:23.3533-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:40:23.353304-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.353307-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node: bridge-996000/192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.353311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Start Time: Wed, 31 May 2023 12:39:35 -0700\n"} +{"Time":"2023-05-31T12:40:23.353315-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:40:23.353318-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.353321-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:40:23.353338-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.353342-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:40:23.353365-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.353368-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IPs:\n"} +{"Time":"2023-05-31T12:40:23.353487-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.353502-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.353506-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:23.353509-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:40:23.353511-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Container ID: docker://7a93b9e068f501d0474d9c6fe8838fd241df839f71221a38b15ba7c982c1c694\n"} +{"Time":"2023-05-31T12:40:23.353514-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:40:23.353517-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:40:23.353519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.353521-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:23.353523-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:23.353526-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.353528-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:40:23.35353-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:40:23.353532-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" State: Running\n"} +{"Time":"2023-05-31T12:40:23.353534-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Started: Wed, 31 May 2023 12:39:36 -0700\n"} +{"Time":"2023-05-31T12:40:23.353537-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:40:23.35354-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:40:23.353543-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment:\n"} +{"Time":"2023-05-31T12:40:23.353545-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:40:23.353547-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:23.353549-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:40:23.353552-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:40:23.353554-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:40:23.353556-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-kpprb (ro)\n"} +{"Time":"2023-05-31T12:40:23.353558-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:23.353703-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status\n"} +{"Time":"2023-05-31T12:40:23.35371-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:40:23.353714-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready True \n"} +{"Time":"2023-05-31T12:40:23.353717-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:40:23.353721-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:40:23.353736-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:23.353743-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:40:23.353747-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:40:23.353758-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.353763-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:40:23.353766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:40:23.353769-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.353772-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:40:23.353775-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:40:23.353778-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:40:23.353781-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:23.353784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:40:23.353787-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:40:23.353791-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-api-access-kpprb:\n"} +{"Time":"2023-05-31T12:40:23.353797-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:40:23.353803-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:40:23.353806-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:23.353808-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:40:23.353811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:40:23.353813-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:40:23.353973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:40:23.353977-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:40:23.35398-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:23.353983-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:23.353986-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:23.353988-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:40:23.35399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:23.353993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:40:23.353995-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:23.353997-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:23.353999-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:23.354001-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:23.354003-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Scheduled 39s default-scheduler Successfully assigned kube-system/kube-proxy-6g7sn to bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.354006-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulled 38s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:40:23.354009-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Created 38s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.354012-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Started 38s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.354017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.354022-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.354028-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:40:23.354033-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:36.907399 1 node.go:141] Successfully retrieved node IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.354042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:36.907597 1 server_others.go:110] \"Detected node IP\" address=\"192.168.76.2\"\n"} +{"Time":"2023-05-31T12:40:23.35416-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:36.907625 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:40:23.354167-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.095615 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:40:23.354171-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.095664 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:40:23.354174-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.095672 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:40:23.354178-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.095683 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:40:23.354184-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.095708 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:40:23.354188-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.100649 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:40:23.354192-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.100670 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:40:23.354195-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.101358 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:40:23.354199-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.101372 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:40:23.354202-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.101392 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:40:23.354205-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.101394 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:40:23.354207-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.101797 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:40:23.35421-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.101804 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:40:23.354212-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.202537 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:40:23.354214-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.202583 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:40:23.354216-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:37.202706 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:40:23.354218-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.35437-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.354377-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:40:23.354381-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:40:23.354384-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: loaded (\u001b]8;;file://bridge-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:23.354395-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:40:23.354404-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─\u001b]8;;file://bridge-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:23.354409-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:23 UTC; 50s ago\r\n"} +{"Time":"2023-05-31T12:40:23.354421-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:23.354425-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Main PID: 2405 (kubelet)\r\n"} +{"Time":"2023-05-31T12:40:23.354427-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tasks: 14 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:40:23.354429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Memory: 31.8M\r\n"} +{"Time":"2023-05-31T12:40:23.354431-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CPU: 1.947s\r\n"} +{"Time":"2023-05-31T12:40:23.354433-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:40:23.354436-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─2405 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=bridge-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:40:23.354438-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.354442-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.777071 2405 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/499cb45b-eb62-4db6-b013-0c70bb45e3f4-kube-api-access-qkzrb\" (OuterVolumeSpecName: \"kube-api-access-qkzrb\") pod \"499cb45b-eb62-4db6-b013-0c70bb45e3f4\" (UID: \"499cb45b-eb62-4db6-b013-0c70bb45e3f4\"). InnerVolumeSpecName \"kube-api-access-qkzrb\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.354447-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.875937 2405 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/499cb45b-eb62-4db6-b013-0c70bb45e3f4-config-volume\\\") on node \\\"bridge-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:40:23.354601-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.875996 2405 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-qkzrb\\\" (UniqueName: \\\"kubernetes.io/projected/499cb45b-eb62-4db6-b013-0c70bb45e3f4-kube-api-access-qkzrb\\\") on node \\\"bridge-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:40:23.354607-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:48 bridge-996000 kubelet[2405]: I0531 19:39:48.711143 2405 scope.go:115] \"RemoveContainer\" containerID=\"ce576e9ac06140d6cd4e1ba58b8d4a9b6973436d52df0cd9b57c41df8fa7740a\"\r\n"} +{"Time":"2023-05-31T12:40:23.354611-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:49 bridge-996000 kubelet[2405]: I0531 19:39:49.995973 2405 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=499cb45b-eb62-4db6-b013-0c70bb45e3f4 path=\"/var/lib/kubelet/pods/499cb45b-eb62-4db6-b013-0c70bb45e3f4/volumes\"\r\n"} +{"Time":"2023-05-31T12:40:23.354615-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 kubelet[2405]: I0531 19:39:50.213203 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.354617-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 kubelet[2405]: E0531 19:39:50.213345 2405 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:40:23.35462-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 kubelet[2405]: I0531 19:39:50.213369 2405 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:40:23.354623-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 kubelet[2405]: I0531 19:39:50.294633 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-qpgqp\\\" (UniqueName: \\\"kubernetes.io/projected/0f465fa8-e058-40d3-8bc3-3a4b7e1078e6-kube-api-access-qpgqp\\\") pod \\\"netcat-7458db8b8-727p5\\\" (UID: \\\"0f465fa8-e058-40d3-8bc3-3a4b7e1078e6\\\") \" pod=\"default/netcat-7458db8b8-727p5\"\r\n"} +{"Time":"2023-05-31T12:40:23.354627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:56 bridge-996000 kubelet[2405]: I0531 19:39:56.816777 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-727p5\" podStartSLOduration=1.7026873710000001 podCreationTimestamp=\"2023-05-31 19:39:50 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:39:50.719934205 +0000 UTC m=+27.041246485\" lastFinishedPulling=\"2023-05-31 19:39:55.833996323 +0000 UTC m=+32.155308607\" observedRunningTime=\"2023-05-31 19:39:56.816448679 +0000 UTC m=+33.137760967\" watchObservedRunningTime=\"2023-05-31 19:39:56.816749493 +0000 UTC m=+33.138061783\"\r\n"} +{"Time":"2023-05-31T12:40:23.35463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.354633-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.354635-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:40:23.354637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354819-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:23.354825-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:40:23.354828-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:40:23.35483-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:40:23.354832-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.354834-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.354837-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:40:23.354839-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:23.354841-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:40:23.354843-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:40:23.354855-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.354864-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:23.354868-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:23.354871-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.354874-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354879-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:23.354882-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:40:23.354885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.354888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.354892-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:40:23.354906-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=bridge-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\r\n"} +{"Time":"2023-05-31T12:40:23.354909-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.354912-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:23.354945-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.354952-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.354956-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:40:23.35496-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:40:23.354964-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354976-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354981-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354985-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354989-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.354993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:40:23.354998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.706984 1733 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:40:23.355004-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.707068 1733 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:40:23.355009-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.707395 1733 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:40:23.355013-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.711467 1733 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:40:23.355018-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.712613 1733 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.355196-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: W0531 19:39:16.714561 1733 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:40:23.355217-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.721356 1733 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:40:23.355225-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.721713 1733 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:40:23.35523-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.721780 1733 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:40:23.355238-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.721799 1733 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:40:23.35524-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.721809 1733 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:40:23.355244-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.721877 1733 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:23.355247-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.749788 1733 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:40:23.35525-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.749816 1733 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:40:23.355252-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.749835 1733 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:40:23.355265-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.749848 1733 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:40:23.355337-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: W0531 19:39:16.752283 1733 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dbridge-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.355342-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.752331 1733 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dbridge-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.355347-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: W0531 19:39:16.752652 1733 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.355354-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.752706 1733 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.355359-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.768735 1733 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:40:23.355363-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: W0531 19:39:16.768978 1733 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:40:23.355366-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.769510 1733 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:40:23.35537-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.769575 1733 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:40:23.355383-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.769957 1733 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:40:23.35539-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.770349 1733 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"bridge-996000.176451ab5028856c\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"bridge-996000\", UID:\"bridge-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"bridge-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 39, 16, 769498476, time.Local), LastTimestamp:time.Date"} +{"Time":"2023-05-31T12:40:23.355526-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"(2023, time.May, 31, 19, 39, 16, 769498476, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.76.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:40:23.355541-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.770756 1733 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:40:23.355554-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.770927 1733 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:40:23.355562-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.771196 1733 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:40:23.355567-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.771242 1733 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/bridge-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:40:23.355572-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: W0531 19:39:16.771435 1733 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.355577-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.771467 1733 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.35559-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.771535 1733 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:40:23.355606-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.786836 1733 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:40:23.355687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.790238 1733 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:40:23.355693-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.790265 1733 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:40:23.355695-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.790289 1733 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:40:23.355698-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.790332 1733 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:40:23.355701-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: W0531 19:39:16.791296 1733 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.355704-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.791587 1733 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.355706-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.815416 1733 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:40:23.355709-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.815464 1733 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:40:23.355711-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.815483 1733 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:23.355714-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.821837 1733 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:40:23.35573-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.827009 1733 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:40:23.355734-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.827045 1733 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:23.355737-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.834274 1733 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:40:23.355852-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.834527 1733 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:40:23.355866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.847858 1733 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"bridge-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:40:23.35587-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.891074 1733 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.355874-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.905143 1733 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.355878-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.905604 1733 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.355881-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.905742 1733 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.355883-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.920022 1733 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.355885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.929996 1733 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.355888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: E0531 19:39:16.971555 1733 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/bridge-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:40:23.355891-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.971687 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/0e3f37df66e2c986c4ecb4f15422bebf-etcd-certs\\\") pod \\\"etcd-bridge-996000\\\" (UID: \\\"0e3f37df66e2c986c4ecb4f15422bebf\\\") \" pod=\"kube-system/etcd-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.355894-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.971771 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/0e3f37df66e2c986c4ecb4f15422bebf-etcd-data\\\") pod \\\"etcd-bridge-996000\\\" (UID: \\\"0e3f37df66e2c986c4ecb4f15422bebf\\\") \" pod=\"kube-system/etcd-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.355996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.971846 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-ca-certs\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356009-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.971870 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-etc-ca-certificates\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356016-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:16 bridge-996000 kubelet[1733]: I0531 19:39:16.971887 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-k8s-certs\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.35602-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072354 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356023-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072427 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-ca-certs\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072448 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-etc-ca-certificates\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.35603-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072466 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-kubeconfig\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356199-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072520 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356207-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072543 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356228-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072602 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-flexvolume-dir\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356233-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072672 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-k8s-certs\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356261-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072758 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356266-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.072823 1733 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/df586b40048c27da490cc2cb410176e4-kubeconfig\\\") pod \\\"kube-scheduler-bridge-996000\\\" (UID: \\\"df586b40048c27da490cc2cb410176e4\\\") \" pod=\"kube-system/kube-scheduler-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.35627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.120242 1733 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356274-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: E0531 19:39:17.121307 1733 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356551-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: E0531 19:39:17.383931 1733 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/bridge-996000?timeout=10s\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:40:23.356557-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: I0531 19:39:17.531511 1733 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356571-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: E0531 19:39:17.531765 1733 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.76.2:8443: connect: connection refused\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356583-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: W0531 19:39:17.688800 1733 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.35659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: E0531 19:39:17.688851 1733 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.356595-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: W0531 19:39:17.753783 1733 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.356599-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: E0531 19:39:17.753855 1733 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.35661-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: W0531 19:39:17.884024 1733 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dbridge-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.356619-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 kubelet[1733]: E0531 19:39:17.884368 1733 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dbridge-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.76.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:23.356755-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:18 bridge-996000 kubelet[1733]: I0531 19:39:18.341684 1733 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356779-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:20 bridge-996000 kubelet[1733]: E0531 19:39:20.211236 1733 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"bridge-996000\\\" not found\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356785-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:20 bridge-996000 kubelet[1733]: I0531 19:39:20.295427 1733 kubelet_node_status.go:73] \"Successfully registered node\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.356788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:20 bridge-996000 kubelet[1733]: I0531 19:39:20.504986 1733 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T12:40:23.356793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:20 bridge-996000 kubelet[1733]: I0531 19:39:20.754712 1733 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:40:23.356796-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:20 bridge-996000 kubelet[1733]: I0531 19:39:20.771894 1733 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:40:23.356801-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:20 bridge-996000 kubelet[1733]: I0531 19:39:20.807929 1733 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:40:23.356804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:40:23.356806-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356809-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356813-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356816-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356818-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356946-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356951-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[1733]: I0531 19:39:23.641032 1733 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:40:23.356954-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:40:23.356956-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356958-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356961-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356963-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356966-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:40:23.35697-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356976-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356979-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356981-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356984-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356986-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356988-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:40:23.356991-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.356993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.357377-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.357392-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.357395-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.357398-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.3574-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.357402-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:40:23.357405-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.786442 2405 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:40:23.357421-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.786509 2405 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:40:23.357424-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.786698 2405 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:40:23.357426-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.787975 2405 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:40:23.357429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.788950 2405 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:40:23.357452-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: W0531 19:39:23.792264 2405 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:40:23.357455-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.796584 2405 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:40:23.357457-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.796839 2405 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:40:23.35746-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.796905 2405 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:40:23.357725-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.796923 2405 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:40:23.357752-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.796940 2405 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:40:23.357756-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.796963 2405 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:23.35776-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.819549 2405 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:40:23.357764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.819600 2405 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:40:23.357767-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.819621 2405 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:40:23.357769-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.819637 2405 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:40:23.357772-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.831536 2405 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:40:23.357788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.831943 2405 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:40:23.357791-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.832657 2405 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:40:23.357793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.832691 2405 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:40:23.35781-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.833523 2405 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:40:23.358094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.835005 2405 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:40:23.3581-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.835386 2405 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:40:23.358117-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.836292 2405 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:40:23.35812-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.886661 2405 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:40:23.358122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.910680 2405 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:40:23.358124-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.910726 2405 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:40:23.358147-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.910741 2405 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:23.358149-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.910872 2405 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:40:23.358152-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.910912 2405 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:40:23.358154-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.910919 2405 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:40:23.358157-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.914163 2405 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:40:23.358159-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.914244 2405 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:23.358162-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.914408 2405 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:40:23.358164-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.915556 2405 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:40:23.358379-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.916070 2405 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:40:23.358383-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.947241 2405 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358385-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.989195 2405 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:40:23.358387-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.989277 2405 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:40:23.35839-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: I0531 19:39:23.989357 2405 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:40:23.358392-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:23 bridge-996000 kubelet[2405]: E0531 19:39:23.989522 2405 kubelet.go:2281] \"Skipping pod synchronization\" err=\"PLEG is not healthy: pleg has yet to be successful\"\r\n"} +{"Time":"2023-05-31T12:40:23.358409-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.023274 2405 kubelet_node_status.go:108] \"Node was previously registered\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358412-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.023434 2405 kubelet_node_status.go:73] \"Successfully registered node\" node=\"bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358414-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.090665 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.358416-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.090817 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.358441-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.090884 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.358444-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.091016 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.358448-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: E0531 19:39:24.101264 2405 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-scheduler-bridge-996000\\\" already exists\" pod=\"kube-system/kube-scheduler-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358453-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237035 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-flexvolume-dir\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.3586-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237151 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-k8s-certs\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358606-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237180 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358625-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237196 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/df586b40048c27da490cc2cb410176e4-kubeconfig\\\") pod \\\"kube-scheduler-bridge-996000\\\" (UID: \\\"df586b40048c27da490cc2cb410176e4\\\") \" pod=\"kube-system/kube-scheduler-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358668-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237211 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-etc-ca-certificates\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358675-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237224 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-ca-certs\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358678-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237242 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-k8s-certs\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358695-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237315 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358976-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237380 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-ca-certs\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358981-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237425 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.358999-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237443 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/1147292586c1fdb4483c665242e4b7f7-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-bridge-996000\\\" (UID: \\\"1147292586c1fdb4483c665242e4b7f7\\\") \" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.359003-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237489 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-etc-ca-certificates\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.359031-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237503 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/d9119dbc8ddf045eb391de8641d20f8b-kubeconfig\\\") pod \\\"kube-controller-manager-bridge-996000\\\" (UID: \\\"d9119dbc8ddf045eb391de8641d20f8b\\\") \" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.359037-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237517 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/0e3f37df66e2c986c4ecb4f15422bebf-etcd-certs\\\") pod \\\"etcd-bridge-996000\\\" (UID: \\\"0e3f37df66e2c986c4ecb4f15422bebf\\\") \" pod=\"kube-system/etcd-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.35905-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.237573 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/0e3f37df66e2c986c4ecb4f15422bebf-etcd-data\\\") pod \\\"etcd-bridge-996000\\\" (UID: \\\"0e3f37df66e2c986c4ecb4f15422bebf\\\") \" pod=\"kube-system/etcd-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.359319-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.820540 2405 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:40:23.359344-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.837438 2405 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:40:23.359347-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:24 bridge-996000 kubelet[2405]: I0531 19:39:24.842785 2405 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:40:23.359349-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:25 bridge-996000 kubelet[2405]: E0531 19:39:25.045360 2405 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-bridge-996000\\\" already exists\" pod=\"kube-system/kube-apiserver-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.359352-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:25 bridge-996000 kubelet[2405]: E0531 19:39:25.045427 2405 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-bridge-996000\\\" already exists\" pod=\"kube-system/kube-controller-manager-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.359355-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:25 bridge-996000 kubelet[2405]: E0531 19:39:25.045376 2405 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-bridge-996000\\\" already exists\" pod=\"kube-system/etcd-bridge-996000\"\r\n"} +{"Time":"2023-05-31T12:40:23.359359-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:25 bridge-996000 kubelet[2405]: I0531 19:39:25.047928 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-bridge-996000\" podStartSLOduration=1.047883434 podCreationTimestamp=\"2023-05-31 19:39:24 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:25.04788031 +0000 UTC m=+1.369308643\" watchObservedRunningTime=\"2023-05-31 19:39:25.047883434 +0000 UTC m=+1.369311769\"\r\n"} +{"Time":"2023-05-31T12:40:23.359363-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:25 bridge-996000 kubelet[2405]: I0531 19:39:25.055021 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-bridge-996000\" podStartSLOduration=3.054996 podCreationTimestamp=\"2023-05-31 19:39:22 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:25.054955846 +0000 UTC m=+1.376384182\" watchObservedRunningTime=\"2023-05-31 19:39:25.054996 +0000 UTC m=+1.376424337\"\r\n"} +{"Time":"2023-05-31T12:40:23.359372-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:25 bridge-996000 kubelet[2405]: I0531 19:39:25.071479 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-bridge-996000\" podStartSLOduration=1.07144986 podCreationTimestamp=\"2023-05-31 19:39:24 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:25.063187319 +0000 UTC m=+1.384615653\" watchObservedRunningTime=\"2023-05-31 19:39:25.07144986 +0000 UTC m=+1.392878197\"\r\n"} +{"Time":"2023-05-31T12:40:23.359451-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:25 bridge-996000 kubelet[2405]: I0531 19:39:25.071632 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-bridge-996000\" podStartSLOduration=1.071616333 podCreationTimestamp=\"2023-05-31 19:39:24 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:25.071372108 +0000 UTC m=+1.392800453\" watchObservedRunningTime=\"2023-05-31 19:39:25.071616333 +0000 UTC m=+1.393044669\"\r\n"} +{"Time":"2023-05-31T12:40:23.359457-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:35 bridge-996000 kubelet[2405]: I0531 19:39:35.701257 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.35946-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:35 bridge-996000 kubelet[2405]: I0531 19:39:35.722518 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/6f272272-21c1-416b-bf78-5d765faf5aac-kube-proxy\\\") pod \\\"kube-proxy-6g7sn\\\" (UID: \\\"6f272272-21c1-416b-bf78-5d765faf5aac\\\") \" pod=\"kube-system/kube-proxy-6g7sn\"\r\n"} +{"Time":"2023-05-31T12:40:23.359464-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:35 bridge-996000 kubelet[2405]: I0531 19:39:35.722563 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/6f272272-21c1-416b-bf78-5d765faf5aac-xtables-lock\\\") pod \\\"kube-proxy-6g7sn\\\" (UID: \\\"6f272272-21c1-416b-bf78-5d765faf5aac\\\") \" pod=\"kube-system/kube-proxy-6g7sn\"\r\n"} +{"Time":"2023-05-31T12:40:23.359468-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:35 bridge-996000 kubelet[2405]: I0531 19:39:35.722606 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/6f272272-21c1-416b-bf78-5d765faf5aac-lib-modules\\\") pod \\\"kube-proxy-6g7sn\\\" (UID: \\\"6f272272-21c1-416b-bf78-5d765faf5aac\\\") \" pod=\"kube-system/kube-proxy-6g7sn\"\r\n"} +{"Time":"2023-05-31T12:40:23.359471-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:35 bridge-996000 kubelet[2405]: I0531 19:39:35.722623 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-kpprb\\\" (UniqueName: \\\"kubernetes.io/projected/6f272272-21c1-416b-bf78-5d765faf5aac-kube-api-access-kpprb\\\") pod \\\"kube-proxy-6g7sn\\\" (UID: \\\"6f272272-21c1-416b-bf78-5d765faf5aac\\\") \" pod=\"kube-system/kube-proxy-6g7sn\"\r\n"} +{"Time":"2023-05-31T12:40:23.359473-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 kubelet[2405]: I0531 19:39:36.099340 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.359476-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 kubelet[2405]: I0531 19:39:36.107490 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.359479-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 kubelet[2405]: I0531 19:39:36.189815 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/499cb45b-eb62-4db6-b013-0c70bb45e3f4-config-volume\\\") pod \\\"coredns-5d78c9869d-ghsxs\\\" (UID: \\\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\\\") \" pod=\"kube-system/coredns-5d78c9869d-ghsxs\"\r\n"} +{"Time":"2023-05-31T12:40:23.359571-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 kubelet[2405]: I0531 19:39:36.189944 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-jwgnt\\\" (UniqueName: \\\"kubernetes.io/projected/06186263-e2ea-4441-b08a-ef793bbe36e5-kube-api-access-jwgnt\\\") pod \\\"coredns-5d78c9869d-bwspj\\\" (UID: \\\"06186263-e2ea-4441-b08a-ef793bbe36e5\\\") \" pod=\"kube-system/coredns-5d78c9869d-bwspj\"\r\n"} +{"Time":"2023-05-31T12:40:23.359575-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 kubelet[2405]: I0531 19:39:36.189971 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-qkzrb\\\" (UniqueName: \\\"kubernetes.io/projected/499cb45b-eb62-4db6-b013-0c70bb45e3f4-kube-api-access-qkzrb\\\") pod \\\"coredns-5d78c9869d-ghsxs\\\" (UID: \\\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\\\") \" pod=\"kube-system/coredns-5d78c9869d-ghsxs\"\r\n"} +{"Time":"2023-05-31T12:40:23.359578-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 kubelet[2405]: I0531 19:39:36.189991 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/06186263-e2ea-4441-b08a-ef793bbe36e5-config-volume\\\") pod \\\"coredns-5d78c9869d-bwspj\\\" (UID: \\\"06186263-e2ea-4441-b08a-ef793bbe36e5\\\") \" pod=\"kube-system/coredns-5d78c9869d-bwspj\"\r\n"} +{"Time":"2023-05-31T12:40:23.359582-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 kubelet[2405]: I0531 19:39:36.411776 2405 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"4f33bfc727dc90318c9e3f3bf42e4f14cb1011485965636e60dca1dfc4da1336\"\r\n"} +{"Time":"2023-05-31T12:40:23.359585-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:37 bridge-996000 kubelet[2405]: I0531 19:39:37.608948 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-ghsxs\" podStartSLOduration=1.608919451 podCreationTimestamp=\"2023-05-31 19:39:36 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:37.608743239 +0000 UTC m=+13.930171577\" watchObservedRunningTime=\"2023-05-31 19:39:37.608919451 +0000 UTC m=+13.930347787\"\r\n"} +{"Time":"2023-05-31T12:40:23.359588-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:37 bridge-996000 kubelet[2405]: I0531 19:39:37.891347 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-6g7sn\" podStartSLOduration=2.891315664 podCreationTimestamp=\"2023-05-31 19:39:35 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:37.683992193 +0000 UTC m=+14.005420529\" watchObservedRunningTime=\"2023-05-31 19:39:37.891315664 +0000 UTC m=+14.212744005\"\r\n"} +{"Time":"2023-05-31T12:40:23.359591-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:37 bridge-996000 kubelet[2405]: I0531 19:39:37.891652 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.359593-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:37 bridge-996000 kubelet[2405]: I0531 19:39:37.903265 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/9ee42e86-9afe-4944-895c-11a7679a8de6-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"9ee42e86-9afe-4944-895c-11a7679a8de6\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:40:23.359678-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:37 bridge-996000 kubelet[2405]: I0531 19:39:37.903323 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-9frrk\\\" (UniqueName: \\\"kubernetes.io/projected/9ee42e86-9afe-4944-895c-11a7679a8de6-kube-api-access-9frrk\\\") pod \\\"storage-provisioner\\\" (UID: \\\"9ee42e86-9afe-4944-895c-11a7679a8de6\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:40:23.359684-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-996000 kubelet[2405]: I0531 19:39:38.625522 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-bwspj\" podStartSLOduration=2.625494487 podCreationTimestamp=\"2023-05-31 19:39:36 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:38.625486588 +0000 UTC m=+14.946914924\" watchObservedRunningTime=\"2023-05-31 19:39:38.625494487 +0000 UTC m=+14.946922824\"\r\n"} +{"Time":"2023-05-31T12:40:23.359688-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:44 bridge-996000 kubelet[2405]: I0531 19:39:44.730062 2405 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:40:23.35969-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:44 bridge-996000 kubelet[2405]: I0531 19:39:44.730728 2405 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:40:23.359693-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.744535 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=10.744503133 podCreationTimestamp=\"2023-05-31 19:39:37 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:38.644763192 +0000 UTC m=+14.966191529\" watchObservedRunningTime=\"2023-05-31 19:39:47.744503133 +0000 UTC m=+24.065815414\"\r\n"} +{"Time":"2023-05-31T12:40:23.359697-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.775098 2405 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/499cb45b-eb62-4db6-b013-0c70bb45e3f4-config-volume\\\") pod \\\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\\\" (UID: \\\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\\\") \"\r\n"} +{"Time":"2023-05-31T12:40:23.359701-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.775165 2405 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-qkzrb\\\" (UniqueName: \\\"kubernetes.io/projected/499cb45b-eb62-4db6-b013-0c70bb45e3f4-kube-api-access-qkzrb\\\") pod \\\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\\\" (UID: \\\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\\\") \"\r\n"} +{"Time":"2023-05-31T12:40:23.359704-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: W0531 19:39:47.775407 2405 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/499cb45b-eb62-4db6-b013-0c70bb45e3f4/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:40:23.359776-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.775559 2405 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/499cb45b-eb62-4db6-b013-0c70bb45e3f4-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"499cb45b-eb62-4db6-b013-0c70bb45e3f4\" (UID: \"499cb45b-eb62-4db6-b013-0c70bb45e3f4\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.359781-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.777071 2405 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/499cb45b-eb62-4db6-b013-0c70bb45e3f4-kube-api-access-qkzrb\" (OuterVolumeSpecName: \"kube-api-access-qkzrb\") pod \"499cb45b-eb62-4db6-b013-0c70bb45e3f4\" (UID: \"499cb45b-eb62-4db6-b013-0c70bb45e3f4\"). InnerVolumeSpecName \"kube-api-access-qkzrb\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.359784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.875937 2405 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/499cb45b-eb62-4db6-b013-0c70bb45e3f4-config-volume\\\") on node \\\"bridge-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:40:23.359787-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 kubelet[2405]: I0531 19:39:47.875996 2405 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-qkzrb\\\" (UniqueName: \\\"kubernetes.io/projected/499cb45b-eb62-4db6-b013-0c70bb45e3f4-kube-api-access-qkzrb\\\") on node \\\"bridge-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:40:23.35979-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:48 bridge-996000 kubelet[2405]: I0531 19:39:48.711143 2405 scope.go:115] \"RemoveContainer\" containerID=\"ce576e9ac06140d6cd4e1ba58b8d4a9b6973436d52df0cd9b57c41df8fa7740a\"\r\n"} +{"Time":"2023-05-31T12:40:23.359793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:49 bridge-996000 kubelet[2405]: I0531 19:39:49.995973 2405 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=499cb45b-eb62-4db6-b013-0c70bb45e3f4 path=\"/var/lib/kubelet/pods/499cb45b-eb62-4db6-b013-0c70bb45e3f4/volumes\"\r\n"} +{"Time":"2023-05-31T12:40:23.359795-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 kubelet[2405]: I0531 19:39:50.213203 2405 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:23.359798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 kubelet[2405]: E0531 19:39:50.213345 2405 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:40:23.359907-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 kubelet[2405]: I0531 19:39:50.213369 2405 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"499cb45b-eb62-4db6-b013-0c70bb45e3f4\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T12:40:23.359912-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 kubelet[2405]: I0531 19:39:50.294633 2405 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-qpgqp\\\" (UniqueName: \\\"kubernetes.io/projected/0f465fa8-e058-40d3-8bc3-3a4b7e1078e6-kube-api-access-qpgqp\\\") pod \\\"netcat-7458db8b8-727p5\\\" (UID: \\\"0f465fa8-e058-40d3-8bc3-3a4b7e1078e6\\\") \" pod=\"default/netcat-7458db8b8-727p5\"\r\n"} +{"Time":"2023-05-31T12:40:23.359916-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:56 bridge-996000 kubelet[2405]: I0531 19:39:56.816777 2405 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-727p5\" podStartSLOduration=1.7026873710000001 podCreationTimestamp=\"2023-05-31 19:39:50 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:39:50.719934205 +0000 UTC m=+27.041246485\" lastFinishedPulling=\"2023-05-31 19:39:55.833996323 +0000 UTC m=+32.155308607\" observedRunningTime=\"2023-05-31 19:39:56.816448679 +0000 UTC m=+33.137760967\" watchObservedRunningTime=\"2023-05-31 19:39:56.816749493 +0000 UTC m=+33.138061783\"\r\n"} +{"Time":"2023-05-31T12:40:23.359921-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.359924-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.359926-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:40:23.359928-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:40:23.35993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:40:23.359932-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:40:23.359936-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:40:23.359939-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:40:23.360013-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:40:23.360017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:40:23.360019-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:40:23.360021-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:40:23.360023-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:40:23.360026-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user: system:node:bridge-996000\r\n"} +{"Time":"2023-05-31T12:40:23.360028-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: system:node:bridge-996000@mk\r\n"} +{"Time":"2023-05-31T12:40:23.36003-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: system:node:bridge-996000@mk\r\n"} +{"Time":"2023-05-31T12:40:23.360032-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:40:23.360034-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:40:23.360036-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users:\r\n"} +{"Time":"2023-05-31T12:40:23.360038-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - name: system:node:bridge-996000\r\n"} +{"Time":"2023-05-31T12:40:23.36004-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user:\r\n"} +{"Time":"2023-05-31T12:40:23.360042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:40:23.360044-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:40:23.360046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.360048-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.36005-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:40:23.360053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:40:23.360056-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:40:23.360058-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:40:23.360061-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:40:23.360063-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:40:23.360065-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360069-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:40:23.360121-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:40:23.360126-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:40:23.360128-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:40:23.36013-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:40:23.360132-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:40:23.360135-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360138-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360141-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:40:23.360143-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:40:23.360145-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:40:23.360147-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:40:23.360149-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.360151-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360153-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:40:23.360155-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:40:23.360158-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:40:23.360161-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:40:23.360164-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360166-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:40:23.360168-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360171-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:40:23.360174-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:40:23.360177-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:40:23.360179-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360181-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:40:23.360183-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360185-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:40:23.360197-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:40:23.360199-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:40:23.360201-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" options:\r\n"} +{"Time":"2023-05-31T12:40:23.360203-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" json:\r\n"} +{"Time":"2023-05-31T12:40:23.360205-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:40:23.360208-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:40:23.36021-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:40:23.360212-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360214-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360216-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:40:23.360218-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:40:23.36022-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360222-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360224-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:40:23.360226-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360229-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:40:23.360235-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.360237-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.360239-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:40:23.360242-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.360244-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters:\n"} +{"Time":"2023-05-31T12:40:23.360246-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:40:23.360248-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:40:23.360303-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extensions:\n"} +{"Time":"2023-05-31T12:40:23.360309-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - extension:\n"} +{"Time":"2023-05-31T12:40:23.360311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" last-update: Wed, 31 May 2023 12:39:35 PDT\n"} +{"Time":"2023-05-31T12:40:23.360313-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.360315-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:40:23.360317-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:40:23.360319-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://127.0.0.1:53237\n"} +{"Time":"2023-05-31T12:40:23.360321-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.360323-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:40:23.360325-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:40:23.360342-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extensions:\n"} +{"Time":"2023-05-31T12:40:23.360345-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - extension:\n"} +{"Time":"2023-05-31T12:40:23.360349-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" last-update: Wed, 31 May 2023 12:39:44 PDT\n"} +{"Time":"2023-05-31T12:40:23.360372-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.360379-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:40:23.360383-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:40:23.360385-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://127.0.0.1:53259\n"} +{"Time":"2023-05-31T12:40:23.360387-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:23.360389-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts:\n"} +{"Time":"2023-05-31T12:40:23.360391-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - context:\n"} +{"Time":"2023-05-31T12:40:23.360393-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cluster: bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.360395-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extensions:\n"} +{"Time":"2023-05-31T12:40:23.360397-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - extension:\n"} +{"Time":"2023-05-31T12:40:23.360399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" last-update: Wed, 31 May 2023 12:39:35 PDT\n"} +{"Time":"2023-05-31T12:40:23.360401-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.360475-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:40:23.360479-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:40:23.360481-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:40:23.360483-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user: bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.360485-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.360487-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - context:\n"} +{"Time":"2023-05-31T12:40:23.36049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cluster: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:23.360492-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extensions:\n"} +{"Time":"2023-05-31T12:40:23.360494-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - extension:\n"} +{"Time":"2023-05-31T12:40:23.360496-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" last-update: Wed, 31 May 2023 12:39:44 PDT\n"} +{"Time":"2023-05-31T12:40:23.360498-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.3605-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:40:23.360502-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:40:23.360505-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:40:23.360507-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:23.360509-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:23.360511-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:23.360513-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:40:23.360515-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:40:23.360517-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users:\n"} +{"Time":"2023-05-31T12:40:23.360519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - name: bridge-996000\n"} +{"Time":"2023-05-31T12:40:23.360521-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user:\n"} +{"Time":"2023-05-31T12:40:23.360523-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt\n"} +{"Time":"2023-05-31T12:40:23.360525-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.key\n"} +{"Time":"2023-05-31T12:40:23.360527-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - name: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:23.36053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user:\n"} +{"Time":"2023-05-31T12:40:23.360683-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt\n"} +{"Time":"2023-05-31T12:40:23.360689-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.key\n"} +{"Time":"2023-05-31T12:40:23.360691-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.360693-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.360696-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:40:23.360698-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.3607-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" items:\n"} +{"Time":"2023-05-31T12:40:23.360702-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.360704-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.360706-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:40:23.360708-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.36071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:23.360713-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:23.360715-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:23.360717-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:23.360719-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:23.360721-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:23.360725-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:23.360729-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:23.360732-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:23.360734-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:23.360736-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:23.360779-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:23.360783-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:23.360785-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:23.360788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:23.36079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:23.360792-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:23.360794-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.360796-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.360798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.3608-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" annotations:\n"} +{"Time":"2023-05-31T12:40:23.360802-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:40:23.360804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:40:23.360806-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:40:23.360809-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:40:23.360811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:35Z\"\n"} +{"Time":"2023-05-31T12:40:23.360813-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:23.360815-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:40:23.360817-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"342\"\n"} +{"Time":"2023-05-31T12:40:23.360819-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 9e22bd65-bc68-46dc-ab83-7c3bf7efb489\n"} +{"Time":"2023-05-31T12:40:23.360822-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.360824-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.360826-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:40:23.360828-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.360906-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:23.360909-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:23.360911-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:23.360913-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:23.360915-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:23.360918-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:23.36092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:23.360922-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:23.360924-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:23.360926-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:23.360929-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:23.360932-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:23.360935-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:23.360939-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:23.360942-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:23.360945-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:23.360947-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:23.36095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.360952-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.360954-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.360957-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" annotations:\n"} +{"Time":"2023-05-31T12:40:23.36105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:40:23.361057-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:40:23.361059-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:40:23.361062-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:40:23.361064-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:35Z\"\n"} +{"Time":"2023-05-31T12:40:23.361066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:23.36107-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:40:23.361073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"343\"\n"} +{"Time":"2023-05-31T12:40:23.361076-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 0a949e60-d1f2-46d1-ac90-090b6cc9be18\n"} +{"Time":"2023-05-31T12:40:23.361079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.361082-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.361085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" jws-kubeconfig-p9tup9: eyJhbGciOiJIUzI1NiIsImtpZCI6InA5dHVwOSJ9..tOT9ncNFAEPe0uP-ZKoXztMtihjoGH2HgIvBaZlxRmw\n"} +{"Time":"2023-05-31T12:40:23.361087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:40:23.361089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.361091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters:\n"} +{"Time":"2023-05-31T12:40:23.361093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:40:23.361097-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCakNDQWU2Z0F3SUJBZ0lCQVRBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwdGFXNXAKYTNWaVpVTkJNQjRYRFRJek1EVXpNREU0TkRReE5Gb1hEVE16TURVeU9ERTRORFF4TkZvd0ZURVRNQkVHQTFVRQpBeE1LYldsdWFXdDFZbVZEUVRDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBTCtXCitneFltMnNKQjJPdWkrbUxpY3FKUU1wbDNQMTdDUmVvak4xQWNBdngrK2Z3S1djTTZud042SmZmNTA3Q05HamcKTm1Cdzh1UC9sU1ZBSGY5dG5tN3g0Kytub1dBL0FsYncvMkJRTHhOb0FMTEJ1YnFrNmgrcW9jQm9pSkNJZGpSLwpVOHRoTmhXM0xScElmdHF5VktKQTRJc2ZrOHZvOFUzdXFKT04yd1FlS1RKMUgvbnJyMjQ0S3NhUFgwWW92elVPCnIwK05PeXhWdTFJL2k3ckdNaHVNNzV5TVoxeE9WWloyNnZPaFVOS092OVk0cFRjRzMvT0NtKzk0aDU4dnhuTTcKQ2JEZEozMnREL2YrWjVrS3VnV0Z0RWRtOEg2QnJqckxqcFlqR0k3OUJjMlpFVFRxQmtCaUpXdi80K1hyblUvUQpwTzNtMnJ5cmhBMUxOSFRyMEc4Q0F3RUFBYU5oTUY4d0RnWURWUjBQQVFIL0JBUURBZ0trTUIwR0ExVWRKUVFXCk1CUUdDQ3NHQVFVRkJ3TUNCZ2dyQmdFRkJRY0RBVEFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVcKQkJUYVlvOHZkanRNS1lqUkpXaXpHRGQ3d0Z4Z296QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRU"} +{"Time":"2023-05-31T12:40:23.3611-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"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\n"} +{"Time":"2023-05-31T12:40:23.361185-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:40:23.361191-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:40:23.361224-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:40:23.361227-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:40:23.361231-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:40:23.361248-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:40:23.361251-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users: null\n"} +{"Time":"2023-05-31T12:40:23.361274-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.361277-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.36128-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:23Z\"\n"} +{"Time":"2023-05-31T12:40:23.361284-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:40:23.361286-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:40:23.361288-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"334\"\n"} +{"Time":"2023-05-31T12:40:23.36129-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: a0051f3c-3b1a-4533-a83c-54fb36d1ff0e\n"} +{"Time":"2023-05-31T12:40:23.361292-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.361294-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.361297-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:40:23.361299-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.361302-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:23.361306-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:23.361309-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:23.361311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:23.361334-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:23.361342-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:23.361345-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:23.361349-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:23.361352-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:23.361355-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:23.361357-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:23.361359-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:23.361361-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:23.361363-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:23.361365-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:23.361367-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:23.36137-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:23.361372-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.361374-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.361376-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.361378-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" annotations:\n"} +{"Time":"2023-05-31T12:40:23.36138-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:40:23.361382-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:40:23.361385-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:40:23.361387-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:40:23.361389-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:35Z\"\n"} +{"Time":"2023-05-31T12:40:23.361487-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:23.361513-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:40:23.361517-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"344\"\n"} +{"Time":"2023-05-31T12:40:23.361519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 0a501846-3375-4b6f-a56e-d6dcbec30bed\n"} +{"Time":"2023-05-31T12:40:23.361521-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.361524-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.361527-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:40:23.36153-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:40:23.361534-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" log\n"} +{"Time":"2023-05-31T12:40:23.361537-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" errors\n"} +{"Time":"2023-05-31T12:40:23.36154-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" health {\n"} +{"Time":"2023-05-31T12:40:23.361543-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:40:23.361546-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T12:40:23.361549-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ready\n"} +{"Time":"2023-05-31T12:40:23.361552-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:40:23.361556-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:40:23.361559-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:40:23.361562-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:40:23.361565-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T12:40:23.36157-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:40:23.361573-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hosts {\n"} +{"Time":"2023-05-31T12:40:23.361576-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:40:23.36158-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:40:23.361583-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T12:40:23.361586-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:40:23.361589-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:40:23.361647-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T12:40:23.361651-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cache 30\n"} +{"Time":"2023-05-31T12:40:23.361653-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" loop\n"} +{"Time":"2023-05-31T12:40:23.361655-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" reload\n"} +{"Time":"2023-05-31T12:40:23.361657-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:40:23.361659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T12:40:23.361661-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.361663-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.361665-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:23Z\"\n"} +{"Time":"2023-05-31T12:40:23.361667-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:40:23.361669-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.361671-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"401\"\n"} +{"Time":"2023-05-31T12:40:23.361716-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 7b101187-8149-43b1-abe1-93cd6cf8afe7\n"} +{"Time":"2023-05-31T12:40:23.361718-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.36172-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.361723-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:40:23.361725-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.361727-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:23.361729-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:23.361731-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:23.361734-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:23.361736-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:23.361738-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:23.36174-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:23.361742-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:23.361765-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:23.36177-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:23.361773-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:23.361775-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:23.361777-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:23.361779-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:23.361781-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:23.361783-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:23.361785-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:23.361788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.361804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:40:23.361806-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:40:23.361808-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.361811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:40:23.361834-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM5MTRaFw0zMzA1MjgxOTM5MTRaMBkxFzAV\n"} +{"Time":"2023-05-31T12:40:23.361838-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:40:23.361841-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CgKCAQEAtEi+7xRBGZV0+PDhW77xCFJHkakj9NUaWggIbgwBw27kzTTvVLirR7S2\n"} +{"Time":"2023-05-31T12:40:23.361844-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 6SuCPvYPovVRLwcx1+Yp5DdBm/20zohiI9bG7YwMot9bI5Un/ooqJXhDqf+Mc8pN\n"} +{"Time":"2023-05-31T12:40:23.361848-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lS4j3r5TR0x5EFgIwntvWNfWBFDph9CeyO68jZsj1NQPcimqyfJrSTHPP0hw8GaR\n"} +{"Time":"2023-05-31T12:40:23.361851-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lBSqFUyG/4wK1O4sPYTri/WsMA7PH63N63wYZCPEMTiUH7GtHkteoehK90wbqoo3\n"} +{"Time":"2023-05-31T12:40:23.361855-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0bXdM9llO5mvjq3iyqbMVtz0xcT3c1DPcsNuvgAhgpTozav22FA9jv+ldKRMUSRG\n"} +{"Time":"2023-05-31T12:40:23.361858-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Xw5zqSOw9oV4WtoPSfhFgvcDiI7+GwIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:40:23.361877-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUR66mxYbC2LtZez/bWW3sL5KWqQow\n"} +{"Time":"2023-05-31T12:40:23.36188-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBALCe\n"} +{"Time":"2023-05-31T12:40:23.361882-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" U5Mitphm6p+QG2gJw5pQceVJSjDFZ7hIkY/6henKtestZdg/hTKhGzvLxXYELN0k\n"} +{"Time":"2023-05-31T12:40:23.361884-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DAxowhccLt+nnCsl+HOpQZDHKdY9CNKsb9bT0pb2FFBK9zrVGuG+WcRdSWAl/wcs\n"} +{"Time":"2023-05-31T12:40:23.361886-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" iEiLnf2DDKlec8xCbZBigUvdyNWYpj43XSpAkq3R7mD9QX+VbSmAZl+vc08Pq5Oa\n"} +{"Time":"2023-05-31T12:40:23.361888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" yBSrMzm1eMz8GE8qMfhy2/Duqymem0arIvqXgxXhHSLJuTz3zYe8DNMxnSoZPYZo\n"} +{"Time":"2023-05-31T12:40:23.36189-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QJECtWhHfbBIGs2zkfF3s8FwOSQe1TulIMR7KPO2eucG5sXqFfcy1Bp7SMurcYWj\n"} +{"Time":"2023-05-31T12:40:23.361894-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rZt8VUr/NBGRvSWNzrE=\n"} +{"Time":"2023-05-31T12:40:23.361897-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.3619-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:40:23.361904-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:40:23.361907-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:40:23.36191-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.361913-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.361915-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:20Z\"\n"} +{"Time":"2023-05-31T12:40:23.361917-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:40:23.361919-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.361921-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"25\"\n"} +{"Time":"2023-05-31T12:40:23.361923-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 6c30a356-4f8c-438e-86c6-8ebbee4367ad\n"} +{"Time":"2023-05-31T12:40:23.361925-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.361927-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.36198-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:40:23.362006-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.36201-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.362013-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:20Z\"\n"} +{"Time":"2023-05-31T12:40:23.362017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:40:23.36202-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.362023-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"38\"\n"} +{"Time":"2023-05-31T12:40:23.362027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 07ce3c0a-9cc3-4d1b-bde8-9a3328c64e11\n"} +{"Time":"2023-05-31T12:40:23.36203-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.362047-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.362052-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:40:23.362076-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:40:23.362079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:40:23.36212-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:40:23.362147-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:40:23.36215-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362152-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:40:23.362154-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362156-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:40:23.362158-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:40:23.36216-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:40:23.362162-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.362164-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:40:23.362167-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:40:23.362175-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" min: null\n"} +{"Time":"2023-05-31T12:40:23.362198-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:23.362202-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:23.362206-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:40:23.362208-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:40:23.36221-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362212-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362215-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:40:23.362217-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362219-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362222-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" iptables:\n"} +{"Time":"2023-05-31T12:40:23.362225-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:40:23.362227-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:40:23.362229-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:40:23.362232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.362234-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.362236-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:40:23.362238-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:40:23.36224-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.362242-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362244-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:40:23.362246-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.362248-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:23.36225-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:23.362252-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:23.362254-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:40:23.362345-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:40:23.362349-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362351-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:40:23.362354-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:40:23.362356-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362358-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:40:23.36236-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:40:23.362362-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:40:23.362364-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:40:23.362367-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362369-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362371-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:40:23.362373-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:40:23.362375-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.362377-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:40:23.36238-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters:\n"} +{"Time":"2023-05-31T12:40:23.362382-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:40:23.362385-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:40:23.362387-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:40:23.36239-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: default\n"} +{"Time":"2023-05-31T12:40:23.362392-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts:\n"} +{"Time":"2023-05-31T12:40:23.362394-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - context:\n"} +{"Time":"2023-05-31T12:40:23.362396-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:40:23.362398-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:40:23.3624-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user: default\n"} +{"Time":"2023-05-31T12:40:23.362402-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: default\n"} +{"Time":"2023-05-31T12:40:23.362404-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:40:23.362571-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users:\n"} +{"Time":"2023-05-31T12:40:23.362588-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - name: default\n"} +{"Time":"2023-05-31T12:40:23.36259-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user:\n"} +{"Time":"2023-05-31T12:40:23.362593-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:40:23.362595-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.362606-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.362609-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:23Z\"\n"} +{"Time":"2023-05-31T12:40:23.362612-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" labels:\n"} +{"Time":"2023-05-31T12:40:23.362615-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.362618-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:40:23.362629-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.36264-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"276\"\n"} +{"Time":"2023-05-31T12:40:23.362642-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 7f8af5c8-09ac-4093-a554-be99eb4c7c73\n"} +{"Time":"2023-05-31T12:40:23.362646-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.362649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.362652-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:40:23.362655-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.362657-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:23.362659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:23.362661-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:23.362664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:23.362666-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:23.36268-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:23.362684-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:23.362686-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:23.362824-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:23.362838-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:23.362842-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:23.362845-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:23.362847-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:23.36285-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:23.362853-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:23.362855-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:23.362858-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:23.36286-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:23.362862-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.362864-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.362866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" annotations:\n"} +{"Time":"2023-05-31T12:40:23.362875-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:40:23.36288-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:40:23.362883-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:40:23.362885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:40:23.362888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:35Z\"\n"} +{"Time":"2023-05-31T12:40:23.36289-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:23.362892-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.362894-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"345\"\n"} +{"Time":"2023-05-31T12:40:23.362896-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: f686a9af-c5f4-41d4-ac93-f99b2093f597\n"} +{"Time":"2023-05-31T12:40:23.363045-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.363049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.363051-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:40:23.363053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:40:23.363055-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:40:23.363058-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:40:23.36306-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - localhost\n"} +{"Time":"2023-05-31T12:40:23.363062-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - 192.168.76.2\n"} +{"Time":"2023-05-31T12:40:23.363064-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:40:23.363066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:40:23.363068-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:40:23.363071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:40:23.363073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:40:23.363075-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:40:23.363088-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:40:23.363091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:40:23.363093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:40:23.363095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:40:23.363097-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:40:23.363108-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:40:23.363111-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:40:23.363113-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" etcd:\n"} +{"Time":"2023-05-31T12:40:23.363115-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" local:\n"} +{"Time":"2023-05-31T12:40:23.363117-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:40:23.363119-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:40:23.363121-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:40:23.363341-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:40:23.363346-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:40:23.363348-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:40:23.36335-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" networking:\n"} +{"Time":"2023-05-31T12:40:23.363352-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:40:23.363354-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:40:23.363356-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:40:23.363358-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:40:23.36336-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:40:23.363362-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:40:23.363367-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.363369-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.363371-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:22Z\"\n"} +{"Time":"2023-05-31T12:40:23.363373-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:40:23.363375-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.363377-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"235\"\n"} +{"Time":"2023-05-31T12:40:23.36338-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 9efc8b05-4886-45df-a6e7-6cd260eb7daa\n"} +{"Time":"2023-05-31T12:40:23.363382-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:23.363384-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T12:40:23.363386-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:40:23.363388-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:40:23.36339-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authentication:\n"} +{"Time":"2023-05-31T12:40:23.363392-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:40:23.363394-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:40:23.363396-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" webhook:\n"} +{"Time":"2023-05-31T12:40:23.363398-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:40:23.3634-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:40:23.363614-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" x509:\n"} +{"Time":"2023-05-31T12:40:23.363618-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:40:23.36362-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authorization:\n"} +{"Time":"2023-05-31T12:40:23.363623-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:40:23.363625-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" webhook:\n"} +{"Time":"2023-05-31T12:40:23.363628-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:40:23.36363-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:40:23.363635-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:40:23.363639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:40:23.363642-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:40:23.363645-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:40:23.363648-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:40:23.36365-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.363652-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:40:23.363654-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:40:23.36367-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:40:23.363676-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:40:23.363679-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.363681-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:40:23.363683-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:23.363685-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:40:23.363687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:40:23.363689-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:40:23.363691-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:23.363693-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:40:23.363695-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:40:23.363697-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:40:23.363856-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" logging:\n"} +{"Time":"2023-05-31T12:40:23.363862-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:40:23.363864-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" options:\n"} +{"Time":"2023-05-31T12:40:23.363866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" json:\n"} +{"Time":"2023-05-31T12:40:23.363868-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:40:23.363871-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:40:23.363873-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:40:23.363875-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:23.363877-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:23.363879-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:40:23.363881-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:40:23.363883-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.363885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:40:23.363887-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:40:23.363889-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:23.363891-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:23.363893-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:23.363895-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:23.363897-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.3639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:39:22Z\"\n"} +{"Time":"2023-05-31T12:40:23.363902-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:40:23.363904-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:23.363906-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"243\"\n"} +{"Time":"2023-05-31T12:40:23.363908-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: d4ea878f-7f06-4816-a24f-367c2cf5cc83\n"} +{"Time":"2023-05-31T12:40:23.36391-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: List\n"} +{"Time":"2023-05-31T12:40:23.363912-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:23.364084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:40:23.364089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.364092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.364094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:40:23.364096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:23.364099-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: loaded (\u001b]8;;file://bridge-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:23.364102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:11 UTC; 1min 5s ago\r\n"} +{"Time":"2023-05-31T12:40:23.364104-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:40:23.364106-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:23.364108-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Main PID: 1041 (dockerd)\r\n"} +{"Time":"2023-05-31T12:40:23.36411-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tasks: 17\r\n"} +{"Time":"2023-05-31T12:40:23.364113-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Memory: 177.7M\r\n"} +{"Time":"2023-05-31T12:40:23.364115-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CPU: 7.395s\r\n"} +{"Time":"2023-05-31T12:40:23.364117-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:40:23.364119-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─1041 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:40:23.364122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364124-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:11 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:11.166463596Z\" level=info msg=\"Loading containers: start.\"\r\n"} +{"Time":"2023-05-31T12:40:23.364127-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:11 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:11.278081897Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\r\n"} +{"Time":"2023-05-31T12:40:23.364129-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:11 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:11.327252377Z\" level=info msg=\"Loading containers: done.\"\r\n"} +{"Time":"2023-05-31T12:40:23.364132-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:11 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:11.371541193Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\r\n"} +{"Time":"2023-05-31T12:40:23.36427-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:11 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:11.371616841Z\" level=info msg=\"Daemon has completed initialization\"\r\n"} +{"Time":"2023-05-31T12:40:23.364275-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:11 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:11.413974939Z\" level=info msg=\"API listen on /var/run/docker.sock\"\r\n"} +{"Time":"2023-05-31T12:40:23.364277-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:11 bridge-996000 systemd[1]: Started Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T12:40:23.36428-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:11 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:11.414872378Z\" level=info msg=\"API listen on [::]:2376\"\r\n"} +{"Time":"2023-05-31T12:40:23.364282-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:47.607736850Z\" level=info msg=\"ignoring event\" container=ce576e9ac06140d6cd4e1ba58b8d4a9b6973436d52df0cd9b57c41df8fa7740a module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:40:23.364295-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 dockerd[1041]: time=\"2023-05-31T19:39:47.707705807Z\" level=info msg=\"ignoring event\" container=7c0d4297b57181cb1e6959948793b8fba6c579febd97084b878b713f28f09f05 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:40:23.364298-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.3643-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.364303-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:40:23.364305-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.364307-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:23.364319-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:23.364322-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:40:23.364324-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:40:23.364326-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:40:23.364328-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:23.36433-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:40:23.364332-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:40:23.364414-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:40:23.364417-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364419-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.364421-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:23.364434-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:40:23.364437-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364439-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364441-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364443-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:40:23.364445-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:40:23.364453-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:40:23.364457-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:40:23.364459-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:40:23.364461-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:40:23.364463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:40:23.364465-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364468-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:40:23.36448-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:40:23.364482-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:40:23.364484-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:40:23.364487-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:40:23.364489-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364491-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:23.364609-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:23.364613-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.364616-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.364618-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.36462-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364622-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:40:23.364624-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:40:23.364626-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.364628-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:40:23.36463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:40:23.364639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:23.364641-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364643-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:40:23.364645-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:23.364647-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.364649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:23.364651-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:23.364654-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.364655-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.364658-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:40:23.36466-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:23.364662-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:40:23.364664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:40:23.364666-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:40:23.364668-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:40:23.364816-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:23.36482-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:40:23.364822-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:23.364824-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.364826-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.364828-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:40:23.36483-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:40:23.364834-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:40:23.364836-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:40:23.364837-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:40:23.36484-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:40:23.364842-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:40:23.364844-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:40:23.364846-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:40:23.364848-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.36485-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:40:23.364852-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers: 17\r\n"} +{"Time":"2023-05-31T12:40:23.364854-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Running: 16\r\n"} +{"Time":"2023-05-31T12:40:23.364856-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:40:23.364858-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Stopped: 1\r\n"} +{"Time":"2023-05-31T12:40:23.36486-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Images: 9\r\n"} +{"Time":"2023-05-31T12:40:23.364862-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:40:23.364864-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:40:23.364866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:40:23.364869-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:40:23.364871-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:40:23.364873-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:40:23.364875-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:40:23.365035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:40:23.365039-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:40:23.365041-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:40:23.365043-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:40:23.365045-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:40:23.365059-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:40:23.365063-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:40:23.365067-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:40:23.36507-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Runtimes: io.containerd.runc.v2 runc\r\n"} +{"Time":"2023-05-31T12:40:23.365073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:40:23.365076-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:40:23.365079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:40:23.365082-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:40:23.365084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:40:23.365086-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:40:23.365088-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:40:23.36509-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:40:23.365092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:40:23.365094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:40:23.365096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:40:23.365099-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:40:23.365102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:40:23.365105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:40:23.365108-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:40:23.365109-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: bridge-996000\r\n"} +{"Time":"2023-05-31T12:40:23.365112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ID: 4f50f7a7-1f98-4ad2-b63b-dc3effff291b\r\n"} +{"Time":"2023-05-31T12:40:23.365114-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:40:23.365226-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:40:23.36523-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:40:23.365232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:40:23.365235-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:40:23.365237-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:40:23.365239-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:40:23.365241-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:40:23.365243-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:40:23.365245-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:40:23.365247-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.365249-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.365251-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.365253-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:40:23.365256-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:23.365259-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: loaded (\u001b]8;;file://bridge-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:23.365261-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:40:23.365264-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─\u001b]8;;file://bridge-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:23.365266-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:12 UTC; 1min 6s ago\r\n"} +{"Time":"2023-05-31T12:40:23.365268-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:40:23.36527-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:23.365273-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Main PID: 1261 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:40:23.365275-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tasks: 11\r\n"} +{"Time":"2023-05-31T12:40:23.365277-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Memory: 17.5M\r\n"} +{"Time":"2023-05-31T12:40:23.365279-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CPU: 1.637s\r\n"} +{"Time":"2023-05-31T12:40:23.3654-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:40:23.365405-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─1261 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:40:23.365408-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.36541-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:17Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/904c9b316bbc68fdb0939cc8d99b4bb7473f9a05aaced339c48f7bb4da12f62e/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:23.365414-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:17Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/de285886d77271b3a09175e5d8fd05fa4ffae56fa9a0f06316463f126be79cc4/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:23.365418-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:17 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:17Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/4dbbb0ffa8a97c1d2948da01d6445c7cc9af53618c8965f031fe7afd8f967859/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:23.365422-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:36Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/4f33bfc727dc90318c9e3f3bf42e4f14cb1011485965636e60dca1dfc4da1336/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:23.365425-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:36 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:36Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/7c0d4297b57181cb1e6959948793b8fba6c579febd97084b878b713f28f09f05/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:23.365427-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:37 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:37Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/578cc80b60403d19ce9ba2a6a305ff1353bd1b372ec0386a99fe300e77644dbf/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:23.36543-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:38Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/392401e34a7d68ddfe5a25ec48d6b8442a5c5e545ff546775d60575d3553cb98/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:23.365433-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:44 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:44Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/24,},}\"\r\n"} +{"Time":"2023-05-31T12:40:23.36562-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:50Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349/resolv.conf as [nameserver 10.96.0.10 search default.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\r\n"} +{"Time":"2023-05-31T12:40:23.365625-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:55 bridge-996000 cri-dockerd[1261]: time=\"2023-05-31T19:39:55Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:40:23.365627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.365629-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.365631-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:40:23.365634-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.365637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:23.365639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:23.365641-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:40:23.365643-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:40:23.365645-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:23.365648-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:40:23.36565-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.365651-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.365653-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:23.365656-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:40:23.365658-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:40:23.36566-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:40:23.365662-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:40:23.365664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:23.365666-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.365668-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:40:23.365827-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:40:23.365833-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:40:23.365836-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:40:23.365839-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.365841-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:40:23.365853-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:40:23.365856-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:40:23.365858-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:40:23.36586-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.365863-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:23.365874-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:23.365876-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.365878-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.36588-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.365882-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.365886-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:40:23.365889-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:40:23.365892-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.365894-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:23.365896-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:23.365898-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.3659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:23.365902-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:23.365913-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.365916-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.366035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.366038-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:40:23.36604-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:40:23.366042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366044-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:40:23.366049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.366061-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:40:23.366063-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=cni --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:40:23.366066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366068-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:40:23.36607-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:23.366084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:23.366087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:40:23.366089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:40:23.366091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:23.366094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:40:23.366095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.366098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.3661-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:23.366103-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:40:23.366105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:40:23.366107-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:40:23.366109-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:40:23.366241-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:23.366243-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.366245-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:40:23.366248-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:40:23.36625-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:40:23.366252-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:40:23.366254-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.366256-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:40:23.366258-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:40:23.36626-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:40:23.366262-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:40:23.366264-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.366266-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:23.366268-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:23.36627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.366272-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.366275-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.366277-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.366279-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:40:23.366281-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:40:23.366283-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.366285-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:23.366287-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:23.366289-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.366424-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:23.366427-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:23.366429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366431-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366433-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:40:23.366435-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:40:23.366437-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366439-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366441-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:40:23.366443-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:40:23.366445-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: loaded (\u001b]8;;file://bridge-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:23.366448-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:10 UTC; 1min 9s ago\r\n"} +{"Time":"2023-05-31T12:40:23.36645-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:23.366452-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Main PID: 821 (containerd)\r\n"} +{"Time":"2023-05-31T12:40:23.366454-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tasks: 185\r\n"} +{"Time":"2023-05-31T12:40:23.366456-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Memory: 67.5M\r\n"} +{"Time":"2023-05-31T12:40:23.366459-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CPU: 2.444s\r\n"} +{"Time":"2023-05-31T12:40:23.366461-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:40:23.366463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─ 821 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:40:23.366466-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─1890 /usr/bin/containerd-shim-runc-v2 -namespace moby -id c46aecfa20363b2f126a2b8bf3c59406acdfffcebe5fba71f9689fa7ec27971a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366468-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─1915 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 904c9b316bbc68fdb0939cc8d99b4bb7473f9a05aaced339c48f7bb4da12f62e -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.36647-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─1944 /usr/bin/containerd-shim-runc-v2 -namespace moby -id de285886d77271b3a09175e5d8fd05fa4ffae56fa9a0f06316463f126be79cc4 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366628-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─1972 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 4dbbb0ffa8a97c1d2948da01d6445c7cc9af53618c8965f031fe7afd8f967859 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366632-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─2065 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 9c60c490cf663cb6164a27d3ddf821596c2787f214da4fd8bf7381ce3ad47efe -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366635-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─2085 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 6a13d44e97e9916c8be6286a6613cd37d32419fa3eed0d31ca1bdfb2d2eb3819 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─2105 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 67784a64edd6612b00b2a24c08f4ec92e88f7b8ea8f177db46aee03abfc75fe1 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─2135 /usr/bin/containerd-shim-runc-v2 -namespace moby -id b1a3dc34780a7791d1b6e0050fdd08439f6b06f5309e20298a9b616e4edd147c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366642-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─2877 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 4f33bfc727dc90318c9e3f3bf42e4f14cb1011485965636e60dca1dfc4da1336 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366644-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─2951 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 7a93b9e068f501d0474d9c6fe8838fd241df839f71221a38b15ba7c982c1c694 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366646-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─2992 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 578cc80b60403d19ce9ba2a6a305ff1353bd1b372ec0386a99fe300e77644dbf -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─3253 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 96da6b5457e7d7fdbb87d8b23e69ea264d6af41ca3f144cc61e084a20b0e369b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366651-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─3404 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 392401e34a7d68ddfe5a25ec48d6b8442a5c5e545ff546775d60575d3553cb98 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366654-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─3444 /usr/bin/containerd-shim-runc-v2 -namespace moby -id d85e610614691baac86c19aaee9de65168f776168c84a76714c0543a519d2042 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366656-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─3702 /usr/bin/containerd-shim-runc-v2 -namespace moby -id ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366658-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─3845 /usr/bin/containerd-shim-runc-v2 -namespace moby -id acd2a815eb0da24f8db4373aec2f186330956089cd911561ea17447ba0817b21 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:23.366852-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.366861-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:47.708195293Z\" level=info msg=\"cleaning up dead shim\"\r\n"} +{"Time":"2023-05-31T12:40:23.366901-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:47 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:47.718746701Z\" level=warning msg=\"cleanup warnings time=\\\"2023-05-31T19:39:47Z\\\" level=info msg=\\\"starting signal loop\\\" namespace=moby pid=3658 runtime=io.containerd.runc.v2\\n\"\r\n"} +{"Time":"2023-05-31T12:40:23.366908-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:50.557419265Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:40:23.366912-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:50.557516323Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:40:23.366916-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:50.557528583Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:40:23.36693-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:50 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:50.557891390Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/ff723205c4fbc7d32482cb06dbabe7dea7ca0c6371beab538d54395d35b6c349 pid=3702 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:40:23.366955-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:56 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:56.032885363Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:40:23.366962-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:56 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:56.032997661Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:40:23.366966-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:56 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:56.033013692Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:40:23.366971-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:56 bridge-996000 containerd[821]: time=\"2023-05-31T19:39:56.033229583Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/acd2a815eb0da24f8db4373aec2f186330956089cd911561ea17447ba0817b21 pid=3845 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:40:23.366975-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366978-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.366981-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:40:23.367151-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.367159-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:40:23.367163-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.367166-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:40:23.367169-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:40:23.367171-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:40:23.367173-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.367175-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:40:23.367177-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.367179-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:40:23.367182-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:40:23.367185-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:40:23.367197-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:40:23.367202-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:40:23.367205-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367207-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:23.367209-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:40:23.367211-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:40:23.367213-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:40:23.367215-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367217-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.367219-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:40:23.367221-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:40:23.367223-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367355-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:23.367405-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:23.36742-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:23.367425-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:23.367427-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:40:23.367429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:23.367431-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:23.367433-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.367442-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.367445-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.367447-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:40:23.36745-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:40:23.367452-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.367454-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:40:23.367466-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367468-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:23.36747-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:23.367472-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.367474-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.367476-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:40:23.367487-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:40:23.36749-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.367492-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:40:23.367495-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:40:23.367507-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:40:23.367511-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.367595-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:40:23.367602-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.367606-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:40:23.367619-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:40:23.367623-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:40:23.367627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:40:23.36763-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:40:23.367633-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:23.36764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:40:23.367644-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:40:23.367647-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:40:23.36765-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367653-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.367656-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:40:23.36766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:40:23.367663-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367666-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:23.367669-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:23.367673-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:23.367676-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:23.367679-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:40:23.367681-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:23.367683-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:23.367686-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.367688-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.367738-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.367741-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:40:23.367743-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:40:23.367746-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.367748-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:40:23.36775-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367752-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:23.367754-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:23.367758-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.36776-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.367762-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:40:23.367764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:40:23.367767-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:23.367769-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:23.367773-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:40:23.367776-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:40:23.367779-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367782-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:40:23.367785-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:40:23.367789-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.367793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.367796-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:40:23.367799-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:40:23.367801-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367803-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:40:23.367805-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.367807-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.367921-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.367927-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.36793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367933-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:40:23.367936-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.36795-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:40:23.367952-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367954-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:40:23.367956-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.367959-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367961-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:40:23.367963-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:40:23.367965-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:40:23.367967-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:40:23.367969-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.367971-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:40:23.367975-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:40:23.367977-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:40:23.367979-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:40:23.367981-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:40:23.367983-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:40:23.367986-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:40:23.36799-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.367993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:40:23.367996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:40:23.368-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:40:23.368003-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.368131-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:40:23.368136-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368139-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368141-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368143-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:40:23.368154-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:23.36816-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:40:23.368163-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:40:23.368167-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:40:23.368171-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368174-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:40:23.368177-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:40:23.368181-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:40:23.368184-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368187-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:40:23.36819-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:40:23.368193-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368196-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:40:23.368199-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:40:23.368202-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:40:23.368205-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:40:23.368208-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:40:23.368211-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:40:23.368214-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:40:23.368362-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:40:23.368369-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.368372-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.368375-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:40:23.368379-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:40:23.368393-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:40:23.368396-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:40:23.368399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368401-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:40:23.368403-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:23.368406-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:23.368411-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368414-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:40:23.368417-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368421-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:40:23.368424-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368427-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368431-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:40:23.368434-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368437-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368442-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.368445-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368448-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.368451-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368453-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:40:23.368457-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:40:23.36846-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.368463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:40:23.368621-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:40:23.36863-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368634-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368638-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368641-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.368644-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.368648-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368651-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:40:23.368656-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.36866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:40:23.368663-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368667-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:40:23.36867-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368673-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:40:23.368677-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:40:23.36868-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:40:23.368684-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:40:23.368687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:40:23.36869-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:40:23.368694-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.368697-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:40:23.3687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:40:23.368704-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:40:23.368707-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:40:23.36871-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:40:23.368714-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:40:23.368717-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:40:23.368937-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:40:23.368943-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:40:23.368946-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:40:23.36895-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:40:23.368953-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:40:23.368956-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:40:23.36896-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:40:23.368963-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:40:23.368967-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:40:23.36897-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:40:23.368974-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:40:23.368977-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:40:23.368991-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:40:23.368999-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369002-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:40:23.369004-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:40:23.369006-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:40:23.369008-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369011-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369013-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:40:23.369015-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:40:23.369017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:40:23.369027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369033-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369037-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:40:23.369076-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:40:23.369085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.369089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:40:23.369092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:40:23.369095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:40:23.369097-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:40:23.369099-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:40:23.369102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:40:23.369109-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369115-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:40:23.369118-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:23.369122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:23.369125-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:23.369128-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369132-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369135-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369139-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369142-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369146-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:40:23.369149-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369234-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:40:23.369239-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369241-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:23.369244-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369246-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369248-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:40:23.36925-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:23.369252-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:23.369254-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:23.369257-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369259-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369276-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369281-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:40:23.369285-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.36929-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:40:23.369294-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:40:23.369297-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369301-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:40:23.369304-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369308-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:40:23.369315-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:23.369318-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:23.369322-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:23.369325-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369512-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369518-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369522-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369525-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369528-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:40:23.369532-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369535-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:40:23.369538-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:40:23.369541-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369544-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:40:23.369557-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:40:23.369564-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369568-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:40:23.369571-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369575-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:40:23.369578-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369581-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:40:23.369584-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369587-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:40:23.369591-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369594-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:40:23.369597-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369601-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369603-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369605-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:40:23.369764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:23.36977-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369775-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:40:23.369778-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:40:23.36978-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369782-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:40:23.369785-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:40:23.369789-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:40:23.369791-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:40:23.369795-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:40:23.369798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369801-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:40:23.369804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:40:23.369807-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369812-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:40:23.369815-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:40:23.369818-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.369822-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.369825-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:40:23.369828-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:40:23.36983-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369833-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:40:23.369836-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:40:23.369838-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:40:23.36984-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.369842-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:40:23.37003-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370036-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370039-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370043-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370056-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370059-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370063-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37007-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:40:23.370077-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.37008-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:40:23.370083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370086-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.37009-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.3701-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370103-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370106-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370109-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370116-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:40:23.370333-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37034-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370343-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370345-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370347-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370351-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370353-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:40:23.370355-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370357-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370359-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:40:23.370361-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370363-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:40:23.370365-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370368-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370371-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370375-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370378-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370381-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:40:23.370385-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:40:23.370388-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370391-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370396-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:40:23.370399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:40:23.37042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:40:23.37046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:40:23.370466-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:40:23.370479-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370483-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:40:23.370485-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:40:23.370487-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:40:23.37049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:40:23.370492-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:40:23.370494-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:40:23.370497-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370499-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:40:23.370502-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370504-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.370505-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:23.370508-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.37051-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.370512-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:40:23.370514-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:40:23.370517-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: loaded (\u001b]8;;file://bridge-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:23.370519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:40:23.370521-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:23.370523-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:40:23.370525-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.370527-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.370534-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:40:23.370589-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:23.370596-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:23.3706-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:40:23.370604-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:40:23.370607-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:23.370611-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:40:23.370614-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:23.370617-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37062-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:23.370624-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:23.370627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:40:23.37063-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:40:23.370634-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:40:23.370637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:40:23.37064-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:40:23.370653-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:40:23.370657-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:40:23.370659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:40:23.370661-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:40:23.370664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.370667-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:40:23.37067-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:40:23.370673-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:23.370676-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:40:23.370679-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:40:23.370683-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:40:23.370755-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370761-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:23.370764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:23.370768-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:40:23.370771-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.370774-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.370777-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:40:23.370781-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:40:23.370784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:23.370787-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.370791-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:23.370794-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.370798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:40:23.370802-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:40:23.370805-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370808-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:40:23.370814-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370818-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37082-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:40:23.370822-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.370824-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:40:23.370827-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:40:23.37083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:40:23.370833-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:40:23.370836-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.370982-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:40:23.370988-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.370991-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:40:23.370995-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:40:23.370998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:40:23.371001-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:40:23.371003-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371005-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:40:23.371008-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:40:23.37101-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:40:23.371012-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:40:23.371014-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:40:23.371016-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371018-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:40:23.37102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:40:23.371022-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:40:23.371025-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:40:23.37103-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:40:23.371032-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:40:23.371038-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:40:23.371041-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:40:23.37118-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371186-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:40:23.37119-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:40:23.371202-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:40:23.371205-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.371207-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371209-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:40:23.371211-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:40:23.371213-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:40:23.371215-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371217-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:40:23.37122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:40:23.371223-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:40:23.371225-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:40:23.371228-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37123-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:40:23.371232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:40:23.371234-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:40:23.371236-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:40:23.371238-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37124-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:40:23.371242-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:40:23.371255-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:40:23.371262-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371266-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:40:23.371406-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:40:23.371412-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:40:23.371424-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:40:23.371428-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37143-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:40:23.371432-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:40:23.371434-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371438-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:40:23.371441-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:40:23.371443-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371445-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:40:23.371447-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:40:23.371449-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371451-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:40:23.371454-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:40:23.371456-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:40:23.371458-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371459-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:40:23.371472-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:40:23.371483-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371493-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:40:23.371495-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.371497-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371499-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:40:23.371501-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:40:23.371622-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:40:23.371626-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.371628-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371631-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:40:23.371633-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:40:23.371635-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.371637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371657-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:40:23.371664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:40:23.371667-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:40:23.371671-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.371674-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371677-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:40:23.37168-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:40:23.371682-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371684-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:40:23.371686-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:40:23.371688-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37169-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:40:23.371692-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:40:23.371694-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:40:23.371696-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371698-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:40:23.371701-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:40:23.371817-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:40:23.37183-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:40:23.371842-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:40:23.371847-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.37185-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371854-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:40:23.371857-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:40:23.371861-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371864-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:40:23.371866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.371868-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:40:23.37187-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371873-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:40:23.371875-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:40:23.371877-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:40:23.371879-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.371881-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371883-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:40:23.371886-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:40:23.371889-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.371891-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.371893-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:40:23.371895-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:40:23.372046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:40:23.372052-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:40:23.372055-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.372059-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372062-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:40:23.372066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:40:23.372078-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:40:23.372081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:40:23.372083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.372085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:40:23.372089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:40:23.372092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:40:23.372098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:40:23.372102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.372105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.372109-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:40:23.372123-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:40:23.372129-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:40:23.372134-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:40:23.372138-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:40:23.372141-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372145-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:40:23.372287-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:40:23.372293-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:40:23.372297-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:40:23.3723-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.372304-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:40:23.372307-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37231-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:40:23.372312-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:40:23.372314-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.372316-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372319-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:40:23.372321-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:40:23.372323-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:40:23.372325-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372338-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:40:23.372341-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.372344-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.372346-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372348-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:40:23.37235-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:40:23.372352-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372354-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:40:23.372356-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.372369-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372481-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:40:23.372485-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:40:23.372487-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:40:23.372489-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:40:23.372501-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:40:23.372506-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:40:23.372509-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:40:23.372513-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:40:23.372516-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:40:23.372519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:40:23.372522-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:40:23.372534-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:40:23.37254-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:40:23.372544-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.372548-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372552-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:40:23.372556-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:40:23.372559-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:40:23.372561-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372564-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:40:23.372566-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:40:23.372568-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:40:23.37257-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.372573-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372575-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:40:23.372718-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:40:23.372733-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:40:23.372736-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:40:23.37274-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.372743-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372745-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:40:23.372747-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:40:23.37275-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:40:23.372752-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:40:23.372754-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:40:23.372756-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.372758-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372761-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:40:23.372764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:40:23.372766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:40:23.372768-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:40:23.37277-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.372772-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372774-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:40:23.372788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:40:23.372793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:40:23.372811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:40:23.372815-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372818-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:40:23.37282-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:40:23.372954-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:40:23.372958-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:40:23.37296-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.372963-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.372965-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:40:23.372967-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:40:23.372969-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:40:23.372971-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.372973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:40:23.372975-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:40:23.372977-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:40:23.37298-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.372982-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:40:23.372984-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:40:23.372986-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:40:23.372988-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:40:23.373008-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.373014-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.373017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373019-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:40:23.373022-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:40:23.373025-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:40:23.373027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373162-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:40:23.373165-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:40:23.373168-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:40:23.37317-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:40:23.373172-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:40:23.373174-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373177-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:40:23.373179-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:40:23.373181-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373183-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:40:23.373185-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:40:23.373187-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37319-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:40:23.373193-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:40:23.373196-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373199-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:40:23.373202-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.373205-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373208-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:40:23.373212-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:40:23.373215-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373218-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:40:23.373221-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:40:23.373225-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.373546-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:40:23.373553-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373556-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:40:23.37356-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.373563-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.373567-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373584-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:40:23.373588-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:40:23.373591-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:40:23.373595-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.373598-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373602-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:40:23.373605-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:40:23.373609-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:40:23.373612-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.373615-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373618-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:40:23.373622-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:40:23.373625-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:40:23.373628-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:40:23.373631-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373634-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:40:23.373638-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:40:23.373641-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:40:23.373748-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:40:23.373754-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373758-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:40:23.373761-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:40:23.373764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:40:23.373767-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:40:23.37377-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373773-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:40:23.373777-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:40:23.373784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:40:23.373798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:40:23.373804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:40:23.373806-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37381-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:40:23.373812-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:40:23.373814-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:40:23.373817-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.373819-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373821-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:40:23.373823-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:40:23.373825-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:40:23.373827-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.373839-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:40:23.374052-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.374058-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.374062-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:40:23.374066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:40:23.374069-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:40:23.374072-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.374075-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.374078-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:40:23.374082-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:40:23.374085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:40:23.374087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:40:23.374089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:40:23.374092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:40:23.374094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:40:23.374096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.374099-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.374115-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:40:23.374118-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:40:23.374122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:40:23.374146-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:40:23.374149-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.374152-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:40:23.374155-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:40:23.374542-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:23.37455-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:40:23.374554-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:23.374558-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:23.374562-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:40:23.374566-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:40:23.374569-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:40:23.374572-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:40:23.374581-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:40:23.374585-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:40:23.374588-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:40:23.374592-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:40:23.374595-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:40:23.374598-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:40:23.3746-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:40:23.374604-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:40:23.374607-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:40:23.374609-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:40:23.374612-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:40:23.374614-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:40:23.374616-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:40:23.374618-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:40:23.375018-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:40:23.375025-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:40:23.375029-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:40:23.375032-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:40:23.375044-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:40:23.37505-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:40:23.375053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:40:23.375055-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:40:23.375057-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375059-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375061-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:23.375064-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.375067-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:23.375069-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.375071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.375073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375074-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:23.375077-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:40:23.375079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:40:23.375081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.375083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:23.375085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.375101-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:23.375103-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:40:23.375512-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:40:23.37552-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.375523-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:23.375527-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:40:23.375532-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.375536-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:23.37554-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375543-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:40:23.375547-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:40:23.37555-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:40:23.375554-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375558-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:40:23.375562-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:40:23.375581-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:40:23.375586-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375588-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:40:23.37559-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:40:23.375592-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375594-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:40:23.375596-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:40:23.375599-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375601-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:40:23.375603-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:40:23.375605-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.375607-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:40:23.375762-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:40:23.375779-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:40:23.375784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:40:23.375787-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:40:23.375791-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:40:23.375805-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:40:23.375812-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:40:23.375816-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:40:23.375822-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:40:23.375839-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:40:23.375843-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:40:23.375846-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:40:23.37587-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:40:23.375873-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:40:23.375877-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:40:23.375888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:40:23.375895-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:40:23.375898-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:40:23.375901-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:40:23.375903-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:40:23.376053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:40:23.376058-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:40:23.37606-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:40:23.376063-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:23.376065-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376067-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:40:23.376073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.376077-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:40:23.376079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:40:23.376081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:40:23.376083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:40:23.376085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:40:23.376087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:40:23.376089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:40:23.376093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:40:23.376096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:40:23.376101-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:40:23.376103-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.376105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376108-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:40:23.376112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.376357-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:40:23.376364-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376367-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:40:23.376371-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:40:23.376382-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.376387-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.376389-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376392-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:40:23.376396-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:40:23.3764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:40:23.376402-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.376405-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:40:23.376407-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37641-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:40:23.376412-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:40:23.376414-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:40:23.376416-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:40:23.376418-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:40:23.37642-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.376422-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376424-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:40:23.376427-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:40:23.376429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:40:23.376588-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:40:23.376602-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.376605-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376607-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:40:23.37661-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:40:23.376612-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:40:23.376614-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376616-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:40:23.376625-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.376627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376629-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:40:23.376631-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:40:23.376633-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:40:23.376635-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376637-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:40:23.376639-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:40:23.376641-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.376652-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376658-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:40:23.376663-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:40:23.376666-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376678-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:40:23.376684-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:40:23.376688-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:40:23.376691-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.376694-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376697-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:40:23.376828-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:40:23.37684-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376843-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:40:23.376847-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:40:23.376849-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.376862-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:40:23.376873-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:40:23.376877-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:40:23.376882-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:40:23.376885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:40:23.37689-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:40:23.376892-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:40:23.376894-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.376897-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:40:23.376899-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:40:23.376901-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:40:23.376903-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:40:23.376905-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:40:23.376907-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:40:23.37691-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:40:23.376913-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:40:23.376915-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:40:23.376917-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.376919-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:40:23.376921-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:40:23.377077-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.377081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:40:23.377084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.377087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.377089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.377091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.377093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.377096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.377098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.3771-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.377102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.377104-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:40:23.377106-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:40:23.377108-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37711-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:40:23.377112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.377114-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377127-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:40:23.377132-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:40:23.377142-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:40:23.377153-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:40:23.377158-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.377161-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377165-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:40:23.377169-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:40:23.377187-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.377293-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377315-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:40:23.37732-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:40:23.377323-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377327-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:40:23.377332-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:40:23.377335-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377339-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:40:23.377348-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:40:23.377354-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377357-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:40:23.377362-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:40:23.377365-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377367-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:40:23.377369-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:40:23.377371-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377373-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:40:23.377375-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:40:23.377385-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:40:23.377391-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377395-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.377398-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.377401-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:40:23.377405-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:40:23.298073689Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:40:23.377409-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:40:23.377542-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:40:23.377548-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:40:23.377552-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:40:23.377561-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.377567-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:40:23.37757-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377572-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:40:23.377574-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:40:23.377577-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:40:23.377579-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:40:23.377581-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377583-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:40:23.377585-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:40:23.377587-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:40:23.377589-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:40:23.377591-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:40:23.377593-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377595-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:40:23.377597-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:40:23.3776-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:40:23.377602-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377792-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:40:23.377797-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:40:23.377801-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:40:23.377808-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:40:23.377811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.377814-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377816-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:40:23.377819-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:40:23.377821-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:40:23.377823-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.377827-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37783-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:40:23.377833-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:40:23.377837-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:40:23.37784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.377844-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:40:23.377847-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:40:23.37785-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:40:23.377861-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:40:23.377876-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:40:23.377893-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:40:23.377895-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:40:23.378035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:40:23.378039-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:40:23.378044-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:40:23.378046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:40:23.378048-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378051-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:40:23.378053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:40:23.378055-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:40:23.378057-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:40:23.378059-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378061-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:40:23.378065-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:40:23.378068-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:40:23.378074-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:40:23.378078-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:40:23.378084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:40:23.378087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:40:23.378091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:40:23.378093-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:40:23.378328-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378332-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:40:23.378334-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:40:23.378337-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378341-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:40:23.378344-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.378348-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378351-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:40:23.378354-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:40:23.378356-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:40:23.378358-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.37836-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378362-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:40:23.378364-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:40:23.378366-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.378368-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37837-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:40:23.378372-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:40:23.378375-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:40:23.378377-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.378379-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378381-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:40:23.378384-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:40:23.378386-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378388-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:40:23.378592-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:40:23.378599-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378603-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:40:23.378614-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:40:23.37862-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:40:23.378622-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378625-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:40:23.378627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:40:23.378629-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:40:23.378632-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:40:23.378634-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:40:23.378636-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.378638-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37864-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:40:23.378642-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:40:23.378644-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378646-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:40:23.378649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.378651-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:40:23.378665-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37867-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:40:23.37869-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:40:23.378696-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:40:23.3787-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.378825-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37883-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:40:23.378834-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:40:23.378838-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.37885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378855-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:40:23.378858-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:40:23.37886-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:40:23.378863-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:40:23.378866-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.378869-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378873-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:40:23.378876-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:40:23.37888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:40:23.378882-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:40:23.378884-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.378886-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:40:23.378902-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:40:23.378904-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.378906-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:40:23.378908-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:40:23.378911-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.378913-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.378915-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379039-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:40:23.379053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:40:23.379059-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:40:23.379063-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:40:23.379075-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:40:23.379081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:40:23.379088-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:40:23.379092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:40:23.379096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:40:23.3791-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.379103-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:40:23.379106-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379109-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:40:23.379113-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:40:23.379116-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.379118-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37912-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:40:23.379122-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:40:23.379124-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:40:23.379126-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37914-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:40:23.379145-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.379244-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.379257-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37926-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:40:23.379262-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:40:23.379265-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379268-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:40:23.379272-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.379275-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37928-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:40:23.379283-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:40:23.379296-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:40:23.379299-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:40:23.379301-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:40:23.379304-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:40:23.379307-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:40:23.37931-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:40:23.379314-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:40:23.379317-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:40:23.37932-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:40:23.379323-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:40:23.379326-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:40:23.379328-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.37933-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379333-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:40:23.379343-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:40:23.379483-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:40:23.379489-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379492-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:40:23.379495-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:40:23.379498-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:40:23.379501-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.379504-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379508-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:40:23.379511-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:40:23.379514-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:40:23.379518-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:40:23.379521-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.379525-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379528-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:40:23.379532-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:40:23.379536-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:40:23.379539-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:40:23.379543-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:40:23.379546-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.379549-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379553-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:40:23.379556-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:40:23.379559-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:40:23.379563-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:40:23.379566-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.379738-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379744-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:40:23.379748-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:40:23.379752-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:40:23.379755-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:40:23.379758-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.37976-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:40:23.379762-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:40:23.379764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:40:23.379767-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:40:23.379769-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.379771-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379773-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:40:23.379775-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:40:23.379777-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:40:23.379779-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.379781-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:40:23.379783-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:40:23.379786-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:40:23.379796-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.379804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:40:23.379808-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:40:23.379813-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:40:23.379922-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:40:23.379927-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.379929-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.379931-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379933-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:40:23.379936-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:40:23.379938-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:40:23.37994-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379943-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:40:23.379945-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:40:23.379962-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:40:23.379969-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:40:23.379972-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:40:23.379975-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379978-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:40:23.37998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:40:23.379983-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379987-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:40:23.37999-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:40:23.379993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.379996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:40:23.379998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:40:23.38-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380002-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:40:23.380141-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.380156-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380161-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:40:23.380165-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:40:23.380168-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380171-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:40:23.380175-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:40:23.380178-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.380189-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:40:23.380194-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380196-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:40:23.380198-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.3802-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.380204-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380206-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:40:23.380209-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:40:23.380213-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:40:23.380216-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.380219-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380222-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:40:23.380226-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:40:23.380228-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:40:23.380231-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.380234-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380237-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:40:23.380386-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:40:23.380392-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:40:23.380396-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:40:23.380399-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380403-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:40:23.380408-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:40:23.380411-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:40:23.380415-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:40:23.380418-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380421-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:40:23.380425-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:40:23.380428-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:40:23.380431-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:40:23.380435-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380438-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:40:23.380441-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:40:23.380445-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:40:23.380448-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:40:23.380452-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:40:23.380455-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380458-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:40:23.380462-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:40:23.380465-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:40:23.380621-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.380627-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380631-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:40:23.380635-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:40:23.380638-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:40:23.380642-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380645-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:40:23.380649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.380652-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380656-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:40:23.380659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:40:23.380664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:40:23.380668-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.380672-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.380676-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:40:23.38068-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:40:23.380683-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:40:23.380687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:40:23.380691-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:40:23.380695-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:40:23.380699-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:40:23.380702-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.381035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:40:23.381046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:40:23.381067-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:40:23.381071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:40:23.381073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.381076-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:40:23.381078-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:40:23.38108-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:23.381082-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:40:23.381085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:23.381087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:23.381089-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:40:23.381091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:40:23.381094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:40:23.381096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:40:23.381098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:40:23.3811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:40:23.381102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:40:23.381105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:40:23.381107-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:40:23.381109-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:40:23.381113-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:40:23.381504-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:40:23.381511-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:40:23.381514-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:40:23.381518-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:40:23.381532-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:40:23.381538-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:40:23.381541-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:40:23.381544-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:40:23.381548-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:40:23.381551-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:40:23.381554-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:40:23.381556-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:40:23.381559-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:40:23.381562-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:40:23.381566-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:40:23.381571-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381574-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381577-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:23.381581-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.381584-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:23.381587-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:40:23.381695-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.3817-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381703-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381706-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.381709-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381712-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.381714-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.381716-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381719-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381722-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:40:23.381726-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:40:23.381729-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:40:23.381732-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381734-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:40:23.381736-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:40:23.381739-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:40:23.381741-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381743-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:40:23.381745-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:40:23.381747-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381749-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:40:23.381751-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:40:23.381756-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.381758-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:40:23.38176-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:40:23.381762-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382028-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:40:23.382035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:40:23.382039-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:40:23.382043-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:40:23.382049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:40:23.382053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:40:23.382061-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:40:23.382065-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:40:23.38207-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:40:23.382073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:40:23.382077-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:40:23.382081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:40:23.382084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:40:23.382088-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:40:23.382091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:40:23.382095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:40:23.382098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:40:23.382102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:40:23.382105-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:40:23.382125-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:40:23.382128-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:40:23.382423-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:40:23.382431-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:40:23.382436-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:40:23.38244-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:23.382444-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382448-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:40:23.382452-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:23.382456-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:40:23.38246-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:40:23.382463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:40:23.382467-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:40:23.382471-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:40:23.382475-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:40:23.382479-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382482-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:40:23.382486-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:40:23.382489-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382493-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:40:23.382497-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:40:23.382501-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.382505-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382508-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:40:23.382512-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.382516-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:40:23.382748-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382755-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:40:23.382759-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:40:23.382762-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.382764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.382766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382769-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:40:23.382772-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:40:23.382774-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:40:23.382777-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:23.382779-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:40:23.382782-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382784-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:40:23.382787-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:40:23.382789-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:40:23.382793-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:40:23.382796-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:40:23.382798-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.3828-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.382803-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:40:23.382805-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:40:23.382808-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:40:23.38281-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:40:23.383095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.383102-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383106-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:40:23.38311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:40:23.383114-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:40:23.383117-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.38312-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:40:23.383124-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.383128-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383134-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:40:23.383137-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:40:23.383141-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:40:23.383144-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383148-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:40:23.383152-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:40:23.383155-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.383158-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383162-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:40:23.383166-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:40:23.38317-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383173-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:40:23.383177-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:40:23.383182-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:40:23.383185-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.383189-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383192-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:40:23.383463-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:40:23.38347-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383475-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:40:23.383478-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:40:23.383481-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383485-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:40:23.383488-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:40:23.383492-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:40:23.383496-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:40:23.383499-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:40:23.383502-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:40:23.383506-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:40:23.383509-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383513-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:40:23.383516-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:40:23.383519-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:40:23.383523-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:40:23.383526-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:40:23.383529-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:40:23.383532-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:40:23.383536-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:40:23.383539-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:40:23.383542-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383545-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:40:23.383549-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:40:23.383904-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.38391-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:40:23.383914-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383918-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383922-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383925-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383928-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383932-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383935-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383938-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:40:23.383942-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:23.383945-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:40:23.383948-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:40:23.383954-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383961-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:40:23.383964-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.383968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383972-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:40:23.383975-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:40:23.383978-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:40:23.383982-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:40:23.383985-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.383989-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.383992-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:40:23.383996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:40:23.384233-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:23.384253-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.384258-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:40:23.384262-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:40:23.384265-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.384268-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:40:23.384271-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:40:23.384274-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.384278-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:40:23.384282-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:40:23.384285-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.384288-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:40:23.384292-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:40:23.384295-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.384298-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:40:23.384301-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:40:23.384305-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.384308-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:40:23.384311-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:40:23.384315-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:40:23.384318-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T12:40:23.384322-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:40:23.384325-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ----------------------- debugLogs end: bridge-996000 [took: 19.706785806s] --------------------------------\n"} +{"Time":"2023-05-31T12:40:23.384329-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:175: Cleaning up \"bridge-996000\" profile ...\n"} +{"Time":"2023-05-31T12:40:23.384332-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p bridge-996000\n"} +{"Time":"2023-05-31T12:40:24.399737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:40:24.39975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ----------------------- debugLogs start: kubenet-996000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T12:40:24.399754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:40:24.399756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T12:40:24.399761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T12:40:24.399792-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399796-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:40:24.399798-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T12:40:24.399803-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399807-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.39981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:40:24.399818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T12:40:24.39982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:40:24.399827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T12:40:24.39983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:40:24.399836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:40:24.399839-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T12:40:24.399842-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399846-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:40:24.399848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T12:40:24.399861-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T12:40:24.399869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T12:40:24.399871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T12:40:24.399875-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T12:40:24.399878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T12:40:24.39988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T12:40:24.399882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 10.244.0.4\tnetcat-7458db8b8-xsx7b\n"} +{"Time":"2023-05-31T12:40:24.399885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.39989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:40:24.399892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T12:40:24.399894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T12:40:24.399897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" options ndots:5\n"} +{"Time":"2023-05-31T12:40:24.399899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:40:24.399905-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T12:40:24.399907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.39991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Example configuration of GNU Name Service Switch functionality.\r\n"} +{"Time":"2023-05-31T12:40:24.399912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If you have the `glibc-doc-reference' and `info' packages installed, try:\r\n"} +{"Time":"2023-05-31T12:40:24.399914-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # `info libc \"Name Service Switch\"' for information about this file.\r\n"} +{"Time":"2023-05-31T12:40:24.399917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.399919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" passwd: files\r\n"} +{"Time":"2023-05-31T12:40:24.399921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" group: files\r\n"} +{"Time":"2023-05-31T12:40:24.399923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T12:40:24.399926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" gshadow: files\r\n"} +{"Time":"2023-05-31T12:40:24.39993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.399933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" hosts: files dns\r\n"} +{"Time":"2023-05-31T12:40:24.399935-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" networks: files\r\n"} +{"Time":"2023-05-31T12:40:24.399937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.399939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" protocols: db files\r\n"} +{"Time":"2023-05-31T12:40:24.399941-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" services: db files\r\n"} +{"Time":"2023-05-31T12:40:24.399943-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ethers: db files\r\n"} +{"Time":"2023-05-31T12:40:24.399945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" rpc: db files\r\n"} +{"Time":"2023-05-31T12:40:24.399948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.39995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" netgroup: nis\r\n"} +{"Time":"2023-05-31T12:40:24.399952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399954-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:40:24.399958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T12:40:24.399961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\r\n"} +{"Time":"2023-05-31T12:40:24.399965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fe00::0\tip6-localnet\r\n"} +{"Time":"2023-05-31T12:40:24.399969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ff00::0\tip6-mcastprefix\r\n"} +{"Time":"2023-05-31T12:40:24.399971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ff02::1\tip6-allnodes\r\n"} +{"Time":"2023-05-31T12:40:24.399973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ff02::2\tip6-allrouters\r\n"} +{"Time":"2023-05-31T12:40:24.399975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 192.168.85.2\tkubenet-996000\r\n"} +{"Time":"2023-05-31T12:40:24.399977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 192.168.65.254\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T12:40:24.39998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 192.168.85.2\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:40:24.399982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:40:24.399989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nameserver 192.168.65.254\r\n"} +{"Time":"2023-05-31T12:40:24.399991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" options ndots:0\r\n"} +{"Time":"2023-05-31T12:40:24.399993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.399998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:40:24.400002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T12:40:24.400004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node/kubenet-996000 Ready control-plane 43s v1.27.2 192.168.85.2 \u003cnone\u003e Ubuntu 22.04.2 LTS 5.15.49-linuxkit-pr docker://24.0.1\n"} +{"Time":"2023-05-31T12:40:24.400007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T12:40:24.400012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 41s \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400014-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default service/netcat ClusterIP 10.111.54.226 \u003cnone\u003e 8080/TCP 21s app=netcat\n"} +{"Time":"2023-05-31T12:40:24.400017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 40s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:24.400019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T12:40:24.400024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default endpoints/kubernetes 192.168.85.2:8443 41s\n"} +{"Time":"2023-05-31T12:40:24.400026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default endpoints/netcat 10.244.0.4:8080 21s\n"} +{"Time":"2023-05-31T12:40:24.400028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 25s\n"} +{"Time":"2023-05-31T12:40:24.400031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 27s\n"} +{"Time":"2023-05-31T12:40:24.400033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:40:24.400038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 40s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.40004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T12:40:24.400047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default deployment.apps/netcat 1/1 1 1 21s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T12:40:24.400051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system deployment.apps/coredns 1/1 1 1 40s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:24.400054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400058-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T12:40:24.400061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default pod/netcat-7458db8b8-xsx7b 1/1 Running 0 21s 10.244.0.4 kubenet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system pod/coredns-5d78c9869d-wkgcm 1/1 Running 0 27s 10.244.0.2 kubenet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system pod/etcd-kubenet-996000 1/1 Running 0 41s 192.168.85.2 kubenet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system pod/kube-apiserver-kubenet-996000 1/1 Running 0 40s 192.168.85.2 kubenet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system pod/kube-controller-manager-kubenet-996000 1/1 Running 0 40s 192.168.85.2 kubenet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system pod/kube-proxy-66cks 1/1 Running 0 27s 192.168.85.2 kubenet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system pod/kube-scheduler-kubenet-996000 1/1 Running 0 40s 192.168.85.2 kubenet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-system pod/storage-provisioner 1/1 Running 0 25s 192.168.85.2 kubenet-996000 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.40009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:40:24.400092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T12:40:24.400095-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 2cac467e373fe 22 seconds ago Ready netcat-7458db8b8-xsx7b default 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.400098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" a26b851f72e91 25 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.4001-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 9cd716ee811fa 27 seconds ago Ready coredns-5d78c9869d-wkgcm kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.400102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 7374b4ade9986 27 seconds ago NotReady coredns-5d78c9869d-7b9tk kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.400104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 874527961e25c 28 seconds ago Ready kube-proxy-66cks kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.400107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cc5f5da169dc9 46 seconds ago Ready kube-scheduler-kubenet-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.40011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" b4682fd5e6bb6 46 seconds ago Ready kube-controller-manager-kubenet-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.400113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" e4574351d2cb5 46 seconds ago Ready kube-apiserver-kubenet-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.400115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 8df17fadd3397 46 seconds ago Ready etcd-kubenet-996000 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T12:40:24.400117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:40:24.400123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID POD\r\n"} +{"Time":"2023-05-31T12:40:24.400126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" b5e4facc8e8a9 registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146 16 seconds ago Running dnsutils 0 2cac467e373fe netcat-7458db8b8-xsx7b\r\n"} +{"Time":"2023-05-31T12:40:24.400129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" d1293d9566732 6e38f40d628db 25 seconds ago Running storage-provisioner 0 a26b851f72e91 storage-provisioner\r\n"} +{"Time":"2023-05-31T12:40:24.400132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 7a1550107913f ead0a4a53df89 27 seconds ago Running coredns 0 9cd716ee811fa coredns-5d78c9869d-wkgcm\r\n"} +{"Time":"2023-05-31T12:40:24.400135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 9359eb20d971b b8aa50768fd67 27 seconds ago Running kube-proxy 0 874527961e25c kube-proxy-66cks\r\n"} +{"Time":"2023-05-31T12:40:24.400138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" f8b724a796315 ac2b7465ebba9 46 seconds ago Running kube-controller-manager 0 b4682fd5e6bb6 kube-controller-manager-kubenet-996000\r\n"} +{"Time":"2023-05-31T12:40:24.40014-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" df0c77fe8376d 86b6af7dd652c 46 seconds ago Running etcd 0 8df17fadd3397 etcd-kubenet-996000\r\n"} +{"Time":"2023-05-31T12:40:24.400143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 598326455f130 89e70da428d29 46 seconds ago Running kube-scheduler 0 cc5f5da169dc9 kube-scheduler-kubenet-996000\r\n"} +{"Time":"2023-05-31T12:40:24.400146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 9712e26af451d c5b13e4f7806d 46 seconds ago Running kube-apiserver 0 e4574351d2cb5 kube-apiserver-kubenet-996000\r\n"} +{"Time":"2023-05-31T12:40:24.400148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.40015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:40:24.400155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: netcat\n"} +{"Time":"2023-05-31T12:40:24.400158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:40:24.40016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CreationTimestamp: Wed, 31 May 2023 12:39:50 -0700\n"} +{"Time":"2023-05-31T12:40:24.400165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:40:24.400168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:40:24.40017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T12:40:24.400172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:40:24.400174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:40:24.400176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:40:24.400178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:40:24.40018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:40:24.400183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:40:24.400185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:24.400187-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:40:24.40019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:40:24.400192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:24.400198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:40:24.400201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -c\n"} +{"Time":"2023-05-31T12:40:24.400203-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:40:24.400205-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:24.400213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:40:24.400215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:40:24.400217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:40:24.40022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:40:24.400222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:40:24.400227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:24.400229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:24.400231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:24.400234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal ScalingReplicaSet 22s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T12:40:24.400236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:40:24.400243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: netcat-7458db8b8-xsx7b\n"} +{"Time":"2023-05-31T12:40:24.400245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Namespace: default\n"} +{"Time":"2023-05-31T12:40:24.400247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority: 0\n"} +{"Time":"2023-05-31T12:40:24.400249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Service Account: default\n"} +{"Time":"2023-05-31T12:40:24.400251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node: kubenet-996000/192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.400254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Start Time: Wed, 31 May 2023 12:39:50 -0700\n"} +{"Time":"2023-05-31T12:40:24.400256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T12:40:24.400258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T12:40:24.40026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:40:24.400265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T12:40:24.400267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:40:24.400269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T12:40:24.400271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T12:40:24.400273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:24.400275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" dnsutils:\n"} +{"Time":"2023-05-31T12:40:24.400277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Container ID: docker://b5e4facc8e8a966ec21da4f9150bb0015c63272334ceb8071214c649b948bb56\n"} +{"Time":"2023-05-31T12:40:24.400279-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T12:40:24.400281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image ID: docker-pullable://registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T12:40:24.400284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:24.40029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /bin/sh\n"} +{"Time":"2023-05-31T12:40:24.400292-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -c\n"} +{"Time":"2023-05-31T12:40:24.400294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T12:40:24.400296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:40:24.400298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Started: Wed, 31 May 2023 12:39:56 -0700\n"} +{"Time":"2023-05-31T12:40:24.400301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:40:24.400303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:40:24.400305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:24.400309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-n8dvf (ro)\n"} +{"Time":"2023-05-31T12:40:24.400311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:24.400314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:40:24.400316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:40:24.400319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:40:24.400321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:40:24.400323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:40:24.400325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:24.400327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-api-access-n8dvf:\n"} +{"Time":"2023-05-31T12:40:24.400329-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:40:24.400331-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:40:24.400334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:24.400336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:40:24.400338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:40:24.40034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:40:24.400343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:40:24.400347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:40:24.400349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:24.400352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:24.400355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:24.400361-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Scheduled 22s default-scheduler Successfully assigned default/netcat-7458db8b8-xsx7b to kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.400363-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Pulling 22s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T12:40:24.400366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Pulled 16s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 5.99532009s (5.995368555s including waiting)\n"} +{"Time":"2023-05-31T12:40:24.400369-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Created 16s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T12:40:24.400372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Started 16s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T12:40:24.400375-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400376-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400379-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:40:24.400381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400385-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:40:24.400388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:40:24.40039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.400392-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CreationTimestamp: Wed, 31 May 2023 12:39:31 -0700\n"} +{"Time":"2023-05-31T12:40:24.400395-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:24.400397-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T12:40:24.4004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:24.400402-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T12:40:24.400404-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T12:40:24.400406-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T12:40:24.400409-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T12:40:24.400411-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:40:24.400414-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:24.400416-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:40:24.400418-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:24.40042-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" coredns:\n"} +{"Time":"2023-05-31T12:40:24.400422-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:40:24.400424-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:40:24.400426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:40:24.400428-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Args:\n"} +{"Time":"2023-05-31T12:40:24.40043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -conf\n"} +{"Time":"2023-05-31T12:40:24.400433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:40:24.400435-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Limits:\n"} +{"Time":"2023-05-31T12:40:24.400437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:40:24.400439-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Requests:\n"} +{"Time":"2023-05-31T12:40:24.400441-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:40:24.400443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:40:24.400447-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:40:24.40045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:40:24.400453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:24.400458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:40:24.40046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:24.400462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:40:24.400467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:40:24.40047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:40:24.400473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:40:24.400476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:40:24.400479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:24.400481-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T12:40:24.400483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T12:40:24.400486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T12:40:24.400488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T12:40:24.40049-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T12:40:24.400495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:24.400497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:24.4005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:24.400502-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal ScalingReplicaSet 28s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T12:40:24.400504-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal ScalingReplicaSet 27s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T12:40:24.400506-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.40051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:40:24.400512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: coredns-5d78c9869d-wkgcm\n"} +{"Time":"2023-05-31T12:40:24.400514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.400516-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T12:40:24.400519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T12:40:24.40052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T12:40:24.400522-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node: kubenet-996000/192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.400524-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Start Time: Wed, 31 May 2023 12:39:44 -0700\n"} +{"Time":"2023-05-31T12:40:24.400527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T12:40:24.40053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T12:40:24.400532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400534-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:40:24.400536-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:40:24.400538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:40:24.40054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T12:40:24.400542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T12:40:24.400544-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:24.400546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" coredns:\n"} +{"Time":"2023-05-31T12:40:24.400548-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Container ID: docker://7a1550107913f580fe5d77d0927bf85283f29617363847388f42d60802b8778b\n"} +{"Time":"2023-05-31T12:40:24.40055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:40:24.400552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image ID: docker-pullable://registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T12:40:24.400555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T12:40:24.400557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T12:40:24.40056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Args:\n"} +{"Time":"2023-05-31T12:40:24.400562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -conf\n"} +{"Time":"2023-05-31T12:40:24.400564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T12:40:24.400567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:40:24.400569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Started: Wed, 31 May 2023 12:39:46 -0700\n"} +{"Time":"2023-05-31T12:40:24.400572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:40:24.400574-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:40:24.400576-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Limits:\n"} +{"Time":"2023-05-31T12:40:24.400578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T12:40:24.400579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Requests:\n"} +{"Time":"2023-05-31T12:40:24.400581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T12:40:24.400583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T12:40:24.400585-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T12:40:24.400587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:40:24.400594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:24.400599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T12:40:24.400601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-n2x54 (ro)\n"} +{"Time":"2023-05-31T12:40:24.400604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:24.400607-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:40:24.400617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:40:24.400619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:40:24.400622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:40:24.400624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:40:24.400627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:24.400629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" config-volume:\n"} +{"Time":"2023-05-31T12:40:24.400631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:40:24.400633-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T12:40:24.400635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:40:24.400638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-api-access-n2x54:\n"} +{"Time":"2023-05-31T12:40:24.40064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:40:24.400642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:40:24.400645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:24.400647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:40:24.40065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:40:24.400652-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:40:24.400654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:40:24.400656-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T12:40:24.400659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T12:40:24.400661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:40:24.400664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T12:40:24.400666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:24.400669-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:24.400671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:24.400673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Scheduled 28s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-wkgcm to kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.400675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Pulled 27s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T12:40:24.400678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Created 27s kubelet Created container coredns\n"} +{"Time":"2023-05-31T12:40:24.40068-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Started 26s kubelet Started container coredns\n"} +{"Time":"2023-05-31T12:40:24.400682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:40:24.400689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" .:53\n"} +{"Time":"2023-05-31T12:40:24.400691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [INFO] plugin/reload: Running configuration SHA512 = 591cf328cccc12bc490481273e738df59329c62c0b729d94e8b61db9961c2fa5f046dd37f1cf888b953814040d180f52594972691cd6ff41be96639138a43908\n"} +{"Time":"2023-05-31T12:40:24.400693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T12:40:24.400696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T12:40:24.400698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.4007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:40:24.400705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: kube-apiserver-kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.400707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.400709-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:40:24.400711-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:40:24.400713-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node: kubenet-996000/192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.400715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Start Time: Wed, 31 May 2023 12:39:31 -0700\n"} +{"Time":"2023-05-31T12:40:24.400717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T12:40:24.400719-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T12:40:24.400721-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.85.2:8443\n"} +{"Time":"2023-05-31T12:40:24.400724-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes.io/config.hash: 4d802d21301a91e45e9ad87ef79a8779\n"} +{"Time":"2023-05-31T12:40:24.400726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes.io/config.mirror: 4d802d21301a91e45e9ad87ef79a8779\n"} +{"Time":"2023-05-31T12:40:24.400729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes.io/config.seen: 2023-05-31T19:39:31.731287628Z\n"} +{"Time":"2023-05-31T12:40:24.400731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T12:40:24.400733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:40:24.400735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.400738-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:40:24.40074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.400742-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Controlled By: Node/kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.400745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:24.400749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T12:40:24.400753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Container ID: docker://9712e26af451d560bdae8924388230f87c2c375497fa3f20026deb0f060512de\n"} +{"Time":"2023-05-31T12:40:24.400757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:40:24.40076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image ID: docker-pullable://registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T12:40:24.400764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.40077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:24.400772-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T12:40:24.400775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --advertise-address=192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.400777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T12:40:24.400779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T12:40:24.400781-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:40:24.400784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:40:24.400787-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T12:40:24.400789-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T12:40:24.400791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T12:40:24.400793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T12:40:24.400795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T12:40:24.400797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T12:40:24.4008-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T12:40:24.400802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T12:40:24.400805-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T12:40:24.400807-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T12:40:24.400809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T12:40:24.400821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T12:40:24.40083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T12:40:24.400833-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T12:40:24.400836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T12:40:24.400838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T12:40:24.40084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T12:40:24.400843-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T12:40:24.400845-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T12:40:24.400847-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T12:40:24.400849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T12:40:24.400851-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T12:40:24.400853-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:40:24.400855-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Started: Wed, 31 May 2023 12:39:26 -0700\n"} +{"Time":"2023-05-31T12:40:24.400858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:40:24.40086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:40:24.400862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Requests:\n"} +{"Time":"2023-05-31T12:40:24.400866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T12:40:24.400869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Liveness: http-get https://192.168.85.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T12:40:24.400871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Readiness: http-get https://192.168.85.2:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T12:40:24.400873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Startup: http-get https://192.168.85.2:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T12:40:24.400875-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:24.40088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/ca-certificates from etc-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:40:24.400882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T12:40:24.400884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /usr/local/share/ca-certificates from usr-local-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:40:24.400887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T12:40:24.400889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T12:40:24.400891-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:24.400894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:40:24.400895-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:40:24.400898-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:40:24.4009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:40:24.400902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:40:24.400904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:24.400906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ca-certs:\n"} +{"Time":"2023-05-31T12:40:24.400908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.40091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:40:24.400912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:24.400915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" etc-ca-certificates:\n"} +{"Time":"2023-05-31T12:40:24.400917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.400919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /etc/ca-certificates\n"} +{"Time":"2023-05-31T12:40:24.400921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:24.400924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T12:40:24.400926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.400928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:40:24.40093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:24.400933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" usr-local-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:40:24.400935-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.400937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /usr/local/share/ca-certificates\n"} +{"Time":"2023-05-31T12:40:24.40094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:24.400942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T12:40:24.400944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.400946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T12:40:24.400949-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T12:40:24.400952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T12:40:24.400954-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400957-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:40:24.400959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.400961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.400965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:40:24.400967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:26.722274 1 server.go:551] external host was not specified, using 192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.40097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:26.784233 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T12:40:24.400972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:26.784267 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:40:24.400975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:27.747580 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T12:40:24.400978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:27.758442 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T12:40:24.400981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:27.758480 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T12:40:24.400984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:27.775604 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.400987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:27.775646 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.400989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:27.776530 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T12:40:24.400991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:27.932132 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.400993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:27.932413 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:40:24.400996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.168474 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T12:40:24.400998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.176682 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401001-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.176723 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401003-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.176729 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.178286 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.178326 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.40101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.180228 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.180857 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.180894 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.180899 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.40102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.183472 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.183510 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.185494 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.185533 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.40103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.185539 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.187328 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.187368 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.188642 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.189165 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.192072 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.192113 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.192119 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.196854 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.196973 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.196995 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.201033 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401058-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.201073 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.203370 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.203443 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.203448 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.205097 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.205164 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.40108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.205174 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.207616 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.207655 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.207660 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.40109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.209519 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.210203 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.210238 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.210244 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.4011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.213613 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.213649 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.213653 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.215135 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.215199 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.215229 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.216586 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.40124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.216624 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401244-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.225012 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T12:40:24.401248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:28.225154 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T12:40:24.401251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.660219 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T12:40:24.401253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.660310 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:40:24.401256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.660365 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T12:40:24.401259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.660435 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T12:40:24.401261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.660953 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:40:24.401264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.661178 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T12:40:24.401266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.663691 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:40:24.401268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672382 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T12:40:24.401271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672523 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:40:24.401273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672672 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T12:40:24.401437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672759 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T12:40:24.401444-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672835 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T12:40:24.401447-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672894 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T12:40:24.401449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672931 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T12:40:24.401452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672939 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T12:40:24.401455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672946 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T12:40:24.401458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672953 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T12:40:24.401461-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672959 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T12:40:24.401463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672537 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T12:40:24.401465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672389 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T12:40:24.401468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.673015 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:40:24.40147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672855 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T12:40:24.401472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.673081 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T12:40:24.401474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.673176 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T12:40:24.401477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672693 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T12:40:24.401479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.673310 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T12:40:24.401482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672806 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T12:40:24.401484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672401 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T12:40:24.401636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.661224 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T12:40:24.401643-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672739 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T12:40:24.401646-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.661192 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T12:40:24.40165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672408 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T12:40:24.401654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.672702 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T12:40:24.401656-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.673992 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:40:24.401658-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.673642 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T12:40:24.40166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.783996 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T12:40:24.401663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.784352 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T12:40:24.401666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.784583 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T12:40:24.401669-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.784744 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T12:40:24.401671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.784793 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T12:40:24.401673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.784717 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T12:40:24.401676-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.784860 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T12:40:24.401679-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.784877 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T12:40:24.401681-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.785235 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T12:40:24.401683-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.786342 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T12:40:24.401686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:28.803377 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.401815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:29.474457 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T12:40:24.401823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:29.665950 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T12:40:24.401845-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:29.669182 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T12:40:24.401849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:29.669217 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T12:40:24.401851-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:30.160887 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.401854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:30.215771 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.401858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:30.317290 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T12:40:24.401862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" W0531 19:39:30.323019 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.85.2]\n"} +{"Time":"2023-05-31T12:40:24.401866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:30.323917 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T12:40:24.401873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:30.328994 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.401877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:30.705887 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T12:40:24.401879-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:31.642604 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T12:40:24.401883-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:31.650558 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T12:40:24.401886-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:31.657711 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T12:40:24.401888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:44.615415 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T12:40:24.40189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:44.616838 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T12:40:24.402019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:50.232077 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.111.54.226]\n"} +{"Time":"2023-05-31T12:40:24.402026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.402028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.402032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:40:24.402035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/cni/net.d/200-loopback.conf\r\n"} +{"Time":"2023-05-31T12:40:24.402037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.40204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"cniVersion\": \"1.0.0\",\r\n"} +{"Time":"2023-05-31T12:40:24.402043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"name\": \"loopback\",\r\n"} +{"Time":"2023-05-31T12:40:24.402045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"type\": \"loopback\"\r\n"} +{"Time":"2023-05-31T12:40:24.402047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.402051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T12:40:24.402054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.402057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T12:40:24.402059-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T12:40:24.402062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T12:40:24.402064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.402066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:40:24.402076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T12:40:24.402085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:40:24.402088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:40:24.402091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:40:24.402094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:40:24.402097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:40:24.402099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T12:40:24.402102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:40:24.402226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [\r\n"} +{"Time":"2023-05-31T12:40:24.402231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.402233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T12:40:24.402236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T12:40:24.402238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.40224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:24.402243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:24.402245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.402247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:24.402249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.402251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T12:40:24.402254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T12:40:24.402256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T12:40:24.402258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.402261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:24.402263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.402265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T12:40:24.402267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:24.402269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.402271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T12:40:24.402273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.402275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:24.402277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.40228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/cni/net.d/100-crio-bridge.conf.mk_disabled\r\n"} +{"Time":"2023-05-31T12:40:24.402282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.402284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T12:40:24.402287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"name\": \"crio\",\r\n"} +{"Time":"2023-05-31T12:40:24.402289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T12:40:24.402413-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"bridge\": \"cni0\",\r\n"} +{"Time":"2023-05-31T12:40:24.402418-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T12:40:24.40242-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T12:40:24.402422-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T12:40:24.402425-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T12:40:24.402427-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T12:40:24.40243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"routes\": [\r\n"} +{"Time":"2023-05-31T12:40:24.402433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" { \"dst\": \"0.0.0.0/0\" },\r\n"} +{"Time":"2023-05-31T12:40:24.402435-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" { \"dst\": \"1100:200::1/24\" }\r\n"} +{"Time":"2023-05-31T12:40:24.402437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ],\r\n"} +{"Time":"2023-05-31T12:40:24.402439-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T12:40:24.402442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [{ \"subnet\": \"10.85.0.0/16\" }],\r\n"} +{"Time":"2023-05-31T12:40:24.402444-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [{ \"subnet\": \"1100:200::/24\" }]\r\n"} +{"Time":"2023-05-31T12:40:24.402447-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ]\r\n"} +{"Time":"2023-05-31T12:40:24.402449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.402451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.402454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.402456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.402458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:40:24.402461-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:40:24.402463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T12:40:24.402466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T12:40:24.402468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:40:24.40247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 2: tunl0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:40:24.402473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T12:40:24.402475-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 3: ip6tnl0@NONE: \u003cNOARP\u003e mtu 1452 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:40:24.40261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" link/tunnel6 :: brd :: permaddr 82ff:20b3:f57::\r\n"} +{"Time":"2023-05-31T12:40:24.402615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 4: docker0: \u003cNO-CARRIER,BROADCAST,MULTICAST,UP\u003e mtu 1500 qdisc noqueue state DOWN group default \r\n"} +{"Time":"2023-05-31T12:40:24.402617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" link/ether 02:42:c8:c3:d9:ce brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:40:24.402619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0\r\n"} +{"Time":"2023-05-31T12:40:24.402622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:40:24.402624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 5: cbr0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc htb state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T12:40:24.402626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" link/ether 12:79:8f:5e:23:7c brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T12:40:24.402629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" inet 10.244.0.1/16 brd 10.244.255.255 scope global cbr0\r\n"} +{"Time":"2023-05-31T12:40:24.402631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:40:24.402634-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 6: veth896383a2@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master cbr0 state UP group default \r\n"} +{"Time":"2023-05-31T12:40:24.402636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" link/ether d6:20:76:7a:f8:f6 brd ff:ff:ff:ff:ff:ff link-netnsid 1\r\n"} +{"Time":"2023-05-31T12:40:24.402639-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 8: veth59a994cb@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master cbr0 state UP group default \r\n"} +{"Time":"2023-05-31T12:40:24.40265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" link/ether aa:19:af:ce:f4:78 brd ff:ff:ff:ff:ff:ff link-netnsid 3\r\n"} +{"Time":"2023-05-31T12:40:24.402655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 332: eth0@if333: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 65535 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T12:40:24.402657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" link/ether 02:42:c0:a8:55:02 brd ff:ff:ff:ff:ff:ff link-netnsid 0\r\n"} +{"Time":"2023-05-31T12:40:24.40266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" inet 192.168.85.2/24 brd 192.168.85.255 scope global eth0\r\n"} +{"Time":"2023-05-31T12:40:24.402663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T12:40:24.402667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.402669-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.402672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:40:24.402797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default via 192.168.85.1 dev eth0 \r\n"} +{"Time":"2023-05-31T12:40:24.402801-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 10.244.0.0/16 dev cbr0 proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T12:40:24.402804-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 172.17.0.0/16 dev docker0 proto kernel scope link src 172.17.0.1 linkdown \r\n"} +{"Time":"2023-05-31T12:40:24.402807-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 192.168.85.0/24 dev eth0 proto kernel scope link src 192.168.85.2 \r\n"} +{"Time":"2023-05-31T12:40:24.402809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.402811-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.402813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:40:24.402815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:40:14 2023\r\n"} +{"Time":"2023-05-31T12:40:24.402819-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" *mangle\r\n"} +{"Time":"2023-05-31T12:40:24.402821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :PREROUTING ACCEPT [15258:58895608]\r\n"} +{"Time":"2023-05-31T12:40:24.402823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :INPUT ACCEPT [15223:58892798]\r\n"} +{"Time":"2023-05-31T12:40:24.402835-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :FORWARD ACCEPT [35:2810]\r\n"} +{"Time":"2023-05-31T12:40:24.402837-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :OUTPUT ACCEPT [13896:8292742]\r\n"} +{"Time":"2023-05-31T12:40:24.402839-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :POSTROUTING ACCEPT [13931:8295552]\r\n"} +{"Time":"2023-05-31T12:40:24.402842-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.402845-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.402847-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.402849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:40:24.402851-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Completed on Wed May 31 19:40:14 2023\r\n"} +{"Time":"2023-05-31T12:40:24.402858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:40:14 2023\r\n"} +{"Time":"2023-05-31T12:40:24.402861-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" *filter\r\n"} +{"Time":"2023-05-31T12:40:24.402863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :INPUT ACCEPT [5886:1265180]\r\n"} +{"Time":"2023-05-31T12:40:24.402866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :FORWARD ACCEPT [16:927]\r\n"} +{"Time":"2023-05-31T12:40:24.402868-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :OUTPUT ACCEPT [5854:1552811]\r\n"} +{"Time":"2023-05-31T12:40:24.402871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.402873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :DOCKER-ISOLATION-STAGE-1 - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.402988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :DOCKER-ISOLATION-STAGE-2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.402994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :DOCKER-USER - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.402997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.402999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403001-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403006-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403008-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.40301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403014-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:24.403017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:40:24.40302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:24.403022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:24.403025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:24.403029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T12:40:24.403032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:24.403035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:24.403037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -j DOCKER-USER\r\n"} +{"Time":"2023-05-31T12:40:24.403039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -j DOCKER-ISOLATION-STAGE-1\r\n"} +{"Time":"2023-05-31T12:40:24.403041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:24.403169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -o docker0 -j DOCKER\r\n"} +{"Time":"2023-05-31T12:40:24.403173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -i docker0 ! -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:24.403175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A FORWARD -i docker0 -o docker0 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:24.403177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:24.403179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:24.403182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T12:40:24.403184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2\r\n"} +{"Time":"2023-05-31T12:40:24.403186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER-ISOLATION-STAGE-1 -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:24.403188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP\r\n"} +{"Time":"2023-05-31T12:40:24.40319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER-ISOLATION-STAGE-2 -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:24.403193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER-USER -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:24.403195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T12:40:24.403197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T12:40:24.4032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:24.403202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T12:40:24.403204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:40:24.403206-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Completed on Wed May 31 19:40:14 2023\r\n"} +{"Time":"2023-05-31T12:40:24.403209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Generated by iptables-save v1.8.7 on Wed May 31 19:40:14 2023\r\n"} +{"Time":"2023-05-31T12:40:24.403211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" *nat\r\n"} +{"Time":"2023-05-31T12:40:24.403213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:40:24.403215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T12:40:24.403217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :OUTPUT ACCEPT [44:2640]\r\n"} +{"Time":"2023-05-31T12:40:24.403342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :POSTROUTING ACCEPT [53:3315]\r\n"} +{"Time":"2023-05-31T12:40:24.403347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :DOCKER - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.40335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :DOCKER_OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :DOCKER_POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403357-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403359-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SEP-BL4BN7UU5M2OIW4P - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403369-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403371-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SEP-XPTUC4FRAFEFDBGF - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403375-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403385-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403387-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T12:40:24.403391-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:24.403394-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A PREROUTING -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:40:24.403396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A PREROUTING -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:40:24.403399-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T12:40:24.403532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A OUTPUT -d 192.168.65.254/32 -j DOCKER_OUTPUT\r\n"} +{"Time":"2023-05-31T12:40:24.403537-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A OUTPUT ! -d 127.0.0.0/8 -m addrtype --dst-type LOCAL -j DOCKER\r\n"} +{"Time":"2023-05-31T12:40:24.403539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T12:40:24.403542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:40:24.403544-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A POSTROUTING -d 192.168.65.254/32 -j DOCKER_POSTROUTING\r\n"} +{"Time":"2023-05-31T12:40:24.403546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A POSTROUTING ! -d 10.0.0.0/8 -m comment --comment \"kubenet: SNAT for outbound traffic from cluster\" -m addrtype ! --dst-type LOCAL -j MASQUERADE\r\n"} +{"Time":"2023-05-31T12:40:24.403549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER -i docker0 -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:24.403551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p tcp -m tcp --dport 53 -j DNAT --to-destination 127.0.0.11:39287\r\n"} +{"Time":"2023-05-31T12:40:24.403553-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER_OUTPUT -d 192.168.65.254/32 -p udp -m udp --dport 53 -j DNAT --to-destination 127.0.0.11:48713\r\n"} +{"Time":"2023-05-31T12:40:24.403555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p tcp -m tcp --sport 39287 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:40:24.403559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A DOCKER_POSTROUTING -s 127.0.0.11/32 -p udp -m udp --sport 48713 -j SNAT --to-source 192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:40:24.403562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:40:24.403564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T12:40:24.403566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T12:40:24.403568-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T12:40:24.403571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-BL4BN7UU5M2OIW4P -s 192.168.85.2/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403573-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-BL4BN7UU5M2OIW4P -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.85.2:8443\r\n"} +{"Time":"2023-05-31T12:40:24.403576-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:40:24.403733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403736-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:40:24.403738-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -s 10.244.0.4/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T12:40:24.403743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:40:24.403748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T12:40:24.403752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T12:40:24.403754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T12:40:24.403756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SERVICES -d 10.111.54.226/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T12:40:24.403759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T12:40:24.403761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T12:40:24.403764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T12:40:24.40377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.40386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T12:40:24.403865-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403867-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.85.2:8443\" -j KUBE-SEP-BL4BN7UU5M2OIW4P\r\n"} +{"Time":"2023-05-31T12:40:24.403869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403872-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T12:40:24.403875-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.111.54.226/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T12:40:24.403878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.4:8080\" -j KUBE-SEP-XPTUC4FRAFEFDBGF\r\n"} +{"Time":"2023-05-31T12:40:24.40388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T12:40:24.403882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Completed on Wed May 31 19:40:14 2023\r\n"} +{"Time":"2023-05-31T12:40:24.403885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.403887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.40389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:40:24.403892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:40:24.403894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.403897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 55 3482 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:40:24.403899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 2 167 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:40:24.403902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 44 2640 DOCKER all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:40:24.403904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T12:40:24.404023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain OUTPUT (policy ACCEPT 44 packets, 2640 bytes)\r\n"} +{"Time":"2023-05-31T12:40:24.404052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 193 14567 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T12:40:24.404061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 52 4630 DOCKER_OUTPUT all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:40:24.404064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 87 5220 DOCKER all -- * * 0.0.0.0/0 !127.0.0.0/8 ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:40:24.404066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain POSTROUTING (policy ACCEPT 53 packets, 3315 bytes)\r\n"} +{"Time":"2023-05-31T12:40:24.404072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 203 15302 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T12:40:24.404077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 MASQUERADE all -- * !docker0 172.17.0.0/16 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:40:24.40408-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 DOCKER_POSTROUTING all -- * * 0.0.0.0/0 192.168.65.254 \r\n"} +{"Time":"2023-05-31T12:40:24.404083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 82 6436 MASQUERADE all -- * * 0.0.0.0/0 !10.0.0.0/8 /* kubenet: SNAT for outbound traffic from cluster */ ADDRTYPE match dst-type !LOCAL\r\n"} +{"Time":"2023-05-31T12:40:24.404085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain DOCKER (2 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404095-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 RETURN all -- docker0 * 0.0.0.0/0 0.0.0.0/0 \r\n"} +{"Time":"2023-05-31T12:40:24.404097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain DOCKER_OUTPUT (2 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 192.168.65.254 tcp dpt:53 to:127.0.0.11:39287\r\n"} +{"Time":"2023-05-31T12:40:24.404159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 54 4797 DNAT udp -- * * 0.0.0.0/0 192.168.65.254 udp dpt:53 to:127.0.0.11:48713\r\n"} +{"Time":"2023-05-31T12:40:24.404161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain DOCKER_POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 SNAT tcp -- * * 127.0.0.11 0.0.0.0/0 tcp spt:39287 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:40:24.404171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 SNAT udp -- * * 127.0.0.11 0.0.0.0/0 udp spt:48713 to:192.168.65.254:53\r\n"} +{"Time":"2023-05-31T12:40:24.404174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T12:40:24.40419-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404199-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 53 3315 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T12:40:24.40429-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T12:40:24.404293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T12:40:24.404295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T12:40:24.4043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SEP-BL4BN7UU5M2OIW4P (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.40431-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 KUBE-MARK-MASQ all -- * * 192.168.85.2 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T12:40:24.404312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.85.2:8443\r\n"} +{"Time":"2023-05-31T12:40:24.404315-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404322-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T12:40:24.404324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:40:24.404326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.40433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T12:40:24.404446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T12:40:24.404449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SEP-XPTUC4FRAFEFDBGF (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.4 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T12:40:24.404459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T12:40:24.404461-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T12:40:24.404471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T12:40:24.404473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404475-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.40448-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:40:24.404482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:40:24.404485-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:40:24.404584-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.111.54.226 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:40:24.404587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:40:24.404589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 80 4800 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T12:40:24.404592-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T12:40:24.404601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:40:24.404604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404609-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T12:40:24.404618-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T12:40:24.404621-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404623-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404625-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T12:40:24.404732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 3 180 KUBE-SEP-BL4BN7UU5M2OIW4P all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.85.2:8443 */\r\n"} +{"Time":"2023-05-31T12:40:24.404735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404742-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T12:40:24.404745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T12:40:24.404747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.404749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T12:40:24.404752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T12:40:24.404754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.111.54.226 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T12:40:24.404756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1 60 KUBE-SEP-XPTUC4FRAFEFDBGF all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.4:8080 */\r\n"} +{"Time":"2023-05-31T12:40:24.404758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.404761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.404763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:40:24.404765-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.404767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.40477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:40:24.404773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.404775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T12:40:24.404778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:40:24.404779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T12:40:24.404913-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T12:40:24.404917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T12:40:24.40492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T12:40:24.404922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T12:40:24.404925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T12:40:24.404927-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.404929-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.404931-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:24.404933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:40:24.404935-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:40:24.404937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.404939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.404942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:24.404944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.404946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:40:24.404949-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:40:24.404952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Environment:\n"} +{"Time":"2023-05-31T12:40:24.404954-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:40:24.404957-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:24.404959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:40:24.404961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:40:24.404964-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:40:24.404966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:24.404968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:40:24.40497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:40:24.404972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.405133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:40:24.405135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:40:24.405137-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.40514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:40:24.405142-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:40:24.405144-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:40:24.405146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.405148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:40:24.40515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:40:24.405152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:40:24.405154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:24.405158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:24.40516-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:24.405162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal SuccessfulCreate 30s daemonset-controller Created pod: kube-proxy-66cks\n"} +{"Time":"2023-05-31T12:40:24.405165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.405167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.405169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:40:24.405171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: kube-proxy-66cks\n"} +{"Time":"2023-05-31T12:40:24.405174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.405176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T12:40:24.405178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T12:40:24.405181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.405183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node: kubenet-996000/192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.405185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Start Time: Wed, 31 May 2023 12:39:44 -0700\n"} +{"Time":"2023-05-31T12:40:24.405347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T12:40:24.40535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.405352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T12:40:24.405354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.405357-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Status: Running\n"} +{"Time":"2023-05-31T12:40:24.405359-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.405362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IPs:\n"} +{"Time":"2023-05-31T12:40:24.405364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.405366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.405368-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Containers:\n"} +{"Time":"2023-05-31T12:40:24.405371-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:40:24.405373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Container ID: docker://9359eb20d971bbc7cfa3c148c71006feeee0425bf48f5636a8648962a5d11f90\n"} +{"Time":"2023-05-31T12:40:24.405376-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:40:24.405378-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Image ID: docker-pullable://registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T12:40:24.405381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.405384-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T12:40:24.405386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Command:\n"} +{"Time":"2023-05-31T12:40:24.405388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.40539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T12:40:24.405393-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T12:40:24.405395-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" State: Running\n"} +{"Time":"2023-05-31T12:40:24.405398-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Started: Wed, 31 May 2023 12:39:45 -0700\n"} +{"Time":"2023-05-31T12:40:24.4054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ready: True\n"} +{"Time":"2023-05-31T12:40:24.405402-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T12:40:24.405405-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Environment:\n"} +{"Time":"2023-05-31T12:40:24.405535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T12:40:24.405538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Mounts:\n"} +{"Time":"2023-05-31T12:40:24.405541-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T12:40:24.405543-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T12:40:24.405545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T12:40:24.405547-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-59vj9 (ro)\n"} +{"Time":"2023-05-31T12:40:24.405549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Conditions:\n"} +{"Time":"2023-05-31T12:40:24.405551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Status\n"} +{"Time":"2023-05-31T12:40:24.405553-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Initialized True \n"} +{"Time":"2023-05-31T12:40:24.405556-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Ready True \n"} +{"Time":"2023-05-31T12:40:24.405558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T12:40:24.40556-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T12:40:24.405562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Volumes:\n"} +{"Time":"2023-05-31T12:40:24.405564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T12:40:24.405566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T12:40:24.405569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.405571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Optional: false\n"} +{"Time":"2023-05-31T12:40:24.405573-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T12:40:24.405575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.405577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T12:40:24.40558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T12:40:24.405582-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T12:40:24.405584-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T12:40:24.405586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T12:40:24.405588-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T12:40:24.40559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-api-access-59vj9:\n"} +{"Time":"2023-05-31T12:40:24.40574-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T12:40:24.405743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T12:40:24.405745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:24.405747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:40:24.405749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T12:40:24.405751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T12:40:24.405753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T12:40:24.405756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T12:40:24.405758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:24.40576-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:24.405763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:24.405766-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:40:24.405768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:24.405771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T12:40:24.405773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T12:40:24.405775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Events:\n"} +{"Time":"2023-05-31T12:40:24.405778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T12:40:24.40578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T12:40:24.405783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Scheduled 31s default-scheduler Successfully assigned kube-system/kube-proxy-66cks to kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.405786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Pulled 30s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T12:40:24.405788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Created 30s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.405939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Normal Started 30s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.405945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.405947-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.405949-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:40:24.405952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.795413 1 node.go:141] Successfully retrieved node IP: 192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.405955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.795468 1 server_others.go:110] \"Detected node IP\" address=\"192.168.85.2\"\n"} +{"Time":"2023-05-31T12:40:24.405958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.795486 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T12:40:24.405961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.822781 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T12:40:24.405963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.823155 1 server_others.go:197] \"kube-proxy running in dual-stack mode\" ipFamily=IPv4\n"} +{"Time":"2023-05-31T12:40:24.405965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.823193 1 server_others.go:198] \"Creating dualStackProxier for iptables\"\n"} +{"Time":"2023-05-31T12:40:24.405968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.823211 1 server_others.go:481] \"Detect-local-mode set to ClusterCIDR, but no IPv6 cluster CIDR defined, defaulting to no-op detect-local for IPv6\"\n"} +{"Time":"2023-05-31T12:40:24.405971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.823241 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T12:40:24.405974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.824403 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T12:40:24.405977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.824474 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T12:40:24.405979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.825303 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T12:40:24.405981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.825319 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T12:40:24.405983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.825336 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T12:40:24.405985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.825338 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T12:40:24.405989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.825502 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T12:40:24.406112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.825515 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T12:40:24.406116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.983800 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T12:40:24.406118-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.983821 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T12:40:24.40612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" I0531 19:39:45.984463 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T12:40:24.406124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.406126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.406128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:40:24.40613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:40:24.406133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Loaded: loaded (\u001b]8;;file://kubenet-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:24.406135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T12:40:24.406138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" └─\u001b]8;;file://kubenet-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:24.40614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:31 UTC; 43s ago\r\n"} +{"Time":"2023-05-31T12:40:24.406143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:24.406146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Main PID: 2366 (kubelet)\r\n"} +{"Time":"2023-05-31T12:40:24.406148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Tasks: 13 (limit: 6991)\r\n"} +{"Time":"2023-05-31T12:40:24.40615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Memory: 32.0M\r\n"} +{"Time":"2023-05-31T12:40:24.406152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CPU: 1.691s\r\n"} +{"Time":"2023-05-31T12:40:24.406154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T12:40:24.406157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" └─2366 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=kubenet-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.85.2 --pod-cidr=10.244.0.0/16\r\n"} +{"Time":"2023-05-31T12:40:24.406319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.406325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: W0531 19:39:52.448661 2366 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/abdbf956-19f5-40ad-83e8-ab6b885e98ef/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:40:24.406328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.448885 2366 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/abdbf956-19f5-40ad-83e8-ab6b885e98ef-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"abdbf956-19f5-40ad-83e8-ab6b885e98ef\" (UID: \"abdbf956-19f5-40ad-83e8-ab6b885e98ef\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.406332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.451047 2366 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/abdbf956-19f5-40ad-83e8-ab6b885e98ef-kube-api-access-srglj\" (OuterVolumeSpecName: \"kube-api-access-srglj\") pod \"abdbf956-19f5-40ad-83e8-ab6b885e98ef\" (UID: \"abdbf956-19f5-40ad-83e8-ab6b885e98ef\"). InnerVolumeSpecName \"kube-api-access-srglj\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.406335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.453730 2366 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:40:24.406338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.454641 2366 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"10.244.0.0/16\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:40:24.406341-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.549469 2366 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-srglj\\\" (UniqueName: \\\"kubernetes.io/projected/abdbf956-19f5-40ad-83e8-ab6b885e98ef-kube-api-access-srglj\\\") on node \\\"kubenet-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:40:24.406344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.549538 2366 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/abdbf956-19f5-40ad-83e8-ab6b885e98ef-config-volume\\\") on node \\\"kubenet-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:40:24.406347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:53 kubenet-996000 kubelet[2366]: I0531 19:39:53.392435 2366 scope.go:115] \"RemoveContainer\" containerID=\"f45e4f7916877af1f5b2674ae91571fcd65d9dd4229c16e8d035af40a1d14c1e\"\r\n"} +{"Time":"2023-05-31T12:40:24.40635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:53 kubenet-996000 kubelet[2366]: I0531 19:39:53.802443 2366 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=abdbf956-19f5-40ad-83e8-ab6b885e98ef path=\"/var/lib/kubelet/pods/abdbf956-19f5-40ad-83e8-ab6b885e98ef/volumes\"\r\n"} +{"Time":"2023-05-31T12:40:24.406489-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:57 kubenet-996000 kubelet[2366]: I0531 19:39:57.428860 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-xsx7b\" podStartSLOduration=1.433418546 podCreationTimestamp=\"2023-05-31 19:39:50 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:39:50.730336527 +0000 UTC m=+19.106342071\" lastFinishedPulling=\"2023-05-31 19:39:56.725748428 +0000 UTC m=+25.101753972\" observedRunningTime=\"2023-05-31 19:39:57.428755015 +0000 UTC m=+25.804760563\" watchObservedRunningTime=\"2023-05-31 19:39:57.428830447 +0000 UTC m=+25.804835993\"\r\n"} +{"Time":"2023-05-31T12:40:24.406495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.406498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.4065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:40:24.406503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;34m# \u001b]8;;file://kubenet-996000/lib/systemd/system/kubelet.service\u0007/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.406505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:24.406507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T12:40:24.40651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T12:40:24.406512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T12:40:24.406514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.406516-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.406518-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T12:40:24.40652-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:24.406523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T12:40:24.406525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T12:40:24.406527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.406529-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:24.406532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:24.406534-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.406536-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;34m# \u001b]8;;file://kubenet-996000/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.406538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:24.406627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Wants=docker.socket\r\n"} +{"Time":"2023-05-31T12:40:24.40663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.406632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.406634-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:40:24.406636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=kubenet-996000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.85.2 --pod-cidr=10.244.0.0/16\r\n"} +{"Time":"2023-05-31T12:40:24.40664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.406642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:24.406644-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.406647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.406649-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:40:24.406651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:40:24.406653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.406657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.406659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.406661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.406665-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.406667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.40667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 304.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.406673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:40:24.406675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: Flag --pod-cidr has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:40:24.406777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.616890 1726 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:40:24.406783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.616957 1726 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:40:24.406786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.617168 1726 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:40:24.406789-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.620069 1726 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:40:24.406793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.622478 1726 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.406805-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: W0531 19:39:25.625777 1726 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:40:24.406809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.633096 1726 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:40:24.406812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.633421 1726 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:40:24.406816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.633482 1726 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:40:24.40682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.633501 1726 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:40:24.406951-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.633510 1726 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:40:24.406957-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.633570 1726 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:24.40696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.651367 1726 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:40:24.406963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.651415 1726 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:40:24.406966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.651437 1726 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:40:24.406968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.651451 1726 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:40:24.40697-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: W0531 19:39:25.652080 1726 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkubenet-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.406973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: W0531 19:39:25.652240 1726 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.406977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.652268 1726 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkubenet-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.40698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.652273 1726 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.406983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.658937 1726 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:40:24.407115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.659154 1726 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T12:40:24.407121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.659867 1726 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T12:40:24.407124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: W0531 19:39:25.659998 1726 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T12:40:24.407126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.660496 1726 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:40:24.407129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.660560 1726 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:40:24.407131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.660896 1726 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:40:24.407136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.660924 1726 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubenet-996000.176451ad621a2f2a\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"kubenet-996000\", UID:\"kubenet-996000\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"kubenet-996000\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 39, 25, 660483370, time.Local), LastTimestamp:time"} +{"Time":"2023-05-31T12:40:24.407141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":".Date(2023, time.May, 31, 19, 39, 25, 660483370, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.85.2:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T12:40:24.407143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.661405 1726 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:40:24.407146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.661513 1726 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:40:24.407293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.661727 1726 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:40:24.407297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.661812 1726 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:40:24.4073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: W0531 19:39:25.661960 1726 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.407303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.662042 1726 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.407307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.663495 1726 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kubenet-996000?timeout=10s\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T12:40:24.407309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.687829 1726 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:40:24.407313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.689260 1726 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:40:24.407316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.689343 1726 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:40:24.40732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.689362 1726 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:40:24.407324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.689399 1726 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:40:24.407327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: W0531 19:39:25.689998 1726 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.407455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.690040 1726 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.407459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.691688 1726 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:40:24.407462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.691733 1726 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:40:24.407464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.691747 1726 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:24.407466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.693075 1726 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:40:24.407469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.694963 1726 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:40:24.407472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.695005 1726 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:24.407474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.703974 1726 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:40:24.407478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.704375 1726 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:40:24.40748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.713094 1726 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"kubenet-996000\\\" not found\"\r\n"} +{"Time":"2023-05-31T12:40:24.407483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.771813 1726 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.772168 1726 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.40749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.790366 1726 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.407595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.797966 1726 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.407599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.806023 1726 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.407601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.813640 1726 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.407604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863606 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/10ec317222760198adf297c6bfa8b17d-etcd-certs\\\") pod \\\"etcd-kubenet-996000\\\" (UID: \\\"10ec317222760198adf297c6bfa8b17d\\\") \" pod=\"kube-system/etcd-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863718 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-k8s-certs\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407611-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863742 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863758 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-ca-certs\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407623-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863772 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-k8s-certs\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863789 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863803 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/15167ebeb6a32e3386e2156c6f2b3924-kubeconfig\\\") pod \\\"kube-scheduler-kubenet-996000\\\" (UID: \\\"15167ebeb6a32e3386e2156c6f2b3924\\\") \" pod=\"kube-system/kube-scheduler-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863833 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-etc-ca-certificates\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863864 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-etc-ca-certificates\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863935 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-kubeconfig\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863959 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.863988 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-ca-certs\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407781-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.864022 1726 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kubenet-996000?timeout=10s\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T12:40:24.407961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.864061 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.864136 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/10ec317222760198adf297c6bfa8b17d-etcd-data\\\") pod \\\"etcd-kubenet-996000\\\" (UID: \\\"10ec317222760198adf297c6bfa8b17d\\\") \" pod=\"kube-system/etcd-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.864267 1726 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-flexvolume-dir\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: I0531 19:39:25.982038 1726 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:25 kubenet-996000 kubelet[1726]: E0531 19:39:25.982511 1726 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:26 kubenet-996000 kubelet[1726]: E0531 19:39:26.284396 1726 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kubenet-996000?timeout=10s\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T12:40:24.407988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:26 kubenet-996000 kubelet[1726]: I0531 19:39:26.397289 1726 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.407992-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:26 kubenet-996000 kubelet[1726]: E0531 19:39:26.397744 1726 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.85.2:8443: connect: connection refused\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.408155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:26 kubenet-996000 kubelet[1726]: W0531 19:39:26.513018 1726 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.408158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:26 kubenet-996000 kubelet[1726]: E0531 19:39:26.513100 1726 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.408162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:26 kubenet-996000 kubelet[1726]: W0531 19:39:26.584693 1726 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkubenet-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.408165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:26 kubenet-996000 kubelet[1726]: E0531 19:39:26.584890 1726 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkubenet-996000\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.85.2:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T12:40:24.408169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:27 kubenet-996000 kubelet[1726]: I0531 19:39:27.207421 1726 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.408172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:28 kubenet-996000 kubelet[1726]: I0531 19:39:28.684637 1726 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:40:24.408175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:28 kubenet-996000 kubelet[1726]: E0531 19:39:28.699984 1726 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"kubenet-996000\\\" not found\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.408178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:28 kubenet-996000 kubelet[1726]: I0531 19:39:28.762613 1726 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:40:24.40818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:28 kubenet-996000 kubelet[1726]: I0531 19:39:28.790208 1726 kubelet_node_status.go:73] \"Successfully registered node\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.408183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:28 kubenet-996000 kubelet[1726]: I0531 19:39:28.798426 1726 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:40:24.408186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:28 kubenet-996000 kubelet[1726]: E0531 19:39:28.812473 1726 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-kubenet-996000\\\" is forbidden: no PriorityClass with name system-node-critical was found\" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.408382-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:29 kubenet-996000 kubelet[1726]: I0531 19:39:29.004511 1726 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T12:40:24.408388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T12:40:24.408391-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408405-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.40841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408415-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408417-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.40842-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408422-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[1726]: I0531 19:39:31.580849 1726 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:40:24.408426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 systemd[1]: kubelet.service: Deactivated successfully.\r\n"} +{"Time":"2023-05-31T12:40:24.408428-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408431-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408433-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408435-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408438-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.40844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:40:24.408592-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.4086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408603-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408611-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T12:40:24.408617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░ \u001b[0m\u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.40862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: http://www.ubuntu.com/support\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408625-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 349.\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.408637-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:40:24.408641-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: Flag --pod-cidr has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T12:40:24.408643-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.693002 2366 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T12:40:24.408789-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.693066 2366 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T12:40:24.408795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.693256 2366 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T12:40:24.408798-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.694454 2366 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T12:40:24.408801-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.695294 2366 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T12:40:24.408803-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: W0531 19:39:31.699366 2366 sysinfo.go:203] Nodes topology is not available, providing CPU topology\r\n"} +{"Time":"2023-05-31T12:40:24.408806-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.706650 2366 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T12:40:24.408809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.706940 2366 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T12:40:24.408812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.707003 2366 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T12:40:24.408815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.707020 2366 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T12:40:24.408818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.707045 2366 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T12:40:24.408966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.707073 2366 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:24.408972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.726773 2366 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T12:40:24.408974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.726882 2366 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T12:40:24.408977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.726903 2366 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T12:40:24.40898-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.726983 2366 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T12:40:24.408983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.736236 2366 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"docker\" version=\"24.0.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T12:40:24.408985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.736358 2366 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T12:40:24.408988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.736830 2366 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T12:40:24.40899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.737273 2366 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T12:40:24.408993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.737618 2366 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T12:40:24.408996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.738135 2366 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T12:40:24.408999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.739607 2366 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T12:40:24.409001-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.739882 2366 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T12:40:24.409003-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.742633 2366 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T12:40:24.409006-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.743186 2366 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T12:40:24.409124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.793902 2366 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T12:40:24.409129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.795128 2366 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T12:40:24.409132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.795222 2366 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T12:40:24.409135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.795238 2366 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T12:40:24.409137-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: E0531 19:39:31.795269 2366 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T12:40:24.40914-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.817149 2366 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T12:40:24.409143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.817196 2366 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T12:40:24.409145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.817212 2366 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:24.409147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.817648 2366 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T12:40:24.40915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.817704 2366 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T12:40:24.409152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.817711 2366 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T12:40:24.409155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.820663 2366 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T12:40:24.409158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.820687 2366 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T12:40:24.409161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.820811 2366 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T12:40:24.409251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.821681 2366 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T12:40:24.409254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.821873 2366 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T12:40:24.409257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.893190 2366 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.895535 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.409262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.895609 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.409264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.895639 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.409266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.895907 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.409269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: E0531 19:39:31.909886 2366 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-kubenet-996000\\\" already exists\" pod=\"kube-system/etcd-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.913579 2366 kubelet_node_status.go:108] \"Node was previously registered\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.913688 2366 kubelet_node_status.go:73] \"Successfully registered node\" node=\"kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409278-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.983912 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-k8s-certs\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984039 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-usr-local-share-ca-certificates\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409387-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984076 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-etc-ca-certificates\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.40939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984241 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/10ec317222760198adf297c6bfa8b17d-etcd-data\\\") pod \\\"etcd-kubenet-996000\\\" (UID: \\\"10ec317222760198adf297c6bfa8b17d\\\") \" pod=\"kube-system/etcd-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409394-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984283 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409398-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984352 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-flexvolume-dir\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409402-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984401 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-ca-certs\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409406-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984428 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-k8s-certs\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409409-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984490 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-local-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-usr-local-share-ca-certificates\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984514 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984542 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/10ec317222760198adf297c6bfa8b17d-etcd-certs\\\") pod \\\"etcd-kubenet-996000\\\" (UID: \\\"10ec317222760198adf297c6bfa8b17d\\\") \" pod=\"kube-system/etcd-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984570 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-ca-certs\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984594 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etc-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/4d802d21301a91e45e9ad87ef79a8779-etc-ca-certificates\\\") pod \\\"kube-apiserver-kubenet-996000\\\" (UID: \\\"4d802d21301a91e45e9ad87ef79a8779\\\") \" pod=\"kube-system/kube-apiserver-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984613 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/12ccfea501f0e57748979193b943a57d-kubeconfig\\\") pod \\\"kube-controller-manager-kubenet-996000\\\" (UID: \\\"12ccfea501f0e57748979193b943a57d\\\") \" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.40959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 kubelet[2366]: I0531 19:39:31.984642 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/15167ebeb6a32e3386e2156c6f2b3924-kubeconfig\\\") pod \\\"kube-scheduler-kubenet-996000\\\" (UID: \\\"15167ebeb6a32e3386e2156c6f2b3924\\\") \" pod=\"kube-system/kube-scheduler-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409593-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:32 kubenet-996000 kubelet[2366]: I0531 19:39:32.727406 2366 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T12:40:24.409596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:32 kubenet-996000 kubelet[2366]: I0531 19:39:32.743958 2366 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T12:40:24.409598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:32 kubenet-996000 kubelet[2366]: I0531 19:39:32.791314 2366 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T12:40:24.40971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:32 kubenet-996000 kubelet[2366]: E0531 19:39:32.830722 2366 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-kubenet-996000\\\" already exists\" pod=\"kube-system/kube-controller-manager-kubenet-996000\"\r\n"} +{"Time":"2023-05-31T12:40:24.409715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:32 kubenet-996000 kubelet[2366]: I0531 19:39:32.840492 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-kubenet-996000\" podStartSLOduration=1.840454567 podCreationTimestamp=\"2023-05-31 19:39:31 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:32.840240511 +0000 UTC m=+1.216362111\" watchObservedRunningTime=\"2023-05-31 19:39:32.840454567 +0000 UTC m=+1.216576165\"\r\n"} +{"Time":"2023-05-31T12:40:24.409721-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:32 kubenet-996000 kubelet[2366]: I0531 19:39:32.846815 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-kubenet-996000\" podStartSLOduration=2.846789996 podCreationTimestamp=\"2023-05-31 19:39:30 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:32.846675414 +0000 UTC m=+1.222797015\" watchObservedRunningTime=\"2023-05-31 19:39:32.846789996 +0000 UTC m=+1.222911595\"\r\n"} +{"Time":"2023-05-31T12:40:24.409726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:32 kubenet-996000 kubelet[2366]: I0531 19:39:32.861526 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-kubenet-996000\" podStartSLOduration=1.861496143 podCreationTimestamp=\"2023-05-31 19:39:31 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:32.8540069 +0000 UTC m=+1.230128508\" watchObservedRunningTime=\"2023-05-31 19:39:32.861496143 +0000 UTC m=+1.237617742\"\r\n"} +{"Time":"2023-05-31T12:40:24.409729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:32 kubenet-996000 kubelet[2366]: I0531 19:39:32.861594 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-kubenet-996000\" podStartSLOduration=1.861582388 podCreationTimestamp=\"2023-05-31 19:39:31 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:32.861482417 +0000 UTC m=+1.237604020\" watchObservedRunningTime=\"2023-05-31 19:39:32.861582388 +0000 UTC m=+1.237703987\"\r\n"} +{"Time":"2023-05-31T12:40:24.409733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.629799 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.409736-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.683645 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/b1c92234-1c19-44f3-a518-6301843e4781-kube-proxy\\\") pod \\\"kube-proxy-66cks\\\" (UID: \\\"b1c92234-1c19-44f3-a518-6301843e4781\\\") \" pod=\"kube-system/kube-proxy-66cks\"\r\n"} +{"Time":"2023-05-31T12:40:24.409809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.683897 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/b1c92234-1c19-44f3-a518-6301843e4781-xtables-lock\\\") pod \\\"kube-proxy-66cks\\\" (UID: \\\"b1c92234-1c19-44f3-a518-6301843e4781\\\") \" pod=\"kube-system/kube-proxy-66cks\"\r\n"} +{"Time":"2023-05-31T12:40:24.409813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.683925 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/b1c92234-1c19-44f3-a518-6301843e4781-lib-modules\\\") pod \\\"kube-proxy-66cks\\\" (UID: \\\"b1c92234-1c19-44f3-a518-6301843e4781\\\") \" pod=\"kube-system/kube-proxy-66cks\"\r\n"} +{"Time":"2023-05-31T12:40:24.409817-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.683941 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-59vj9\\\" (UniqueName: \\\"kubernetes.io/projected/b1c92234-1c19-44f3-a518-6301843e4781-kube-api-access-59vj9\\\") pod \\\"kube-proxy-66cks\\\" (UID: \\\"b1c92234-1c19-44f3-a518-6301843e4781\\\") \" pod=\"kube-system/kube-proxy-66cks\"\r\n"} +{"Time":"2023-05-31T12:40:24.40982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.718281 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.409823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.785597 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/abdbf956-19f5-40ad-83e8-ab6b885e98ef-config-volume\\\") pod \\\"coredns-5d78c9869d-7b9tk\\\" (UID: \\\"abdbf956-19f5-40ad-83e8-ab6b885e98ef\\\") \" pod=\"kube-system/coredns-5d78c9869d-7b9tk\"\r\n"} +{"Time":"2023-05-31T12:40:24.409831-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.785670 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-srglj\\\" (UniqueName: \\\"kubernetes.io/projected/abdbf956-19f5-40ad-83e8-ab6b885e98ef-kube-api-access-srglj\\\") pod \\\"coredns-5d78c9869d-7b9tk\\\" (UID: \\\"abdbf956-19f5-40ad-83e8-ab6b885e98ef\\\") \" pod=\"kube-system/coredns-5d78c9869d-7b9tk\"\r\n"} +{"Time":"2023-05-31T12:40:24.409835-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.794862 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.409837-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.885879 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/67f8705a-ee33-4f90-9737-3f466f41d0a6-config-volume\\\") pod \\\"coredns-5d78c9869d-wkgcm\\\" (UID: \\\"67f8705a-ee33-4f90-9737-3f466f41d0a6\\\") \" pod=\"kube-system/coredns-5d78c9869d-wkgcm\"\r\n"} +{"Time":"2023-05-31T12:40:24.409931-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:44 kubenet-996000 kubelet[2366]: I0531 19:39:44.885924 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-n2x54\\\" (UniqueName: \\\"kubernetes.io/projected/67f8705a-ee33-4f90-9737-3f466f41d0a6-kube-api-access-n2x54\\\") pod \\\"coredns-5d78c9869d-wkgcm\\\" (UID: \\\"67f8705a-ee33-4f90-9737-3f466f41d0a6\\\") \" pod=\"kube-system/coredns-5d78c9869d-wkgcm\"\r\n"} +{"Time":"2023-05-31T12:40:24.409938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:46 kubenet-996000 kubelet[2366]: I0531 19:39:46.207374 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-66cks\" podStartSLOduration=2.207328415 podCreationTimestamp=\"2023-05-31 19:39:44 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:46.207073183 +0000 UTC m=+14.583078738\" watchObservedRunningTime=\"2023-05-31 19:39:46.207328415 +0000 UTC m=+14.583333964\"\r\n"} +{"Time":"2023-05-31T12:40:24.409942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:46 kubenet-996000 kubelet[2366]: I0531 19:39:46.707775 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.409945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:46 kubenet-996000 kubelet[2366]: I0531 19:39:46.806528 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/ea0caf58-f11d-4dd9-8377-43ab59efc3f3-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"ea0caf58-f11d-4dd9-8377-43ab59efc3f3\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:40:24.409949-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:46 kubenet-996000 kubelet[2366]: I0531 19:39:46.806587 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-crvnb\\\" (UniqueName: \\\"kubernetes.io/projected/ea0caf58-f11d-4dd9-8377-43ab59efc3f3-kube-api-access-crvnb\\\") pod \\\"storage-provisioner\\\" (UID: \\\"ea0caf58-f11d-4dd9-8377-43ab59efc3f3\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T12:40:24.409953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:47 kubenet-996000 kubelet[2366]: I0531 19:39:47.226319 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-7b9tk\" podStartSLOduration=3.22628724 podCreationTimestamp=\"2023-05-31 19:39:44 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:47.226010768 +0000 UTC m=+15.602016316\" watchObservedRunningTime=\"2023-05-31 19:39:47.22628724 +0000 UTC m=+15.602292788\"\r\n"} +{"Time":"2023-05-31T12:40:24.409956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:47 kubenet-996000 kubelet[2366]: I0531 19:39:47.226410 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-wkgcm\" podStartSLOduration=3.226395248 podCreationTimestamp=\"2023-05-31 19:39:44 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:47.215336022 +0000 UTC m=+15.591341581\" watchObservedRunningTime=\"2023-05-31 19:39:47.226395248 +0000 UTC m=+15.602400796\"\r\n"} +{"Time":"2023-05-31T12:40:24.410014-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:48 kubenet-996000 kubelet[2366]: I0531 19:39:48.318170 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=2.318133688 podCreationTimestamp=\"2023-05-31 19:39:46 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:48.318046536 +0000 UTC m=+16.694052084\" watchObservedRunningTime=\"2023-05-31 19:39:48.318133688 +0000 UTC m=+16.694139244\"\r\n"} +{"Time":"2023-05-31T12:40:24.410018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:50 kubenet-996000 kubelet[2366]: I0531 19:39:50.244135 2366 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T12:40:24.410021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:50 kubenet-996000 kubelet[2366]: I0531 19:39:50.332012 2366 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-n8dvf\\\" (UniqueName: \\\"kubernetes.io/projected/321d7268-1806-47f3-beca-9bd5a788d63b-kube-api-access-n8dvf\\\") pod \\\"netcat-7458db8b8-xsx7b\\\" (UID: \\\"321d7268-1806-47f3-beca-9bd5a788d63b\\\") \" pod=\"default/netcat-7458db8b8-xsx7b\"\r\n"} +{"Time":"2023-05-31T12:40:24.410025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.448284 2366 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-srglj\\\" (UniqueName: \\\"kubernetes.io/projected/abdbf956-19f5-40ad-83e8-ab6b885e98ef-kube-api-access-srglj\\\") pod \\\"abdbf956-19f5-40ad-83e8-ab6b885e98ef\\\" (UID: \\\"abdbf956-19f5-40ad-83e8-ab6b885e98ef\\\") \"\r\n"} +{"Time":"2023-05-31T12:40:24.410028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.448361 2366 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/abdbf956-19f5-40ad-83e8-ab6b885e98ef-config-volume\\\") pod \\\"abdbf956-19f5-40ad-83e8-ab6b885e98ef\\\" (UID: \\\"abdbf956-19f5-40ad-83e8-ab6b885e98ef\\\") \"\r\n"} +{"Time":"2023-05-31T12:40:24.410031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: W0531 19:39:52.448661 2366 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/abdbf956-19f5-40ad-83e8-ab6b885e98ef/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T12:40:24.410035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.448885 2366 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/abdbf956-19f5-40ad-83e8-ab6b885e98ef-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"abdbf956-19f5-40ad-83e8-ab6b885e98ef\" (UID: \"abdbf956-19f5-40ad-83e8-ab6b885e98ef\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.410039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.451047 2366 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/abdbf956-19f5-40ad-83e8-ab6b885e98ef-kube-api-access-srglj\" (OuterVolumeSpecName: \"kube-api-access-srglj\") pod \"abdbf956-19f5-40ad-83e8-ab6b885e98ef\" (UID: \"abdbf956-19f5-40ad-83e8-ab6b885e98ef\"). InnerVolumeSpecName \"kube-api-access-srglj\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.410139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.453730 2366 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:40:24.410145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.454641 2366 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"10.244.0.0/16\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:40:24.41015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.549469 2366 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-srglj\\\" (UniqueName: \\\"kubernetes.io/projected/abdbf956-19f5-40ad-83e8-ab6b885e98ef-kube-api-access-srglj\\\") on node \\\"kubenet-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:40:24.410155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 kubelet[2366]: I0531 19:39:52.549538 2366 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/abdbf956-19f5-40ad-83e8-ab6b885e98ef-config-volume\\\") on node \\\"kubenet-996000\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T12:40:24.41016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:53 kubenet-996000 kubelet[2366]: I0531 19:39:53.392435 2366 scope.go:115] \"RemoveContainer\" containerID=\"f45e4f7916877af1f5b2674ae91571fcd65d9dd4229c16e8d035af40a1d14c1e\"\r\n"} +{"Time":"2023-05-31T12:40:24.410166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:53 kubenet-996000 kubelet[2366]: I0531 19:39:53.802443 2366 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=abdbf956-19f5-40ad-83e8-ab6b885e98ef path=\"/var/lib/kubelet/pods/abdbf956-19f5-40ad-83e8-ab6b885e98ef/volumes\"\r\n"} +{"Time":"2023-05-31T12:40:24.410175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:57 kubenet-996000 kubelet[2366]: I0531 19:39:57.428860 2366 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-xsx7b\" podStartSLOduration=1.433418546 podCreationTimestamp=\"2023-05-31 19:39:50 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:39:50.730336527 +0000 UTC m=+19.106342071\" lastFinishedPulling=\"2023-05-31 19:39:56.725748428 +0000 UTC m=+25.101753972\" observedRunningTime=\"2023-05-31 19:39:57.428755015 +0000 UTC m=+25.804760563\" watchObservedRunningTime=\"2023-05-31 19:39:57.428830447 +0000 UTC m=+25.804835993\"\r\n"} +{"Time":"2023-05-31T12:40:24.410179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.410181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.410183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:40:24.410186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T12:40:24.410188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusters:\r\n"} +{"Time":"2023-05-31T12:40:24.41025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T12:40:24.410262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:40:24.410268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"dUZyLwpNK2xNU1FNOWV0cStRUjRtY094TUtGcUtqcTdveFhuK3hsbk9DRTN3NGdkby9WNVZnUmd0WXk0eGhiaDE1VjlvClZyV1BzQ0V2WkpTS0JWc1VLVDg3aVhJRTF2bk13TG02MWdWWDJLWlF4RW1hendvc3dPbDg5RUJqdlAzNkNNcDAKREdVZ0Rha3QrODNzclZnSlErRW5mbmZrZEc4cXc2Rk52Tys4WEVSY1hWUjMyV2F1YThVVUxUbUt6czNnVHYxbwo3eUJxNXBzbHdrdkN6NUZwV0h2ZXd1NFR6YlZRbFEvSnZicENTODhPcGJVWlVLQjFETFVvRjdrZTRUN01vZndyCnRhYS9HRndWRW0yZmFxQlhTVW5wT0c4a2Vvd3FOcEVZZXB6NWJ4a0dDZzdHdDloRmNqOWJHb3h2WWNRR2R4TWkKMVNFTXN4ckNzcWNVRXc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T12:40:24.410273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T12:40:24.410277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: mk\r\n"} +{"Time":"2023-05-31T12:40:24.41028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" contexts:\r\n"} +{"Time":"2023-05-31T12:40:24.410283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - context:\r\n"} +{"Time":"2023-05-31T12:40:24.410285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T12:40:24.410287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user: system:node:kubenet-996000\r\n"} +{"Time":"2023-05-31T12:40:24.410289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: system:node:kubenet-996000@mk\r\n"} +{"Time":"2023-05-31T12:40:24.410291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" current-context: system:node:kubenet-996000@mk\r\n"} +{"Time":"2023-05-31T12:40:24.410294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T12:40:24.410296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T12:40:24.410299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" users:\r\n"} +{"Time":"2023-05-31T12:40:24.410464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - name: system:node:kubenet-996000\r\n"} +{"Time":"2023-05-31T12:40:24.410467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user:\r\n"} +{"Time":"2023-05-31T12:40:24.41047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:40:24.410487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T12:40:24.410491-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.410494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.410496-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:40:24.410498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T12:40:24.410501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" authentication:\r\n"} +{"Time":"2023-05-31T12:40:24.410503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T12:40:24.410505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T12:40:24.410507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:40:24.410509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T12:40:24.410515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" x509:\r\n"} +{"Time":"2023-05-31T12:40:24.410517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T12:40:24.410519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" authorization:\r\n"} +{"Time":"2023-05-31T12:40:24.410522-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T12:40:24.410524-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" webhook:\r\n"} +{"Time":"2023-05-31T12:40:24.410526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410529-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410531-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:40:24.410533-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T12:40:24.410535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T12:40:24.410538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T12:40:24.41054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.410542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410544-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T12:40:24.410547-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:40:24.410549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T12:40:24.410551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T12:40:24.410555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T12:40:24.410559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T12:40:24.410564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T12:40:24.410567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T12:40:24.410569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T12:40:24.410573-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T12:40:24.410577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" logging:\r\n"} +{"Time":"2023-05-31T12:40:24.410579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T12:40:24.410581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" options:\r\n"} +{"Time":"2023-05-31T12:40:24.410583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" json:\r\n"} +{"Time":"2023-05-31T12:40:24.410585-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T12:40:24.410588-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T12:40:24.41059-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T12:40:24.410592-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T12:40:24.410599-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T12:40:24.410601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T12:40:24.410608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.41061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T12:40:24.410615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.410617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.410619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:40:24.410621-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.410624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusters:\n"} +{"Time":"2023-05-31T12:40:24.410626-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:40:24.410629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:40:24.410631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extensions:\n"} +{"Time":"2023-05-31T12:40:24.410633-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - extension:\n"} +{"Time":"2023-05-31T12:40:24.410635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" last-update: Wed, 31 May 2023 12:39:35 PDT\n"} +{"Time":"2023-05-31T12:40:24.410638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.41064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:40:24.410642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:40:24.410644-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" server: https://127.0.0.1:53237\n"} +{"Time":"2023-05-31T12:40:24.410646-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: bridge-996000\n"} +{"Time":"2023-05-31T12:40:24.410649-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:40:24.410651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" certificate-authority: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt\n"} +{"Time":"2023-05-31T12:40:24.410653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extensions:\n"} +{"Time":"2023-05-31T12:40:24.410655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - extension:\n"} +{"Time":"2023-05-31T12:40:24.410657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" last-update: Wed, 31 May 2023 12:39:44 PDT\n"} +{"Time":"2023-05-31T12:40:24.410659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.410661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:40:24.410663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T12:40:24.410666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" server: https://127.0.0.1:53259\n"} +{"Time":"2023-05-31T12:40:24.410668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.41067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" contexts:\n"} +{"Time":"2023-05-31T12:40:24.410672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - context:\n"} +{"Time":"2023-05-31T12:40:24.410675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cluster: bridge-996000\n"} +{"Time":"2023-05-31T12:40:24.410677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extensions:\n"} +{"Time":"2023-05-31T12:40:24.410679-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - extension:\n"} +{"Time":"2023-05-31T12:40:24.410681-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" last-update: Wed, 31 May 2023 12:39:35 PDT\n"} +{"Time":"2023-05-31T12:40:24.410683-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.410685-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:40:24.410687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:40:24.41069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:40:24.410692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user: bridge-996000\n"} +{"Time":"2023-05-31T12:40:24.410694-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: bridge-996000\n"} +{"Time":"2023-05-31T12:40:24.410696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - context:\n"} +{"Time":"2023-05-31T12:40:24.410698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cluster: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.4107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extensions:\n"} +{"Time":"2023-05-31T12:40:24.410702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - extension:\n"} +{"Time":"2023-05-31T12:40:24.410704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" last-update: Wed, 31 May 2023 12:39:44 PDT\n"} +{"Time":"2023-05-31T12:40:24.410706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.410708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T12:40:24.41071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: context_info\n"} +{"Time":"2023-05-31T12:40:24.410712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:40:24.410714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.410718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.41072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" current-context: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.410933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:40:24.41094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:40:24.410943-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" users:\n"} +{"Time":"2023-05-31T12:40:24.410947-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - name: bridge-996000\n"} +{"Time":"2023-05-31T12:40:24.410951-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user:\n"} +{"Time":"2023-05-31T12:40:24.410959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt\n"} +{"Time":"2023-05-31T12:40:24.410963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.key\n"} +{"Time":"2023-05-31T12:40:24.410971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - name: kubenet-996000\n"} +{"Time":"2023-05-31T12:40:24.410976-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user:\n"} +{"Time":"2023-05-31T12:40:24.410979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-certificate: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt\n"} +{"Time":"2023-05-31T12:40:24.410982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-key: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.key\n"} +{"Time":"2023-05-31T12:40:24.410984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.410988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.410991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:40:24.410993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.410995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" items:\n"} +{"Time":"2023-05-31T12:40:24.410997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.410999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.411002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:40:24.411004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.411006-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:24.411008-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:24.411011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:24.411014-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:24.411078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:24.411085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:24.411102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:24.411107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:24.411112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:24.411115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:24.411119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:24.411123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:24.411126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:24.411128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:24.411131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:24.411133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:24.411135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:24.411138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.411142-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.411145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.411148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" annotations:\n"} +{"Time":"2023-05-31T12:40:24.411151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:40:24.411156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:40:24.411158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:40:24.41116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:40:24.41133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:44Z\"\n"} +{"Time":"2023-05-31T12:40:24.41134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:24.411348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:40:24.411357-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"305\"\n"} +{"Time":"2023-05-31T12:40:24.411367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: 081ed4e6-a30c-484d-8e9f-7d65acba2e61\n"} +{"Time":"2023-05-31T12:40:24.411374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.41138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.411384-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:40:24.411388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.411396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:24.411415-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:24.411423-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:24.411427-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:24.41143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:24.411434-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:24.411437-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:24.411441-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:24.411445-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:24.411449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:24.411451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:24.411455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:24.411457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:24.411528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:24.411535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:24.411538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:24.41154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:24.411542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.411544-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.411548-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.411549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" annotations:\n"} +{"Time":"2023-05-31T12:40:24.411552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:40:24.411554-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:40:24.411557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:40:24.411559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:40:24.411575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:44Z\"\n"} +{"Time":"2023-05-31T12:40:24.411579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:24.411584-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T12:40:24.411587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"307\"\n"} +{"Time":"2023-05-31T12:40:24.41159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: 7294f0b0-09af-46fc-b377-edf19ab0a17e\n"} +{"Time":"2023-05-31T12:40:24.411594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.411598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.411601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" jws-kubeconfig-agwd2e: eyJhbGciOiJIUzI1NiIsImtpZCI6ImFnd2QyZSJ9..4Gs0jA-hYZ8BMhnwq-V-pslwqBELhoSHu2z4T5p3Aos\n"} +{"Time":"2023-05-31T12:40:24.411606-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T12:40:24.41161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.411614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusters:\n"} +{"Time":"2023-05-31T12:40:24.411617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:40:24.411647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T12:40:24.411653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"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\n"} +{"Time":"2023-05-31T12:40:24.411659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:40:24.411663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: \"\"\n"} +{"Time":"2023-05-31T12:40:24.411667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:40:24.411671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:40:24.411674-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:40:24.411677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:40:24.411681-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" users: null\n"} +{"Time":"2023-05-31T12:40:24.411686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.411689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.411692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:31Z\"\n"} +{"Time":"2023-05-31T12:40:24.411694-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T12:40:24.411697-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:40:24.411699-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"294\"\n"} +{"Time":"2023-05-31T12:40:24.411748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: 9a299099-b82d-4709-a8fc-bcc34fd5863a\n"} +{"Time":"2023-05-31T12:40:24.411754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.411757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.411759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:40:24.411762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.411764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:24.411766-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:24.411769-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:24.411772-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:24.411774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:24.411776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:24.411779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:24.411782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:24.411784-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:24.411786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:24.411788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:24.41179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:24.411792-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:24.411794-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:24.411797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:24.411799-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:24.411802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:24.411832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.411846-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.41185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.411852-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" annotations:\n"} +{"Time":"2023-05-31T12:40:24.411854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:40:24.411857-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:40:24.411859-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:40:24.411862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:40:24.411864-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:44Z\"\n"} +{"Time":"2023-05-31T12:40:24.411867-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:24.411871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T12:40:24.411876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"309\"\n"} +{"Time":"2023-05-31T12:40:24.411884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: 46b037c0-4065-4862-b9bd-eead973c5109\n"} +{"Time":"2023-05-31T12:40:24.41189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.411897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.411917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Corefile: |\n"} +{"Time":"2023-05-31T12:40:24.411921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" .:53 {\n"} +{"Time":"2023-05-31T12:40:24.411945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" log\n"} +{"Time":"2023-05-31T12:40:24.411948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" errors\n"} +{"Time":"2023-05-31T12:40:24.411952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" health {\n"} +{"Time":"2023-05-31T12:40:24.411958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T12:40:24.411965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\n"} +{"Time":"2023-05-31T12:40:24.41197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ready\n"} +{"Time":"2023-05-31T12:40:24.411974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T12:40:24.411977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pods insecure\n"} +{"Time":"2023-05-31T12:40:24.411979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T12:40:24.411981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ttl 30\n"} +{"Time":"2023-05-31T12:40:24.411983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\n"} +{"Time":"2023-05-31T12:40:24.411985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T12:40:24.411988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" hosts {\n"} +{"Time":"2023-05-31T12:40:24.411991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 192.168.65.254 host.minikube.internal\n"} +{"Time":"2023-05-31T12:40:24.411993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fallthrough\n"} +{"Time":"2023-05-31T12:40:24.411996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\n"} +{"Time":"2023-05-31T12:40:24.412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T12:40:24.412004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T12:40:24.412006-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\n"} +{"Time":"2023-05-31T12:40:24.412008-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cache 30\n"} +{"Time":"2023-05-31T12:40:24.41201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" loop\n"} +{"Time":"2023-05-31T12:40:24.412012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" reload\n"} +{"Time":"2023-05-31T12:40:24.412014-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" loadbalance\n"} +{"Time":"2023-05-31T12:40:24.412017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\n"} +{"Time":"2023-05-31T12:40:24.412019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.412021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.412023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:31Z\"\n"} +{"Time":"2023-05-31T12:40:24.412025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: coredns\n"} +{"Time":"2023-05-31T12:40:24.412027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.412029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"359\"\n"} +{"Time":"2023-05-31T12:40:24.412032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: ca0e48bf-189f-41a1-8bff-90c004af7f64\n"} +{"Time":"2023-05-31T12:40:24.412034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.412051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.412058-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T12:40:24.412061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.412064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:24.412066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:24.412068-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:24.412071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:24.412073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:24.412076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:24.412078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:24.412082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:24.412085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:24.412087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:24.412089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:24.412091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:24.412094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:24.412096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:24.412098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:24.412101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:24.412104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:24.412106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.412109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T12:40:24.412138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T12:40:24.412141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.412143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T12:40:24.412146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM5MjNaFw0zMzA1MjgxOTM5MjNaMBkxFzAV\n"} +{"Time":"2023-05-31T12:40:24.412148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T12:40:24.41215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CgKCAQEAxOesNj3hjiNBRkR0iEzrUGKs/7nTf/xywh9EQgKBQjLOrJ63YHshhLHe\n"} +{"Time":"2023-05-31T12:40:24.412153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" UnZzNk4kS3XE76AZ/UXiR5D8XoUAYoEMCCG/cI9npzWGXTBe85RkJsfgmorIV07W\n"} +{"Time":"2023-05-31T12:40:24.412155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 7wLvXKqrf5ys43iThGgq7cqn2ZiQSAHsTNPM2XNl9+RoIILiVz342/XZp+qQ5Goy\n"} +{"Time":"2023-05-31T12:40:24.412157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" rhWNu8pFlWxGnjNgKMjPlCw3W8Uo+TXlBAiySXQv7PrdfNvW9NIHdX9Kl1GRA+u/\n"} +{"Time":"2023-05-31T12:40:24.41216-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" EQGlMCcUmogelZw3lKwfve0LyWauXIoX9uQodLCHksIZMezucXjaGV2BUfRmi28B\n"} +{"Time":"2023-05-31T12:40:24.412163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 6GOQX60yJQoW6RIJeM8VgDcMzeALqQIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T12:40:24.412165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUjVaKHerwE6MRDpsLZ/BhBKtU6QMw\n"} +{"Time":"2023-05-31T12:40:24.412169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBACPx\n"} +{"Time":"2023-05-31T12:40:24.412172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" hY6UEuD0WaZ5lg12cL3G2lEmB9e9gFXjYcMJFwuWGyO4v7y7hvZ/wyt7v7/wK95O\n"} +{"Time":"2023-05-31T12:40:24.412175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" h5mwrP+XzkvOtuYhLnYSlywOm/PqkgKyb7IIHy6fSyKSAiPk+4aKzw0tJ7pkro0L\n"} +{"Time":"2023-05-31T12:40:24.412178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" RsgRIQbvx0uAwRIzyekahnSSdEB97TzP4OmaqgyAgbWnyXhBJIyUZSmw9tX5Zdw2\n"} +{"Time":"2023-05-31T12:40:24.41218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" dqe71KF6L10qT1vb5Fjot8nj8+LwGay+fzmJK16zYPr3/K8yUPhDMIkyIZ6H6my4\n"} +{"Time":"2023-05-31T12:40:24.412184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fJ7olxuM4SYL6NHekKoR+PkhPoChiCMGrqfThMwrJJpcTmVdbUmCm4wOECud9GW7\n"} +{"Time":"2023-05-31T12:40:24.412186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" FmYiLAMRFh/4kFFvRs8=\n"} +{"Time":"2023-05-31T12:40:24.412188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.412228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T12:40:24.412233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T12:40:24.412236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T12:40:24.412238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.412241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.412243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:28Z\"\n"} +{"Time":"2023-05-31T12:40:24.412245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T12:40:24.412247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.41225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"30\"\n"} +{"Time":"2023-05-31T12:40:24.412252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: e07f435b-2630-4652-ab29-1db5f2f3d4c6\n"} +{"Time":"2023-05-31T12:40:24.412254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.412257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.412259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T12:40:24.412261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.412264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.412267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:28Z\"\n"} +{"Time":"2023-05-31T12:40:24.412269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T12:40:24.412271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.412273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"41\"\n"} +{"Time":"2023-05-31T12:40:24.412275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: 0f71ab9e-63d1-45d0-a6d9-67726307c10a\n"} +{"Time":"2023-05-31T12:40:24.412278-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.41228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.412282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T12:40:24.412285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:40:24.412287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T12:40:24.412289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T12:40:24.412327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clientConnection:\n"} +{"Time":"2023-05-31T12:40:24.412333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" burst: 0\n"} +{"Time":"2023-05-31T12:40:24.412338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412341-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T12:40:24.412343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" qps: 0\n"} +{"Time":"2023-05-31T12:40:24.412345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:40:24.412348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.41235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" conntrack:\n"} +{"Time":"2023-05-31T12:40:24.412352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T12:40:24.412355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" min: null\n"} +{"Time":"2023-05-31T12:40:24.412357-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:24.41236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:24.412362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" detectLocal:\n"} +{"Time":"2023-05-31T12:40:24.412364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412369-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T12:40:24.412377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T12:40:24.41238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412382-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" iptables:\n"} +{"Time":"2023-05-31T12:40:24.412386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T12:40:24.412389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T12:40:24.412392-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T12:40:24.412396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.412399-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.412479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ipvs:\n"} +{"Time":"2023-05-31T12:40:24.412484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T12:40:24.412487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.412489-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" strictARP: false\n"} +{"Time":"2023-05-31T12:40:24.412494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.412497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:24.4125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:24.412504-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:24.412507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:40:24.412511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:40:24.412514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T12:40:24.412528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T12:40:24.412553-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T12:40:24.41257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" winkernel:\n"} +{"Time":"2023-05-31T12:40:24.412573-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T12:40:24.412575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T12:40:24.412578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412646-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T12:40:24.412663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T12:40:24.412666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.412668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:40:24.412671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusters:\n"} +{"Time":"2023-05-31T12:40:24.412673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - cluster:\n"} +{"Time":"2023-05-31T12:40:24.412675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T12:40:24.412678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:40:24.41268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: default\n"} +{"Time":"2023-05-31T12:40:24.412682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" contexts:\n"} +{"Time":"2023-05-31T12:40:24.412685-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - context:\n"} +{"Time":"2023-05-31T12:40:24.412687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cluster: default\n"} +{"Time":"2023-05-31T12:40:24.412689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: default\n"} +{"Time":"2023-05-31T12:40:24.412691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user: default\n"} +{"Time":"2023-05-31T12:40:24.412694-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: default\n"} +{"Time":"2023-05-31T12:40:24.412696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" current-context: default\n"} +{"Time":"2023-05-31T12:40:24.412698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" users:\n"} +{"Time":"2023-05-31T12:40:24.4127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - name: default\n"} +{"Time":"2023-05-31T12:40:24.412702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user:\n"} +{"Time":"2023-05-31T12:40:24.412705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T12:40:24.412708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.41271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.412712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:31Z\"\n"} +{"Time":"2023-05-31T12:40:24.412714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" labels:\n"} +{"Time":"2023-05-31T12:40:24.412717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.412719-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T12:40:24.412957-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.412961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"236\"\n"} +{"Time":"2023-05-31T12:40:24.412963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: 1c1f8073-e146-4f72-840a-0185e2fdd976\n"} +{"Time":"2023-05-31T12:40:24.412966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.412968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.41297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T12:40:24.412972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.412975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T12:40:24.412992-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQxNFoXDTMzMDUyODE4NDQxNFowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T12:40:24.412994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL+W\n"} +{"Time":"2023-05-31T12:40:24.412997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" +gxYm2sJB2Oui+mLicqJQMpl3P17CReojN1AcAvx++fwKWcM6nwN6Jff507CNGjg\n"} +{"Time":"2023-05-31T12:40:24.412999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" NmBw8uP/lSVAHf9tnm7x4++noWA/Albw/2BQLxNoALLBubqk6h+qocBoiJCIdjR/\n"} +{"Time":"2023-05-31T12:40:24.413022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" U8thNhW3LRpIftqyVKJA4Isfk8vo8U3uqJON2wQeKTJ1H/nrr244KsaPX0YovzUO\n"} +{"Time":"2023-05-31T12:40:24.413024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" r0+NOyxVu1I/i7rGMhuM75yMZ1xOVZZ26vOhUNKOv9Y4pTcG3/OCm+94h58vxnM7\n"} +{"Time":"2023-05-31T12:40:24.413026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CbDdJ32tD/f+Z5kKugWFtEdm8H6BrjrLjpYjGI79Bc2ZETTqBkBiJWv/4+XrnU/Q\n"} +{"Time":"2023-05-31T12:40:24.413029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pO3m2ryrhA1LNHTr0G8CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T12:40:24.413031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T12:40:24.413033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" BBTaYo8vdjtMKYjRJWizGDd7wFxgozANBgkqhkiG9w0BAQsFAAOCAQEAKZOKuFr/\n"} +{"Time":"2023-05-31T12:40:24.413036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" M+lMSQM9etq+QR4mcOxMKFqKjq7oxXn+xlnOCE3w4gdo/V5VgRgtYy4xhbh15V9o\n"} +{"Time":"2023-05-31T12:40:24.413038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" VrWPsCEvZJSKBVsUKT87iXIE1vnMwLm61gVX2KZQxEmazwoswOl89EBjvP36CMp0\n"} +{"Time":"2023-05-31T12:40:24.413041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" DGUgDakt+83srVgJQ+EnfnfkdG8qw6FNvO+8XERcXVR32Waua8UULTmKzs3gTv1o\n"} +{"Time":"2023-05-31T12:40:24.413043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 7yBq5pslwkvCz5FpWHvewu4TzbVQlQ/JvbpCS88OpbUZUKB1DLUoF7ke4T7Mofwr\n"} +{"Time":"2023-05-31T12:40:24.413264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" taa/GFwVEm2faqBXSUnpOG8keowqNpEYepz5bxkGCg7Gt9hFcj9bGoxvYcQGdxMi\n"} +{"Time":"2023-05-31T12:40:24.413276-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 1SEMsxrCsqcUEw==\n"} +{"Time":"2023-05-31T12:40:24.41328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T12:40:24.413283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.413285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.413287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" annotations:\n"} +{"Time":"2023-05-31T12:40:24.413289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T12:40:24.413294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T12:40:24.413297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T12:40:24.413299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T12:40:24.413303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:44Z\"\n"} +{"Time":"2023-05-31T12:40:24.413305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T12:40:24.413307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.413309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"312\"\n"} +{"Time":"2023-05-31T12:40:24.413312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: 91a1643c-e51b-4987-b7d1-06dfa3e7c42b\n"} +{"Time":"2023-05-31T12:40:24.413314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.413316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.413319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T12:40:24.413321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiServer:\n"} +{"Time":"2023-05-31T12:40:24.413323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" certSANs:\n"} +{"Time":"2023-05-31T12:40:24.413326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T12:40:24.413328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - localhost\n"} +{"Time":"2023-05-31T12:40:24.413332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - 192.168.85.2\n"} +{"Time":"2023-05-31T12:40:24.413334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:40:24.413336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T12:40:24.413338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T12:40:24.413477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T12:40:24.413483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:40:24.413486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:40:24.413488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T12:40:24.41349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:40:24.413492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" controllerManager:\n"} +{"Time":"2023-05-31T12:40:24.413494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:40:24.413497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:40:24.413499-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:40:24.413501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" dns: {}\n"} +{"Time":"2023-05-31T12:40:24.413503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" etcd:\n"} +{"Time":"2023-05-31T12:40:24.413505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" local:\n"} +{"Time":"2023-05-31T12:40:24.413507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:40:24.41351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:40:24.413512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:40:24.413514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T12:40:24.413517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:40:24.413519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:40:24.413521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" networking:\n"} +{"Time":"2023-05-31T12:40:24.413523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:40:24.413526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:40:24.413528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:40:24.41353-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" scheduler:\n"} +{"Time":"2023-05-31T12:40:24.413533-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T12:40:24.413534-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:40:24.413685-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.413687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.413689-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:30Z\"\n"} +{"Time":"2023-05-31T12:40:24.413691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T12:40:24.413693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.413695-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"198\"\n"} +{"Time":"2023-05-31T12:40:24.413698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: 2b971ca4-e673-493a-83a2-8435f42a5eec\n"} +{"Time":"2023-05-31T12:40:24.4137-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T12:40:24.413702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" data:\n"} +{"Time":"2023-05-31T12:40:24.413704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kubelet: |\n"} +{"Time":"2023-05-31T12:40:24.413706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:40:24.413708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" authentication:\n"} +{"Time":"2023-05-31T12:40:24.413711-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" anonymous:\n"} +{"Time":"2023-05-31T12:40:24.413713-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enabled: false\n"} +{"Time":"2023-05-31T12:40:24.413715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" webhook:\n"} +{"Time":"2023-05-31T12:40:24.413717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T12:40:24.41372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enabled: true\n"} +{"Time":"2023-05-31T12:40:24.413722-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" x509:\n"} +{"Time":"2023-05-31T12:40:24.413724-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:40:24.413726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" authorization:\n"} +{"Time":"2023-05-31T12:40:24.413728-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T12:40:24.413731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" webhook:\n"} +{"Time":"2023-05-31T12:40:24.413733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:40:24.413735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T12:40:24.413737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:40:24.413739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T12:40:24.413897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T12:40:24.413901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T12:40:24.413904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T12:40:24.413908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.413912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" evictionHard:\n"} +{"Time":"2023-05-31T12:40:24.413915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T12:40:24.413919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T12:40:24.413922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T12:40:24.413925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.413933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T12:40:24.413936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:24.413938-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:40:24.41394-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T12:40:24.413942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T12:40:24.413944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:24.413946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:40:24.41395-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T12:40:24.413953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:40:24.413956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" logging:\n"} +{"Time":"2023-05-31T12:40:24.413958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T12:40:24.41396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" options:\n"} +{"Time":"2023-05-31T12:40:24.413963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" json:\n"} +{"Time":"2023-05-31T12:40:24.413965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T12:40:24.413967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T12:40:24.41397-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T12:40:24.413972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:24.41409-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:24.414094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T12:40:24.414096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T12:40:24.414098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.414101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T12:40:24.414103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:40:24.414105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T12:40:24.414107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T12:40:24.414109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T12:40:24.414112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T12:40:24.414114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.414116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" creationTimestamp: \"2023-05-31T19:39:30Z\"\n"} +{"Time":"2023-05-31T12:40:24.414118-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T12:40:24.41412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T12:40:24.414123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"201\"\n"} +{"Time":"2023-05-31T12:40:24.414126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid: d57ff408-519c-4e68-8902-b92180a75b40\n"} +{"Time":"2023-05-31T12:40:24.414128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: List\n"} +{"Time":"2023-05-31T12:40:24.41413-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" metadata:\n"} +{"Time":"2023-05-31T12:40:24.414132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T12:40:24.414134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.414136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.414145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:40:24.414156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;32m●\u001b[0m docker.service - Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:24.41416-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Loaded: loaded (\u001b]8;;file://kubenet-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:24.414345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:20 UTC; 56s ago\r\n"} +{"Time":"2023-05-31T12:40:24.414352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m docker.socket\r\n"} +{"Time":"2023-05-31T12:40:24.414355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Docs: \u001b]8;;https://docs.docker.com\u0007https://docs.docker.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:24.414357-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Main PID: 1034 (dockerd)\r\n"} +{"Time":"2023-05-31T12:40:24.41436-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Tasks: 16\r\n"} +{"Time":"2023-05-31T12:40:24.414362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Memory: 178.3M\r\n"} +{"Time":"2023-05-31T12:40:24.414364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CPU: 7.534s\r\n"} +{"Time":"2023-05-31T12:40:24.414366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CGroup: /system.slice/docker.service\r\n"} +{"Time":"2023-05-31T12:40:24.414369-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" └─1034 /usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:40:24.414373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414375-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:20 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:20.764685313Z\" level=info msg=\"Loading containers: start.\"\r\n"} +{"Time":"2023-05-31T12:40:24.414377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:20 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:20.854042581Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\r\n"} +{"Time":"2023-05-31T12:40:24.41438-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:20 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:20.892327551Z\" level=info msg=\"Loading containers: done.\"\r\n"} +{"Time":"2023-05-31T12:40:24.414383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:20 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:20.900929560Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\r\n"} +{"Time":"2023-05-31T12:40:24.414385-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:20 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:20.900994706Z\" level=info msg=\"Daemon has completed initialization\"\r\n"} +{"Time":"2023-05-31T12:40:24.414388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:20 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:20.928904936Z\" level=info msg=\"API listen on /var/run/docker.sock\"\r\n"} +{"Time":"2023-05-31T12:40:24.41439-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:20 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:20.929010890Z\" level=info msg=\"API listen on [::]:2376\"\r\n"} +{"Time":"2023-05-31T12:40:24.414393-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:20 kubenet-996000 systemd[1]: Started Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T12:40:24.414511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:52.240064772Z\" level=info msg=\"ignoring event\" container=f45e4f7916877af1f5b2674ae91571fcd65d9dd4229c16e8d035af40a1d14c1e module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:40:24.414517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 dockerd[1034]: time=\"2023-05-31T19:39:52.330596498Z\" level=info msg=\"ignoring event\" container=7374b4ade9986f56942a164ac629550cf147ad5df991db085d1086693dfc0c43 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\r\n"} +{"Time":"2023-05-31T12:40:24.414521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.414526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.414528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:40:24.41453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;34m# \u001b]8;;file://kubenet-996000/lib/systemd/system/docker.service\u0007/lib/systemd/system/docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.414534-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:24.414537-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Description=Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:24.414541-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Documentation=https://docs.docker.com\r\n"} +{"Time":"2023-05-31T12:40:24.414545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" BindsTo=containerd.service\r\n"} +{"Time":"2023-05-31T12:40:24.414548-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" After=network-online.target firewalld.service containerd.service\r\n"} +{"Time":"2023-05-31T12:40:24.414551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:24.414554-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Requires=docker.socket\r\n"} +{"Time":"2023-05-31T12:40:24.414557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:40:24.41456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StartLimitIntervalSec=60\r\n"} +{"Time":"2023-05-31T12:40:24.414563-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.414569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:24.414667-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart=on-failure\r\n"} +{"Time":"2023-05-31T12:40:24.414673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414676-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414679-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This file is a systemd drop-in unit that inherits from the base dockerd configuration.\r\n"} +{"Time":"2023-05-31T12:40:24.414685-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The base configuration already specifies an 'ExecStart=...' command. The first directive\r\n"} +{"Time":"2023-05-31T12:40:24.414688-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # here is to clear out that command inherited from the base configuration. Without this,\r\n"} +{"Time":"2023-05-31T12:40:24.41469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the command from the base configuration and the command specified here are treated as\r\n"} +{"Time":"2023-05-31T12:40:24.414692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\r\n"} +{"Time":"2023-05-31T12:40:24.414695-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # will catch this invalid input and refuse to start the service with an error like:\r\n"} +{"Time":"2023-05-31T12:40:24.414697-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\r\n"} +{"Time":"2023-05-31T12:40:24.4147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414702-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\r\n"} +{"Time":"2023-05-31T12:40:24.414704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # container runtimes. If left unlimited, it may result in OOM issues with MySQL.\r\n"} +{"Time":"2023-05-31T12:40:24.414706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:40:24.414708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \r\n"} +{"Time":"2023-05-31T12:40:24.414712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:40:24.414714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414716-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:24.41472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:24.414722-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.414844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.414847-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.414849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414851-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Uncomment TasksMax if your systemd version supports it.\r\n"} +{"Time":"2023-05-31T12:40:24.414854-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:40:24.414856-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.414858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:40:24.41486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414863-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # set delegate yes so that systemd does not reset the cgroups of docker containers\r\n"} +{"Time":"2023-05-31T12:40:24.414865-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:24.414867-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # kill only the docker process, not all processes in the cgroup\r\n"} +{"Time":"2023-05-31T12:40:24.414871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:24.414873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.414875-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:24.414877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:24.414879-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.414881-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.414884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:40:24.414886-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" {\r\n"} +{"Time":"2023-05-31T12:40:24.414889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"exec-opts\": [\"native.cgroupdriver=cgroupfs\"],\r\n"} +{"Time":"2023-05-31T12:40:24.414891-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T12:40:24.414893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T12:40:24.414895-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \t\"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T12:40:24.414898-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" },\r\n"} +{"Time":"2023-05-31T12:40:24.4149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T12:40:24.414902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" }\r\n"} +{"Time":"2023-05-31T12:40:24.415063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.415067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.415069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:40:24.415071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Client: Docker Engine - Community\r\n"} +{"Time":"2023-05-31T12:40:24.415073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:40:24.415075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Context: default\r\n"} +{"Time":"2023-05-31T12:40:24.415077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:40:24.41508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:40:24.415082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" buildx: Docker Buildx (Docker Inc.)\r\n"} +{"Time":"2023-05-31T12:40:24.415084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Version: v0.10.4\r\n"} +{"Time":"2023-05-31T12:40:24.415087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Path: /usr/libexec/docker/cli-plugins/docker-buildx\r\n"} +{"Time":"2023-05-31T12:40:24.415089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.415091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Server:\r\n"} +{"Time":"2023-05-31T12:40:24.415093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Containers: 17\r\n"} +{"Time":"2023-05-31T12:40:24.415095-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Running: 16\r\n"} +{"Time":"2023-05-31T12:40:24.415097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Paused: 0\r\n"} +{"Time":"2023-05-31T12:40:24.4151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Stopped: 1\r\n"} +{"Time":"2023-05-31T12:40:24.415102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Images: 9\r\n"} +{"Time":"2023-05-31T12:40:24.415104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Server Version: 24.0.1\r\n"} +{"Time":"2023-05-31T12:40:24.415106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Storage Driver: overlay2\r\n"} +{"Time":"2023-05-31T12:40:24.415108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Backing Filesystem: extfs\r\n"} +{"Time":"2023-05-31T12:40:24.41511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Supports d_type: true\r\n"} +{"Time":"2023-05-31T12:40:24.415114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Using metacopy: false\r\n"} +{"Time":"2023-05-31T12:40:24.415116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Native Overlay Diff: true\r\n"} +{"Time":"2023-05-31T12:40:24.415118-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" userxattr: false\r\n"} +{"Time":"2023-05-31T12:40:24.41512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Logging Driver: json-file\r\n"} +{"Time":"2023-05-31T12:40:24.415122-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Cgroup Driver: cgroupfs\r\n"} +{"Time":"2023-05-31T12:40:24.415124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Cgroup Version: 2\r\n"} +{"Time":"2023-05-31T12:40:24.415281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Plugins:\r\n"} +{"Time":"2023-05-31T12:40:24.415287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Volume: local\r\n"} +{"Time":"2023-05-31T12:40:24.41529-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Network: bridge host ipvlan macvlan null overlay\r\n"} +{"Time":"2023-05-31T12:40:24.415293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog\r\n"} +{"Time":"2023-05-31T12:40:24.415296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Swarm: inactive\r\n"} +{"Time":"2023-05-31T12:40:24.415298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Runtimes: io.containerd.runc.v2 runc\r\n"} +{"Time":"2023-05-31T12:40:24.4153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Default Runtime: runc\r\n"} +{"Time":"2023-05-31T12:40:24.415302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Init Binary: docker-init\r\n"} +{"Time":"2023-05-31T12:40:24.415304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" containerd version: 3dce8eb055cbb6872793272b4f20ed16117344f8\r\n"} +{"Time":"2023-05-31T12:40:24.415306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runc version: v1.1.7-0-g860f061\r\n"} +{"Time":"2023-05-31T12:40:24.415308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" init version: de40ad0\r\n"} +{"Time":"2023-05-31T12:40:24.415311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Security Options:\r\n"} +{"Time":"2023-05-31T12:40:24.415313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" seccomp\r\n"} +{"Time":"2023-05-31T12:40:24.415315-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Profile: builtin\r\n"} +{"Time":"2023-05-31T12:40:24.415317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cgroupns\r\n"} +{"Time":"2023-05-31T12:40:24.41532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Kernel Version: 5.15.49-linuxkit-pr\r\n"} +{"Time":"2023-05-31T12:40:24.415322-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Operating System: Ubuntu 22.04.2 LTS\r\n"} +{"Time":"2023-05-31T12:40:24.415324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" OSType: linux\r\n"} +{"Time":"2023-05-31T12:40:24.415326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Architecture: x86_64\r\n"} +{"Time":"2023-05-31T12:40:24.415328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CPUs: 6\r\n"} +{"Time":"2023-05-31T12:40:24.415331-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Total Memory: 5.804GiB\r\n"} +{"Time":"2023-05-31T12:40:24.415333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Name: kubenet-996000\r\n"} +{"Time":"2023-05-31T12:40:24.415335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ID: 433de1bf-aad2-4771-93aa-199d84778bc9\r\n"} +{"Time":"2023-05-31T12:40:24.415338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Docker Root Dir: /var/lib/docker\r\n"} +{"Time":"2023-05-31T12:40:24.415341-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T12:40:24.415463-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" No Proxy: control-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T12:40:24.415466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Labels:\r\n"} +{"Time":"2023-05-31T12:40:24.415468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" provider=docker\r\n"} +{"Time":"2023-05-31T12:40:24.415471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Experimental: false\r\n"} +{"Time":"2023-05-31T12:40:24.415473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Insecure Registries:\r\n"} +{"Time":"2023-05-31T12:40:24.415475-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 10.96.0.0/12\r\n"} +{"Time":"2023-05-31T12:40:24.415477-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" 127.0.0.0/8\r\n"} +{"Time":"2023-05-31T12:40:24.415479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Live Restore Enabled: false\r\n"} +{"Time":"2023-05-31T12:40:24.415482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.415485-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.415487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.41549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:40:24.415492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;32m●\u001b[0m cri-docker.service - CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:24.415495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Loaded: loaded (\u001b]8;;file://kubenet-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:24.415498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Drop-In: /etc/systemd/system/cri-docker.service.d\r\n"} +{"Time":"2023-05-31T12:40:24.415501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" └─\u001b]8;;file://kubenet-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u000710-cni.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:24.415503-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:21 UTC; 57s ago\r\n"} +{"Time":"2023-05-31T12:40:24.415506-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TriggeredBy: \u001b[0;1;32m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:40:24.415508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Docs: \u001b]8;;https://docs.mirantis.com\u0007https://docs.mirantis.com\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:24.41551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Main PID: 1255 (cri-dockerd)\r\n"} +{"Time":"2023-05-31T12:40:24.415513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Tasks: 12\r\n"} +{"Time":"2023-05-31T12:40:24.415515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Memory: 17.6M\r\n"} +{"Time":"2023-05-31T12:40:24.415518-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CPU: 1.335s\r\n"} +{"Time":"2023-05-31T12:40:24.415644-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CGroup: /system.slice/cri-docker.service\r\n"} +{"Time":"2023-05-31T12:40:24.415651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" └─1255 /usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=kubenet --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:40:24.415654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.415657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:31Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/16,},}\"\r\n"} +{"Time":"2023-05-31T12:40:24.41566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:31 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:31Z\" level=info msg=\"Ignoring subsequent pod CIDR update to new cidr 10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T12:40:24.415663-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:45 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:45Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/874527961e25c295a85ce4d825bb2fa65d21c9ef72ba6ed110130f2ccbd8bf0e/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:24.415666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:45 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:45Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/9cd716ee811fa291e507cc8242a4092c1471a5fffc7da9831f633d930cbfdc22/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:24.415669-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:45 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:45Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/7374b4ade9986f56942a164ac629550cf147ad5df991db085d1086693dfc0c43/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:24.415674-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:47 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:47Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/a26b851f72e915719c46d91d618997fcbade8c434dfaa004c34879520f9d7ede/resolv.conf as [nameserver 192.168.65.254 options ndots:0]\"\r\n"} +{"Time":"2023-05-31T12:40:24.415676-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:50 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:50Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/2cac467e373fefb9bdd7984211137ee6dc3c9fe795ff1a56fb08b26b75babd02/resolv.conf as [nameserver 10.96.0.10 search default.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\r\n"} +{"Time":"2023-05-31T12:40:24.41568-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:52Z\" level=info msg=\"Docker cri received runtime config \u0026RuntimeConfig{NetworkConfig:\u0026NetworkConfig{PodCidr:10.244.0.0/24,},}\"\r\n"} +{"Time":"2023-05-31T12:40:24.415682-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:52Z\" level=info msg=\"Ignoring subsequent pod CIDR update to new cidr 10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T12:40:24.415685-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:56 kubenet-996000 cri-dockerd[1255]: time=\"2023-05-31T19:39:56Z\" level=info msg=\"Stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: Status: Downloaded newer image for registry.k8s.io/e2e-test-images/agnhost:2.40\"\r\n"} +{"Time":"2023-05-31T12:40:24.415856-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.415862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.415864-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:40:24.415867-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;34m# \u001b]8;;file://kubenet-996000/lib/systemd/system/cri-docker.service\u0007/lib/systemd/system/cri-docker.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.41587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:24.415873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:24.415875-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:40:24.415877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:40:24.415879-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:24.415882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:40:24.415884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.415886-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.415888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:24.41589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:40:24.415892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:40:24.415894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:40:24.415896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:40:24.415898-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:24.4159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.415903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:40:24.415905-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:40:24.415908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:40:24.41591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:40:24.416076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.41608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:40:24.416082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:40:24.416084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:40:24.416087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:40:24.416089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:24.416094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:24.416096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.416098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.4161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.416103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:40:24.416122-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:40:24.416124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.416128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:24.416131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:24.416132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:24.416137-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:24.416139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;34m# \u001b]8;;file://kubenet-996000/etc/systemd/system/cri-docker.service.d/10-cni.conf\u0007/etc/systemd/system/cri-docker.service.d/10-cni.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.416144-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.416146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:40:24.416149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=kubenet --hairpin-mode=hairpin-veth\r\n"} +{"Time":"2023-05-31T12:40:24.416308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.416313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.416315-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:40:24.416318-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.41632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T12:40:24.416323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd:// --pod-infra-container-image=registry.k8s.io/pause:3.9 --network-plugin=kubenet --hairpin-mode=hairpin-veth\n"} +{"Time":"2023-05-31T12:40:24.416326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.416328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:40:24.416331-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:24.416333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T12:40:24.416336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T12:40:24.416338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T12:40:24.416341-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:24.416343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T12:40:24.416345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.416349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:24.416351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T12:40:24.416354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:40:24.416356-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T12:40:24.416358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T12:40:24.416361-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:24.416363-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416365-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T12:40:24.416519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T12:40:24.416525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:40:24.416527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T12:40:24.41653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T12:40:24.416535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T12:40:24.416537-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T12:40:24.416539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T12:40:24.416541-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416543-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:24.416546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:24.416548-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.41655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.416552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.416555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T12:40:24.416561-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T12:40:24.416563-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.416565-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:24.416567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:24.416569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.416572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:24.416574-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:24.416577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.416706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.416713-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:40:24.416717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cri-dockerd 0.3.2 (HEAD)\r\n"} +{"Time":"2023-05-31T12:40:24.41672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.416724-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.416727-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:40:24.416729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T12:40:24.416734-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Loaded: loaded (\u001b]8;;file://kubenet-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:24.416737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:20 UTC; 1min 0s ago\r\n"} +{"Time":"2023-05-31T12:40:24.41674-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:24.416743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Main PID: 816 (containerd)\r\n"} +{"Time":"2023-05-31T12:40:24.416747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Tasks: 183\r\n"} +{"Time":"2023-05-31T12:40:24.416751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Memory: 68.3M\r\n"} +{"Time":"2023-05-31T12:40:24.416755-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CPU: 2.573s\r\n"} +{"Time":"2023-05-31T12:40:24.416758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T12:40:24.416761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─ 816 /usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:40:24.416763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─1878 /usr/bin/containerd-shim-runc-v2 -namespace moby -id cc5f5da169dc9526746629dfbcf0405f751dc5b2409eb40b2c009371668eff51 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─1901 /usr/bin/containerd-shim-runc-v2 -namespace moby -id e4574351d2cb5542615bbac1879b1b59d18ef9b4a91861389a9b5c75afd05d19 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.41677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─1929 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 8df17fadd339769585c2c61dafb76ba38bd8a2fe1a9530b89c7200f41276a0b6 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416774-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─1937 /usr/bin/containerd-shim-runc-v2 -namespace moby -id b4682fd5e6bb6429af006fb95e90e5b426b9a75f7f778b265b69add9ff00d438 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─2069 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 598326455f1307ac7036a30768c9c157acbcb9a183ef2f98d842bc3ae1fa811d -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416918-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─2086 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 9712e26af451d560bdae8924388230f87c2c375497fa3f20026deb0f060512de -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─2122 /usr/bin/containerd-shim-runc-v2 -namespace moby -id df0c77fe8376d7b5ede33c398062ad45b4ed35c136394756e1f32be013e0ef83 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─2145 /usr/bin/containerd-shim-runc-v2 -namespace moby -id f8b724a796315f0d83afd63577d45597f062d4c5ab68bc39573b3a292ebe6204 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.41693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─2830 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 874527961e25c295a85ce4d825bb2fa65d21c9ef72ba6ed110130f2ccbd8bf0e -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─2887 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 9cd716ee811fa291e507cc8242a4092c1471a5fffc7da9831f633d930cbfdc22 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─2974 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 9359eb20d971bbc7cfa3c148c71006feeee0425bf48f5636a8648962a5d11f90 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─3119 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 7a1550107913f580fe5d77d0927bf85283f29617363847388f42d60802b8778b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416943-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─3315 /usr/bin/containerd-shim-runc-v2 -namespace moby -id a26b851f72e915719c46d91d618997fcbade8c434dfaa004c34879520f9d7ede -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416947-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─3354 /usr/bin/containerd-shim-runc-v2 -namespace moby -id d1293d9566732ba6e4dd73ab76de9bd212b526a4d9cd0f40e713a7f43dcbd13d -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.41695-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ├─3429 /usr/bin/containerd-shim-runc-v2 -namespace moby -id 2cac467e373fefb9bdd7984211137ee6dc3c9fe795ff1a56fb08b26b75babd02 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" └─3670 /usr/bin/containerd-shim-runc-v2 -namespace moby -id b5e4facc8e8a966ec21da4f9150bb0015c63272334ceb8071214c649b948bb56 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T12:40:24.416958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.41696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:52.240299297Z\" level=info msg=\"cleaning up dead shim\"\r\n"} +{"Time":"2023-05-31T12:40:24.417122-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:52.250510438Z\" level=warning msg=\"cleanup warnings time=\\\"2023-05-31T19:39:52Z\\\" level=info msg=\\\"starting signal loop\\\" namespace=moby pid=3503 runtime=io.containerd.runc.v2\\n\"\r\n"} +{"Time":"2023-05-31T12:40:24.417129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:52.330520391Z\" level=info msg=\"shim disconnected\" id=7374b4ade9986f56942a164ac629550cf147ad5df991db085d1086693dfc0c43\r\n"} +{"Time":"2023-05-31T12:40:24.417132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:52.330629233Z\" level=warning msg=\"cleaning up after shim disconnected\" id=7374b4ade9986f56942a164ac629550cf147ad5df991db085d1086693dfc0c43 namespace=moby\r\n"} +{"Time":"2023-05-31T12:40:24.417135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:52.330639209Z\" level=info msg=\"cleaning up dead shim\"\r\n"} +{"Time":"2023-05-31T12:40:24.417138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:52 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:52.340547826Z\" level=warning msg=\"cleanup warnings time=\\\"2023-05-31T19:39:52Z\\\" level=info msg=\\\"starting signal loop\\\" namespace=moby pid=3548 runtime=io.containerd.runc.v2\\n\"\r\n"} +{"Time":"2023-05-31T12:40:24.41714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:56 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:56.784074672Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\r\n"} +{"Time":"2023-05-31T12:40:24.417143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:56 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:56.784154953Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\r\n"} +{"Time":"2023-05-31T12:40:24.417146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:56 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:56.784164562Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\r\n"} +{"Time":"2023-05-31T12:40:24.417149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" May 31 19:39:56 kubenet-996000 containerd[816]: time=\"2023-05-31T19:39:56.784456045Z\" level=info msg=\"starting signal loop\" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/b5e4facc8e8a966ec21da4f9150bb0015c63272334ceb8071214c649b948bb56 pid=3670 runtime=io.containerd.runc.v2\r\n"} +{"Time":"2023-05-31T12:40:24.417151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.417153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.417156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:40:24.417159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;34m# \u001b]8;;file://kubenet-996000/lib/systemd/system/containerd.service\u0007/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.417338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:40:24.417343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.417345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:40:24.417348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:40:24.41735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:40:24.417352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.417354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:40:24.417356-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.417359-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:40:24.417361-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:40:24.417363-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:40:24.417365-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:40:24.417367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:40:24.41737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.417372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:24.417374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:40:24.417376-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:40:24.417379-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:40:24.417381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.417383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.417385-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:40:24.417387-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:40:24.417389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.417392-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:24.417394-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:24.417553-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:24.41757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:24.417576-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:40:24.417579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:24.417583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:24.417587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.41759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.417593-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.417597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:40:24.4176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:40:24.417604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.417608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:40:24.417611-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.417614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:24.417616-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:24.41762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.417624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.417627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:40:24.417632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Copyright The containerd Authors.\r\n"} +{"Time":"2023-05-31T12:40:24.417639-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.417644-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Licensed under the Apache License, Version 2.0 (the \"License\");\r\n"} +{"Time":"2023-05-31T12:40:24.417647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # you may not use this file except in compliance with the License.\r\n"} +{"Time":"2023-05-31T12:40:24.417651-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # You may obtain a copy of the License at\r\n"} +{"Time":"2023-05-31T12:40:24.417654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.417657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # http://www.apache.org/licenses/LICENSE-2.0\r\n"} +{"Time":"2023-05-31T12:40:24.417749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.417758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Unless required by applicable law or agreed to in writing, software\r\n"} +{"Time":"2023-05-31T12:40:24.417763-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # distributed under the License is distributed on an \"AS IS\" BASIS,\r\n"} +{"Time":"2023-05-31T12:40:24.417767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r\n"} +{"Time":"2023-05-31T12:40:24.417771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # See the License for the specific language governing permissions and\r\n"} +{"Time":"2023-05-31T12:40:24.417775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # limitations under the License.\r\n"} +{"Time":"2023-05-31T12:40:24.417779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.417802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:24.417808-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T12:40:24.417812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T12:40:24.417815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" After=network.target local-fs.target\r\n"} +{"Time":"2023-05-31T12:40:24.417817-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.41782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.417822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStartPre=-/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T12:40:24.417825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/usr/bin/containerd\r\n"} +{"Time":"2023-05-31T12:40:24.417828-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.41783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:24.417832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T12:40:24.417834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T12:40:24.417836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T12:40:24.417838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" RestartSec=5\r\n"} +{"Time":"2023-05-31T12:40:24.417841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T12:40:24.417843-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T12:40:24.417845-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.417848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.41785-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.417908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Comment TasksMax if your systemd version does not supports it.\r\n"} +{"Time":"2023-05-31T12:40:24.417913-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Only systemd 226 and above support this version.\r\n"} +{"Time":"2023-05-31T12:40:24.417916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.417919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:40:24.417921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.417924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:24.417926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:24.417928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.417932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.417934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:40:24.417937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:40:24.417939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:24.417942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:24.417944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:40:24.417946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # imports\r\n"} +{"Time":"2023-05-31T12:40:24.417948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.41795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:40:24.417953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:40:24.417955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.417958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.41796-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:40:24.417962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:40:24.417964-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.417966-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:40:24.417969-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.417971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.417973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.4181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:40:24.418109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:40:24.418113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:40:24.418117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:40:24.418123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:40:24.418126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:40:24.418128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:40:24.41813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:40:24.418135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:40:24.418137-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:40:24.41814-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:40:24.418142-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:40:24.418144-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:40:24.418146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:40:24.418148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.41815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:40:24.418152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:40:24.418155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:40:24.418157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.418317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:40:24.418323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.41833-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:40:24.418333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:24.418336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:40:24.418338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:40:24.41834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:40:24.418343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:40:24.418347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:40:24.418349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:40:24.418351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:40:24.418356-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:40:24.418358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418361-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:40:24.418364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:40:24.418366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:40:24.418368-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:40:24.41837-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:40:24.418373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:40:24.418376-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:40:24.418551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:40:24.418555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.418557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.41856-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:40:24.418562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T12:40:24.418566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T12:40:24.418568-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T12:40:24.418571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T12:40:24.418583-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:24.418586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:24.418588-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" version = 2\r\n"} +{"Time":"2023-05-31T12:40:24.418593-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418595-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T12:40:24.418604-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.41861-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [debug]\r\n"} +{"Time":"2023-05-31T12:40:24.418612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418614-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.418619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.418625-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418628-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T12:40:24.418632-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T12:40:24.418634-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.418637-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:40:24.418639-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T12:40:24.418777-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418786-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.418788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.41879-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.418792-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T12:40:24.418798-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.4188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T12:40:24.418802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418804-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T12:40:24.418807-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418809-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T12:40:24.418811-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T12:40:24.418815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T12:40:24.418817-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T12:40:24.41882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T12:40:24.418822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T12:40:24.418824-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.418827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T12:40:24.418829-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:40:24.418832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T12:40:24.418834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T12:40:24.418836-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:40:24.418838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T12:40:24.418841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T12:40:24.418979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T12:40:24.418984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T12:40:24.418986-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T12:40:24.418988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T12:40:24.418991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T12:40:24.418993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T12:40:24.418995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T12:40:24.418997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T12:40:24.418999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T12:40:24.419001-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T12:40:24.419004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T12:40:24.419007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T12:40:24.419009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T12:40:24.419011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T12:40:24.419016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T12:40:24.419018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T12:40:24.41902-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T12:40:24.419027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T12:40:24.419029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T12:40:24.419031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T12:40:24.419133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T12:40:24.419152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.419155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T12:40:24.419158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T12:40:24.41916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T12:40:24.419162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T12:40:24.419164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T12:40:24.419168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T12:40:24.419175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:40:24.419185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:24.419189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:24.419193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:24.419199-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419203-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419206-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.41921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T12:40:24.41922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T12:40:24.419228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:24.419301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:40:24.419311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:24.419316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:24.41932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:24.419324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T12:40:24.419341-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T12:40:24.419349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T12:40:24.419354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T12:40:24.419362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419371-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T12:40:24.419374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:24.419379-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:24.419383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:24.419386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.41939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419658-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419665-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.41967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T12:40:24.419674-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T12:40:24.41968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T12:40:24.419683-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T12:40:24.419692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T12:40:24.419695-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419699-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T12:40:24.419703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T12:40:24.419712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T12:40:24.41972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419723-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T12:40:24.419729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T12:40:24.419735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.41974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.419743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T12:40:24.41975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T12:40:24.419753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.419988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T12:40:24.419997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T12:40:24.420008-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T12:40:24.420021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T12:40:24.420023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T12:40:24.420031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T12:40:24.420039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420044-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T12:40:24.420046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.420048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T12:40:24.420053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T12:40:24.420055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T12:40:24.42006-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T12:40:24.420064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420068-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T12:40:24.42027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T12:40:24.420273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T12:40:24.420281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420318-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420339-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T12:40:24.420344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420461-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T12:40:24.420469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T12:40:24.420491-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T12:40:24.420501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420522-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:40:24.420526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T12:40:24.42053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T12:40:24.42055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T12:40:24.420554-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T12:40:24.420559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T12:40:24.420578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420592-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T12:40:24.420597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T12:40:24.420601-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:40:24.420609-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T12:40:24.420613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T12:40:24.420617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T12:40:24.420621-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T12:40:24.420627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.420631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.420635-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T12:40:24.420638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.420641-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.420645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:40:24.420649-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ○ crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:40:24.420653-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Loaded: loaded (\u001b]8;;file://kubenet-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T12:40:24.420657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T12:40:24.420661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T12:40:24.420665-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T12:40:24.420668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.420671-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.420675-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:40:24.420678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[0;1;34m# \u001b]8;;file://kubenet-996000/lib/systemd/system/crio.service\u0007/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T12:40:24.420709-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T12:40:24.420715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T12:40:24.420721-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T12:40:24.420725-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:24.420729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Before=kubelet.service\r\n"} +{"Time":"2023-05-31T12:40:24.420733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" After=network-online.target\r\n"} +{"Time":"2023-05-31T12:40:24.420736-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T12:40:24.420744-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T12:40:24.420748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" EnvironmentFile=-/etc/default/crio\r\n"} +{"Time":"2023-05-31T12:40:24.420751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T12:40:24.420754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T12:40:24.420758-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" $CRIO_CONFIG_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:40:24.420761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" $CRIO_RUNTIME_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:40:24.420765-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" $CRIO_STORAGE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:40:24.420768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" $CRIO_NETWORK_OPTIONS \\\r\n"} +{"Time":"2023-05-31T12:40:24.420771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" $CRIO_METRICS_OPTIONS\r\n"} +{"Time":"2023-05-31T12:40:24.420776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T12:40:24.42078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.420783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T12:40:24.420788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T12:40:24.420791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T12:40:24.420794-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T12:40:24.420798-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T12:40:24.420802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T12:40:24.420805-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.420808-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T12:40:24.420995-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T12:40:24.421003-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Alias=cri-o.service\r\n"} +{"Time":"2023-05-31T12:40:24.421008-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.421011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.421017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:40:24.421022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/crio/crio.conf.d/01-crio-runc.conf\r\n"} +{"Time":"2023-05-31T12:40:24.421025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:24.421029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.421033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:24.421037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.42104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T12:40:24.421043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:40:24.421046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.42105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:40:24.421057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.421062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:40:24.421071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.421074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T12:40:24.421079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:40:24.421083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:40:24.421087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:40:24.421091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.421095-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:40:24.42143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421438-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:40:24.421442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:40:24.421446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:40:24.42145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:40:24.421454-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:40:24.421462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:40:24.421465-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:40:24.421471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:40:24.421474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:40:24.421478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:40:24.421486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:40:24.42149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # root = \"/home/abuild/.local/share/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:40:24.421493-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:40:24.421502-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runroot = \"/tmp/containers-user-399/containers\"\r\n"} +{"Time":"2023-05-31T12:40:24.421505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421511-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:40:24.421515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:40:24.421518-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # storage_driver = \"vfs\"\r\n"} +{"Time":"2023-05-31T12:40:24.421538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:40:24.421678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:40:24.421684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:40:24.421688-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.421691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421694-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:40:24.421696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:40:24.421698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:40:24.421701-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:40:24.421706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:40:24.421708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:40:24.42171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:40:24.421712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:40:24.421717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:40:24.421729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:40:24.421739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:40:24.421743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:40:24.421751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:40:24.421754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:40:24.421756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:40:24.421877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:40:24.421895-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:40:24.421903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:40:24.421906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:40:24.421911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:40:24.421913-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:40:24.421922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:40:24.421925-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:40:24.421932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:40:24.421936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:40:24.421943-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:40:24.421946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:40:24.42195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:40:24.421956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:40:24.421958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:40:24.421962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.421965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.421967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:40:24.422103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:40:24.422107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:40:24.422109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.422111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:40:24.422116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:40:24.422118-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.422121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:40:24.422128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:40:24.422132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:40:24.422135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.422138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:40:24.422143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:40:24.422145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:40:24.422153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:40:24.422156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:40:24.422162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:40:24.422165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:40:24.422169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:40:24.422331-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:40:24.422339-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:40:24.422343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:40:24.422345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:40:24.422348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.42235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:40:24.422354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:40:24.422356-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:40:24.422373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.422377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:40:24.422379-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:40:24.422386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:40:24.422388-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:40:24.42239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.422392-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:40:24.422398-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:40:24.4224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.422402-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422405-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:40:24.422407-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:40:24.42256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:40:24.422566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:40:24.422569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.422571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422574-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:40:24.422576-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:40:24.422579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:40:24.422581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:40:24.422585-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.422587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:40:24.422594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:40:24.422598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.4226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:40:24.422603-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:40:24.422608-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.422611-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.422615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422618-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:40:24.422622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:40:24.422627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:40:24.42263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:40:24.422633-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:40:24.422638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:40:24.422823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:40:24.422827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:40:24.42283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:40:24.422834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.422838-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:40:24.422841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422844-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:40:24.422849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:40:24.422877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.422882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:40:24.422889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:40:24.422892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:40:24.422895-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:40:24.422899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.422903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.422906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:40:24.422912-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:40:24.422916-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.422918-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:40:24.422921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.423016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:40:24.423022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:40:24.423025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:40:24.423028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:40:24.423031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:40:24.423035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:40:24.423038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:40:24.423042-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:40:24.423054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:40:24.423072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:40:24.423076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:40:24.42308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:40:24.423082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:40:24.423085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.423088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:40:24.423094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:40:24.423096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:40:24.423099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:40:24.423103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:40:24.423105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:40:24.423107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.42311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:40:24.423258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:40:24.423261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:40:24.423263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:40:24.423275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.423281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:40:24.423288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:40:24.423294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:40:24.423298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:40:24.423301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:40:24.423304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.423307-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:40:24.423311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:40:24.423314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:40:24.423316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:40:24.423319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.423321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:40:24.423325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:40:24.423328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:40:24.42333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:40:24.423332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:40:24.423455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:40:24.42346-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:40:24.423464-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:40:24.423466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.423469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423471-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:40:24.423473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:40:24.423476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:40:24.423478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.423481-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:40:24.423483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:40:24.423486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:40:24.423488-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.42349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:40:24.423492-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:40:24.423495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:40:24.423499-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:40:24.423502-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.423505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.423509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:40:24.423514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:40:24.423517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:40:24.423519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:40:24.423818-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:40:24.423821-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:40:24.423823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:40:24.423825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:40:24.423827-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423829-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:40:24.423832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:40:24.423835-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423837-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:40:24.423839-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:40:24.423841-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423843-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:40:24.423846-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:40:24.423849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423851-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:40:24.423853-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.423855-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423858-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:40:24.42386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:40:24.423862-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.423864-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:40:24.423867-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:40:24.424019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.424023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:40:24.424025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:40:24.42403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.424032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.424035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:40:24.424041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:40:24.424044-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:40:24.424048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.424052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:40:24.42406-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:40:24.424077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:40:24.424082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.424085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42411-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:40:24.424114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:40:24.424117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:40:24.424119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:40:24.424121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:40:24.424126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:40:24.424334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:40:24.424352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:40:24.424358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:40:24.424367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:40:24.424371-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:40:24.424375-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:40:24.42438-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:40:24.424387-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:40:24.42439-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:40:24.424393-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:40:24.424396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:40:24.424399-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424402-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:40:24.424406-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:40:24.424411-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:40:24.424414-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.424417-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42442-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:40:24.424423-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:40:24.424426-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:40:24.42443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424546-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:40:24.424552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.424554-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424556-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:40:24.424559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:40:24.424561-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:40:24.424563-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.424565-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:40:24.42457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:40:24.424572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:40:24.424575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:40:24.424577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:40:24.424579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:40:24.424581-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:40:24.424584-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.424586-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424589-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:40:24.424591-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:40:24.424594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:40:24.424596-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:40:24.424598-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.424744-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:40:24.424749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:40:24.424752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:24.424754-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:40:24.424757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:24.424761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:24.424764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:40:24.424768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:40:24.424771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:40:24.424775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:40:24.424779-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:40:24.424783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:40:24.424787-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:40:24.424792-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:40:24.424796-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:40:24.4248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:40:24.424803-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:40:24.424816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:40:24.424822-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:40:24.424826-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:40:24.42483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:40:24.424834-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:40:24.424939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:40:24.424945-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:40:24.42495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:40:24.424953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:40:24.424955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:40:24.424958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:40:24.424961-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:40:24.424963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:40:24.424965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:40:24.42497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:40:24.424972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424974-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424976-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:24.424978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.424981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:24.424983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.424985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.424987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.424989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:24.424992-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # allowed_annotations = [\r\n"} +{"Time":"2023-05-31T12:40:24.424994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"io.containers.trace-syscall\",\r\n"} +{"Time":"2023-05-31T12:40:24.424997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.424999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:24.425164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.42517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:24.425172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # monitor_env = [\r\n"} +{"Time":"2023-05-31T12:40:24.425175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T12:40:24.425177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.425179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:24.425181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # monitor_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T12:40:24.425184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.425186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:24.425188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:40:24.425194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:40:24.425196-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:40:24.425198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.4252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:40:24.425202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:40:24.425206-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:40:24.425208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:40:24.425213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:40:24.425215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:40:24.42522-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:40:24.425222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:40:24.425344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:40:24.425351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:40:24.425359-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:40:24.425363-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:40:24.425366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:40:24.42537-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:40:24.425381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:40:24.425387-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:40:24.42539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:40:24.425408-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:40:24.42541-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:40:24.425413-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:40:24.425415-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:40:24.425443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:40:24.425446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:40:24.425448-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:40:24.42545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:40:24.425452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:40:24.425455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:40:24.425457-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:40:24.425459-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:40:24.425687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:40:24.425706-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:40:24.425725-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:40:24.425731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:40:24.425735-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:24.425739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:40:24.425746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.42575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:40:24.425753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:40:24.425757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:40:24.425761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:40:24.425764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:40:24.425769-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:40:24.425773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425776-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:40:24.42578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:40:24.425783-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425787-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:40:24.42579-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:40:24.425794-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.425797-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:40:24.425881-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.425885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:40:24.425899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:40:24.425906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:40:24.425909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.425911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.425913-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:40:24.425919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:40:24.425923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:40:24.425928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.425932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:40:24.425934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.425936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:40:24.425939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:40:24.425948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:40:24.425959-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:40:24.425963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:40:24.425967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.42597-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:40:24.426121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:40:24.426126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:40:24.42613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:40:24.426133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.426136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:40:24.426146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:40:24.42615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:40:24.426165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:40:24.426173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.426176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:40:24.426182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:40:24.426185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:40:24.42619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:40:24.426197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:40:24.426201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.426204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426207-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:40:24.426211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:40:24.426214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:40:24.426337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:40:24.426354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:40:24.426358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.42636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:40:24.426364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:40:24.426366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426368-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:40:24.426371-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:40:24.426374-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:40:24.426379-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:40:24.426381-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:40:24.426383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:40:24.426386-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:40:24.426389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:40:24.426391-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:40:24.426393-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426395-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:40:24.426398-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:40:24.426401-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:40:24.426403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:40:24.426405-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:40:24.426407-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:40:24.42641-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:40:24.426605-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:40:24.426612-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:40:24.426615-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426617-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:40:24.426619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:40:24.426622-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:40:24.426627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426629-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426631-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426633-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426638-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.42664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426642-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.426645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.426647-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:40:24.42665-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:40:24.426652-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:40:24.426657-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.426659-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:40:24.426664-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:40:24.426666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:40:24.426832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:40:24.426848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.426853-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426857-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:40:24.42686-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:40:24.426864-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.426869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:40:24.426876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:40:24.42688-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426883-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:40:24.426885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:40:24.426888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426891-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:40:24.426893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:40:24.426897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:40:24.426908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:40:24.426911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:40:24.426919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:40:24.426922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.426924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:40:24.426926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:40:24.426928-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:40:24.427043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.427056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.427058-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:40:24.427061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:40:24.356071835Z] Starting CRI-O, version: 1.24.5, git: b007cb6753d97de6218787b6894b0e3cc1dc8ecd(clean) \r\n"} +{"Time":"2023-05-31T12:40:24.427066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T12:40:24.427068-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T12:40:24.42707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T12:40:24.427073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T12:40:24.427075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.427078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T12:40:24.42708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T12:40:24.427084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T12:40:24.427086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T12:40:24.427089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T12:40:24.427091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T12:40:24.427096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T12:40:24.427099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T12:40:24.427101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T12:40:24.427103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio]\r\n"} +{"Time":"2023-05-31T12:40:24.427238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T12:40:24.427248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T12:40:24.427252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:40:24.427259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T12:40:24.427267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runroot = \"/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T12:40:24.42727-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427274-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T12:40:24.427277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T12:40:24.427279-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # storage_driver = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.427282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T12:40:24.427289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T12:40:24.427293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # storage_option = [\r\n"} +{"Time":"2023-05-31T12:40:24.427296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.427299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T12:40:24.427306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T12:40:24.42731-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T12:40:24.427313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T12:40:24.42732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T12:40:24.427323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T12:40:24.427435-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T12:40:24.427441-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427443-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T12:40:24.427446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T12:40:24.427449-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T12:40:24.427451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T12:40:24.427453-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427455-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T12:40:24.427458-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T12:40:24.427474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T12:40:24.427476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T12:40:24.427505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T12:40:24.427509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T12:40:24.427513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T12:40:24.427517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T12:40:24.427523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T12:40:24.427539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427541-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T12:40:24.427543-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T12:40:24.427545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427547-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T12:40:24.42757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T12:40:24.42771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T12:40:24.427717-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T12:40:24.427719-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T12:40:24.427725-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427727-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T12:40:24.427729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T12:40:24.427732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427734-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T12:40:24.427737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.427739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T12:40:24.427743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T12:40:24.427746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T12:40:24.427748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.42775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T12:40:24.427755-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:40:24.427757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.427759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T12:40:24.427764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T12:40:24.427768-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T12:40:24.427771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.427899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:40:24.427906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # grpc_max_send_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:40:24.427909-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T12:40:24.427914-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # grpc_max_recv_msg_size = 83886080\r\n"} +{"Time":"2023-05-31T12:40:24.427917-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427921-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T12:40:24.427924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:40:24.427929-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T12:40:24.427932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427934-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T12:40:24.427936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T12:40:24.427939-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T12:40:24.427941-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T12:40:24.427944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T12:40:24.427946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.427948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42795-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T12:40:24.427953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T12:40:24.427955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.427958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T12:40:24.427962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.428107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T12:40:24.428113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T12:40:24.42812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T12:40:24.428122-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:40:24.428125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # conmon = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.428127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T12:40:24.428132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T12:40:24.428135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # conmon_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.428138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T12:40:24.428145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T12:40:24.428148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T12:40:24.42815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # conmon_env = [\r\n"} +{"Time":"2023-05-31T12:40:24.428152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.428156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T12:40:24.42816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T12:40:24.428163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T12:40:24.428165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T12:40:24.428167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.42817-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T12:40:24.428299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T12:40:24.428303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T12:40:24.428308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T12:40:24.428311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.428313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.428315-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T12:40:24.42832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T12:40:24.428322-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T12:40:24.428325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T12:40:24.428327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # seccomp_use_default_when_empty = true\r\n"} +{"Time":"2023-05-31T12:40:24.42833-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T12:40:24.428342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T12:40:24.428344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T12:40:24.428347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T12:40:24.428349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.428351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T12:40:24.428354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428356-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T12:40:24.428359-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T12:40:24.428361-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.428364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428683-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T12:40:24.428687-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T12:40:24.42869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T12:40:24.428692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428694-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T12:40:24.428696-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.428699-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.428701-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T12:40:24.428707-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T12:40:24.428709-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428711-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T12:40:24.428713-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.428716-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T12:40:24.428721-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T12:40:24.428723-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T12:40:24.428726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T12:40:24.428728-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T12:40:24.42873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T12:40:24.428732-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T12:40:24.428737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T12:40:24.428739-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T12:40:24.428741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T12:40:24.428743-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T12:40:24.428745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T12:40:24.428867-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T12:40:24.42887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.428872-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428875-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Add capabilities to the inheritable set, as well as the default group of permitted, bounding and effective.\r\n"} +{"Time":"2023-05-31T12:40:24.428877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If capabilities are expected to work for non-root users, this option should be set.\r\n"} +{"Time":"2023-05-31T12:40:24.42888-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # add_inheritable_capabilities = true\r\n"} +{"Time":"2023-05-31T12:40:24.428882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T12:40:24.428887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:40:24.428889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T12:40:24.428892-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.428894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T12:40:24.428898-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T12:40:24.428901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T12:40:24.428918-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T12:40:24.428922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.428946-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.428949-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T12:40:24.428952-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T12:40:24.428956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T12:40:24.42896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T12:40:24.428964-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T12:40:24.428967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.429215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T12:40:24.429224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T12:40:24.429227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T12:40:24.429229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T12:40:24.429232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.429234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T12:40:24.429238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T12:40:24.429241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T12:40:24.429243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T12:40:24.429245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T12:40:24.429249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T12:40:24.429251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T12:40:24.429253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T12:40:24.429256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.429257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T12:40:24.429262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T12:40:24.429264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T12:40:24.429267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.429269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T12:40:24.429271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T12:40:24.429483-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T12:40:24.429509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.429512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T12:40:24.429514-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T12:40:24.429517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T12:40:24.429519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T12:40:24.429522-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.429524-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.429528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T12:40:24.429535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T12:40:24.429538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pids_limit = 0\r\n"} +{"Time":"2023-05-31T12:40:24.429542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T12:40:24.429548-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T12:40:24.42955-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T12:40:24.429552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T12:40:24.429555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T12:40:24.429557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T12:40:24.429561-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T12:40:24.429563-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429693-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T12:40:24.4297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T12:40:24.429703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T12:40:24.429711-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T12:40:24.429714-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T12:40:24.42973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.429736-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T12:40:24.429744-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T12:40:24.429747-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429752-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T12:40:24.429756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T12:40:24.429759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.429762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T12:40:24.429766-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429769-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T12:40:24.429773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.429778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.42978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:40:24.429785-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:40:24.429787-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:40:24.429868-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.429873-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429876-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T12:40:24.429878-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T12:40:24.42988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T12:40:24.429884-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.429887-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.42989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T12:40:24.429893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:40:24.429897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:40:24.4299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T12:40:24.429904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429907-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T12:40:24.42991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T12:40:24.429915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T12:40:24.429918-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T12:40:24.429923-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T12:40:24.42993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T12:40:24.429933-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T12:40:24.429936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T12:40:24.42994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.429944-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T12:40:24.430083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T12:40:24.430108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T12:40:24.430112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T12:40:24.430114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # drop_infra_ctr = true\r\n"} +{"Time":"2023-05-31T12:40:24.430116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.430119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T12:40:24.430121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T12:40:24.430124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T12:40:24.430126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.430129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.430133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T12:40:24.430136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T12:40:24.430142-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T12:40:24.430146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.430149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T12:40:24.430166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pinns_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.430168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.43017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T12:40:24.430173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T12:40:24.430198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T12:40:24.430201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.430204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.430208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T12:40:24.430212-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T12:40:24.430472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T12:40:24.430508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T12:40:24.430512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T12:40:24.430516-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T12:40:24.430519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T12:40:24.430521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.430523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.430526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T12:40:24.430528-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T12:40:24.430532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T12:40:24.430535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T12:40:24.43054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.430543-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T12:40:24.430547-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T12:40:24.43055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:24.430552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T12:40:24.430555-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T12:40:24.430557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T12:40:24.430559-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:40:24.430562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T12:40:24.430564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T12:40:24.430566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T12:40:24.430759-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T12:40:24.430767-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T12:40:24.43077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T12:40:24.430773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T12:40:24.430775-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T12:40:24.430778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # state.\r\n"} +{"Time":"2023-05-31T12:40:24.43078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T12:40:24.430782-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T12:40:24.430785-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T12:40:24.430788-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T12:40:24.430791-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T12:40:24.430793-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T12:40:24.430796-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T12:40:24.430798-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T12:40:24.430802-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T12:40:24.430804-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T12:40:24.430808-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T12:40:24.430811-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T12:40:24.430813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T12:40:24.430816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T12:40:24.431025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T12:40:24.431029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T12:40:24.431032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T12:40:24.431057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_path = \"/usr/lib/cri-o-runc/sbin/runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.43106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T12:40:24.431062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T12:40:24.431064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.431066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.431086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.431106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.431108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.43111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T12:40:24.431114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # running containers\r\n"} +{"Time":"2023-05-31T12:40:24.431116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T12:40:24.431119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T12:40:24.431123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T12:40:24.431125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T12:40:24.431128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T12:40:24.431261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T12:40:24.431263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T12:40:24.431268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T12:40:24.43127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T12:40:24.431274-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T12:40:24.431276-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431278-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T12:40:24.431281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T12:40:24.431283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T12:40:24.431285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T12:40:24.431288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T12:40:24.431291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T12:40:24.431293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T12:40:24.431296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T12:40:24.431299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T12:40:24.431302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T12:40:24.431304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Example:\r\n"} +{"Time":"2023-05-31T12:40:24.431306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T12:40:24.431309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T12:40:24.431473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T12:40:24.431489-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T12:40:24.431494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T12:40:24.431506-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T12:40:24.431513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T12:40:24.431516-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T12:40:24.431518-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T12:40:24.431521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T12:40:24.431523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T12:40:24.431525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T12:40:24.431527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T12:40:24.43153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \r\n"} +{"Time":"2023-05-31T12:40:24.431532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431534-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T12:40:24.431536-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" #\r\n"} +{"Time":"2023-05-31T12:40:24.431538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T12:40:24.43154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T12:40:24.431542-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T12:40:24.431545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T12:40:24.431547-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T12:40:24.431549-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T12:40:24.431551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T12:40:24.431673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T12:40:24.431677-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.43168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T12:40:24.431684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:40:24.431688-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.431692-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431695-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T12:40:24.4317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.431703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pause_image = \"registry.k8s.io/pause:3.6\"\r\n"} +{"Time":"2023-05-31T12:40:24.431708-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431711-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T12:40:24.431715-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T12:40:24.431718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.431722-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.431725-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431728-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T12:40:24.431733-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T12:40:24.431737-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T12:40:24.431741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T12:40:24.431744-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T12:40:24.431748-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T12:40:24.431866-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T12:40:24.431869-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T12:40:24.431871-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T12:40:24.431874-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T12:40:24.431877-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.431882-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431885-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T12:40:24.43189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T12:40:24.431893-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T12:40:24.431897-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T12:40:24.431899-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.431901-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431904-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T12:40:24.431906-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T12:40:24.431919-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T12:40:24.431922-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T12:40:24.431929-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.431932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431935-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T12:40:24.431937-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T12:40:24.43194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T12:40:24.431942-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.431956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T12:40:24.432069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T12:40:24.432073-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.432076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T12:40:24.43208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T12:40:24.432083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T12:40:24.432088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T12:40:24.43209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T12:40:24.432092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.432101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T12:40:24.43211-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T12:40:24.432112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T12:40:24.432117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # enable_metrics = false\r\n"} +{"Time":"2023-05-31T12:40:24.432119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432122-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T12:40:24.432124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T12:40:24.432127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T12:40:24.432129-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T12:40:24.432131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T12:40:24.432134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T12:40:24.432136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T12:40:24.432139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432274-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T12:40:24.432281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T12:40:24.432284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T12:40:24.432286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T12:40:24.432289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T12:40:24.432291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T12:40:24.432295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T12:40:24.432298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T12:40:24.432303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T12:40:24.432306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.43231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T12:40:24.432314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T12:40:24.432317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.43232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T12:40:24.432324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432346-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T12:40:24.432348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # ]\r\n"} +{"Time":"2023-05-31T12:40:24.43235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T12:40:24.432353-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T12:40:24.432482-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432487-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T12:40:24.432493-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.432497-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.4325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:40:24.432505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T12:40:24.432509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T12:40:24.432513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T12:40:24.432515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.432518-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.43252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T12:40:24.432523-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T12:40:24.432526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T12:40:24.43253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432533-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T12:40:24.432536-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T12:40:24.432538-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432541-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T12:40:24.432543-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T12:40:24.432547-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.43255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T12:40:24.432552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T12:40:24.432554-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T12:40:24.432573-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T12:40:24.43272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T12:40:24.432741-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T12:40:24.432746-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432749-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T12:40:24.432751-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T12:40:24.432753-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T12:40:24.432755-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \r\n"} +{"Time":"2023-05-31T12:40:24.432757-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:40:24.43276-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ----------------------- debugLogs end: kubenet-996000 [took: 19.763700315s] --------------------------------\n"} +{"Time":"2023-05-31T12:40:24.432762-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:175: Cleaning up \"kubenet-996000\" profile ...\n"} +{"Time":"2023-05-31T12:40:24.432765-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p kubenet-996000\n"} +{"Time":"2023-05-31T12:40:26.045745-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p bridge-996000: (2.678015321s)\n"} +{"Time":"2023-05-31T12:40:26.045761-07:00","Action":"cont","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T12:40:26.045765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== CONT TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T12:40:26.045838-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial"} +{"Time":"2023-05-31T12:40:26.045843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":"=== RUN TestStartStop/group/old-k8s-version/serial\n"} +{"Time":"2023-05-31T12:40:26.045847-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart"} +{"Time":"2023-05-31T12:40:26.045849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/FirstStart\n"} +{"Time":"2023-05-31T12:40:26.045895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-amd64 start -p old-k8s-version-787000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=docker --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T12:40:27.476304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p kubenet-996000: (3.057522241s)\n"} +{"Time":"2023-05-31T12:40:27.476343-07:00","Action":"cont","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T12:40:27.47635-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== CONT TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T12:40:27.476424-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial"} +{"Time":"2023-05-31T12:40:27.47643-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":"=== RUN TestStartStop/group/no-preload/serial\n"} +{"Time":"2023-05-31T12:40:27.476435-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/FirstStart"} +{"Time":"2023-05-31T12:40:27.476439-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"=== RUN TestStartStop/group/no-preload/serial/FirstStart\n"} +{"Time":"2023-05-31T12:40:27.476479-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-amd64 start -p no-preload-344000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=docker --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:40:30.370077-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:40:30.369990 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:40:43.637595-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:40:43.637550 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:02.829068-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:02.829034 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:11.332435-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:11.332404 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:30.994247-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:30.994213 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:31.000575-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:31.000555 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:31.010722-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:31.010671 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:31.030863-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:31.030834 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:31.071026-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:31.070993 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:31.106407-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:31.106271 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:31.153106-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:31.153069 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:31.313234-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:31.313194 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:31.634525-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:31.634492 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:32.2768-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:32.276752 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:33.557703-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"E0531 12:41:33.557667 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:35.993632-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-darwin-amd64 start -p no-preload-344000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=docker --kubernetes-version=v1.27.2: (1m8.516543595s)\n"} +{"Time":"2023-05-31T12:41:35.993651-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/DeployApp"} +{"Time":"2023-05-31T12:41:35.993655-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"=== RUN TestStartStop/group/no-preload/serial/DeployApp\n"} +{"Time":"2023-05-31T12:41:35.993823-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context no-preload-344000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T12:41:36.119845-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:36.119803 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:36.178144-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/no-preload/serial/DeployApp: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:41:36.187623-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [50e2fe62-3a4c-4e08-9f9e-b814a73b1053] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T12:41:40.193347-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [50e2fe62-3a4c-4e08-9f9e-b814a73b1053] Running\n"} +{"Time":"2023-05-31T12:41:41.241604-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:41.241542 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:42.401993-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:42.401966 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:42.407105-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:42.407054 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:42.417199-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:42.417158 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:42.437645-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:42.437550 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:42.479507-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:42.479446 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:42.559862-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:42.559801 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:42.720406-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:42.720322 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:43.041828-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:43.041777 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:43.682233-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:43.682180 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:44.96291-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"E0531 12:41:44.962867 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:46.192355-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/no-preload/serial/DeployApp: integration-test=busybox healthy within 10.014148314s\n"} +{"Time":"2023-05-31T12:41:46.192425-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context no-preload-344000 exec busybox -- /bin/sh -c \"ulimit -n\"\n"} +{"Time":"2023-05-31T12:41:46.305399-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:41:46.305412-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/no-preload/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:41:46.305494-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-amd64 addons enable metrics-server -p no-preload-344000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:41:47.140102-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context no-preload-344000 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T12:41:47.198658-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/Stop"} +{"Time":"2023-05-31T12:41:47.198673-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"=== RUN TestStartStop/group/no-preload/serial/Stop\n"} +{"Time":"2023-05-31T12:41:47.198714-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-amd64 stop -p no-preload-344000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:41:47.523432-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 12:41:47.523393 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:51.48366-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 12:41:51.483585 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:52.643627-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 12:41:52.643599 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:41:58.23361-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-darwin-amd64 stop -p no-preload-344000 --alsologtostderr -v=3: (11.034750776s)\n"} +{"Time":"2023-05-31T12:41:58.233628-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:41:58.233632-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:41:58.233686-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p no-preload-344000 -n no-preload-344000\n"} +{"Time":"2023-05-31T12:41:58.324653-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p no-preload-344000 -n no-preload-344000: exit status 7 (90.89109ms)\n"} +{"Time":"2023-05-31T12:41:58.324667-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:41:58.324672-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:41:58.324675-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:41:58.324677-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:41:58.324679-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:41:58.324681-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:41:58.324685-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-amd64 addons enable dashboard -p no-preload-344000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:41:58.573914-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/SecondStart"} +{"Time":"2023-05-31T12:41:58.573927-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"=== RUN TestStartStop/group/no-preload/serial/SecondStart\n"} +{"Time":"2023-05-31T12:41:58.573979-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-amd64 start -p no-preload-344000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=docker --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:41:58.789208-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:41:58.789158 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:01.514973-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:01.514946 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:02.884119-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:02.884090 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:11.966075-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:11.966025 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:18.464798-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:18.464747 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:23.364397-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:23.364344 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:25.87584-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:25.875811 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:31.713676-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:31.713632 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:33.253317-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:33.253285 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:52.926532-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:52.926480 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:42:59.795881-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:42:59.795848 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:04.325269-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:04.325222 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:14.22235-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:14.222310 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:14.227481-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:14.227434 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:14.237841-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:14.237781 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:14.26002-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:14.259966 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:14.30015-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:14.300103 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:14.381059-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:14.380999 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:14.541361-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:14.541305 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:14.861571-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:14.861519 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:15.501686-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:15.501657 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:16.7819-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:16.781857 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:19.342912-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:19.342861 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:24.463174-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:24.463133 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:27.479296-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:27.479229 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:29.456714-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:29.456678 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:29.461889-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:29.461867 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:29.471997-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:29.471972 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:29.492458-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:29.492422 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:29.532621-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:29.532566 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:29.612714-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:29.612672 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:29.773394-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:29.773332 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:30.093567-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:30.093498 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:30.734356-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:30.734308 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:32.014482-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:32.014449 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:34.5752-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:34.575148 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:34.703391-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:34.703357 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:39.695473-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:39.695437 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:49.93583-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:49.935767 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:43:55.185685-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:43:55.185632 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:10.416537-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:44:10.416463 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:14.847667-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:44:14.847603 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:26.246517-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:44:26.246470 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:36.14635-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 12:44:36.146305 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:48.416239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p old-k8s-version-787000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=docker --kubernetes-version=v1.16.0: exit status 109 (4m22.334533851s)\n"} +{"Time":"2023-05-31T12:44:48.416254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:44:48.416258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:44:48.41626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* [old-k8s-version-787000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:44:48.416262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:44:48.416265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:44:48.416268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:44:48.41627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:44:48.416273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:44:48.416275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:44:48.416277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T12:44:48.416279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Using Docker Desktop driver with root privileges\n"} +{"Time":"2023-05-31T12:44:48.416281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Starting control plane node old-k8s-version-787000 in cluster old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:44:48.416285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Creating docker container (CPUs=2, Memory=2200MB) ...\n"} +{"Time":"2023-05-31T12:44:48.416287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Preparing Kubernetes v1.16.0 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:44:48.416289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:44:48.416291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:44:48.416293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:44:48.416295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:44:48.416297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:44:48.416303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:44:48.416305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:44:48.416307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.088433 17302 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:44:48.416309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.088614 17302 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:44:48.416312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.088620 17302 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:44:48.416314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.088625 17302 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:44:48.416316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.088744 17302 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:44:48.416319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.090455 17302 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:44:48.416321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.112003 17302 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":4194,\"bootTime\":1685557832,\"procs\":396,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T12:44:48.416326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:40:26.112098 17302 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:44:48.416328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.136174 17302 out.go:177] * [old-k8s-version-787000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:44:48.41633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.180107 17302 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:44:48.416332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.206380 17302 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:44:48.416334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.250185 17302 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:44:48.416336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.310328 17302 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:44:48.416338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.353224 17302 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:44:48.41634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.397238 17302 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:44:48.416343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.474337 17302 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:44:48.416347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.496680 17302 config.go:182] Loaded profile config \"kubenet-996000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:44:48.41635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.496807 17302 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:44:48.416352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.554699 17302 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T12:44:48.416355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.554854 17302 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:44:48.416364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.657936 17302 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:0 ContainersRunning:0 ContainersPaused:0 ContainersStopped:0 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:50 OomKillDisable:false NGoroutines:63 SystemTime:2023-05-31 19:40:26.645412396 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:44:48.416369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:44:48.416372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:44:48.416376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:44:48.416379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:44:48.416381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.682726 17302 out.go:177] * Using the docker driver based on user configuration\n"} +{"Time":"2023-05-31T12:44:48.416383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.724830 17302 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T12:44:48.416385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.724848 17302 start.go:875] validating driver \"docker\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:44:48.416388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.724858 17302 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:44:48.41639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.727595 17302 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:44:48.4164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.825448 17302 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:0 ContainersRunning:0 ContainersPaused:0 ContainersStopped:0 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:53 OomKillDisable:false NGoroutines:63 SystemTime:2023-05-31 19:40:26.812841799 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:44:48.416406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:44:48.41641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:44:48.416419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:44:48.416423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:44:48.416425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.825618 17302 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:44:48.416427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.825812 17302 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:44:48.41643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.848486 17302 out.go:177] * Using Docker Desktop driver with root privileges\n"} +{"Time":"2023-05-31T12:44:48.416433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.869243 17302 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:44:48.416436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.869270 17302 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:44:48.416439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.869278 17302 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:44:48.416445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t{Name:old-k8s-version-787000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-787000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Containe"} +{"Time":"2023-05-31T12:44:48.416448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"rRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:44:48.416452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.890269 17302 out.go:177] * Starting control plane node old-k8s-version-787000 in cluster old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.912133 17302 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T12:44:48.416456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.933185 17302 out.go:177] * Pulling base image ...\n"} +{"Time":"2023-05-31T12:44:48.416458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.975075 17302 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:44:48.416461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.975096 17302 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T12:44:48.416463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.975142 17302 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T12:44:48.416465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.975155 17302 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:44:48.416468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.975286 17302 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:44:48.41647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.975294 17302 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T12:44:48.416473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.975870 17302 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/config.json ...\n"} +{"Time":"2023-05-31T12:44:48.416477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:26.975943 17302 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/config.json: {Name:mk5a4d628af7e5cc5bf56f30ebbac6d9cb65361b Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.416482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.027665 17302 image.go:83] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon, skipping pull\n"} +{"Time":"2023-05-31T12:44:48.416486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.027687 17302 cache.go:145] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in daemon, skipping load\n"} +{"Time":"2023-05-31T12:44:48.41649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.027720 17302 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:44:48.416493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.027842 17302 start.go:364] acquiring machines lock for old-k8s-version-787000: {Name:mk3932d08d318c08b5f27e8ee966511aebf30d25 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.416497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.028030 17302 start.go:368] acquired machines lock for \"old-k8s-version-787000\" in 174.996µs\n"} +{"Time":"2023-05-31T12:44:48.416501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.028059 17302 start.go:93] Provisioning new machine with config: \u0026{Name:old-k8s-version-787000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-787000 Namespace:default APIServer"} +{"Time":"2023-05-31T12:44:48.416505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"Name:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:f"} +{"Time":"2023-05-31T12:44:48.416507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"alse DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:44:48.41651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.028152 17302 start.go:125] createHost starting for \"\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:44:48.416512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.049482 17302 out.go:204] * Creating docker container (CPUs=2, Memory=2200MB) ...\n"} +{"Time":"2023-05-31T12:44:48.416514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.049882 17302 start.go:159] libmachine.API.Create for \"old-k8s-version-787000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:44:48.416516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.049943 17302 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:44:48.416519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.050294 17302 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:44:48.416521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.050392 17302 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:44:48.416536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.050432 17302 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:44:48.416543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.050560 17302 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:44:48.416557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.050611 17302 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:44:48.41656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.050628 17302 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:44:48.416564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.071849 17302 cli_runner.go:164] Run: docker network inspect old-k8s-version-787000 --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\"\n"} +{"Time":"2023-05-31T12:44:48.416572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:40:27.124870 17302 cli_runner.go:211] docker network inspect old-k8s-version-787000 --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\" returned with exit code 1\n"} +{"Time":"2023-05-31T12:44:48.416578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.124984 17302 network_create.go:281] running [docker network inspect old-k8s-version-787000] to gather additional debugging logs...\n"} +{"Time":"2023-05-31T12:44:48.416581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.125005 17302 cli_runner.go:164] Run: docker network inspect old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:40:27.177917 17302 cli_runner.go:211] docker network inspect old-k8s-version-787000 returned with exit code 1\n"} +{"Time":"2023-05-31T12:44:48.416586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.177959 17302 network_create.go:284] error running [docker network inspect old-k8s-version-787000]: docker network inspect old-k8s-version-787000: exit status 1\n"} +{"Time":"2023-05-31T12:44:48.416588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.416591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[]\n"} +{"Time":"2023-05-31T12:44:48.416593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.416597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tError response from daemon: network old-k8s-version-787000 not found\n"} +{"Time":"2023-05-31T12:44:48.416599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.177982 17302 network_create.go:286] output of [docker network inspect old-k8s-version-787000]: -- stdout --\n"} +{"Time":"2023-05-31T12:44:48.416601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[]\n"} +{"Time":"2023-05-31T12:44:48.416603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:44:48.416609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:44:48.416612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tError response from daemon: network old-k8s-version-787000 not found\n"} +{"Time":"2023-05-31T12:44:48.416615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:44:48.416621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.178083 17302 cli_runner.go:164] Run: docker network inspect bridge --format \"{\"Name\": \"{{.Name}}\",\"Driver\": \"{{.Driver}}\",\"Subnet\": \"{{range .IPAM.Config}}{{.Subnet}}{{end}}\",\"Gateway\": \"{{range .IPAM.Config}}{{.Gateway}}{{end}}\",\"MTU\": {{if (index .Options \"com.docker.network.driver.mtu\")}}{{(index .Options \"com.docker.network.driver.mtu\")}}{{else}}0{{end}}, \"ContainerIPs\": [{{range $k,$v := .Containers }}\"{{$v.IPv4Address}}\",{{end}}]}\"\n"} +{"Time":"2023-05-31T12:44:48.41663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.231792 17302 network.go:212] skipping subnet 192.168.49.0/24 that is reserved: \u0026{IP:192.168.49.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.49.0/24 Gateway:192.168.49.1 ClientMin:192.168.49.2 ClientMax:192.168.49.254 Broadcast:192.168.49.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.416637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.232192 17302 network.go:209] using free private subnet 192.168.58.0/24: \u0026{IP:192.168.58.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.58.0/24 Gateway:192.168.58.1 ClientMin:192.168.58.2 ClientMax:192.168.58.254 Broadcast:192.168.58.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:0xc000d7d4f0}\n"} +{"Time":"2023-05-31T12:44:48.416644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.232207 17302 network_create.go:123] attempt to create docker network old-k8s-version-787000 192.168.58.0/24 with gateway 192.168.58.1 and MTU of 65535 ...\n"} +{"Time":"2023-05-31T12:44:48.416651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.232281 17302 cli_runner.go:164] Run: docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=old-k8s-version-787000 old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:40:27.286304 17302 cli_runner.go:211] docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=old-k8s-version-787000 old-k8s-version-787000 returned with exit code 1\n"} +{"Time":"2023-05-31T12:44:48.416663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:40:27.286348 17302 network_create.go:148] failed to create docker network old-k8s-version-787000 192.168.58.0/24 with gateway 192.168.58.1 and mtu of 65535: docker network create --driver=bridge --subnet=192.168.58.0/24 --gateway=192.168.58.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=old-k8s-version-787000 old-k8s-version-787000: exit status 1\n"} +{"Time":"2023-05-31T12:44:48.416666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.416668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.41667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.416672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tError response from daemon: Pool overlaps with other one on this address space\n"} +{"Time":"2023-05-31T12:44:48.416674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:40:27.286372 17302 network_create.go:115] failed to create docker network old-k8s-version-787000 192.168.58.0/24, will retry: subnet is taken\n"} +{"Time":"2023-05-31T12:44:48.416677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.287789 17302 network.go:212] skipping subnet 192.168.58.0/24 that is reserved: \u0026{IP:192.168.58.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.58.0/24 Gateway:192.168.58.1 ClientMin:192.168.58.2 ClientMax:192.168.58.254 Broadcast:192.168.58.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.416682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.288210 17302 network.go:209] using free private subnet 192.168.67.0/24: \u0026{IP:192.168.67.0 Netmask:255.255.255.0 Prefix:24 CIDR:192.168.67.0/24 Gateway:192.168.67.1 ClientMin:192.168.67.2 ClientMax:192.168.67.254 Broadcast:192.168.67.255 IsPrivate:true Interface:{IfaceName: IfaceIPv4: IfaceMTU:0 IfaceMAC:} reservation:0xc000ec1300}\n"} +{"Time":"2023-05-31T12:44:48.416685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.288225 17302 network_create.go:123] attempt to create docker network old-k8s-version-787000 192.168.67.0/24 with gateway 192.168.67.1 and MTU of 65535 ...\n"} +{"Time":"2023-05-31T12:44:48.416687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.288296 17302 cli_runner.go:164] Run: docker network create --driver=bridge --subnet=192.168.67.0/24 --gateway=192.168.67.1 -o --ip-masq -o --icc -o com.docker.network.driver.mtu=65535 --label=created_by.minikube.sigs.k8s.io=true --label=name.minikube.sigs.k8s.io=old-k8s-version-787000 old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.41669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.447425 17302 network_create.go:107] docker network old-k8s-version-787000 192.168.67.0/24 created\n"} +{"Time":"2023-05-31T12:44:48.416692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.447465 17302 kic.go:117] calculated static IP \"192.168.67.2\" for the \"old-k8s-version-787000\" container\n"} +{"Time":"2023-05-31T12:44:48.416694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.447640 17302 cli_runner.go:164] Run: docker ps -a --format {{.Names}}\n"} +{"Time":"2023-05-31T12:44:48.416697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.497959 17302 cli_runner.go:164] Run: docker volume create old-k8s-version-787000 --label name.minikube.sigs.k8s.io=old-k8s-version-787000 --label created_by.minikube.sigs.k8s.io=true\n"} +{"Time":"2023-05-31T12:44:48.416713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.706540 17302 oci.go:103] Successfully created a docker volume old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:27.706693 17302 cli_runner.go:164] Run: docker run --rm --name old-k8s-version-787000-preload-sidecar --label created_by.minikube.sigs.k8s.io=true --label name.minikube.sigs.k8s.io=old-k8s-version-787000 --entrypoint /usr/bin/test -v old-k8s-version-787000:/var gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -d /var/lib\n"} +{"Time":"2023-05-31T12:44:48.416721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:28.510819 17302 oci.go:107] Successfully prepared a docker volume old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:28.510895 17302 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:44:48.416726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:28.510915 17302 kic.go:190] Starting extracting preloaded images to volume ...\n"} +{"Time":"2023-05-31T12:44:48.416728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:28.511044 17302 cli_runner.go:164] Run: docker run --rm --entrypoint /usr/bin/tar -v /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4:/preloaded.tar:ro -v old-k8s-version-787000:/extractDir gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -I lz4 -xf /preloaded.tar -C /extractDir\n"} +{"Time":"2023-05-31T12:44:48.416731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.357888 17302 cli_runner.go:217] Completed: docker run --rm --entrypoint /usr/bin/tar -v /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4:/preloaded.tar:ro -v old-k8s-version-787000:/extractDir gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 -I lz4 -xf /preloaded.tar -C /extractDir: (6.846713084s)\n"} +{"Time":"2023-05-31T12:44:48.416734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.357911 17302 kic.go:199] duration metric: took 6.846946 seconds to extract preloaded images to volume\n"} +{"Time":"2023-05-31T12:44:48.416736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.358019 17302 cli_runner.go:164] Run: docker info --format \"'{{json .SecurityOptions}}'\"\n"} +{"Time":"2023-05-31T12:44:48.416739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.459614 17302 cli_runner.go:164] Run: docker run -d -t --privileged --security-opt seccomp=unconfined --tmpfs /tmp --tmpfs /run -v /lib/modules:/lib/modules:ro --hostname old-k8s-version-787000 --name old-k8s-version-787000 --label created_by.minikube.sigs.k8s.io=true --label name.minikube.sigs.k8s.io=old-k8s-version-787000 --label role.minikube.sigs.k8s.io= --label mode.minikube.sigs.k8s.io=old-k8s-version-787000 --network old-k8s-version-787000 --ip 192.168.67.2 --volume old-k8s-version-787000:/var --security-opt apparmor=unconfined --memory=2200mb --memory-swap=2200mb --cpus=2 -e container=docker --expose 8443 --publish=127.0.0.1::8443 --publish=127.0.0.1::22 --publish=127.0.0.1::2376 --publish=127.0.0.1::5000 --publish=127.0.0.1::32443 gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\n"} +{"Time":"2023-05-31T12:44:48.416743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.745147 17302 cli_runner.go:164] Run: docker container inspect old-k8s-version-787000 --format={{.State.Running}}\n"} +{"Time":"2023-05-31T12:44:48.416745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.799712 17302 cli_runner.go:164] Run: docker container inspect old-k8s-version-787000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:44:48.416747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.857963 17302 cli_runner.go:164] Run: docker exec old-k8s-version-787000 stat /var/lib/dpkg/alternatives/iptables\n"} +{"Time":"2023-05-31T12:44:48.416749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.956340 17302 oci.go:144] the created container \"old-k8s-version-787000\" has a running status.\n"} +{"Time":"2023-05-31T12:44:48.416751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:35.956371 17302 kic.go:221] Creating ssh key for kic: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa...\n"} +{"Time":"2023-05-31T12:44:48.416754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.168794 17302 kic_runner.go:191] docker (temp): /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa.pub --\u003e /home/docker/.ssh/authorized_keys (381 bytes)\n"} +{"Time":"2023-05-31T12:44:48.416756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.232168 17302 cli_runner.go:164] Run: docker container inspect old-k8s-version-787000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:44:48.416758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.287313 17302 kic_runner.go:93] Run: chown docker:docker /home/docker/.ssh/authorized_keys\n"} +{"Time":"2023-05-31T12:44:48.41676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.287342 17302 kic_runner.go:114] Args: [docker exec --privileged old-k8s-version-787000 chown docker:docker /home/docker/.ssh/authorized_keys]\n"} +{"Time":"2023-05-31T12:44:48.416763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.374307 17302 cli_runner.go:164] Run: docker container inspect old-k8s-version-787000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:44:48.416765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.428204 17302 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T12:44:48.416767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.428249 17302 ubuntu.go:169] provisioning hostname \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:44:48.41677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.428363 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.480368 17302 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:44:48.416779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.480750 17302 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53505 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.416782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.480763 17302 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:44:48.416785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tsudo hostname old-k8s-version-787000 \u0026\u0026 echo \"old-k8s-version-787000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T12:44:48.416789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.606384 17302 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.606508 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.656640 17302 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:44:48.416798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.656992 17302 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53505 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.4168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.657005 17302 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:44:48.416804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t\tif ! grep -xq '.*\\sold-k8s-version-787000' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:44:48.416808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:44:48.41681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 old-k8s-version-787000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T12:44:48.416812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T12:44:48.416816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t\t\t\techo '127.0.1.1 old-k8s-version-787000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T12:44:48.416819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T12:44:48.416822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T12:44:48.416825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.768752 17302 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T12:44:48.41683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.768776 17302 ubuntu.go:175] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1078/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1078/.minikube}\n"} +{"Time":"2023-05-31T12:44:48.416835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.768796 17302 ubuntu.go:177] setting up certificates\n"} +{"Time":"2023-05-31T12:44:48.416838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.768802 17302 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T12:44:48.41684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.768869 17302 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.818692 17302 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T12:44:48.416845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.818774 17302 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T12:44:48.416847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.818781 17302 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T12:44:48.416849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.818924 17302 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:44:48.416852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.819115 17302 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T12:44:48.416854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.819121 17302 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T12:44:48.416856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.819185 17302 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:44:48.416859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.819328 17302 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T12:44:48.416861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.819333 17302 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T12:44:48.416865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.819390 17302 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:44:48.416869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.819509 17302 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem org=jenkins.old-k8s-version-787000 san=[192.168.67.2 127.0.0.1 localhost 127.0.0.1 minikube old-k8s-version-787000]\n"} +{"Time":"2023-05-31T12:44:48.416872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.930180 17302 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T12:44:48.416874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.930250 17302 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T12:44:48.416876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.930305 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:36.979972 17302 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53505 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:44:48.416881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.065181 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:44:48.416885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.087658 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1241 bytes)\n"} +{"Time":"2023-05-31T12:44:48.416888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.110073 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1679 bytes)\n"} +{"Time":"2023-05-31T12:44:48.41689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.132529 17302 provision.go:86] duration metric: configureAuth took 363.700644ms\n"} +{"Time":"2023-05-31T12:44:48.416892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.132543 17302 ubuntu.go:193] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T12:44:48.416895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.132688 17302 config.go:182] Loaded profile config \"old-k8s-version-787000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.416898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.132757 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.416901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.182013 17302 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:44:48.416903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.182360 17302 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53505 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.416905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.182376 17302 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:44:48.416907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T12:44:48.416909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.295733 17302 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: overlay\n"} +{"Time":"2023-05-31T12:44:48.416912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.295745 17302 ubuntu.go:71] root file system type: overlay\n"} +{"Time":"2023-05-31T12:44:48.416916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.295831 17302 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T12:44:48.416918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.295913 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.41692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.346158 17302 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:44:48.416922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.346494 17302 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53505 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.416925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.346546 17302 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:44:48.416927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %s \"[Unit]\n"} +{"Time":"2023-05-31T12:44:48.416929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:44:48.416952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:44:48.416958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:44:48.416961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:44:48.416964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:44:48.416967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:44:48.41697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:44:48.416974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:44:48.416977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.41698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:44:48.416982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:44:48.416985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:44:48.416988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.416995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:44:48.416998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:44:48.417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:44:48.417002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:44:48.417004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:44:48.417006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:44:48.417008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:44:48.41701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:44:48.417014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:44:48.417016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:44:48.417019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:44:48.417021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T12:44:48.417023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:44:48.417027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:44:48.417047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:44:48.417051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:44:48.417054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:44:48.417056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:44:48.41706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:44:48.417062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:44:48.417064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:44:48.417066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:44:48.417071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:44:48.417073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:44:48.417077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:44:48.417079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:44:48.417083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:44:48.417086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T12:44:48.417088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.471218 17302 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T12:44:48.41709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:44:48.417092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:44:48.417094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:44:48.417096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:44:48.417098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:44:48.417101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:44:48.417103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:44:48.417105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:44:48.417107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:44:48.41711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:44:48.417112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:44:48.417114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.41712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:44:48.417122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:44:48.417129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:44:48.417132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:44:48.417134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:44:48.417136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:44:48.417138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:44:48.41714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:44:48.417144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:44:48.417146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:44:48.417149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:44:48.417151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:44:48.417153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:44:48.417158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:44:48.41716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:44:48.417183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:44:48.417188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:44:48.41719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.4172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:44:48.417204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:44:48.417206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:44:48.417208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:44:48.41721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:44:48.417218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:44:48.41722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:44:48.417224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:44:48.417226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:44:48.41723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:44:48.417232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.471339 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.417238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.541674 17302 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:44:48.417241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.542018 17302 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53505 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.417298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:37.542031 17302 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:44:48.417302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:44:48.417306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.180608 17302 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: --- /lib/systemd/system/docker.service\t2023-05-19 18:06:21.000000000 +0000\n"} +{"Time":"2023-05-31T12:44:48.41731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+++ /lib/systemd/system/docker.service.new\t2023-05-31 19:40:37.467760586 +0000\n"} +{"Time":"2023-05-31T12:44:48.417313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t@@ -1,30 +1,32 @@\n"} +{"Time":"2023-05-31T12:44:48.417316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t [Unit]\n"} +{"Time":"2023-05-31T12:44:48.417319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t Description=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:44:48.417322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t Documentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:44:48.417328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-After=network-online.target docker.socket firewalld.service containerd.service time-set.target\n"} +{"Time":"2023-05-31T12:44:48.417332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-Wants=network-online.target containerd.service\n"} +{"Time":"2023-05-31T12:44:48.417335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+BindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:44:48.417338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+After=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:44:48.417341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+Wants=network-online.target\n"} +{"Time":"2023-05-31T12:44:48.417345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t Requires=docker.socket\n"} +{"Time":"2023-05-31T12:44:48.417347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:44:48.417349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+StartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:44:48.417351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \n"} +{"Time":"2023-05-31T12:44:48.417353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t [Service]\n"} +{"Time":"2023-05-31T12:44:48.417354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t Type=notify\n"} +{"Time":"2023-05-31T12:44:48.417357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# the default is not to use systemd for cgroups because the delegate issues still\n"} +{"Time":"2023-05-31T12:44:48.417471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# exists and systemd currently does not support the cgroup feature set required\n"} +{"Time":"2023-05-31T12:44:48.417479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# for containers run by docker\n"} +{"Time":"2023-05-31T12:44:48.417481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:44:48.417484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:44:48.417486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:44:48.417488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-RestartSec=2\n"} +{"Time":"2023-05-31T12:44:48.41749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-Restart=always\n"} +{"Time":"2023-05-31T12:44:48.417492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+Restart=on-failure\n"} +{"Time":"2023-05-31T12:44:48.417494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \n"} +{"Time":"2023-05-31T12:44:48.417497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\n"} +{"Time":"2023-05-31T12:44:48.4175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# Both the old, and new location are accepted by systemd 229 and up, so using the old location\n"} +{"Time":"2023-05-31T12:44:48.417504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# to make them work for either version of systemd.\n"} +{"Time":"2023-05-31T12:44:48.417507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-StartLimitBurst=3\n"} +{"Time":"2023-05-31T12:44:48.41751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \n"} +{"Time":"2023-05-31T12:44:48.417512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\n"} +{"Time":"2023-05-31T12:44:48.417515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\n"} +{"Time":"2023-05-31T12:44:48.417517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# this option work for either version of systemd.\n"} +{"Time":"2023-05-31T12:44:48.417519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-StartLimitInterval=60s\n"} +{"Time":"2023-05-31T12:44:48.417521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+\n"} +{"Time":"2023-05-31T12:44:48.417523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:44:48.417525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:44:48.417596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:44:48.417601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:44:48.417603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:44:48.417605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:44:48.417607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:44:48.417609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+\n"} +{"Time":"2023-05-31T12:44:48.417612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:44:48.417614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:44:48.417616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+ExecStart=\n"} +{"Time":"2023-05-31T12:44:48.417618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+ExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:44:48.417621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+ExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:44:48.417624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \n"} +{"Time":"2023-05-31T12:44:48.417627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t # Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:44:48.417629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t # in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:44:48.417632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t@@ -32,16 +34,16 @@\n"} +{"Time":"2023-05-31T12:44:48.417635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t LimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:44:48.417638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t LimitCORE=infinity\n"} +{"Time":"2023-05-31T12:44:48.417646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \n"} +{"Time":"2023-05-31T12:44:48.417778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# Comment TasksMax if your systemd version does not support it.\n"} +{"Time":"2023-05-31T12:44:48.417784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-# Only systemd 226 and above support this option.\n"} +{"Time":"2023-05-31T12:44:48.417786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:44:48.417789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:44:48.417793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t TasksMax=infinity\n"} +{"Time":"2023-05-31T12:44:48.417796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t+TimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:44:48.417798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \n"} +{"Time":"2023-05-31T12:44:48.4178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t # set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:44:48.417802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t Delegate=yes\n"} +{"Time":"2023-05-31T12:44:48.417804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \n"} +{"Time":"2023-05-31T12:44:48.417806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t # kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:44:48.417808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t KillMode=process\n"} +{"Time":"2023-05-31T12:44:48.41781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-OOMScoreAdjust=-500\n"} +{"Time":"2023-05-31T12:44:48.417812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \n"} +{"Time":"2023-05-31T12:44:48.417814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t [Install]\n"} +{"Time":"2023-05-31T12:44:48.417816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t WantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:44:48.417818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tSynchronizing state of docker.service with SysV service script with /lib/systemd/systemd-sysv-install.\n"} +{"Time":"2023-05-31T12:44:48.41782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecuting: /lib/systemd/systemd-sysv-install enable docker\n"} +{"Time":"2023-05-31T12:44:48.417822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.417824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.180630 17302 machine.go:91] provisioned docker machine in 1.752392356s\n"} +{"Time":"2023-05-31T12:44:48.41783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.180637 17302 client.go:171] LocalClient.Create took 11.130601724s\n"} +{"Time":"2023-05-31T12:44:48.417954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.180658 17302 start.go:167] duration metric: libmachine.API.Create for \"old-k8s-version-787000\" took 11.130696179s\n"} +{"Time":"2023-05-31T12:44:48.417966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.180665 17302 start.go:300] post-start starting for \"old-k8s-version-787000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:44:48.417969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.180670 17302 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T12:44:48.417978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.180733 17302 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:44:48.41798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.180789 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.417983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.231650 17302 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53505 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:44:48.417985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.316408 17302 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T12:44:48.417987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.320674 17302 main.go:141] libmachine: Couldn't set key VERSION_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:44:48.41799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.320695 17302 main.go:141] libmachine: Couldn't set key PRIVACY_POLICY_URL, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:44:48.417992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.320704 17302 main.go:141] libmachine: Couldn't set key UBUNTU_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:44:48.417994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.320709 17302 info.go:137] Remote host: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T12:44:48.417996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.320719 17302 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T12:44:48.417999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.320820 17302 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T12:44:48.4181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.320973 17302 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e 15662.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:44:48.418106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.321139 17302 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:44:48.418109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.330097 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:44:48.418112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.352544 17302 start.go:303] post-start completed in 171.867189ms\n"} +{"Time":"2023-05-31T12:44:48.418114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.353061 17302 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.418117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.403226 17302 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/config.json ...\n"} +{"Time":"2023-05-31T12:44:48.418119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.403630 17302 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T12:44:48.418125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.403694 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.418128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.453714 17302 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53505 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:44:48.41813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.534789 17302 ssh_runner.go:195] Run: sh -c \"df -BG /var | awk 'NR==2{print $4}'\"\n"} +{"Time":"2023-05-31T12:44:48.418132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.539969 17302 start.go:128] duration metric: createHost completed in 11.511720196s\n"} +{"Time":"2023-05-31T12:44:48.418134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.539986 17302 start.go:83] releasing machines lock for \"old-k8s-version-787000\", held for 11.511862298s\n"} +{"Time":"2023-05-31T12:44:48.418137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.540065 17302 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.418219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.588857 17302 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T12:44:48.418224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.588856 17302 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T12:44:48.418227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.588966 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.41823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.588970 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.418232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.642052 17302 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53505 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:44:48.418235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.642074 17302 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53505 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:44:48.418237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.824868 17302 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T12:44:48.418243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.830134 17302 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T12:44:48.418246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.835470 17302 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *loopback.conf* -not -name *.mk_disabled -exec sh -c \"grep -q loopback {} \u0026\u0026 ( grep -q name {} || sudo sed -i '/\"type\": \"loopback\"/i \\ \\ \\ \\ \"name\": \"loopback\",' {} ) \u0026\u0026 sudo sed -i 's|\"cniVersion\": \".*\"|\"cniVersion\": \"1.0.0\"|g' {}\" ;\n"} +{"Time":"2023-05-31T12:44:48.418249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.859360 17302 cni.go:229] loopback cni configuration patched: \"/etc/cni/net.d/*loopback.conf*\" found\n"} +{"Time":"2023-05-31T12:44:48.418251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.859446 17302 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *bridge* -not -name *podman* -not -name *.mk_disabled -printf \"%p, \" -exec sh -c \"sudo sed -i -r -e '/\"dst\": \".*:.*\"/d' -e 's|^(.*)\"dst\": (.*)[,*]$|\\1\"dst\": \\2|g' -e '/\"subnet\": \".*:.*\"/d' -e 's|^(.*)\"subnet\": \".*\"(.*)[,*]$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T12:44:48.418335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.875977 17302 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *podman* -not -name *.mk_disabled -printf \"%p, \" -exec sh -c \"sudo sed -i -r -e 's|^(.*)\"subnet\": \".*\"(.*)$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' -e 's|^(.*)\"gateway\": \".*\"(.*)$|\\1\"gateway\": \"10.244.0.1\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T12:44:48.418359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.892112 17302 cni.go:307] configured [/etc/cni/net.d/100-crio-bridge.conf, /etc/cni/net.d/87-podman-bridge.conflist] bridge cni config(s)\n"} +{"Time":"2023-05-31T12:44:48.418373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.892128 17302 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:44:48.418381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.892141 17302 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:44:48.418384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.892254 17302 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:44:48.418386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.418389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.908366 17302 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.1\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:44:48.418391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.918651 17302 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:44:48.418394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.928942 17302 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:44:48.418396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.929005 17302 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:44:48.418398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.939188 17302 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:44:48.418401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.949523 17302 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:44:48.418403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.959744 17302 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:44:48.41854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.969786 17302 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T12:44:48.418544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.979430 17302 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:44:48.418546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.989740 17302 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T12:44:48.418548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:38.999010 17302 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T12:44:48.418551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.007790 17302 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:44:48.418553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.078724 17302 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T12:44:48.418555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.150939 17302 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:44:48.418557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.150958 17302 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:44:48.418559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.151023 17302 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T12:44:48.418561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.164356 17302 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T12:44:48.418563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.164428 17302 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T12:44:48.418566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.177547 17302 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///var/run/dockershim.sock\n"} +{"Time":"2023-05-31T12:44:48.418568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.41857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.195100 17302 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T12:44:48.418572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.200369 17302 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T12:44:48.418575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.210817 17302 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T12:44:48.418739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.231828 17302 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T12:44:48.418751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.331571 17302 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T12:44:48.418754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.424430 17302 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:44:48.418756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.424447 17302 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T12:44:48.418759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.443142 17302 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:44:48.418761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.535522 17302 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:44:48.418763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.785093 17302 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:44:48.418765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.812804 17302 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:44:48.418767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.884330 17302 out.go:204] * Preparing Kubernetes v1.16.0 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:44:48.418769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.884448 17302 cli_runner.go:164] Run: docker exec -t old-k8s-version-787000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T12:44:48.418772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.996286 17302 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T12:44:48.418774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:39.996408 17302 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:44:48.418776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.001468 17302 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.65.254\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:44:48.418779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.013237 17302 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.418781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.063747 17302 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:44:48.418784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.063830 17302 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:44:48.418908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.085144 17302 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:44:48.418913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:44:48.418916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.41892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.418923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.418926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.418929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:44:48.418931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:44:48.418933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/pause:3.1\n"} +{"Time":"2023-05-31T12:44:48.418935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.418937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:44:48.418939-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.085163 17302 docker.go:639] registry.k8s.io/kube-apiserver:v1.16.0 wasn't preloaded\n"} +{"Time":"2023-05-31T12:44:48.418942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.085226 17302 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T12:44:48.418944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.094776 17302 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T12:44:48.418946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.099410 17302 ssh_runner.go:195] Run: stat -c \"%s %y\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:44:48.418948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.103815 17302 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%s %y\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.41895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.418952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.418954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.41896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.418963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:40.103845 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 --\u003e /preloaded.tar.lz4 (369789069 bytes)\n"} +{"Time":"2023-05-31T12:44:48.419092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:45.227331 17302 docker.go:597] Took 5.127956 seconds to copy over tarball\n"} +{"Time":"2023-05-31T12:44:48.419097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:45.227401 17302 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:44:48.419099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:48.106860 17302 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (2.879420119s)\n"} +{"Time":"2023-05-31T12:44:48.419101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:48.106878 17302 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:44:48.419104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:48.207593 17302 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T12:44:48.419107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:48.223810 17302 ssh_runner.go:362] scp memory --\u003e /var/lib/docker/image/overlay2/repositories.json (2499 bytes)\n"} +{"Time":"2023-05-31T12:44:48.419109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:48.250544 17302 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:44:48.419112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:48.372158 17302 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:44:48.419114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.246600 17302 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:44:48.419117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.271590 17302 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:44:48.419119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:44:48.419121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:44:48.419131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:44:48.419299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tk8s.gcr.io/pause:3.1\n"} +{"Time":"2023-05-31T12:44:48.419302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.419304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:44:48.419311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.271604 17302 docker.go:639] registry.k8s.io/kube-apiserver:v1.16.0 wasn't preloaded\n"} +{"Time":"2023-05-31T12:44:48.419314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.271617 17302 cache_images.go:88] LoadImages start: [registry.k8s.io/kube-apiserver:v1.16.0 registry.k8s.io/kube-controller-manager:v1.16.0 registry.k8s.io/kube-scheduler:v1.16.0 registry.k8s.io/kube-proxy:v1.16.0 registry.k8s.io/pause:3.1 registry.k8s.io/etcd:3.3.15-0 registry.k8s.io/coredns:1.6.2 gcr.io/k8s-minikube/storage-provisioner:v5]\n"} +{"Time":"2023-05-31T12:44:48.419317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.278363 17302 image.go:134] retrieving image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:44:48.419319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.278442 17302 image.go:134] retrieving image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.278473 17302 image.go:134] retrieving image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.278605 17302 image.go:134] retrieving image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.278610 17302 image.go:134] retrieving image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:44:48.419327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.278713 17302 image.go:134] retrieving image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:44:48.419329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.278742 17302 image.go:134] retrieving image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:44:48.419332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.279422 17302 image.go:134] retrieving image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.284944 17302 image.go:177] daemon lookup for registry.k8s.io/pause:3.1: Error response from daemon: No such image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:44:48.419339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.285012 17302 image.go:177] daemon lookup for registry.k8s.io/kube-proxy:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.285060 17302 image.go:177] daemon lookup for registry.k8s.io/kube-controller-manager:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.285069 17302 image.go:177] daemon lookup for registry.k8s.io/etcd:3.3.15-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:44:48.419499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.285161 17302 image.go:177] daemon lookup for registry.k8s.io/coredns:1.6.2: Error response from daemon: No such image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:44:48.419501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.286239 17302 image.go:177] daemon lookup for gcr.io/k8s-minikube/storage-provisioner:v5: Error response from daemon: No such image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:44:48.419504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.286282 17302 image.go:177] daemon lookup for registry.k8s.io/kube-apiserver:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:49.286449 17302 image.go:177] daemon lookup for registry.k8s.io/kube-scheduler:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.439977 17302 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:44:48.419511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.461686 17302 cache_images.go:116] \"registry.k8s.io/pause:3.1\" needs transfer: \"registry.k8s.io/pause:3.1\" does not exist at hash \"da86e6ba6ca197bf6bc5e9d900febd906b133eaa4750e6bed647b0fbe50ed43e\" in container runtime\n"} +{"Time":"2023-05-31T12:44:48.419513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.461733 17302 docker.go:313] Removing image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:44:48.419515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.461796 17302 ssh_runner.go:195] Run: docker rmi registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:44:48.419518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.484116 17302 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/pause_3.1\n"} +{"Time":"2023-05-31T12:44:48.41952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.615104 17302 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.640311 17302 cache_images.go:116] \"registry.k8s.io/kube-proxy:v1.16.0\" needs transfer: \"registry.k8s.io/kube-proxy:v1.16.0\" does not exist at hash \"c21b0c7400f988db4777858edd13b6d3930d62d7ccf026d2415485a52037f384\" in container runtime\n"} +{"Time":"2023-05-31T12:44:48.419745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.640359 17302 docker.go:313] Removing image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.640438 17302 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.666710 17302 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-proxy_v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.829834 17302 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.853982 17302 cache_images.go:116] \"registry.k8s.io/kube-controller-manager:v1.16.0\" needs transfer: \"registry.k8s.io/kube-controller-manager:v1.16.0\" does not exist at hash \"06a629a7e51cdcc81a5ed6a3e6650348312f20c954ac52ee489a023628ec9c7d\" in container runtime\n"} +{"Time":"2023-05-31T12:44:48.419761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.854060 17302 docker.go:313] Removing image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.854125 17302 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.878986 17302 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-controller-manager_v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.906366 17302 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:44:48.419771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.929605 17302 cache_images.go:116] \"registry.k8s.io/etcd:3.3.15-0\" needs transfer: \"registry.k8s.io/etcd:3.3.15-0\" does not exist at hash \"b2756210eeabf84f3221da9959e9483f3919dc2aaab4cd45e7cd072fcbde27ed\" in container runtime\n"} +{"Time":"2023-05-31T12:44:48.419773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.929640 17302 docker.go:313] Removing image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:44:48.419775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.929705 17302 ssh_runner.go:195] Run: docker rmi registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:44:48.419777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:50.959331 17302 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/etcd_3.3.15-0\n"} +{"Time":"2023-05-31T12:44:48.41978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.164502 17302 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:44:48.419978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.190546 17302 cache_images.go:116] \"registry.k8s.io/coredns:1.6.2\" needs transfer: \"registry.k8s.io/coredns:1.6.2\" does not exist at hash \"bf261d157914477ee1a5969d28ec687f3fbfc9fb5a664b22df78e57023b0e03b\" in container runtime\n"} +{"Time":"2023-05-31T12:44:48.419983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.190576 17302 docker.go:313] Removing image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:44:48.419986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.190644 17302 ssh_runner.go:195] Run: docker rmi registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:44:48.419988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.216045 17302 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/coredns_1.6.2\n"} +{"Time":"2023-05-31T12:44:48.419994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.853739 17302 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.419999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.874382 17302 cache_images.go:116] \"registry.k8s.io/kube-apiserver:v1.16.0\" needs transfer: \"registry.k8s.io/kube-apiserver:v1.16.0\" does not exist at hash \"b305571ca60a5a7818bda47da122683d75e8a1907475681ee8b1efbd06bff12e\" in container runtime\n"} +{"Time":"2023-05-31T12:44:48.420001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.874409 17302 docker.go:313] Removing image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.420003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.874474 17302 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.420005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.880364 17302 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:44:48.420008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:51.895486 17302 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-apiserver_v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.42001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.129812 17302 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.420013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.150428 17302 cache_images.go:116] \"registry.k8s.io/kube-scheduler:v1.16.0\" needs transfer: \"registry.k8s.io/kube-scheduler:v1.16.0\" does not exist at hash \"301ddc62b80b16315d3c2653cf3888370394277afb3187614cfa20edc352ca0a\" in container runtime\n"} +{"Time":"2023-05-31T12:44:48.420015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.150456 17302 docker.go:313] Removing image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.420198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.150516 17302 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.420204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.172024 17302 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-scheduler_v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.420207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.172073 17302 cache_images.go:92] LoadImages completed in 2.900416243s\n"} +{"Time":"2023-05-31T12:44:48.420209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:40:52.172125 17302 out.go:239] X Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/pause_3.1: no such file or directory\n"} +{"Time":"2023-05-31T12:44:48.420212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tX Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/pause_3.1: no such file or directory\n"} +{"Time":"2023-05-31T12:44:48.420214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.172195 17302 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T12:44:48.420217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.227127 17302 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:44:48.420219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.227148 17302 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:44:48.420221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.227167 17302 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:44:48.420224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.227187 17302 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.67.2 APIServerPort:8443 KubernetesVersion:v1.16.0 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:old-k8s-version-787000 NodeName:old-k8s-version-787000 DNSDomain:cluster.local CRISocket:/var/run/dockershim.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.67.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.67.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt StaticP"} +{"Time":"2023-05-31T12:44:48.420228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"odPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:false}\n"} +{"Time":"2023-05-31T12:44:48.420405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.227309 17302 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T12:44:48.420408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tapiVersion: kubeadm.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:44:48.42041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T12:44:48.420413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T12:44:48.420415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t advertiseAddress: 192.168.67.2\n"} +{"Time":"2023-05-31T12:44:48.420417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T12:44:48.420419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T12:44:48.420421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - groups:\n"} +{"Time":"2023-05-31T12:44:48.420423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T12:44:48.420425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T12:44:48.420427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t usages:\n"} +{"Time":"2023-05-31T12:44:48.420429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - signing\n"} +{"Time":"2023-05-31T12:44:48.420431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - authentication\n"} +{"Time":"2023-05-31T12:44:48.420433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T12:44:48.420435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t criSocket: /var/run/dockershim.sock\n"} +{"Time":"2023-05-31T12:44:48.420437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t name: \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:44:48.420439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T12:44:48.420444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t node-ip: 192.168.67.2\n"} +{"Time":"2023-05-31T12:44:48.420447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t taints: []\n"} +{"Time":"2023-05-31T12:44:48.420449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:44:48.420451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tapiVersion: kubeadm.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:44:48.420453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:44:48.420646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T12:44:48.42065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.67.2\"]\n"} +{"Time":"2023-05-31T12:44:48.420652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:44:48.420654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T12:44:48.420657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T12:44:48.420659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:44:48.420661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:44:48.420663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:44:48.420665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T12:44:48.420668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:44:48.42067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:44:48.420672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:44:48.420674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tclusterName: old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.420676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:44:48.420678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tdns:\n"} +{"Time":"2023-05-31T12:44:48.42068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t type: CoreDNS\n"} +{"Time":"2023-05-31T12:44:48.420682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tetcd:\n"} +{"Time":"2023-05-31T12:44:48.420684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t local:\n"} +{"Time":"2023-05-31T12:44:48.420686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:44:48.420688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:44:48.420691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t listen-metrics-urls: http://127.0.0.1:2381,http://192.168.67.2:2381\n"} +{"Time":"2023-05-31T12:44:48.420693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tkubernetesVersion: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.420857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T12:44:48.42086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:44:48.420863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:44:48.420865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:44:48.420867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:44:48.420869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:44:48.420871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:44:48.420873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T12:44:48.420875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t x509:\n"} +{"Time":"2023-05-31T12:44:48.420877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:44:48.420879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:44:48.420881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:44:48.420883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T12:44:48.420885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T12:44:48.420887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T12:44:48.420889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:44:48.420891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T12:44:48.420893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t nodefs.available: \"0%\"\n"} +{"Time":"2023-05-31T12:44:48.420895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t nodefs.inodesFree: \"0%\"\n"} +{"Time":"2023-05-31T12:44:48.420897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t imagefs.available: \"0%\"\n"} +{"Time":"2023-05-31T12:44:48.420899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T12:44:48.420901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:44:48.420903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:44:48.420905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:44:48.421082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:44:48.421091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:44:48.421096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:44:48.421098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T12:44:48.4211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T12:44:48.421102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T12:44:48.421104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:44:48.421108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T12:44:48.42111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:44:48.421112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.421114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.227371 17302 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T12:44:48.421116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T12:44:48.421118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.42112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:44:48.421122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:44:48.421124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tExecStart=/var/lib/minikube/binaries/v1.16.0/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime=docker --hostname-override=old-k8s-version-787000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.67.2\n"} +{"Time":"2023-05-31T12:44:48.421127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.421129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:44:48.421131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t config:\n"} +{"Time":"2023-05-31T12:44:48.421133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-787000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T12:44:48.421272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.227446 17302 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.421276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.237558 17302 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T12:44:48.421278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.237630 17302 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T12:44:48.42128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.247889 17302 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (348 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.265685 17302 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.282812 17302 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2174 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.301132 17302 ssh_runner.go:195] Run: grep 192.168.67.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:44:48.42129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.306382 17302 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.67.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:44:48.421293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.320247 17302 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000 for IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:44:48.421296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.320270 17302 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.421298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.320436 17302 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T12:44:48.4213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.320505 17302 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T12:44:48.421303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.320571 17302 certs.go:319] generating minikube-user signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/client.key\n"} +{"Time":"2023-05-31T12:44:48.42144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.320584 17302 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/client.crt with IP's: []\n"} +{"Time":"2023-05-31T12:44:48.421444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.548831 17302 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/client.crt ...\n"} +{"Time":"2023-05-31T12:44:48.421446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.548845 17302 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/client.crt: {Name:mk950fd8db6b29a5c9607810b984fb114210eeff Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.421449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.549259 17302 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/client.key ...\n"} +{"Time":"2023-05-31T12:44:48.421451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.549270 17302 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/client.key: {Name:mke2c874ca608468810e7fa40ddb01c3ef4b29db Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.421453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.549518 17302 certs.go:319] generating minikube signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.key.c7fa3a9e\n"} +{"Time":"2023-05-31T12:44:48.421456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.549533 17302 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.crt.c7fa3a9e with IP's: [192.168.67.2 10.96.0.1 127.0.0.1 10.0.0.1]\n"} +{"Time":"2023-05-31T12:44:48.421458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.661448 17302 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.crt.c7fa3a9e ...\n"} +{"Time":"2023-05-31T12:44:48.421461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.661463 17302 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.crt.c7fa3a9e: {Name:mk3214ee32cc0a2496e0937b5e03a7b3576e9410 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.421463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.661747 17302 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.key.c7fa3a9e ...\n"} +{"Time":"2023-05-31T12:44:48.421466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.661755 17302 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.key.c7fa3a9e: {Name:mkc05268433cfe594576e37f4d0093b967405b5e Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.421602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.661954 17302 certs.go:337] copying /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.crt.c7fa3a9e -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.crt\n"} +{"Time":"2023-05-31T12:44:48.421607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.662130 17302 certs.go:341] copying /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.key.c7fa3a9e -\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.key\n"} +{"Time":"2023-05-31T12:44:48.42161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.662281 17302 certs.go:319] generating aggregator signed cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.key\n"} +{"Time":"2023-05-31T12:44:48.421612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.662298 17302 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.crt with IP's: []\n"} +{"Time":"2023-05-31T12:44:48.421615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.716970 17302 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.crt ...\n"} +{"Time":"2023-05-31T12:44:48.421617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.716984 17302 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.crt: {Name:mk77eb8ac4bf28664e86bf57970ed8ff4ac9f5c6 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.42162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.717273 17302 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.key ...\n"} +{"Time":"2023-05-31T12:44:48.421625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.717283 17302 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.key: {Name:mkeacb1aa10854ebebaa754c09a1d2c64f5c60de Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:44:48.421627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.717709 17302 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:44:48.42163-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:40:52.717769 17302 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T12:44:48.421634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.717791 17302 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.717835 17302 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.717876 17302 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.717913 17302 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.718001 17302 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.718540 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.743375 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.766357 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.789379 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.814059 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.838045 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.862765 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.885025 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.910625 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.936446 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.959706 17302 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.982581 17302 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T12:44:48.421923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:52.999965 17302 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T12:44:48.421926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.006614 17302 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T12:44:48.421928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.018226 17302 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:44:48.42193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.023430 17302 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:44:48.421932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.023491 17302 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:44:48.421935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.031340 17302 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T12:44:48.421937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.042946 17302 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T12:44:48.421942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.054111 17302 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:44:48.421944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.058950 17302 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:44:48.422098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.058997 17302 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:44:48.422101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.066496 17302 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T12:44:48.422104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.076508 17302 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T12:44:48.422106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.087072 17302 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:44:48.422108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.092428 17302 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:44:48.42211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.092490 17302 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:44:48.422113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.100552 17302 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T12:44:48.422115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.112179 17302 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T12:44:48.422118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.117094 17302 certs.go:353] certs directory doesn't exist, likely first start: ls /var/lib/minikube/certs/etcd: Process exited with status 2\n"} +{"Time":"2023-05-31T12:44:48.42212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.422124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.422126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.422128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/var/lib/minikube/certs/etcd': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.422132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.117178 17302 kubeadm.go:404] StartCluster: {Name:old-k8s-version-787000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-787000 Namespace:default APIServerName:minikubeCA APISer"} +{"Time":"2023-05-31T12:44:48.4223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"verNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.67.2 Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false Disab"} +{"Time":"2023-05-31T12:44:48.422303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"leMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:44:48.422306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.117331 17302 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:44:48.422308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.138758 17302 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:44:48.42231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.149425 17302 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:44:48.422312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.158707 17302 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:44:48.422315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.158766 17302 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:44:48.422317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.167782 17302 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:44:48.422496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.422499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.422501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.422503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.422505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.422508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.42251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.422513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.167813 17302 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:44:48.422516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.220715 17302 kubeadm.go:322] [init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.422518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.220769 17302 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.42252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.488933 17302 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.422523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.489126 17302 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.422525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.489237 17302 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.422527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.763099 17302 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.42253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.764499 17302 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.4227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.774364 17302 kubeadm.go:322] [kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.422708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.869233 17302 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.42271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.892674 17302 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:44:48.422715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.892774 17302 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.422717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:53.892863 17302 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.422719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:54.040351 17302 kubeadm.go:322] [certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.422722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:54.213832 17302 kubeadm.go:322] [certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.422724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:54.411126 17302 kubeadm.go:322] [certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.422726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:54.563569 17302 kubeadm.go:322] [certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.422728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:54.718490 17302 kubeadm.go:322] [certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.42273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:54.718673 17302 kubeadm.go:322] [certs] etcd/server serving cert is signed for DNS names [old-k8s-version-787000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:44:48.422733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:54.860819 17302 kubeadm.go:322] [certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.422735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:54.860952 17302 kubeadm.go:322] [certs] etcd/peer serving cert is signed for DNS names [old-k8s-version-787000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:44:48.42274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:55.031869 17302 kubeadm.go:322] [certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.422742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:55.259051 17302 kubeadm.go:322] [certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.422744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:55.353692 17302 kubeadm.go:322] [certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T12:44:48.422864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:55.354210 17302 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.422869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:55.460945 17302 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.422871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:55.703833 17302 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.422873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:55.811808 17302 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.422876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:56.124090 17302 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.422879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:56.125029 17302 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.422882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:56.146134 17302 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:44:48.422886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:56.146356 17302 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.422889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:56.146496 17302 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.422892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:56.146615 17302 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.422898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:56.146752 17302 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.422902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:40:56.146926 17302 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.422906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:41:36.142864 17302 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.42291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:41:36.143247 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.422912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:41:36.143453 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:41:41.144983 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.423013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:41:41.145206 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:41:51.146479 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.423018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:41:51.146705 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:11.148850 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.423026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:11.149054 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.149883 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.42303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150050 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150061 17302 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:44:48.423035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150086 17302 kubeadm.go:322] Unfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.423037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150116 17302 kubeadm.go:322] \ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.423039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150122 17302 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:44:48.423042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150161 17302 kubeadm.go:322] This error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.423168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150207 17302 kubeadm.go:322] \t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.423174-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150300 17302 kubeadm.go:322] \t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.423178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150311 17302 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:44:48.423181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150388 17302 kubeadm.go:322] If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.423183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150413 17302 kubeadm.go:322] \t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.423189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150437 17302 kubeadm.go:322] \t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.423191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150442 17302 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:44:48.423193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150533 17302 kubeadm.go:322] Additionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.423195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150607 17302 kubeadm.go:322] To troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.423198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150676 17302 kubeadm.go:322] Here is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.423202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150715 17302 kubeadm.go:322] \t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.423205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150777 17302 kubeadm.go:322] \tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.423207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.150809 17302 kubeadm.go:322] \t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.423209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.154013 17302 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.423212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.154075 17302 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.423326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.154170 17302 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.423331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.154244 17302 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.423334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.154319 17302 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.423337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.154388 17302 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.42334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:42:51.154879 17302 out.go:239] ! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.423343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.423345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.423347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.423349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.423351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.423354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.423356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.423358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.42336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.423362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.423549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.423555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.423563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.423567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.423571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.423574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.423578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.423581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] etcd/server serving cert is signed for DNS names [old-k8s-version-787000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:44:48.423585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.423589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] etcd/peer serving cert is signed for DNS names [old-k8s-version-787000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:44:48.423592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.423596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.423599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T12:44:48.423603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.42361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.423614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.423618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.423621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.423848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.423853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.423856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.423858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.42386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.423863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.423865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.423867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.423869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.423874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.423879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.423883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.423885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.424115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.42412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.424125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.424127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.424131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.424133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.424135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.424139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.424141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.424143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.424147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.42415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.424152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.424154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.424156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.424366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.424373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.424375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.424378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.42438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.424382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.424385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.424386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.424392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.424397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.424399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.424401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.424403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.424406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.424564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.42457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.424573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.424575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.424577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.42458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.424582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.424584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.424586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.424588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.424591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.424593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] etcd/server serving cert is signed for DNS names [old-k8s-version-787000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:44:48.424595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.424597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] etcd/peer serving cert is signed for DNS names [old-k8s-version-787000 localhost] and IPs [192.168.67.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T12:44:48.4246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.424602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T12:44:48.424604-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T12:44:48.424606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.424729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.424734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.424736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.424739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.424756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.42476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.424764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.424767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.424771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.424774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.424777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.424779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.424782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.424784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.424786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.424789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.424791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.424889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.424895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.424897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.4249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.424902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.424907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.424909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.42491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.424913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.424915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.424917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.424922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.424924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.424926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.424928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.42493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.424932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.425096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.425101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.425103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.425105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.425107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.42511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.425112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.425114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.425117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.425119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.425121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.425123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.425125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.154983 17302 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm reset --cri-socket /var/run/dockershim.sock --force\"\n"} +{"Time":"2023-05-31T12:44:48.425127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.571392 17302 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:44:48.42513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.583367 17302 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:44:48.425132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.583428 17302 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:44:48.425134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.593344 17302 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:44:48.425282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.425286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.425289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.425291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.425295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.425298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.4253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:44:48.425303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.593368 17302 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:44:48.425318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.645322 17302 kubeadm.go:322] [init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.425321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.645399 17302 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.425336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.901640 17302 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.425347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.901736 17302 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.425351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:51.901823 17302 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.425353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.085283 17302 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.425444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.086191 17302 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.425449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.092835 17302 kubeadm.go:322] [kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.425451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.165647 17302 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.425454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203274 17302 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:44:48.425458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203375 17302 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.425464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203471 17302 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.425466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203539 17302 kubeadm.go:322] [certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.425469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203592 17302 kubeadm.go:322] [certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.425471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203660 17302 kubeadm.go:322] [certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.425473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203715 17302 kubeadm.go:322] [certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.425475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203793 17302 kubeadm.go:322] [certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.42549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203857 17302 kubeadm.go:322] [certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.425497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.203969 17302 kubeadm.go:322] [certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.4255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.204081 17302 kubeadm.go:322] [certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.425548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.204116 17302 kubeadm.go:322] [certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:44:48.425554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.204162 17302 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.425556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.227281 17302 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.425559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.488644 17302 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.425564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.658334 17302 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.425569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.809184 17302 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.425571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.809748 17302 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.425574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.830959 17302 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:44:48.425576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.831111 17302 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.425578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.831263 17302 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.42558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.831409 17302 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.425583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.831551 17302 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.425697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:42:52.831844 17302 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.425701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:43:32.819064 17302 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.425704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:43:32.820108 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.425707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:43:32.820336 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.425713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:43:37.820682 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.425715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:43:37.820837 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.425717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:43:47.821972 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.425725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:43:47.822130 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.425728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:07.822937 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.42573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:07.823089 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.425733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824512 17302 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.425735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824656 17302 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.425738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824666 17302 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:44:48.42584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824704 17302 kubeadm.go:322] Unfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.425843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824739 17302 kubeadm.go:322] \ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.425846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824744 17302 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:44:48.425848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824775 17302 kubeadm.go:322] This error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.42585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824808 17302 kubeadm.go:322] \t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.425852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824914 17302 kubeadm.go:322] \t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.425854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.824923 17302 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:44:48.425857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825032 17302 kubeadm.go:322] If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.425859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825064 17302 kubeadm.go:322] \t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.425861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825096 17302 kubeadm.go:322] \t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.425863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825106 17302 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:44:48.425865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825178 17302 kubeadm.go:322] Additionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.425868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825258 17302 kubeadm.go:322] To troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.42587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825332 17302 kubeadm.go:322] Here is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.425872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825369 17302 kubeadm.go:322] \t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.425875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825427 17302 kubeadm.go:322] \tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.426011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.825453 17302 kubeadm.go:322] \t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.426013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.828350 17302 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.426016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.828428 17302 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.426019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.828532 17302 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.426021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.828615 17302 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.426024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.828681 17302 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.426026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.828752 17302 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.426028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.828803 17302 kubeadm.go:406] StartCluster complete in 3m54.709878181s\n"} +{"Time":"2023-05-31T12:44:48.426031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.828890 17302 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:44:48.426033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.849960 17302 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:44:48.426035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:47.849973 17302 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.426037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.850036 17302 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:44:48.426039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.870683 17302 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:44:48.426042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:47.870696 17302 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:44:48.426184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.870761 17302 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:44:48.426186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.891455 17302 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:44:48.426189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:47.891468 17302 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:44:48.426195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.891535 17302 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:44:48.426198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.912594 17302 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:44:48.4262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:47.912607 17302 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.426202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.912676 17302 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:44:48.426204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.932820 17302 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:44:48.426206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:47.932834 17302 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:44:48.426208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.932904 17302 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:44:48.426211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.954653 17302 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:44:48.426213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:47.954673 17302 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.426215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.954742 17302 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:44:48.426218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.974641 17302 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:44:48.42622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:47.974662 17302 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:44:48.426222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.974672 17302 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:44:48.426224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:47.974681 17302 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:44:48.426226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.013443 17302 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:44:48.42635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.013458 17302 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:44:48.426356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.027974 17302 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:44:48.426359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.027991 17302 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:44:48.426362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.086956 17302 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.426364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.426367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.426369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.426372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:44:48.426375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:44:48.426377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:44:48.426379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:44:48.426381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.426383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:44:48.426386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.086972 17302 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:44:48.426389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.086980 17302 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:44:48.426392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.104033 17302 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:44:48.426395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.104048 17302 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:44:48.426519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.160485 17302 out.go:369] Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.426524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.426526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.426528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.42653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.426532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.426535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.426537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.426539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.426545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.426548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.42655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.426553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.426555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.426559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.426561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.426684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.426689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.426691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.4267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.426704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.426706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:44:48.426709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.426711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.426713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.426715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.426717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.426723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.426725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.426727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.426729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.426731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.426734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.426736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.426897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.426901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.426903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.426905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.426918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.426921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.426926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.426929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.426931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.426933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.426935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.426937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.42694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.426941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.426943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.426955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.426958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.427079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.427083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.427085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.427087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.427089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.427092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.427094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.427096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.427098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.4271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.427103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.427108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.427109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.427112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.427114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.427116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.427119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.427121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.427123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.427301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.160507 17302 out.go:239] * \n"} +{"Time":"2023-05-31T12:44:48.427305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:44:48.427309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.160544 17302 out.go:239] X Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.427313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.427316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.427318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.42732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.427323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.427325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.427328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.427331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.427334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.427336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.427338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.42734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.427354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.427484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.427487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.42749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.427492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.427494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.427497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.427499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.427501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:44:48.427503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.427505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.427507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.427509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.427512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.427514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.427516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.427518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.427521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.427523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.427525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.427695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.427699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.427701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.427703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.427706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.427708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.42771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.427715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.427718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.42772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.427722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.427724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.427726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.427728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.42773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.427732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.427734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.427869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.427872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.427874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.427876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.427878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.42788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.427882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.427884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.427887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.427889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.427891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.427893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.427897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.427899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.427902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.427904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.427908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.42791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.428099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.428103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.428105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.428109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tX Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.428111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.428114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.428116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.428118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.42812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.428125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.428127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.428129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.428131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.428133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.428136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.428138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.428279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.428282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.428284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.428286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.428289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.428291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.428293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.428295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.428297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:44:48.428299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.428301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.428303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.428305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.428308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.42831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.428312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.428314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.428316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.428318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.428434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.428438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.42844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.428443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.428445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.428447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.42845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.428452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.428454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.428457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.428459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.428462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.428464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.428466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.428468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.428616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.428622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.428626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.428629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.428633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.428636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.428639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.428641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.428644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.428647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.428651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.428654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.428657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.428661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.428664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.428667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.428675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.428679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.428683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.428686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.428807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.428824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.428829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.428833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.42884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.160566 17302 out.go:239] * \n"} +{"Time":"2023-05-31T12:44:48.428844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:44:48.428848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.161170 17302 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:44:48.428861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:44:48.428869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:44:48.428873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:44:48.428877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:44:48.42888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:44:48.428884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:44:48.428888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:44:48.428894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:44:48.428986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:44:48.428993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:44:48.428998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:44:48.429002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:44:48.429005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:44:48.429009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:44:48.429012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:44:48.42902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.223960 17302 out.go:177] \n"} +{"Time":"2023-05-31T12:44:48.429025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.265824 17302 out.go:239] X Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.42903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.429033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.429036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.429039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.429042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.429162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.429168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.429172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.429176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.42918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.429194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.4292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.429203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.429207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.42921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.429213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.429224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.42923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.429232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.429248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.429254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:44:48.429271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.429279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.429299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.429384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.429397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.4294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.429402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.429405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.429407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.429409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.429412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.429414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.429416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.429419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.429421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.429423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.429426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.429434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.429437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.429592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.429599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.429603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.429607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.42961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.429614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.429617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.42962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.429623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.429627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.42963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.429633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.429636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.42964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.429643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.429646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.42965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.429653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.429656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.42966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.42978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.429795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.429798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.429801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.429808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.429813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.429819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.429822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.429826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.429828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.429831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tX Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:44:48.429836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:44:48.429838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:44:48.429841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:44:48.429843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.429846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:44:48.43-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:44:48.430007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:44:48.43001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:44:48.430012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:44:48.430018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:44:48.43002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.430024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.430027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.430029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.430031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.430034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:44:48.430037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.430041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.430043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.430046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:44:48.430048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:44:48.43005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:44:48.430066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.430204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.43021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.430213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:44:48.430233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.430239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:44:48.430241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:44:48.430244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:44:48.430246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:44:48.430248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:44:48.430251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:44:48.430253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.430257-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.43026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.430262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.430265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.430267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.430269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.430417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.430425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:44:48.430429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:44:48.430433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.430436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:44:48.43044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:44:48.430443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.430446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:44:48.430449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:44:48.430452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:44:48.430456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.430459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:44:48.430463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:44:48.430466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:44:48.430469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.430472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:44:48.430488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:44:48.430496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:44:48.4305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:44:48.430606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:44:48.43061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:44:48.430613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.430615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:44:48.430617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:44:48.43062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:44:48.430622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:44:48.430624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:44:48.430627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:44:48.43063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:44:48.430633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:44:48.430636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.265861 17302 out.go:239] * Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T12:44:48.43064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T12:44:48.430643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:44:48.265877 17302 out.go:239] * Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T12:44:48.430646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T12:44:48.430648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:44:48.286937 17302 out.go:177] \n"} +{"Time":"2023-05-31T12:44:48.43065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:44:48.430831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:44:48.430836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" start_stop_delete_test.go:188: failed starting minikube -first start-. args \"out/minikube-darwin-amd64 start -p old-k8s-version-787000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=docker --kubernetes-version=v1.16.0\": exit status 109\n"} +{"Time":"2023-05-31T12:44:48.430841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:44:48.430844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:230: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/FirstStart]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:44:48.430848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:231: (dbg) Run: docker inspect old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.474612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:235: (dbg) docker inspect old-k8s-version-787000:\n"} +{"Time":"2023-05-31T12:44:48.47464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:44:48.474645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:44:48.474647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t[\n"} +{"Time":"2023-05-31T12:44:48.474649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.474654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Id\": \"85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c\",\n"} +{"Time":"2023-05-31T12:44:48.474657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Created\": \"2023-05-31T19:40:35.508746161Z\",\n"} +{"Time":"2023-05-31T12:44:48.474661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:44:48.474664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:44:48.47467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:44:48.474676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.474681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:44:48.474687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:44:48.474693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:44:48.474697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:44:48.4747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:44:48.474717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:44:48.474722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:44:48.474726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Pid\": 287254,\n"} +{"Time":"2023-05-31T12:44:48.474731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:44:48.474737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.474744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"StartedAt\": \"2023-05-31T19:40:35.737118657Z\",\n"} +{"Time":"2023-05-31T12:44:48.47475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:44:48.474754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.474757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:44:48.47476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/resolv.conf\",\n"} +{"Time":"2023-05-31T12:44:48.474762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hostname\",\n"} +{"Time":"2023-05-31T12:44:48.474765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hosts\",\n"} +{"Time":"2023-05-31T12:44:48.474767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"LogPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c-json.log\",\n"} +{"Time":"2023-05-31T12:44:48.47477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Name\": \"/old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.474772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:44:48.474774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:44:48.474779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:44:48.474781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.474784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.474787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.474789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:44:48.474792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:44:48.474794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:44:48.474796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:44:48.474804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"old-k8s-version-787000:/var\"\n"} +{"Time":"2023-05-31T12:44:48.474812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.474815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.474823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:44:48.474826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:44:48.474833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:44:48.474838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.47484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"NetworkMode\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.474842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:44:48.474845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.474848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.474851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.474855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.474858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.474861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.474864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.474868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.47487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.474872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.474874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.474876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.474878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.47488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.474882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.474884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.474886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.474888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.47489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.474893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.474896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.4749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.474903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.474906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.474909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.474912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.474915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.474918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.474921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.474924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ]\n"} +{"Time":"2023-05-31T12:44:48.474928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.474931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:44:48.474934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:44:48.474937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:44:48.474941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.474944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:44:48.474947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.474951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:44:48.474954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:44:48.474957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:44:48.47496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t 0\n"} +{"Time":"2023-05-31T12:44:48.474964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.474967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:44:48.474971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:44:48.474974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:44:48.474977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:44:48.47498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:44:48.474983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:44:48.474987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:44:48.47499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:44:48.474993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:44:48.474996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.474998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:44:48.475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:44:48.475007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:44:48.475009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:44:48.475011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:44:48.475013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:44:48.475016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:44:48.475019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:44:48.475022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.475026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:44:48.475032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:44:48.475039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:44:48.475055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:44:48.475059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:44:48.475069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:44:48.475072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:44:48.475082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:44:48.475086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:44:48.475092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:44:48.4751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:44:48.475108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.47514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:44:48.475144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:44:48.475146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:44:48.475148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:44:48.47515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MemorySwap\": 2306867200,\n"} +{"Time":"2023-05-31T12:44:48.475153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:44:48.475155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:44:48.475157-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:44:48.475159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:44:48.475161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:44:48.475179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:44:48.475182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:44:48.47519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:44:48.475197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:44:48.475215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/merged\",\n"} +{"Time":"2023-05-31T12:44:48.475221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/diff\",\n"} +{"Time":"2023-05-31T12:44:48.475225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/work\"\n"} +{"Time":"2023-05-31T12:44:48.475228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:44:48.475236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:44:48.47526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.475264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:44:48.475266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:44:48.475269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:44:48.475271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:44:48.475273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:44:48.475275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:44:48.475277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.475281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:44:48.475284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Name\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.475286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Source\": \"/var/lib/docker/volumes/old-k8s-version-787000/_data\",\n"} +{"Time":"2023-05-31T12:44:48.475289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:44:48.475291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:44:48.475294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:44:48.475297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:44:48.4753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:44:48.475304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.47531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.475316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:44:48.475322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Hostname\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.475331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:44:48.475364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:44:48.475372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:44:48.475378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:44:48.475382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:48.475387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:48.475392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:48.475395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:48.4754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:44:48.475403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:44:48.47541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:44:48.475413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:44:48.475417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:44:48.47542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:44:48.475423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:44:48.475427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.47543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:44:48.475434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:44:48.475438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:44:48.475441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:44:48.475444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:44:48.47545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:44:48.475456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:44:48.475468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.475473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:44:48.475476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:44:48.475483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:44:48.475488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"mode.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.475495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"name.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.475501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:44:48.475505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:44:48.475513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:44:48.475521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"SandboxID\": \"032f45482abe2e3096840e03f50221040f75c41eab9f59f2d0c1e90f9ecf6b0b\",\n"} +{"Time":"2023-05-31T12:44:48.475528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:44:48.475531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:44:48.475541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.475545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.475548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.475552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"53505\"\n"} +{"Time":"2023-05-31T12:44:48.475557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.475563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.475567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.475571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.475575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.475584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"53506\"\n"} +{"Time":"2023-05-31T12:44:48.475594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.4756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.475605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.475612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.475619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.475624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"53507\"\n"} +{"Time":"2023-05-31T12:44:48.475627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.475639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.475647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.47565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.475654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.475657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"53503\"\n"} +{"Time":"2023-05-31T12:44:48.475661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.475664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.475667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.47567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.475673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.475682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"HostPort\": \"53504\"\n"} +{"Time":"2023-05-31T12:44:48.475685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.475688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ]\n"} +{"Time":"2023-05-31T12:44:48.475692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/032f45482abe\",\n"} +{"Time":"2023-05-31T12:44:48.475699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:44:48.475702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:44:48.475706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:44:48.475737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"old-k8s-version-787000\": {\n"} +{"Time":"2023-05-31T12:44:48.47574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:44:48.475742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IPv4Address\": \"192.168.67.2\"\n"} +{"Time":"2023-05-31T12:44:48.475744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.475747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:44:48.47575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:44:48.475754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"85229c23efd1\",\n"} +{"Time":"2023-05-31T12:44:48.475757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:44:48.47576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.475763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"NetworkID\": \"68ad52614037dbc86e2a2d399b5a866ee2022456e1a08bf7303a691be00e56ce\",\n"} +{"Time":"2023-05-31T12:44:48.475767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"EndpointID\": \"9f43fe54b788ef5520c0e9c83378d9d263f14de3e814814254a494c7161c5a13\",\n"} +{"Time":"2023-05-31T12:44:48.47577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"Gateway\": \"192.168.67.1\",\n"} +{"Time":"2023-05-31T12:44:48.475773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IPAddress\": \"192.168.67.2\",\n"} +{"Time":"2023-05-31T12:44:48.475777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:44:48.47578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.475789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:48.475792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"MacAddress\": \"02:42:c0:a8:43:02\",\n"} +{"Time":"2023-05-31T12:44:48.475794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:44:48.475796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.475798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.475816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.475821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.475825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t]\n"} +{"Time":"2023-05-31T12:44:48.475828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:44:48.475831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:44:48.475837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.853032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 6 (378.278465ms)\n"} +{"Time":"2023-05-31T12:44:48.853046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:44:48.853049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:44:48.853052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:44:48.853054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:44:48.853056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:44:48.853058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:44:48.85306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:44:48.853062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:44:48.853065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tE0531 12:44:48.840414 18022 status.go:415] kubeconfig endpoint: extract IP: \"old-k8s-version-787000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:44:48.853067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:44:48.853069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:44:48.853071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:44:48.853203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:241: \"old-k8s-version-787000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:44:48.853283-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp"} +{"Time":"2023-05-31T12:44:48.853291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/DeployApp\n"} +{"Time":"2023-05-31T12:44:48.853421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context old-k8s-version-787000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T12:44:48.889307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Non-zero exit: kubectl --context old-k8s-version-787000 create -f testdata/busybox.yaml: exit status 1 (35.695673ms)\n"} +{"Time":"2023-05-31T12:44:48.889321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:48.889324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:44:48.889326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \terror: context \"old-k8s-version-787000\" does not exist\n"} +{"Time":"2023-05-31T12:44:48.889328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:48.88933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:44:48.889332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: kubectl --context old-k8s-version-787000 create -f testdata/busybox.yaml failed: exit status 1\n"} +{"Time":"2023-05-31T12:44:48.889337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:44:48.889339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:230: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/DeployApp]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:44:48.88939-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:231: (dbg) Run: docker inspect old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:48.94183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:235: (dbg) docker inspect old-k8s-version-787000:\n"} +{"Time":"2023-05-31T12:44:48.941843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:48.941846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:44:48.941855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t[\n"} +{"Time":"2023-05-31T12:44:48.941858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.94186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Id\": \"85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c\",\n"} +{"Time":"2023-05-31T12:44:48.941862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Created\": \"2023-05-31T19:40:35.508746161Z\",\n"} +{"Time":"2023-05-31T12:44:48.941865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:44:48.941867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:44:48.941869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:44:48.941871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.941873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:44:48.941878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:44:48.94188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:44:48.941885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:44:48.941887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:44:48.941889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:44:48.941891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:44:48.941894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Pid\": 287254,\n"} +{"Time":"2023-05-31T12:44:48.941896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:44:48.941898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.9419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"StartedAt\": \"2023-05-31T19:40:35.737118657Z\",\n"} +{"Time":"2023-05-31T12:44:48.941902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:44:48.941904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.941906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:44:48.941909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/resolv.conf\",\n"} +{"Time":"2023-05-31T12:44:48.941912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hostname\",\n"} +{"Time":"2023-05-31T12:44:48.941914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hosts\",\n"} +{"Time":"2023-05-31T12:44:48.941917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LogPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c-json.log\",\n"} +{"Time":"2023-05-31T12:44:48.941921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Name\": \"/old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.941923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:44:48.941925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:44:48.941932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:44:48.941935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.941938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.941941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.941945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:44:48.941948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:44:48.94195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:44:48.941953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:44:48.941955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"old-k8s-version-787000:/var\"\n"} +{"Time":"2023-05-31T12:44:48.941957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.941959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.941961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:44:48.941964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:44:48.941968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:44:48.941971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.941974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"NetworkMode\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.941978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:44:48.941981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.941983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.941985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.941987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.941989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.941991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.941993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.941996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.942005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.942009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.942018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.942024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.942027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.942053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.942059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.942061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.94207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.942077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:48.94208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ]\n"} +{"Time":"2023-05-31T12:44:48.942086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:44:48.942092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:44:48.942096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:44:48.942099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:44:48.942106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:44:48.942111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:44:48.942113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:44:48.942115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t 0\n"} +{"Time":"2023-05-31T12:44:48.942117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:44:48.942122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:44:48.942124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:44:48.942126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:44:48.942128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:44:48.942131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:44:48.942135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:44:48.942138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:44:48.94214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:44:48.942142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:44:48.942146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.94215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:44:48.942152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:44:48.942154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:44:48.942156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:44:48.942162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:44:48.942164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:44:48.942169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:44:48.942171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942174-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:44:48.942176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:44:48.94218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:44:48.942201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:44:48.942208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:44:48.942216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:44:48.942218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.94222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:44:48.942225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:44:48.942227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:44:48.942229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:44:48.942231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:44:48.942233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:44:48.94225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942257-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:44:48.942259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:44:48.942261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:44:48.942263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MemorySwap\": 2306867200,\n"} +{"Time":"2023-05-31T12:44:48.942267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:44:48.942271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:44:48.942275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:44:48.942278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:44:48.942281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:44:48.94229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:44:48.942296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:44:48.9423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:44:48.942309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:44:48.942312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:44:48.942314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/merged\",\n"} +{"Time":"2023-05-31T12:44:48.942317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/diff\",\n"} +{"Time":"2023-05-31T12:44:48.942321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/work\"\n"} +{"Time":"2023-05-31T12:44:48.942324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:44:48.94233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:44:48.942334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:44:48.942338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:44:48.94234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:44:48.942343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:44:48.942345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:44:48.942347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:44:48.942353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.94236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:44:48.942362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Name\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.942365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Source\": \"/var/lib/docker/volumes/old-k8s-version-787000/_data\",\n"} +{"Time":"2023-05-31T12:44:48.942368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:44:48.94237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:44:48.942372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:44:48.942374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:44:48.942376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:44:48.942378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.94238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:44:48.942385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Hostname\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.942387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:44:48.942393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:44:48.942396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:44:48.942399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:44:48.942402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:48.942404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:48.942406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:48.942409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:48.942412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:44:48.942415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:44:48.942421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:44:48.942424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:44:48.942427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:44:48.942431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:44:48.942434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:44:48.94244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:44:48.942448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:44:48.942451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:44:48.942454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:44:48.942458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:44:48.942461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:44:48.942464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:44:48.942468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:44:48.942474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:44:48.942478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:44:48.942481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"mode.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.942485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"name.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:48.942492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:44:48.942495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:44:48.942514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:44:48.942519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SandboxID\": \"032f45482abe2e3096840e03f50221040f75c41eab9f59f2d0c1e90f9ecf6b0b\",\n"} +{"Time":"2023-05-31T12:44:48.942524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:44:48.942526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:44:48.942533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.942539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.942545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53505\"\n"} +{"Time":"2023-05-31T12:44:48.942548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.942556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.942561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53506\"\n"} +{"Time":"2023-05-31T12:44:48.942563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.942569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.942576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53507\"\n"} +{"Time":"2023-05-31T12:44:48.942578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.94258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.942586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.942588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.94259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53503\"\n"} +{"Time":"2023-05-31T12:44:48.942592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:48.942598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:48.9426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:48.942602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53504\"\n"} +{"Time":"2023-05-31T12:44:48.942604-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ]\n"} +{"Time":"2023-05-31T12:44:48.942608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.94261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/032f45482abe\",\n"} +{"Time":"2023-05-31T12:44:48.942613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:44:48.942615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:44:48.942617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.94262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:44:48.942643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"old-k8s-version-787000\": {\n"} +{"Time":"2023-05-31T12:44:48.942648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:44:48.942655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPv4Address\": \"192.168.67.2\"\n"} +{"Time":"2023-05-31T12:44:48.942658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:48.942661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:44:48.942665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:44:48.942668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"85229c23efd1\",\n"} +{"Time":"2023-05-31T12:44:48.942671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:44:48.942674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:48.942678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"NetworkID\": \"68ad52614037dbc86e2a2d399b5a866ee2022456e1a08bf7303a691be00e56ce\",\n"} +{"Time":"2023-05-31T12:44:48.942681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"EndpointID\": \"9f43fe54b788ef5520c0e9c83378d9d263f14de3e814814254a494c7161c5a13\",\n"} +{"Time":"2023-05-31T12:44:48.942684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Gateway\": \"192.168.67.1\",\n"} +{"Time":"2023-05-31T12:44:48.942686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPAddress\": \"192.168.67.2\",\n"} +{"Time":"2023-05-31T12:44:48.942688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:44:48.94269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:48.942694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:48.942698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MacAddress\": \"02:42:c0:a8:43:02\",\n"} +{"Time":"2023-05-31T12:44:48.942701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:44:48.942703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.94271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:48.942714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t]\n"} +{"Time":"2023-05-31T12:44:48.942716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:48.942718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:44:48.942722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:49.303511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 6 (361.45661ms)\n"} +{"Time":"2023-05-31T12:44:49.303525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:49.303528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:44:49.30353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:44:49.303532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:44:49.303535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:44:49.303537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:49.303539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:44:49.303541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:44:49.303543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tE0531 12:44:49.290681 18035 status.go:415] kubeconfig endpoint: extract IP: \"old-k8s-version-787000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:44:49.303546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:49.303548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:44:49.30355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:44:49.303553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:241: \"old-k8s-version-787000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:44:49.303557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:44:49.30357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:230: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/DeployApp]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:44:49.303682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:231: (dbg) Run: docker inspect old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:49.354478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:235: (dbg) docker inspect old-k8s-version-787000:\n"} +{"Time":"2023-05-31T12:44:49.354492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:49.354495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:44:49.354497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t[\n"} +{"Time":"2023-05-31T12:44:49.354499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.354501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Id\": \"85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c\",\n"} +{"Time":"2023-05-31T12:44:49.35451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Created\": \"2023-05-31T19:40:35.508746161Z\",\n"} +{"Time":"2023-05-31T12:44:49.354512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:44:49.354515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:44:49.354518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:44:49.35452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.354522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:44:49.354524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:44:49.354526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:44:49.354528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:44:49.354531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:44:49.354533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:44:49.354535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:44:49.354537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Pid\": 287254,\n"} +{"Time":"2023-05-31T12:44:49.354539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"StartedAt\": \"2023-05-31T19:40:35.737118657Z\",\n"} +{"Time":"2023-05-31T12:44:49.354548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:44:49.35455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.354552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:44:49.354555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/resolv.conf\",\n"} +{"Time":"2023-05-31T12:44:49.354558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hostname\",\n"} +{"Time":"2023-05-31T12:44:49.354561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hosts\",\n"} +{"Time":"2023-05-31T12:44:49.354563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LogPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c-json.log\",\n"} +{"Time":"2023-05-31T12:44:49.354566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Name\": \"/old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:49.354568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:44:49.35457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:44:49.354572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:44:49.354574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.35458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:44:49.354583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:44:49.354585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:44:49.354587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:44:49.354589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"old-k8s-version-787000:/var\"\n"} +{"Time":"2023-05-31T12:44:49.354591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.354593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:44:49.354597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:44:49.354599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:44:49.354601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.354603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"NetworkMode\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:49.354605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:44:49.354607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.35461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.354611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.354614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:49.354616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.354618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.354621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.354624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.354628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.35464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:49.354648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.354653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.354659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.354664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.354668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.354672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:49.354675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.354677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.35468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.354683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.354686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.354689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:49.354691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.354693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.354695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.354697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.354701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.354703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:44:49.354705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.354707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ]\n"} +{"Time":"2023-05-31T12:44:49.354709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.354711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:44:49.354713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:44:49.354716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:44:49.354718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.354722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:44:49.354725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:44:49.354729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:44:49.354731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:44:49.354733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t 0\n"} +{"Time":"2023-05-31T12:44:49.354735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.354737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:44:49.354739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:44:49.354741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:44:49.354743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:44:49.354746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:44:49.354748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:44:49.35475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:44:49.354752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:44:49.354754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:44:49.354758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.35476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:44:49.354762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:44:49.354768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:44:49.35477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:44:49.354772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:44:49.354777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:44:49.354779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:44:49.354782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:44:49.354784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.354786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:44:49.354788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.35479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:44:49.354792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.354794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:44:49.3548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:44:49.354802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:44:49.35481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:44:49.354813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:44:49.354821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:44:49.354823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:44:49.354826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:44:49.354828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:44:49.35483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:44:49.354849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:44:49.354852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:44:49.354855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MemorySwap\": 2306867200,\n"} +{"Time":"2023-05-31T12:44:49.354859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:44:49.354861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:44:49.354863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:44:49.354871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:44:49.354873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:44:49.354881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:44:49.354883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:44:49.354885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.354887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:44:49.354889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:44:49.354891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:44:49.354894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/merged\",\n"} +{"Time":"2023-05-31T12:44:49.354896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/diff\",\n"} +{"Time":"2023-05-31T12:44:49.354898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/work\"\n"} +{"Time":"2023-05-31T12:44:49.354901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.354903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:44:49.354908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.35491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:44:49.354913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.354916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:44:49.354918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:44:49.35492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:44:49.354922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:44:49.354924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:44:49.354926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:44:49.354928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.354942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.354948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:44:49.35495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Name\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:49.354953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Source\": \"/var/lib/docker/volumes/old-k8s-version-787000/_data\",\n"} +{"Time":"2023-05-31T12:44:49.354955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:44:49.354957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:44:49.35496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:44:49.354962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:44:49.354964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:44:49.354966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.354968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.354971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:44:49.354973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Hostname\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:49.354975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.354979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:44:49.354981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:44:49.354984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:44:49.354986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:44:49.354988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:49.35499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:49.354992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:49.354994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:44:49.354996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:44:49.354998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:44:49.355003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:44:49.355005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:44:49.355007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:44:49.355009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:44:49.355011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:44:49.355013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.355015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:44:49.355017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:44:49.355019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:44:49.355021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:44:49.355023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:44:49.355026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:44:49.355028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:44:49.355034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.355036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:44:49.355038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:44:49.35504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:44:49.355042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"mode.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:49.355044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"name.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:44:49.355047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:44:49.355049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.355051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:44:49.355053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.355055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:44:49.355057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SandboxID\": \"032f45482abe2e3096840e03f50221040f75c41eab9f59f2d0c1e90f9ecf6b0b\",\n"} +{"Time":"2023-05-31T12:44:49.355061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:44:49.355063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:49.355068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:44:49.35507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.355074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.355077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.355079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53505\"\n"} +{"Time":"2023-05-31T12:44:49.355081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.355083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.355085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.355087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.355089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.355091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53506\"\n"} +{"Time":"2023-05-31T12:44:49.355093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.355095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.355097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.355099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.355101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.355106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53507\"\n"} +{"Time":"2023-05-31T12:44:49.355108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.35511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.355112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.355115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.355117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.355119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53503\"\n"} +{"Time":"2023-05-31T12:44:49.355121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.355123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.355127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:44:49.355131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t {\n"} +{"Time":"2023-05-31T12:44:49.355134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:44:49.355137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"HostPort\": \"53504\"\n"} +{"Time":"2023-05-31T12:44:49.355144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.355147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ]\n"} +{"Time":"2023-05-31T12:44:49.355151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.355154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/032f45482abe\",\n"} +{"Time":"2023-05-31T12:44:49.355157-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:44:49.355161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:44:49.355165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:49.355183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:49.35519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:44:49.3552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"old-k8s-version-787000\": {\n"} +{"Time":"2023-05-31T12:44:49.355202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:44:49.355204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPv4Address\": \"192.168.67.2\"\n"} +{"Time":"2023-05-31T12:44:49.355207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t },\n"} +{"Time":"2023-05-31T12:44:49.355209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:44:49.355211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:44:49.355213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"85229c23efd1\",\n"} +{"Time":"2023-05-31T12:44:49.355215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:44:49.355217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t ],\n"} +{"Time":"2023-05-31T12:44:49.355219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"NetworkID\": \"68ad52614037dbc86e2a2d399b5a866ee2022456e1a08bf7303a691be00e56ce\",\n"} +{"Time":"2023-05-31T12:44:49.355222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"EndpointID\": \"9f43fe54b788ef5520c0e9c83378d9d263f14de3e814814254a494c7161c5a13\",\n"} +{"Time":"2023-05-31T12:44:49.355225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"Gateway\": \"192.168.67.1\",\n"} +{"Time":"2023-05-31T12:44:49.355228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPAddress\": \"192.168.67.2\",\n"} +{"Time":"2023-05-31T12:44:49.35523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:44:49.355232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:44:49.355236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:44:49.355238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"MacAddress\": \"02:42:c0:a8:43:02\",\n"} +{"Time":"2023-05-31T12:44:49.35524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:44:49.355243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.355245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.355247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.355249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t }\n"} +{"Time":"2023-05-31T12:44:49.355251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \t]\n"} +{"Time":"2023-05-31T12:44:49.355253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:49.355255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:44:49.355259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:44:49.410129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":"E0531 12:44:49.410093 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:49.715708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 6 (361.07988ms)\n"} +{"Time":"2023-05-31T12:44:49.715738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:49.715746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:44:49.715749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:44:49.715751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:44:49.715754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:44:49.715755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:49.715758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:44:49.715768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:44:49.71577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tE0531 12:44:49.702374 18047 status.go:415] kubeconfig endpoint: extract IP: \"old-k8s-version-787000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:44:49.715773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:44:49.715775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:44:49.715777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:44:49.715782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:241: \"old-k8s-version-787000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:44:49.71579-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:44:49.715792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:44:49.715796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-amd64 addons enable metrics-server -p old-k8s-version-787000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:44:50.218685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.218636 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.224663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.224607 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.236825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.236750 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.247379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.247340 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.252733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.252706 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.256972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.256946 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.263631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.263558 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.284272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.284197 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.297232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.297179 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.324601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.324549 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.377368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.377328 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.405605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.405568 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.537722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.537693 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.565919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.565889 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.859051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.858953 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:50.886087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:50.886036 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:51.376954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:51.376925 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:51.501212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:51.501164 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:51.526422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:51.526395 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:52.837438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:52.782910 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:52.83746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:52.807039 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:55.3983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:55.398246 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:44:55.398806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:44:55.398760 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:45:00.518647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:45:00.518609 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:45:00.519813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:45:00.519784 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:45:10.759001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:45:10.758971 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:45:10.76016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:45:10.760143 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:45:17.094994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:45:17.094944 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:45:31.240963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:45:31.240928 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:45:31.240978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:45:31.240936 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:45:58.067403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:45:58.067358 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:46:02.837247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:46:02.833309 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:46:12.206945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:46:12.206916 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:46:12.207719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:46:12.207703 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:46:13.304771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"E0531 12:46:13.304725 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:46:15.749929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Non-zero exit: out/minikube-darwin-amd64 addons enable metrics-server -p old-k8s-version-787000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain: exit status 10 (1m26.023275141s)\n"} +{"Time":"2023-05-31T12:46:15.749947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:15.749951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:46:15.749954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t* metrics-server is an addon maintained by Kubernetes. For any concerns contact minikube on GitHub.\n"} +{"Time":"2023-05-31T12:46:15.749958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tYou can view the list of minikube maintainers at: https://github.com/kubernetes/minikube/blob/master/OWNERS\n"} +{"Time":"2023-05-31T12:46:15.749961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t - Using image fake.domain/registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:46:15.749964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t\n"} +{"Time":"2023-05-31T12:46:15.749967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t\n"} +{"Time":"2023-05-31T12:46:15.74997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:15.749973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:46:15.749976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:46:15.749979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tX Exiting due to MK_ADDON_ENABLE: enable failed: run callbacks: running callbacks: [sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.16.0/kubectl apply --force -f /etc/kubernetes/addons/metrics-apiservice.yaml -f /etc/kubernetes/addons/metrics-server-deployment.yaml -f /etc/kubernetes/addons/metrics-server-rbac.yaml -f /etc/kubernetes/addons/metrics-server-service.yaml: Process exited with status 1\n"} +{"Time":"2023-05-31T12:46:15.749982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:46:15.749986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t\n"} +{"Time":"2023-05-31T12:46:15.749988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:46:15.749992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-apiservice.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.749995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-server-deployment.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.749998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-server-rbac.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.750002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-server-rbac.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.750005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-server-rbac.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.750008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-server-rbac.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.750011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-server-rbac.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.750015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-server-rbac.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.750018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tunable to recognize \"/etc/kubernetes/addons/metrics-server-service.yaml\": Get https://localhost:8443/api?timeout=32s: dial tcp 127.0.0.1:8443: connect: connection refused\n"} +{"Time":"2023-05-31T12:46:15.750021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t]\n"} +{"Time":"2023-05-31T12:46:15.750023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t* \n"} +{"Time":"2023-05-31T12:46:15.750027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t╭───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:46:15.750031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:46:15.750034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:46:15.750037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:46:15.75004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:46:15.750043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:46:15.750047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T12:46:15.75005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t│ * - /var/folders/xd/3vdzn10d2gb_wxr7lj_p8h5c0000gp/T/minikube_addons_2bafae6fa40fec163538f94366e390b0317a8b15_0.log │\n"} +{"Time":"2023-05-31T12:46:15.750055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:46:15.750061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t╰───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:46:15.750066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:15.750071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:46:15.750076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:207: failed to enable an addon post-stop. args \"out/minikube-darwin-amd64 addons enable metrics-server -p old-k8s-version-787000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\": exit status 10\n"} +{"Time":"2023-05-31T12:46:15.750093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context old-k8s-version-787000 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T12:46:15.786721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Non-zero exit: kubectl --context old-k8s-version-787000 describe deploy/metrics-server -n kube-system: exit status 1 (36.569041ms)\n"} +{"Time":"2023-05-31T12:46:15.786734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:15.786737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:46:15.786739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \terror: context \"old-k8s-version-787000\" does not exist\n"} +{"Time":"2023-05-31T12:46:15.786742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:15.786744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:46:15.786752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:217: failed to get info on auto-pause deployments. args \"kubectl --context old-k8s-version-787000 describe deploy/metrics-server -n kube-system\": exit status 1\n"} +{"Time":"2023-05-31T12:46:15.786756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:221: addon did not load correct image. Expected to contain \" fake.domain/registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:46:15.786761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:46:15.786764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:230: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:46:15.786903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:231: (dbg) Run: docker inspect old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:46:15.837661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:235: (dbg) docker inspect old-k8s-version-787000:\n"} +{"Time":"2023-05-31T12:46:15.837675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:15.837677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:46:15.83768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t[\n"} +{"Time":"2023-05-31T12:46:15.837682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.837684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Id\": \"85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c\",\n"} +{"Time":"2023-05-31T12:46:15.837687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Created\": \"2023-05-31T19:40:35.508746161Z\",\n"} +{"Time":"2023-05-31T12:46:15.837689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:46:15.837692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:46:15.837694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:46:15.837696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.837699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:46:15.837702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:46:15.837709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:46:15.837712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:46:15.837714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:46:15.837716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:46:15.837718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:46:15.83772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Pid\": 287254,\n"} +{"Time":"2023-05-31T12:46:15.837722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:46:15.837724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.837726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"StartedAt\": \"2023-05-31T19:40:35.737118657Z\",\n"} +{"Time":"2023-05-31T12:46:15.837729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"FinishedAt\": \"0001-01-01T00:00:00Z\"\n"} +{"Time":"2023-05-31T12:46:15.837731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.837733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:46:15.837737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/resolv.conf\",\n"} +{"Time":"2023-05-31T12:46:15.83774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hostname\",\n"} +{"Time":"2023-05-31T12:46:15.837746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hosts\",\n"} +{"Time":"2023-05-31T12:46:15.83775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"LogPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c-json.log\",\n"} +{"Time":"2023-05-31T12:46:15.83776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Name\": \"/old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:46:15.837767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:46:15.837773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:46:15.837781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:46:15.837786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.837789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.837792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.837797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:46:15.837803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:46:15.837807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:46:15.837809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:46:15.837811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"old-k8s-version-787000:/var\"\n"} +{"Time":"2023-05-31T12:46:15.837813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.837815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.837818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:46:15.837822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:46:15.837825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:46:15.837827-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.837829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"NetworkMode\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:46:15.837831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:46:15.837833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.837836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.837839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.837843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:46:15.837846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.837854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.837857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.837861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.837863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.837865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:46:15.837867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.837869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.837872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.837874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.837876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.837878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:46:15.83788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.837886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.837888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.83789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.837892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.837895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:46:15.837897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.837899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.837901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.837903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.837905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.837907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:46:15.837909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.837911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ]\n"} +{"Time":"2023-05-31T12:46:15.837914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.837917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:46:15.83792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:46:15.837925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:46:15.837931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.837936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:46:15.837943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.83795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:46:15.837956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:46:15.837963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:46:15.837968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t 0\n"} +{"Time":"2023-05-31T12:46:15.837971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.837975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:46:15.837978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:46:15.83798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:46:15.837982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:46:15.837984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:46:15.837986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:46:15.837988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:46:15.83799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:46:15.837993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:46:15.837996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.837999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:46:15.838001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:46:15.838007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:46:15.838012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:46:15.838014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:46:15.838016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:46:15.838018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:46:15.838021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:46:15.838023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:46:15.838027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:46:15.838033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.838035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:46:15.838041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:46:15.838043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:46:15.838049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:46:15.838051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:46:15.838058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:46:15.83806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:46:15.838062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:46:15.838064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:46:15.838066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:46:15.83807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:46:15.83808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:46:15.838082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:46:15.838084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MemorySwap\": 2306867200,\n"} +{"Time":"2023-05-31T12:46:15.838088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:46:15.83809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:46:15.838092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:46:15.838094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:46:15.838097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:46:15.8381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:46:15.83811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:46:15.838113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.838116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:46:15.838119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:46:15.838127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:46:15.838134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/merged\",\n"} +{"Time":"2023-05-31T12:46:15.838141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/diff\",\n"} +{"Time":"2023-05-31T12:46:15.838145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/work\"\n"} +{"Time":"2023-05-31T12:46:15.838151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.838157-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:46:15.838159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.838161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:46:15.838166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.838168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:46:15.83817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:46:15.838172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:46:15.838177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:46:15.838179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:46:15.838182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:46:15.838185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.838187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.838188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:46:15.838191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Name\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:46:15.838193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Source\": \"/var/lib/docker/volumes/old-k8s-version-787000/_data\",\n"} +{"Time":"2023-05-31T12:46:15.838195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:46:15.838197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:46:15.838199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:46:15.838201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:46:15.838203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:46:15.838205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.838224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:46:15.838237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Hostname\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:46:15.838241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:46:15.838257-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:46:15.83826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:46:15.838267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:46:15.838272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:46:15.838276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:46:15.838279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:46:15.838282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:46:15.83829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:46:15.838298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.8383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:46:15.838303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:46:15.838305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:46:15.838307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:46:15.838309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:46:15.838311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:46:15.838313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:46:15.838318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:46:15.83832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:46:15.838322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:46:15.838325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:46:15.838328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:46:15.83833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:46:15.838332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:46:15.838337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:46:15.838339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:46:15.838341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"mode.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:46:15.838347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"name.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:46:15.838349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:46:15.838353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.838356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:46:15.838358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.83836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:46:15.838362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"SandboxID\": \"032f45482abe2e3096840e03f50221040f75c41eab9f59f2d0c1e90f9ecf6b0b\",\n"} +{"Time":"2023-05-31T12:46:15.838367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:46:15.838369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:46:15.838376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.838378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.83838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.838382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"53505\"\n"} +{"Time":"2023-05-31T12:46:15.838384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.838386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.838391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.838394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.8384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"53506\"\n"} +{"Time":"2023-05-31T12:46:15.838406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.83841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.838418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.838424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.838429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"53507\"\n"} +{"Time":"2023-05-31T12:46:15.838435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.83844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.838448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.838452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.838456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"53503\"\n"} +{"Time":"2023-05-31T12:46:15.838465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.838468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:46:15.838473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t {\n"} +{"Time":"2023-05-31T12:46:15.838475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:46:15.838477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"HostPort\": \"53504\"\n"} +{"Time":"2023-05-31T12:46:15.838479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.838481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ]\n"} +{"Time":"2023-05-31T12:46:15.838483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.838485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/032f45482abe\",\n"} +{"Time":"2023-05-31T12:46:15.838487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:46:15.838489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:46:15.838492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:46:15.8385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:46:15.838507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:46:15.838513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"old-k8s-version-787000\": {\n"} +{"Time":"2023-05-31T12:46:15.838515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:46:15.838517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IPv4Address\": \"192.168.67.2\"\n"} +{"Time":"2023-05-31T12:46:15.838519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t },\n"} +{"Time":"2023-05-31T12:46:15.838521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:46:15.838524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:46:15.838526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"85229c23efd1\",\n"} +{"Time":"2023-05-31T12:46:15.838528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:46:15.83853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t ],\n"} +{"Time":"2023-05-31T12:46:15.838532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"NetworkID\": \"68ad52614037dbc86e2a2d399b5a866ee2022456e1a08bf7303a691be00e56ce\",\n"} +{"Time":"2023-05-31T12:46:15.838535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"EndpointID\": \"9f43fe54b788ef5520c0e9c83378d9d263f14de3e814814254a494c7161c5a13\",\n"} +{"Time":"2023-05-31T12:46:15.838537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"Gateway\": \"192.168.67.1\",\n"} +{"Time":"2023-05-31T12:46:15.838539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IPAddress\": \"192.168.67.2\",\n"} +{"Time":"2023-05-31T12:46:15.838541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:46:15.838543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:46:15.838548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:46:15.83855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"MacAddress\": \"02:42:c0:a8:43:02\",\n"} +{"Time":"2023-05-31T12:46:15.838552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:46:15.838554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.838556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.838558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.83856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t }\n"} +{"Time":"2023-05-31T12:46:15.838562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \t]\n"} +{"Time":"2023-05-31T12:46:15.838564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:15.838566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:46:15.83857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:46:16.194414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 6 (356.179776ms)\n"} +{"Time":"2023-05-31T12:46:16.194427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:16.19443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:46:16.194433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:46:16.194435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tWARNING: Your kubectl is pointing to stale minikube-vm.\n"} +{"Time":"2023-05-31T12:46:16.194444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tTo fix the kubectl context, run `minikube update-context`\n"} +{"Time":"2023-05-31T12:46:16.194446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:16.194448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:46:16.19445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:46:16.194452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tE0531 12:46:16.181708 18083 status.go:415] kubeconfig endpoint: extract IP: \"old-k8s-version-787000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:46:16.194455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:46:16.194457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:46:16.194459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: status error: exit status 6 (may be ok)\n"} +{"Time":"2023-05-31T12:46:16.194462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:241: \"old-k8s-version-787000\" host is not running, skipping log retrieval (state=\"Running\\nWARNING: Your kubectl is pointing to stale minikube-vm.\\nTo fix the kubectl context, run `minikube update-context`\")\n"} +{"Time":"2023-05-31T12:46:16.194475-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/Stop"} +{"Time":"2023-05-31T12:46:16.194477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/Stop\n"} +{"Time":"2023-05-31T12:46:16.194535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-amd64 stop -p old-k8s-version-787000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:46:17.725873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-darwin-amd64 stop -p old-k8s-version-787000 --alsologtostderr -v=3: (1.529488797s)\n"} +{"Time":"2023-05-31T12:46:17.725905-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:46:17.725908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:46:17.725964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:46:17.857271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 7 (131.08541ms)\n"} +{"Time":"2023-05-31T12:46:17.85729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:46:17.857293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:46:17.857296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:46:17.857298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:46:17.857301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:46:17.857303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:46:17.857307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-amd64 addons enable dashboard -p old-k8s-version-787000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:46:18.109986-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart"} +{"Time":"2023-05-31T12:46:18.109997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/SecondStart\n"} +{"Time":"2023-05-31T12:46:18.110032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-amd64 start -p old-k8s-version-787000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=docker --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T12:46:31.018957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 12:46:31.018883 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:46:31.130899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 12:46:31.130868 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:46:42.430368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 12:46:42.430336 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:46:58.717695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 12:46:58.717660 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:47:10.118475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 12:47:10.118428 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:47:14.798184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 12:47:14.798152 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:47:18.495703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 12:47:18.495666 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:47:29.840035-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-darwin-amd64 start -p no-preload-344000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=docker --kubernetes-version=v1.27.2: (5m31.233714982s)\n"} +{"Time":"2023-05-31T12:47:29.840092-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p no-preload-344000 -n no-preload-344000\n"} +{"Time":"2023-05-31T12:47:30.229783-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T12:47:30.229797-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T12:47:30.230664-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/no-preload/serial/UserAppExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T12:47:30.240451-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-whrfh\" [db85b3c0-b51f-4f40-a6f9-3cf780881fdd] Pending / Ready:ContainersNotReady (containers with unready status: [kubernetes-dashboard]) / ContainersReady:ContainersNotReady (containers with unready status: [kubernetes-dashboard])\n"} +{"Time":"2023-05-31T12:47:31.745465-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":"E0531 12:47:31.745424 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:47:34.152502-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":"E0531 12:47:34.152474 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:47:34.153577-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":"E0531 12:47:34.153559 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:47:38.244864-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-whrfh\" [db85b3c0-b51f-4f40-a6f9-3cf780881fdd] Running\n"} +{"Time":"2023-05-31T12:47:44.244735-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/no-preload/serial/UserAppExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 14.013783353s\n"} +{"Time":"2023-05-31T12:47:44.244751-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T12:47:44.244754-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T12:47:44.245459-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/no-preload/serial/AddonExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T12:47:44.250462-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-whrfh\" [db85b3c0-b51f-4f40-a6f9-3cf780881fdd] Running\n"} +{"Time":"2023-05-31T12:47:49.254107-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/no-preload/serial/AddonExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.008557185s\n"} +{"Time":"2023-05-31T12:47:49.254187-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context no-preload-344000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T12:47:49.354057-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T12:47:49.354078-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/no-preload/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T12:47:49.354104-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-amd64 ssh -p no-preload-344000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T12:47:49.788876-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T12:47:49.788967-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/Pause"} +{"Time":"2023-05-31T12:47:49.788982-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":"=== RUN TestStartStop/group/no-preload/serial/Pause\n"} +{"Time":"2023-05-31T12:47:49.788995-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 pause -p no-preload-344000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:47:50.474446-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p no-preload-344000 -n no-preload-344000\n"} +{"Time":"2023-05-31T12:47:50.844535-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p no-preload-344000 -n no-preload-344000: exit status 2 (370.017739ms)\n"} +{"Time":"2023-05-31T12:47:50.844548-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:47:50.844553-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:47:50.844555-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T12:47:50.844558-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:47:50.84456-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:47:50.844568-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T12:47:50.844573-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p no-preload-344000 -n no-preload-344000\n"} +{"Time":"2023-05-31T12:47:51.221118-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p no-preload-344000 -n no-preload-344000: exit status 2 (376.472814ms)\n"} +{"Time":"2023-05-31T12:47:51.221132-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:47:51.221136-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:47:51.221138-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:47:51.22114-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:47:51.221142-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:47:51.221144-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T12:47:51.221148-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 unpause -p no-preload-344000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:47:51.902976-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p no-preload-344000 -n no-preload-344000\n"} +{"Time":"2023-05-31T12:47:52.475247-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p no-preload-344000 -n no-preload-344000\n"} +{"Time":"2023-05-31T12:47:52.885469-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-amd64 delete -p no-preload-344000\n"} +{"Time":"2023-05-31T12:47:55.834586-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-darwin-amd64 delete -p no-preload-344000: (2.948990712s)\n"} +{"Time":"2023-05-31T12:47:55.834662-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts no-preload-344000\n"} +{"Time":"2023-05-31T12:47:55.870679-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts no-preload-344000: exit status 1 (35.874481ms)\n"} +{"Time":"2023-05-31T12:47:55.870692-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T12:47:55.870695-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:47:55.870697-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T12:47:55.870699-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T12:47:55.870701-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:47:55.870703-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:47:55.870706-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \terror: context no-preload-344000 not found\n"} +{"Time":"2023-05-31T12:47:55.870738-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T12:47:55.87074-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:47:55.870742-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T12:47:55.870761-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":" helpers_test.go:175: Cleaning up \"no-preload-344000\" profile ...\n"} +{"Time":"2023-05-31T12:47:55.870789-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p no-preload-344000\n"} +{"Time":"2023-05-31T12:47:56.235138-07:00","Action":"cont","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T12:47:56.235152-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== CONT TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T12:47:56.235195-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial"} +{"Time":"2023-05-31T12:47:56.235198-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":"=== RUN TestStartStop/group/embed-certs/serial\n"} +{"Time":"2023-05-31T12:47:56.235221-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/FirstStart"} +{"Time":"2023-05-31T12:47:56.235223-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"=== RUN TestStartStop/group/embed-certs/serial/FirstStart\n"} +{"Time":"2023-05-31T12:47:56.235288-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-amd64 start -p embed-certs-128000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=docker --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:47:59.828205-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"E0531 12:47:59.828170 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:48:14.254758-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"E0531 12:48:14.254710 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:48:29.489073-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"E0531 12:48:29.489043 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:48:37.972637-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-darwin-amd64 start -p embed-certs-128000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=docker --kubernetes-version=v1.27.2: (41.736691252s)\n"} +{"Time":"2023-05-31T12:48:37.972899-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/DeployApp"} +{"Time":"2023-05-31T12:48:37.973019-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":"=== RUN TestStartStop/group/embed-certs/serial/DeployApp\n"} +{"Time":"2023-05-31T12:48:37.97315-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context embed-certs-128000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T12:48:38.153887-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/embed-certs/serial/DeployApp: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:48:38.16363-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [5e97785b-d49e-458b-8e39-cd545843b11e] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T12:48:41.939157-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":"E0531 12:48:41.939122 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:48:42.168513-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [5e97785b-d49e-458b-8e39-cd545843b11e] Running\n"} +{"Time":"2023-05-31T12:48:47.169025-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/embed-certs/serial/DeployApp: integration-test=busybox healthy within 9.015038234s\n"} +{"Time":"2023-05-31T12:48:47.169088-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context embed-certs-128000 exec busybox -- /bin/sh -c \"ulimit -n\"\n"} +{"Time":"2023-05-31T12:48:47.282175-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:48:47.282187-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/embed-certs/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:48:47.282245-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-amd64 addons enable metrics-server -p embed-certs-128000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:48:48.243351-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context embed-certs-128000 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T12:48:48.305918-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/Stop"} +{"Time":"2023-05-31T12:48:48.305932-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":"=== RUN TestStartStop/group/embed-certs/serial/Stop\n"} +{"Time":"2023-05-31T12:48:48.305947-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-amd64 stop -p embed-certs-128000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:48:57.170575-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":"E0531 12:48:57.170524 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:48:59.252681-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-darwin-amd64 stop -p embed-certs-128000 --alsologtostderr -v=3: (10.94652295s)\n"} +{"Time":"2023-05-31T12:48:59.252697-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:48:59.252699-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:48:59.25275-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p embed-certs-128000 -n embed-certs-128000\n"} +{"Time":"2023-05-31T12:48:59.355168-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p embed-certs-128000 -n embed-certs-128000: exit status 7 (102.321146ms)\n"} +{"Time":"2023-05-31T12:48:59.355181-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:48:59.355185-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:48:59.355193-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:48:59.355195-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:48:59.355198-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:48:59.3552-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:48:59.355204-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-amd64 addons enable dashboard -p embed-certs-128000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:48:59.612611-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/SecondStart"} +{"Time":"2023-05-31T12:48:59.612625-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"=== RUN TestStartStop/group/embed-certs/serial/SecondStart\n"} +{"Time":"2023-05-31T12:48:59.612687-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-amd64 start -p embed-certs-128000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=docker --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:49:49.44224-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:49:49.442203 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:49:50.251452-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:49:50.251413 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:49:50.279934-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:49:50.279872 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:50:17.995728-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:50:17.995685 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:50:17.996011-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:50:17.995966 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:02.866056-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:02.865981 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:31.030106-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:31.030066 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:31.142042-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:31.141990 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:36.213934-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:36.213900 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:36.219064-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:36.219041 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:36.229622-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:36.229596 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:36.249689-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:36.249659 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:36.290003-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:36.289958 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:36.370825-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:36.370785 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:36.531844-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:36.531787 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:36.852761-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:36.852704 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:37.492977-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:37.492948 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:38.77319-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:38.773136 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:41.333666-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:41.333600 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:42.437969-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:42.437937 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:46.454042-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:46.453983 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:51:56.694499-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:51:56.694415 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:52:17.175-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:52:17.174963 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:52:18.498777-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:52:18.498729 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:52:31.751028-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:52:31.750971 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:52:54.18615-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:52:54.186101 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:52:58.135742-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:52:58.135690 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:52:59.833528-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:52:59.833465 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:53:14.258609-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:53:14.258579 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:53:29.492728-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:53:29.492687 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:54:20.056933-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:54:20.056879 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:54:22.876618-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 12:54:22.876590 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:54:45.346283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Non-zero exit: out/minikube-darwin-amd64 start -p old-k8s-version-787000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=docker --kubernetes-version=v1.16.0: exit status 109 (8m26.999474446s)\n"} +{"Time":"2023-05-31T12:54:45.346301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:45.346304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:54:45.346306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* [old-k8s-version-787000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:54:45.346311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:54:45.346322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:54:45.346326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:54:45.346331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:54:45.346333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:54:45.346335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:54:45.346337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Kubernetes 1.27.2 is now available. If you would like to upgrade, specify: --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:54:45.346341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:54:45.346343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Starting control plane node old-k8s-version-787000 in cluster old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Pulling base image ...\n"} +{"Time":"2023-05-31T12:54:45.346349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Restarting existing docker container for \"old-k8s-version-787000\" ...\n"} +{"Time":"2023-05-31T12:54:45.346351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Preparing Kubernetes v1.16.0 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:54:45.346353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:54:45.346355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:54:45.346357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:54:45.346359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:54:45.346361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:45.346367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:54:45.34637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.346372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.149606 18111 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:54:45.346375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.149817 18111 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:54:45.346377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.149823 18111 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:54:45.346379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.149828 18111 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:54:45.346381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.149956 18111 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:54:45.346386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.151386 18111 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:54:45.346388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.170878 18111 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":4546,\"bootTime\":1685557832,\"procs\":394,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T12:54:45.346394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:18.170969 18111 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:54:45.346396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.192965 18111 out.go:177] * [old-k8s-version-787000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:54:45.346399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.235208 18111 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:54:45.346401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.235230 18111 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:54:45.346403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.277223 18111 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:54:45.346405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.298238 18111 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:54:45.346407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.319113 18111 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:54:45.346409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.361257 18111 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:54:45.346411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.382091 18111 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:54:45.346413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.403776 18111 config.go:182] Loaded profile config \"old-k8s-version-787000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.346416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.425267 18111 out.go:177] * Kubernetes 1.27.2 is now available. If you would like to upgrade, specify: --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:54:45.346418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.446189 18111 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:54:45.34642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.502249 18111 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T12:54:45.346422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.502391 18111 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:54:45.346427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.596887 18111 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:2 ContainersRunning:1 ContainersPaused:0 ContainersStopped:1 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:55 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:46:18.574276331 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:54:45.346435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:54:45.346438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:54:45.346442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:54:45.346445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:54:45.346447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.618657 18111 out.go:177] * Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:54:45.346449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.639339 18111 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T12:54:45.346453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.639353 18111 start.go:875] validating driver \"docker\" against \u0026{Name:old-k8s-version-787000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-787000 Namespace:default APIServerNa"} +{"Time":"2023-05-31T12:54:45.346456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"me:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.67.2 Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000"} +{"Time":"2023-05-31T12:54:45.346459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":".L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:54:45.346464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.639435 18111 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:54:45.346466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.642064 18111 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:54:45.346471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.742885 18111 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:2 ContainersRunning:1 ContainersPaused:0 ContainersStopped:1 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:55 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:46:18.718196205 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:54:45.346477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:54:45.346481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:54:45.346484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:54:45.346487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:54:45.346489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.743121 18111 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:54:45.346491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.743145 18111 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:54:45.346494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.743158 18111 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:54:45.346496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.743171 18111 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:54:45.3465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{Name:old-k8s-version-787000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-787000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Containe"} +{"Time":"2023-05-31T12:54:45.346503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"rRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.67.2 Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountT"} +{"Time":"2023-05-31T12:54:45.346506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"ype:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:54:45.346508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.765065 18111 out.go:177] * Starting control plane node old-k8s-version-787000 in cluster old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.786697 18111 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T12:54:45.346513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.809518 18111 out.go:177] * Pulling base image ...\n"} +{"Time":"2023-05-31T12:54:45.346515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.830832 18111 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:54:45.346517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.830882 18111 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T12:54:45.34652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.830937 18111 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T12:54:45.346522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.830964 18111 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:54:45.346524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.831175 18111 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:54:45.346527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.831200 18111 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T12:54:45.346529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.832132 18111 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/config.json ...\n"} +{"Time":"2023-05-31T12:54:45.346532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.881434 18111 image.go:83] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon, skipping pull\n"} +{"Time":"2023-05-31T12:54:45.346534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.881451 18111 cache.go:145] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in daemon, skipping load\n"} +{"Time":"2023-05-31T12:54:45.346536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.881469 18111 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:54:45.346538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.881512 18111 start.go:364] acquiring machines lock for old-k8s-version-787000: {Name:mk3932d08d318c08b5f27e8ee966511aebf30d25 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:45.346541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.881602 18111 start.go:368] acquired machines lock for \"old-k8s-version-787000\" in 71.025µs\n"} +{"Time":"2023-05-31T12:54:45.346543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.881626 18111 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:54:45.346545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.881634 18111 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:54:45.34655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.881857 18111 cli_runner.go:164] Run: docker container inspect old-k8s-version-787000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:45.346552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.932048 18111 fix.go:103] recreateIfNeeded on old-k8s-version-787000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:54:45.346554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:18.932096 18111 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:54:45.346556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.953844 18111 out.go:177] * Restarting existing docker container for \"old-k8s-version-787000\" ...\n"} +{"Time":"2023-05-31T12:54:45.346558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:18.995845 18111 cli_runner.go:164] Run: docker start old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.251835 18111 cli_runner.go:164] Run: docker container inspect old-k8s-version-787000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:45.346564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.305686 18111 kic.go:426] container \"old-k8s-version-787000\" state is running.\n"} +{"Time":"2023-05-31T12:54:45.346566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.306252 18111 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.362670 18111 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/config.json ...\n"} +{"Time":"2023-05-31T12:54:45.346572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.363079 18111 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T12:54:45.346574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.363103 18111 ubuntu.go:169] provisioning hostname \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:54:45.346576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.363184 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.419038 18111 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:45.346581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.419566 18111 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53620 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:45.346584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.419582 18111 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:45.346587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tsudo hostname old-k8s-version-787000 \u0026\u0026 echo \"old-k8s-version-787000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T12:54:45.346589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:19.421102 18111 main.go:141] libmachine: Error dialing TCP: ssh: handshake failed: EOF\n"} +{"Time":"2023-05-31T12:54:45.346592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.548957 18111 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.549037 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.599463 18111 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:45.346601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.599807 18111 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53620 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:45.346603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.599820 18111 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:45.346605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\tif ! grep -xq '.*\\sold-k8s-version-787000' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:54:45.34661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:54:45.346612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 old-k8s-version-787000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T12:54:45.346614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T12:54:45.346616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\t\techo '127.0.1.1 old-k8s-version-787000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T12:54:45.346618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T12:54:45.34662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T12:54:45.346623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.715647 18111 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T12:54:45.346625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.715668 18111 ubuntu.go:175] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1078/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1078/.minikube}\n"} +{"Time":"2023-05-31T12:54:45.346628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.715686 18111 ubuntu.go:177] setting up certificates\n"} +{"Time":"2023-05-31T12:54:45.34663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.715691 18111 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T12:54:45.346633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.715764 18111 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765164 18111 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T12:54:45.346637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765255 18111 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T12:54:45.346639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765263 18111 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T12:54:45.346642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765386 18111 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:45.346645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765618 18111 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T12:54:45.346648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765625 18111 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T12:54:45.34665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765700 18111 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:54:45.346652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765865 18111 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T12:54:45.346655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765871 18111 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T12:54:45.346657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.765937 18111 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:54:45.34666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.766080 18111 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem org=jenkins.old-k8s-version-787000 san=[192.168.67.2 127.0.0.1 localhost 127.0.0.1 minikube old-k8s-version-787000]\n"} +{"Time":"2023-05-31T12:54:45.346664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.922465 18111 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T12:54:45.346666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.922527 18111 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T12:54:45.346668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.922586 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:22.972073 18111 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53620 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:45.346673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.058986 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:54:45.346676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.081245 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1241 bytes)\n"} +{"Time":"2023-05-31T12:54:45.346678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.103710 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:45.346681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.126285 18111 provision.go:86] duration metric: configureAuth took 410.248776ms\n"} +{"Time":"2023-05-31T12:54:45.346683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.126301 18111 ubuntu.go:193] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T12:54:45.346685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.126454 18111 config.go:182] Loaded profile config \"old-k8s-version-787000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.346687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.126517 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.34669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.185156 18111 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:45.346713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.185494 18111 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53620 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:45.346717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.185503 18111 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:45.34672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T12:54:45.346722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.302001 18111 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: overlay\n"} +{"Time":"2023-05-31T12:54:45.346725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.302019 18111 ubuntu.go:71] root file system type: overlay\n"} +{"Time":"2023-05-31T12:54:45.346729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.302113 18111 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T12:54:45.346732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.302212 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.351798 18111 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:45.34674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.352148 18111 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53620 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:45.346743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.352199 18111 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:45.346745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %s \"[Unit]\n"} +{"Time":"2023-05-31T12:54:45.346747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:54:45.34675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:54:45.346752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:54:45.346754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:54:45.346756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:54:45.346758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:54:45.34676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:54:45.346762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:54:45.346764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:54:45.34677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:54:45.346772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:54:45.346774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.34678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:54:45.346782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:54:45.346784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:54:45.346786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:54:45.346788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:54:45.34679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:54:45.346792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:54:45.346794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:54:45.346798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:54:45.3468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:54:45.346803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:54:45.346807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T12:54:45.346809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:54:45.346814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:54:45.346816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:54:45.346818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:54:45.34682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:54:45.346822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:54:45.346826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:54:45.346828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:54:45.34683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:54:45.346833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:54:45.346837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:54:45.346839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:54:45.346843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:54:45.346845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:54:45.346849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:54:45.346851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T12:54:45.346853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.475700 18111 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T12:54:45.346855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:54:45.346857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:54:45.346859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:54:45.346861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:54:45.346863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:54:45.346865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:54:45.346867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:54:45.346869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:54:45.346871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:54:45.346875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:54:45.346877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:54:45.346879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:54:45.346909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:54:45.346912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:54:45.346914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:54:45.346916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:54:45.346918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:54:45.346923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:54:45.346925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:54:45.346929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:54:45.346931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:54:45.346933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:54:45.346936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:54:45.346938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.34694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:54:45.346942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:54:45.346944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:54:45.346946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:54:45.346948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:54:45.34695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:54:45.346954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:54:45.346956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:54:45.346958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:54:45.34696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:54:45.346964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:54:45.346966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:54:45.34697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:54:45.346972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.346974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:54:45.346976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:54:45.346978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.34698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.475813 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.346983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.526244 18111 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:45.346985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.526583 18111 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53620 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:45.346987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.526597 18111 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:45.346989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:54:45.346992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.644664 18111 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T12:54:45.346994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.644682 18111 machine.go:91] provisioned docker machine in 4.277817067s\n"} +{"Time":"2023-05-31T12:54:45.346996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.644690 18111 start.go:300] post-start starting for \"old-k8s-version-787000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:54:45.346999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.644695 18111 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T12:54:45.347001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.644774 18111 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:54:45.347004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.644829 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.347007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.695205 18111 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53620 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:45.34701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.781904 18111 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T12:54:45.347012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.786423 18111 main.go:141] libmachine: Couldn't set key VERSION_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:54:45.347014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.786445 18111 main.go:141] libmachine: Couldn't set key PRIVACY_POLICY_URL, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:54:45.347016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.786454 18111 main.go:141] libmachine: Couldn't set key UBUNTU_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:54:45.347018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.786459 18111 info.go:137] Remote host: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T12:54:45.34702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.786467 18111 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T12:54:45.347023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.786554 18111 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T12:54:45.347025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.786734 18111 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e 15662.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:54:45.347027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.786935 18111 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:54:45.34703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.796388 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:54:45.347032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.819674 18111 start.go:303] post-start completed in 174.841567ms\n"} +{"Time":"2023-05-31T12:54:45.347034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.819743 18111 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T12:54:45.347036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.819807 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.347094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.869824 18111 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53620 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:45.347098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.953860 18111 ssh_runner.go:195] Run: sh -c \"df -BG /var | awk 'NR==2{print $4}'\"\n"} +{"Time":"2023-05-31T12:54:45.3471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.959543 18111 fix.go:57] fixHost completed within 5.073389283s\n"} +{"Time":"2023-05-31T12:54:45.347103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.959560 18111 start.go:83] releasing machines lock for \"old-k8s-version-787000\", held for 5.073435169s\n"} +{"Time":"2023-05-31T12:54:45.347105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:23.959654 18111 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.347107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.010193 18111 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T12:54:45.347109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.010219 18111 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T12:54:45.347112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.010277 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.347114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.010323 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.347117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.062611 18111 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53620 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:45.347119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.062778 18111 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53620 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/old-k8s-version-787000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:45.347121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.243614 18111 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T12:54:45.347124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.249370 18111 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T12:54:45.347127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:24.255049 18111 cni.go:208] loopback cni configuration skipped: \"/etc/cni/net.d/*loopback.conf*\" not found\n"} +{"Time":"2023-05-31T12:54:45.34716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.255099 18111 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *bridge* -not -name *podman* -not -name *.mk_disabled -printf \"%p, \" -exec sh -c \"sudo sed -i -r -e '/\"dst\": \".*:.*\"/d' -e 's|^(.*)\"dst\": (.*)[,*]$|\\1\"dst\": \\2|g' -e '/\"subnet\": \".*:.*\"/d' -e 's|^(.*)\"subnet\": \".*\"(.*)[,*]$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T12:54:45.347179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.264545 18111 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *podman* -not -name *.mk_disabled -printf \"%p, \" -exec sh -c \"sudo sed -i -r -e 's|^(.*)\"subnet\": \".*\"(.*)$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' -e 's|^(.*)\"gateway\": \".*\"(.*)$|\\1\"gateway\": \"10.244.0.1\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T12:54:45.347183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.273757 18111 cni.go:304] no active bridge cni configs found in \"/etc/cni/net.d\" - nothing to configure\n"} +{"Time":"2023-05-31T12:54:45.347186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.273773 18111 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:54:45.347188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.273786 18111 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:54:45.347191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.273900 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:54:45.347193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.347196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.289886 18111 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.1\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:45.347198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.300468 18111 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:45.347249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.310729 18111 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:54:45.347258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.310793 18111 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:45.34726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.321180 18111 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:45.347263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.332273 18111 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:45.347265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.342720 18111 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:45.347267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.352970 18111 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T12:54:45.34727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.362641 18111 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:45.347282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.372943 18111 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T12:54:45.347289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.381558 18111 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T12:54:45.347291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.390269 18111 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:54:45.347294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.457138 18111 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T12:54:45.347296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.536975 18111 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:54:45.347298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.536997 18111 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:54:45.3473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.537065 18111 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T12:54:45.347302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.549427 18111 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T12:54:45.347304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.549499 18111 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T12:54:45.347307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.561849 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///var/run/dockershim.sock\n"} +{"Time":"2023-05-31T12:54:45.347309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.347311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.579738 18111 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T12:54:45.347313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.584500 18111 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T12:54:45.347316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.607784 18111 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T12:54:45.347318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.626760 18111 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T12:54:45.347321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.727634 18111 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T12:54:45.347323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.818653 18111 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:54:45.347329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.818671 18111 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T12:54:45.347331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.836194 18111 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:54:45.347333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:24.944952 18111 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:54:45.347368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.199480 18111 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:54:45.347374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.226974 18111 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:54:45.347378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.299591 18111 out.go:204] * Preparing Kubernetes v1.16.0 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:54:45.34738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.299748 18111 cli_runner.go:164] Run: docker exec -t old-k8s-version-787000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T12:54:45.347384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.411691 18111 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T12:54:45.347386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.411803 18111 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:54:45.347389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.417059 18111 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.65.254\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:54:45.347392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.428628 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.347394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.478414 18111 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:54:45.347397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.478491 18111 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:54:45.347399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.500623 18111 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:54:45.347401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:54:45.347403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.34747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:54:45.347476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:54:45.347478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/pause:3.1\n"} +{"Time":"2023-05-31T12:54:45.34748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.347485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:54:45.347489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.500639 18111 docker.go:639] registry.k8s.io/kube-apiserver:v1.16.0 wasn't preloaded\n"} +{"Time":"2023-05-31T12:54:45.347492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.500704 18111 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T12:54:45.347495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.510263 18111 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T12:54:45.347497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.515153 18111 ssh_runner.go:195] Run: stat -c \"%s %y\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:54:45.3475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.519456 18111 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%s %y\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.347502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.347504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.347506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.347508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.34751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:25.519485 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-amd64.tar.lz4 --\u003e /preloaded.tar.lz4 (369789069 bytes)\n"} +{"Time":"2023-05-31T12:54:45.347513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:30.812747 18111 docker.go:597] Took 5.294595 seconds to copy over tarball\n"} +{"Time":"2023-05-31T12:54:45.347515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:30.812823 18111 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:54:45.347607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:33.239386 18111 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (2.425435101s)\n"} +{"Time":"2023-05-31T12:54:45.347611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:33.239401 18111 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T12:54:45.347613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:33.309010 18111 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T12:54:45.347616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:33.319105 18111 ssh_runner.go:362] scp memory --\u003e /var/lib/docker/image/overlay2/repositories.json (2499 bytes)\n"} +{"Time":"2023-05-31T12:54:45.347618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:33.336456 18111 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:54:45.347621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:33.415372 18111 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:54:45.347623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.022697 18111 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:54:45.347625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.045872 18111 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:54:45.347627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:54:45.347629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.34764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:54:45.347642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:54:45.347644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tk8s.gcr.io/pause:3.1\n"} +{"Time":"2023-05-31T12:54:45.347646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.347648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:54:45.347739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.045889 18111 docker.go:639] registry.k8s.io/kube-apiserver:v1.16.0 wasn't preloaded\n"} +{"Time":"2023-05-31T12:54:45.347747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.045898 18111 cache_images.go:88] LoadImages start: [registry.k8s.io/kube-apiserver:v1.16.0 registry.k8s.io/kube-controller-manager:v1.16.0 registry.k8s.io/kube-scheduler:v1.16.0 registry.k8s.io/kube-proxy:v1.16.0 registry.k8s.io/pause:3.1 registry.k8s.io/etcd:3.3.15-0 registry.k8s.io/coredns:1.6.2 gcr.io/k8s-minikube/storage-provisioner:v5]\n"} +{"Time":"2023-05-31T12:54:45.347752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.054142 18111 image.go:134] retrieving image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.054167 18111 image.go:134] retrieving image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:54:45.347758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.054244 18111 image.go:134] retrieving image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:54:45.347761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.054689 18111 image.go:134] retrieving image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.054875 18111 image.go:134] retrieving image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:54:45.347765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.055363 18111 image.go:134] retrieving image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:54:45.347767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.055526 18111 image.go:134] retrieving image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.34777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.056933 18111 image.go:134] retrieving image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.061357 18111 image.go:177] daemon lookup for registry.k8s.io/coredns:1.6.2: Error response from daemon: No such image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:54:45.347775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.061386 18111 image.go:177] daemon lookup for registry.k8s.io/kube-controller-manager:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.061386 18111 image.go:177] daemon lookup for registry.k8s.io/etcd:3.3.15-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:54:45.347785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.061459 18111 image.go:177] daemon lookup for registry.k8s.io/pause:3.1: Error response from daemon: No such image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:54:45.347871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.061477 18111 image.go:177] daemon lookup for registry.k8s.io/kube-proxy:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.063921 18111 image.go:177] daemon lookup for registry.k8s.io/kube-apiserver:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.063947 18111 image.go:177] daemon lookup for registry.k8s.io/kube-scheduler:v1.16.0: Error response from daemon: No such image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:34.063997 18111 image.go:177] daemon lookup for gcr.io/k8s-minikube/storage-provisioner:v5: Error response from daemon: No such image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:54:45.347883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.180795 18111 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:54:45.347888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.206826 18111 cache_images.go:116] \"registry.k8s.io/coredns:1.6.2\" needs transfer: \"registry.k8s.io/coredns:1.6.2\" does not exist at hash \"bf261d157914477ee1a5969d28ec687f3fbfc9fb5a664b22df78e57023b0e03b\" in container runtime\n"} +{"Time":"2023-05-31T12:54:45.347891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.206871 18111 docker.go:313] Removing image: registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:54:45.347893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.206940 18111 ssh_runner.go:195] Run: docker rmi registry.k8s.io/coredns:1.6.2\n"} +{"Time":"2023-05-31T12:54:45.347896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.230612 18111 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/coredns_1.6.2\n"} +{"Time":"2023-05-31T12:54:45.347898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.437287 18111 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.3479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.461168 18111 cache_images.go:116] \"registry.k8s.io/kube-controller-manager:v1.16.0\" needs transfer: \"registry.k8s.io/kube-controller-manager:v1.16.0\" does not exist at hash \"06a629a7e51cdcc81a5ed6a3e6650348312f20c954ac52ee489a023628ec9c7d\" in container runtime\n"} +{"Time":"2023-05-31T12:54:45.347903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.461192 18111 docker.go:313] Removing image: registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.347996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.461250 18111 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-controller-manager:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.484413 18111 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-controller-manager_v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.570285 18111 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:54:45.348007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.595048 18111 cache_images.go:116] \"registry.k8s.io/etcd:3.3.15-0\" needs transfer: \"registry.k8s.io/etcd:3.3.15-0\" does not exist at hash \"b2756210eeabf84f3221da9959e9483f3919dc2aaab4cd45e7cd072fcbde27ed\" in container runtime\n"} +{"Time":"2023-05-31T12:54:45.34801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.595078 18111 docker.go:313] Removing image: registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:54:45.348015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.595170 18111 ssh_runner.go:195] Run: docker rmi registry.k8s.io/etcd:3.3.15-0\n"} +{"Time":"2023-05-31T12:54:45.348017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.619908 18111 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/etcd_3.3.15-0\n"} +{"Time":"2023-05-31T12:54:45.348021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.625668 18111 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:54:45.348023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.651429 18111 cache_images.go:116] \"registry.k8s.io/pause:3.1\" needs transfer: \"registry.k8s.io/pause:3.1\" does not exist at hash \"da86e6ba6ca197bf6bc5e9d900febd906b133eaa4750e6bed647b0fbe50ed43e\" in container runtime\n"} +{"Time":"2023-05-31T12:54:45.348026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.651456 18111 docker.go:313] Removing image: registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:54:45.348028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.651513 18111 ssh_runner.go:195] Run: docker rmi registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T12:54:45.348031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.678537 18111 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/pause_3.1\n"} +{"Time":"2023-05-31T12:54:45.348034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.954243 18111 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.978764 18111 cache_images.go:116] \"registry.k8s.io/kube-proxy:v1.16.0\" needs transfer: \"registry.k8s.io/kube-proxy:v1.16.0\" does not exist at hash \"c21b0c7400f988db4777858edd13b6d3930d62d7ccf026d2415485a52037f384\" in container runtime\n"} +{"Time":"2023-05-31T12:54:45.348116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.978800 18111 docker.go:313] Removing image: registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.34812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:35.978858 18111 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-proxy:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.002185 18111 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-proxy_v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.290817 18111 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.316265 18111 cache_images.go:116] \"registry.k8s.io/kube-scheduler:v1.16.0\" needs transfer: \"registry.k8s.io/kube-scheduler:v1.16.0\" does not exist at hash \"301ddc62b80b16315d3c2653cf3888370394277afb3187614cfa20edc352ca0a\" in container runtime\n"} +{"Time":"2023-05-31T12:54:45.34813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.316300 18111 docker.go:313] Removing image: registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.316364 18111 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-scheduler:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.338705 18111 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-scheduler_v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.509844 18111 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.533925 18111 cache_images.go:116] \"registry.k8s.io/kube-apiserver:v1.16.0\" needs transfer: \"registry.k8s.io/kube-apiserver:v1.16.0\" does not exist at hash \"b305571ca60a5a7818bda47da122683d75e8a1907475681ee8b1efbd06bff12e\" in container runtime\n"} +{"Time":"2023-05-31T12:54:45.348142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.533956 18111 docker.go:313] Removing image: registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.534023 18111 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-apiserver:v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:36.556850 18111 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/kube-apiserver_v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.215287 18111 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:54:45.348286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.237436 18111 cache_images.go:92] LoadImages completed in 3.190368229s\n"} +{"Time":"2023-05-31T12:54:45.34829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:37.237499 18111 out.go:239] X Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/coredns_1.6.2: no such file or directory\n"} +{"Time":"2023-05-31T12:54:45.348293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tX Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/images/amd64/registry.k8s.io/coredns_1.6.2: no such file or directory\n"} +{"Time":"2023-05-31T12:54:45.348296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.237578 18111 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T12:54:45.3483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.291519 18111 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:54:45.348303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.291536 18111 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:54:45.348307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.291555 18111 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:54:45.348312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.291572 18111 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.67.2 APIServerPort:8443 KubernetesVersion:v1.16.0 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:old-k8s-version-787000 NodeName:old-k8s-version-787000 DNSDomain:cluster.local CRISocket:/var/run/dockershim.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.67.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.67.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt StaticP"} +{"Time":"2023-05-31T12:54:45.348319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"odPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:false}\n"} +{"Time":"2023-05-31T12:54:45.348322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.291676 18111 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T12:54:45.348441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiVersion: kubeadm.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:54:45.348445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T12:54:45.348447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T12:54:45.348449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t advertiseAddress: 192.168.67.2\n"} +{"Time":"2023-05-31T12:54:45.348451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T12:54:45.348453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T12:54:45.348455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - groups:\n"} +{"Time":"2023-05-31T12:54:45.348457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T12:54:45.34846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T12:54:45.348462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t usages:\n"} +{"Time":"2023-05-31T12:54:45.348467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - signing\n"} +{"Time":"2023-05-31T12:54:45.348469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - authentication\n"} +{"Time":"2023-05-31T12:54:45.348471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T12:54:45.348475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t criSocket: /var/run/dockershim.sock\n"} +{"Time":"2023-05-31T12:54:45.348477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t name: \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:54:45.348479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T12:54:45.348481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t node-ip: 192.168.67.2\n"} +{"Time":"2023-05-31T12:54:45.348483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t taints: []\n"} +{"Time":"2023-05-31T12:54:45.348485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:54:45.348487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiVersion: kubeadm.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:54:45.348489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:54:45.348491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T12:54:45.348493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.67.2\"]\n"} +{"Time":"2023-05-31T12:54:45.348616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:54:45.348619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T12:54:45.348622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T12:54:45.348624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:54:45.348626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:54:45.348628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:54:45.34863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T12:54:45.348632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:54:45.348634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:54:45.348636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:54:45.348638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tclusterName: old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.34864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:54:45.348642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tdns:\n"} +{"Time":"2023-05-31T12:54:45.348644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t type: CoreDNS\n"} +{"Time":"2023-05-31T12:54:45.348646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tetcd:\n"} +{"Time":"2023-05-31T12:54:45.348648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t local:\n"} +{"Time":"2023-05-31T12:54:45.348651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:54:45.348653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:54:45.348655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t listen-metrics-urls: http://127.0.0.1:2381,http://192.168.67.2:2381\n"} +{"Time":"2023-05-31T12:54:45.348659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkubernetesVersion: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.348661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T12:54:45.348663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:54:45.348665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:54:45.348788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:54:45.348795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:54:45.348798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:54:45.34881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:54:45.348814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T12:54:45.348822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t x509:\n"} +{"Time":"2023-05-31T12:54:45.348826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:54:45.348829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:54:45.348832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:54:45.348835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T12:54:45.348839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T12:54:45.348842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T12:54:45.348846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:54:45.34885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T12:54:45.348853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t nodefs.available: \"0%\"\n"} +{"Time":"2023-05-31T12:54:45.348857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t nodefs.inodesFree: \"0%\"\n"} +{"Time":"2023-05-31T12:54:45.348861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t imagefs.available: \"0%\"\n"} +{"Time":"2023-05-31T12:54:45.348864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T12:54:45.348867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:54:45.348871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:54:45.348873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:54:45.348875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:54:45.348959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:54:45.348966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:54:45.34897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T12:54:45.348973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T12:54:45.348976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T12:54:45.34898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:54:45.348983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T12:54:45.348987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:54:45.34899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.349002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.291737 18111 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T12:54:45.349006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T12:54:45.349009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.349011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:54:45.349013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:54:45.349015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=/var/lib/minikube/binaries/v1.16.0/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime=docker --hostname-override=old-k8s-version-787000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.67.2\n"} +{"Time":"2023-05-31T12:54:45.349018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.34902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:54:45.349022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t config:\n"} +{"Time":"2023-05-31T12:54:45.349024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-787000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T12:54:45.349112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.291799 18111 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.349116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.301505 18111 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T12:54:45.349118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.301566 18111 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T12:54:45.349121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.310434 18111 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (348 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.327345 18111 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.344680 18111 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2174 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.361540 18111 ssh_runner.go:195] Run: grep 192.168.67.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:54:45.349131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.366147 18111 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.67.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:54:45.349134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.377550 18111 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000 for IP: 192.168.67.2\n"} +{"Time":"2023-05-31T12:54:45.349136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.377569 18111 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:45.349142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.377746 18111 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T12:54:45.349148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.377799 18111 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T12:54:45.349151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.377895 18111 certs.go:315] skipping minikube-user signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/client.key\n"} +{"Time":"2023-05-31T12:54:45.349154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.377965 18111 certs.go:315] skipping minikube signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.key.c7fa3a9e\n"} +{"Time":"2023-05-31T12:54:45.349233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.378034 18111 certs.go:315] skipping aggregator signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.key\n"} +{"Time":"2023-05-31T12:54:45.349238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.378250 18111 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:37.378287 18111 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T12:54:45.349243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.378300 18111 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.378353 18111 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.378386 18111 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:54:45.34925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.378416 18111 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.378487 18111 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.378995 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.401071 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.423892 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.447679 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/old-k8s-version-787000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.470180 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T12:54:45.34936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.492603 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.514972 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.538040 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.560803 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:54:45.34937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.584231 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.606751 18111 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:54:45.349374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.629772 18111 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T12:54:45.34938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.648688 18111 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T12:54:45.349382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.655042 18111 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T12:54:45.349386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.665545 18111 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:54:45.349471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.670333 18111 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:54:45.349474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.670376 18111 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:54:45.349477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.677366 18111 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T12:54:45.349479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.686525 18111 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T12:54:45.349482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.696700 18111 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:54:45.349484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.701586 18111 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:54:45.349486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.701647 18111 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:54:45.349489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.709070 18111 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T12:54:45.349491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.718653 18111 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T12:54:45.349493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.729249 18111 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:54:45.349495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.734131 18111 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:54:45.349498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.734177 18111 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:54:45.3495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.741508 18111 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T12:54:45.349502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.751272 18111 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T12:54:45.349606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.755828 18111 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-etcd-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:45.349612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.762899 18111 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-kubelet-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:45.349614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.770341 18111 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/server.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:45.349617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.777466 18111 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/healthcheck-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:45.349619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.784514 18111 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/peer.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:45.349622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.791803 18111 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/front-proxy-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:45.349626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.799309 18111 kubeadm.go:404] StartCluster: {Name:old-k8s-version-787000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-787000 Namespace:default APIServerName:minikubeCA APISer"} +{"Time":"2023-05-31T12:54:45.349629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"verNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.67.2 Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker M"} +{"Time":"2023-05-31T12:54:45.349741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"ountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:54:45.349746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.799424 18111 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.349749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.820630 18111 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:54:45.349764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.830517 18111 kubeadm.go:419] found existing configuration files, will attempt cluster restart\n"} +{"Time":"2023-05-31T12:54:45.349767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.830533 18111 kubeadm.go:636] restartCluster start\n"} +{"Time":"2023-05-31T12:54:45.349769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.830584 18111 ssh_runner.go:195] Run: sudo test -d /data/minikube\n"} +{"Time":"2023-05-31T12:54:45.349772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.840351 18111 kubeadm.go:127] /data/minikube skipping compat symlinks: sudo test -d /data/minikube: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.349777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.34978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.349782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.349784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.840450 18111 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.349787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.893662 18111 kubeconfig.go:135] verify returned: extract IP: \"old-k8s-version-787000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:54:45.349789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.893835 18111 kubeconfig.go:146] \"old-k8s-version-787000\" context is missing from /Users/jenkins/minikube-integration/16569-1078/kubeconfig - will repair!\n"} +{"Time":"2023-05-31T12:54:45.349792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.894156 18111 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/kubeconfig: {Name:mk36b1fef13f0c406b5340544ea043a831d9fe53 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:45.349894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.895595 18111 ssh_runner.go:195] Run: sudo diff -u /var/tmp/minikube/kubeadm.yaml /var/tmp/minikube/kubeadm.yaml.new\n"} +{"Time":"2023-05-31T12:54:45.349898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.905451 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.349901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:37.905517 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.349903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:37.916085 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.349905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.349908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.34991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.349912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:38.417214 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.349914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:38.417331 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.349916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:38.428636 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.349919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.349921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.349923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.349925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:38.918526 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.349927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:38.918688 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.349929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:38.931425 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.349931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.349933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.349935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:39.416989 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.35004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:39.417131 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:39.430189 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:39.917003 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:39.917200 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:39.929961 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.35006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:40.417566 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:40.417631 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:40.428563 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:40.919025 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:40.919178 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:40.931735 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:41.417580 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.35022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:41.417654 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:41.428473 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:41.918527 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:41.918649 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:41.931253 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:42.417951 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.35025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:42.418061 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:42.430479 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:42.917563 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:42.917702 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:42.929522 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:43.419659 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.35036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:43.419797 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:43.432864 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.35038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:43.917844 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:43.917993 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:43.930475 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.35044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:44.418825 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:44.418947 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:44.431704 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:44.918884 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:44.919017 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:44.931523 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.35048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:45.418106 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:45.418221 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:45.430695 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.35056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:45.918201 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:45.918291 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:45.929401 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.35057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:46.418794 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:46.418869 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:46.429733 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:46.918677 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.350587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:46.918749 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:46.930434 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.350678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.418462 18111 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:45.35068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.418611 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:46:47.430665 18111 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.350684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.350686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.350688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.35069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.909913 18111 kubeadm.go:611] needs reconfigure: apiserver error: context deadline exceeded\n"} +{"Time":"2023-05-31T12:54:45.350692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.909968 18111 kubeadm.go:1123] stopping kube-system containers ...\n"} +{"Time":"2023-05-31T12:54:45.350694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.910105 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.350697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.932386 18111 ssh_runner.go:195] Run: sudo systemctl stop kubelet\n"} +{"Time":"2023-05-31T12:54:45.350699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.945352 18111 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:45.350701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.955138 18111 kubeadm.go:155] found existing configuration files:\n"} +{"Time":"2023-05-31T12:54:45.350703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-rw------- 1 root root 5695 May 31 19:42 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T12:54:45.350705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-rw------- 1 root root 5731 May 31 19:42 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T12:54:45.350707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-rw------- 1 root root 5791 May 31 19:42 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T12:54:45.350709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-rw------- 1 root root 5679 May 31 19:42 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:45.350711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.35082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.955218 18111 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T12:54:45.350835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.965085 18111 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T12:54:45.350842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.974797 18111 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T12:54:45.350846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.984303 18111 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:45.35085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:47.993365 18111 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:54:45.350853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:48.002562 18111 kubeadm.go:713] reconfiguring cluster from /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:54:45.350855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:48.002574 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init phase certs all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.350858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:48.059881 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init phase kubeconfig all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.350861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:48.831984 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init phase kubelet-start --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.350864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:49.022567 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init phase control-plane all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.350868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:49.114842 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init phase etcd local --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.35087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:49.180091 18111 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T12:54:45.350872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:49.180159 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.350874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:49.691476 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:50.191734 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:50.691386 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:51.191761 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:51.691778 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:52.192636 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:52.692003 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:53.192131 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:53.692070 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:54.192151 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:54.692331 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:55.192896 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:55.692300 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:56.192319 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:56.692473 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:57.192482 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:57.692529 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:58.192510 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:58.691838 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:59.192627 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:46:59.692689 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:00.192692 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:00.692738 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:01.192793 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:01.692806 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:02.192853 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:02.692894 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:03.191757 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:03.692968 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:04.193002 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:04.693007 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:05.193069 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:05.693126 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:06.193940 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:06.693284 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:07.193251 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:07.693344 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:08.193297 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:08.693273 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:09.193821 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:09.693339 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:10.193366 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:10.693376 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:11.193408 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:11.693431 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:12.193454 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:12.693504 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:13.192468 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:13.693632 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:14.193573 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:14.693831 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:15.193633 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:15.693990 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:16.193652 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:16.694597 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:17.194016 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:17.693732 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:18.193318 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:18.692898 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:19.193787 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:19.693770 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:20.193785 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:20.694629 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:21.193782 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:21.693822 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:22.193830 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:22.693847 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:23.193893 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:23.693317 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:24.193883 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:24.694114 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:25.193919 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:25.693975 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:26.194616 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:26.693966 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:27.194014 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:27.694067 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:28.194960 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:28.694002 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:29.194121 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:29.694070 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:30.194020 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:30.694054 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:31.194681 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:31.694105 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:32.194198 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:32.694317 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:33.193560 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:33.694142 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:34.194587 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:34.694270 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:35.194200 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:35.694150 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.3518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:36.194190 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:36.694526 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:37.194173 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:37.694194 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:38.193818 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:38.694304 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:39.194209 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:39.694222 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:40.194581 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:40.694262 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.3519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:41.194267 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:41.694261 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:42.194268 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:42.694277 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:43.193217 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:43.695083 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:44.194532 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:44.694345 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:45.194371 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.351923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:45.694431 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.352012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:46.194368 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.352014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:46.694470 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.352017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:47.195164 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.352019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:47.694436 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.352021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:48.193269 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.352023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:48.693944 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.352025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.195084 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.218423 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.218437 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.352032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.218504 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.239034 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.239048 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.352039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.239118 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.260620 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.260635 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.352046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.260705 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.284002 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.284022 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.352108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.284095 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.308037 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.308052 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.352118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.308112 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.335333 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.335350 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.352124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.335443 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.359814 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.359829 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.352131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.359907 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.383679 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.383692 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.352138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.383699 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.35214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.383706 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.352143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.430899 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.352145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.430920 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.352244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.447588 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.352249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.447606 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.352252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:49.524628 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.352254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.352257-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.352259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.352261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.352266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.352269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.352271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.352273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.352275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.352277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.524649 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.352279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.524657 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.352282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.546066 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.352285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:49.546084 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.352287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.116712 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.35241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.134042 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.185752 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.185773 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.352417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.185863 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.217535 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.217559 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.352425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.217665 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.254748 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.254768 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.352432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.254862 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.283456 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.283475 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.352441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.283573 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.310170 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.310185 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.352449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.310260 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.342334 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.342351 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.352577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.342432 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.369357 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.369376 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.352584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.369464 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.399641 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.399657 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.35259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.399664 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.352593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.399673 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.352595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.451657 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.352597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.451682 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.352599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.467302 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.352602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.467331 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.352604-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:52.543152 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.352607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.35274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.352745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.352747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.352749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.352751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.352754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.352756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.352758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.35276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.543167 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.352762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.543178 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.352765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.563313 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.352767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:52.563332 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.352769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.150068 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.352771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.164345 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.193224 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.193243 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.352779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.193367 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.221661 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.221678 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.352904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.221777 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.247803 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.247820 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.352912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.247916 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.275235 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.275252 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.352923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.275330 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.352925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.303553 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.303567 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.352946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.303650 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.332041 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.332063 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.352957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.332158 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.360831 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.352962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.360848 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.352974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.360925 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.388283 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.388297 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.353078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.388311 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.353081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.388324 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.353084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:55.458382 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.353086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.353088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.35309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.353092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.353096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.353098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.3531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.353103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.353105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.353107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.458401 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.353109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.458411 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.477179 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.353117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.477195 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.353219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.540033 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.353232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.540049 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.582784 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.35324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:55.582800 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.098426 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.353245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.109986 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.132857 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.132872 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.353256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.132950 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.155623 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.155638 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.353263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.155712 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.178639 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.190143 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.353272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.190220 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.212746 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.212762 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.353362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.212850 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.239790 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.239807 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.35337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.239885 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.267619 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.267633 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.353376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.267723 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.293736 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.293750 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.353383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.293817 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.323301 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.323315 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.353389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.323324 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.353392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.323332 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.353394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:47:58.402702 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.353471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.353478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.353481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.353485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.353489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.353493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.353514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.353518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.353523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.353526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.402720 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.353528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.402729 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.422440 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.353536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.422485 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.353544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.490940 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.353549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.490963 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.551909 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.353555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:47:58.551930 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.072041 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.353615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.085701 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.111411 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.111431 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.353626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.111508 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.138219 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.138236 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.353637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.138339 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.166287 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.166307 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.353653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.166397 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.196532 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.196549 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.353676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.196632 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.224342 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.224357 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.353689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.224438 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.251000 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.251016 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.353768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.251090 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.278878 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.278894 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.353777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.278973 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.353779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.329750 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.329769 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.353784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.329779 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.353786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.329790 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.361787 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.353791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.361819 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.353793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.445539 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.353795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.445555 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.497023 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.3538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.497047 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.353887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.515572 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.353891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:01.515591 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.353894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:01.598720 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.353897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.353899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.353901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.353903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.353906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.353908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.35391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.353912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.353914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.353916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.098910 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.353918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.111735 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.132749 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.353923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.132763 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.353925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.132833 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.153848 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.153862 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.354027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.153936 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.175653 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.175667 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.354033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.175738 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.197296 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.197311 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.35404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.197390 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.222963 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.222981 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.35405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.223076 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.255749 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.255769 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.354057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.255876 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.284933 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.284947 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.354161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.285024 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.308301 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.308315 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.354171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.308327 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.354173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.308355 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.354175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.325894 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.354177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.325912 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.35418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.383176 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.354182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.383194 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.354184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.426024 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.354186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.426041 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.354189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.441295 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.354191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:04.441312 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.354194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:04.501179 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.354197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.354305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.35431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.354313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.354315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.354317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.354319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.354321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.354323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.354325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.001326 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.354328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.012724 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.035485 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.035499 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.354338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.035586 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.058856 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.058870 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.354346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.058936 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.086342 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.086356 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.354433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.086425 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.108284 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.108297 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.354441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.108373 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.129536 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.129549 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.354448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.129624 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.155949 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.155967 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.354455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.156056 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.179401 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.179415 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.354464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.179487 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.201415 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.201432 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.354472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.201439 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.354474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.201447 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.354582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.264832 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.354587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.264848 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.35459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.309177 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.354592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.309196 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.354594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.325054 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.354596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.325096 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.354599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:07.387329 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.354602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.354604-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.354606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.354608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.35461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.354612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.354615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.354621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.354623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.354627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.387352 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.354724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:07.387366 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.35473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:09.908135 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.354732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:09.919859 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:09.945191 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:09.945211 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.354739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:09.945313 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:09.970432 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:09.970447 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.354747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:09.970545 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:09.995440 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:09.995457 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.354754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:09.995558 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.023727 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:10.023743 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.354763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.023821 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.049009 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:10.049024 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.354885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.049094 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.076056 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:10.076069 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.354907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.076129 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.098914 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:10.098932 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.354926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.099006 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.354928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.121836 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.354931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:10.121851 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.354933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.121861 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.354935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.121869 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.354941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.166107 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.354943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.166126 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.354945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.182007 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.354948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.182024 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.35495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:10.247119 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.355031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.355034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.355036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.355039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.355041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.355043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.355045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.355047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.355049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.355052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.247144 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.355054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.247153 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.355056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.264233 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.355058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:10.264246 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.355061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.826197 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.355063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.839001 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.860465 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:12.860478 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.355069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.860547 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355174-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.882883 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:12.882896 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.355178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.882970 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.905783 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:12.905797 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.355185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.905864 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.927311 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:12.927327 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.355191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.927404 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.948301 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:12.948319 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.355198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.948397 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.3552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.976049 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:12.976067 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.355205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.976144 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.999502 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:12.999517 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.355325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:12.999586 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.032999 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:13.033013 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.355335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.033021 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.355337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.033029 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.355339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.048947 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.355342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.048964 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.355344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:13.115159 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.355347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.355349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.355351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.355353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.355355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.355357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.355359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.355361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.355364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.355369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.115175 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.355463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.115188 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.355466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.132318 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.355469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.132333 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.355471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.190179 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.355473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:13.190195 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.355476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.734110 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.355478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.748029 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.771829 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:15.771844 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.355485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.771922 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.793166 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:15.793179 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.355491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.793241 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.812998 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:15.813013 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.355498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.813081 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.836393 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:15.836408 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.355626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.836484 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.858562 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:15.858575 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.355632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.858646 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.882728 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:15.882743 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.355639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.882840 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.906165 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:15.906178 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.355646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.906256 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.929122 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:15.929151 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.355653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.929161 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.355658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.929181 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.355662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.975671 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.35578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.975709 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.355782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.992874 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.355785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:15.992895 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.355788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:16.066250 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.35579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.355792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.355794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.355796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.355798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.3558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.355803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.355809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.355811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.355813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:16.066270 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.355815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:16.066289 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.355817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:16.086043 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.35582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:16.086063 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.355939-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.653923 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.355942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.665745 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.687816 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:18.687830 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.355948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.687900 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.708517 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:18.708533 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.355955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.708608 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.730386 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:18.730402 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.355967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.730474 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.753953 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.355973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:18.753968 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.355976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.754073 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.355978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.776084 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:18.776097 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.355982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.776168 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.796470 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:18.796485 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.356104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.796559 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.816742 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:18.816755 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.356117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.816816 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.837107 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:18.837124 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.356135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.837133 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.356137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.837141 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.35614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.856291 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.356142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.856308 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.356144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.916060 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.356147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.916074 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.356149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.959096 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.356151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.959116 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.356154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.974469 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.356232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:18.974487 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.356241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:19.037669 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.356243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.356246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.356248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.35625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.356252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.356254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.356256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.356259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.356261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.356263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.539197 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.356265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.551811 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.571973 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.571988 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.356272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.572056 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.592480 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.592494 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.35638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.592572 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.612866 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.612881 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.356387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.612959 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.633044 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.633057 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.356394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.633125 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.655169 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.655183 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.356401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.655251 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.676157 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.676170 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.35641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.676235 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.697610 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.697627 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.356418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.697710 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.720611 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.720625 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.356524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.720632 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.356529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.720643 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.356532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:21.786571 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.356535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.356537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.356539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.356541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.356543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.356545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.356547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.356549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.356551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.356553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.786585 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.356556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.786598 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.356558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.802847 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.35656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.802863 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.356666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.857621 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.356669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.857635 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.356671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.901599 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.356673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:21.901616 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.356675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.416829 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.356678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.429558 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.449517 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.449532 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.356684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.449604 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.471162 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.471183 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.356693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.471251 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.492177 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.492192 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.356702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.492256 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.512823 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.512835 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.356815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.512903 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.532808 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.532822 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.356822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.532906 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.552952 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.552966 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.356828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.553050 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.573381 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.573396 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.356835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.573482 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.356837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.593627 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.356841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.593641 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.356843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.593648 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.356846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.593657 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.356848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.632366 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.35685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.632382 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.356976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.646715 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.356983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.646737 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.356991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:24.705837 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.356993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.356996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.356998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.357014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.357016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.357019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.357021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.357024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.357028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.705851 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.357031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.705858 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.357035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.722410 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.357038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:24.722425 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.357042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.282092 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.357116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.293566 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.314948 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.314963 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.357127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.315033 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.335902 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.335916 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.357137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.335986 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.356982 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.356997 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.357144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.357080 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.379257 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.379271 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.357151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.379334 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.399874 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.399889 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.357158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.399964 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.421923 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.421938 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.357291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.422005 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.442418 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.442434 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.357309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.442515 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.462653 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.462667 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.357333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.462673 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.357335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.462681 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.357337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.478963 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.35734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.478977 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.357342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.533793 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.357344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.533809 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.357346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.575650 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.357349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.575666 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.357351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.590357 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.357434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:27.590374 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.357439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:27.649832 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.357445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.357448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.35745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.357452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.357454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.357456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.357459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.357461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.357465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.357467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.150004 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.357469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.161312 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.182884 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.182897 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.357478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.182956 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.204172 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.204186 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.357578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.204261 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.225092 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.225111 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.357585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.225192 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.248793 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.248809 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.357592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.248884 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.274679 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.274701 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.357599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.274796 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.298569 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.298581 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.357608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.298653 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.338274 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.338288 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.357615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.338357 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.359345 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.359362 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.35773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.359372 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.35774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.359382 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.357743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.376487 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.357745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.376502 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.357747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.433242 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.357749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.433266 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.357752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.473765 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.357754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.473781 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.357757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.488479 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.357759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:30.488498 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.357761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:30.547153 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.357764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.357766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.357768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.35777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.357863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.357865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.357867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.357869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.357871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.357873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.048390 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.357875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.061137 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.083539 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.083557 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.357882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.083630 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.105598 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.105612 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.357888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.105679 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.127003 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.357893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.127028 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.357895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.127104 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.357897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.149269 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.3579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.149517 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.358028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.149771 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.170690 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.191845 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.358036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.191917 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.213992 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.214009 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.358046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.214104 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.239383 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.239398 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.358052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.239471 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.270392 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.270408 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.358059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.270416 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.358062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.270423 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.358064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.329184 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.358066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.329205 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.358069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.350686 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.358178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.350731 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.358181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:33.416222 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.358184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.358186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.358187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.358189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.358191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.358193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.358196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.358198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.3582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.358204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.416239 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.358206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.416248 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.358209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.444233 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.358211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:33.444257 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.358213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.024617 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.358215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.037145 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.057290 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.057304 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.358332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.057375 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.078026 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.078042 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.358338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.078106 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.098466 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.098479 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.358345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.098545 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.118815 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.118830 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.358351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.118897 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.139441 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.139454 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.358358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.139531 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.159848 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.159864 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.358476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.159932 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.181607 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.181621 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.358483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.181685 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.202834 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.202848 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.358507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.202856 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.358509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.202863 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.358512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.244251 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.358514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.244271 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.358516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.259255 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.358521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.259273 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.358524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:36.327811 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.358526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.358528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.35853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.358623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.358625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.358627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.358629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.358634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.358636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.358638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.327823 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.358641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.327829 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.358644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.344082 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.358647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:36.344098 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.358649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.898129 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.358651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.910921 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.931452 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:38.931466 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.358658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.931531 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.951764 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:38.951777 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.358666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.951843 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.972047 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:38.972061 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.358787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.972123 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.992343 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:38.992358 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.358794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:38.992428 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.012589 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:39.012606 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.358801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.012683 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.032403 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:39.032417 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.358808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.032479 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.053253 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:39.053267 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.358814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.053334 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.358816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.074229 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.358819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:39.074243 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.358928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.074251 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.358933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.074259 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.358935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.113927 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.358937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.113944 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.35894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.128386 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.358942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.128401 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.358945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:39.187144 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.358947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.358949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.358951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.358953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.358956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.358961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.358963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.358966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.358968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.35897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.187157 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.358972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.187163 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.359086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.203209 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.359089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:39.203223 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.359091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.762106 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.359093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.774640 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.795894 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:41.795909 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.3591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.795983 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.816336 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:41.816350 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.359107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.816420 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.836585 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:41.836603 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.359113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.836677 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.857005 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:41.857018 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.35912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.857081 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.877216 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:41.877228 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.359253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.877294 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.898634 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:41.898649 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.35926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.898713 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.918906 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:41.918919 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.359267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.918977 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.939168 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:41.939184 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.359273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.939190 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.359275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.939198 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.359278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.977847 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.35928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.977862 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.359283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.992063 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.359285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:41.992077 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.359383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:42.049888 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.359388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.35939-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.359393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.359395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.359397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.359399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.359401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.359403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.359405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.359408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:42.049905 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.359413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:42.049913 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.359415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:42.065967 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.359418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:42.065981 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.35942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.621694 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.359423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.633326 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.654802 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.654817 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.359531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.654884 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.676020 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.676035 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.359538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.676098 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.697476 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.697489 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.359544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.697553 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.718342 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.718355 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.359551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.718424 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.739520 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.739535 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.359558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.739602 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.761547 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.761561 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.359565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.761628 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.35968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.781448 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.781461 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.359686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.781519 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.800927 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.800941 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.359693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.800947 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.359696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.800955 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.359698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.817177 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.3597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.817191 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.359705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.870930 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.359708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.870944 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.35971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.913344 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.359712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.913361 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.359714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.928016 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.359717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:44.928032 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.359719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:44.986802 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.35983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.359832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.359835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.359837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.359839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.359841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.359843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.359846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.359847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.35985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.487246 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.359852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.500564 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.522706 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.522725 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.359859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.522830 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.545324 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.545344 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.359865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.545443 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.569058 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.569072 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.359978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.569133 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.589531 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.589545 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.359986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.589614 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.610610 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.35999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.610626 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.359992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.610706 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.359994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.631707 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.359997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.631722 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.360001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.631803 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.653354 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.653367 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.360008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.653438 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.674836 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.674850 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.360014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.674857 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.360127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.674865 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.360129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.735349 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.360131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.735364 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.360134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.780018 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.360136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.780037 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.360138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.798414 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.36014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.798437 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.360143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:47.865096 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.360145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.360147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.360149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.360151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.360153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.360155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.360158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.36016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.360161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.360163-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.865109 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.36026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:47.865116 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.360263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.384178 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.360265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.395582 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.416567 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.416582 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.360271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.416650 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.438165 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.438177 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.360278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.438243 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.458329 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.458343 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.360287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.458412 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.479424 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.479438 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.360295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.479509 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.500068 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.500081 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.360423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.500150 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.530868 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.530881 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.36043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.530953 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.552365 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.552379 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.360437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.552448 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.573416 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.573430 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.360444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.573438 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.360449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.573446 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.360453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.613905 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.360455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.613921 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.360458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.628320 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.36046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.628335 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.360575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:50.687230 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.360579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.360581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.360583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.360585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.360587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.360589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.360592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.360594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.360596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.360598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.687242 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.3606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.687249 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.360603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.703573 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.360605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:50.703588 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.360607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.259088 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.360609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.272188 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.291856 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.291870 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.360738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.291937 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.313106 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.313119 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.36075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.313185 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.334349 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.334364 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.360757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.334431 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.355566 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.355580 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.360768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.355646 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.376011 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.376024 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.360775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.376081 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.397708 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.397722 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.360782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.397801 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.418687 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.418701 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.36089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.418776 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.360894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.438839 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.360896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.438853 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.360898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.438860 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.3609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.438867 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.360903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.480348 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.360905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.480366 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.360908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.495228 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.36091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.495262 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.360912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:53.557777 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.360915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.360917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.360919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.360921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.360923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.360925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.360927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.361036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.361039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.361041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.557796 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.361043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.557806 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.361046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.573891 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.361051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:53.573905 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.361053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.130326 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.361055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.143177 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.163911 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.163926 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.361063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.163996 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.184767 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.184784 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.36107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.184863 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.205742 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.205757 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.361077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.205837 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.226790 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.226812 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.361198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.226888 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.3612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.248269 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.248283 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.361204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.248355 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.269336 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.269347 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.361211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.269416 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.289603 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.289618 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.36122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.289686 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.310271 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.310287 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.361227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.310294 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.361229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.310301 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.361345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.349323 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.36135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.349338 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.361353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.363754 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.361355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.363768 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.361358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:56.422631 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.361361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.361363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.361365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.361367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.361369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.361371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.361374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.361376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.361382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.361384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.422643 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.361386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.422650 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.361388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.438961 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.361391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:56.438974 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.361488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:58.993898 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.361492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.005430 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.027337 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.027353 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.361501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.027433 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.049099 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.049114 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.361508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.049190 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.070639 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.070653 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.361514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.070718 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.091476 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.091489 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.361522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.091556 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.115518 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.115531 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.361649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.115605 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.138611 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.138627 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.361658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.138703 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.161549 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.161561 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.361665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.161626 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.183481 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.183494 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.361672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.183502 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.361674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.183512 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.361676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.226272 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.361679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.226288 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.361681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.241127 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.361683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.241143 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.361686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.305684 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.361814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.361817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.361819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.361821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.361823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.361825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.361827-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.361829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.361831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.361833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.305696 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.361835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.305702 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.361838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.325132 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.36184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.325149 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.361842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.889411 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.361844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.902066 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.922202 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:01.922215 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.361851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.922281 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.942991 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:01.943004 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.361982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.943068 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.963530 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:01.963542 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.361989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.963608 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.984117 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.361993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:01.984132 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.361996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.984205 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.361998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.021392 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.021409 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.362002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.021489 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.043387 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.043401 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.362012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.043468 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.064298 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.064313 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.36213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.064385 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.085683 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.085696 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.362137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.085703 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.362139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.085710 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.362141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.101858 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.362144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.101874 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.362146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.154237 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.362148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.154251 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.362151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.195115 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.362153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.195131 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.362157-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.209196 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.362159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.209211 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.362162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.267899 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.362164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.362281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.362284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.362286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.362289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.362291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.362295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.362297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.362299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.362301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.768924 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.362304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.780076 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.802146 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.802158 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.362311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.802223 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.823961 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.823975 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.362317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.824043 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.844197 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.844213 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.362325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.844286 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.864333 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.864346 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.36244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.864400 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.884983 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.884997 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.362449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.885063 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.907703 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.907718 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.362455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.907793 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.930867 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.930881 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.362462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.930965 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.956033 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.956053 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.36247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.956060 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.362472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.956068 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.362586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.001926 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.36259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.001946 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.362592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.016946 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.362594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.016965 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.362597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:05.086503 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.362599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.362601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.362603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.362605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.362607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.36261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.362612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.362616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.362618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.36262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.086517 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.362622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.086525 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.362624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.105010 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.362627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.105030 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.362721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.664978 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.362725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.675588 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.697850 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.697867 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.362732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.697988 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.720373 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.720388 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.362739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.720459 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.742848 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.742863 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.362745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.742933 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.764996 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.765009 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.362752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.765079 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.788730 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.788742 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.362885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.788805 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.811813 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.811826 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.362892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.811894 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.834305 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.834318 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.362898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.834386 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.362901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.857058 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.362903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.857074 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.362908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.857084 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.36291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.857095 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.362912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.918765 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.362915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.918780 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.362917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.962690 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.362919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.962705 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.362922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.978052 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.363032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.978066 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.363035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:08.046906 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.363038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.36304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.363042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.363044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.363046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.363048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.36305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.363053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.363055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.363057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.046919 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.363059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.046926 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.363063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.566919 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.363066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.579590 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.599743 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.599756 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.363194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.599824 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.619707 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.3632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.619721 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.363202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.619802 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.641502 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.641515 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.363208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.641806 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.662515 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.662529 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.363215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.662597 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.683383 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.683398 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.363222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.683468 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.704177 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.704192 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.363229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.704260 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.725501 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.725515 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.363349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.725581 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.745709 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.745724 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.363359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.745734 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.363361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.745748 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.363363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.803665 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.363365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.803680 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.363367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.843577 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.36337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.843595 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.363372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.858222 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.363374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.858237 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.363377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.916359 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.36338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.363382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.363384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.363386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.363511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.363516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.363518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.36352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.363523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.363526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.916372 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.363528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.916380 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.36353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.432924 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.363532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.444326 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.465356 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.465370 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.363539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.465443 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.486716 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.486730 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.363549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.486799 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.506707 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.506719 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.363556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.506789 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.527644 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.527657 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.363666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.527724 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.549746 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.549761 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.363672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.549821 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.569742 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.569755 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.363679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.569821 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.589413 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.589426 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.363686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.589482 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.610581 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.610594 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.363692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.610601 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.363695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.610608 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.363697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.666021 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.36381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.666038 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.363812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.705174 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.363815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.705188 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.363817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.719513 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.363819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.719529 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.363825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.779791 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.363829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.363831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.363833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.363835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.363837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.363839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.363842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.363844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.36385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.363853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.779803 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.363855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.779810 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.363958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.297572 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.363962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.308486 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.329097 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.329111 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.363969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.329179 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.349914 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.349928 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.363976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.349995 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.371888 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.371901 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.363982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.371965 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.392460 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.392474 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.363992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.392539 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.363994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.414467 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.363996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.414482 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.363998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.414553 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.434671 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.434684 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.364123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.434748 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.455866 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.455879 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.36413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.455948 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.476399 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.476413 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.364137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.476420 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.364139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.476426 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.364141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.519301 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.364144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.519316 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.364146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.533989 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.364148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.534004 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.364151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.592589 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.364269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.364272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.364274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.364276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.364278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.36428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.364283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.364285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.364287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.364289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.592601 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.364291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.592608 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.364294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.608617 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.364296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.608630 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.364298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.162509 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.364302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.175008 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.196493 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.196507 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.364312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.196577 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.216653 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.216666 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.364424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.216737 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.239985 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.239999 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.364434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.240070 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.262490 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.262506 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.364441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.262578 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.284013 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.284026 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.36445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.284110 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.335228 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.335241 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.364459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.335341 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.356333 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.356349 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.364468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.356418 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.378597 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.378610 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.364582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.378618 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.364584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.378626 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.364586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.421667 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.364589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.421684 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.364591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.436895 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.364594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.436910 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.364598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.504221 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.364602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.364605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.364608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.364612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.364616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.364619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.364622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.364759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.364765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.364768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.504234 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.36477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.504241 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.364773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.523919 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.364775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.523942 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.364777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.090201 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.36478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.101644 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.121394 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.121407 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.364786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.121463 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.144825 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.144839 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.364793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.144912 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.166510 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.166528 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.3648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.166603 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.188982 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.188996 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.364911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.189068 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.216169 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.216203 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.364922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.216316 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.240534 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.240548 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.364928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.240624 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.264433 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.264458 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.364935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.264540 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.364937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.293528 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.364941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.293542 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.364944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.293550 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.364946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.293558 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.365053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.371914 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.365057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.365059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.365062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.365064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.365067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.365069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.365071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.365073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.365075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.36508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.371930 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.365082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.371942 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.365085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.391072 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.365087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.391089 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.365089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.450037 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.365094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.450064 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.365096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.499821 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.365098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.499843 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.365205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.015539 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.365209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.027395 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.047913 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.047927 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.365216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.047990 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.067754 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.067767 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.365223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.067833 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.088003 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.088016 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.365229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.088082 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.107787 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.107800 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.365236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.107866 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.128085 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.128098 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.36537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.128171 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.150365 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.150377 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.365379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.150446 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.170976 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.170989 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.365386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.171057 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.191911 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.191925 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.365402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.191932 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.365406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.191939 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.365408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.232861 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.365411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.232895 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.365413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.250019 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.365415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.250040 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.365418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.339141 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.365519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.365524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.365526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.365528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.36553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.365532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.365535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.365537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.365539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.365541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.339153 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.365544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.339160 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.365546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.357025 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.365548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.357041 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.365551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.912874 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.365553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.925572 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.945554 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:27.945567 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.36556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.945636 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.966132 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:27.966147 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.365679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.966218 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.986924 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:27.986938 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.365689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.987003 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.006974 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.006988 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.365696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.007052 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.027540 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.3657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.027554 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.365703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.027621 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.047631 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.047648 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.365709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.047713 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.067783 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.067797 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.365716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.067864 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.365829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.088694 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.365832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.088707 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.365834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.088715 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.365836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.088722 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.365841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.127866 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.365843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.127881 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.365846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.141884 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.365848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.141901 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.365851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.199538 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.365853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.365857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.365859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.365861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.365865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.365867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.365869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.365993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.365997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.365999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.199550 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.366001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.199557 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.366004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.216963 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.366006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.216980 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.366009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.776140 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.366011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.788773 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.809067 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.809081 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.366018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.809149 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.829630 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.829643 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.366024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.829723 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.851133 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.851146 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.366031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.851215 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.871213 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.871231 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.366155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.871305 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.892185 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.892197 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.366162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.892270 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.913737 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.913751 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.366173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.913818 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.934858 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.934872 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.366179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.934937 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.957215 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.957231 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.366186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.957246 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.366188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.957260 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.36619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.996800 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.366296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.996834 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.366301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.011697 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.366303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.011712 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.366309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:31.071876 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.366311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.366313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.366315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.366318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.36632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.366322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.366324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.366326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.366328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.36633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.071889 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.366333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.071897 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.366335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.088506 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.366337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.088521 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.366433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.641346 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.366436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.652371 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.673167 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.673180 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.366442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.673252 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.693961 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.693976 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.366449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.694044 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.715206 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.715219 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.366455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.715295 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.736201 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.736215 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.366464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.736286 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.757581 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.757594 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.366471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.757667 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.778316 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.778331 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.366616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.778393 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.799397 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.799409 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.366623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.799474 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.819877 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.819892 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.366629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.819899 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.366632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.819906 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.366634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.834121 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.366637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.834137 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.36664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.893941 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.366642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.366645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.366648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.366758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.366761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.366763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.366765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.366767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.366769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.366771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.893953 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.366774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.893960 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.366776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.910592 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.366778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.910606 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.36678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.965240 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.366782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.965255 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.366785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.505279 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.366788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.516752 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.539138 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.539152 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.366797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.539223 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.560806 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.560820 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.366923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.560889 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.581381 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.581395 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.36693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.581462 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.601146 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.601158 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.366937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.601226 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.620669 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.620683 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.366946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.620752 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.641539 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.641554 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.366953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.641621 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.366955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.661541 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.366957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.661554 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.36696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.661619 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.682572 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.682586 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.367072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.682594 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.367074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.682601 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.367081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.726037 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.367083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.726052 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.367086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.740573 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.367088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.740588 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.367091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.800128 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.367093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.367095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.367097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.367099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.367102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.367104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.367106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.367212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.367214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.367217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.800142 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.367219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.800149 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.367221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.816956 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.367223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.816971 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.367226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.371202 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.367228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.382181 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.402259 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.402271 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.367235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.402336 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.422874 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.422888 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.367244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.422962 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.443692 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.443705 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.36725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.443773 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.464057 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.464071 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.367375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.464144 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.485585 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.485601 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.367381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.485681 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.520954 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.520970 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.367388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.521037 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.543234 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.543249 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.367397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.543325 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.567119 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.567136 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.367404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.567146 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.367406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.567156 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.367515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.584422 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.367518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.584437 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.36752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.640572 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.367522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.640587 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.367524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.680958 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.367526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.680973 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.367529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.695456 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.367532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.695471 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.367534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.755348 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.367537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.367539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.367541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.367543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.367545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.367547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.367549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.367551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.367677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.367681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.256236 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.367683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.267340 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.287323 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.287338 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.367693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.287413 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.307940 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.307954 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.367699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.308023 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.328046 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.328060 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.367706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.328125 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.350143 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.350156 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.367713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.350225 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.371466 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.371480 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.367832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.371561 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.391930 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.391943 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.367839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.392014 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.412144 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.367843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.412157 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.367846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.412228 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.367848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.432326 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.432343 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.367852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.432352 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.367855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.432361 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.367857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.493467 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.36786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.367862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.367864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.367866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.36802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.368022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.368024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.368026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.368028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.36803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.493480 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.368033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.493488 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.368035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.511106 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.368039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.511120 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.368041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.572848 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.368044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.572864 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.368046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.615202 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.368048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.615217 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.36805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.130840 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.368053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.142007 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.162356 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.162368 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.368059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.162447 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.183786 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.183799 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.368182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.183864 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.203441 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.203457 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.368189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.203523 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.224484 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.224495 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.368195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.224559 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.245307 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.3682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.245320 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.368202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.245387 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.265083 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.265097 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.368209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.265166 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.285815 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.285828 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.368332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.285893 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.306506 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.306519 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.36834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.306526 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.368342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.306534 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.368344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.346797 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.368346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.346816 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.368351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.361524 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.368353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.361538 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.368356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.419775 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.368358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.36836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.368362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.368364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.368366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.368368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.368371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.368486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.3685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.368503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.419788 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.368505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.419796 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.368508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.436037 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.36851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.436050 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.368512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:47.994635 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.368515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.006785 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.026861 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.026875 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.368525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.026943 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.046972 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.046985 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.368532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.047048 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.067950 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.067962 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.368538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.068029 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.089957 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.089972 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.368649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.090039 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.111679 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.111692 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.368658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.111759 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.132268 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.132281 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.368665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.132346 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.154048 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.154062 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.368672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.154133 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.174048 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.190573 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.36868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.190584 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.368682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.190593 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.368803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.245508 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.368809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.245522 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.368811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.286037 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.368814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.286054 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.368816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.300305 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.368818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.300320 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.368822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.358568 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.368825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.368827-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.368829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.368831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.368835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.368838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.36884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.368842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.368844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.368852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.358584 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.368943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.358591 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.368946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.875671 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.368948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.888631 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.908741 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.908757 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.368957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.908830 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.930024 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.930038 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.368963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.930106 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.950193 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.950206 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.36897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.950271 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.970317 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.970332 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.368976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.970405 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.368979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.990145 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.368981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.990162 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.369101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.990229 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.011482 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:51.011502 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.369111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.011576 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.031381 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:51.031394 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.369118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.031461 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.052147 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:51.052160 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.369125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.052167 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.369127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.052175 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.369129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.092878 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.369132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.092894 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.369134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.107616 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.369137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.107632 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.369139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:51.166715 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.369252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.369256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.369258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.36926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.369262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.369265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.369267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.369269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.369271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.369273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.166730 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.369275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.166737 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.369277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.182658 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.36928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.182673 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.369282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.737581 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.369285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.748893 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.768730 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.768744 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.369292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.768815 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.790248 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.790271 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.369417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.790358 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.811223 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.811238 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.369424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.811310 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.838034 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.838048 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.369431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.838116 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.859016 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.859030 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.369437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.859098 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.879969 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.879983 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.369444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.880052 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.901000 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.901013 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.369558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.901082 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.921974 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.921987 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.369567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.921994 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.36957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.922002 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.369572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.963533 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.369574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.963553 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.369576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.979919 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.369579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.979933 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.369581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:54.038390 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.369584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.369586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.369588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.36959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.369592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.369594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.369596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.369726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.369732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.369735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:54.038404 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.369737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:54.038411 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.36974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:54.054872 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.369742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:54.054885 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.369744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.613192 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.369747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.626569 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.647315 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.647329 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.369753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.647394 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.667720 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.36976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.667734 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.369762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.667803 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.688353 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.688365 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.369769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.688432 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.36988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.710541 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.710560 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.369891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.710654 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.732237 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.732251 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.369899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.732319 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.753577 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.753598 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.369906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.753675 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.776395 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.776410 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.369913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.776480 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.369915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.831996 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.369917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.832010 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.36992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.832016 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.369922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.832024 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.370036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.845980 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.37004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.845996 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.370043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.905931 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.370046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.370051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.370053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.370055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.370057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.37006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.370064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.370067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.370069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.370071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.905946 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.370075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.905954 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.37008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.922112 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.370099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.922127 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.370105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.976549 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.370169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.976564 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.370172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.519593 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.370174-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.531106 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.551555 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.551568 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.370181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.551640 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.573595 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.573608 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.370188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.573693 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.594192 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.594205 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.370195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.594270 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.614321 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.614335 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.370209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.614403 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.635310 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.635325 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.370329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.635393 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.656327 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.656342 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.370343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.656414 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.677253 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.677266 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.370365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.677325 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.699091 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.699103 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.370372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.699111 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.370377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.699118 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.370379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.746074 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.37039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.746094 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.370396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.761960 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.370401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.761979 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.370408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.832094 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.370544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.370566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.370571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.370574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.370577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.370579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.370581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.370583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.370585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.370587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.832110 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.370589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.832116 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.370591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.848241 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.370594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.848254 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.370596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.404457 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.370599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.417123 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.437753 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.437765 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.370605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.437830 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.459003 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.459017 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.370704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.459084 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.480384 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.480398 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.370711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.480465 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.501529 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.501544 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.37072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.501609 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.521586 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.521600 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.370727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.521669 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.543795 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.543809 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.370734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.543881 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.370737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.565504 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.370739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.565518 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.371066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.565589 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.586599 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.586614 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.371084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.586622 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.371087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.586631 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.371089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.626693 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.371092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.626710 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.371095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.640892 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.371097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.640906 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.371101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.700923 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.371104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.371106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.371109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.371111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.371114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.371116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.371118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.371287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.371308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.37131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.700936 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.371312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.700944 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.371315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.717822 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.371337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.717837 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.37134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.279451 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.371342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.292247 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.312511 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.312525 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.37135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.312589 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.333324 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.333339 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.371357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.333409 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.354858 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.354872 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.371365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.354944 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.374604 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.374617 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.371491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.374708 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.395921 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.395934 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.371499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.396007 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.415481 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.415495 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.371506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.415557 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.435970 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.435984 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.371513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.436051 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.456740 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.456754 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.37152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.456761 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.371523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.456769 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.37167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.512035 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.371675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.512051 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.371678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.551622 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.371681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.551639 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.371684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.566318 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.371689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.566335 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.371692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.627508 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.371695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.371697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.371699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.371701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.371704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.371706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.371709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.371711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.371714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.371716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.627522 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.371824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.627529 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.371837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.144557 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.37184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.156068 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.176196 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.190819 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.37185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.190913 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.212016 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.212028 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.371858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.212092 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.232662 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.232676 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.371866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.232748 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.252494 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.371871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.252506 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.371873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.252572 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.371875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.272346 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.272359 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.372026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.272425 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.292706 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.292726 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.37204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.292800 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.313783 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.313797 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.372052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.313853 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.334224 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.334236 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.372065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.334243 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.372068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.334251 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.37207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.374299 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.372073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.374316 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.372075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.388548 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.37208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.388562 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.372204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.447560 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.372213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.372216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.372218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.372221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.372226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.372229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.372244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.372252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.372254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.372256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.447573 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.372259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.447579 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.372262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.464176 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.372264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.464190 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.372266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.018071 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.37227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.029204 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.052212 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.052226 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.3724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.052294 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.072612 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.072627 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.372413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.072693 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.092377 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.092392 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.37242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.092460 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.112759 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.112772 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.372427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.112862 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.133628 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.133642 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.372435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.133711 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.154383 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.154397 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.372442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.154463 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.175532 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.175545 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.372598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.175607 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.196682 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.196696 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.372613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.196703 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.372616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.196711 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.372618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.237285 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.372621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.237301 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.372624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.251832 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.372626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.251849 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.372629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.310262 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.372631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.372633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.372635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.372638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.37264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.372642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.372645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.372816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.372822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.372824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.310275 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.372827-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.310281 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.372829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.326683 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.372832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.326699 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.372834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.882614 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.372837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.895205 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.915881 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:13.915893 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.372848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.915966 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.936484 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:13.936498 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.37286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.936563 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.372862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.957865 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.372864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:13.957884 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.372867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.957967 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.979311 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:13.979328 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.373062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.979394 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.001835 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.001850 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.37307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.001926 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.032567 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.032583 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.373078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.032656 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.054140 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.054153 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.373085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.054209 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.074908 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.074923 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.373093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.074930 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.373096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.074937 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.373213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.141150 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.373221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.373225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.373232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.373237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.373241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.373244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.373248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.373252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.373254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.373257-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.141163 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.373259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.141170 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.373261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.157497 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.373264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.157511 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.373267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.214077 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.373271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.214092 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.373274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.257879 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.373277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.257898 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.373363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.774971 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.373369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.787505 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.808006 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.808020 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.373379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.808089 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.828474 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.828487 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.373388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.828557 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.848986 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.849000 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.373399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.849068 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.869705 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.869719 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.373406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.869787 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.891040 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.891055 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.37353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.891138 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.911237 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.911251 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.373544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.911320 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.932391 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.932404 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.373554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.932467 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.953109 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.953122 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.373564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.953129 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.373567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.953136 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.373572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.994755 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.373594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.994774 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.373601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.010187 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.373605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.010203 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.373607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:17.072221 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.373672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.373679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.373682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.373684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.373687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.373693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.373696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.373698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.3737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.373703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.072234 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.373706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.072240 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.373708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.088545 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.373711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.088559 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.373713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.645546 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.373715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.658207 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.678306 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.678320 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.373723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.678389 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.698902 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.698918 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.373844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.698986 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.720168 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.720180 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.373851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.720253 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.741281 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.741293 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.373868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.741372 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.762208 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.762221 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.373876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.762289 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.782579 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.782594 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.373886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.782662 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.804002 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.804016 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.373978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.804082 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.373983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.824083 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.373986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.824097 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.373989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.824104 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.373991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.824112 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.373993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.838601 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.373997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.838618 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.373999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.900616 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.374002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.374005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.374007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.374009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.374012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.374015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.374017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.37402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.374022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.374024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.900630 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.374117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.900637 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.374125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.917904 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.374132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.917919 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.374143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.974103 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.374148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.974120 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.374151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.521337 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.374155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.532524 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.553126 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.553141 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.374164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.553209 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.573329 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.573342 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.374175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.573408 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.594865 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.594879 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.374184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.594962 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.614710 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.614725 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.37427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.614805 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.636184 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.636200 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.374284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.636266 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.657527 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.657540 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.374292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.657612 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.676927 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.676950 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.3743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.677017 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.697799 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.697813 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.374311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.697821 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.374315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.697828 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.374414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.739956 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.37442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.739973 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.374423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.754196 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.374426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.754212 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.374429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.813988 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.374432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.374434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.374437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.374439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.374441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.374444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.374446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.374449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.374453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.374456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.814004 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.37446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.814011 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.374462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.830176 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.374465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.830192 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.374548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.385654 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.374554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.398094 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.419399 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.419413 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.374565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.419485 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.439832 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.439845 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.374573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.439910 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.460381 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.460396 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.374587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.460463 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.481251 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.481265 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.374598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.481329 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.3746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.501757 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.501772 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.374719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.501844 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.523935 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.523959 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.374736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.524028 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.544509 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.544523 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.374744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.544613 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.565009 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.374749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.565022 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.374751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.565030 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.374754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.565037 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.374756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.607299 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.374759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.607316 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.374764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.622238 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.374768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.622256 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.374872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.682184 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.374877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.374883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.374885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.374887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.37489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.374893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.374895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.374898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.3749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.374902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.682198 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.374905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.682205 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.374908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.698529 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.37491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.698543 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.374913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.253413 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.374915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.264859 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.374918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.286219 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.286233 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.375036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.286302 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.306497 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.306511 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.375046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.306579 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.328339 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.328352 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.375057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.328417 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.349059 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.349073 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.375064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.349144 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.369572 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.369586 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.375074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.369654 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.389592 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.389606 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.375086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.389677 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.410927 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.410940 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.375206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.411015 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.430835 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.430848 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.37522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.430855 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.375222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.430862 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.37523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.447162 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.375235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.447175 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.375238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.501325 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.375243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.501340 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.375248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.543596 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.375251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.543611 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.375254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.558530 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.375256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.558546 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.37526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.618291 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.375263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.375333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.375338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.375341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.375344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.375346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.375348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.375351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.375353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.375355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.119489 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.37536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.132254 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.153116 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.153130 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.375368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.153199 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.174643 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.174656 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.375378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.174722 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.195280 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.195298 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.375385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.195367 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.216146 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.216160 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.375498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.216232 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.238725 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.238738 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.37551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.238803 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.261067 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.261079 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.375533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.261147 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.284650 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.284664 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.375544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.284730 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.339532 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.339545 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.375551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.339553 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.375553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.339560 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.375693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.379101 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.375715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.379117 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.375719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.393705 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.375722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.393721 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.375747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.452826 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.375751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.375755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.375758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.375761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.375765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.375769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.375774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.375776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.375778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.375781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.452840 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.375784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.452846 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.375786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.469473 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.375792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.469488 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.375883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.028642 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.375891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.040785 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.061738 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.061751 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.375913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.061820 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.081632 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.081646 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.375923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.081713 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.102148 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.102161 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.375932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.102230 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.375938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.123278 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.123290 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.375948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.123360 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.143653 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.375953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.143665 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.37614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.143730 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.164374 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.164388 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.376173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.164458 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.185654 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.185668 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.376186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.185737 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.206778 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.206792 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.376194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.206799 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.376198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.206806 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.376202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.250920 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.376204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.250938 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.376206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.265854 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.376209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.265875 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.376212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.342582 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.376313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.376337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.376342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.376344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.376347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.376349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.376354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.376356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.376359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.376361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.342595 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.376364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.342603 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.376366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.359145 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.376369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.359159 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.376372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.916971 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.376374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.929846 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.951684 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:36.951703 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.376381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.951786 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.972627 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:36.972639 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.376543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.972705 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.993330 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:36.993344 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.376554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.993413 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.016848 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.016863 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.376566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.016938 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.037686 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.037700 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.376573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.037766 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.058095 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.058114 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.376581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.058183 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.078666 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.078680 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.376713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.078746 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.099327 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.099341 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.376736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.099348 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.376755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.099357 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.376759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.115369 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.376762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.115383 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.376764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.169510 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.376767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.169525 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.37677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.210762 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.376772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.210781 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.376775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.227364 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.376777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.227379 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.376783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.326068 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.376785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.376951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.376954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.376957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.376959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.376962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.376964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.376967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.37697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.376972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.826543 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.376975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.838973 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.860533 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.860548 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.376982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.860614 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.881095 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.881112 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.37699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.881194 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.376992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.901164 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.376994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.901178 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.376997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.901249 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.921453 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.921467 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.377121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.921536 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.942641 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.942655 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.377128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.942725 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.963865 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.963879 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.37714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.963948 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.985103 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.985119 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.377147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.985191 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.006565 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:40.006579 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.377159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.006586 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.377162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.006593 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.377164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.046780 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.377265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.046799 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.37727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.061197 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.377273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.061211 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.377276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:40.121483 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.377278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.377283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.377285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.377287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.37729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.377292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.377294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.377297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.377299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.377301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.121496 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.377303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.121506 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.377306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.137318 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.377308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.137333 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.377418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.692805 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.377424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.704970 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.728040 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.728052 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.377437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.728123 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.749396 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.749411 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.377445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.749468 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.770044 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.770057 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.377452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.770127 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.791306 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.791320 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.377459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.791384 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.812719 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.812733 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.377468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.812799 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.834236 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.834249 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.377585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.834318 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.854800 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.854813 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.377592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.854879 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.875791 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.875805 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.3776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.875812 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.377602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.875821 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.377609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.918953 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.377612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.918973 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.377614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.934007 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.377617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.934022 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.377621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.992946 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.377751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.37776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.377764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.377768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.377781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.377784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.377786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.377789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.377792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.377794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.992958 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.377796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.992965 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.377798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:43.009540 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.377801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:43.009556 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.377804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.564628 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.377806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.576167 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.596081 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.596093 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.377817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.596160 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.616616 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.37791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.616629 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.377916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.616700 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.637588 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.637600 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.377924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.637694 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.658617 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.658629 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.377933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.658694 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.678955 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377939-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.678969 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.377942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.679038 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.698998 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.699013 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.37795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.699081 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.377952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.720738 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.377955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.720752 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.377957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.720829 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.378061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.743339 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.743353 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.378068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.743360 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.378071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.743368 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.378073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.781964 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.378076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.781978 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.378078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.796556 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.378081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.796570 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.378084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.855855 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.37809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.378092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.378094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.378096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.378098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.3781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.378105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.378199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.378203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.378206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.855868 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.378209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.855875 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.378212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.872685 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.378214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.872701 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.37822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.427039 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.378223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.438752 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.378225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.458525 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.458541 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.37823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.458612 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.378232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.479415 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.479429 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.378237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.479496 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.37824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.499642 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.499656 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.378245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.499723 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.378416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.528663 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.528676 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.378428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.528747 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.378431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.549334 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.549349 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.378439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.549419 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.378442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.570183 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.570199 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.378454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.570285 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.378469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.591994 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.592007 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.378482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.592077 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.378485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.612549 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.378489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.612565 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.378491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.612574 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.378495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.612583 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.378671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.656292 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.37868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.656309 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.378687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.671267 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.378692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.671283 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.378697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.730923 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.378702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.378705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.378709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.378713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.378716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.37872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.378724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.378728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.378731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.378735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.730936 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.378738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.730943 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.378743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.747145 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.378912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.747160 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.378921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.302947 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:45.378925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.314492 18111 kubeadm.go:640] restartCluster took 4m13.475957142s\n"} +{"Time":"2023-05-31T12:54:45.378929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:51.314532 18111 out.go:239] ! Unable to restart cluster, will reset it: apiserver healthz: apiserver process never appeared\n"} +{"Time":"2023-05-31T12:54:45.378934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t! Unable to restart cluster, will reset it: apiserver healthz: apiserver process never appeared\n"} +{"Time":"2023-05-31T12:54:45.378943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.314548 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm reset --cri-socket /var/run/dockershim.sock --force\"\n"} +{"Time":"2023-05-31T12:54:45.378948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.732660 18111 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:54:45.378951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.744739 18111 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:54:45.378959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.754401 18111 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:54:45.378963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.754462 18111 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:45.378968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.764026 18111 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:54:45.378972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.378976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.37898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.378983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.379001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.379097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.379103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.379107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.764070 18111 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:54:45.379115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.817753 18111 kubeadm.go:322] [init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.379117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.817795 18111 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.37912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.067704 18111 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.379122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.067790 18111 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.379125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.067876 18111 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.379132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.257699 18111 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.379135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.258643 18111 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.379138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.265286 18111 kubeadm.go:322] [kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.379142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.344729 18111 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.379144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366223 18111 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:54:45.379266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366296 18111 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.379272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366386 18111 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.379275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366474 18111 kubeadm.go:322] [certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.379277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366584 18111 kubeadm.go:322] [certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.37928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366634 18111 kubeadm.go:322] [certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.379283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366680 18111 kubeadm.go:322] [certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.379285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366744 18111 kubeadm.go:322] [certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.379287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366801 18111 kubeadm.go:322] [certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.37929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366875 18111 kubeadm.go:322] [certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.379295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366954 18111 kubeadm.go:322] [certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.379299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366992 18111 kubeadm.go:322] [certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.379301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.367054 18111 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.379304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.547902 18111 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.379306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.695374 18111 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.379308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.851437 18111 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.379313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.975344 18111 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.379442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.976020 18111 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.379451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997493 18111 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:54:45.379454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997614 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.379459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997703 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.379464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997774 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.379468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997872 18111 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.379471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.998053 18111 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.379476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:32.985851 18111 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.379489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:32.986740 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.379496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:32.986984 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.379499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:37.987425 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.379502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:37.987598 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.379504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:47.988404 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.37951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:47.988583 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.379643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:07.989992 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.379651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:07.990153 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.379656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.991684 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.37966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.991912 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.379665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.991922 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:45.379668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.991985 18111 kubeadm.go:322] Unfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.379672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992023 18111 kubeadm.go:322] \ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.379676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992031 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:45.37968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992075 18111 kubeadm.go:322] This error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.379683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992113 18111 kubeadm.go:322] \t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.379687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992187 18111 kubeadm.go:322] \t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.379691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992194 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:45.379695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992271 18111 kubeadm.go:322] If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.379698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992330 18111 kubeadm.go:322] \t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.379702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992381 18111 kubeadm.go:322] \t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.379897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992390 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:45.379909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992475 18111 kubeadm.go:322] Additionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.379919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992558 18111 kubeadm.go:322] To troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.37993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992631 18111 kubeadm.go:322] Here is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.379938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992667 18111 kubeadm.go:322] \t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.379944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992736 18111 kubeadm.go:322] \tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.379951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992778 18111 kubeadm.go:322] \t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.37996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.995659 18111 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.379964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.995731 18111 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.379966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.995852 18111 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.379969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.995944 18111 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.379972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.996015 18111 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.379974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.996079 18111 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.379977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:52:47.996150 18111 out.go:239] ! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.380093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.380099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.380102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.380104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.380107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.38011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.380112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.380115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.38012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.380124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.380128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.380132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.380135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.38014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.380143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.380147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.38031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.380317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.380321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.380325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.380328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.380339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.380343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.380347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.380352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.380356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.38036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.380364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.380369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.380373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.380379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.380383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.380388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.380392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.380456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.380465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.38047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.380474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.380478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.380482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.380486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.38049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.380494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.380498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.380506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.380509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.380524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.380529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.380533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.380535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.380537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.380661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.380677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.380684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.380688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.380692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.380696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.380701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.380705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.38071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.380713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.380716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.38072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.380723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.380726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.380728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.380732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.380734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.380737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.380896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.380906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.38091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.380916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.380919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.380922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.380924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.380926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.380928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.38093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.380933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.380935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.380937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.38094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.380942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.380945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.380947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.381136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.381161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.381165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.381167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.381173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.381177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.38118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.381183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.381186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.38119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.381193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.381197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.3812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.381204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.381208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.381211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.381214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.381217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.381394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.381403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.381406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.381409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.381411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.381414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.381417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.38142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.381422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.381425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.381427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.381429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.381432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.381434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.381436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.381439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.381441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.381637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.381664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.381669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.381679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.381683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.381686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.381703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.381707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.381725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.38173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.381734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.381736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.381739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.381741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.381744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.381746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.381748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.381751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.381879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.381884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.381887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.996182 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm reset --cri-socket /var/run/dockershim.sock --force\"\n"} +{"Time":"2023-05-31T12:54:45.381891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.411288 18111 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:54:45.381893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.423058 18111 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:54:45.381895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.423116 18111 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:45.381898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.432308 18111 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:54:45.3819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.381903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.381905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.381907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.38191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.381912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.381925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:45.381932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.432330 18111 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:54:45.382043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.482151 18111 kubeadm.go:322] [init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.382049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.482193 18111 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.382062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.737434 18111 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.382072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.737516 18111 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.382076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.737598 18111 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.382086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.928647 18111 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.382091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.929340 18111 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.382095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.936444 18111 kubeadm.go:322] [kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.382099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.012512 18111 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.382131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034145 18111 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:54:45.382135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034231 18111 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.382142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034305 18111 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.382144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034384 18111 kubeadm.go:322] [certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.382147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034441 18111 kubeadm.go:322] [certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.382202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034512 18111 kubeadm.go:322] [certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.382207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034569 18111 kubeadm.go:322] [certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.38221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034629 18111 kubeadm.go:322] [certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.382213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034689 18111 kubeadm.go:322] [certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.382216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034790 18111 kubeadm.go:322] [certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.382219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034881 18111 kubeadm.go:322] [certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.382224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034925 18111 kubeadm.go:322] [certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.382227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034994 18111 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.382231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.179440 18111 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.382235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.296270 18111 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.382239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.370877 18111 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.382244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.559086 18111 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.382248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.559832 18111 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.382251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.581694 18111 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:54:45.382253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.581819 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.382256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.581938 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.382366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.582020 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.382372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.582118 18111 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.382377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.582311 18111 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.382393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:29.569138 18111 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.382397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:29.569734 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.382401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:29.569887 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.382405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:34.570792 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.382408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:34.570977 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.382413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.571578 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.382417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.571728 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.382422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.572669 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.382426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.572849 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.382429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.574685 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.382507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.574891 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.382513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.574908 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:45.382516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.574951 18111 kubeadm.go:322] Unfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.382518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575025 18111 kubeadm.go:322] \ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.382525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575040 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:45.382528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575104 18111 kubeadm.go:322] This error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.382531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575170 18111 kubeadm.go:322] \t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.382535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575329 18111 kubeadm.go:322] \t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.382538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575348 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:45.382541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575445 18111 kubeadm.go:322] If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.382543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575486 18111 kubeadm.go:322] \t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.382546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575515 18111 kubeadm.go:322] \t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.382548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575519 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:45.382551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575598 18111 kubeadm.go:322] Additionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.382564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575678 18111 kubeadm.go:322] To troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.382648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575762 18111 kubeadm.go:322] Here is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.382652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575812 18111 kubeadm.go:322] \t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.382654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575883 18111 kubeadm.go:322] \tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.382657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575912 18111 kubeadm.go:322] \t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.38266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.578734 18111 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.382662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.578820 18111 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.382665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.578926 18111 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.382667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579008 18111 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.38267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579071 18111 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.382673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579152 18111 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.382676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579182 18111 kubeadm.go:406] StartCluster complete in 8m6.768840439s\n"} +{"Time":"2023-05-31T12:54:45.382679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579305 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.382681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.600645 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.382692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.600659 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.382697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.600730 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.382788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.621924 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.382798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.621940 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:45.382802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.622021 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.382807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.643302 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.382817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.643316 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:45.382821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.643384 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.382825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.664181 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.38283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.664201 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.382835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.664292 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.382839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.685380 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.382843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.685393 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:45.382847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.685448 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.38285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.705695 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.382854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.705710 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.382856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.705776 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.382861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.726864 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.382925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.726878 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:45.382932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.726942 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:45.382936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.747500 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:45.38294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.747514 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:45.382944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.747522 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:45.382948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.747531 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:45.382951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.801111 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:45.382955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.801126 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.382957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.843335 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:45.382959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.843350 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.382962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.857805 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:45.382965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.857820 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:45.382973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.917579 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.382977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.382981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.382983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.382986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.383071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:45.383077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:45.38308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:45.383083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.383085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.383088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.917592 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:45.38309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.917599 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:45.383094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.933966 18111 out.go:369] Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.383097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.3831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.383102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.383104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.383106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.383109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.383111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.383219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.383238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.383244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.383248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.383251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.38326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.383264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.383272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.383294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.383299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.383302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.383305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.383307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.383367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.383373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.383378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.383382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.383384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.383387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.383395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.383397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.3834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.383409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.383412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.383416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.38342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.383423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.383426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.383429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.383561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.383568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.383576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.38358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.383582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.383584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.383587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.383589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.383591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.383594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.383596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.383598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.383601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.383603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.383605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.383608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.38361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.383613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.383615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.383741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.38375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.383754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.383757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.383761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.383768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.383772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.383777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.383781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.933991 18111 out.go:239] * \n"} +{"Time":"2023-05-31T12:54:45.383784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:45.383791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.934025 18111 out.go:239] X Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.383802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.383806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.383809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.383812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.383816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.383907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.383912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.383915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.383919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.383921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.383924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.383927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.383938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.38394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.383942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.383951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.383955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.383957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.38396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.38413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.384156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.38416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.384163-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.384168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.384172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.384176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.384179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.384181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.384187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.384204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.384206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.384209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.384234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.384239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.384243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.384336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.384358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.384388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.384408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.384411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.384414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.384439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.384442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.384446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.384449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.384453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.384455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.384457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.384459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.384461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.384464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.384467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.384469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.384584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.38459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.384593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.384596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.384598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.384601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.384604-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.384606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.384609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.384611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.384614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.384616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.384619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tX Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.384622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.384624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.384733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.384736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.384739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.384741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.384744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.384747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.384752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.384756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.384759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.384761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.384764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.384766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.384769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.384771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.384773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.384776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.384778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.38478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.384986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.384991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.384994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.384996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.384999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.385001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.385004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.385006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.38501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.385013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.385015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.385017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.38502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.385022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.385029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.385034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.385037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.385125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.385133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.385137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.385139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.385142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.385145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.385147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.385149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.385152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.385154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.385156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.385159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.385161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.385163-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.385167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.385169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.385171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.385173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.385175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.385278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.385286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.38529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.385293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.385306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.385311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.385313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.385316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.385318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.385321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.385324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.385326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.385331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.385334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.385337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.934041 18111 out.go:239] * \n"} +{"Time":"2023-05-31T12:54:45.385339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:45.385342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.934658 18111 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:54:45.385459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:45.385465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:54:45.385479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:54:45.385486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:45.38549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:54:45.385494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:45.385498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:54:45.385503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:54:45.385508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:45.385512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:54:45.385515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:54:45.385518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:45.385521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:54:45.385529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:45.385765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:54:45.385774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:45.004432 18111 out.go:177] \n"} +{"Time":"2023-05-31T12:54:45.385778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:45.046190 18111 out.go:239] X Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.385783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.385785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.385787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.385789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.385792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.385794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.385796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.385799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.385802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.385804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.385806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.385808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.386029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.386036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.38604-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.38605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.386054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.386058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.386062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.38607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.386073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.386075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.386082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.386086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.386098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.386104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.386195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.3862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.386213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.386246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.386248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.38625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.386363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.386379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.386383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.386395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.386398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.386401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.386404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.386406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.386408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.386411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.386413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.386415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.386418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.38642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.386423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.386425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.386427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.386433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.386435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.38654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.386547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.386549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.386552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.386555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tX Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:45.386559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:45.386564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:45.386567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:45.386571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.386574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:45.386579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:45.386583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:45.386587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:45.386591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:45.386599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:45.386603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.386706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.386716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:45.386721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.386728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:45.38673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:45.386732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:45.386735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.386737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.386739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.386742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:45.386744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.386747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:45.386749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:45.386866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:45.386872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:45.386877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:45.38688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:45.386883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:45.386908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:45.386922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.38694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:45.387042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:45.387049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.387063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:45.387067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:45.387069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:45.387073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.387076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:45.387089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:45.387098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:45.387102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.387106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:45.387109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:45.387118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:45.387122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:45.387125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:45.387129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:45.387132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.387136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:45.387139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:45.387144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:45.387261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:45.387282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:45.387286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:45.387289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:45.387293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:45.387296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:45.046258 18111 out.go:239] * Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T12:54:45.387299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T12:54:45.387302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:45.046282 18111 out.go:239] * Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T12:54:45.387306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T12:54:45.38731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:45.067383 18111 out.go:177] \n"} +{"Time":"2023-05-31T12:54:45.387314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:45.387317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:54:45.387321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:259: failed to start minikube post-stop. args \"out/minikube-darwin-amd64 start -p old-k8s-version-787000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=docker --kubernetes-version=v1.16.0\": exit status 109\n"} +{"Time":"2023-05-31T12:54:45.387327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:54:45.387331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:230: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/SecondStart]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T12:54:45.387334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:231: (dbg) Run: docker inspect old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.434004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:235: (dbg) docker inspect old-k8s-version-787000:\n"} +{"Time":"2023-05-31T12:54:45.434018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:45.434021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:54:45.434023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[\n"} +{"Time":"2023-05-31T12:54:45.434025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Id\": \"85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c\",\n"} +{"Time":"2023-05-31T12:54:45.43403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Created\": \"2023-05-31T19:40:35.508746161Z\",\n"} +{"Time":"2023-05-31T12:54:45.434032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:54:45.434034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T12:54:45.434042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:54:45.434045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T12:54:45.434049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T12:54:45.434051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T12:54:45.434053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T12:54:45.434055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T12:54:45.434057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T12:54:45.434059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T12:54:45.434061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Pid\": 307167,\n"} +{"Time":"2023-05-31T12:54:45.434063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"StartedAt\": \"2023-05-31T19:46:19.232331606Z\",\n"} +{"Time":"2023-05-31T12:54:45.43407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"FinishedAt\": \"2023-05-31T19:46:16.598826769Z\"\n"} +{"Time":"2023-05-31T12:54:45.434072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T12:54:45.434077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/resolv.conf\",\n"} +{"Time":"2023-05-31T12:54:45.434079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hostname\",\n"} +{"Time":"2023-05-31T12:54:45.434082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hosts\",\n"} +{"Time":"2023-05-31T12:54:45.434084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"LogPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c-json.log\",\n"} +{"Time":"2023-05-31T12:54:45.434087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Name\": \"/old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:54:45.434091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T12:54:45.434096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T12:54:45.434098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.4341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T12:54:45.434107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T12:54:45.434109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T12:54:45.434111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T12:54:45.434113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"old-k8s-version-787000:/var\"\n"} +{"Time":"2023-05-31T12:54:45.434115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.43412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T12:54:45.434122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T12:54:45.434124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T12:54:45.434126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"NetworkMode\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:54:45.434133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T12:54:45.434136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.43414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:54:45.434146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.43415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:54:45.434161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:54:45.434175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:54:45.434188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.43419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T12:54:45.434205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ]\n"} +{"Time":"2023-05-31T12:54:45.434212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T12:54:45.434218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T12:54:45.434222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T12:54:45.434225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T12:54:45.434232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T12:54:45.434246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T12:54:45.434251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t 0,\n"} +{"Time":"2023-05-31T12:54:45.434255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t 0\n"} +{"Time":"2023-05-31T12:54:45.434258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T12:54:45.434268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T12:54:45.434272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T12:54:45.434275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T12:54:45.434277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T12:54:45.434279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T12:54:45.434281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T12:54:45.434283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T12:54:45.434285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T12:54:45.434287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.43429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:54:45.434292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T12:54:45.434298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T12:54:45.4343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T12:54:45.434302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T12:54:45.434311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T12:54:45.434314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T12:54:45.434317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T12:54:45.43432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T12:54:45.434327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.43433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T12:54:45.434336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T12:54:45.434356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T12:54:45.434358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T12:54:45.434365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T12:54:45.434367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T12:54:45.434373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T12:54:45.434375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T12:54:45.434377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T12:54:45.434379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T12:54:45.434381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T12:54:45.4344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T12:54:45.434408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T12:54:45.43441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T12:54:45.434412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MemorySwap\": 2306867200,\n"} +{"Time":"2023-05-31T12:54:45.434416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T12:54:45.434418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T12:54:45.43442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T12:54:45.434422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T12:54:45.434425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T12:54:45.43443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T12:54:45.434441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T12:54:45.434448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T12:54:45.434461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T12:54:45.434465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T12:54:45.434469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/merged\",\n"} +{"Time":"2023-05-31T12:54:45.434472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/diff\",\n"} +{"Time":"2023-05-31T12:54:45.434474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/work\"\n"} +{"Time":"2023-05-31T12:54:45.434477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T12:54:45.434481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T12:54:45.434485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T12:54:45.43449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:54:45.434492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T12:54:45.434494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T12:54:45.434496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T12:54:45.434498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T12:54:45.4345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T12:54:45.434507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Name\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:54:45.434509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Source\": \"/var/lib/docker/volumes/old-k8s-version-787000/_data\",\n"} +{"Time":"2023-05-31T12:54:45.434512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T12:54:45.434517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T12:54:45.434519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T12:54:45.434521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T12:54:45.434523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T12:54:45.434525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T12:54:45.434534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Hostname\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:54:45.434537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.43454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T12:54:45.434545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T12:54:45.434547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T12:54:45.43455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T12:54:45.434552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T12:54:45.434554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T12:54:45.434556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T12:54:45.434558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T12:54:45.43456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T12:54:45.434563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T12:54:45.434567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T12:54:45.434569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T12:54:45.434572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T12:54:45.434577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T12:54:45.43458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T12:54:45.434582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T12:54:45.4346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T12:54:45.434603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T12:54:45.434605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T12:54:45.434607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T12:54:45.43461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T12:54:45.434612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T12:54:45.434616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T12:54:45.434621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T12:54:45.434623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T12:54:45.434626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"mode.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:54:45.434628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"name.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T12:54:45.434631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T12:54:45.434633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T12:54:45.434639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T12:54:45.434645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"SandboxID\": \"e414d12f88a901e4591f85ab0b99c11e72e4006ee377070ddee5d24c3ed9a65c\",\n"} +{"Time":"2023-05-31T12:54:45.43465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T12:54:45.434652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T12:54:45.434659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"53620\"\n"} +{"Time":"2023-05-31T12:54:45.434668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.43467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.43468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"53621\"\n"} +{"Time":"2023-05-31T12:54:45.434683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"53622\"\n"} +{"Time":"2023-05-31T12:54:45.434695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"53623\"\n"} +{"Time":"2023-05-31T12:54:45.43471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T12:54:45.434716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t {\n"} +{"Time":"2023-05-31T12:54:45.434718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T12:54:45.434721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"HostPort\": \"53624\"\n"} +{"Time":"2023-05-31T12:54:45.434724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ]\n"} +{"Time":"2023-05-31T12:54:45.434731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/e414d12f88a9\",\n"} +{"Time":"2023-05-31T12:54:45.434738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T12:54:45.434741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T12:54:45.434745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T12:54:45.434777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"old-k8s-version-787000\": {\n"} +{"Time":"2023-05-31T12:54:45.43478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T12:54:45.434784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IPv4Address\": \"192.168.67.2\"\n"} +{"Time":"2023-05-31T12:54:45.434787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t },\n"} +{"Time":"2023-05-31T12:54:45.434791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T12:54:45.434794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T12:54:45.434798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"85229c23efd1\",\n"} +{"Time":"2023-05-31T12:54:45.434801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T12:54:45.434805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ],\n"} +{"Time":"2023-05-31T12:54:45.434808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"NetworkID\": \"68ad52614037dbc86e2a2d399b5a866ee2022456e1a08bf7303a691be00e56ce\",\n"} +{"Time":"2023-05-31T12:54:45.434812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"EndpointID\": \"3e7b0fb0637e4b93e49c1fc06f35ab57113259a1aef3cf313956cf5781d82a8c\",\n"} +{"Time":"2023-05-31T12:54:45.434816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"Gateway\": \"192.168.67.1\",\n"} +{"Time":"2023-05-31T12:54:45.434819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IPAddress\": \"192.168.67.2\",\n"} +{"Time":"2023-05-31T12:54:45.434823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T12:54:45.434826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T12:54:45.434831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T12:54:45.434833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"MacAddress\": \"02:42:c0:a8:43:02\",\n"} +{"Time":"2023-05-31T12:54:45.434835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T12:54:45.434837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t }\n"} +{"Time":"2023-05-31T12:54:45.434845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t]\n"} +{"Time":"2023-05-31T12:54:45.434847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:45.43485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:54:45.434854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:45.796992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 2 (362.880585ms)\n"} +{"Time":"2023-05-31T12:54:45.797006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:45.797009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:54:45.797011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRunning\n"} +{"Time":"2023-05-31T12:54:45.797013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:45.797015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:54:45.797023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:239: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T12:54:45.797029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:244: \u003c\u003c\u003c TestStartStop/group/old-k8s-version/serial/SecondStart FAILED: start of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T12:54:45.797032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:245: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/SecondStart]: minikube logs \u003c======\n"} +{"Time":"2023-05-31T12:54:45.797035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:247: (dbg) Run: out/minikube-darwin-amd64 -p old-k8s-version-787000 logs -n 25\n"} +{"Time":"2023-05-31T12:54:47.267894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:247: (dbg) Done: out/minikube-darwin-amd64 -p old-k8s-version-787000 logs -n 25: (1.470770182s)\n"} +{"Time":"2023-05-31T12:54:47.412268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:252: TestStartStop/group/old-k8s-version/serial/SecondStart logs: \n"} +{"Time":"2023-05-31T12:54:47.412289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:54:47.412292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.412294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T12:54:47.412297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* |---------|--------------------------------------------------------|------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:54:47.412299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T12:54:47.412302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t|---------|--------------------------------------------------------|------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:54:47.412304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| ssh | -p kubenet-996000 sudo | kubenet-996000 | jenkins | v1.30.1 | 31 May 23 12:40 PDT | 31 May 23 12:40 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | systemctl cat crio --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| delete | -p bridge-996000 | bridge-996000 | jenkins | v1.30.1 | 31 May 23 12:40 PDT | 31 May 23 12:40 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| ssh | -p kubenet-996000 sudo find | kubenet-996000 | jenkins | v1.30.1 | 31 May 23 12:40 PDT | 31 May 23 12:40 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | /etc/crio -type f -exec sh -c | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | 'echo {}; cat {}' \\; | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| ssh | -p kubenet-996000 sudo crio | kubenet-996000 | jenkins | v1.30.1 | 31 May 23 12:40 PDT | 31 May 23 12:40 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | config | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| delete | -p kubenet-996000 | kubenet-996000 | jenkins | v1.30.1 | 31 May 23 12:40 PDT | 31 May 23 12:40 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| start | -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:40 PDT | |\n"} +{"Time":"2023-05-31T12:54:47.41234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kvm-network=default | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kvm-qemu-uri=qemu:///system | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --disable-driver-mounts | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --keep-context=false | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| start | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:40 PDT | 31 May 23 12:41 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --wait=true --preload=false | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.41238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| addons | enable metrics-server -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:41 PDT | 31 May 23 12:41 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --images=MetricsServer=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --registries=MetricsServer=fake.domain | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| stop | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:41 PDT | 31 May 23 12:41 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr -v=3 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| addons | enable dashboard -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:41 PDT | 31 May 23 12:41 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --images=MetricsScraper=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| start | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:41 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T12:54:47.4124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --wait=true --preload=false | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| addons | enable metrics-server -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:44 PDT | |\n"} +{"Time":"2023-05-31T12:54:47.412416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --images=MetricsServer=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --registries=MetricsServer=fake.domain | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.41242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| stop | -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:46 PDT | 31 May 23 12:46 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr -v=3 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| addons | enable dashboard -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:46 PDT | 31 May 23 12:46 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --images=MetricsScraper=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.41243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| start | -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:46 PDT | |\n"} +{"Time":"2023-05-31T12:54:47.412432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kvm-network=default | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kvm-qemu-uri=qemu:///system | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --disable-driver-mounts | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --keep-context=false | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.41245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| ssh | -p no-preload-344000 sudo | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | crictl images -o json | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| pause | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.41246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| unpause | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| delete | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| delete | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| start | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:48 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --embed-certs --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.41248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| addons | enable metrics-server -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:48 PDT | 31 May 23 12:48 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --images=MetricsServer=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --registries=MetricsServer=fake.domain | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| stop | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:48 PDT | 31 May 23 12:48 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr -v=3 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| addons | enable dashboard -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:48 PDT | 31 May 23 12:48 PDT |\n"} +{"Time":"2023-05-31T12:54:47.412498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --images=MetricsScraper=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| start | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:48 PDT | |\n"} +{"Time":"2023-05-31T12:54:47.412505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.41251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --embed-certs --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T12:54:47.412515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t|---------|--------------------------------------------------------|------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:54:47.412517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.412519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.412521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T12:54:47.412523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Log file created at: 2023/05/31 12:48:59\n"} +{"Time":"2023-05-31T12:54:47.412525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRunning on machine: MacOS-Agent-3\n"} +{"Time":"2023-05-31T12:54:47.412527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tBinary: Built with gc go1.20.4 for darwin/amd64\n"} +{"Time":"2023-05-31T12:54:47.41253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T12:54:47.412532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.651238 18639 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:54:47.412539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.651419 18639 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:54:47.412542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.651424 18639 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:54:47.412544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.651428 18639 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:54:47.412546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.651547 18639 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T12:54:47.412549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.652864 18639 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:54:47.412551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.672124 18639 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":4707,\"bootTime\":1685557832,\"procs\":396,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T12:54:47.412557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.672221 18639 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:54:47.412561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.693802 18639 out.go:177] * [embed-certs-128000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T12:54:47.412564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.737317 18639 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:54:47.412567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.758419 18639 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:54:47.412571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.800522 18639 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.412574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.821516 18639 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T12:54:47.412578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.842494 18639 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:54:47.412582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.863423 18639 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T12:54:47.412585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.884330 18639 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:54:47.412589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.906345 18639 config.go:182] Loaded profile config \"embed-certs-128000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.412592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.907149 18639 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:54:47.412596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.962798 18639 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T12:54:47.412599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.962940 18639 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:54:47.412606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.058543 18639 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:2 ContainersRunning:1 ContainersPaused:0 ContainersStopped:1 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:63 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:49:00.047379971 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:54:47.412615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:54:47.412618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:54:47.412621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:54:47.412626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:54:47.412629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.079702 18639 out.go:177] * Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T12:54:47.412633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.100675 18639 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T12:54:47.412639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.100701 18639 start.go:875] validating driver \"docker\" against \u0026{Name:embed-certs-128000 KeepContext:false EmbedCerts:true MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:embed-certs-128000 Namespace:default APIServerName:minik"} +{"Time":"2023-05-31T12:54:47.412644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"ubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s M"} +{"Time":"2023-05-31T12:54:47.412647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"ount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:54:47.41265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.100808 18639 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:54:47.412653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.103803 18639 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T12:54:47.412661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.197402 18639 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:2 ContainersRunning:1 ContainersPaused:0 ContainersStopped:1 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:63 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:49:00.186134264 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T12:54:47.412669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T12:54:47.412675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T12:54:47.41268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T12:54:47.412685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T12:54:47.412692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.197596 18639 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:54:47.412695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.197620 18639 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:54:47.412699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.197633 18639 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:54:47.412703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.197648 18639 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:54:47.412709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{Name:embed-certs-128000 KeepContext:false EmbedCerts:true MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:embed-certs-128000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime"} +{"Time":"2023-05-31T12:54:47.412712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":":docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:do"} +{"Time":"2023-05-31T12:54:47.412715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"cker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:54:47.412718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.221342 18639 out.go:177] * Starting control plane node embed-certs-128000 in cluster embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.41272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.241990 18639 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T12:54:47.412722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.263039 18639 out.go:177] * Pulling base image ...\n"} +{"Time":"2023-05-31T12:54:47.412724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.305059 18639 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:54:47.412727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.305091 18639 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T12:54:47.412729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.305147 18639 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T12:54:47.412731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.305164 18639 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:54:47.412734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.305299 18639 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:54:47.412737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.305313 18639 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:54:47.41274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.306051 18639 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/config.json ...\n"} +{"Time":"2023-05-31T12:54:47.412744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.355618 18639 image.go:83] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon, skipping pull\n"} +{"Time":"2023-05-31T12:54:47.412748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.355633 18639 cache.go:145] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in daemon, skipping load\n"} +{"Time":"2023-05-31T12:54:47.412752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.355658 18639 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:54:47.412755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.355697 18639 start.go:364] acquiring machines lock for embed-certs-128000: {Name:mk3dd5022cf31982435bad815b95d9f2d3f31ef7 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.412758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.355781 18639 start.go:368] acquired machines lock for \"embed-certs-128000\" in 63.894µs\n"} +{"Time":"2023-05-31T12:54:47.412763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.355806 18639 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:54:47.412785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.355814 18639 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:54:47.412789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.356039 18639 cli_runner.go:164] Run: docker container inspect embed-certs-128000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:47.412793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.406029 18639 fix.go:103] recreateIfNeeded on embed-certs-128000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:54:47.412797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:00.406062 18639 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:54:47.4128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.428790 18639 out.go:177] * Restarting existing docker container for \"embed-certs-128000\" ...\n"} +{"Time":"2023-05-31T12:54:47.412803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:58.993898 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.412805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.005430 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.027337 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.027353 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.412812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.027433 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.049099 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.049114 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.412822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.049190 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412827-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.070639 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.070653 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.412832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.070718 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.091476 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.091489 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.41284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.091556 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.115518 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.115531 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.412847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.115605 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.138611 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.138627 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.412854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.138703 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.161549 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.161561 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.41286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.161626 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.183481 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.183494 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.412871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.183502 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.412874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.183512 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.412876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.226272 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.412878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.226288 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.412881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.241127 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.412883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.241143 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.412886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:48:59.305684 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.412888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.412891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.412893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.412896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.412898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.4129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.412905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.412907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.412909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.412911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.305696 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.412914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.305702 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.412916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.325132 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.412918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:48:59.325149 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.41292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.889411 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.412923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.902066 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.922202 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:01.922215 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.412929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.922281 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.942991 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:01.943004 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.412936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.943068 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.963530 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.41294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:01.963542 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.412943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.963608 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.984117 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:01.984132 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.412949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:01.984205 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.021392 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.021409 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.412958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.021489 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.043387 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.043401 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.412965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.043468 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.064298 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.41297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.064313 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.412972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.064385 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.412974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.085683 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.412976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.085696 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.412979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.085703 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.412981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.085710 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.412984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.101858 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.412986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.101874 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.41299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.154237 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.412992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.154251 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.412994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.195115 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.412996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.195131 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.412999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.209196 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.413001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:02.209211 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.413018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:02.267899 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.413021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.413023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.41305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.413068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.413075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.41308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.413082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.41309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.450403 18639 cli_runner.go:164] Run: docker start embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.413094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.714480 18639 cli_runner.go:164] Run: docker container inspect embed-certs-128000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:47.413098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.766445 18639 kic.go:426] container \"embed-certs-128000\" state is running.\n"} +{"Time":"2023-05-31T12:54:47.4131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.767010 18639 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.413103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.823587 18639 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/config.json ...\n"} +{"Time":"2023-05-31T12:54:47.413105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.824022 18639 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T12:54:47.413107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.824044 18639 ubuntu.go:169] provisioning hostname \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.41311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.824114 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.413112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.879605 18639 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:47.413116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.880085 18639 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53750 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.41312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.880103 18639 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:47.413123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tsudo hostname embed-certs-128000 \u0026\u0026 echo \"embed-certs-128000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T12:54:47.413127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:00.881140 18639 main.go:141] libmachine: Error dialing TCP: ssh: handshake failed: EOF\n"} +{"Time":"2023-05-31T12:54:47.41313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.006716 18639 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.413134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.006811 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.413139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.057762 18639 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:47.413141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.058095 18639 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53750 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.413144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.058114 18639 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:47.413146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\tif ! grep -xq '.*\\sembed-certs-128000' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:54:47.41315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T12:54:47.413153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 embed-certs-128000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T12:54:47.413155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T12:54:47.413162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\t\techo '127.0.1.1 embed-certs-128000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T12:54:47.413166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T12:54:47.413169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T12:54:47.413173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.174594 18639 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T12:54:47.413179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.174623 18639 ubuntu.go:175] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1078/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1078/.minikube}\n"} +{"Time":"2023-05-31T12:54:47.413184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.174643 18639 ubuntu.go:177] setting up certificates\n"} +{"Time":"2023-05-31T12:54:47.413186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.174653 18639 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T12:54:47.413189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.174743 18639 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.413191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225015 18639 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T12:54:47.413193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225126 18639 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T12:54:47.413209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225136 18639 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T12:54:47.413213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225277 18639 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:54:47.413238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225502 18639 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T12:54:47.413241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225511 18639 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T12:54:47.413245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225576 18639 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:54:47.413249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225726 18639 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T12:54:47.413252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225733 18639 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T12:54:47.413254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225790 18639 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:47.413257-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.225912 18639 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem org=jenkins.embed-certs-128000 san=[192.168.76.2 127.0.0.1 localhost 127.0.0.1 minikube embed-certs-128000]\n"} +{"Time":"2023-05-31T12:54:47.413262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.347959 18639 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T12:54:47.413264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.348032 18639 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T12:54:47.413267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.348087 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.41327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.398005 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.413272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.485642 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:54:47.413275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.508074 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1229 bytes)\n"} +{"Time":"2023-05-31T12:54:47.413277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.530568 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:47.413279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.553266 18639 provision.go:86] duration metric: configureAuth took 378.591063ms\n"} +{"Time":"2023-05-31T12:54:47.413282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.553281 18639 ubuntu.go:193] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T12:54:47.413286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.553430 18639 config.go:182] Loaded profile config \"embed-certs-128000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.413382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.553493 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.413388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.603293 18639 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:47.413391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.603636 18639 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53750 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.413399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.603649 18639 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:47.413401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T12:54:47.413403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.719600 18639 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: overlay\n"} +{"Time":"2023-05-31T12:54:47.413406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.41341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.719614 18639 ubuntu.go:71] root file system type: overlay\n"} +{"Time":"2023-05-31T12:54:47.413412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.719708 18639 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T12:54:47.413415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.719800 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.413417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.769912 18639 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:47.413419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.770262 18639 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53750 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.413422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.770309 18639 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:47.413424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %!s(MISSING) \"[Unit]\n"} +{"Time":"2023-05-31T12:54:47.413427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:54:47.413429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:54:47.413588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:54:47.413621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:54:47.413625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:54:47.413629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:54:47.413632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:54:47.413634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:54:47.413636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:54:47.413641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:54:47.413643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:54:47.413645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:54:47.413653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:54:47.413655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:54:47.413657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:54:47.413665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:54:47.413669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:54:47.413672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:54:47.413743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:54:47.413755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:54:47.413787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:54:47.41379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:54:47.41384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T12:54:47.413846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:54:47.413851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:54:47.413853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:54:47.413856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:54:47.413858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:54:47.41386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:54:47.413864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:54:47.413866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:54:47.413868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:54:47.41387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:54:47.413874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:54:47.413876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:54:47.41388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:54:47.413882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:54:47.413886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:54:47.413888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T12:54:47.413905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.895881 18639 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T12:54:47.413907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T12:54:47.413909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T12:54:47.413911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T12:54:47.413937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T12:54:47.413939-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T12:54:47.413941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T12:54:47.413943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T12:54:47.413945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T12:54:47.413947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.413949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:54:47.413951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tType=notify\n"} +{"Time":"2023-05-31T12:54:47.413953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T12:54:47.413955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.414084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.41409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.414093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T12:54:47.414095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T12:54:47.414097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T12:54:47.414099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T12:54:47.414102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T12:54:47.414104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T12:54:47.414106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T12:54:47.414108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.41411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T12:54:47.414129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T12:54:47.414131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:54:47.414133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T12:54:47.414136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T12:54:47.414159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.414161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T12:54:47.414163-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T12:54:47.414165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T12:54:47.414167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T12:54:47.41417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T12:54:47.414172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.414174-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T12:54:47.41418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T12:54:47.414198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T12:54:47.4142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T12:54:47.414202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.414204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T12:54:47.414206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T12:54:47.414229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.414231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T12:54:47.414233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T12:54:47.414235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.414237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:54:47.414239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T12:54:47.414241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.41429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.895982 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.414317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.952130 18639 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T12:54:47.41432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.952484 18639 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 53750 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.414322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.952507 18639 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T12:54:47.414325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T12:54:47.414328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.080032 18639 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T12:54:47.41433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.080048 18639 machine.go:91] provisioned docker machine in 4.255962223s\n"} +{"Time":"2023-05-31T12:54:47.414332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.080056 18639 start.go:300] post-start starting for \"embed-certs-128000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T12:54:47.414335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.080061 18639 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T12:54:47.414338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.080152 18639 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:54:47.414344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.080225 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.414474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.136934 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.414481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.224494 18639 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T12:54:47.414483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.229103 18639 main.go:141] libmachine: Couldn't set key VERSION_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:54:47.414487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.229125 18639 main.go:141] libmachine: Couldn't set key PRIVACY_POLICY_URL, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:54:47.414489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.229132 18639 main.go:141] libmachine: Couldn't set key UBUNTU_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T12:54:47.414495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.229137 18639 info.go:137] Remote host: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T12:54:47.414512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.229145 18639 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T12:54:47.414518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.229231 18639 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T12:54:47.414521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.229383 18639 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e 15662.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:54:47.414524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.229550 18639 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T12:54:47.414526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.238640 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:54:47.414536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.260758 18639 start.go:303] post-start completed in 180.690691ms\n"} +{"Time":"2023-05-31T12:54:47.414538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.260836 18639 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T12:54:47.414543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.260889 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.414674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.310857 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.41468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.394269 18639 ssh_runner.go:195] Run: sh -c \"df -BG /var | awk 'NR==2{print $4}'\"\n"} +{"Time":"2023-05-31T12:54:47.414683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.399504 18639 fix.go:57] fixHost completed within 5.043616069s\n"} +{"Time":"2023-05-31T12:54:47.414685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.399520 18639 start.go:83] releasing machines lock for \"embed-certs-128000\", held for 5.043666848s\n"} +{"Time":"2023-05-31T12:54:47.414715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.399615 18639 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.414718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.450377 18639 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T12:54:47.41472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.450385 18639 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T12:54:47.414723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.450452 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.414726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.450476 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.414728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.502876 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.414731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.502876 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.414738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.688203 18639 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T12:54:47.41474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.693567 18639 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T12:54:47.414742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.699203 18639 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *loopback.conf* -not -name *.mk_disabled -exec sh -c \"grep -q loopback {} \u0026\u0026 ( grep -q name {} || sudo sed -i '/\"type\": \"loopback\"/i \\ \\ \\ \\ \"name\": \"loopback\",' {} ) \u0026\u0026 sudo sed -i 's|\"cniVersion\": \".*\"|\"cniVersion\": \"1.0.0\"|g' {}\" ;\n"} +{"Time":"2023-05-31T12:54:47.414885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.717696 18639 cni.go:229] loopback cni configuration patched: \"/etc/cni/net.d/*loopback.conf*\" found\n"} +{"Time":"2023-05-31T12:54:47.414892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.717771 18639 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f ( ( -name *bridge* -or -name *podman* ) -and -not -name *.mk_disabled ) -printf \"%!p(MISSING), \" -exec sh -c \"sudo mv {} {}.mk_disabled\" ;\n"} +{"Time":"2023-05-31T12:54:47.414895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.727160 18639 cni.go:258] no active bridge cni configs found in \"/etc/cni/net.d\" - nothing to disable\n"} +{"Time":"2023-05-31T12:54:47.414897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.727175 18639 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:54:47.414899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.727190 18639 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:54:47.414902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.727331 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T12:54:47.414904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.414907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.744250 18639 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.9\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:47.414909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.755279 18639 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:47.414912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.766256 18639 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:54:47.414914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.766328 18639 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:47.414917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.777566 18639 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:47.414919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.788032 18639 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:47.415294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.799133 18639 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:47.4153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.809815 18639 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T12:54:47.415335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.819547 18639 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T12:54:47.415338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.829654 18639 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T12:54:47.41534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.838572 18639 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T12:54:47.415342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.847203 18639 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:54:47.415345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.915121 18639 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T12:54:47.415348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.988220 18639 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T12:54:47.415351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.988240 18639 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T12:54:47.415355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.988306 18639 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T12:54:47.415358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.000725 18639 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T12:54:47.41536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.000793 18639 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T12:54:47.415363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.013515 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:54:47.415366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.415369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.031451 18639 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T12:54:47.415372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.036964 18639 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T12:54:47.41553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.047065 18639 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T12:54:47.415542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.067061 18639 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T12:54:47.415565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.175595 18639 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T12:54:47.415583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.266428 18639 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T12:54:47.415587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.266450 18639 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T12:54:47.41559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.284524 18639 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:54:47.415593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.385279 18639 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T12:54:47.415595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.667523 18639 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T12:54:47.415597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.742801 18639 ssh_runner.go:195] Run: sudo systemctl unmask cri-docker.socket\n"} +{"Time":"2023-05-31T12:54:47.415599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.812735 18639 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T12:54:47.415601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.890620 18639 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:54:47.415603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.959902 18639 ssh_runner.go:195] Run: sudo systemctl restart cri-docker.socket\n"} +{"Time":"2023-05-31T12:54:47.415605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:06.978712 18639 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T12:54:47.415608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.043571 18639 ssh_runner.go:195] Run: sudo systemctl restart cri-docker\n"} +{"Time":"2023-05-31T12:54:47.41561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.127865 18639 start.go:528] Will wait 60s for socket path /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:54:47.415612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.128024 18639 ssh_runner.go:195] Run: stat /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:54:47.415971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.133341 18639 start.go:549] Will wait 60s for crictl version\n"} +{"Time":"2023-05-31T12:54:47.41599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.133410 18639 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T12:54:47.416008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.138046 18639 ssh_runner.go:195] Run: sudo /usr/bin/crictl version\n"} +{"Time":"2023-05-31T12:54:47.41601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.185278 18639 start.go:565] Version: 0.1.0\n"} +{"Time":"2023-05-31T12:54:47.416012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRuntimeName: docker\n"} +{"Time":"2023-05-31T12:54:47.416035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRuntimeVersion: 24.0.1\n"} +{"Time":"2023-05-31T12:54:47.416037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tRuntimeApiVersion: v1\n"} +{"Time":"2023-05-31T12:54:47.416044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.185363 18639 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:54:47.416046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.214323 18639 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T12:54:47.41605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.768924 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.416052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.780076 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.416054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.802146 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.416057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.802158 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.41606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.802223 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.416062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.823961 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.416064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.823975 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.416066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.824043 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.416069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.844197 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.416241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.844213 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.416247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.844286 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.41625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.864333 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.416252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.864346 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.416255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.864400 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.416259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.884983 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.416262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.884997 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.416266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.885063 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.41627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.907703 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.416273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.907718 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.416277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.907793 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.416281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.930867 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.416285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.930881 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.416288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.930965 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.416292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.956033 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.416295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:04.956053 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.416299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.956060 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.416492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:04.956068 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.4165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.001926 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.416504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.001946 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.416508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.016946 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.416512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.016965 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.41652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:05.086503 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.416524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.416526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.416528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.41653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.416532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.416556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.416613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.416616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.416618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.41662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.086517 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.416623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.086525 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.417038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.105010 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.417052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:05.105030 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.417055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.664978 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.417058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.675588 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.41706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.697850 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.417062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.697867 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.417064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.697988 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.417066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.720373 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.417069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.720388 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.417071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.720459 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.417073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.742848 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.417075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.742863 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.417078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.742933 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.41708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.764996 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.417082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.765009 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.417225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.765079 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.41723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.788730 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.417232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.788742 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.417235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.788805 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.417238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.811813 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.41724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.811826 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.417243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.811894 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.417245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.834305 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.417247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.834318 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.417249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.834386 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.417251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.857058 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.417254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.857074 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.417256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.857084 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.417258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.857095 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.41726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.918765 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.417266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.918780 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.417399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.962690 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.417406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.962705 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.41741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.978052 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.417414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.978066 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.417418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:08.046906 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.417422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.417425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.417428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.417447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.417451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.417475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.417479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.417486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.41749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.417493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.046919 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.417496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.046926 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.4175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.286803 18639 out.go:204] * Preparing Kubernetes v1.27.2 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T12:54:47.417503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.286933 18639 cli_runner.go:164] Run: docker exec -t embed-certs-128000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T12:54:47.417685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.399994 18639 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T12:54:47.417691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.400123 18639 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:54:47.417694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.405193 18639 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.65.254\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:54:47.417697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.416798 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.4177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.466874 18639 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:54:47.417702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.466953 18639 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:54:47.417705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.489693 18639 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:54:47.417707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.41771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.417712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.417714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.417716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:54:47.417722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:54:47.417724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T12:54:47.417726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:54:47.417728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tgcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T12:54:47.417731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.417733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:54:47.417909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.489715 18639 docker.go:563] Images already preloaded, skipping extraction\n"} +{"Time":"2023-05-31T12:54:47.417916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.489814 18639 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T12:54:47.417919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.512573 18639 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T12:54:47.417921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.417924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.417926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.417929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.417932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:54:47.417935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:54:47.417938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T12:54:47.417942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:54:47.417945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tgcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T12:54:47.417948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.417952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T12:54:47.417955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.512601 18639 cache_images.go:84] Images are preloaded, skipping loading\n"} +{"Time":"2023-05-31T12:54:47.417958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.512676 18639 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T12:54:47.41796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.564884 18639 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:54:47.417962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.564900 18639 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:54:47.417964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.564921 18639 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T12:54:47.417971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.564940 18639 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.76.2 APIServerPort:8443 KubernetesVersion:v1.27.2 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:embed-certs-128000 NodeName:embed-certs-128000 DNSDomain:cluster.local CRISocket:/var/run/cri-dockerd.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.76.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.76.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt StaticPodPath:"} +{"Time":"2023-05-31T12:54:47.41815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:true}\n"} +{"Time":"2023-05-31T12:54:47.418178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.565080 18639 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T12:54:47.418182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:54:47.41819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T12:54:47.418194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T12:54:47.418197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t advertiseAddress: 192.168.76.2\n"} +{"Time":"2023-05-31T12:54:47.418199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T12:54:47.418202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T12:54:47.418206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - groups:\n"} +{"Time":"2023-05-31T12:54:47.418209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T12:54:47.418227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T12:54:47.41823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t usages:\n"} +{"Time":"2023-05-31T12:54:47.418234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - signing\n"} +{"Time":"2023-05-31T12:54:47.418259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - authentication\n"} +{"Time":"2023-05-31T12:54:47.418262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T12:54:47.418266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t criSocket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T12:54:47.418414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t name: \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.41842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T12:54:47.418422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t node-ip: 192.168.76.2\n"} +{"Time":"2023-05-31T12:54:47.418424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t taints: []\n"} +{"Time":"2023-05-31T12:54:47.418427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:54:47.418429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T12:54:47.418431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T12:54:47.418433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T12:54:47.418435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.76.2\"]\n"} +{"Time":"2023-05-31T12:54:47.418437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:54:47.41844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T12:54:47.418442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T12:54:47.418444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:54:47.418446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T12:54:47.418449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:54:47.418451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T12:54:47.418453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:54:47.418455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T12:54:47.418457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T12:54:47.418459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T12:54:47.418462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T12:54:47.418465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tetcd:\n"} +{"Time":"2023-05-31T12:54:47.418574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t local:\n"} +{"Time":"2023-05-31T12:54:47.418581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:54:47.418586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T12:54:47.418594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T12:54:47.418597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.418601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T12:54:47.418608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T12:54:47.418617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:54:47.418621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T12:54:47.418624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:54:47.418628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T12:54:47.418633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T12:54:47.418641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T12:54:47.418649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t x509:\n"} +{"Time":"2023-05-31T12:54:47.418668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T12:54:47.418674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T12:54:47.418678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T12:54:47.418681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T12:54:47.418684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T12:54:47.418688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T12:54:47.418691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T12:54:47.418694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T12:54:47.418698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t nodefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:54:47.418768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t nodefs.inodesFree: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:54:47.418795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t imagefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T12:54:47.418799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T12:54:47.418801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T12:54:47.418804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t---\n"} +{"Time":"2023-05-31T12:54:47.418806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T12:54:47.418808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T12:54:47.41881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T12:54:47.418812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T12:54:47.418814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T12:54:47.418831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T12:54:47.418833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T12:54:47.418836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T12:54:47.418858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T12:54:47.41886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T12:54:47.418862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.418864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.565159 18639 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T12:54:47.418866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T12:54:47.418868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.41887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Service]\n"} +{"Time":"2023-05-31T12:54:47.418873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T12:54:47.418875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=embed-certs-128000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\n"} +{"Time":"2023-05-31T12:54:47.418988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.419008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[Install]\n"} +{"Time":"2023-05-31T12:54:47.41901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t config:\n"} +{"Time":"2023-05-31T12:54:47.419014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{KubernetesVersion:v1.27.2 ClusterName:embed-certs-128000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T12:54:47.41904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.565257 18639 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.419043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.574603 18639 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T12:54:47.419047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.574672 18639 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T12:54:47.419049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.583574 18639 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (379 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.600275 18639 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.617794 18639 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2101 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.634997 18639 ssh_runner.go:195] Run: grep 192.168.76.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T12:54:47.419059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.639572 18639 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.76.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T12:54:47.419062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.650922 18639 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000 for IP: 192.168.76.2\n"} +{"Time":"2023-05-31T12:54:47.419228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.650949 18639 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.419235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651119 18639 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T12:54:47.419238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651172 18639 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T12:54:47.419245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651257 18639 certs.go:315] skipping minikube-user signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/client.key\n"} +{"Time":"2023-05-31T12:54:47.419249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651315 18639 certs.go:315] skipping minikube signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/apiserver.key.31bdca25\n"} +{"Time":"2023-05-31T12:54:47.419253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651377 18639 certs.go:315] skipping aggregator signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/proxy-client.key\n"} +{"Time":"2023-05-31T12:54:47.419256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651592 18639 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:54:47.41926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:07.651626 18639 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T12:54:47.419265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651642 18639 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651674 18639 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651711 18639 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651751 18639 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.651821 18639 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.652397 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.675420 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1679 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.701042 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.727256 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/embed-certs-128000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.752696 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.778667 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.803835 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.829916 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.857080 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.881928 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.908062 18639 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.933529 18639 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T12:54:47.419671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.954406 18639 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T12:54:47.419674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.961700 18639 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T12:54:47.419679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.973745 18639 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:54:47.419683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.979375 18639 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:54:47.419685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.979467 18639 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T12:54:47.419688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.988446 18639 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T12:54:47.41969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:07.999446 18639 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T12:54:47.419707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.011152 18639 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:54:47.419709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.017342 18639 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:54:47.419714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.017415 18639 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T12:54:47.419738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.026101 18639 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T12:54:47.419742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.037017 18639 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T12:54:47.41996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.049252 18639 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:54:47.419966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.054916 18639 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:54:47.419969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.054992 18639 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T12:54:47.419972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.063662 18639 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T12:54:47.419974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.074518 18639 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T12:54:47.419976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.079191 18639 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-etcd-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:47.419979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.086334 18639 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-kubelet-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:47.419981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.093768 18639 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/server.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:47.419983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.101018 18639 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/healthcheck-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:47.419985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.108214 18639 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/peer.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:47.419988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.115654 18639 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/front-proxy-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T12:54:47.419992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.122827 18639 kubeadm.go:404] StartCluster: {Name:embed-certs-128000 KeepContext:false EmbedCerts:true MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:embed-certs-128000 Namespace:default APIServerName:minikubeCA APIServerNames"} +{"Time":"2023-05-31T12:54:47.420155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":":[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountStri"} +{"Time":"2023-05-31T12:54:47.42017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"ng:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T12:54:47.420178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.122970 18639 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.420195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.145156 18639 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T12:54:47.420201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.154580 18639 kubeadm.go:419] found existing configuration files, will attempt cluster restart\n"} +{"Time":"2023-05-31T12:54:47.420203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.154597 18639 kubeadm.go:636] restartCluster start\n"} +{"Time":"2023-05-31T12:54:47.420205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.154643 18639 ssh_runner.go:195] Run: sudo test -d /data/minikube\n"} +{"Time":"2023-05-31T12:54:47.420208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.163624 18639 kubeadm.go:127] /data/minikube skipping compat symlinks: sudo test -d /data/minikube: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.420211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.420213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.420424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.420432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.163695 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.420437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.214807 18639 kubeconfig.go:135] verify returned: extract IP: \"embed-certs-128000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.420441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.214994 18639 kubeconfig.go:146] \"embed-certs-128000\" context is missing from /Users/jenkins/minikube-integration/16569-1078/kubeconfig - will repair!\n"} +{"Time":"2023-05-31T12:54:47.420445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.215357 18639 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/kubeconfig: {Name:mk36b1fef13f0c406b5340544ea043a831d9fe53 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.420449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.216819 18639 ssh_runner.go:195] Run: sudo diff -u /var/tmp/minikube/kubeadm.yaml /var/tmp/minikube/kubeadm.yaml.new\n"} +{"Time":"2023-05-31T12:54:47.420453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.226833 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.420457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.226884 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.420461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:08.237364 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.420465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.420468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.420471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.420481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.737432 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.420486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:08.737555 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.42049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:08.748837 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.420493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.420496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.420591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.420611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:09.237929 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.420616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:09.238069 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.42064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:09.251035 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.420643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.420646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.420669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.420672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.566919 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.420676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.579590 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.42068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.599743 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.420682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.599756 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.420685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.599824 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.420689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.619707 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.420692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.619721 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.420696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.619802 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.420699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.641502 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.420703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.641515 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.420883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.641806 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.420925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.662515 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.420948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.662529 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.42095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.662597 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.420952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.683383 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.420954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.683398 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.420979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.683468 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.420981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.704177 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.420984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.704192 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.420986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.704260 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.420988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.725501 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.42099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.725515 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.420993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.725581 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.420995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.745709 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.420998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.745724 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.745734 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.421002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.745748 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.421175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.803665 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.421198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.803680 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.421203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.843577 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.421206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.843595 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.421208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.858222 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.421212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.858237 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.421243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.916359 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.421248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.42125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.421252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.421254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.421256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.421259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.421261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.421286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.916372 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.421457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.916380 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.421485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:09.737624 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:09.737773 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.42149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:09.750655 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.421509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.421513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.237482 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.237544 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.42152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.249282 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.421546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.42155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.737560 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:10.737632 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.421554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:10.749153 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.421559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.421766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:11.237954 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:11.238123 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.421775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:11.250803 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.42178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.421784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:11.738091 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:11.738160 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.421788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:11.749588 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.421793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.421797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:12.239464 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:12.239614 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.421801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:12.252102 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.421805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.421809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:12.738057 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:12.738146 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.421949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:12.750109 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.421957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.421961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.238323 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.238405 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.421966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.249931 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.42197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.421974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.738188 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.421976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.738249 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.421992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.749533 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.421995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.421996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.421998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.422001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:14.237639 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.422017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:14.237817 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.42202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:14.250246 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.422169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.422176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.422178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.422181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.432924 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.422183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.444326 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.422186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.465356 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.422188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.465370 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.42219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.465443 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.422196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.486716 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.422198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.486730 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.422201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.486799 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.422203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.506707 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.422219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.506719 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.422222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.506789 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.422224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.527644 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.422226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.527657 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.422242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.527724 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.422244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.549746 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.422533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.549761 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.422561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.549821 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.422579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.569742 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.422588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.569755 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.422591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.569821 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.422593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.589413 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.422595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.589426 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.422598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.589482 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.4226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.610581 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.422603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.610594 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.42261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.610601 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.422614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.610608 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.422617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.666021 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.422619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.666038 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.422621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.705174 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.422862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.705188 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.422869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.719513 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.422873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.719529 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.422877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:13.779791 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.422881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.422885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.422887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.422889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.422892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.422894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.422896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.422898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.422902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.422904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.779803 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.422906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:13.779810 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.422909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.297572 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.422911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.308486 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.422914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.329097 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.42322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.329111 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.42324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.329179 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.423243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.349914 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.423245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.349928 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.423263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.349995 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.423265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.371888 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.423267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.371901 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.42327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.371965 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.423272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.392460 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.423274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.392474 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.423276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.392539 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.423279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.414467 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.423281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.414482 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.423283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.414553 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.423286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.434671 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.423288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.434684 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.42329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.434748 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.423507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.455866 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.423512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.455879 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.423514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.455948 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.423516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.476399 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.423524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.476413 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.423527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.476420 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.423529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.476426 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.423531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.519301 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.423534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.519316 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.423536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.533989 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.423539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.534004 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.423542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.592589 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.423544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.423546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.423548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.42355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.423641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.423646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.42365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.423654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.423657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.42366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.592601 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.423663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.592608 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.423667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.608617 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.423671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.608630 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.423674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:14.737853 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.423677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:14.737923 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.423679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:14.749173 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.423682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.423688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.4237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.423711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:15.239322 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.423716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:15.239379 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.423723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:15.250336 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.423753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.423758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.42376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.423762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:15.739599 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.423764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:15.739748 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.423766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:15.752140 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.423777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.423781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.423783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.423785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.238121 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.423788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.238205 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.42379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.249183 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.423792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.423794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.423796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.423798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.737944 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.423801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:16.738040 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.423803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:16.749366 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.423805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.423807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.423938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.42396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:17.239587 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.423964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:17.239722 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.423966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:17.252220 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.423983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.423985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.423987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.423989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:17.737554 18639 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T12:54:47.423995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:17.737630 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.423998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:17.748725 18639 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.424001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.424004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.424007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.42401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.227100 18639 kubeadm.go:611] needs reconfigure: apiserver error: context deadline exceeded\n"} +{"Time":"2023-05-31T12:54:47.424014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.227155 18639 kubeadm.go:1123] stopping kube-system containers ...\n"} +{"Time":"2023-05-31T12:54:47.42402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.227263 18639 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.251679 18639 docker.go:459] Stopping containers: [01c7209c215e d538db5bb797 6cf81d960230 489cbccaaa49 d3e1abd02282 b671b236bd26 8f23d6d08363 f1d00253ab8d 531ba13f164a b8a930710b90 9a9053d7d37b f0072b30efb1 bd94e693fd67 944f607e1334 8631c68225bb 0ad22ac68d8c]\n"} +{"Time":"2023-05-31T12:54:47.424026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.251765 18639 ssh_runner.go:195] Run: docker stop 01c7209c215e d538db5bb797 6cf81d960230 489cbccaaa49 d3e1abd02282 b671b236bd26 8f23d6d08363 f1d00253ab8d 531ba13f164a b8a930710b90 9a9053d7d37b f0072b30efb1 bd94e693fd67 944f607e1334 8631c68225bb 0ad22ac68d8c\n"} +{"Time":"2023-05-31T12:54:47.424099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.272846 18639 ssh_runner.go:195] Run: sudo systemctl stop kubelet\n"} +{"Time":"2023-05-31T12:54:47.424104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.285254 18639 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:47.424107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.294736 18639 kubeadm.go:155] found existing configuration files:\n"} +{"Time":"2023-05-31T12:54:47.42411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-rw------- 1 root root 5639 May 31 19:48 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T12:54:47.424114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-rw------- 1 root root 5652 May 31 19:48 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T12:54:47.42412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-rw------- 1 root root 2011 May 31 19:48 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T12:54:47.424126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t-rw------- 1 root root 5604 May 31 19:48 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:47.424133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.424138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.294788 18639 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T12:54:47.424142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.304045 18639 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T12:54:47.424146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.313439 18639 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T12:54:47.424151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.322655 18639 kubeadm.go:166] \"https://control-plane.minikube.internal:8443\" may not be in /etc/kubernetes/controller-manager.conf - will remove: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/controller-manager.conf: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.424159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.424166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.42417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.424175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.322716 18639 ssh_runner.go:195] Run: sudo rm -f /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T12:54:47.424207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.331667 18639 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:47.424213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.340848 18639 kubeadm.go:166] \"https://control-plane.minikube.internal:8443\" may not be in /etc/kubernetes/scheduler.conf - will remove: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/scheduler.conf: Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.424216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.424218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.42422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.424223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.340904 18639 ssh_runner.go:195] Run: sudo rm -f /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:47.424225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.349776 18639 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:54:47.424227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.358821 18639 kubeadm.go:713] reconfiguring cluster from /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:54:47.424241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.358832 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase certs all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.424252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.407907 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase kubeconfig all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.42426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.722134 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase kubelet-start --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.424267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.851013 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase control-plane all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.424271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.918798 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase etcd local --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.424275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.972811 18639 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T12:54:47.424334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:18.972895 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.42434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.522952 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.424342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.162509 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.424353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.175008 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.196493 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.196507 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.424367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.196577 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.216653 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.216666 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.424378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.216737 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.239985 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.239999 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.42439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.240070 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.262490 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.262506 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.424405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.262578 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.284013 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.42462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.284026 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.424624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.284110 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.335228 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.335241 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.424635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.335341 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.356333 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.356349 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.424646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.356418 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.42465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.378597 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.378610 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.424657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.378618 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.424661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.378626 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.424665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.421667 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.424669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.421684 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.424673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.436895 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.424677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.436910 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.42483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:19.504221 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.424835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.424837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.42484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.424842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.424844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.424846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.424848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.42485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.424852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.424854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.504234 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.424857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.504241 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.424859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.523919 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.424861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:19.523942 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.424864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.090201 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.424866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.101644 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.121394 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.121407 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.424979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.121463 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.144825 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.144839 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.424986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.144912 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.166510 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.166528 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.424993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.166603 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.424995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.188982 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.424998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.188996 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.189068 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.425002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.216169 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.425007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.216203 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.425009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.216316 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.425012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.240534 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.425014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.240548 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.425016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.240624 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.425155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.264433 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.425162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.264458 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.425179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.264540 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.425193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.293528 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.425195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.293542 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.425198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.293550 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.4252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.293558 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.425203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.371914 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.425205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.425208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.42521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.425212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.425214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.425216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.425223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.425226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.425228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.425356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.371930 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.425363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.371942 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.425367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.391072 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.425371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.391089 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.425383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.450037 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.425388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.450064 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.425391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.499821 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.425393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.499843 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.425396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:20.023228 18639 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.425398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:20.039816 18639 api_server.go:72] duration metric: took 1.066988508s to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T12:54:47.425401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:20.039833 18639 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T12:54:47.425403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:20.039855 18639 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:53749/healthz ...\n"} +{"Time":"2023-05-31T12:54:47.425405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:20.040895 18639 api_server.go:269] stopped: https://127.0.0.1:53749/healthz: Get \"https://127.0.0.1:53749/healthz\": EOF\n"} +{"Time":"2023-05-31T12:54:47.425411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:20.541355 18639 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:53749/healthz ...\n"} +{"Time":"2023-05-31T12:54:47.425414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.921905 18639 api_server.go:279] https://127.0.0.1:53749/healthz returned 403:\n"} +{"Time":"2023-05-31T12:54:47.425416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T12:54:47.425535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.921928 18639 api_server.go:103] status: https://127.0.0.1:53749/healthz returned error 403:\n"} +{"Time":"2023-05-31T12:54:47.425544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T12:54:47.42555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.921940 18639 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:53749/healthz ...\n"} +{"Time":"2023-05-31T12:54:47.425552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:22.929755 18639 api_server.go:279] https://127.0.0.1:53749/healthz returned 403:\n"} +{"Time":"2023-05-31T12:54:47.425555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T12:54:47.425558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:22.929793 18639 api_server.go:103] status: https://127.0.0.1:53749/healthz returned error 403:\n"} +{"Time":"2023-05-31T12:54:47.42556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T12:54:47.425563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:23.041078 18639 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:53749/healthz ...\n"} +{"Time":"2023-05-31T12:54:47.425565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:23.049058 18639 api_server.go:279] https://127.0.0.1:53749/healthz returned 500:\n"} +{"Time":"2023-05-31T12:54:47.425567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:54:47.425569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:54:47.425572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:54:47.425574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:54:47.425576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:54:47.425578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:54:47.42558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:54:47.425708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:54:47.425713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:54:47.425716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:54:47.425718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:54:47.425729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.425739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.425742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:54:47.425744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.42575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.425753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:54:47.425757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:54:47.425759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/apiservice-registration-controller failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.425761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:54:47.425863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:54:47.425868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:54:47.425878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:23.049086 18639 api_server.go:103] status: https://127.0.0.1:53749/healthz returned error 500:\n"} +{"Time":"2023-05-31T12:54:47.42588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:54:47.425882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:54:47.425884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:54:47.425886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:54:47.425892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:54:47.425895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:54:47.425897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:54:47.425899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:54:47.425901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:54:47.425903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:54:47.425905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:54:47.425907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:54:47.425911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.425914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.426013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:54:47.426018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:54:47.42602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.426025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.426028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:54:47.426034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:54:47.426041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/apiservice-registration-controller failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.426043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:54:47.426048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:54:47.42605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:54:47.426059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:23.541078 18639 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:53749/healthz ...\n"} +{"Time":"2023-05-31T12:54:47.426061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:23.549070 18639 api_server.go:279] https://127.0.0.1:53749/healthz returned 500:\n"} +{"Time":"2023-05-31T12:54:47.426063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:54:47.426171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:54:47.426175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:54:47.426177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:54:47.42618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:54:47.426182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:54:47.426184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:54:47.426186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:54:47.426188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:54:47.42619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:54:47.426192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:54:47.426194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.426201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.426204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:54:47.426207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.426213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.426549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:54:47.42656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:54:47.426565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:54:47.426575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:54:47.426579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:54:47.426592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:23.549102 18639 api_server.go:103] status: https://127.0.0.1:53749/healthz returned error 500:\n"} +{"Time":"2023-05-31T12:54:47.426595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:54:47.426599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:54:47.426602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:54:47.426605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:54:47.426608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:54:47.426612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:54:47.426619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:54:47.426622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:54:47.42695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:54:47.426959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:54:47.426964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:54:47.426967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.426979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.426983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:54:47.426987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:54:47.426995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.426998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.427003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:54:47.427011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:54:47.427014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:54:47.427026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:54:47.427303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:54:47.42731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:54:47.427317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.041015 18639 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:53749/healthz ...\n"} +{"Time":"2023-05-31T12:54:47.42732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.050056 18639 api_server.go:279] https://127.0.0.1:53749/healthz returned 500:\n"} +{"Time":"2023-05-31T12:54:47.427322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:54:47.427325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:54:47.427327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:54:47.427329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:54:47.427331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:54:47.427334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:54:47.427337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:54:47.427344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:54:47.427348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:54:47.427351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:54:47.427354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:54:47.427356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.427705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T12:54:47.427718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:54:47.427726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.42774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.427744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:54:47.427751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:54:47.427755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:54:47.427765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:54:47.427774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:54:47.427799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:54:47.427807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:24.050075 18639 api_server.go:103] status: https://127.0.0.1:53749/healthz returned error 500:\n"} +{"Time":"2023-05-31T12:54:47.427814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T12:54:47.427958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T12:54:47.427966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T12:54:47.427972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T12:54:47.427977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T12:54:47.427982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T12:54:47.427986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T12:54:47.427989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T12:54:47.427993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T12:54:47.427997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T12:54:47.428002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T12:54:47.428005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T12:54:47.428013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T12:54:47.428016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T12:54:47.428032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T12:54:47.428035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T12:54:47.428037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T12:54:47.42804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T12:54:47.428042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.428045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T12:54:47.428047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T12:54:47.428176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T12:54:47.428185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T12:54:47.428191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T12:54:47.428194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T12:54:47.4282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T12:54:47.428209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T12:54:47.428217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T12:54:47.428227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T12:54:47.428235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T12:54:47.428239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T12:54:47.428243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.541054 18639 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:53749/healthz ...\n"} +{"Time":"2023-05-31T12:54:47.428255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.547184 18639 api_server.go:279] https://127.0.0.1:53749/healthz returned 200:\n"} +{"Time":"2023-05-31T12:54:47.428261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tok\n"} +{"Time":"2023-05-31T12:54:47.428264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.557339 18639 api_server.go:141] control plane version: v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.428269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.557360 18639 api_server.go:131] duration metric: took 4.517462635s to wait for apiserver health ...\n"} +{"Time":"2023-05-31T12:54:47.428271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.557366 18639 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:54:47.428274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.557375 18639 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:54:47.428278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.581882 18639 out.go:177] * Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T12:54:47.428382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.603913 18639 ssh_runner.go:195] Run: sudo mkdir -p /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:54:47.428392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.613654 18639 ssh_runner.go:362] scp memory --\u003e /etc/cni/net.d/1-k8s.conflist (457 bytes)\n"} +{"Time":"2023-05-31T12:54:47.428397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.631869 18639 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T12:54:47.428412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639537 18639 system_pods.go:59] 8 kube-system pods found\n"} +{"Time":"2023-05-31T12:54:47.42842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639555 18639 system_pods.go:61] \"coredns-5d78c9869d-dgclj\" [98bd353e-2894-406c-9b03-aabbefe25ca6] Running / Ready:ContainersNotReady (containers with unready status: [coredns]) / ContainersReady:ContainersNotReady (containers with unready status: [coredns])\n"} +{"Time":"2023-05-31T12:54:47.428423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639562 18639 system_pods.go:61] \"etcd-embed-certs-128000\" [014cce56-234d-453b-a5ac-2c6c67851fc2] Running / Ready:ContainersNotReady (containers with unready status: [etcd]) / ContainersReady:ContainersNotReady (containers with unready status: [etcd])\n"} +{"Time":"2023-05-31T12:54:47.428427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639570 18639 system_pods.go:61] \"kube-apiserver-embed-certs-128000\" [76e773a9-d8e2-4457-8e0c-1aa4353c2610] Running / Ready:ContainersNotReady (containers with unready status: [kube-apiserver]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-apiserver])\n"} +{"Time":"2023-05-31T12:54:47.428433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639576 18639 system_pods.go:61] \"kube-controller-manager-embed-certs-128000\" [4659d8b3-50ff-44cf-b3db-02546f7c7ddd] Running / Ready:ContainersNotReady (containers with unready status: [kube-controller-manager]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-controller-manager])\n"} +{"Time":"2023-05-31T12:54:47.428436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639581 18639 system_pods.go:61] \"kube-proxy-hqts5\" [042540f8-a270-412f-ab5c-d560134886bf] Running\n"} +{"Time":"2023-05-31T12:54:47.428439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639586 18639 system_pods.go:61] \"kube-scheduler-embed-certs-128000\" [5b8ee21f-1bf0-4e7c-ae17-345f8c841359] Running / Ready:ContainersNotReady (containers with unready status: [kube-scheduler]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-scheduler])\n"} +{"Time":"2023-05-31T12:54:47.428442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639592 18639 system_pods.go:61] \"metrics-server-74d5c6b9c-f942b\" [6037caae-f41f-4399-9a22-ef55bdb19041] Pending / Ready:ContainersNotReady (containers with unready status: [metrics-server]) / ContainersReady:ContainersNotReady (containers with unready status: [metrics-server])\n"} +{"Time":"2023-05-31T12:54:47.428445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639597 18639 system_pods.go:61] \"storage-provisioner\" [e7dba192-19df-41da-a0c6-bd3d68a54ce0] Running\n"} +{"Time":"2023-05-31T12:54:47.428634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639601 18639 system_pods.go:74] duration metric: took 7.720748ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T12:54:47.428644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.639606 18639 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T12:54:47.428647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.644095 18639 node_conditions.go:122] node storage ephemeral capacity is 107016164Ki\n"} +{"Time":"2023-05-31T12:54:47.428651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.644109 18639 node_conditions.go:123] node cpu capacity is 6\n"} +{"Time":"2023-05-31T12:54:47.428657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.644123 18639 node_conditions.go:105] duration metric: took 4.514526ms to run NodePressure ...\n"} +{"Time":"2023-05-31T12:54:47.428666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.644136 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase addon all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.42868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.015539 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.428689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.027395 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.428698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.047913 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.42871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.047927 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.428716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.047990 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.428723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.067754 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.428732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.067767 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.428739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.067833 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.428743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.088003 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.428764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.088016 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.428949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.088082 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.428958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.107787 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.428968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.107800 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.428993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.107866 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.128085 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.128098 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.429008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.128171 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.150365 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.150377 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.429016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.150446 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.170976 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.170989 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.429023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.171057 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.191911 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.191925 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.429031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.191932 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.429034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.191939 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.429206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.232861 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.429219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.232895 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.429227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.250019 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.429232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.250040 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.429239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:25.339141 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.42925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.429268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.429273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.429278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.429281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.429284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.429288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.429296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.429302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.429317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.339153 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.429324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.339160 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.429329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.357025 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.429504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:25.357041 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.429511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.912874 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.429515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.925572 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.945554 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:27.945567 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.429526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.945636 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.42953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.966132 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:27.966147 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.429538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.966218 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.986924 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:27.986938 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.42955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:27.987003 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.006974 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.006988 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.429562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.007052 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.027540 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.027554 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.429845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.027621 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.42985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.047631 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.047648 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.429858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.047713 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.067783 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.067797 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.429899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.067864 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.429903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.088694 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.429907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.088707 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.42991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.088715 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.429914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.088722 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.429918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.127866 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.429921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.127881 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.429935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.141884 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.42994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.141901 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.429943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.784077 18639 kubeadm.go:772] waiting for restarted kubelet to initialise ...\n"} +{"Time":"2023-05-31T12:54:47.429976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.788801 18639 kubeadm.go:787] kubelet initialised\n"} +{"Time":"2023-05-31T12:54:47.429982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.788813 18639 kubeadm.go:788] duration metric: took 4.721449ms waiting for restarted kubelet to initialise ...\n"} +{"Time":"2023-05-31T12:54:47.429986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.788820 18639 pod_ready.go:35] extra waiting up to 4m0s for all system-critical pods including labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.429991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:24.794485 18639 pod_ready.go:78] waiting up to 4m0s for pod \"coredns-5d78c9869d-dgclj\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.429995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:26.806390 18639 pod_ready.go:102] pod \"coredns-5d78c9869d-dgclj\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.429999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.809238 18639 pod_ready.go:102] pod \"coredns-5d78c9869d-dgclj\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.430004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:28.199538 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.430009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.430012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.430016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.43002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.430024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.430028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.430032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.430048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.430055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.430224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.199550 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.430238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.199557 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.430243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.216963 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.430247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:28.216980 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.430252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.776140 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.430256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.788773 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.809067 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.809081 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.430267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.809149 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.829630 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.829643 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.430278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.829723 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.851133 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.851146 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.430293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.851215 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.871213 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.871231 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.430493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.871305 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.892185 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.892197 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.430509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.892270 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.913737 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.913751 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.430527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.913818 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.934858 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.934872 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.430538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.934937 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.957215 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:30.957231 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.430545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.957246 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.430549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.957260 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.430552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.996800 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.430554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:30.996834 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.430661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.011697 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.430668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.011712 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.430672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:31.071876 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.430676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.430678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.43068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.430683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.430685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.430687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.43069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.430693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.430695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.430704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.071889 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.43071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.071897 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.430714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.088506 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.430718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.088521 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.430726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:31.306417 18639 pod_ready.go:102] pod \"coredns-5d78c9869d-dgclj\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.430837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:32.806664 18639 pod_ready.go:92] pod \"coredns-5d78c9869d-dgclj\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.430844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:32.806678 18639 pod_ready.go:81] duration metric: took 8.012074425s waiting for pod \"coredns-5d78c9869d-dgclj\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.430847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:32.806686 18639 pod_ready.go:78] waiting up to 4m0s for pod \"etcd-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.43085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.641346 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.430852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.652371 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.673167 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.673180 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.430865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.673252 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.693961 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.693976 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.430875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.694044 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.715206 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.715219 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.430887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.715295 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.430889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.736201 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.430891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.736215 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.430998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.736286 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.757581 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.757594 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.431021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.757667 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.778316 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.778331 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.431028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.778393 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.799397 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.799409 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.431037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.799474 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.819877 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.819892 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.431048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.819899 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.431053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.819906 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.431057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.834121 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.431061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.834137 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.431182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:33.893941 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.431194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.431197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.4312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.431204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.431209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.431213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.431216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.431219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.431223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.431226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.893953 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.43123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.893960 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.431233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.910592 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.43124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.910606 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.431244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.965240 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.431248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:33.965255 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.431254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.505279 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.431258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.516752 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.539138 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.539152 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.431406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.539223 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.560806 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.560820 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.431417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.560889 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.581381 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.581395 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.431429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.581462 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.601146 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.601158 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.431445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.601226 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.620669 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.620683 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.431459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.620752 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.641539 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.641554 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.43157-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.641621 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.661541 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.661554 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.431591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.661619 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.431593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.682572 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.431608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.682586 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.431612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.682594 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.431615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.682601 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.431619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.726037 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.431621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.726052 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.431624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.740573 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.431626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.740588 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.431629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:36.800128 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.431632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.431635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.431638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.431764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.431769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.431771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.431774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.431776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.431779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.431781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.800142 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.431784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.800149 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.431786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.816956 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.431788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.816971 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.431791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:34.821016 18639 pod_ready.go:102] pod \"etcd-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.431794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.321296 18639 pod_ready.go:92] pod \"etcd-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.431801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.321309 18639 pod_ready.go:81] duration metric: took 3.514571182s waiting for pod \"etcd-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.431804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.321317 18639 pod_ready.go:78] waiting up to 4m0s for pod \"kube-apiserver-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.431806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.327058 18639 pod_ready.go:92] pod \"kube-apiserver-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.431809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.327067 18639 pod_ready.go:81] duration metric: took 5.74549ms waiting for pod \"kube-apiserver-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.431994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.327073 18639 pod_ready.go:78] waiting up to 4m0s for pod \"kube-controller-manager-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.432004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.332248 18639 pod_ready.go:92] pod \"kube-controller-manager-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.432009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.332257 18639 pod_ready.go:81] duration metric: took 5.179008ms waiting for pod \"kube-controller-manager-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.432013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.332263 18639 pod_ready.go:78] waiting up to 4m0s for pod \"kube-proxy-hqts5\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.432015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.337532 18639 pod_ready.go:92] pod \"kube-proxy-hqts5\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.432018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.337541 18639 pod_ready.go:81] duration metric: took 5.272304ms waiting for pod \"kube-proxy-hqts5\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.43202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.337547 18639 pod_ready.go:78] waiting up to 4m0s for pod \"kube-scheduler-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.432023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.342578 18639 pod_ready.go:92] pod \"kube-scheduler-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.432026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.342586 18639 pod_ready.go:81] duration metric: took 5.03452ms waiting for pod \"kube-scheduler-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.432029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:36.342592 18639 pod_ready.go:78] waiting up to 4m0s for pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.432031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:38.723823 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.432034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.371202 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.432036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.382181 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.402259 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.402271 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.432142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.402336 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.422874 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.422888 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.432152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.422962 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.443692 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.443705 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.432165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.443773 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.464057 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.464071 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.432176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.464144 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.485585 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.485601 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.432184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.485681 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.520954 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.520970 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.432258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.521037 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.543234 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.543249 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.43227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.543325 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.567119 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.567136 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.432282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.567146 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.432289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.567156 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.432291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.584422 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.432294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.584437 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.432296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.640572 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.432299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.640587 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.432301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.680958 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.432305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.680973 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.432308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.695456 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.432394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:39.695471 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.432398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:39.755348 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.432401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.432403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.432405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.432407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.432409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.432411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.432414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.432417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.432419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.432422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.256236 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.432424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.267340 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.287323 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.287338 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.432432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.287413 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.307940 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.307954 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.43255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.308023 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.328046 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.328060 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.432561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.328125 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.350143 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.350156 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.432568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.350225 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.371466 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.371480 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.432576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.371561 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.391930 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.391943 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.432584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.392014 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.412144 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.412157 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.432591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.412228 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.432326 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.432343 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.432702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.432352 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.432708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.432361 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.432714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:42.493467 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.432722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.432725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.432727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.43273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.432733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.432735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.432737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.43274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.432742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.432745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.493480 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.432747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.493488 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.43275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.511106 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.432752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.511120 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.43285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.572848 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.432856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.572864 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.432859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.615202 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.432861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:42.615217 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.432864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:40.725874 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.432866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:43.224026 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.432869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.130840 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.432874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.142007 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.162356 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.162368 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.432882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.162447 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.183786 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.183799 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.432889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.183864 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.432891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.203441 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.432893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.203457 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.432896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.203523 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.224484 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.224495 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.433042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.224559 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.245307 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.245320 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.43305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.245387 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.265083 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.265097 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.433059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.265166 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.285815 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.285828 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.433066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.285893 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.306506 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.306519 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.433077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.306526 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.433081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.306534 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.433085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.346797 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.433184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.346816 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.433191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.361524 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.433195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.361538 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.4332-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:45.419775 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.433204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.433208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.433211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.433213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.433218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.433225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.43323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.433241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.433244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.433247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.419788 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.433251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.419796 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.433254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.436037 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.433258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.436050 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.433329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:47.994635 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.433335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.006785 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.026861 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.026875 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.433346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.026943 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.046972 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.046985 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.433354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.047048 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.067950 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.067962 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.433365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.068029 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.089957 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.089972 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.433375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.090039 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.111679 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.111692 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.433383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.111759 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.132268 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.132281 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.433495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.132346 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.154048 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.154062 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.433503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.154133 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:45.725306 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.433509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.224203 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.433512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.174048 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.190573 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.433517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.190584 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.43352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.190593 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.433522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.245508 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.433525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.245522 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.433528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.286037 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.43353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.286054 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.433632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.300305 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.433639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.300320 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.433642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:48.358568 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.433645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.433648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.43365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.433652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.433655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.433657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.433659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.433662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.433664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.433668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.358584 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.43367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:48.358591 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.433673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.875671 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.433675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.888631 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.908741 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.908757 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.433785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.908830 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.930024 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.930038 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.433796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.930106 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.950193 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.950206 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.433803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.950271 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.970317 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.970332 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.433817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.970405 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.990145 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:50.990162 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.433824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.990229 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.011482 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:51.011502 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.433833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.011576 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.031381 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.433939-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:51.031394 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.433944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.031461 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.433947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.052147 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:51.052160 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.433953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.052167 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.433955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.052175 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.433958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.092878 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.433966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.092894 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.433969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.107616 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.433972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.107632 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.433974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:51.166715 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.433977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.43398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.433982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.433988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.433991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.434082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.434089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.434091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.434094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.434096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.166730 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.434098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.166737 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.434102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.182658 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.434104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:51.182673 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.434107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:50.225410 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.434109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:52.726028 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.434112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.737581 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.434115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.748893 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.768730 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.768744 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.434122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.768815 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.790248 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.790271 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.43424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.790358 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.811223 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.811238 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.434249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.811310 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.838034 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.838048 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.434256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.838116 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.859016 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.859030 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.434264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.859098 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.879969 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.879983 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.434271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.880052 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.901000 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.901013 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.434281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.901082 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.921974 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:53.921987 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.434402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.921994 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.434406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.922002 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.434409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.963533 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.434411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.963553 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.434414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.979919 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.434417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:53.979933 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.43442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:54.038390 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.434423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.434426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.434429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.434434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.434438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.434442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.434445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.434448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.43451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.434516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:54.038404 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.434518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:54.038411 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.434521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:54.054872 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.434523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:54.054885 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.434527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.613192 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.434531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.626569 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.647315 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.647329 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.434552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.647394 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.667720 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.667734 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.43456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.667803 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.688353 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.688365 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.434567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.688432 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.710541 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.710560 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.434653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.710654 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.732237 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.732251 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.434662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.732319 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.753577 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.753598 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.434673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.753675 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.776395 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.776410 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.434684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.776480 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.831996 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.832010 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.434691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.832016 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.434694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.832024 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.434697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.845980 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.434803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.845996 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.434806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:56.905931 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.434809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.434811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.434814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.434816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.434819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.434821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.434823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.434825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.434827-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.43483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.905946 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.434832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.905954 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.434835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.922112 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.434837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.922127 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.434839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.976549 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.434843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:56.976564 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.434845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:55.224502 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.434955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:57.724367 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.434959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.519593 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.434961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.531106 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.551555 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.551568 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.43497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.551640 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.573595 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.573608 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.434977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.573693 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.594192 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.434983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.594205 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.434985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.594270 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.614321 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.614335 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.434992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.614403 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.434994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.635310 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.635325 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.435118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.635393 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.656327 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.656342 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.435127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.656414 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.677253 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.677266 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.435134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.677325 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.699091 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.699103 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.435142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.699111 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.435145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.699118 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.435148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.746074 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.435153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.746094 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.435155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.761960 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.435158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.761979 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.435271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:49:59.832094 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.4353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.435304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.435306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.435308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.43531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.435313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.435315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.435317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.435319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.435321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.832110 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.435324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.832116 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.43533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.848241 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.435333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.848254 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.435335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.404457 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.435338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.417123 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.437753 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.437765 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.435345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.437830 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.459003 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.459017 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.435425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.459084 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.480384 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.480398 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.435435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.480465 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.501529 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.501544 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.435442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.501609 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.521586 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.521600 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.435452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.521669 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.543795 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.543809 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.43546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.543881 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.565504 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.565518 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.435579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.565589 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.586599 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.586614 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.435587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.586622 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.435589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.586631 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.435592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.626693 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.435596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.626710 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.435599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.640892 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.435601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.640906 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.435606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:02.700923 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.43561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.435612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.435614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.435616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.435619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.435621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.435623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.435722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.435725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.435728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.700936 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.435732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.700944 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.435734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.717822 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.435737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:02.717837 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.43574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:49:59.725631 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.435744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:01.727383 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.435747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:04.224192 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.435751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.279451 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.435753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.292247 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.312511 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.312525 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.435761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.312589 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.333324 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.333339 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.435893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.333409 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.354858 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.354872 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.435907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.354944 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.374604 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.374617 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.435915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.374708 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.395921 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.395934 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.435922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.396007 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.415481 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.415495 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.43593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.415557 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.435932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.435970 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.435984 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.435938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.436051 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.456740 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.435943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.456754 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.436038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.456761 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.436041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.456769 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.436044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.512035 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.436047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.512051 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.551622 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.436051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.551639 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.566318 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.436056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.566335 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.436059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:05.627508 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.436063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.436065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.436067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.43607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.436072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.436074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.436077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.436198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.4362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.436203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.627522 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.436205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:05.627529 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.144557 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.436213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.156068 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:06.226985 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.436218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.724113 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.436222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.176196 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.190819 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.436227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.190913 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.212016 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.212028 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.436234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.212092 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.232662 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.232676 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.436242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.232748 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.252494 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.252506 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.436358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.252572 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.272346 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.272359 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.436365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.272425 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.292706 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.292726 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.436373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.292800 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.313783 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.313797 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.436381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.313853 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.334224 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.334236 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.436388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.334243 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.436392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.334251 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.374299 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.436503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.374316 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.388548 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.436512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.388562 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.436514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:08.447560 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.436517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.436519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.436521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.436524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.436527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.436529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.436534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.436537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.436539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.436541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.447573 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.436544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.447579 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.464176 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.43655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:08.464190 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.436657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.018071 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.43666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.029204 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.052212 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.052226 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.436668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.052294 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.072612 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.072627 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.436675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.072693 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.092377 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.092392 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.436682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.092460 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.112759 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.112772 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.43669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.112862 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.133628 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.133642 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.436818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.133711 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.154383 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.154397 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.436829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.154463 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.175532 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.175545 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.436836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.175607 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.436838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.196682 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.436841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.196696 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.436843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.196703 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.436845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.196711 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.237285 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.436854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.237301 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.251832 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.436859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.251849 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.436862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:11.310262 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.436955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.436958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.436961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.436965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.436968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.43697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.436973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.436977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.436981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.436984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.310275 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.436986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.310281 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.436989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.326683 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.436991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:11.326699 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:10.726391 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.437004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.225994 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.437006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.882614 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.437009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.895205 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.915881 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:13.915893 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.437136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.915966 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.936484 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:13.936498 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.437146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.936563 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.957865 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:13.957884 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.437158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.957967 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.979311 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:13.979328 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.437167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:13.979394 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.001835 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.001850 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.437174-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.001926 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.032567 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.032583 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.437281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.032656 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.054140 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.054153 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.437296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.054209 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.074908 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.074923 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.437304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.074930 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.437306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.074937 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.437313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:14.141150 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.437316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.437319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.437321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.437323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.437325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.437328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.43733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.437333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.437436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.437442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.141163 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.437445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.141170 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.437448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.157497 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.43745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.157511 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.437454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.214077 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.437456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.214092 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.437459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.257879 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.437461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:14.257898 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.437464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.774971 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.437466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.787505 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.808006 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.808020 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.437477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.808089 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.828474 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.828487 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.437486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.828557 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.848986 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.849000 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.437591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.849068 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.869705 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.869719 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.437599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.869787 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.891040 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.891055 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.437607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.891138 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.911237 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.911251 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.437615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.911320 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.932391 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.932404 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.437622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.932467 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.953109 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:16.953122 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.437751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.953129 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.437754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.953136 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.437758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.994755 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.437761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:16.994774 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.437764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.010187 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.437766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.010203 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.437769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:17.072221 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.437771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.437773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.437785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.437792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.437795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.437798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.437812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.437815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.437818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.43782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.072234 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.437895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.072240 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.437903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.088545 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.437905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:17.088559 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.437908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:15.725226 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.437911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:18.224232 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.437913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.645546 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.437916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.658207 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.678306 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.678320 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.437923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.678389 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.698902 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.698918 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.437938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.698986 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.437941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.720168 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.437944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.720180 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.437954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.720253 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.741281 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.741293 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.438055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.741372 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.762208 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.762221 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.438063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.762289 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.782579 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.782594 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.43807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.782662 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.804002 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.804016 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.438078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.804082 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.824083 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.824097 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.438088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.824104 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.438091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.824112 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.438192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.838601 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.438199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.838618 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.438203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:19.900616 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.438206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.438208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.43821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.438218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.43822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.438223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.438225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.438228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.43823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.438239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.900630 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.438246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.900637 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.438249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.917904 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.438252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.917919 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.438256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.974103 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.438345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:19.974120 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.43835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.521337 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.438354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.532524 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.553126 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.553141 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.438361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.553209 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.573329 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.573342 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.438372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.573408 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.594865 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.594879 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.438379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.594962 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.614710 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.614725 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.438389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.614805 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.636184 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.636200 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.438492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.636266 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.657527 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.657540 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.438501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.657612 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.676927 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.676950 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.43851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.677017 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.697799 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.697813 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.438518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.697821 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.43852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.697828 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.438523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.739956 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.438526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.739973 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.438529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.754196 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.438532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.754212 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.438536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:22.813988 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.438643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.438648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.438652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.438654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.438656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.438659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.438661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.438663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.438666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.438668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.814004 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.43867-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.814011 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.438673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.830176 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.438676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.830192 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.438678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:20.226043 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.438681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:22.723957 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.438685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.385654 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.438687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.398094 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.419399 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.419413 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.438805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.419485 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.439832 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.439845 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.438812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.439910 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.460381 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.460396 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.438832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.460463 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.481251 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.481265 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.43884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.481329 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.501757 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.501772 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.438851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.501844 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.523935 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.523959 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.438944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.524028 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.544509 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.544523 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.438952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.544613 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.438955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.565009 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.438957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.565022 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.43896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.565030 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.438963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.565037 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.438965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.607299 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.438968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.607316 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.438971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.622238 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.438974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.622256 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.438976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:25.682184 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.438979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.43908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.439085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.439088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.43909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.439093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.439096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.439098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.4391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.439102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.682198 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.439106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.682205 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.439109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.698529 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.439112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:25.698543 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.439115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:24.724947 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.439117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:26.725775 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.43912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:29.225073 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.439123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.253413 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.439125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.264859 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.286219 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.286233 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.43925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.286302 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.306497 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.306511 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.439258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.306579 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.328339 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.328352 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.439265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.328417 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.349059 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.349073 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.439273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.349144 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.369572 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.369586 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.439281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.369654 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.389592 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.389606 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.439393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.389677 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.410927 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.410940 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.439407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.411015 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.43941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.430835 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.430848 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.439414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.430855 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.439417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.430862 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.439419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.447162 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.439421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.447175 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.439424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.501325 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.439426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.501340 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.439429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.543596 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.439431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.543611 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.439434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.558530 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.439444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:28.558546 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.439548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:28.618291 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.439558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.439561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.439563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.439566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.439568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.43957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.439573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.439575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.439577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.439579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.119489 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.439582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.132254 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.153116 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.43959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.153130 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.439593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.153199 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.174643 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.174656 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.4396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.174722 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.195280 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.195298 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.439711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.195367 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.216146 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.216160 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.439721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.216232 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.238725 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.238738 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.43973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.238803 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.261067 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.261079 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.439737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.261147 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.284650 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.284664 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.439758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.284730 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.439761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.339532 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.439763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.339545 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.43986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.339553 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.439868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.339560 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.439873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.379101 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.439877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.379117 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.439887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.393705 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.439901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.393721 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.439905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:31.452826 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.439909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.439912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.439916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.439919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.439925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.439928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.439932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.439935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.439937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.439942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.452840 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.439948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.452846 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.440009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.469473 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.440019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.469488 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.440022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:31.725845 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.440027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.226755 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.440031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.028642 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.440034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.040785 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.061738 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.061751 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.440041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.061820 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.081632 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.081646 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.440229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.081713 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.102148 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.102161 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.440304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.102230 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.123278 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.44031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.123290 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.440318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.123360 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.143653 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.143665 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.440327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.143730 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.44033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.164374 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.164388 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.440338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.164458 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.185654 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.185668 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.440346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.185737 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.206778 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.206792 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.440353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.206799 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.440357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.206806 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.440359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.250920 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.440361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.250938 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.440365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.265854 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.440367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.265875 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.440371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:34.342582 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.440374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.440377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.440379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.440382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.440384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.440387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.440392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.440395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.440397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.4404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.342595 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.440402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.342603 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.440404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.359145 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.440407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:34.359159 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.440463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.916971 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.440469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.929846 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.951684 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:36.951703 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.440479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.951786 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.972627 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:36.972639 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.440487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.972705 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.993330 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:36.993344 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.440495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.993413 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.016848 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.4405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.016863 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.440506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.016938 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.037686 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.037700 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.440616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.037766 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.058095 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.058114 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.440623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.058183 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.078666 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.078680 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.44063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.078746 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.099327 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.099341 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.440642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.099348 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.440644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.099357 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.440647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.115369 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.440649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.115383 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.440652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.169510 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.440654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.169525 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.440656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.210762 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.440659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.210781 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.440764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.227364 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.44077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:37.227379 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.440773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:37.326068 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.440778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.44078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.440782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.440784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.440787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.44079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.440792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.440795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.440797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.440799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:36.227650 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.440805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:38.724857 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.826543 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.440813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.838973 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.860533 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.860548 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.440932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.860614 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.881095 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.881112 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.440941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.881194 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.901164 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.901178 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.440947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.901249 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.44095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.921453 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.921467 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.440955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.921536 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.942641 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.44096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.942655 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.440963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.942725 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.440967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.963865 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.440969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.963879 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.440971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.963948 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.985103 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:39.985119 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.441087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:39.985191 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.44109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.006565 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:40.006579 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.441095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.006586 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.441098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.006593 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.441101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.046780 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.441103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.046799 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.441107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.061197 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.441113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.061211 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.441116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:40.121483 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.441119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.441121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.441123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.441126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.441229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.441231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.441234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.441236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.441239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.441243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.121496 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.441245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.121506 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.441248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.137318 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.44125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:40.137333 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.441253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.692805 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.441255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.704970 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.728040 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.728052 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.441267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.728123 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.749396 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.749411 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.441274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.749468 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.770044 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.770057 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.441385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.770127 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.44139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.791306 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.791320 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.441394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.791384 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.812719 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.812733 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.441402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.812799 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.834236 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.834249 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.441409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.834318 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.854800 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.854813 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.441416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.854879 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.875791 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.875805 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.441423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.875812 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.441535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.875821 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.441539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.918953 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.441541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.918973 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.441545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.934007 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.441547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.934022 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.44155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:42.992946 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.441553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.441555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.441557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.44156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.441562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.441564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.441566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.441569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.441572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.441574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.992958 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.441576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:42.992965 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.441578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:43.009540 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.441687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:43.009556 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.441693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:41.226308 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.441696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:43.726847 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.441698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.564628 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.441705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.576167 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.596081 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.44171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.596093 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.441712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.596160 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.616616 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.616629 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.44172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.616700 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.637588 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.637600 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.441727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.637694 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.44173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.658617 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.658629 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.441835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.658694 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.678955 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.678969 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.441849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.679038 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.698998 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.699013 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.441869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.699081 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.441872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.720738 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.720752 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.441878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.720829 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.44188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.743339 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.441883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.743353 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.441885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.743360 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.441888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.743368 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.44189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.781964 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.441893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.781978 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.44199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.796556 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.441997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.796570 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:45.855855 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.442003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.442005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.442007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.44201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.442012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.442015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.442017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.442019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.442021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.442023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.855868 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.442026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.855875 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.44203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.872685 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.442034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:45.872701 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.442037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:46.224148 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.442042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.225531 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.442151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.427039 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.442156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.438752 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.442158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.458525 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.442161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.458541 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.442163-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.458612 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.442169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.479415 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.442177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.479429 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.442183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.479496 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.442187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.499642 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.442191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.499656 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.442195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.499723 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.4422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.528663 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.442203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.528676 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.442207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.528747 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.442211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.549334 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.442215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.549349 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.442344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.549419 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.44236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.570183 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.442365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.570199 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.44237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.570285 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.442373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.591994 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.442377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.592007 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.442383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.592077 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.442387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.612549 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.44239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.612565 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.442394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.612574 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.442398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.612583 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.442402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.656292 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.442405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.656309 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.442409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.671267 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.442413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.671283 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.442419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:48.730923 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.442571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.442575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.442577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.44258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.442582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.442585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.442588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.44259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.442593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.442595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.730936 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.442598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.730943 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.442601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.747145 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.442603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:48.747160 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.442605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.302947 18111 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T12:54:47.442608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.314492 18111 kubeadm.go:640] restartCluster took 4m13.475957142s\n"} +{"Time":"2023-05-31T12:54:47.44261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:50:51.314532 18111 out.go:239] ! Unable to restart cluster, will reset it: apiserver healthz: apiserver process never appeared\n"} +{"Time":"2023-05-31T12:54:47.442613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.314548 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm reset --cri-socket /var/run/dockershim.sock --force\"\n"} +{"Time":"2023-05-31T12:54:47.442616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.732660 18111 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:54:47.442733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.744739 18111 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:54:47.442738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.754401 18111 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:54:47.442741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.754462 18111 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:47.442744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.764026 18111 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:54:47.44275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.442753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.442755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.442758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.44276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.442762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.442764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.442768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.764070 18111 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:54:47.442772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.817753 18111 kubeadm.go:322] [init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:47.442775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:51.817795 18111 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:47.442884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.067704 18111 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.442893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.067790 18111 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:47.442897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.067876 18111 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:47.442902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.257699 18111 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:47.442904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.258643 18111 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.442907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.265286 18111 kubeadm.go:322] [kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:47.442909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.344729 18111 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:47.442913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366223 18111 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:54:47.442916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366296 18111 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.44292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366386 18111 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.442926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366474 18111 kubeadm.go:322] [certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.442929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366584 18111 kubeadm.go:322] [certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.442933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366634 18111 kubeadm.go:322] [certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.442937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366680 18111 kubeadm.go:322] [certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.442941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366744 18111 kubeadm.go:322] [certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.442944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366801 18111 kubeadm.go:322] [certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.443028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366875 18111 kubeadm.go:322] [certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.443033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366954 18111 kubeadm.go:322] [certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.443036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.366992 18111 kubeadm.go:322] [certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:47.443038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.367054 18111 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:47.44304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.547902 18111 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.443043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.695374 18111 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.443045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.851437 18111 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.443047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.975344 18111 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.44305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.976020 18111 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.443053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997493 18111 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:54:47.443055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997614 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.44306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997703 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.443062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997774 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.443065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.997872 18111 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.443068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.998053 18111 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:47.443183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:50.723722 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:52.725382 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:55.226437 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:57.725983 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:50:59.727309 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:02.226888 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:04.227233 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:06.725462 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:09.225932 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:11.227450 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:13.724311 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:15.726673 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:18.224468 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:20.224868 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:22.225180 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:24.726475 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:26.727745 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:29.227570 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:32.985851 18111 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:47.443353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:32.986740 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.44336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:32.986984 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.443365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:31.724799 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:33.728075 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:37.987425 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.443378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:37.987598 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.44338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:36.227051 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:38.227525 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:40.726608 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:42.728779 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:47.988404 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.443502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:47.988583 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.443506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:45.224969 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:47.225973 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:49.226160 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:51.726922 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:53.727712 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:56.227600 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:51:58.726053 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:01.228098 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:03.725531 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:07.989992 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.443638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:07.990153 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.443652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:05.726333 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:08.226360 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:10.725520 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:12.728504 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:15.225778 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:17.229020 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:19.725586 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:21.727450 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:24.226407 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:26.726025 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:29.228710 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:31.726604 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:33.727750 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:36.225651 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:38.226264 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:40.226865 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:42.726884 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.443806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.991684 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.44381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.991912 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.443815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.991922 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.443819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.991985 18111 kubeadm.go:322] Unfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:47.443821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992023 18111 kubeadm.go:322] \ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:47.443824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992031 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.443826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992075 18111 kubeadm.go:322] This error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:47.443828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992113 18111 kubeadm.go:322] \t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:47.443933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992187 18111 kubeadm.go:322] \t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:47.44394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992194 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.443944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992271 18111 kubeadm.go:322] If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:47.443947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992330 18111 kubeadm.go:322] \t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:47.44395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992381 18111 kubeadm.go:322] \t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:47.443953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992390 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.443955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992475 18111 kubeadm.go:322] Additionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:47.443957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992558 18111 kubeadm.go:322] To troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:47.44396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992631 18111 kubeadm.go:322] Here is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:47.443962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992667 18111 kubeadm.go:322] \t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:47.44397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992736 18111 kubeadm.go:322] \tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:47.443972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.992778 18111 kubeadm.go:322] \t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:47.443979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.995659 18111 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:47.443983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.995731 18111 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:47.443987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.995852 18111 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:47.444077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.995944 18111 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:47.444085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.996015 18111 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.44409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.996079 18111 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:47.444094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:52:47.996150 18111 out.go:239] ! initialization failed, will try again: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.4441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.444104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:47.444113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:47.444127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.444133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:47.444138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:47.444147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:47.444151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.444155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:47.444158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:47.444161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.44422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.444229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.444233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.444251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.44426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.444264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.444267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.444271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.444273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.444276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:47.444278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:47.44428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.444283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.444285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.444287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.444292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.444295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.444297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.4443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.444365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.444372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:47.444377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:47.444381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.444396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.444402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.444411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.444415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.444418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.444423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.444427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.444431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.444435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.444439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.444515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:47.444521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:47.444525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.444528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:47.444532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:47.444535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:47.444539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.444542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:47.444546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:47.444558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:47.444564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.444568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:47.444572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:47.444576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:47.444578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:47.44458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:47.444583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:47.444585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.444587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.444589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:47.444718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:47.444725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:47.444728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:47.44473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.444733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:47.444735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.444737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:47.996182 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm reset --cri-socket /var/run/dockershim.sock --force\"\n"} +{"Time":"2023-05-31T12:54:47.44474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.411288 18111 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:54:47.444743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.423058 18111 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:54:47.444745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.423116 18111 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:47.444748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.432308 18111 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:54:47.444751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.444753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.444755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.444757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.444759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.444762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.444874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.44488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.432330 18111 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:54:47.444885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.482151 18111 kubeadm.go:322] [init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:47.444887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.482193 18111 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:47.44489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.737434 18111 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.444892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.737516 18111 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:47.444896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.737598 18111 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:47.444903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.928647 18111 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:47.444906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.929340 18111 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.444909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:48.936444 18111 kubeadm.go:322] [kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:47.444912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.012512 18111 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:47.444914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034145 18111 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:54:47.444916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034231 18111 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.444919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034305 18111 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034384 18111 kubeadm.go:322] [certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034441 18111 kubeadm.go:322] [certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.445027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034512 18111 kubeadm.go:322] [certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.44503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034569 18111 kubeadm.go:322] [certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.445032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034629 18111 kubeadm.go:322] [certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034689 18111 kubeadm.go:322] [certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034790 18111 kubeadm.go:322] [certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.44504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034881 18111 kubeadm.go:322] [certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034925 18111 kubeadm.go:322] [certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:47.445046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.034994 18111 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:47.445049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.179440 18111 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.445052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.296270 18111 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.445054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.370877 18111 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.445057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.559086 18111 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.44506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.559832 18111 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.445063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:44.729199 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:46.729404 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.228769 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.581694 18111 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:54:47.445177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.581819 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.445189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.581938 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.445197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.582020 18111 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.445201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.582118 18111 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.445205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:49.582311 18111 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:47.445208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:51.229014 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:53.728701 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:56.225568 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:52:58.227214 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:00.727967 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:02.729393 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:05.226656 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:07.725697 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:09.727442 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:11.728242 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:13.728459 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:16.227304 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:18.727018 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:20.728844 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:23.226967 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:25.229706 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:27.727478 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:29.569138 18111 kubeadm.go:322] [kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:47.445417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:29.569734 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.445422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:29.569887 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.445425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:29.729439 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:32.226477 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:34.229451 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.445433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:34.570792 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.445435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:34.570977 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.445438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:36.346310 18639 pod_ready.go:81] duration metric: took 4m0.000570462s waiting for pod \"metrics-server-74d5c6b9c-f942b\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.445441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tE0531 12:53:36.346399 18639 pod_ready.go:66] WaitExtra: waitPodCondition: context deadline exceeded\n"} +{"Time":"2023-05-31T12:54:47.445444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:36.346417 18639 pod_ready.go:38] duration metric: took 4m11.554313319s for extra waiting for all system-critical and pods with labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.445446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:36.346443 18639 kubeadm.go:640] restartCluster took 4m28.188345869s\n"} +{"Time":"2023-05-31T12:54:47.44545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:53:36.346505 18639 out.go:239] ! Unable to restart cluster, will reset it: extra: timed out waiting 4m0s for all system-critical and pods with labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\"\n"} +{"Time":"2023-05-31T12:54:47.44556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:36.346534 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm reset --cri-socket /var/run/cri-dockerd.sock --force\"\n"} +{"Time":"2023-05-31T12:54:47.445568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.213750 18639 ssh_runner.go:235] Completed: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm reset --cri-socket /var/run/cri-dockerd.sock --force\": (6.867110997s)\n"} +{"Time":"2023-05-31T12:54:47.445583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.213820 18639 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:54:47.445588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.225503 18639 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T12:54:47.44559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.235493 18639 kubeadm.go:226] ignoring SystemVerification for kubeadm because of docker driver\n"} +{"Time":"2023-05-31T12:54:47.445593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.235550 18639 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T12:54:47.4456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.244844 18639 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T12:54:47.445614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.445618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.445621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.445624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.445627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.44563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.445632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T12:54:47.445635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.244870 18639 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,Mem,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\"\n"} +{"Time":"2023-05-31T12:54:47.445692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.288155 18639 kubeadm.go:322] [init] Using Kubernetes version: v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.4457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.288203 18639 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:47.445705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.419061 18639 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.445723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.419159 18639 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:47.445728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.419230 18639 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:47.445733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.727796 18639 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:47.445737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.775997 18639 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T12:54:47.445741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776089 18639 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.445745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776165 18639 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445749-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776253 18639 kubeadm.go:322] [certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776322 18639 kubeadm.go:322] [certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.445775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776390 18639 kubeadm.go:322] [certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776458 18639 kubeadm.go:322] [certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.445783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776516 18639 kubeadm.go:322] [certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776564 18639 kubeadm.go:322] [certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776635 18639 kubeadm.go:322] [certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776718 18639 kubeadm.go:322] [certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.445855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776750 18639 kubeadm.go:322] [certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:47.445864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.776808 18639 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:47.445868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.790256 18639 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.445871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:43.944908 18639 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.445875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.219617 18639 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.445878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.457144 18639 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.445882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.468326 18639 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:47.445886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.468884 18639 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.44589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.468935 18639 kubeadm.go:322] [kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T12:54:47.445893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.544547 18639 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.445902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.566059 18639 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T12:54:47.445905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.566127 18639 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.445908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.566190 18639 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.445987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.566235 18639 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.446004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.566307 18639 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.44602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.566464 18639 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:47.446029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.571578 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.446037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:44.571728 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.446042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:49.552291 18639 kubeadm.go:322] [apiclient] All control plane components are healthy after 5.002987 seconds\n"} +{"Time":"2023-05-31T12:54:47.446046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:49.552484 18639 kubeadm.go:322] [upload-config] Storing the configuration used in ConfigMap \"kubeadm-config\" in the \"kube-system\" Namespace\n"} +{"Time":"2023-05-31T12:54:47.446059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:49.564510 18639 kubeadm.go:322] [kubelet] Creating a ConfigMap \"kubelet-config\" in namespace kube-system with the configuration for the kubelets in the cluster\n"} +{"Time":"2023-05-31T12:54:47.446073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.083392 18639 kubeadm.go:322] [upload-certs] Skipping phase. Please see --upload-certs\n"} +{"Time":"2023-05-31T12:54:47.446079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.083598 18639 kubeadm.go:322] [mark-control-plane] Marking the node embed-certs-128000 as control-plane by adding the labels: [node-role.kubernetes.io/control-plane node.kubernetes.io/exclude-from-external-load-balancers]\n"} +{"Time":"2023-05-31T12:54:47.446082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.592501 18639 kubeadm.go:322] [bootstrap-token] Using token: wezq4r.9z9sbyrqhn4k7m71\n"} +{"Time":"2023-05-31T12:54:47.446085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.612645 18639 out.go:204] - Configuring RBAC rules ...\n"} +{"Time":"2023-05-31T12:54:47.44609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.612726 18639 kubeadm.go:322] [bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles\n"} +{"Time":"2023-05-31T12:54:47.446228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.652869 18639 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to get nodes\n"} +{"Time":"2023-05-31T12:54:47.446234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.659449 18639 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials\n"} +{"Time":"2023-05-31T12:54:47.446238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.662191 18639 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token\n"} +{"Time":"2023-05-31T12:54:47.446245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.664853 18639 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster\n"} +{"Time":"2023-05-31T12:54:47.446248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.668177 18639 kubeadm.go:322] [bootstrap-token] Creating the \"cluster-info\" ConfigMap in the \"kube-public\" namespace\n"} +{"Time":"2023-05-31T12:54:47.44625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.676961 18639 kubeadm.go:322] [kubelet-finalize] Updating \"/etc/kubernetes/kubelet.conf\" to point to a rotatable kubelet client certificate and key\n"} +{"Time":"2023-05-31T12:54:47.446253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:50.831930 18639 kubeadm.go:322] [addons] Applied essential addon: CoreDNS\n"} +{"Time":"2023-05-31T12:54:47.446256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.058722 18639 kubeadm.go:322] [addons] Applied essential addon: kube-proxy\n"} +{"Time":"2023-05-31T12:54:47.446258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.059769 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.44626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.059836 18639 kubeadm.go:322] Your Kubernetes control-plane has initialized successfully!\n"} +{"Time":"2023-05-31T12:54:47.446267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.059846 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.446269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.059960 18639 kubeadm.go:322] To start using your cluster, you need to run the following as a regular user:\n"} +{"Time":"2023-05-31T12:54:47.446272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.059973 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.446274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.059995 18639 kubeadm.go:322] mkdir -p $HOME/.kube\n"} +{"Time":"2023-05-31T12:54:47.446277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060100 18639 kubeadm.go:322] sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config\n"} +{"Time":"2023-05-31T12:54:47.446355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060190 18639 kubeadm.go:322] sudo chown $(id -u):$(id -g) $HOME/.kube/config\n"} +{"Time":"2023-05-31T12:54:47.446365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060203 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.446369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060288 18639 kubeadm.go:322] Alternatively, if you are the root user, you can run:\n"} +{"Time":"2023-05-31T12:54:47.446371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060304 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.446374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060381 18639 kubeadm.go:322] export KUBECONFIG=/etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T12:54:47.446376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060397 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.44638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060485 18639 kubeadm.go:322] You should now deploy a pod network to the cluster.\n"} +{"Time":"2023-05-31T12:54:47.446394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060607 18639 kubeadm.go:322] Run \"kubectl apply -f [podnetwork].yaml\" with one of the options listed at:\n"} +{"Time":"2023-05-31T12:54:47.446399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060708 18639 kubeadm.go:322] https://kubernetes.io/docs/concepts/cluster-administration/addons/\n"} +{"Time":"2023-05-31T12:54:47.446402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060720 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.446404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060806 18639 kubeadm.go:322] You can now join any number of control-plane nodes by copying certificate authorities\n"} +{"Time":"2023-05-31T12:54:47.446406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060893 18639 kubeadm.go:322] and service account keys on each node and then running the following as root:\n"} +{"Time":"2023-05-31T12:54:47.446409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060907 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.446411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.060970 18639 kubeadm.go:322] kubeadm join control-plane.minikube.internal:8443 --token wezq4r.9z9sbyrqhn4k7m71 \\\n"} +{"Time":"2023-05-31T12:54:47.446414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.061042 18639 kubeadm.go:322] \t--discovery-token-ca-cert-hash sha256:7efc073458f192e3613629e4145546eb0f9c1d3303e405790ddeec7c4e1d797c \\\n"} +{"Time":"2023-05-31T12:54:47.44642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.061058 18639 kubeadm.go:322] \t--control-plane \n"} +{"Time":"2023-05-31T12:54:47.446508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.061062 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.446512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.061175 18639 kubeadm.go:322] Then you can join any number of worker nodes by running the following on each as root:\n"} +{"Time":"2023-05-31T12:54:47.446515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.061184 18639 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.446517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.061289 18639 kubeadm.go:322] kubeadm join control-plane.minikube.internal:8443 --token wezq4r.9z9sbyrqhn4k7m71 \\\n"} +{"Time":"2023-05-31T12:54:47.44652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.061365 18639 kubeadm.go:322] \t--discovery-token-ca-cert-hash sha256:7efc073458f192e3613629e4145546eb0f9c1d3303e405790ddeec7c4e1d797c \n"} +{"Time":"2023-05-31T12:54:47.446522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.067148 18639 kubeadm.go:322] \t[WARNING Swap]: swap is enabled; production deployments should disable swap unless testing the NodeSwap feature gate of the kubelet\n"} +{"Time":"2023-05-31T12:54:47.446525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.067297 18639 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:47.446527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.067566 18639 kubeadm.go:322] W0531 19:53:43.418664 9912 images.go:80] could not find officially supported version of etcd for Kubernetes v1.27.2, falling back to the nearest etcd version (3.5.7-0)\n"} +{"Time":"2023-05-31T12:54:47.44653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.067827 18639 kubeadm.go:322] W0531 19:53:44.546744 9912 images.go:80] could not find officially supported version of etcd for Kubernetes v1.27.2, falling back to the nearest etcd version (3.5.7-0)\n"} +{"Time":"2023-05-31T12:54:47.446534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.068394 18639 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:54:47.446536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.068409 18639 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:54:47.446539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.091690 18639 out.go:177] * Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T12:54:47.446542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.113426 18639 ssh_runner.go:195] Run: sudo mkdir -p /etc/cni/net.d\n"} +{"Time":"2023-05-31T12:54:47.446544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.133423 18639 ssh_runner.go:362] scp memory --\u003e /etc/cni/net.d/1-k8s.conflist (457 bytes)\n"} +{"Time":"2023-05-31T12:54:47.446547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.156844 18639 ssh_runner.go:195] Run: /bin/bash -c \"cat /proc/$(pgrep kube-apiserver)/oom_adj\"\n"} +{"Time":"2023-05-31T12:54:47.446627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.156928 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl create clusterrolebinding minikube-rbac --clusterrole=cluster-admin --serviceaccount=kube-system:default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.156931 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl label nodes minikube.k8s.io/version=v1.30.1 minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140 minikube.k8s.io/name=embed-certs-128000 minikube.k8s.io/updated_at=2023_05_31T12_53_51_0700 minikube.k8s.io/primary=true --all --overwrite --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.44664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.341887 18639 ops.go:34] apiserver oom_adj: -16\n"} +{"Time":"2023-05-31T12:54:47.446643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.342012 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:51.910610 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:52.411772 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:52.911274 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:53.410576 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:53.911615 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:54.410787 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:54.910685 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:55.411755 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:55.910791 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:56.410786 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:56.911530 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:57.410690 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:57.910757 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:58.410892 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:58.912147 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:59.411193 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:53:59.910839 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:00.410867 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:00.911014 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:01.410768 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:01.911080 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.44696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:02.411071 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:02.910805 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:03.411716 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:03.910763 18639 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.446984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.043114 18639 kubeadm.go:1076] duration metric: took 12.886079202s to wait for elevateKubeSystemPrivileges.\n"} +{"Time":"2023-05-31T12:54:47.446988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.043134 18639 kubeadm.go:406] StartCluster complete in 4m55.916460679s\n"} +{"Time":"2023-05-31T12:54:47.446991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.043159 18639 settings.go:142] acquiring lock: {Name:mkadbf0242c93bf6c2425e391614d45302b1e1dc Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.446996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.043260 18639 settings.go:150] Updating kubeconfig: /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T12:54:47.447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044028 18639 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/kubeconfig: {Name:mk36b1fef13f0c406b5340544ea043a831d9fe53 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:54:47.447004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044305 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml\"\n"} +{"Time":"2023-05-31T12:54:47.447009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044322 18639 addons.go:496] enable addons start: toEnable=map[ambassador:false auto-pause:false cloud-spanner:false csi-hostpath-driver:false dashboard:true default-storageclass:true efk:false freshpod:false gcp-auth:false gvisor:false headlamp:false helm-tiller:false inaccel:false ingress:false ingress-dns:false inspektor-gadget:false istio:false istio-provisioner:false kong:false kubevirt:false logviewer:false metallb:false metrics-server:true nvidia-driver-installer:false nvidia-gpu-device-plugin:false olm:false pod-security-policy:false portainer:false registry:false registry-aliases:false registry-creds:false storage-provisioner:true storage-provisioner-gluster:false volumesnapshots:false]\n"} +{"Time":"2023-05-31T12:54:47.447182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044449 18639 addons.go:66] Setting default-storageclass=true in profile \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.447189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044472 18639 addons.go:66] Setting storage-provisioner=true in profile \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.447192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044494 18639 addons_storage_classes.go:33] enableOrDisableStorageClasses default-storageclass=true on \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.447195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044511 18639 addons.go:228] Setting addon storage-provisioner=true in \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.447197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:04.044522 18639 addons.go:237] addon storage-provisioner should already be in state true\n"} +{"Time":"2023-05-31T12:54:47.4472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044530 18639 config.go:182] Loaded profile config \"embed-certs-128000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:54:47.447202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044490 18639 addons.go:66] Setting dashboard=true in profile \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.447205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044583 18639 addons.go:228] Setting addon dashboard=true in \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.447208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:04.044614 18639 addons.go:237] addon dashboard should already be in state true\n"} +{"Time":"2023-05-31T12:54:47.44721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044585 18639 host.go:66] Checking if \"embed-certs-128000\" exists ...\n"} +{"Time":"2023-05-31T12:54:47.447212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044649 18639 host.go:66] Checking if \"embed-certs-128000\" exists ...\n"} +{"Time":"2023-05-31T12:54:47.447218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044501 18639 addons.go:66] Setting metrics-server=true in profile \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.447221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044669 18639 addons.go:228] Setting addon metrics-server=true in \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.447224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:04.044689 18639 addons.go:237] addon metrics-server should already be in state true\n"} +{"Time":"2023-05-31T12:54:47.447226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044717 18639 host.go:66] Checking if \"embed-certs-128000\" exists ...\n"} +{"Time":"2023-05-31T12:54:47.447229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.044962 18639 cli_runner.go:164] Run: docker container inspect embed-certs-128000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:47.447406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.045121 18639 cli_runner.go:164] Run: docker container inspect embed-certs-128000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:47.447413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.046096 18639 cli_runner.go:164] Run: docker container inspect embed-certs-128000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:47.447418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.046105 18639 cli_runner.go:164] Run: docker container inspect embed-certs-128000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:47.447421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.156733 18639 out.go:177] - Using image gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T12:54:47.447427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.180139 18639 addons.go:420] installing /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T12:54:47.44743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.200779 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storage-provisioner.yaml (2676 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.221678 18639 out.go:177] - Using image fake.domain/registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:54:47.447435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.200727 18639 out.go:177] - Using image docker.io/kubernetesui/dashboard:v2.7.0\n"} +{"Time":"2023-05-31T12:54:47.447438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.200906 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.447443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.243794 18639 addons.go:420] installing /etc/kubernetes/addons/metrics-apiservice.yaml\n"} +{"Time":"2023-05-31T12:54:47.447446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.264739 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/metrics-apiservice.yaml (424 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.264852 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.447451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.285835 18639 out.go:177] - Using image registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:54:47.447454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.306987 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-ns.yaml\n"} +{"Time":"2023-05-31T12:54:47.447456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.307019 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-ns.yaml (759 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.307127 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.447558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.317567 18639 addons.go:228] Setting addon default-storageclass=true in \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.44756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:04.317596 18639 addons.go:237] addon default-storageclass should already be in state true\n"} +{"Time":"2023-05-31T12:54:47.447563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.317620 18639 host.go:66] Checking if \"embed-certs-128000\" exists ...\n"} +{"Time":"2023-05-31T12:54:47.447566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.318232 18639 cli_runner.go:164] Run: docker container inspect embed-certs-128000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T12:54:47.447569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.319635 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.447572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.327735 18639 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml | sed -e '/^ forward . \\/etc\\/resolv.conf.*/i \\ hosts {\\n 192.168.65.254 host.minikube.internal\\n fallthrough\\n }' -e '/^ errors *$/i \\ log' | sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig replace -f -\"\n"} +{"Time":"2023-05-31T12:54:47.447578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.355126 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.447581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.387633 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.447584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.391629 18639 addons.go:420] installing /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T12:54:47.447586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.391641 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storageclass.yaml (271 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.391704 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.447712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.449154 18639 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:53750 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/embed-certs-128000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T12:54:47.447728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.627731 18639 kapi.go:248] \"coredns\" deployment in \"kube-system\" namespace and \"embed-certs-128000\" context rescaled to 1 replicas\n"} +{"Time":"2023-05-31T12:54:47.447737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.627770 18639 start.go:223] Will wait 6m0s for node \u0026{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:54:47.447741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.653055 18639 out.go:177] * Verifying Kubernetes components...\n"} +{"Time":"2023-05-31T12:54:47.447745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.632217 18639 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T12:54:47.44775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.657915 18639 addons.go:420] installing /etc/kubernetes/addons/metrics-server-deployment.yaml\n"} +{"Time":"2023-05-31T12:54:47.447755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.673069 18639 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T12:54:47.447758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.694159 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/metrics-server-deployment.yaml (1825 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.726113 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-clusterrole.yaml\n"} +{"Time":"2023-05-31T12:54:47.447764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.726137 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-clusterrole.yaml (1001 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.752747 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-clusterrolebinding.yaml\n"} +{"Time":"2023-05-31T12:54:47.447769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.752774 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-clusterrolebinding.yaml (1018 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.836370 18639 addons.go:420] installing /etc/kubernetes/addons/metrics-server-rbac.yaml\n"} +{"Time":"2023-05-31T12:54:47.447774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.836393 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/metrics-server-rbac.yaml (2175 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.847919 18639 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T12:54:47.44785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.941725 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-configmap.yaml\n"} +{"Time":"2023-05-31T12:54:47.447853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.941744 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-configmap.yaml (837 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.024684 18639 addons.go:420] installing /etc/kubernetes/addons/metrics-server-service.yaml\n"} +{"Time":"2023-05-31T12:54:47.447861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.024710 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/metrics-server-service.yaml (446 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.050538 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-dp.yaml\n"} +{"Time":"2023-05-31T12:54:47.447866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.050552 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-dp.yaml (4201 bytes)\n"} +{"Time":"2023-05-31T12:54:47.44787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.132836 18639 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/metrics-apiservice.yaml -f /etc/kubernetes/addons/metrics-server-deployment.yaml -f /etc/kubernetes/addons/metrics-server-rbac.yaml -f /etc/kubernetes/addons/metrics-server-service.yaml\n"} +{"Time":"2023-05-31T12:54:47.447875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.158138 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-role.yaml\n"} +{"Time":"2023-05-31T12:54:47.447879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.158163 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-role.yaml (1724 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.341221 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-rolebinding.yaml\n"} +{"Time":"2023-05-31T12:54:47.447886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.341238 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-rolebinding.yaml (1046 bytes)\n"} +{"Time":"2023-05-31T12:54:47.44789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.441324 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-sa.yaml\n"} +{"Time":"2023-05-31T12:54:47.447895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.441341 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-sa.yaml (837 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.539787 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-secret.yaml\n"} +{"Time":"2023-05-31T12:54:47.447967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.539806 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-secret.yaml (1389 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.630131 18639 addons.go:420] installing /etc/kubernetes/addons/dashboard-svc.yaml\n"} +{"Time":"2023-05-31T12:54:47.447978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.630143 18639 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-svc.yaml (1294 bytes)\n"} +{"Time":"2023-05-31T12:54:47.447981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:05.732162 18639 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/dashboard-ns.yaml -f /etc/kubernetes/addons/dashboard-clusterrole.yaml -f /etc/kubernetes/addons/dashboard-clusterrolebinding.yaml -f /etc/kubernetes/addons/dashboard-configmap.yaml -f /etc/kubernetes/addons/dashboard-dp.yaml -f /etc/kubernetes/addons/dashboard-role.yaml -f /etc/kubernetes/addons/dashboard-rolebinding.yaml -f /etc/kubernetes/addons/dashboard-sa.yaml -f /etc/kubernetes/addons/dashboard-secret.yaml -f /etc/kubernetes/addons/dashboard-svc.yaml\n"} +{"Time":"2023-05-31T12:54:47.447985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.154053 18639 ssh_runner.go:235] Completed: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml | sed -e '/^ forward . \\/etc\\/resolv.conf.*/i \\ hosts {\\n 192.168.65.254 host.minikube.internal\\n fallthrough\\n }' -e '/^ errors *$/i \\ log' | sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig replace -f -\": (1.826260778s)\n"} +{"Time":"2023-05-31T12:54:47.447988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.154086 18639 start.go:916] {\"host.minikube.internal\": 192.168.65.254} host record injected into CoreDNS's ConfigMap\n"} +{"Time":"2023-05-31T12:54:47.447991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.648190 18639 ssh_runner.go:235] Completed: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storage-provisioner.yaml: (1.975160168s)\n"} +{"Time":"2023-05-31T12:54:47.447994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.648223 18639 ssh_runner.go:235] Completed: sudo systemctl is-active --quiet service kubelet: (1.954065288s)\n"} +{"Time":"2023-05-31T12:54:47.447999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.648267 18639 ssh_runner.go:235] Completed: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storageclass.yaml: (1.800306384s)\n"} +{"Time":"2023-05-31T12:54:47.448077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.648381 18639 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" embed-certs-128000\n"} +{"Time":"2023-05-31T12:54:47.448092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.705132 18639 node_ready.go:35] waiting up to 6m0s for node \"embed-certs-128000\" to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.732825 18639 node_ready.go:49] node \"embed-certs-128000\" has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.448099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.732838 18639 node_ready.go:38] duration metric: took 27.679177ms waiting for node \"embed-certs-128000\" to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.732850 18639 pod_ready.go:35] extra waiting up to 6m0s for all system-critical pods including labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.740999 18639 pod_ready.go:78] waiting up to 6m0s for pod \"coredns-5d78c9869d-rg6h2\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.750349 18639 pod_ready.go:92] pod \"coredns-5d78c9869d-rg6h2\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.448111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.750361 18639 pod_ready.go:81] duration metric: took 9.345036ms waiting for pod \"coredns-5d78c9869d-rg6h2\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.750370 18639 pod_ready.go:78] waiting up to 6m0s for pod \"coredns-5d78c9869d-t96pk\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.757025 18639 pod_ready.go:92] pod \"coredns-5d78c9869d-t96pk\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.448118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.757039 18639 pod_ready.go:81] duration metric: took 6.663681ms waiting for pod \"coredns-5d78c9869d-t96pk\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.757048 18639 pod_ready.go:78] waiting up to 6m0s for pod \"etcd-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.44819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.770395 18639 pod_ready.go:92] pod \"etcd-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.448196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.770416 18639 pod_ready.go:81] duration metric: took 13.362115ms waiting for pod \"etcd-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.770425 18639 pod_ready.go:78] waiting up to 6m0s for pod \"kube-apiserver-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.775092 18639 ssh_runner.go:235] Completed: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/metrics-apiservice.yaml -f /etc/kubernetes/addons/metrics-server-deployment.yaml -f /etc/kubernetes/addons/metrics-server-rbac.yaml -f /etc/kubernetes/addons/metrics-server-service.yaml: (1.642177896s)\n"} +{"Time":"2023-05-31T12:54:47.44821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.775124 18639 addons.go:464] Verifying addon metrics-server=true in \"embed-certs-128000\"\n"} +{"Time":"2023-05-31T12:54:47.448214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.826106 18639 pod_ready.go:92] pod \"kube-apiserver-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.448218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.826121 18639 pod_ready.go:81] duration metric: took 55.689809ms waiting for pod \"kube-apiserver-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:06.826130 18639 pod_ready.go:78] waiting up to 6m0s for pod \"kube-controller-manager-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.127473 18639 pod_ready.go:92] pod \"kube-controller-manager-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.448231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.127486 18639 pod_ready.go:81] duration metric: took 301.347535ms waiting for pod \"kube-controller-manager-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.127495 18639 pod_ready.go:78] waiting up to 6m0s for pod \"kube-proxy-rgw99\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.464966 18639 ssh_runner.go:235] Completed: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/dashboard-ns.yaml -f /etc/kubernetes/addons/dashboard-clusterrole.yaml -f /etc/kubernetes/addons/dashboard-clusterrolebinding.yaml -f /etc/kubernetes/addons/dashboard-configmap.yaml -f /etc/kubernetes/addons/dashboard-dp.yaml -f /etc/kubernetes/addons/dashboard-role.yaml -f /etc/kubernetes/addons/dashboard-rolebinding.yaml -f /etc/kubernetes/addons/dashboard-sa.yaml -f /etc/kubernetes/addons/dashboard-secret.yaml -f /etc/kubernetes/addons/dashboard-svc.yaml: (1.732726252s)\n"} +{"Time":"2023-05-31T12:54:47.448347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.490909 18639 out.go:177] * Some dashboard features require the metrics-server addon. To enable all features please run:\n"} +{"Time":"2023-05-31T12:54:47.448362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.448366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tminikube -p embed-certs-128000 addons enable metrics-server\t\n"} +{"Time":"2023-05-31T12:54:47.448371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.448374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.448377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.512015 18639 out.go:177] * Enabled addons: storage-provisioner, default-storageclass, metrics-server, dashboard\n"} +{"Time":"2023-05-31T12:54:47.448381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.572669 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.448385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:04.572849 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.448392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.533060 18639 addons.go:499] enable addons completed in 3.488695057s: enabled=[storage-provisioner default-storageclass metrics-server dashboard]\n"} +{"Time":"2023-05-31T12:54:47.448397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.524637 18639 pod_ready.go:92] pod \"kube-proxy-rgw99\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.448401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.533105 18639 pod_ready.go:81] duration metric: took 405.598592ms waiting for pod \"kube-proxy-rgw99\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.533134 18639 pod_ready.go:78] waiting up to 6m0s for pod \"kube-scheduler-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.448411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.908685 18639 pod_ready.go:92] pod \"kube-scheduler-embed-certs-128000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T12:54:47.448482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.908698 18639 pod_ready.go:81] duration metric: took 375.55465ms waiting for pod \"kube-scheduler-embed-certs-128000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.44849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:07.908707 18639 pod_ready.go:78] waiting up to 6m0s for pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T12:54:47.4485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:10.328825 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:12.824519 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:14.827032 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:17.316358 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:19.818372 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:21.827589 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.44853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:24.328319 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:26.816694 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:29.316978 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:31.318474 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:33.816430 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:35.818254 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:38.317194 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:40.816341 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:43.316277 18639 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-7wt8d\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T12:54:47.448644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.574685 18111 kubeadm.go:322] [kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.448649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.574891 18111 kubeadm.go:322] [kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.448654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.574908 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.448658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.574951 18111 kubeadm.go:322] Unfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:47.448661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575025 18111 kubeadm.go:322] \ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:47.448665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575040 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.448668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575104 18111 kubeadm.go:322] This error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:47.448672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575170 18111 kubeadm.go:322] \t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:47.448676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575329 18111 kubeadm.go:322] \t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:47.448679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575348 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.448683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575445 18111 kubeadm.go:322] If you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:47.448686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575486 18111 kubeadm.go:322] \t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:47.44876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575515 18111 kubeadm.go:322] \t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:47.448767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575519 18111 kubeadm.go:322] \n"} +{"Time":"2023-05-31T12:54:47.44877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575598 18111 kubeadm.go:322] Additionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:47.448774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575678 18111 kubeadm.go:322] To troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:47.448777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575762 18111 kubeadm.go:322] Here is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:47.448779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575812 18111 kubeadm.go:322] \t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:47.448783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575883 18111 kubeadm.go:322] \tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:47.448786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.575912 18111 kubeadm.go:322] \t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:47.448789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.578734 18111 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:47.448792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.578820 18111 kubeadm.go:322] \t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:47.448794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.578926 18111 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:47.448797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579008 18111 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:47.448799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579071 18111 kubeadm.go:322] error execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.448801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579152 18111 kubeadm.go:322] To see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:47.448915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579182 18111 kubeadm.go:406] StartCluster complete in 8m6.768840439s\n"} +{"Time":"2023-05-31T12:54:47.448921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.579305 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-apiserver --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.448924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.600645 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.448927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.600659 18111 logs.go:286] No container was found matching \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.448929-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.600730 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_etcd --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.448933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.621924 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.448936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.621940 18111 logs.go:286] No container was found matching \"etcd\"\n"} +{"Time":"2023-05-31T12:54:47.448938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.622021 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_coredns --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.44894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.643302 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.448942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.643316 18111 logs.go:286] No container was found matching \"coredns\"\n"} +{"Time":"2023-05-31T12:54:47.448945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.643384 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-scheduler --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.448947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.664181 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.448955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.664201 18111 logs.go:286] No container was found matching \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.448958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.664292 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-proxy --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.448961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.685380 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.448963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.685393 18111 logs.go:286] No container was found matching \"kube-proxy\"\n"} +{"Time":"2023-05-31T12:54:47.448965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.685448 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kube-controller-manager --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.449069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.705695 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.449075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.705710 18111 logs.go:286] No container was found matching \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.449078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.705776 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kindnet --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.449081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.726864 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.449084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.726878 18111 logs.go:286] No container was found matching \"kindnet\"\n"} +{"Time":"2023-05-31T12:54:47.449087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.726942 18111 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_kubernetes-dashboard --format={{.ID}}\n"} +{"Time":"2023-05-31T12:54:47.449091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.747500 18111 logs.go:284] 0 containers: []\n"} +{"Time":"2023-05-31T12:54:47.449095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.747514 18111 logs.go:286] No container was found matching \"kubernetes-dashboard\"\n"} +{"Time":"2023-05-31T12:54:47.4491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.747522 18111 logs.go:123] Gathering logs for container status ...\n"} +{"Time":"2023-05-31T12:54:47.449103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.747531 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo `which crictl || echo crictl` ps -a || sudo docker ps -a\"\n"} +{"Time":"2023-05-31T12:54:47.449107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.801111 18111 logs.go:123] Gathering logs for kubelet ...\n"} +{"Time":"2023-05-31T12:54:47.449111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.801126 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u kubelet -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.449116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.843335 18111 logs.go:123] Gathering logs for dmesg ...\n"} +{"Time":"2023-05-31T12:54:47.44912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.843350 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo dmesg -PH -L=never --level warn,err,crit,alert,emerg | tail -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.449124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.857805 18111 logs.go:123] Gathering logs for describe nodes ...\n"} +{"Time":"2023-05-31T12:54:47.449203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.857820 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\"\n"} +{"Time":"2023-05-31T12:54:47.449209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.917579 18111 logs.go:130] failed describe nodes: command: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.449212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.449217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.449219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.449222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.449224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \n"} +{"Time":"2023-05-31T12:54:47.449226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.449229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.449231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.449233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.449236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.917592 18111 logs.go:123] Gathering logs for Docker ...\n"} +{"Time":"2023-05-31T12:54:47.449238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:44.917599 18111 ssh_runner.go:195] Run: /bin/bash -c \"sudo journalctl -u docker -u cri-docker -n 400\"\n"} +{"Time":"2023-05-31T12:54:47.449242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.933966 18111 out.go:369] Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.449245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.449248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:47.449318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:47.449326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.449329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:47.449339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:47.449344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:47.449347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.449352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:47.449355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:47.449358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.449362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.449369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.449374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:47.449456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:47.44946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.449464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.449466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.449469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.449472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.449476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.44948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.449483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.449492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.449496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:47.449501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:47.449505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.449509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.449514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.449519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.449523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.449591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.4496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.449614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.449617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.449619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.449622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.449625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:47.449627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:47.44963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.449632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:47.449635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:47.449639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:47.449642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.449646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:47.449649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:47.449652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:47.449654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.449657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:47.449743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:47.44975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:47.449754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:47.449758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:47.449774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:47.449779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.449783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.449787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:47.449792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:47.449797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:47.449801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:47.449806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.44981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:47.449814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.933991 18111 out.go:239] * \n"} +{"Time":"2023-05-31T12:54:47.449819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.934025 18111 out.go:239] X Error starting cluster: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.449877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.449883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:47.449885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:47.449888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.449891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:47.449893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:47.449896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:47.449898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.449901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:47.449903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:47.449906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.449909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.449917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.44992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.449923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.449925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.45001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:47.450018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:47.450024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.450027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.450029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.450031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.450034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.450037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.45004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.450042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.450045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.450047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:47.45005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:47.450052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.45006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.450139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.450154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.450162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.45017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:47.450181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:47.450184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:47.45019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:47.450194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:47.450198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:47.450204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:47.450207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:47.450263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:47.450271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:47.450273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:47.450276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:47.450278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:47.450281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:47.450283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.450288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:47.450291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:47.450293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:47.450296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:47.450298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.4503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:47.450303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.934041 18111 out.go:239] * \n"} +{"Time":"2023-05-31T12:54:47.450308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:44.934658 18111 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:54:47.450369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:47.450383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:54:47.450386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:54:47.450388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:47.450393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:54:47.4504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:54:47.450405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:54:47.45041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:45.004432 18111 out.go:177] \n"} +{"Time":"2023-05-31T12:54:47.450413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:45.046190 18111 out.go:239] X Exiting due to K8S_KUBELET_NOT_RUNNING: wait: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.16.0:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,SystemVerification,FileContent--proc-sys-net-bridge-bridge-nf-call-iptables\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.45042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.450423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[init] Using Kubernetes version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:47.450427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T12:54:47.450487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.450493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T12:54:47.450497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T12:54:47.4505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T12:54:47.450502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T12:54:47.450515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-start] Activating the kubelet service\n"} +{"Time":"2023-05-31T12:54:47.450517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T12:54:47.450519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.450521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-kubelet-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.45053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing front-proxy-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/ca certificate authority\n"} +{"Time":"2023-05-31T12:54:47.450538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/server certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/peer certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing etcd/healthcheck-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450555-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using existing apiserver-etcd-client certificate and key on disk\n"} +{"Time":"2023-05-31T12:54:47.450559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[certs] Using the existing \"sa\" key\n"} +{"Time":"2023-05-31T12:54:47.450562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T12:54:47.450616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.450622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.450625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.450628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T12:54:47.45063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.450633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T12:54:47.450635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T12:54:47.450639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T12:54:47.450651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T12:54:47.45066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T12:54:47.450665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] Initial timeout of 40s passed.\n"} +{"Time":"2023-05-31T12:54:47.450668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.450693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.450699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.450733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.45075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] It seems like the kubelet isn't running or healthy.\n"} +{"Time":"2023-05-31T12:54:47.450753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t[kubelet-check] The HTTP call equal to 'curl -sSL http://localhost:10248/healthz' failed with error: Get http://localhost:10248/healthz: dial tcp 127.0.0.1:10248: connect: connection refused.\n"} +{"Time":"2023-05-31T12:54:47.450757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tUnfortunately, an error has occurred:\n"} +{"Time":"2023-05-31T12:54:47.450761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\ttimed out waiting for the condition\n"} +{"Time":"2023-05-31T12:54:47.450764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThis error is likely caused by:\n"} +{"Time":"2023-05-31T12:54:47.450769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is not running\n"} +{"Time":"2023-05-31T12:54:47.450773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- The kubelet is unhealthy due to a misconfiguration of the node in some way (required cgroups disabled)\n"} +{"Time":"2023-05-31T12:54:47.450776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.45078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tIf you are on a systemd-powered system, you can try to troubleshoot the error with the following commands:\n"} +{"Time":"2023-05-31T12:54:47.450783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'systemctl status kubelet'\n"} +{"Time":"2023-05-31T12:54:47.450787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'journalctl -xeu kubelet'\n"} +{"Time":"2023-05-31T12:54:47.450791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tAdditionally, a control plane component may have crashed or exited when started by the container runtime.\n"} +{"Time":"2023-05-31T12:54:47.450797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo troubleshoot, list all containers using your preferred container runtimes CLI, e.g. docker.\n"} +{"Time":"2023-05-31T12:54:47.450848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tHere is one example how you may list all Kubernetes containers running in docker:\n"} +{"Time":"2023-05-31T12:54:47.450854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker ps -a | grep kube | grep -v pause'\n"} +{"Time":"2023-05-31T12:54:47.450856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\tOnce you have found the failing container, you can inspect its logs with:\n"} +{"Time":"2023-05-31T12:54:47.450877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t- 'docker logs CONTAINERID'\n"} +{"Time":"2023-05-31T12:54:47.450883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.450891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T12:54:47.450895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Swap]: running with swap on is not supported. Please disable swap\n"} +{"Time":"2023-05-31T12:54:47.4509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 18.09\n"} +{"Time":"2023-05-31T12:54:47.450904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T12:54:47.450906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \terror execution phase wait-control-plane: couldn't initialize a Kubernetes cluster\n"} +{"Time":"2023-05-31T12:54:47.450909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tTo see the stack trace of this error execute with --v=5 or higher\n"} +{"Time":"2023-05-31T12:54:47.450912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:45.046258 18111 out.go:239] * Suggestion: Check output of 'journalctl -xeu kubelet', try passing --extra-config=kubelet.cgroup-driver=systemd to minikube start\n"} +{"Time":"2023-05-31T12:54:47.450919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:54:45.046282 18111 out.go:239] * Related issue: https://github.com/kubernetes/minikube/issues/4172\n"} +{"Time":"2023-05-31T12:54:47.450922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:54:45.067383 18111 out.go:177] \n"} +{"Time":"2023-05-31T12:54:47.450925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.450988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.450995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* ==\u003e Docker \u003c==\n"} +{"Time":"2023-05-31T12:54:47.450999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* May 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.099659784Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\n"} +{"Time":"2023-05-31T12:54:47.451016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.138464945Z\" level=info msg=\"Loading containers: done.\"\n"} +{"Time":"2023-05-31T12:54:47.451025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.147458789Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\n"} +{"Time":"2023-05-31T12:54:47.451031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.147525112Z\" level=info msg=\"Daemon has completed initialization\"\n"} +{"Time":"2023-05-31T12:54:47.45104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.179519418Z\" level=info msg=\"API listen on /var/run/docker.sock\"\n"} +{"Time":"2023-05-31T12:54:47.451045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.179718200Z\" level=info msg=\"API listen on [::]:2376\"\n"} +{"Time":"2023-05-31T12:54:47.451049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:25 old-k8s-version-787000 systemd[1]: Started Docker Application Container Engine.\n"} +{"Time":"2023-05-31T12:54:47.451054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Stopping Docker Application Container Engine...\n"} +{"Time":"2023-05-31T12:54:47.451058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.403593532Z\" level=info msg=\"Processing signal 'terminated'\"\n"} +{"Time":"2023-05-31T12:54:47.451062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.404984583Z\" level=info msg=\"stopping event stream following graceful shutdown\" error=\"\u003cnil\u003e\" module=libcontainerd namespace=moby\n"} +{"Time":"2023-05-31T12:54:47.451068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.405234397Z\" level=info msg=\"Daemon shutdown complete\"\n"} +{"Time":"2023-05-31T12:54:47.451072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.405446217Z\" level=info msg=\"stopping event stream following graceful shutdown\" error=\"context canceled\" module=libcontainerd namespace=plugins.moby\n"} +{"Time":"2023-05-31T12:54:47.451131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: docker.service: Deactivated successfully.\n"} +{"Time":"2023-05-31T12:54:47.451136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Stopped Docker Application Container Engine.\n"} +{"Time":"2023-05-31T12:54:47.451138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Starting Docker Application Container Engine...\n"} +{"Time":"2023-05-31T12:54:47.451141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.462213859Z\" level=info msg=\"Starting up\"\n"} +{"Time":"2023-05-31T12:54:47.451144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.596616592Z\" level=info msg=\"[graphdriver] trying configured driver: overlay2\"\n"} +{"Time":"2023-05-31T12:54:47.451146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.824413968Z\" level=info msg=\"Loading containers: start.\"\n"} +{"Time":"2023-05-31T12:54:47.451151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.917938134Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\n"} +{"Time":"2023-05-31T12:54:47.451154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.956170411Z\" level=info msg=\"Loading containers: done.\"\n"} +{"Time":"2023-05-31T12:54:47.45116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.965771934Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\n"} +{"Time":"2023-05-31T12:54:47.451162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.965840535Z\" level=info msg=\"Daemon has completed initialization\"\n"} +{"Time":"2023-05-31T12:54:47.451165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.998089110Z\" level=info msg=\"API listen on /var/run/docker.sock\"\n"} +{"Time":"2023-05-31T12:54:47.451168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.998137953Z\" level=info msg=\"API listen on [::]:2376\"\n"} +{"Time":"2023-05-31T12:54:47.451171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Started Docker Application Container Engine.\n"} +{"Time":"2023-05-31T12:54:47.451173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.451286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.451292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* ==\u003e container status \u003c==\n"} +{"Time":"2023-05-31T12:54:47.4513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* time=\"2023-05-31T19:54:46Z\" level=fatal msg=\"unable to determine runtime API version: rpc error: code = Unavailable desc = connection error: desc = \\\"transport: Error while dialing dial unix /var/run/dockershim.sock: connect: no such file or directory\\\"\"\n"} +{"Time":"2023-05-31T12:54:47.451305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tCONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES\n"} +{"Time":"2023-05-31T12:54:47.451307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.451309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.451312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* ==\u003e describe nodes \u003c==\n"} +{"Time":"2023-05-31T12:54:47.451314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.451317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* ==\u003e dmesg \u003c==\n"} +{"Time":"2023-05-31T12:54:47.451322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.451324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.451326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* ==\u003e kernel \u003c==\n"} +{"Time":"2023-05-31T12:54:47.451328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* 19:54:47 up 1:23, 0 users, load average: 0.50, 0.81, 1.22\n"} +{"Time":"2023-05-31T12:54:47.451331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tLinux old-k8s-version-787000 5.15.49-linuxkit-pr #1 SMP Thu May 25 07:17:40 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux\n"} +{"Time":"2023-05-31T12:54:47.451333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tPRETTY_NAME=\"Ubuntu 22.04.2 LTS\"\n"} +{"Time":"2023-05-31T12:54:47.451335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.451337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:54:47.45134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* ==\u003e kubelet \u003c==\n"} +{"Time":"2023-05-31T12:54:47.451342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* May 31 19:54:45 old-k8s-version-787000 systemd[1]: kubelet.service: Failed with result 'exit-code'.\n"} +{"Time":"2023-05-31T12:54:47.451344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 155.\n"} +{"Time":"2023-05-31T12:54:47.451347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T12:54:47.451476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T12:54:47.451482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 kubelet[16800]: I0531 19:54:45.800979 16800 server.go:410] Version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:47.451485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 kubelet[16800]: I0531 19:54:45.801244 16800 plugins.go:100] No cloud provider specified.\n"} +{"Time":"2023-05-31T12:54:47.451488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 kubelet[16800]: I0531 19:54:45.801256 16800 server.go:773] Client rotation is on, will bootstrap in background\n"} +{"Time":"2023-05-31T12:54:47.451491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 kubelet[16800]: I0531 19:54:45.803215 16800 certificate_store.go:129] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\n"} +{"Time":"2023-05-31T12:54:47.451493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 kubelet[16800]: W0531 19:54:45.803948 16800 server.go:613] failed to get the kubelet's cgroup: mountpoint for cpu not found. Kubelet system container metrics may be missing.\n"} +{"Time":"2023-05-31T12:54:47.451496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 kubelet[16800]: W0531 19:54:45.804119 16800 server.go:620] failed to get the container runtime's cgroup: failed to get container name for docker process: mountpoint for cpu not found. Runtime system container metrics may be missing.\n"} +{"Time":"2023-05-31T12:54:47.451499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 kubelet[16800]: F0531 19:54:45.804160 16800 server.go:271] failed to run Kubelet: mountpoint for cpu not found\n"} +{"Time":"2023-05-31T12:54:47.451501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 systemd[1]: kubelet.service: Main process exited, code=exited, status=255/EXCEPTION\n"} +{"Time":"2023-05-31T12:54:47.451504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:45 old-k8s-version-787000 systemd[1]: kubelet.service: Failed with result 'exit-code'.\n"} +{"Time":"2023-05-31T12:54:47.451507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 156.\n"} +{"Time":"2023-05-31T12:54:47.451512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T12:54:47.451516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T12:54:47.451518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 kubelet[16866]: I0531 19:54:46.557265 16866 server.go:410] Version: v1.16.0\n"} +{"Time":"2023-05-31T12:54:47.451684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 kubelet[16866]: I0531 19:54:46.557589 16866 plugins.go:100] No cloud provider specified.\n"} +{"Time":"2023-05-31T12:54:47.451688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 kubelet[16866]: I0531 19:54:46.557645 16866 server.go:773] Client rotation is on, will bootstrap in background\n"} +{"Time":"2023-05-31T12:54:47.451691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 kubelet[16866]: I0531 19:54:46.559610 16866 certificate_store.go:129] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\n"} +{"Time":"2023-05-31T12:54:47.451696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 kubelet[16866]: W0531 19:54:46.560326 16866 server.go:613] failed to get the kubelet's cgroup: mountpoint for cpu not found. Kubelet system container metrics may be missing.\n"} +{"Time":"2023-05-31T12:54:47.4517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 kubelet[16866]: W0531 19:54:46.560404 16866 server.go:620] failed to get the container runtime's cgroup: failed to get container name for docker process: mountpoint for cpu not found. Runtime system container metrics may be missing.\n"} +{"Time":"2023-05-31T12:54:47.451705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 kubelet[16866]: F0531 19:54:46.560461 16866 server.go:271] failed to run Kubelet: mountpoint for cpu not found\n"} +{"Time":"2023-05-31T12:54:47.451709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 systemd[1]: kubelet.service: Main process exited, code=exited, status=255/EXCEPTION\n"} +{"Time":"2023-05-31T12:54:47.451713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tMay 31 19:54:46 old-k8s-version-787000 systemd[1]: kubelet.service: Failed with result 'exit-code'.\n"} +{"Time":"2023-05-31T12:54:47.451715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.451717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.45172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:47.451722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:54:47.451724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:54:47.451726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tE0531 12:54:46.889516 18834 logs.go:195] command /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" failed with error: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T12:54:47.451729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstdout:\n"} +{"Time":"2023-05-31T12:54:47.451876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:54:47.451881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tstderr:\n"} +{"Time":"2023-05-31T12:54:47.451883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T12:54:47.451886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t output: \"\\n** stderr ** \\nThe connection to the server localhost:8443 was refused - did you specify the right host or port?\\n\\n** /stderr **\"\n"} +{"Time":"2023-05-31T12:54:47.451889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t! unable to fetch logs for: describe nodes\n"} +{"Time":"2023-05-31T12:54:47.451911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:47.451914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:54:47.451918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:254: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T12:54:47.850202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:254: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 2 (404.083901ms)\n"} +{"Time":"2023-05-31T12:54:47.850225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:47.850241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:54:47.850256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:54:47.850266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:54:47.85027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:54:47.850272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:254: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T12:54:47.850278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:256: \"old-k8s-version-787000\" apiserver is not running, skipping kubectl commands (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:54:47.850285-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T12:54:47.850289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T12:54:47.851562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T12:54:49.44614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:54:49.446110 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:54:50.255124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:54:50.255093 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:54:50.28243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:54:50.282402 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:54:57.882013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:55:08.920701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:55:18.950212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:55:28.973167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:55:38.993505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:55:49.015411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:55:59.041614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:56:02.890738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:56:02.868776 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:56:09.067262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:56:12.493339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:56:12.493285 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:56:19.092185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:56:29.116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:56:31.035547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:56:31.035496 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:56:31.146041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:56:31.145995 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:56:36.219731-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:56:36.219698 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:56:39.145746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:56:42.442194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:56:42.442160 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:56:49.176656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:56:59.203382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:57:03.901286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:57:03.901241 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:57:09.230053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:57:18.503436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:57:18.503344 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:57:19.256145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:57:29.275256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:57:31.753598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:57:31.753524 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:57:39.301945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:57:49.324421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:57:54.087989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:57:54.087949 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:57:59.35235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:57:59.837305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:57:59.837269 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:58:05.487876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:58:05.487813 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:58:09.379737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:58:14.262558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:58:14.262528 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:58:17.809584-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-darwin-amd64 start -p embed-certs-128000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=docker --kubernetes-version=v1.27.2: (9m18.189534451s)\n"} +{"Time":"2023-05-31T12:58:17.809628-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p embed-certs-128000 -n embed-certs-128000\n"} +{"Time":"2023-05-31T12:58:18.191218-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T12:58:18.191236-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T12:58:18.192144-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T12:58:18.201049-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-5w6q2\" [6e16b24a-abe4-4c72-a8f8-31b28174c223] Running\n"} +{"Time":"2023-05-31T12:58:19.414029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:58:23.206809-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.014584127s\n"} +{"Time":"2023-05-31T12:58:23.206832-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T12:58:23.206835-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T12:58:23.207586-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/embed-certs/serial/AddonExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T12:58:23.210422-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-5w6q2\" [6e16b24a-abe4-4c72-a8f8-31b28174c223] Running\n"} +{"Time":"2023-05-31T12:58:28.215702-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/embed-certs/serial/AddonExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.008043495s\n"} +{"Time":"2023-05-31T12:58:28.215772-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context embed-certs-128000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T12:58:28.301996-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T12:58:28.302008-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/embed-certs/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T12:58:28.302033-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-amd64 ssh -p embed-certs-128000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T12:58:28.708398-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T12:58:28.708457-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/Pause"} +{"Time":"2023-05-31T12:58:28.708464-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":"=== RUN TestStartStop/group/embed-certs/serial/Pause\n"} +{"Time":"2023-05-31T12:58:28.708488-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 pause -p embed-certs-128000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:58:29.363826-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p embed-certs-128000 -n embed-certs-128000\n"} +{"Time":"2023-05-31T12:58:29.438244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:58:29.497493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:58:29.497438 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:58:29.736115-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p embed-certs-128000 -n embed-certs-128000: exit status 2 (372.238062ms)\n"} +{"Time":"2023-05-31T12:58:29.73613-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:58:29.736134-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:58:29.736138-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T12:58:29.73614-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:58:29.736143-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:58:29.736145-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T12:58:29.736159-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p embed-certs-128000 -n embed-certs-128000\n"} +{"Time":"2023-05-31T12:58:30.112555-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p embed-certs-128000 -n embed-certs-128000: exit status 2 (376.330994ms)\n"} +{"Time":"2023-05-31T12:58:30.112569-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:58:30.112572-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:58:30.112574-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:58:30.112576-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:58:30.112578-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:58:30.11258-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T12:58:30.112585-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 unpause -p embed-certs-128000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:58:30.806137-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p embed-certs-128000 -n embed-certs-128000\n"} +{"Time":"2023-05-31T12:58:31.248364-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p embed-certs-128000 -n embed-certs-128000\n"} +{"Time":"2023-05-31T12:58:31.629256-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-amd64 delete -p embed-certs-128000\n"} +{"Time":"2023-05-31T12:58:34.431804-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-darwin-amd64 delete -p embed-certs-128000: (2.80246033s)\n"} +{"Time":"2023-05-31T12:58:34.431919-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts embed-certs-128000\n"} +{"Time":"2023-05-31T12:58:34.468095-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts embed-certs-128000: exit status 1 (36.129937ms)\n"} +{"Time":"2023-05-31T12:58:34.468108-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T12:58:34.468111-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:58:34.468113-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T12:58:34.468115-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T12:58:34.468117-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:58:34.468121-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:58:34.468124-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \terror: context embed-certs-128000 not found\n"} +{"Time":"2023-05-31T12:58:34.468146-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T12:58:34.468152-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:58:34.468157-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T12:58:34.468167-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" helpers_test.go:175: Cleaning up \"embed-certs-128000\" profile ...\n"} +{"Time":"2023-05-31T12:58:34.468173-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p embed-certs-128000\n"} +{"Time":"2023-05-31T12:58:34.838615-07:00","Action":"cont","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T12:58:34.838626-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== CONT TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T12:58:34.838631-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" start_stop_delete_test.go:103: skipping TestStartStop/group/disable-driver-mounts - only runs on virtualbox\n"} +{"Time":"2023-05-31T12:58:34.838656-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" helpers_test.go:175: Cleaning up \"disable-driver-mounts-590000\" profile ...\n"} +{"Time":"2023-05-31T12:58:34.838687-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p disable-driver-mounts-590000\n"} +{"Time":"2023-05-31T12:58:35.199733-07:00","Action":"cont","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T12:58:35.199749-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== CONT TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T12:58:35.199774-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial"} +{"Time":"2023-05-31T12:58:35.199778-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial\n"} +{"Time":"2023-05-31T12:58:35.199812-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart"} +{"Time":"2023-05-31T12:58:35.199815-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/FirstStart\n"} +{"Time":"2023-05-31T12:58:35.199896-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-amd64 start -p default-k8s-diff-port-707000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=docker --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:58:39.463504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:58:41.556379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:58:41.556291 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:58:49.485869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:58:59.504338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:59:05.918184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:59:05.918120 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:59:09.5298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:59:15.950375-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-darwin-amd64 start -p default-k8s-diff-port-707000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=docker --kubernetes-version=v1.27.2: (40.74989248s)\n"} +{"Time":"2023-05-31T12:59:15.950397-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp"} +{"Time":"2023-05-31T12:59:15.950402-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/DeployApp\n"} +{"Time":"2023-05-31T12:59:15.950541-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context default-k8s-diff-port-707000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T12:59:16.130775-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/default-k8s-diff-port/serial/DeployApp: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T12:59:16.140003-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [5a190526-7c2d-4d90-843e-3292a2c8687e] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T12:59:19.554941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:59:20.143673-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [5a190526-7c2d-4d90-843e-3292a2c8687e] Running\n"} +{"Time":"2023-05-31T12:59:25.144151-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/default-k8s-diff-port/serial/DeployApp: integration-test=busybox healthy within 9.013264792s\n"} +{"Time":"2023-05-31T12:59:25.144221-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context default-k8s-diff-port-707000 exec busybox -- /bin/sh -c \"ulimit -n\"\n"} +{"Time":"2023-05-31T12:59:25.257845-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:59:25.257866-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:59:25.257916-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-amd64 addons enable metrics-server -p default-k8s-diff-port-707000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:59:26.220135-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context default-k8s-diff-port-707000 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T12:59:26.283665-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop"} +{"Time":"2023-05-31T12:59:26.283677-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/Stop\n"} +{"Time":"2023-05-31T12:59:26.283726-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-amd64 stop -p default-k8s-diff-port-707000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:59:29.5808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:59:37.186561-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-darwin-amd64 stop -p default-k8s-diff-port-707000 --alsologtostderr -v=3: (10.902641267s)\n"} +{"Time":"2023-05-31T12:59:37.186591-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:59:37.186596-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:59:37.186639-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T12:59:37.277679-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000: exit status 7 (90.967121ms)\n"} +{"Time":"2023-05-31T12:59:37.277692-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:59:37.277697-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:59:37.277699-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:59:37.277701-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:59:37.277703-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:59:37.277712-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:59:37.277716-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-amd64 addons enable dashboard -p default-k8s-diff-port-707000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:59:37.307903-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":"E0531 12:59:37.307865 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:59:37.534008-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart"} +{"Time":"2023-05-31T12:59:37.53402-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/SecondStart\n"} +{"Time":"2023-05-31T12:59:37.53407-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-amd64 start -p default-k8s-diff-port-707000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=docker --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:59:39.614127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:59:49.451132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:59:49.451081 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:59:49.635327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T12:59:50.258983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:59:50.258952 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:59:50.286226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:59:50.286198 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:59:52.539565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 12:59:52.539461 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:59:59.652454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:00:09.679866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:00:19.710877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:00:29.740733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:00:39.762561-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:00:49.791998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:00:59.817783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:01:02.872686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:01:02.872649 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:01:09.848112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:01:13.36502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:01:13.364992 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:01:13.365615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:01:13.365600 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:01:19.876446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:01:29.90005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:01:31.037796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:01:31.037768 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:01:31.149744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:01:31.149708 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:01:36.22367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:01:36.223621 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:01:39.93168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:01:42.445847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:01:42.445818 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:01:49.95546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:01:59.976849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:02:09.996694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:02:18.506521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:02:18.506484 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:02:20.018813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:02:30.039765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:02:31.758573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:02:31.758497 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:02:40.060577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:02:50.087583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:02:59.84101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:02:59.840944 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:03:00.117251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:03:10.148476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:03:14.266411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:03:14.266381 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:03:20.180465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:03:29.502546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"E0531 13:03:29.502500 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:03:30.206418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:03:40.235296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:03:48.250942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: client rate limiter Wait returned an error: context deadline exceeded - error from a previous attempt: EOF\n"} +{"Time":"2023-05-31T13:03:48.250975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: ***** TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: pod \"k8s-app=kubernetes-dashboard\" failed to start within 9m0s: context deadline exceeded ****\n"} +{"Time":"2023-05-31T13:03:48.250986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:03:48.606553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 2 (355.496526ms)\n"} +{"Time":"2023-05-31T13:03:48.606566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:48.606569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:03:48.606577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T13:03:48.606579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:48.606581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:03:48.606583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:03:48.606591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: \"old-k8s-version-787000\" apiserver is not running, skipping kubectl commands (state=\"Stopped\")\n"} +{"Time":"2023-05-31T13:03:48.606597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:275: failed waiting for 'addon dashboard' pod post-stop-start: k8s-app=kubernetes-dashboard within 9m0s: context deadline exceeded\n"} +{"Time":"2023-05-31T13:03:48.6066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T13:03:48.606606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:230: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T13:03:48.606655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:231: (dbg) Run: docker inspect old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:03:48.658476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:235: (dbg) docker inspect old-k8s-version-787000:\n"} +{"Time":"2023-05-31T13:03:48.658489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:48.658492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:03:48.658494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[\n"} +{"Time":"2023-05-31T13:03:48.658496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.658498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Id\": \"85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c\",\n"} +{"Time":"2023-05-31T13:03:48.658501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Created\": \"2023-05-31T19:40:35.508746161Z\",\n"} +{"Time":"2023-05-31T13:03:48.658509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T13:03:48.658523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T13:03:48.658527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T13:03:48.65853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.658532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T13:03:48.658534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T13:03:48.658536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T13:03:48.658538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T13:03:48.65854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T13:03:48.658542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T13:03:48.658544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T13:03:48.658546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Pid\": 307167,\n"} +{"Time":"2023-05-31T13:03:48.658548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658553-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"StartedAt\": \"2023-05-31T19:46:19.232331606Z\",\n"} +{"Time":"2023-05-31T13:03:48.658556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"FinishedAt\": \"2023-05-31T19:46:16.598826769Z\"\n"} +{"Time":"2023-05-31T13:03:48.658558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.65856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T13:03:48.658562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/resolv.conf\",\n"} +{"Time":"2023-05-31T13:03:48.658565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hostname\",\n"} +{"Time":"2023-05-31T13:03:48.658567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hosts\",\n"} +{"Time":"2023-05-31T13:03:48.658569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"LogPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c-json.log\",\n"} +{"Time":"2023-05-31T13:03:48.658572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Name\": \"/old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:03:48.658574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T13:03:48.658578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T13:03:48.658581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.65859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T13:03:48.658592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T13:03:48.658594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T13:03:48.658596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T13:03:48.658599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"old-k8s-version-787000:/var\"\n"} +{"Time":"2023-05-31T13:03:48.658601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.658603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T13:03:48.658607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T13:03:48.658609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T13:03:48.658611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.658613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"NetworkMode\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:03:48.658616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T13:03:48.658619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.658622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.658625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.658628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:03:48.658632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.658639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.658643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.658645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.658647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.65865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:03:48.658653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.658656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.658659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.658662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.658665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.658668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:03:48.658671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.658674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.658677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.65868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.658684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.658687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:03:48.658691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.658694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.658697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.6587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.658703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.658706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:03:48.658712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.658715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ]\n"} +{"Time":"2023-05-31T13:03:48.65872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.658726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T13:03:48.658733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T13:03:48.658738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T13:03:48.658744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.65875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T13:03:48.658755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658761-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T13:03:48.658766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T13:03:48.658768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t 0,\n"} +{"Time":"2023-05-31T13:03:48.658771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t 0\n"} +{"Time":"2023-05-31T13:03:48.658776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.658778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T13:03:48.658781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T13:03:48.658783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T13:03:48.658785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T13:03:48.658787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T13:03:48.658789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T13:03:48.658791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T13:03:48.658793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T13:03:48.658795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T13:03:48.658798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T13:03:48.658804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T13:03:48.658814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T13:03:48.658817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T13:03:48.658821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T13:03:48.658824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T13:03:48.658827-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T13:03:48.65883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T13:03:48.658834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.658838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T13:03:48.658841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T13:03:48.658848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.658851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T13:03:48.65886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T13:03:48.658863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T13:03:48.658872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T13:03:48.658875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T13:03:48.658885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T13:03:48.658887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T13:03:48.658889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T13:03:48.658891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T13:03:48.658893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T13:03:48.65892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T13:03:48.65894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.65895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.658954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T13:03:48.658957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T13:03:48.65896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T13:03:48.658971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MemorySwap\": 2306867200,\n"} +{"Time":"2023-05-31T13:03:48.658981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T13:03:48.658984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T13:03:48.658988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T13:03:48.65899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T13:03:48.658992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T13:03:48.658998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T13:03:48.659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T13:03:48.659002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T13:03:48.659004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T13:03:48.659006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.659008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T13:03:48.659011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T13:03:48.659015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T13:03:48.659019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/merged\",\n"} +{"Time":"2023-05-31T13:03:48.659022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/diff\",\n"} +{"Time":"2023-05-31T13:03:48.659025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/work\"\n"} +{"Time":"2023-05-31T13:03:48.659028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.65903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T13:03:48.659032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.659034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T13:03:48.659038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.65904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T13:03:48.659043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Name\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:03:48.659045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Source\": \"/var/lib/docker/volumes/old-k8s-version-787000/_data\",\n"} +{"Time":"2023-05-31T13:03:48.659047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T13:03:48.65905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T13:03:48.659054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T13:03:48.659057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T13:03:48.659061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T13:03:48.659064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.659067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.659071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T13:03:48.659074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T13:03:48.659079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T13:03:48.659083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T13:03:48.659089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T13:03:48.659095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T13:03:48.659102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.659114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T13:03:48.659118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Hostname\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:03:48.659121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T13:03:48.65913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T13:03:48.659133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T13:03:48.659136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T13:03:48.659139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T13:03:48.659143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T13:03:48.659146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T13:03:48.659149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T13:03:48.659152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T13:03:48.659156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.65916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T13:03:48.659163-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T13:03:48.659166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T13:03:48.659169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T13:03:48.659172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T13:03:48.659176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T13:03:48.659179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.659183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T13:03:48.659186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T13:03:48.65919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T13:03:48.659197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T13:03:48.659201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T13:03:48.659204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T13:03:48.659208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T13:03:48.659211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.659214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T13:03:48.659218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T13:03:48.659221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T13:03:48.659225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"mode.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:03:48.659229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"name.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:03:48.659232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T13:03:48.659236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.659239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T13:03:48.659242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.659244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T13:03:48.659248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"SandboxID\": \"e414d12f88a901e4591f85ab0b99c11e72e4006ee377070ddee5d24c3ed9a65c\",\n"} +{"Time":"2023-05-31T13:03:48.659255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T13:03:48.659257-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T13:03:48.659261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T13:03:48.659263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.659265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.659268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.659271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"53620\"\n"} +{"Time":"2023-05-31T13:03:48.659275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.659281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.659284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.659287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.659291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"53621\"\n"} +{"Time":"2023-05-31T13:03:48.659298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.659303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.659306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.659308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.65931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"53622\"\n"} +{"Time":"2023-05-31T13:03:48.659312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.659316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.659318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.65932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.659322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"53623\"\n"} +{"Time":"2023-05-31T13:03:48.659324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.659329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T13:03:48.659331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:03:48.659333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:03:48.659335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"HostPort\": \"53624\"\n"} +{"Time":"2023-05-31T13:03:48.659337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ]\n"} +{"Time":"2023-05-31T13:03:48.659341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.659343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/e414d12f88a9\",\n"} +{"Time":"2023-05-31T13:03:48.659347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T13:03:48.65935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T13:03:48.659353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T13:03:48.659361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T13:03:48.659366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.65937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T13:03:48.659372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"old-k8s-version-787000\": {\n"} +{"Time":"2023-05-31T13:03:48.659374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T13:03:48.659376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IPv4Address\": \"192.168.67.2\"\n"} +{"Time":"2023-05-31T13:03:48.659378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:03:48.659381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T13:03:48.659384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T13:03:48.659386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"85229c23efd1\",\n"} +{"Time":"2023-05-31T13:03:48.659389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T13:03:48.659391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:03:48.659393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"NetworkID\": \"68ad52614037dbc86e2a2d399b5a866ee2022456e1a08bf7303a691be00e56ce\",\n"} +{"Time":"2023-05-31T13:03:48.659395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"EndpointID\": \"3e7b0fb0637e4b93e49c1fc06f35ab57113259a1aef3cf313956cf5781d82a8c\",\n"} +{"Time":"2023-05-31T13:03:48.659398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"Gateway\": \"192.168.67.1\",\n"} +{"Time":"2023-05-31T13:03:48.6594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IPAddress\": \"192.168.67.2\",\n"} +{"Time":"2023-05-31T13:03:48.659402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T13:03:48.659404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T13:03:48.659409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T13:03:48.659411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"MacAddress\": \"02:42:c0:a8:43:02\",\n"} +{"Time":"2023-05-31T13:03:48.659413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T13:03:48.659415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:03:48.659423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t]\n"} +{"Time":"2023-05-31T13:03:48.659425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:48.659428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:03:48.659432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:03:49.030893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 2 (372.255093ms)\n"} +{"Time":"2023-05-31T13:03:49.030916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:49.030923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:03:49.030931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRunning\n"} +{"Time":"2023-05-31T13:03:49.030936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:49.03094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:03:49.030943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:03:49.030947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:244: \u003c\u003c\u003c TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop FAILED: start of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T13:03:49.030954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:245: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop]: minikube logs \u003c======\n"} +{"Time":"2023-05-31T13:03:49.030958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:247: (dbg) Run: out/minikube-darwin-amd64 -p old-k8s-version-787000 logs -n 25\n"} +{"Time":"2023-05-31T13:03:50.406587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:247: (dbg) Done: out/minikube-darwin-amd64 -p old-k8s-version-787000 logs -n 25: (1.375536606s)\n"} +{"Time":"2023-05-31T13:03:50.431534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:252: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop logs: \n"} +{"Time":"2023-05-31T13:03:50.431547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:03:50.43155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.431552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T13:03:50.431554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* |---------|--------------------------------------------------------|------------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T13:03:50.431557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T13:03:50.43156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t|---------|--------------------------------------------------------|------------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T13:03:50.431563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| addons | enable metrics-server -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:44 PDT | |\n"} +{"Time":"2023-05-31T13:03:50.431567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --images=MetricsServer=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.43157-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --registries=MetricsServer=fake.domain | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| stop | -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:46 PDT | 31 May 23 12:46 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr -v=3 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| addons | enable dashboard -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:46 PDT | 31 May 23 12:46 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --images=MetricsScraper=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| start | -p old-k8s-version-787000 | old-k8s-version-787000 | jenkins | v1.30.1 | 31 May 23 12:46 PDT | |\n"} +{"Time":"2023-05-31T13:03:50.431583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --kvm-network=default | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.43159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --kvm-qemu-uri=qemu:///system | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --disable-driver-mounts | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --keep-context=false | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| ssh | -p no-preload-344000 sudo | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | crictl images -o json | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| pause | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| unpause | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| delete | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| delete | -p no-preload-344000 | no-preload-344000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:47 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| start | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:47 PDT | 31 May 23 12:48 PDT |\n"} +{"Time":"2023-05-31T13:03:50.43163-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --embed-certs --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| addons | enable metrics-server -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:48 PDT | 31 May 23 12:48 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --images=MetricsServer=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --registries=MetricsServer=fake.domain | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| stop | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:48 PDT | 31 May 23 12:48 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr -v=3 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| addons | enable dashboard -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:48 PDT | 31 May 23 12:48 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --images=MetricsScraper=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| start | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:48 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --embed-certs --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| ssh | -p embed-certs-128000 sudo | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | crictl images -o json | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| pause | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.43168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| unpause | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| delete | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| delete | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:03:50.43169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| delete | -p | disable-driver-mounts-590000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | disable-driver-mounts-590000 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| start | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:59 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --apiserver-port=8444 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| addons | enable metrics-server -p default-k8s-diff-port-707000 | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:59 PDT | 31 May 23 12:59 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --images=MetricsServer=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --registries=MetricsServer=fake.domain | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.43172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| stop | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:59 PDT | 31 May 23 12:59 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr -v=3 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.43173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| addons | enable dashboard -p default-k8s-diff-port-707000 | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:59 PDT | 31 May 23 12:59 PDT |\n"} +{"Time":"2023-05-31T13:03:50.431733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --images=MetricsScraper=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| start | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:59 PDT | |\n"} +{"Time":"2023-05-31T13:03:50.431738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --apiserver-port=8444 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T13:03:50.431753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t|---------|--------------------------------------------------------|------------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T13:03:50.431755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.431758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.43176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T13:03:50.431762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* Log file created at: 2023/05/31 12:59:37\n"} +{"Time":"2023-05-31T13:03:50.431764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRunning on machine: MacOS-Agent-3\n"} +{"Time":"2023-05-31T13:03:50.431766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tBinary: Built with gc go1.20.4 for darwin/amd64\n"} +{"Time":"2023-05-31T13:03:50.431768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T13:03:50.431771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.573629 19192 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T13:03:50.431773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.573827 19192 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T13:03:50.431775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.573833 19192 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T13:03:50.431777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.573837 19192 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T13:03:50.43178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.573964 19192 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T13:03:50.431782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.575310 19192 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T13:03:50.431784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.594584 19192 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":5345,\"bootTime\":1685557832,\"procs\":395,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T13:03:50.43179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:37.594663 19192 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T13:03:50.431792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.615652 19192 out.go:177] * [default-k8s-diff-port-707000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T13:03:50.431794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.657737 19192 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T13:03:50.431796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.657750 19192 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T13:03:50.431798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.678862 19192 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T13:03:50.431801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.699803 19192 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T13:03:50.431803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.720855 19192 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T13:03:50.431805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.741537 19192 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T13:03:50.431807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.762846 19192 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T13:03:50.43181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.784634 19192 config.go:182] Loaded profile config \"default-k8s-diff-port-707000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.431812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.785346 19192 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T13:03:50.431814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.880470 19192 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T13:03:50.431816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.880634 19192 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T13:03:50.431823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.974912 19192 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:2 ContainersRunning:1 ContainersPaused:0 ContainersStopped:1 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:63 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:59:37.962938461 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T13:03:50.431829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T13:03:50.431833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T13:03:50.431836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T13:03:50.431839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T13:03:50.431841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:37.996695 19192 out.go:177] * Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T13:03:50.431844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.039413 19192 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T13:03:50.431847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.039439 19192 start.go:875] validating driver \"docker\" against \u0026{Name:default-k8s-diff-port-707000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-707000 Namespace:defaul"} +{"Time":"2023-05-31T13:03:50.431851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"t APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertEx"} +{"Time":"2023-05-31T13:03:50.431854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"piration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T13:03:50.431857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.039583 19192 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T13:03:50.431859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.042775 19192 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T13:03:50.431865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.135827 19192 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:2 ContainersRunning:1 ContainersPaused:0 ContainersStopped:1 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:63 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 19:59:38.125046188 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T13:03:50.431871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T13:03:50.431874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T13:03:50.431877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T13:03:50.43188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T13:03:50.431883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.136067 19192 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T13:03:50.431885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.136088 19192 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T13:03:50.431887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.136101 19192 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T13:03:50.43189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.136110 19192 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T13:03:50.431893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t{Name:default-k8s-diff-port-707000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-707000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.l"} +{"Time":"2023-05-31T13:03:50.431897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"ocal ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion"} +{"Time":"2023-05-31T13:03:50.4319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":":9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T13:03:50.431902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.157240 19192 out.go:177] * Starting control plane node default-k8s-diff-port-707000 in cluster default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.431904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.178520 19192 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T13:03:50.431907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.199388 19192 out.go:177] * Pulling base image ...\n"} +{"Time":"2023-05-31T13:03:50.431909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.241388 19192 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T13:03:50.431912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.241415 19192 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T13:03:50.431914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.241441 19192 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T13:03:50.431916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.241450 19192 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T13:03:50.431919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.241565 19192 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T13:03:50.431921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.241575 19192 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T13:03:50.431923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.242126 19192 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/config.json ...\n"} +{"Time":"2023-05-31T13:03:50.431926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.292096 19192 image.go:83] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon, skipping pull\n"} +{"Time":"2023-05-31T13:03:50.431928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.292115 19192 cache.go:145] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in daemon, skipping load\n"} +{"Time":"2023-05-31T13:03:50.43193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.292137 19192 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T13:03:50.431933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.292195 19192 start.go:364] acquiring machines lock for default-k8s-diff-port-707000: {Name:mk5569352023c7a8a9cb7f76aaee6d0ce3a172dd Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:03:50.431935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.292284 19192 start.go:368] acquired machines lock for \"default-k8s-diff-port-707000\" in 70.161µs\n"} +{"Time":"2023-05-31T13:03:50.431938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.292312 19192 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T13:03:50.43194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.292320 19192 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T13:03:50.431942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.292563 19192 cli_runner.go:164] Run: docker container inspect default-k8s-diff-port-707000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:03:50.431948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.342208 19192 fix.go:103] recreateIfNeeded on default-k8s-diff-port-707000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T13:03:50.431951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:38.342238 19192 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T13:03:50.431953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.364823 19192 out.go:177] * Restarting existing docker container for \"default-k8s-diff-port-707000\" ...\n"} +{"Time":"2023-05-31T13:03:50.431956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.407897 19192 cli_runner.go:164] Run: docker start default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.431958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.666349 19192 cli_runner.go:164] Run: docker container inspect default-k8s-diff-port-707000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:03:50.431965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.718576 19192 kic.go:426] container \"default-k8s-diff-port-707000\" state is running.\n"} +{"Time":"2023-05-31T13:03:50.431968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.719209 19192 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.431972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.776939 19192 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/config.json ...\n"} +{"Time":"2023-05-31T13:03:50.431975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.777415 19192 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T13:03:50.431977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.777438 19192 ubuntu.go:169] provisioning hostname \"default-k8s-diff-port-707000\"\n"} +{"Time":"2023-05-31T13:03:50.43198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.777510 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.431983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.840993 19192 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:03:50.431986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.841450 19192 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54202 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:03:50.431988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.841464 19192 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:03:50.431991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tsudo hostname default-k8s-diff-port-707000 \u0026\u0026 echo \"default-k8s-diff-port-707000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T13:03:50.431993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:38.842847 19192 main.go:141] libmachine: Error dialing TCP: ssh: handshake failed: EOF\n"} +{"Time":"2023-05-31T13:03:50.431995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:41.970969 19192 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.431997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:41.971090 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.432004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.022935 19192 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:03:50.432007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.023285 19192 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54202 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:03:50.432013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.023303 19192 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:03:50.432015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\t\tif ! grep -xq '.*\\sdefault-k8s-diff-port-707000' /etc/hosts; then\n"} +{"Time":"2023-05-31T13:03:50.43202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T13:03:50.432022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 default-k8s-diff-port-707000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T13:03:50.432024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T13:03:50.432027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\t\t\t\techo '127.0.1.1 default-k8s-diff-port-707000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T13:03:50.432029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T13:03:50.432032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T13:03:50.432034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.139231 19192 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T13:03:50.432037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.139251 19192 ubuntu.go:175] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1078/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1078/.minikube}\n"} +{"Time":"2023-05-31T13:03:50.432042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.139269 19192 ubuntu.go:177] setting up certificates\n"} +{"Time":"2023-05-31T13:03:50.432044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.139275 19192 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T13:03:50.432047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.139340 19192 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.432049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.188492 19192 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T13:03:50.432051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.188594 19192 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T13:03:50.432053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.188601 19192 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T13:03:50.432056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.188705 19192 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T13:03:50.432058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.188918 19192 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T13:03:50.43206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.188924 19192 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T13:03:50.432065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.188994 19192 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T13:03:50.432067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.189158 19192 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T13:03:50.432069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.189170 19192 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T13:03:50.432072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.189239 19192 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T13:03:50.432074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.189391 19192 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem org=jenkins.default-k8s-diff-port-707000 san=[192.168.76.2 127.0.0.1 localhost 127.0.0.1 minikube default-k8s-diff-port-707000]\n"} +{"Time":"2023-05-31T13:03:50.432077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.267929 19192 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T13:03:50.432079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.267990 19192 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T13:03:50.432082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.268045 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.432084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.318058 19192 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54202 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/default-k8s-diff-port-707000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:03:50.432087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.405568 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T13:03:50.432089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.427321 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1257 bytes)\n"} +{"Time":"2023-05-31T13:03:50.432091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.449524 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1679 bytes)\n"} +{"Time":"2023-05-31T13:03:50.432094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.471043 19192 provision.go:86] duration metric: configureAuth took 331.747419ms\n"} +{"Time":"2023-05-31T13:03:50.432096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.471058 19192 ubuntu.go:193] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T13:03:50.432098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.471206 19192 config.go:182] Loaded profile config \"default-k8s-diff-port-707000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.432101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.471265 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.432105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.521756 19192 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:03:50.432108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.522110 19192 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54202 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:03:50.432112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.522119 19192 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:03:50.432116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T13:03:50.432118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.635903 19192 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: overlay\n"} +{"Time":"2023-05-31T13:03:50.43212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.635920 19192 ubuntu.go:71] root file system type: overlay\n"} +{"Time":"2023-05-31T13:03:50.432124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.636023 19192 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T13:03:50.432126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.636136 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.432129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.685127 19192 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:03:50.432131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.685474 19192 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54202 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:03:50.432133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.685523 19192 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:03:50.432135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %!s(MISSING) \"[Unit]\n"} +{"Time":"2023-05-31T13:03:50.432137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T13:03:50.43214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T13:03:50.432143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T13:03:50.432146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T13:03:50.43215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T13:03:50.432153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T13:03:50.432156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T13:03:50.432158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T13:03:50.432162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[Service]\n"} +{"Time":"2023-05-31T13:03:50.432166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tType=notify\n"} +{"Time":"2023-05-31T13:03:50.432168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T13:03:50.432171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T13:03:50.432182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T13:03:50.432195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T13:03:50.432198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T13:03:50.4322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T13:03:50.432202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T13:03:50.432204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T13:03:50.432206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T13:03:50.43221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T13:03:50.432213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T13:03:50.432217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T13:03:50.432219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T13:03:50.432221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T13:03:50.432225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T13:03:50.432228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T13:03:50.432231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T13:03:50.432384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T13:03:50.43239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T13:03:50.432399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T13:03:50.432401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T13:03:50.432403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T13:03:50.432405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T13:03:50.43241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T13:03:50.432412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T13:03:50.432416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T13:03:50.432418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.43242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[Install]\n"} +{"Time":"2023-05-31T13:03:50.432422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T13:03:50.432424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T13:03:50.432426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.809400 19192 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T13:03:50.432428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T13:03:50.432431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T13:03:50.432433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T13:03:50.432437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T13:03:50.432573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T13:03:50.432577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T13:03:50.432579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T13:03:50.432581-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T13:03:50.432583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[Service]\n"} +{"Time":"2023-05-31T13:03:50.432589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tType=notify\n"} +{"Time":"2023-05-31T13:03:50.432591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T13:03:50.432593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T13:03:50.432604-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T13:03:50.432606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T13:03:50.432609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T13:03:50.432611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T13:03:50.432613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T13:03:50.432615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T13:03:50.432617-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T13:03:50.432726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T13:03:50.43273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T13:03:50.432734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T13:03:50.432738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T13:03:50.43274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T13:03:50.432745-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T13:03:50.432748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T13:03:50.43275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T13:03:50.432752-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T13:03:50.432754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432756-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T13:03:50.432758-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T13:03:50.43276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T13:03:50.432763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T13:03:50.432765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T13:03:50.432895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T13:03:50.432899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T13:03:50.432912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T13:03:50.432917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[Install]\n"} +{"Time":"2023-05-31T13:03:50.432921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T13:03:50.432923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.432925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.809527 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.432928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.859651 19192 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:03:50.43293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.860069 19192 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54202 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:03:50.432933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.860083 19192 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:03:50.432936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T13:03:50.432944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.978167 19192 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T13:03:50.432946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.978191 19192 machine.go:91] provisioned docker machine in 4.200710832s\n"} +{"Time":"2023-05-31T13:03:50.432948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.978198 19192 start.go:300] post-start starting for \"default-k8s-diff-port-707000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T13:03:50.433097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.978203 19192 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T13:03:50.433105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.978278 19192 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T13:03:50.433117-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:42.978332 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.433122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.028814 19192 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54202 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/default-k8s-diff-port-707000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:03:50.433128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.116561 19192 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T13:03:50.433134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.120847 19192 main.go:141] libmachine: Couldn't set key VERSION_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T13:03:50.433136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.120868 19192 main.go:141] libmachine: Couldn't set key PRIVACY_POLICY_URL, no corresponding struct field found\n"} +{"Time":"2023-05-31T13:03:50.433138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.120875 19192 main.go:141] libmachine: Couldn't set key UBUNTU_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T13:03:50.433141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.120880 19192 info.go:137] Remote host: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T13:03:50.433143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.120887 19192 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T13:03:50.433146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.120973 19192 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T13:03:50.433148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.121150 19192 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e 15662.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T13:03:50.43315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.121371 19192 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T13:03:50.433153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.130521 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T13:03:50.433156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.152886 19192 start.go:303] post-start completed in 174.675989ms\n"} +{"Time":"2023-05-31T13:03:50.433159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.152963 19192 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T13:03:50.433162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.153021 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.433165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.202995 19192 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54202 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/default-k8s-diff-port-707000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:03:50.433167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.286767 19192 ssh_runner.go:195] Run: sh -c \"df -BG /var | awk 'NR==2{print $4}'\"\n"} +{"Time":"2023-05-31T13:03:50.43317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.292015 19192 fix.go:57] fixHost completed within 4.999625078s\n"} +{"Time":"2023-05-31T13:03:50.433172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.292032 19192 start.go:83] releasing machines lock for \"default-k8s-diff-port-707000\", held for 4.999675893s\n"} +{"Time":"2023-05-31T13:03:50.433175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.292107 19192 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.433177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.341520 19192 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T13:03:50.433179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.341531 19192 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T13:03:50.433182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.341596 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.433225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.341623 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.433232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.395383 19192 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54202 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/default-k8s-diff-port-707000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:03:50.433234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.395396 19192 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54202 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/default-k8s-diff-port-707000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:03:50.433237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.580298 19192 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T13:03:50.433239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.585704 19192 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T13:03:50.433242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.591534 19192 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *loopback.conf* -not -name *.mk_disabled -exec sh -c \"grep -q loopback {} \u0026\u0026 ( grep -q name {} || sudo sed -i '/\"type\": \"loopback\"/i \\ \\ \\ \\ \"name\": \"loopback\",' {} ) \u0026\u0026 sudo sed -i 's|\"cniVersion\": \".*\"|\"cniVersion\": \"1.0.0\"|g' {}\" ;\n"} +{"Time":"2023-05-31T13:03:50.433247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.609764 19192 cni.go:229] loopback cni configuration patched: \"/etc/cni/net.d/*loopback.conf*\" found\n"} +{"Time":"2023-05-31T13:03:50.433249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.609831 19192 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f ( ( -name *bridge* -or -name *podman* ) -and -not -name *.mk_disabled ) -printf \"%!p(MISSING), \" -exec sh -c \"sudo mv {} {}.mk_disabled\" ;\n"} +{"Time":"2023-05-31T13:03:50.433291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.618935 19192 cni.go:258] no active bridge cni configs found in \"/etc/cni/net.d\" - nothing to disable\n"} +{"Time":"2023-05-31T13:03:50.433295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.618948 19192 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T13:03:50.433298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.618961 19192 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T13:03:50.4333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.619063 19192 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T13:03:50.433302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T13:03:50.433305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.635398 19192 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.9\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:03:50.433308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.646099 19192 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:03:50.43331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.656763 19192 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T13:03:50.433313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.656828 19192 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:03:50.433315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.667158 19192 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:03:50.433318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.677185 19192 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:03:50.433321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.687154 19192 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:03:50.433372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.697343 19192 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T13:03:50.433377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.706993 19192 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:03:50.43338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.717578 19192 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T13:03:50.433384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.726250 19192 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T13:03:50.433386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.734888 19192 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T13:03:50.433388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.806403 19192 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T13:03:50.433391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.881484 19192 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T13:03:50.433393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.881503 19192 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T13:03:50.433395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.881568 19192 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T13:03:50.433397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.894732 19192 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T13:03:50.4334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.894859 19192 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T13:03:50.433402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.907502 19192 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T13:03:50.433405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T13:03:50.433408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.931759 19192 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T13:03:50.433412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.936616 19192 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T13:03:50.433415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.947192 19192 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T13:03:50.433482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:43.968937 19192 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T13:03:50.433488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.077712 19192 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T13:03:50.433491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.179485 19192 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T13:03:50.433495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.179512 19192 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T13:03:50.433499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.196741 19192 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T13:03:50.433502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.299220 19192 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T13:03:50.433504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.585041 19192 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T13:03:50.433507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.658921 19192 ssh_runner.go:195] Run: sudo systemctl unmask cri-docker.socket\n"} +{"Time":"2023-05-31T13:03:50.43351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.736691 19192 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T13:03:50.433512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.810140 19192 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T13:03:50.433514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.884903 19192 ssh_runner.go:195] Run: sudo systemctl restart cri-docker.socket\n"} +{"Time":"2023-05-31T13:03:50.433516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.909781 19192 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T13:03:50.433518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:44.971381 19192 ssh_runner.go:195] Run: sudo systemctl restart cri-docker\n"} +{"Time":"2023-05-31T13:03:50.433521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.068883 19192 start.go:528] Will wait 60s for socket path /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T13:03:50.433523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.068987 19192 ssh_runner.go:195] Run: stat /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T13:03:50.433525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.074396 19192 start.go:549] Will wait 60s for crictl version\n"} +{"Time":"2023-05-31T13:03:50.43362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.074455 19192 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T13:03:50.433626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.079092 19192 ssh_runner.go:195] Run: sudo /usr/bin/crictl version\n"} +{"Time":"2023-05-31T13:03:50.433629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.128276 19192 start.go:565] Version: 0.1.0\n"} +{"Time":"2023-05-31T13:03:50.433632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRuntimeName: docker\n"} +{"Time":"2023-05-31T13:03:50.433643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRuntimeVersion: 24.0.1\n"} +{"Time":"2023-05-31T13:03:50.433647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tRuntimeApiVersion: v1\n"} +{"Time":"2023-05-31T13:03:50.43365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.128356 19192 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T13:03:50.433653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.154153 19192 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T13:03:50.433656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.227708 19192 out.go:204] * Preparing Kubernetes v1.27.2 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T13:03:50.433659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.227888 19192 cli_runner.go:164] Run: docker exec -t default-k8s-diff-port-707000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T13:03:50.433661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.342436 19192 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T13:03:50.433663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.342562 19192 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T13:03:50.433666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.348208 19192 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.65.254\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T13:03:50.433669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.359572 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8444/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.433671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.409254 19192 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T13:03:50.433773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.409352 19192 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T13:03:50.433806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.430881 19192 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T13:03:50.433811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.433814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.433816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.433818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.43382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T13:03:50.433822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T13:03:50.433824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T13:03:50.433826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T13:03:50.433828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tgcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T13:03:50.43383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.433832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T13:03:50.433834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.430908 19192 docker.go:563] Images already preloaded, skipping extraction\n"} +{"Time":"2023-05-31T13:03:50.433837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.431014 19192 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T13:03:50.433839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.453367 19192 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T13:03:50.433841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.433844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.433952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.43396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.433964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T13:03:50.433967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T13:03:50.433971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T13:03:50.433974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T13:03:50.433977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tgcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T13:03:50.433979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.433981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T13:03:50.433983-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.453388 19192 cache_images.go:84] Images are preloaded, skipping loading\n"} +{"Time":"2023-05-31T13:03:50.433986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.453461 19192 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T13:03:50.433988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.503586 19192 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T13:03:50.43399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.503603 19192 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T13:03:50.433992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.503622 19192 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T13:03:50.433996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.503642 19192 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.76.2 APIServerPort:8444 KubernetesVersion:v1.27.2 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:default-k8s-diff-port-707000 NodeName:default-k8s-diff-port-707000 DNSDomain:cluster.local CRISocket:/var/run/cri-dockerd.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.76.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.76.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/c"} +{"Time":"2023-05-31T13:03:50.434101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"a.crt StaticPodPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:true}\n"} +{"Time":"2023-05-31T13:03:50.434108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.503783 19192 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T13:03:50.434111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T13:03:50.434115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T13:03:50.434118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T13:03:50.434121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t advertiseAddress: 192.168.76.2\n"} +{"Time":"2023-05-31T13:03:50.434124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t bindPort: 8444\n"} +{"Time":"2023-05-31T13:03:50.434128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T13:03:50.434131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t - groups:\n"} +{"Time":"2023-05-31T13:03:50.434134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T13:03:50.434149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T13:03:50.434155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t usages:\n"} +{"Time":"2023-05-31T13:03:50.434159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t - signing\n"} +{"Time":"2023-05-31T13:03:50.434162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t - authentication\n"} +{"Time":"2023-05-31T13:03:50.434169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T13:03:50.434173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t criSocket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T13:03:50.434175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t name: \"default-k8s-diff-port-707000\"\n"} +{"Time":"2023-05-31T13:03:50.434177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T13:03:50.434289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t node-ip: 192.168.76.2\n"} +{"Time":"2023-05-31T13:03:50.434304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t taints: []\n"} +{"Time":"2023-05-31T13:03:50.434311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t---\n"} +{"Time":"2023-05-31T13:03:50.434315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T13:03:50.434318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T13:03:50.434322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T13:03:50.434325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.76.2\"]\n"} +{"Time":"2023-05-31T13:03:50.434331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T13:03:50.434333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T13:03:50.434335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T13:03:50.434337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T13:03:50.43434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T13:03:50.434342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T13:03:50.434344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T13:03:50.434346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T13:03:50.434348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T13:03:50.43435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T13:03:50.434352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T13:03:50.434354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8444\n"} +{"Time":"2023-05-31T13:03:50.434356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tetcd:\n"} +{"Time":"2023-05-31T13:03:50.434358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t local:\n"} +{"Time":"2023-05-31T13:03:50.434442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T13:03:50.434448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T13:03:50.434451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T13:03:50.434457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tkubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.434459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T13:03:50.434461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T13:03:50.434463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T13:03:50.434467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T13:03:50.434469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t---\n"} +{"Time":"2023-05-31T13:03:50.434471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T13:03:50.434473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T13:03:50.434475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T13:03:50.434477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t x509:\n"} +{"Time":"2023-05-31T13:03:50.434479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T13:03:50.434481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T13:03:50.434483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T13:03:50.434485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T13:03:50.434492-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T13:03:50.434496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T13:03:50.434499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T13:03:50.434502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T13:03:50.434648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t nodefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T13:03:50.434663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t nodefs.inodesFree: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T13:03:50.434668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t imagefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T13:03:50.43467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T13:03:50.434675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T13:03:50.434678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t---\n"} +{"Time":"2023-05-31T13:03:50.434681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T13:03:50.434684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T13:03:50.434686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T13:03:50.434688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T13:03:50.43469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T13:03:50.434692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T13:03:50.434694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T13:03:50.434697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T13:03:50.434699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T13:03:50.434701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T13:03:50.434703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.434706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.503862 19192 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T13:03:50.434708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T13:03:50.43471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.434712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[Service]\n"} +{"Time":"2023-05-31T13:03:50.434714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T13:03:50.43483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=default-k8s-diff-port-707000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\n"} +{"Time":"2023-05-31T13:03:50.434835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.434837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[Install]\n"} +{"Time":"2023-05-31T13:03:50.43484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t config:\n"} +{"Time":"2023-05-31T13:03:50.434842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-707000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:}\n"} +{"Time":"2023-05-31T13:03:50.434845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.503932 19192 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.434847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.513313 19192 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T13:03:50.434849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.513372 19192 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T13:03:50.434852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.522327 19192 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (389 bytes)\n"} +{"Time":"2023-05-31T13:03:50.434858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.539631 19192 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T13:03:50.434861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.556519 19192 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2111 bytes)\n"} +{"Time":"2023-05-31T13:03:50.434863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.573368 19192 ssh_runner.go:195] Run: grep 192.168.76.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T13:03:50.434865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.578075 19192 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.76.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T13:03:50.435049-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.589796 19192 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000 for IP: 192.168.76.2\n"} +{"Time":"2023-05-31T13:03:50.435055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.589822 19192 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:03:50.435058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.589987 19192 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T13:03:50.43506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590043 19192 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T13:03:50.435062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590140 19192 certs.go:315] skipping minikube-user signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.key\n"} +{"Time":"2023-05-31T13:03:50.435069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590206 19192 certs.go:315] skipping minikube signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/apiserver.key.31bdca25\n"} +{"Time":"2023-05-31T13:03:50.435071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590261 19192 certs.go:315] skipping aggregator signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/proxy-client.key\n"} +{"Time":"2023-05-31T13:03:50.435074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590468 19192 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:45.590502 19192 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T13:03:50.435079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590515 19192 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435081-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590554 19192 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590586 19192 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T13:03:50.43528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590617 19192 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.590689 19192 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.591241 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.613675 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1679 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.637520 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.660532 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.682390 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.704440 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.727460 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435329-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.750909 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.776960 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.801588 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.824797 19192 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.847643 19192 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T13:03:50.435507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.864463 19192 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T13:03:50.435519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.870672 19192 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T13:03:50.435526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.880784 19192 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T13:03:50.435528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.885308 19192 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T13:03:50.435531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.885360 19192 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T13:03:50.435533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.892657 19192 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T13:03:50.435539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.902623 19192 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T13:03:50.435541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.912625 19192 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T13:03:50.435544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.917096 19192 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T13:03:50.435546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.917153 19192 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T13:03:50.435718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.924166 19192 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T13:03:50.435725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.933573 19192 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T13:03:50.435727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.943351 19192 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T13:03:50.43573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.947970 19192 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T13:03:50.435732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.948018 19192 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T13:03:50.435735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.955138 19192 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T13:03:50.435737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.964721 19192 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T13:03:50.435739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.969113 19192 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-etcd-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:03:50.435742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.976348 19192 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-kubelet-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:03:50.435744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.983537 19192 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/server.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:03:50.435746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.990816 19192 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/healthcheck-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:03:50.435748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:45.997947 19192 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/peer.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:03:50.43575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.005035 19192 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/front-proxy-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:03:50.435868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.012143 19192 kubeadm.go:404] StartCluster: {Name:default-k8s-diff-port-707000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-707000 Namespace:default APIServerName:mini"} +{"Time":"2023-05-31T13:03:50.435874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"kubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s "} +{"Time":"2023-05-31T13:03:50.435878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T13:03:50.43588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.012247 19192 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T13:03:50.435883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.033701 19192 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T13:03:50.435885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.042895 19192 kubeadm.go:419] found existing configuration files, will attempt cluster restart\n"} +{"Time":"2023-05-31T13:03:50.435894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.042916 19192 kubeadm.go:636] restartCluster start\n"} +{"Time":"2023-05-31T13:03:50.436015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.042971 19192 ssh_runner.go:195] Run: sudo test -d /data/minikube\n"} +{"Time":"2023-05-31T13:03:50.436022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.051540 19192 kubeadm.go:127] /data/minikube skipping compat symlinks: sudo test -d /data/minikube: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.051614 19192 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8444/tcp\") 0).HostPort}}'\" default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:03:50.436039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.102321 19192 kubeconfig.go:135] verify returned: extract IP: \"default-k8s-diff-port-707000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T13:03:50.436043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.102498 19192 kubeconfig.go:146] \"default-k8s-diff-port-707000\" context is missing from /Users/jenkins/minikube-integration/16569-1078/kubeconfig - will repair!\n"} +{"Time":"2023-05-31T13:03:50.436047-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.102816 19192 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/kubeconfig: {Name:mk36b1fef13f0c406b5340544ea043a831d9fe53 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:03:50.436051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.104450 19192 ssh_runner.go:195] Run: sudo diff -u /var/tmp/minikube/kubeadm.yaml /var/tmp/minikube/kubeadm.yaml.new\n"} +{"Time":"2023-05-31T13:03:50.436055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.113905 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.113980 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:46.125155 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436174-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.625538 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:46.625709 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:46.638724 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:47.126420 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:47.126536 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:47.138742 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.4362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:47.626509 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:47.626635 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:47.638407 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:48.125997 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.43633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:48.126111 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:48.138368 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:48.625288 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:48.625386 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.43636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:48.637501 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.43637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:49.125799 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:49.125996 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.43638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:49.138636 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:49.626348 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:49.626488 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:49.639265 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.4365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:50.125313 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:50.125392 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.43651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:50.136966 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436517-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:50.626068 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:50.626251 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:50.639455 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:51.126005 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:51.126101 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:51.137576 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:51.625822 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:51.625991 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:51.638558 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:52.125341 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:52.125494 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:52.137370 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.436849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:52.625318 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:52.625412 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:52.637212 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.43686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.43687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:53.125742 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:53.125867 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:53.138309 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.43688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.436883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.436886-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.43689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:53.626134 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.436893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:53.626276 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.436896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:53.639066 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.436898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.437089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.437104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.437107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:54.125378 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.437109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:54.125466 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.437112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:54.136946 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.437114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.437116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.437118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.43712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:54.626014 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.437122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:54.626150 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.437124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:54.638210 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.43713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.437132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.437134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.437136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:55.126554 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.437141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:55.126682 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.437143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:55.139303 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.437145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.437147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.437308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.437323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:55.625473 19192 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:03:50.437328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:55.625599 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.437331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 12:59:55.638064 19192 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.437333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.437335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.437338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.43734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.116110 19192 kubeadm.go:611] needs reconfigure: apiserver error: context deadline exceeded\n"} +{"Time":"2023-05-31T13:03:50.437342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.116143 19192 kubeadm.go:1123] stopping kube-system containers ...\n"} +{"Time":"2023-05-31T13:03:50.437345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.116254 19192 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T13:03:50.437347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.140851 19192 docker.go:459] Stopping containers: [93a4afed0044 49195ca58669 c574d492d1bd 7d40e90250d0 1913704f5ee8 2963585d5d44 bd0e4bca7026 38c372fe2dc3 f911de950e05 562b77522162 2bdbd9176ad3 945e4350b683 d51a22f85cc5 664f75ccf7af 750efd97564d 5454d1fb700b]\n"} +{"Time":"2023-05-31T13:03:50.43735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.140947 19192 ssh_runner.go:195] Run: docker stop 93a4afed0044 49195ca58669 c574d492d1bd 7d40e90250d0 1913704f5ee8 2963585d5d44 bd0e4bca7026 38c372fe2dc3 f911de950e05 562b77522162 2bdbd9176ad3 945e4350b683 d51a22f85cc5 664f75ccf7af 750efd97564d 5454d1fb700b\n"} +{"Time":"2023-05-31T13:03:50.437353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.162580 19192 ssh_runner.go:195] Run: sudo systemctl stop kubelet\n"} +{"Time":"2023-05-31T13:03:50.437355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.174883 19192 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T13:03:50.437357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.184048 19192 kubeadm.go:155] found existing configuration files:\n"} +{"Time":"2023-05-31T13:03:50.437567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t-rw------- 1 root root 5643 May 31 19:58 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T13:03:50.437575-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t-rw------- 1 root root 5656 May 31 19:58 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T13:03:50.437579-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t-rw------- 1 root root 2051 May 31 19:58 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T13:03:50.437582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t-rw------- 1 root root 5600 May 31 19:58 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T13:03:50.437586-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.437589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.184116 19192 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8444 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T13:03:50.437593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.192995 19192 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8444 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T13:03:50.437597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.202010 19192 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8444 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T13:03:50.437601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.211147 19192 kubeadm.go:166] \"https://control-plane.minikube.internal:8444\" may not be in /etc/kubernetes/controller-manager.conf - will remove: sudo grep https://control-plane.minikube.internal:8444 /etc/kubernetes/controller-manager.conf: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.437609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.437613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.437616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.437619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.211234 19192 ssh_runner.go:195] Run: sudo rm -f /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T13:03:50.437623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.220934 19192 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8444 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T13:03:50.437627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.230719 19192 kubeadm.go:166] \"https://control-plane.minikube.internal:8444\" may not be in /etc/kubernetes/scheduler.conf - will remove: sudo grep https://control-plane.minikube.internal:8444 /etc/kubernetes/scheduler.conf: Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.437631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.4378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.437805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.437807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.230780 19192 ssh_runner.go:195] Run: sudo rm -f /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T13:03:50.43781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.240181 19192 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T13:03:50.437812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.250004 19192 kubeadm.go:713] reconfiguring cluster from /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T13:03:50.437814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.250020 19192 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase certs all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:03:50.437817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.301485 19192 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase kubeconfig all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:03:50.437819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:56.962631 19192 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase kubelet-start --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:03:50.437822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:57.088956 19192 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase control-plane all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:03:50.437825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:57.151906 19192 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase etcd local --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:03:50.437831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:57.248101 19192 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T13:03:50.437833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:57.248205 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.437835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:57.762976 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.437838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:58.263112 19192 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:03:50.438021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:58.339310 19192 api_server.go:72] duration metric: took 1.091193718s to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T13:03:50.438026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:58.339328 19192 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T13:03:50.438029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:58.339346 19192 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54206/healthz ...\n"} +{"Time":"2023-05-31T13:03:50.438031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:58.340318 19192 api_server.go:269] stopped: https://127.0.0.1:54206/healthz: Get \"https://127.0.0.1:54206/healthz\": EOF\n"} +{"Time":"2023-05-31T13:03:50.438034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 12:59:58.840468 19192 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54206/healthz ...\n"} +{"Time":"2023-05-31T13:03:50.438036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:00.878790 19192 api_server.go:279] https://127.0.0.1:54206/healthz returned 403:\n"} +{"Time":"2023-05-31T13:03:50.438052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T13:03:50.438058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 13:00:00.878812 19192 api_server.go:103] status: https://127.0.0.1:54206/healthz returned error 403:\n"} +{"Time":"2023-05-31T13:03:50.438062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T13:03:50.438067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:00.878830 19192 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54206/healthz ...\n"} +{"Time":"2023-05-31T13:03:50.438071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:00.937759 19192 api_server.go:279] https://127.0.0.1:54206/healthz returned 500:\n"} +{"Time":"2023-05-31T13:03:50.438075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:03:50.438094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:03:50.438099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:03:50.438102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:03:50.438197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:03:50.438208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:03:50.438212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:03:50.438216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/start-apiextensions-controllers failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438223-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/crd-informer-synced failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/bootstrap-controller failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/priority-and-fairness-config-producer failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.438261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.438265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:03:50.438363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/apiservice-registration-controller failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.43837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:03:50.438374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:03:50.438376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:03:50.43838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:03:50.438385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 13:00:00.937787 19192 api_server.go:103] status: https://127.0.0.1:54206/healthz returned error 500:\n"} +{"Time":"2023-05-31T13:03:50.438389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:03:50.438396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:03:50.438398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:03:50.4384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:03:50.438403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:03:50.438407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:03:50.438409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:03:50.438413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/start-apiextensions-controllers failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/crd-informer-synced failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.4385-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/bootstrap-controller failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.43851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438513-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/priority-and-fairness-config-producer failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:03:50.43852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438522-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.438524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.43853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:03:50.438534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/apiservice-registration-controller failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438539-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:03:50.438543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:03:50.438624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:03:50.43863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:03:50.438634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:01.340446 19192 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54206/healthz ...\n"} +{"Time":"2023-05-31T13:03:50.438638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:01.346500 19192 api_server.go:279] https://127.0.0.1:54206/healthz returned 500:\n"} +{"Time":"2023-05-31T13:03:50.43864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:03:50.438642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:03:50.438644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:03:50.438647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:03:50.438657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:03:50.438667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:03:50.438681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:03:50.438686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:03:50.43869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:03:50.438707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:03:50.43871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.43878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:03:50.438783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.438791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.438793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:03:50.438799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438818-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:03:50.438833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:03:50.438837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:03:50.438894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 13:00:01.346517 19192 api_server.go:103] status: https://127.0.0.1:54206/healthz returned error 500:\n"} +{"Time":"2023-05-31T13:03:50.438903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:03:50.438905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:03:50.438908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:03:50.43891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:03:50.438912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:03:50.438935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:03:50.438937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:03:50.43894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:03:50.438945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:03:50.438947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:03:50.438949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:03:50.438954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.438958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:03:50.439056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.439068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.43907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:03:50.439085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:03:50.439087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:03:50.43909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:03:50.439094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:03:50.439096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:03:50.4391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439102-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:03:50.439105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:01.840610 19192 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54206/healthz ...\n"} +{"Time":"2023-05-31T13:03:50.439107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:01.848372 19192 api_server.go:279] https://127.0.0.1:54206/healthz returned 500:\n"} +{"Time":"2023-05-31T13:03:50.439218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:03:50.439224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:03:50.439227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:03:50.43923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:03:50.439234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:03:50.439237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:03:50.439241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:03:50.439253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:03:50.439258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:03:50.43926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:03:50.439263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:03:50.439265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:03:50.43927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.439272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.439275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:03:50.439277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.439429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.439431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:03:50.439436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:03:50.439438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:03:50.43944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:03:50.439444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:03:50.439447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:03:50.439456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 13:00:01.848396 19192 api_server.go:103] status: https://127.0.0.1:54206/healthz returned error 500:\n"} +{"Time":"2023-05-31T13:03:50.439458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:03:50.43946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:03:50.439462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:03:50.439464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:03:50.439466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:03:50.439472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:03:50.439652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:03:50.439657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:03:50.439659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:03:50.439661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:03:50.439663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:03:50.439666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.439673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.439676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:03:50.439678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:03:50.43968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.439686-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.439688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:03:50.43969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:03:50.439692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:03:50.439694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:03:50.439881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:03:50.439885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:03:50.439891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:03:50.439893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.340637 19192 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54206/healthz ...\n"} +{"Time":"2023-05-31T13:03:50.439896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.348309 19192 api_server.go:279] https://127.0.0.1:54206/healthz returned 500:\n"} +{"Time":"2023-05-31T13:03:50.439898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:03:50.4399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:03:50.439902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:03:50.439904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:03:50.439907-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:03:50.439909-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:03:50.439911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:03:50.439913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:03:50.439916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:03:50.439918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:03:50.439934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:03:50.440076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.440091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T13:03:50.440094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:03:50.440097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.440108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.440111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:03:50.440115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:03:50.440118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:03:50.440127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:03:50.440144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:03:50.440274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tW0531 13:00:02.348338 19192 api_server.go:103] status: https://127.0.0.1:54206/healthz returned error 500:\n"} +{"Time":"2023-05-31T13:03:50.440278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:03:50.440281-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:03:50.440284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:03:50.440286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:03:50.440288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:03:50.44029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:03:50.440292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:03:50.440298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:03:50.4403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:03:50.440302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:03:50.440304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:03:50.440307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:03:50.440313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T13:03:50.440317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:03:50.440476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:03:50.44048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.440488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:03:50.440491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:03:50.440495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:03:50.440497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:03:50.440503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:03:50.440505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:03:50.44051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:03:50.440512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:03:50.440514-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.840520 19192 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54206/healthz ...\n"} +{"Time":"2023-05-31T13:03:50.440516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.846413 19192 api_server.go:279] https://127.0.0.1:54206/healthz returned 200:\n"} +{"Time":"2023-05-31T13:03:50.440518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tok\n"} +{"Time":"2023-05-31T13:03:50.440658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.853852 19192 api_server.go:141] control plane version: v1.27.2\n"} +{"Time":"2023-05-31T13:03:50.440662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.853867 19192 api_server.go:131] duration metric: took 4.514475601s to wait for apiserver health ...\n"} +{"Time":"2023-05-31T13:03:50.440665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.853873 19192 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T13:03:50.440667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.853884 19192 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T13:03:50.44067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.874872 19192 out.go:177] * Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T13:03:50.440674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.897125 19192 ssh_runner.go:195] Run: sudo mkdir -p /etc/cni/net.d\n"} +{"Time":"2023-05-31T13:03:50.440677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.907715 19192 ssh_runner.go:362] scp memory --\u003e /etc/cni/net.d/1-k8s.conflist (457 bytes)\n"} +{"Time":"2023-05-31T13:03:50.44068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.926647 19192 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T13:03:50.440683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935546 19192 system_pods.go:59] 8 kube-system pods found\n"} +{"Time":"2023-05-31T13:03:50.440685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935567 19192 system_pods.go:61] \"coredns-5d78c9869d-kbkds\" [185facfc-a4ef-452e-a512-86cf7b4a10d5] Running / Ready:ContainersNotReady (containers with unready status: [coredns]) / ContainersReady:ContainersNotReady (containers with unready status: [coredns])\n"} +{"Time":"2023-05-31T13:03:50.440688-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935581 19192 system_pods.go:61] \"etcd-default-k8s-diff-port-707000\" [d49a23be-5945-45f5-b0e9-6887eae0071c] Running / Ready:ContainersNotReady (containers with unready status: [etcd]) / ContainersReady:ContainersNotReady (containers with unready status: [etcd])\n"} +{"Time":"2023-05-31T13:03:50.44069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935588 19192 system_pods.go:61] \"kube-apiserver-default-k8s-diff-port-707000\" [f495452a-6803-4312-a6d9-1d8657149148] Running / Ready:ContainersNotReady (containers with unready status: [kube-apiserver]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-apiserver])\n"} +{"Time":"2023-05-31T13:03:50.440693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935593 19192 system_pods.go:61] \"kube-controller-manager-default-k8s-diff-port-707000\" [46a524ab-855b-4a5c-bedf-42a70394c251] Running / Ready:ContainersNotReady (containers with unready status: [kube-controller-manager]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-controller-manager])\n"} +{"Time":"2023-05-31T13:03:50.440836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935599 19192 system_pods.go:61] \"kube-proxy-m8c7f\" [2bf7f43e-bfbc-4a3b-9c77-5a0708aa88cb] Running\n"} +{"Time":"2023-05-31T13:03:50.440841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935621 19192 system_pods.go:61] \"kube-scheduler-default-k8s-diff-port-707000\" [edc18f2d-e215-4620-bf2c-74315adc4dc9] Running / Ready:ContainersNotReady (containers with unready status: [kube-scheduler]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-scheduler])\n"} +{"Time":"2023-05-31T13:03:50.440843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935632 19192 system_pods.go:61] \"metrics-server-74d5c6b9c-6blwr\" [fc41b5f5-cdc1-4572-8d37-9296f2d9696b] Pending / Ready:ContainersNotReady (containers with unready status: [metrics-server]) / ContainersReady:ContainersNotReady (containers with unready status: [metrics-server])\n"} +{"Time":"2023-05-31T13:03:50.440846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935636 19192 system_pods.go:61] \"storage-provisioner\" [62efc6f2-777e-4b2b-94ec-42cfacb41611] Running\n"} +{"Time":"2023-05-31T13:03:50.440848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935641 19192 system_pods.go:74] duration metric: took 8.980365ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T13:03:50.440851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.935650 19192 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T13:03:50.440853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.939579 19192 node_conditions.go:122] node storage ephemeral capacity is 107016164Ki\n"} +{"Time":"2023-05-31T13:03:50.440855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.939595 19192 node_conditions.go:123] node cpu capacity is 6\n"} +{"Time":"2023-05-31T13:03:50.440857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.939603 19192 node_conditions.go:105] duration metric: took 3.949051ms to run NodePressure ...\n"} +{"Time":"2023-05-31T13:03:50.44086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:02.939619 19192 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase addon all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:03:50.440862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:03.108635 19192 kubeadm.go:772] waiting for restarted kubelet to initialise ...\n"} +{"Time":"2023-05-31T13:03:50.440865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:03.113424 19192 kubeadm.go:787] kubelet initialised\n"} +{"Time":"2023-05-31T13:03:50.440996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:03.113436 19192 kubeadm.go:788] duration metric: took 4.784512ms waiting for restarted kubelet to initialise ...\n"} +{"Time":"2023-05-31T13:03:50.441001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:03.113443 19192 pod_ready.go:35] extra waiting up to 4m0s for all system-critical pods including labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:03.119108 19192 pod_ready.go:78] waiting up to 4m0s for pod \"coredns-5d78c9869d-kbkds\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:05.135339 19192 pod_ready.go:102] pod \"coredns-5d78c9869d-kbkds\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:07.136212 19192 pod_ready.go:102] pod \"coredns-5d78c9869d-kbkds\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:08.636540 19192 pod_ready.go:92] pod \"coredns-5d78c9869d-kbkds\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T13:03:50.441016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:08.636552 19192 pod_ready.go:81] duration metric: took 5.51735932s waiting for pod \"coredns-5d78c9869d-kbkds\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:08.636560 19192 pod_ready.go:78] waiting up to 4m0s for pod \"etcd-default-k8s-diff-port-707000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:10.650504 19192 pod_ready.go:102] pod \"etcd-default-k8s-diff-port-707000\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:12.650579 19192 pod_ready.go:102] pod \"etcd-default-k8s-diff-port-707000\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:14.651003 19192 pod_ready.go:102] pod \"etcd-default-k8s-diff-port-707000\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.44103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.149040 19192 pod_ready.go:92] pod \"etcd-default-k8s-diff-port-707000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T13:03:50.441034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.149051 19192 pod_ready.go:81] duration metric: took 7.512387894s waiting for pod \"etcd-default-k8s-diff-port-707000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.149058 19192 pod_ready.go:78] waiting up to 4m0s for pod \"kube-apiserver-default-k8s-diff-port-707000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.154197 19192 pod_ready.go:92] pod \"kube-apiserver-default-k8s-diff-port-707000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T13:03:50.441189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.154207 19192 pod_ready.go:81] duration metric: took 5.144487ms waiting for pod \"kube-apiserver-default-k8s-diff-port-707000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.154214 19192 pod_ready.go:78] waiting up to 4m0s for pod \"kube-controller-manager-default-k8s-diff-port-707000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.159479 19192 pod_ready.go:92] pod \"kube-controller-manager-default-k8s-diff-port-707000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T13:03:50.441197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.159489 19192 pod_ready.go:81] duration metric: took 5.270835ms waiting for pod \"kube-controller-manager-default-k8s-diff-port-707000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.4412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.159495 19192 pod_ready.go:78] waiting up to 4m0s for pod \"kube-proxy-m8c7f\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.164644 19192 pod_ready.go:92] pod \"kube-proxy-m8c7f\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T13:03:50.44121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.164653 19192 pod_ready.go:81] duration metric: took 5.153727ms waiting for pod \"kube-proxy-m8c7f\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.164660 19192 pod_ready.go:78] waiting up to 4m0s for pod \"kube-scheduler-default-k8s-diff-port-707000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.171547 19192 pod_ready.go:92] pod \"kube-scheduler-default-k8s-diff-port-707000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T13:03:50.441217-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.171558 19192 pod_ready.go:81] duration metric: took 6.892952ms waiting for pod \"kube-scheduler-default-k8s-diff-port-707000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:16.171566 19192 pod_ready.go:78] waiting up to 4m0s for pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T13:03:50.441413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:18.555728 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:20.555981 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:23.056014 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:25.554664 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:27.556371 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.44148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:30.054816 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:32.055571 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:34.554867 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:36.556886 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:39.054607 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:41.057267 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441524-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:43.554982 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.44175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:45.557204 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:48.055275 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.44176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:50.554916 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:52.556035 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:54.557862 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:57.055058 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:00:59.056159 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:01.555444 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:03.555753 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:06.055325 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.44178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:08.055498 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:10.057136 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:12.554850 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:14.558115 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.441996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:17.055659 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:19.555770 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:22.055122 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:24.055368 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:26.056172 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:28.555482 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:30.556302 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:33.056176 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:35.058424 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:37.058708 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:39.556620 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:41.558310 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:44.055397 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:46.063383 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:48.556895 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:50.559162 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:53.058760 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:55.556628 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:01:57.557758 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:00.055969 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:02.058184 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:04.556194 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:07.056245 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:09.556279 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:11.559296 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442621-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:14.057573 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:16.556469 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:18.558133 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:20.558312 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442653-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:23.057482 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:25.058511 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:27.557182 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442682-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:30.056837 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:32.559682 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.44269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:35.059164 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:37.555765 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:39.556502 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:41.560060 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:44.056276 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:46.058096 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:48.557454 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.44289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:50.558503 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:53.058030 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:55.557097 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:02:58.057541 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:00.558205 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:02.558476 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:05.060098 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:07.556930 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:10.057953 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.442981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:12.558270 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:14.559964 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:17.058802 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:19.557204 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:21.558532 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:24.057936 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:26.558916 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:29.058859 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:31.557454 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443226-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:33.557752 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:35.559078 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:38.057979 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:40.557531 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:43.056549 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:45.056917 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tI0531 13:03:47.057828 19192 pod_ready.go:102] pod \"metrics-server-74d5c6b9c-6blwr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T13:03:50.443416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.44342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.443423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* ==\u003e Docker \u003c==\n"} +{"Time":"2023-05-31T13:03:50.443425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* May 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.099659784Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\n"} +{"Time":"2023-05-31T13:03:50.443428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.138464945Z\" level=info msg=\"Loading containers: done.\"\n"} +{"Time":"2023-05-31T13:03:50.443434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.147458789Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\n"} +{"Time":"2023-05-31T13:03:50.443439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.147525112Z\" level=info msg=\"Daemon has completed initialization\"\n"} +{"Time":"2023-05-31T13:03:50.443451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.179519418Z\" level=info msg=\"API listen on /var/run/docker.sock\"\n"} +{"Time":"2023-05-31T13:03:50.443454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.179718200Z\" level=info msg=\"API listen on [::]:2376\"\n"} +{"Time":"2023-05-31T13:03:50.443457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 systemd[1]: Started Docker Application Container Engine.\n"} +{"Time":"2023-05-31T13:03:50.44346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Stopping Docker Application Container Engine...\n"} +{"Time":"2023-05-31T13:03:50.443462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.403593532Z\" level=info msg=\"Processing signal 'terminated'\"\n"} +{"Time":"2023-05-31T13:03:50.443626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.404984583Z\" level=info msg=\"stopping event stream following graceful shutdown\" error=\"\u003cnil\u003e\" module=libcontainerd namespace=moby\n"} +{"Time":"2023-05-31T13:03:50.44363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.405234397Z\" level=info msg=\"Daemon shutdown complete\"\n"} +{"Time":"2023-05-31T13:03:50.443632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.405446217Z\" level=info msg=\"stopping event stream following graceful shutdown\" error=\"context canceled\" module=libcontainerd namespace=plugins.moby\n"} +{"Time":"2023-05-31T13:03:50.443635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: docker.service: Deactivated successfully.\n"} +{"Time":"2023-05-31T13:03:50.44364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Stopped Docker Application Container Engine.\n"} +{"Time":"2023-05-31T13:03:50.443642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Starting Docker Application Container Engine...\n"} +{"Time":"2023-05-31T13:03:50.443644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.462213859Z\" level=info msg=\"Starting up\"\n"} +{"Time":"2023-05-31T13:03:50.443647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.596616592Z\" level=info msg=\"[graphdriver] trying configured driver: overlay2\"\n"} +{"Time":"2023-05-31T13:03:50.443649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.824413968Z\" level=info msg=\"Loading containers: start.\"\n"} +{"Time":"2023-05-31T13:03:50.443652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.917938134Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\n"} +{"Time":"2023-05-31T13:03:50.443654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.956170411Z\" level=info msg=\"Loading containers: done.\"\n"} +{"Time":"2023-05-31T13:03:50.443657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.965771934Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\n"} +{"Time":"2023-05-31T13:03:50.443842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.965840535Z\" level=info msg=\"Daemon has completed initialization\"\n"} +{"Time":"2023-05-31T13:03:50.443849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.998089110Z\" level=info msg=\"API listen on /var/run/docker.sock\"\n"} +{"Time":"2023-05-31T13:03:50.443853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.998137953Z\" level=info msg=\"API listen on [::]:2376\"\n"} +{"Time":"2023-05-31T13:03:50.443857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Started Docker Application Container Engine.\n"} +{"Time":"2023-05-31T13:03:50.443861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.443864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.443868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* ==\u003e container status \u003c==\n"} +{"Time":"2023-05-31T13:03:50.443871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES\n"} +{"Time":"2023-05-31T13:03:50.443874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \ttime=\"2023-05-31T20:03:49Z\" level=fatal msg=\"unable to determine runtime API version: rpc error: code = Unavailable desc = connection error: desc = \\\"transport: Error while dialing dial unix /var/run/dockershim.sock: connect: no such file or directory\\\"\"\n"} +{"Time":"2023-05-31T13:03:50.443877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.443879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.443881-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* ==\u003e describe nodes \u003c==\n"} +{"Time":"2023-05-31T13:03:50.443883-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.443885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* ==\u003e dmesg \u003c==\n"} +{"Time":"2023-05-31T13:03:50.443887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.443889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.443891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* ==\u003e kernel \u003c==\n"} +{"Time":"2023-05-31T13:03:50.443894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* 20:03:50 up 1:32, 0 users, load average: 0.93, 0.83, 1.02\n"} +{"Time":"2023-05-31T13:03:50.444124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tLinux old-k8s-version-787000 5.15.49-linuxkit-pr #1 SMP Thu May 25 07:17:40 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux\n"} +{"Time":"2023-05-31T13:03:50.444129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tPRETTY_NAME=\"Ubuntu 22.04.2 LTS\"\n"} +{"Time":"2023-05-31T13:03:50.444131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.444133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:03:50.444136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* ==\u003e kubelet \u003c==\n"} +{"Time":"2023-05-31T13:03:50.444138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t* May 31 20:03:48 old-k8s-version-787000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:03:50.44414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 kubelet[26119]: I0531 20:03:48.828491 26119 server.go:410] Version: v1.16.0\n"} +{"Time":"2023-05-31T13:03:50.444143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 kubelet[26119]: I0531 20:03:48.828709 26119 plugins.go:100] No cloud provider specified.\n"} +{"Time":"2023-05-31T13:03:50.444145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 kubelet[26119]: I0531 20:03:48.828722 26119 server.go:773] Client rotation is on, will bootstrap in background\n"} +{"Time":"2023-05-31T13:03:50.444148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 kubelet[26119]: I0531 20:03:48.830972 26119 certificate_store.go:129] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\n"} +{"Time":"2023-05-31T13:03:50.444151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 kubelet[26119]: W0531 20:03:48.832263 26119 server.go:613] failed to get the kubelet's cgroup: mountpoint for cpu not found. Kubelet system container metrics may be missing.\n"} +{"Time":"2023-05-31T13:03:50.444153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 kubelet[26119]: W0531 20:03:48.832344 26119 server.go:620] failed to get the container runtime's cgroup: failed to get container name for docker process: mountpoint for cpu not found. Runtime system container metrics may be missing.\n"} +{"Time":"2023-05-31T13:03:50.444156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 kubelet[26119]: F0531 20:03:48.832397 26119 server.go:271] failed to run Kubelet: mountpoint for cpu not found\n"} +{"Time":"2023-05-31T13:03:50.444159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 systemd[1]: kubelet.service: Main process exited, code=exited, status=255/EXCEPTION\n"} +{"Time":"2023-05-31T13:03:50.444161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:48 old-k8s-version-787000 systemd[1]: kubelet.service: Failed with result 'exit-code'.\n"} +{"Time":"2023-05-31T13:03:50.444357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 880.\n"} +{"Time":"2023-05-31T13:03:50.444362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:03:50.444364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:03:50.444366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 kubelet[26145]: I0531 20:03:49.545162 26145 server.go:410] Version: v1.16.0\n"} +{"Time":"2023-05-31T13:03:50.444369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 kubelet[26145]: I0531 20:03:49.545360 26145 plugins.go:100] No cloud provider specified.\n"} +{"Time":"2023-05-31T13:03:50.444371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 kubelet[26145]: I0531 20:03:49.545370 26145 server.go:773] Client rotation is on, will bootstrap in background\n"} +{"Time":"2023-05-31T13:03:50.444374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 kubelet[26145]: I0531 20:03:49.547231 26145 certificate_store.go:129] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\n"} +{"Time":"2023-05-31T13:03:50.444376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 kubelet[26145]: W0531 20:03:49.547901 26145 server.go:613] failed to get the kubelet's cgroup: mountpoint for cpu not found. Kubelet system container metrics may be missing.\n"} +{"Time":"2023-05-31T13:03:50.444379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 kubelet[26145]: W0531 20:03:49.548033 26145 server.go:620] failed to get the container runtime's cgroup: failed to get container name for docker process: mountpoint for cpu not found. Runtime system container metrics may be missing.\n"} +{"Time":"2023-05-31T13:03:50.444381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 kubelet[26145]: F0531 20:03:49.548060 26145 server.go:271] failed to run Kubelet: mountpoint for cpu not found\n"} +{"Time":"2023-05-31T13:03:50.444384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 systemd[1]: kubelet.service: Main process exited, code=exited, status=255/EXCEPTION\n"} +{"Time":"2023-05-31T13:03:50.444386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:49 old-k8s-version-787000 systemd[1]: kubelet.service: Failed with result 'exit-code'.\n"} +{"Time":"2023-05-31T13:03:50.444388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:50 old-k8s-version-787000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 881.\n"} +{"Time":"2023-05-31T13:03:50.444564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:50 old-k8s-version-787000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:03:50.444569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tMay 31 20:03:50 old-k8s-version-787000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:03:50.444571-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.444574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.444577-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:50.44458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:03:50.444583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T13:03:50.444585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tE0531 13:03:50.014660 19325 logs.go:195] command /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" failed with error: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T13:03:50.444588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:03:50.44459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:03:50.444592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:03:50.444594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T13:03:50.444598-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t output: \"\\n** stderr ** \\nThe connection to the server localhost:8443 was refused - did you specify the right host or port?\\n\\n** /stderr **\"\n"} +{"Time":"2023-05-31T13:03:50.444601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \t! unable to fetch logs for: describe nodes\n"} +{"Time":"2023-05-31T13:03:50.444603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:50.444605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T13:03:50.444607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:254: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:03:50.792289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:254: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 2 (357.673991ms)\n"} +{"Time":"2023-05-31T13:03:50.792304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:50.792307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:03:50.792309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T13:03:50.792311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:03:50.792313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:03:50.792315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:254: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:03:50.792318-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:256: \"old-k8s-version-787000\" apiserver is not running, skipping kubectl commands (state=\"Stopped\")\n"} +{"Time":"2023-05-31T13:03:50.792331-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T13:03:50.792333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T13:03:50.793114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T13:03:54.812326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:03:54.812294 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:04:00.822978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:04:11.854695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:04:21.875224-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:04:31.899753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:04:41.928609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:04:48.71228-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-darwin-amd64 start -p default-k8s-diff-port-707000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=docker --kubernetes-version=v1.27.2: (5m11.174085953s)\n"} +{"Time":"2023-05-31T13:04:48.712305-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:04:49.114808-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T13:04:49.114833-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T13:04:49.115778-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T13:04:49.126862-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-z95p9\" [7e834c13-96aa-496d-97b4-81e4b47bb1f6] Pending / Ready:ContainersNotReady (containers with unready status: [kubernetes-dashboard]) / ContainersReady:ContainersNotReady (containers with unready status: [kubernetes-dashboard])\n"} +{"Time":"2023-05-31T13:04:49.453893-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":"E0531 13:04:49.453858 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:04:50.262974-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":"E0531 13:04:50.262934 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:04:50.29138-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":"E0531 13:04:50.291345 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:04:51.948138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:04:57.132255-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-z95p9\" [7e834c13-96aa-496d-97b4-81e4b47bb1f6] Running\n"} +{"Time":"2023-05-31T13:05:01.967348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:05:03.133694-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 14.017715602s\n"} +{"Time":"2023-05-31T13:05:03.133711-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T13:05:03.133715-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T13:05:03.134431-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T13:05:03.13766-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-z95p9\" [7e834c13-96aa-496d-97b4-81e4b47bb1f6] Running\n"} +{"Time":"2023-05-31T13:05:08.142587-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.008075343s\n"} +{"Time":"2023-05-31T13:05:08.142676-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context default-k8s-diff-port-707000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T13:05:08.228805-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T13:05:08.228823-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T13:05:08.228903-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-amd64 ssh -p default-k8s-diff-port-707000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T13:05:08.634602-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T13:05:08.634682-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause"} +{"Time":"2023-05-31T13:05:08.634688-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/Pause\n"} +{"Time":"2023-05-31T13:05:08.634769-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 pause -p default-k8s-diff-port-707000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T13:05:09.35225-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:05:09.728522-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000: exit status 2 (376.200234ms)\n"} +{"Time":"2023-05-31T13:05:09.728536-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T13:05:09.72854-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:05:09.728542-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T13:05:09.728544-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T13:05:09.728546-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:05:09.728549-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:05:09.728555-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:05:10.108543-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000: exit status 2 (379.911575ms)\n"} +{"Time":"2023-05-31T13:05:10.108557-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T13:05:10.108559-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:05:10.108561-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T13:05:10.108564-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T13:05:10.108566-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:05:10.108568-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:05:10.108589-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 unpause -p default-k8s-diff-port-707000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T13:05:10.789934-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:05:11.248883-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p default-k8s-diff-port-707000 -n default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:05:11.639668-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-amd64 delete -p default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:05:11.991426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:05:14.497004-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-darwin-amd64 delete -p default-k8s-diff-port-707000: (2.857239816s)\n"} +{"Time":"2023-05-31T13:05:14.497134-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:05:14.532953-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts default-k8s-diff-port-707000: exit status 1 (35.733372ms)\n"} +{"Time":"2023-05-31T13:05:14.532966-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T13:05:14.532969-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:05:14.532971-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T13:05:14.532978-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T13:05:14.53298-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:05:14.532992-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T13:05:14.532999-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \terror: context default-k8s-diff-port-707000 not found\n"} +{"Time":"2023-05-31T13:05:14.533001-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T13:05:14.533004-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T13:05:14.533006-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T13:05:14.533011-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" helpers_test.go:175: Cleaning up \"default-k8s-diff-port-707000\" profile ...\n"} +{"Time":"2023-05-31T13:05:14.533013-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p default-k8s-diff-port-707000\n"} +{"Time":"2023-05-31T13:05:14.898551-07:00","Action":"cont","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T13:05:14.89857-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== CONT TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T13:05:14.898672-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial"} +{"Time":"2023-05-31T13:05:14.898679-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":"=== RUN TestStartStop/group/newest-cni/serial\n"} +{"Time":"2023-05-31T13:05:14.898688-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/FirstStart"} +{"Time":"2023-05-31T13:05:14.898692-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"=== RUN TestStartStop/group/newest-cni/serial/FirstStart\n"} +{"Time":"2023-05-31T13:05:14.89878-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-amd64 start -p newest-cni-533000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=docker --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T13:05:22.014958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:05:32.104999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:05:42.126132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:05:52.149619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:05:53.310501-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-darwin-amd64 start -p newest-cni-533000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=docker --kubernetes-version=v1.27.2: (38.342231969s)\n"} +{"Time":"2023-05-31T13:05:53.310519-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/DeployApp"} +{"Time":"2023-05-31T13:05:53.310522-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Output":"=== RUN TestStartStop/group/newest-cni/serial/DeployApp\n"} +{"Time":"2023-05-31T13:05:53.310549-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T13:05:53.310557-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/newest-cni/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T13:05:53.310601-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-amd64 addons enable metrics-server -p newest-cni-533000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T13:05:54.305443-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:211: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T13:05:54.305461-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/Stop"} +{"Time":"2023-05-31T13:05:54.305465-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":"=== RUN TestStartStop/group/newest-cni/serial/Stop\n"} +{"Time":"2023-05-31T13:05:54.305506-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-amd64 stop -p newest-cni-533000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T13:06:02.177205-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:06:02.946796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:06:02.946765 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/skaffold-128000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:06:05.192683-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-darwin-amd64 stop -p newest-cni-533000 --alsologtostderr -v=3: (10.886809786s)\n"} +{"Time":"2023-05-31T13:06:05.192698-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T13:06:05.192701-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T13:06:05.192734-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p newest-cni-533000 -n newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:05.284301-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p newest-cni-533000 -n newest-cni-533000: exit status 7 (91.489127ms)\n"} +{"Time":"2023-05-31T13:06:05.284313-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:06:05.284316-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:06:05.284319-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T13:06:05.284321-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:06:05.284323-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:06:05.284325-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T13:06:05.284338-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-amd64 addons enable dashboard -p newest-cni-533000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T13:06:05.574642-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/SecondStart"} +{"Time":"2023-05-31T13:06:05.574654-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"=== RUN TestStartStop/group/newest-cni/serial/SecondStart\n"} +{"Time":"2023-05-31T13:06:05.574702-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-amd64 start -p newest-cni-533000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=docker --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T13:06:12.203803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:06:22.23736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:06:31.111293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:06:31.111263 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/custom-flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:06:31.223319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:06:31.223277 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:06:32.261945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:06:33.223665-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-darwin-amd64 start -p newest-cni-533000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=docker --kubernetes-version=v1.27.2: (27.648074752s)\n"} +{"Time":"2023-05-31T13:06:33.223686-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p newest-cni-533000 -n newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:33.608022-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T13:06:33.608037-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T13:06:33.608043-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:273: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T13:06:33.608047-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T13:06:33.608049-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T13:06:33.608076-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:284: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T13:06:33.608085-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T13:06:33.608088-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/newest-cni/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T13:06:33.608117-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-amd64 ssh -p newest-cni-533000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T13:06:34.013516-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/Pause"} +{"Time":"2023-05-31T13:06:34.013528-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":"=== RUN TestStartStop/group/newest-cni/serial/Pause\n"} +{"Time":"2023-05-31T13:06:34.013553-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 pause -p newest-cni-533000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T13:06:34.707993-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p newest-cni-533000 -n newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:35.077813-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p newest-cni-533000 -n newest-cni-533000: exit status 2 (369.727198ms)\n"} +{"Time":"2023-05-31T13:06:35.077827-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T13:06:35.07783-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:06:35.077832-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T13:06:35.077834-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T13:06:35.077837-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:06:35.077839-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:06:35.077844-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p newest-cni-533000 -n newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:35.456361-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p newest-cni-533000 -n newest-cni-533000: exit status 2 (378.40878ms)\n"} +{"Time":"2023-05-31T13:06:35.456376-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T13:06:35.456379-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:06:35.456381-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T13:06:35.456383-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T13:06:35.456385-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:06:35.456388-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:06:35.456392-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 unpause -p newest-cni-533000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T13:06:36.132197-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p newest-cni-533000 -n newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:36.295334-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":"E0531 13:06:36.295290 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:06:36.657349-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Kubelet}} -p newest-cni-533000 -n newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:37.040729-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-amd64 delete -p newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:39.588436-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-darwin-amd64 delete -p newest-cni-533000: (2.547606608s)\n"} +{"Time":"2023-05-31T13:06:39.588488-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:39.625615-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts newest-cni-533000: exit status 1 (37.005171ms)\n"} +{"Time":"2023-05-31T13:06:39.625628-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T13:06:39.62563-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:06:39.625632-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T13:06:39.625635-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T13:06:39.625637-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:06:39.625639-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T13:06:39.625641-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \terror: context newest-cni-533000 not found\n"} +{"Time":"2023-05-31T13:06:39.625647-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T13:06:39.625649-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T13:06:39.625651-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T13:06:39.625656-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" helpers_test.go:175: Cleaning up \"newest-cni-533000\" profile ...\n"} +{"Time":"2023-05-31T13:06:39.625673-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p newest-cni-533000\n"} +{"Time":"2023-05-31T13:06:39.992016-07:00","Action":"output","Test":"TestNetworkPlugins","Output":"--- PASS: TestNetworkPlugins (2710.07s)\n"} +{"Time":"2023-05-31T13:06:39.99203-07:00","Action":"output","Test":"TestNetworkPlugins/group","Output":" --- PASS: TestNetworkPlugins/group (6.08s)\n"} +{"Time":"2023-05-31T13:06:39.992034-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" --- SKIP: TestNetworkPlugins/group/cilium (6.08s)\n"} +{"Time":"2023-05-31T13:06:39.992039-07:00","Action":"skip","Test":"TestNetworkPlugins/group/cilium","Elapsed":6.08} +{"Time":"2023-05-31T13:06:39.992043-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --- PASS: TestNetworkPlugins/group/auto (80.84s)\n"} +{"Time":"2023-05-31T13:06:39.992046-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" --- PASS: TestNetworkPlugins/group/auto/Start (46.39s)\n"} +{"Time":"2023-05-31T13:06:39.99205-07:00","Action":"pass","Test":"TestNetworkPlugins/group/auto/Start","Elapsed":46.39} +{"Time":"2023-05-31T13:06:39.992053-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/auto/KubeletFlags (0.35s)\n"} +{"Time":"2023-05-31T13:06:39.992057-07:00","Action":"pass","Test":"TestNetworkPlugins/group/auto/KubeletFlags","Elapsed":0.35} +{"Time":"2023-05-31T13:06:39.992059-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/auto/NetCatPod (12.23s)\n"} +{"Time":"2023-05-31T13:06:39.992062-07:00","Action":"pass","Test":"TestNetworkPlugins/group/auto/NetCatPod","Elapsed":12.23} +{"Time":"2023-05-31T13:06:39.992067-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/DNS","Output":" --- PASS: TestNetworkPlugins/group/auto/DNS (0.14s)\n"} +{"Time":"2023-05-31T13:06:39.99207-07:00","Action":"pass","Test":"TestNetworkPlugins/group/auto/DNS","Elapsed":0.14} +{"Time":"2023-05-31T13:06:39.992073-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Localhost","Output":" --- PASS: TestNetworkPlugins/group/auto/Localhost (0.11s)\n"} +{"Time":"2023-05-31T13:06:39.992076-07:00","Action":"pass","Test":"TestNetworkPlugins/group/auto/Localhost","Elapsed":0.11} +{"Time":"2023-05-31T13:06:39.992079-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/HairPin","Output":" --- PASS: TestNetworkPlugins/group/auto/HairPin (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992082-07:00","Action":"pass","Test":"TestNetworkPlugins/group/auto/HairPin","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992084-07:00","Action":"pass","Test":"TestNetworkPlugins/group/auto","Elapsed":80.84} +{"Time":"2023-05-31T13:06:39.992087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --- PASS: TestNetworkPlugins/group/kindnet (95.61s)\n"} +{"Time":"2023-05-31T13:06:39.99209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" --- PASS: TestNetworkPlugins/group/kindnet/Start (54.79s)\n"} +{"Time":"2023-05-31T13:06:39.992093-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/Start","Elapsed":54.79} +{"Time":"2023-05-31T13:06:39.992096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":" --- PASS: TestNetworkPlugins/group/kindnet/ControllerPod (5.02s)\n"} +{"Time":"2023-05-31T13:06:39.992099-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Elapsed":5.02} +{"Time":"2023-05-31T13:06:39.992102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/kindnet/KubeletFlags (0.36s)\n"} +{"Time":"2023-05-31T13:06:39.992104-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags","Elapsed":0.36} +{"Time":"2023-05-31T13:06:39.992107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/kindnet/NetCatPod (13.22s)\n"} +{"Time":"2023-05-31T13:06:39.99211-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Elapsed":13.22} +{"Time":"2023-05-31T13:06:39.992113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/DNS","Output":" --- PASS: TestNetworkPlugins/group/kindnet/DNS (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.992116-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/DNS","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Localhost","Output":" --- PASS: TestNetworkPlugins/group/kindnet/Localhost (0.11s)\n"} +{"Time":"2023-05-31T13:06:39.992122-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/Localhost","Elapsed":0.11} +{"Time":"2023-05-31T13:06:39.992124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/HairPin","Output":" --- PASS: TestNetworkPlugins/group/kindnet/HairPin (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992127-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/HairPin","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.99213-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kindnet","Elapsed":95.61} +{"Time":"2023-05-31T13:06:39.992132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --- PASS: TestNetworkPlugins/group/calico (111.88s)\n"} +{"Time":"2023-05-31T13:06:39.992136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" --- PASS: TestNetworkPlugins/group/calico/Start (68.80s)\n"} +{"Time":"2023-05-31T13:06:39.992139-07:00","Action":"pass","Test":"TestNetworkPlugins/group/calico/Start","Elapsed":68.8} +{"Time":"2023-05-31T13:06:39.992142-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":" --- PASS: TestNetworkPlugins/group/calico/ControllerPod (5.02s)\n"} +{"Time":"2023-05-31T13:06:39.992145-07:00","Action":"pass","Test":"TestNetworkPlugins/group/calico/ControllerPod","Elapsed":5.02} +{"Time":"2023-05-31T13:06:39.992148-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/calico/KubeletFlags (0.38s)\n"} +{"Time":"2023-05-31T13:06:39.992151-07:00","Action":"pass","Test":"TestNetworkPlugins/group/calico/KubeletFlags","Elapsed":0.38} +{"Time":"2023-05-31T13:06:39.992154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/calico/NetCatPod (13.28s)\n"} +{"Time":"2023-05-31T13:06:39.992157-07:00","Action":"pass","Test":"TestNetworkPlugins/group/calico/NetCatPod","Elapsed":13.28} +{"Time":"2023-05-31T13:06:39.99216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/DNS","Output":" --- PASS: TestNetworkPlugins/group/calico/DNS (0.14s)\n"} +{"Time":"2023-05-31T13:06:39.992163-07:00","Action":"pass","Test":"TestNetworkPlugins/group/calico/DNS","Elapsed":0.14} +{"Time":"2023-05-31T13:06:39.992166-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Localhost","Output":" --- PASS: TestNetworkPlugins/group/calico/Localhost (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992169-07:00","Action":"pass","Test":"TestNetworkPlugins/group/calico/Localhost","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/HairPin","Output":" --- PASS: TestNetworkPlugins/group/calico/HairPin (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992175-07:00","Action":"pass","Test":"TestNetworkPlugins/group/calico/HairPin","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992177-07:00","Action":"pass","Test":"TestNetworkPlugins/group/calico","Elapsed":111.88} +{"Time":"2023-05-31T13:06:39.99218-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel (94.11s)\n"} +{"Time":"2023-05-31T13:06:39.992183-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/Start (57.94s)\n"} +{"Time":"2023-05-31T13:06:39.992186-07:00","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/Start","Elapsed":57.94} +{"Time":"2023-05-31T13:06:39.992189-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/KubeletFlags (0.36s)\n"} +{"Time":"2023-05-31T13:06:39.992192-07:00","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags","Elapsed":0.36} +{"Time":"2023-05-31T13:06:39.992195-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/NetCatPod (12.24s)\n"} +{"Time":"2023-05-31T13:06:39.992198-07:00","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Elapsed":12.24} +{"Time":"2023-05-31T13:06:39.992201-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/DNS","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/DNS (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.992204-07:00","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/DNS","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992206-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Localhost","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/Localhost (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992209-07:00","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/Localhost","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992212-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/HairPin","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/HairPin (0.11s)\n"} +{"Time":"2023-05-31T13:06:39.992215-07:00","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/HairPin","Elapsed":0.11} +{"Time":"2023-05-31T13:06:39.992217-07:00","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel","Elapsed":94.11} +{"Time":"2023-05-31T13:06:39.99222-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --- PASS: TestNetworkPlugins/group/false (78.78s)\n"} +{"Time":"2023-05-31T13:06:39.992223-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" --- PASS: TestNetworkPlugins/group/false/Start (41.80s)\n"} +{"Time":"2023-05-31T13:06:39.992226-07:00","Action":"pass","Test":"TestNetworkPlugins/group/false/Start","Elapsed":41.8} +{"Time":"2023-05-31T13:06:39.992229-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/false/KubeletFlags (0.36s)\n"} +{"Time":"2023-05-31T13:06:39.992232-07:00","Action":"pass","Test":"TestNetworkPlugins/group/false/KubeletFlags","Elapsed":0.36} +{"Time":"2023-05-31T13:06:39.992235-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/false/NetCatPod (12.24s)\n"} +{"Time":"2023-05-31T13:06:39.992238-07:00","Action":"pass","Test":"TestNetworkPlugins/group/false/NetCatPod","Elapsed":12.24} +{"Time":"2023-05-31T13:06:39.992245-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/DNS","Output":" --- PASS: TestNetworkPlugins/group/false/DNS (0.17s)\n"} +{"Time":"2023-05-31T13:06:39.992249-07:00","Action":"pass","Test":"TestNetworkPlugins/group/false/DNS","Elapsed":0.17} +{"Time":"2023-05-31T13:06:39.992251-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Localhost","Output":" --- PASS: TestNetworkPlugins/group/false/Localhost (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.992254-07:00","Action":"pass","Test":"TestNetworkPlugins/group/false/Localhost","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992257-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/HairPin","Output":" --- PASS: TestNetworkPlugins/group/false/HairPin (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.99226-07:00","Action":"pass","Test":"TestNetworkPlugins/group/false/HairPin","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992262-07:00","Action":"pass","Test":"TestNetworkPlugins/group/false","Elapsed":78.78} +{"Time":"2023-05-31T13:06:39.992265-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --- PASS: TestNetworkPlugins/group/flannel (97.69s)\n"} +{"Time":"2023-05-31T13:06:39.992268-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" --- PASS: TestNetworkPlugins/group/flannel/Start (55.43s)\n"} +{"Time":"2023-05-31T13:06:39.992272-07:00","Action":"pass","Test":"TestNetworkPlugins/group/flannel/Start","Elapsed":55.43} +{"Time":"2023-05-31T13:06:39.992274-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":" --- PASS: TestNetworkPlugins/group/flannel/ControllerPod (5.02s)\n"} +{"Time":"2023-05-31T13:06:39.992277-07:00","Action":"pass","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Elapsed":5.02} +{"Time":"2023-05-31T13:06:39.99228-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/flannel/KubeletFlags (0.36s)\n"} +{"Time":"2023-05-31T13:06:39.992284-07:00","Action":"pass","Test":"TestNetworkPlugins/group/flannel/KubeletFlags","Elapsed":0.36} +{"Time":"2023-05-31T13:06:39.992289-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/flannel/NetCatPod (13.31s)\n"} +{"Time":"2023-05-31T13:06:39.992294-07:00","Action":"pass","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Elapsed":13.31} +{"Time":"2023-05-31T13:06:39.992298-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/DNS","Output":" --- PASS: TestNetworkPlugins/group/flannel/DNS (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.992303-07:00","Action":"pass","Test":"TestNetworkPlugins/group/flannel/DNS","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992306-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Localhost","Output":" --- PASS: TestNetworkPlugins/group/flannel/Localhost (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992311-07:00","Action":"pass","Test":"TestNetworkPlugins/group/flannel/Localhost","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/HairPin","Output":" --- PASS: TestNetworkPlugins/group/flannel/HairPin (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992321-07:00","Action":"pass","Test":"TestNetworkPlugins/group/flannel/HairPin","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992324-07:00","Action":"pass","Test":"TestNetworkPlugins/group/flannel","Elapsed":97.69} +{"Time":"2023-05-31T13:06:39.992327-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni (120.39s)\n"} +{"Time":"2023-05-31T13:06:39.992331-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/Start (82.33s)\n"} +{"Time":"2023-05-31T13:06:39.992334-07:00","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Elapsed":82.33} +{"Time":"2023-05-31T13:06:39.992337-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/KubeletFlags (0.36s)\n"} +{"Time":"2023-05-31T13:06:39.99234-07:00","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags","Elapsed":0.36} +{"Time":"2023-05-31T13:06:39.992343-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/NetCatPod (13.20s)\n"} +{"Time":"2023-05-31T13:06:39.992346-07:00","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Elapsed":13.2} +{"Time":"2023-05-31T13:06:39.992348-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/DNS","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/DNS (0.14s)\n"} +{"Time":"2023-05-31T13:06:39.992351-07:00","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/DNS","Elapsed":0.14} +{"Time":"2023-05-31T13:06:39.992354-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/Localhost (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.992357-07:00","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992359-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/HairPin (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992362-07:00","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992365-07:00","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni","Elapsed":120.39} +{"Time":"2023-05-31T13:06:39.992368-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --- PASS: TestNetworkPlugins/group/bridge (89.56s)\n"} +{"Time":"2023-05-31T13:06:39.992371-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" --- PASS: TestNetworkPlugins/group/bridge/Start (53.11s)\n"} +{"Time":"2023-05-31T13:06:39.992374-07:00","Action":"pass","Test":"TestNetworkPlugins/group/bridge/Start","Elapsed":53.11} +{"Time":"2023-05-31T13:06:39.992377-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/bridge/KubeletFlags (0.38s)\n"} +{"Time":"2023-05-31T13:06:39.99238-07:00","Action":"pass","Test":"TestNetworkPlugins/group/bridge/KubeletFlags","Elapsed":0.38} +{"Time":"2023-05-31T13:06:39.992382-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/bridge/NetCatPod (13.28s)\n"} +{"Time":"2023-05-31T13:06:39.992385-07:00","Action":"pass","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Elapsed":13.28} +{"Time":"2023-05-31T13:06:39.992388-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/DNS","Output":" --- PASS: TestNetworkPlugins/group/bridge/DNS (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.992391-07:00","Action":"pass","Test":"TestNetworkPlugins/group/bridge/DNS","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992394-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Localhost","Output":" --- PASS: TestNetworkPlugins/group/bridge/Localhost (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.992437-07:00","Action":"pass","Test":"TestNetworkPlugins/group/bridge/Localhost","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992443-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/HairPin","Output":" --- PASS: TestNetworkPlugins/group/bridge/HairPin (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.992447-07:00","Action":"pass","Test":"TestNetworkPlugins/group/bridge/HairPin","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992449-07:00","Action":"pass","Test":"TestNetworkPlugins/group/bridge","Elapsed":89.56} +{"Time":"2023-05-31T13:06:39.992452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --- PASS: TestNetworkPlugins/group/kubenet (80.49s)\n"} +{"Time":"2023-05-31T13:06:39.992456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" --- PASS: TestNetworkPlugins/group/kubenet/Start (42.63s)\n"} +{"Time":"2023-05-31T13:06:39.992459-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kubenet/Start","Elapsed":42.63} +{"Time":"2023-05-31T13:06:39.992462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/kubenet/KubeletFlags (0.38s)\n"} +{"Time":"2023-05-31T13:06:39.992465-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kubenet/KubeletFlags","Elapsed":0.38} +{"Time":"2023-05-31T13:06:39.992468-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/kubenet/NetCatPod (14.27s)\n"} +{"Time":"2023-05-31T13:06:39.992471-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kubenet/NetCatPod","Elapsed":14.27} +{"Time":"2023-05-31T13:06:39.992474-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/DNS","Output":" --- PASS: TestNetworkPlugins/group/kubenet/DNS (0.13s)\n"} +{"Time":"2023-05-31T13:06:39.992483-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kubenet/DNS","Elapsed":0.13} +{"Time":"2023-05-31T13:06:39.992486-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Localhost","Output":" --- PASS: TestNetworkPlugins/group/kubenet/Localhost (0.12s)\n"} +{"Time":"2023-05-31T13:06:39.99249-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kubenet/Localhost","Elapsed":0.12} +{"Time":"2023-05-31T13:06:39.992493-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/HairPin","Output":" --- PASS: TestNetworkPlugins/group/kubenet/HairPin (0.11s)\n"} +{"Time":"2023-05-31T13:06:42.290903-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kubenet/HairPin","Elapsed":0.11} +{"Time":"2023-05-31T13:06:42.290918-07:00","Action":"pass","Test":"TestNetworkPlugins/group/kubenet","Elapsed":80.49} +{"Time":"2023-05-31T13:06:42.290921-07:00","Action":"pass","Test":"TestNetworkPlugins/group","Elapsed":6.08} +{"Time":"2023-05-31T13:06:42.290923-07:00","Action":"pass","Test":"TestNetworkPlugins","Elapsed":2710.07} +{"Time":"2023-05-31T13:06:42.290926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:06:42.519782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:06:42.519725 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/false-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:06:52.323275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:07:02.352271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:07:12.377773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:07:18.5809-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:07:18.580848 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/addons-597000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:07:22.405361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:07:31.832971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:07:31.832931 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/functional-753000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:07:32.439244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:07:42.473877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:07:52.509004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:07:59.341409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:07:59.341347 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/no-preload-344000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:07:59.9153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:07:59.915234 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kindnet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:08:02.541714-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:08:12.568825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:08:14.343769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:08:14.343696 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/flannel-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:08:22.598674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:08:29.576185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:08:29.576155 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/enable-default-cni-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:08:32.621023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:08:42.650979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:08:52.684234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:09:02.71508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:09:12.747927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:09:16.211053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:16.211003 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:16.217058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:16.216986 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:16.228284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:16.228260 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:16.250471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:16.250417 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:16.290611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:16.290537 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:16.372803-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:16.372747 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:16.535019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:16.534936 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:16.855111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:16.855079 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:17.49558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:17.495546 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:18.775878-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:18.775843 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:21.336162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:21.336133 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:22.784313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:09:26.45858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:26.458506 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:32.810246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:09:34.272118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:34.272037 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/auto-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:36.69951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:36.699481 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:42.839998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:09:49.532879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:49.532814 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/calico-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:50.341498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:50.341436 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/bridge-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:50.367994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:50.367931 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/kubenet-996000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:09:52.865131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:09:57.182452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"E0531 13:09:57.182402 1566 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/default-k8s-diff-port-707000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T13:10:02.894811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:10:12.924943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:10:22.957676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: Get \"https://127.0.0.1:53624/api/v1/namespaces/kubernetes-dashboard/pods?labelSelector=k8s-app%3Dkubernetes-dashboard\": EOF\n"} +{"Time":"2023-05-31T13:10:26.969784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:329: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: WARNING: pod list for \"kubernetes-dashboard\" \"k8s-app=kubernetes-dashboard\" returned: client rate limiter Wait returned an error: context deadline exceeded - error from a previous attempt: EOF\n"} +{"Time":"2023-05-31T13:10:26.969822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: ***** TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: pod \"k8s-app=kubernetes-dashboard\" failed to start within 9m0s: context deadline exceeded ****\n"} +{"Time":"2023-05-31T13:10:26.969828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:10:27.335015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 2 (365.085183ms)\n"} +{"Time":"2023-05-31T13:10:27.335039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:27.335044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:10:27.335057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T13:10:27.33506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:27.335063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:10:27.335066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:10:27.335073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: \"old-k8s-version-787000\" apiserver is not running, skipping kubectl commands (state=\"Stopped\")\n"} +{"Time":"2023-05-31T13:10:27.335078-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:288: failed waiting for 'addon dashboard' pod post-stop-start: k8s-app=kubernetes-dashboard within 9m0s: context deadline exceeded\n"} +{"Time":"2023-05-31T13:10:27.335156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context old-k8s-version-787000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T13:10:27.335166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Non-zero exit: kubectl --context old-k8s-version-787000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard: context deadline exceeded (3.166µs)\n"} +{"Time":"2023-05-31T13:10:27.335192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:293: failed to get info on kubernetes-dashboard deployments. args \"kubectl --context old-k8s-version-787000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\": context deadline exceeded\n"} +{"Time":"2023-05-31T13:10:27.335199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:297: addon did not load correct image. Expected to contain \" registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T13:10:27.335204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T13:10:27.335215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:230: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop]: docker inspect \u003c======\n"} +{"Time":"2023-05-31T13:10:27.335272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:231: (dbg) Run: docker inspect old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:10:27.386746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:235: (dbg) docker inspect old-k8s-version-787000:\n"} +{"Time":"2023-05-31T13:10:27.386759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:27.386762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:10:27.386765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[\n"} +{"Time":"2023-05-31T13:10:27.386767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.386769-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Id\": \"85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c\",\n"} +{"Time":"2023-05-31T13:10:27.386771-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Created\": \"2023-05-31T19:40:35.508746161Z\",\n"} +{"Time":"2023-05-31T13:10:27.386774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Path\": \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T13:10:27.386784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Args\": [\n"} +{"Time":"2023-05-31T13:10:27.386789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T13:10:27.386792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.386793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"State\": {\n"} +{"Time":"2023-05-31T13:10:27.386796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Status\": \"running\",\n"} +{"Time":"2023-05-31T13:10:27.386798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Running\": true,\n"} +{"Time":"2023-05-31T13:10:27.3868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Paused\": false,\n"} +{"Time":"2023-05-31T13:10:27.386802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Restarting\": false,\n"} +{"Time":"2023-05-31T13:10:27.386804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"OOMKilled\": false,\n"} +{"Time":"2023-05-31T13:10:27.386806-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Dead\": false,\n"} +{"Time":"2023-05-31T13:10:27.386808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Pid\": 307167,\n"} +{"Time":"2023-05-31T13:10:27.38681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ExitCode\": 0,\n"} +{"Time":"2023-05-31T13:10:27.386812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Error\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.386814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"StartedAt\": \"2023-05-31T19:46:19.232331606Z\",\n"} +{"Time":"2023-05-31T13:10:27.386817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"FinishedAt\": \"2023-05-31T19:46:16.598826769Z\"\n"} +{"Time":"2023-05-31T13:10:27.386819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.386821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Image\": \"sha256:f246fffc476e503eec088cb85bddb7b217288054dd7e1375d4f95eca27f4bce3\",\n"} +{"Time":"2023-05-31T13:10:27.386823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ResolvConfPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/resolv.conf\",\n"} +{"Time":"2023-05-31T13:10:27.386825-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostnamePath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hostname\",\n"} +{"Time":"2023-05-31T13:10:27.386828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostsPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/hosts\",\n"} +{"Time":"2023-05-31T13:10:27.38683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"LogPath\": \"/var/lib/docker/containers/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c/85229c23efd176ce46296600fcf023799e4e12c6f3e448556f3fc231bc9bd87c-json.log\",\n"} +{"Time":"2023-05-31T13:10:27.386832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Name\": \"/old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:10:27.386835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"RestartCount\": 0,\n"} +{"Time":"2023-05-31T13:10:27.386837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Driver\": \"overlay2\",\n"} +{"Time":"2023-05-31T13:10:27.386839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Platform\": \"linux\",\n"} +{"Time":"2023-05-31T13:10:27.386841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MountLabel\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.386843-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ProcessLabel\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.386845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"AppArmorProfile\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.386847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ExecIDs\": null,\n"} +{"Time":"2023-05-31T13:10:27.386849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostConfig\": {\n"} +{"Time":"2023-05-31T13:10:27.386851-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Binds\": [\n"} +{"Time":"2023-05-31T13:10:27.386853-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"/lib/modules:/lib/modules:ro\",\n"} +{"Time":"2023-05-31T13:10:27.386855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"old-k8s-version-787000:/var\"\n"} +{"Time":"2023-05-31T13:10:27.386857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.386859-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ContainerIDFile\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.386861-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"LogConfig\": {\n"} +{"Time":"2023-05-31T13:10:27.386863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Type\": \"json-file\",\n"} +{"Time":"2023-05-31T13:10:27.386865-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Config\": {}\n"} +{"Time":"2023-05-31T13:10:27.386869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.386871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"NetworkMode\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:10:27.386873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"PortBindings\": {\n"} +{"Time":"2023-05-31T13:10:27.386875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.386877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.386879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.386884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:10:27.386887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.386888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.386892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.386894-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.386896-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.386898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:10:27.3869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.386902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.386904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.386906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.386908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.38691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:10:27.386912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.386914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.386916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.386918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.38692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.386922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:10:27.386924-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.386926-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.386928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.38693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.386932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.386934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"0\"\n"} +{"Time":"2023-05-31T13:10:27.386936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.386938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ]\n"} +{"Time":"2023-05-31T13:10:27.38694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.386942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"RestartPolicy\": {\n"} +{"Time":"2023-05-31T13:10:27.386944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Name\": \"no\",\n"} +{"Time":"2023-05-31T13:10:27.386947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MaximumRetryCount\": 0\n"} +{"Time":"2023-05-31T13:10:27.386949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.386951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"AutoRemove\": false,\n"} +{"Time":"2023-05-31T13:10:27.386953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"VolumeDriver\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.386955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"VolumesFrom\": null,\n"} +{"Time":"2023-05-31T13:10:27.386957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ConsoleSize\": [\n"} +{"Time":"2023-05-31T13:10:27.386962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t 0,\n"} +{"Time":"2023-05-31T13:10:27.386964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t 0\n"} +{"Time":"2023-05-31T13:10:27.386966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.386969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CapAdd\": null,\n"} +{"Time":"2023-05-31T13:10:27.386971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CapDrop\": null,\n"} +{"Time":"2023-05-31T13:10:27.386973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CgroupnsMode\": \"private\",\n"} +{"Time":"2023-05-31T13:10:27.386977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Dns\": [],\n"} +{"Time":"2023-05-31T13:10:27.386979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"DnsOptions\": [],\n"} +{"Time":"2023-05-31T13:10:27.386981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"DnsSearch\": [],\n"} +{"Time":"2023-05-31T13:10:27.386984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ExtraHosts\": null,\n"} +{"Time":"2023-05-31T13:10:27.386986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"GroupAdd\": null,\n"} +{"Time":"2023-05-31T13:10:27.386988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IpcMode\": \"private\",\n"} +{"Time":"2023-05-31T13:10:27.38699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Cgroup\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.386992-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T13:10:27.386994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"OomScoreAdj\": 0,\n"} +{"Time":"2023-05-31T13:10:27.386996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"PidMode\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.386998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Privileged\": true,\n"} +{"Time":"2023-05-31T13:10:27.387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"PublishAllPorts\": false,\n"} +{"Time":"2023-05-31T13:10:27.387002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ReadonlyRootfs\": false,\n"} +{"Time":"2023-05-31T13:10:27.387004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"SecurityOpt\": [\n"} +{"Time":"2023-05-31T13:10:27.387006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"seccomp=unconfined\",\n"} +{"Time":"2023-05-31T13:10:27.387008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"apparmor=unconfined\",\n"} +{"Time":"2023-05-31T13:10:27.38701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"label=disable\"\n"} +{"Time":"2023-05-31T13:10:27.387012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387014-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Tmpfs\": {\n"} +{"Time":"2023-05-31T13:10:27.387016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"/run\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"/tmp\": \"\"\n"} +{"Time":"2023-05-31T13:10:27.387021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"UTSMode\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"UsernsMode\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387027-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ShmSize\": 67108864,\n"} +{"Time":"2023-05-31T13:10:27.387029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Runtime\": \"runc\",\n"} +{"Time":"2023-05-31T13:10:27.387033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Isolation\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpuShares\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Memory\": 2306867200,\n"} +{"Time":"2023-05-31T13:10:27.387039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"NanoCpus\": 2000000000,\n"} +{"Time":"2023-05-31T13:10:27.387041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CgroupParent\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"BlkioWeight\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"BlkioWeightDevice\": [],\n"} +{"Time":"2023-05-31T13:10:27.387048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"BlkioDeviceReadBps\": [],\n"} +{"Time":"2023-05-31T13:10:27.38705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"BlkioDeviceWriteBps\": [],\n"} +{"Time":"2023-05-31T13:10:27.387052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"BlkioDeviceReadIOps\": [],\n"} +{"Time":"2023-05-31T13:10:27.387054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"BlkioDeviceWriteIOps\": [],\n"} +{"Time":"2023-05-31T13:10:27.387056-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpuPeriod\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpuQuota\": 0,\n"} +{"Time":"2023-05-31T13:10:27.38706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpuRealtimePeriod\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpuRealtimeRuntime\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpusetCpus\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpusetMems\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Devices\": [],\n"} +{"Time":"2023-05-31T13:10:27.387071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"DeviceCgroupRules\": null,\n"} +{"Time":"2023-05-31T13:10:27.387073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"DeviceRequests\": null,\n"} +{"Time":"2023-05-31T13:10:27.387075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MemoryReservation\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MemorySwap\": 2306867200,\n"} +{"Time":"2023-05-31T13:10:27.387079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MemorySwappiness\": null,\n"} +{"Time":"2023-05-31T13:10:27.387084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"OomKillDisable\": null,\n"} +{"Time":"2023-05-31T13:10:27.387086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"PidsLimit\": null,\n"} +{"Time":"2023-05-31T13:10:27.387088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Ulimits\": null,\n"} +{"Time":"2023-05-31T13:10:27.38709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpuCount\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"CpuPercent\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IOMaximumIOps\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IOMaximumBandwidth\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MaskedPaths\": null,\n"} +{"Time":"2023-05-31T13:10:27.387103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ReadonlyPaths\": null\n"} +{"Time":"2023-05-31T13:10:27.387105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"GraphDriver\": {\n"} +{"Time":"2023-05-31T13:10:27.387109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Data\": {\n"} +{"Time":"2023-05-31T13:10:27.387111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"LowerDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398-init/diff:/var/lib/docker/overlay2/e253e13dc6d9a5f572a6c932eb99f788436e6445c9521dec03a918956c6463e9/diff\",\n"} +{"Time":"2023-05-31T13:10:27.387114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MergedDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/merged\",\n"} +{"Time":"2023-05-31T13:10:27.387116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"UpperDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/diff\",\n"} +{"Time":"2023-05-31T13:10:27.387119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"WorkDir\": \"/var/lib/docker/overlay2/ad822ef2bbe2d538d59bb303892994b8635764f4927dcfa9858ebb97b7b23398/work\"\n"} +{"Time":"2023-05-31T13:10:27.387121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Name\": \"overlay2\"\n"} +{"Time":"2023-05-31T13:10:27.387125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Mounts\": [\n"} +{"Time":"2023-05-31T13:10:27.387131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.387133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Type\": \"bind\",\n"} +{"Time":"2023-05-31T13:10:27.387135-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Source\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T13:10:27.387137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Destination\": \"/lib/modules\",\n"} +{"Time":"2023-05-31T13:10:27.387139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Mode\": \"ro\",\n"} +{"Time":"2023-05-31T13:10:27.387142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"RW\": false,\n"} +{"Time":"2023-05-31T13:10:27.387144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Propagation\": \"rprivate\"\n"} +{"Time":"2023-05-31T13:10:27.387146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.38715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Type\": \"volume\",\n"} +{"Time":"2023-05-31T13:10:27.387152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Name\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:10:27.387154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Source\": \"/var/lib/docker/volumes/old-k8s-version-787000/_data\",\n"} +{"Time":"2023-05-31T13:10:27.387156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Destination\": \"/var\",\n"} +{"Time":"2023-05-31T13:10:27.387159-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Driver\": \"local\",\n"} +{"Time":"2023-05-31T13:10:27.387161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Mode\": \"z\",\n"} +{"Time":"2023-05-31T13:10:27.387165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"RW\": true,\n"} +{"Time":"2023-05-31T13:10:27.387167-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Propagation\": \"\"\n"} +{"Time":"2023-05-31T13:10:27.387169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387171-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Config\": {\n"} +{"Time":"2023-05-31T13:10:27.387176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Hostname\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:10:27.387178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Domainname\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.38718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"User\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"AttachStdin\": false,\n"} +{"Time":"2023-05-31T13:10:27.387184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"AttachStdout\": false,\n"} +{"Time":"2023-05-31T13:10:27.387186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"AttachStderr\": false,\n"} +{"Time":"2023-05-31T13:10:27.387188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"ExposedPorts\": {\n"} +{"Time":"2023-05-31T13:10:27.38719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"22/tcp\": {},\n"} +{"Time":"2023-05-31T13:10:27.387192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"2376/tcp\": {},\n"} +{"Time":"2023-05-31T13:10:27.387194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"32443/tcp\": {},\n"} +{"Time":"2023-05-31T13:10:27.387196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"5000/tcp\": {},\n"} +{"Time":"2023-05-31T13:10:27.387198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"8443/tcp\": {}\n"} +{"Time":"2023-05-31T13:10:27.3872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Tty\": true,\n"} +{"Time":"2023-05-31T13:10:27.387204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"OpenStdin\": false,\n"} +{"Time":"2023-05-31T13:10:27.387206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"StdinOnce\": false,\n"} +{"Time":"2023-05-31T13:10:27.387208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Env\": [\n"} +{"Time":"2023-05-31T13:10:27.38721-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"container=docker\",\n"} +{"Time":"2023-05-31T13:10:27.387212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\"\n"} +{"Time":"2023-05-31T13:10:27.387214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Cmd\": null,\n"} +{"Time":"2023-05-31T13:10:27.387218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Image\": \"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\",\n"} +{"Time":"2023-05-31T13:10:27.387221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Volumes\": null,\n"} +{"Time":"2023-05-31T13:10:27.387222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"WorkingDir\": \"/\",\n"} +{"Time":"2023-05-31T13:10:27.387225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Entrypoint\": [\n"} +{"Time":"2023-05-31T13:10:27.387227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"/usr/local/bin/entrypoint\",\n"} +{"Time":"2023-05-31T13:10:27.387229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"/sbin/init\"\n"} +{"Time":"2023-05-31T13:10:27.387231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"OnBuild\": null,\n"} +{"Time":"2023-05-31T13:10:27.387234-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Labels\": {\n"} +{"Time":"2023-05-31T13:10:27.387238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"created_by.minikube.sigs.k8s.io\": \"true\",\n"} +{"Time":"2023-05-31T13:10:27.38724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"mode.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:10:27.387243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"name.minikube.sigs.k8s.io\": \"old-k8s-version-787000\",\n"} +{"Time":"2023-05-31T13:10:27.387245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"role.minikube.sigs.k8s.io\": \"\"\n"} +{"Time":"2023-05-31T13:10:27.387247-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"StopSignal\": \"SIGRTMIN+3\"\n"} +{"Time":"2023-05-31T13:10:27.387251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"NetworkSettings\": {\n"} +{"Time":"2023-05-31T13:10:27.387255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Bridge\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"SandboxID\": \"e414d12f88a901e4591f85ab0b99c11e72e4006ee377070ddee5d24c3ed9a65c\",\n"} +{"Time":"2023-05-31T13:10:27.387264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HairpinMode\": false,\n"} +{"Time":"2023-05-31T13:10:27.387266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"LinkLocalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.38727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"LinkLocalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Ports\": {\n"} +{"Time":"2023-05-31T13:10:27.387274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"22/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.387276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.387278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.38728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"53620\"\n"} +{"Time":"2023-05-31T13:10:27.387283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387285-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"2376/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.387288-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.38729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.387293-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"53621\"\n"} +{"Time":"2023-05-31T13:10:27.387295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387299-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"32443/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.387301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.387303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.387305-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"53622\"\n"} +{"Time":"2023-05-31T13:10:27.387307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"5000/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.387313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.387315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.387317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"53623\"\n"} +{"Time":"2023-05-31T13:10:27.387319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"8443/tcp\": [\n"} +{"Time":"2023-05-31T13:10:27.387325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t {\n"} +{"Time":"2023-05-31T13:10:27.387327-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostIp\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T13:10:27.387334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"HostPort\": \"53624\"\n"} +{"Time":"2023-05-31T13:10:27.387336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ]\n"} +{"Time":"2023-05-31T13:10:27.38734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.387342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"SandboxKey\": \"/var/run/docker/netns/e414d12f88a9\",\n"} +{"Time":"2023-05-31T13:10:27.387344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"SecondaryIPAddresses\": null,\n"} +{"Time":"2023-05-31T13:10:27.387346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"SecondaryIPv6Addresses\": null,\n"} +{"Time":"2023-05-31T13:10:27.387348-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"EndpointID\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Gateway\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387353-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IPAddress\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IPPrefixLen\": 0,\n"} +{"Time":"2023-05-31T13:10:27.387363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MacAddress\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Networks\": {\n"} +{"Time":"2023-05-31T13:10:27.387369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"old-k8s-version-787000\": {\n"} +{"Time":"2023-05-31T13:10:27.387374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IPAMConfig\": {\n"} +{"Time":"2023-05-31T13:10:27.387376-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IPv4Address\": \"192.168.67.2\"\n"} +{"Time":"2023-05-31T13:10:27.387378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t },\n"} +{"Time":"2023-05-31T13:10:27.38738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Links\": null,\n"} +{"Time":"2023-05-31T13:10:27.387382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Aliases\": [\n"} +{"Time":"2023-05-31T13:10:27.387384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"85229c23efd1\",\n"} +{"Time":"2023-05-31T13:10:27.387387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"old-k8s-version-787000\"\n"} +{"Time":"2023-05-31T13:10:27.387391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ],\n"} +{"Time":"2023-05-31T13:10:27.387393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"NetworkID\": \"68ad52614037dbc86e2a2d399b5a866ee2022456e1a08bf7303a691be00e56ce\",\n"} +{"Time":"2023-05-31T13:10:27.387395-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"EndpointID\": \"3e7b0fb0637e4b93e49c1fc06f35ab57113259a1aef3cf313956cf5781d82a8c\",\n"} +{"Time":"2023-05-31T13:10:27.387397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"Gateway\": \"192.168.67.1\",\n"} +{"Time":"2023-05-31T13:10:27.387399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IPAddress\": \"192.168.67.2\",\n"} +{"Time":"2023-05-31T13:10:27.387402-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IPPrefixLen\": 24,\n"} +{"Time":"2023-05-31T13:10:27.387404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"IPv6Gateway\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387406-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"GlobalIPv6Address\": \"\",\n"} +{"Time":"2023-05-31T13:10:27.387408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"GlobalIPv6PrefixLen\": 0,\n"} +{"Time":"2023-05-31T13:10:27.38741-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"MacAddress\": \"02:42:c0:a8:43:02\",\n"} +{"Time":"2023-05-31T13:10:27.387412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t \"DriverOpts\": null\n"} +{"Time":"2023-05-31T13:10:27.387414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.38742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t }\n"} +{"Time":"2023-05-31T13:10:27.387422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t]\n"} +{"Time":"2023-05-31T13:10:27.387424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:27.387426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:10:27.38743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:10:27.737637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.Host}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 2 (350.777174ms)\n"} +{"Time":"2023-05-31T13:10:27.737651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:27.737654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:10:27.737657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRunning\n"} +{"Time":"2023-05-31T13:10:27.737665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:27.737668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:10:27.73767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:10:27.737673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:244: \u003c\u003c\u003c TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop FAILED: start of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T13:10:27.737676-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:245: ======\u003e post-mortem[TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop]: minikube logs \u003c======\n"} +{"Time":"2023-05-31T13:10:27.737679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:247: (dbg) Run: out/minikube-darwin-amd64 -p old-k8s-version-787000 logs -n 25\n"} +{"Time":"2023-05-31T13:10:29.088498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:247: (dbg) Done: out/minikube-darwin-amd64 -p old-k8s-version-787000 logs -n 25: (1.350691129s)\n"} +{"Time":"2023-05-31T13:10:29.113872-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:252: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop logs: \n"} +{"Time":"2023-05-31T13:10:29.113884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:10:29.113887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.11389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T13:10:29.113892-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* |---------|--------------------------------------------------------|------------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T13:10:29.113895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T13:10:29.113904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t|---------|--------------------------------------------------------|------------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T13:10:29.113906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| pause | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113911-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| unpause | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| delete | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| delete | -p embed-certs-128000 | embed-certs-128000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:10:29.11392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| delete | -p | disable-driver-mounts-590000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:58 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | disable-driver-mounts-590000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.11393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| start | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:58 PDT | 31 May 23 12:59 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113933-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113937-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.11394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --apiserver-port=8444 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| addons | enable metrics-server -p default-k8s-diff-port-707000 | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:59 PDT | 31 May 23 12:59 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --images=MetricsServer=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --registries=MetricsServer=fake.domain | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| stop | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:59 PDT | 31 May 23 12:59 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr -v=3 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.11396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| addons | enable dashboard -p default-k8s-diff-port-707000 | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:59 PDT | 31 May 23 12:59 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --images=MetricsScraper=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| start | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 12:59 PDT | 31 May 23 13:04 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.11397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --apiserver-port=8444 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.11398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --driver=docker | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113984-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| ssh | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 13:05 PDT | 31 May 23 13:05 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | sudo crictl images -o json | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| pause | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 13:05 PDT | 31 May 23 13:05 PDT |\n"} +{"Time":"2023-05-31T13:10:29.113994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.113998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| unpause | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 13:05 PDT | 31 May 23 13:05 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| delete | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 13:05 PDT | 31 May 23 13:05 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114018-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| delete | -p | default-k8s-diff-port-707000 | jenkins | v1.30.1 | 31 May 23 13:05 PDT | 31 May 23 13:05 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | default-k8s-diff-port-707000 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| start | -p newest-cni-533000 --memory=2200 --alsologtostderr | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:05 PDT | 31 May 23 13:05 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --wait=apiserver,system_pods,default_sa | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --feature-gates ServerSideApply=true | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.11404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --network-plugin=cni | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --driver=docker --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| addons | enable metrics-server -p newest-cni-533000 | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:05 PDT | 31 May 23 13:05 PDT |\n"} +{"Time":"2023-05-31T13:10:29.11405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --images=MetricsServer=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114053-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --registries=MetricsServer=fake.domain | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| stop | -p newest-cni-533000 | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:05 PDT | 31 May 23 13:06 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114057-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr -v=3 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114061-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| addons | enable dashboard -p newest-cni-533000 | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:06 PDT | 31 May 23 13:06 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --images=MetricsScraper=registry.k8s.io/echoserver:1.4 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| start | -p newest-cni-533000 --memory=2200 --alsologtostderr | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:06 PDT | 31 May 23 13:06 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --wait=apiserver,system_pods,default_sa | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.11407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --feature-gates ServerSideApply=true | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --network-plugin=cni | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --driver=docker --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.11408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| ssh | -p newest-cni-533000 sudo | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:06 PDT | 31 May 23 13:06 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | crictl images -o json | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| pause | -p newest-cni-533000 | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:06 PDT | 31 May 23 13:06 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| unpause | -p newest-cni-533000 | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:06 PDT | 31 May 23 13:06 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T13:10:29.114094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| delete | -p newest-cni-533000 | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:06 PDT | 31 May 23 13:06 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t| delete | -p newest-cni-533000 | newest-cni-533000 | jenkins | v1.30.1 | 31 May 23 13:06 PDT | 31 May 23 13:06 PDT |\n"} +{"Time":"2023-05-31T13:10:29.114098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t|---------|--------------------------------------------------------|------------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T13:10:29.1141-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.114105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T13:10:29.114107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* Log file created at: 2023/05/31 13:06:05\n"} +{"Time":"2023-05-31T13:10:29.114109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRunning on machine: MacOS-Agent-3\n"} +{"Time":"2023-05-31T13:10:29.114112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tBinary: Built with gc go1.20.4 for darwin/amd64\n"} +{"Time":"2023-05-31T13:10:29.114114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T13:10:29.114116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.613325 19668 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T13:10:29.114118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.613526 19668 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T13:10:29.11412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.613531 19668 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T13:10:29.114122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.613536 19668 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T13:10:29.114124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.613654 19668 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1078/.minikube/bin\n"} +{"Time":"2023-05-31T13:10:29.114127-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.614972 19668 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T13:10:29.114129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.634024 19668 start.go:127] hostinfo: {\"hostname\":\"MacOS-Agent-3.local\",\"uptime\":5733,\"bootTime\":1685557832,\"procs\":400,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"bd1c05a8-24a6-5973-aa69-f3c7c66a87ce\"}\n"} +{"Time":"2023-05-31T13:10:29.114134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:05.634113 19668 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T13:10:29.114136-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.656186 19668 out.go:177] * [newest-cni-533000] minikube v1.30.1 on Darwin 13.4\n"} +{"Time":"2023-05-31T13:10:29.114138-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.698619 19668 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T13:10:29.11414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.720200 19668 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T13:10:29.114142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.741483 19668 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T13:10:29.114144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.762368 19668 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-amd64\n"} +{"Time":"2023-05-31T13:10:29.114146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.783072 19668 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T13:10:29.114149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.804455 19668 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1078/.minikube\n"} +{"Time":"2023-05-31T13:10:29.114151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.825451 19668 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T13:10:29.114153-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.846930 19668 config.go:182] Loaded profile config \"newest-cni-533000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.114156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.847707 19668 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T13:10:29.114158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.903832 19668 docker.go:121] docker version: linux-24.0.2:Docker Desktop 4.20.0 (109717)\n"} +{"Time":"2023-05-31T13:10:29.11416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.903955 19668 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T13:10:29.114165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:05.995466 19668 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:2 ContainersRunning:1 ContainersPaused:0 ContainersStopped:1 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:63 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 20:06:05.983915921 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T13:10:29.114173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T13:10:29.114176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T13:10:29.114179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T13:10:29.114182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T13:10:29.114185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.017094 19668 out.go:177] * Using the docker driver based on existing profile\n"} +{"Time":"2023-05-31T13:10:29.114187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.037769 19668 start.go:297] selected driver: docker\n"} +{"Time":"2023-05-31T13:10:29.114191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.037783 19668 start.go:875] validating driver \"docker\" against \u0026{Name:newest-cni-533000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:newest-cni-533000 Namespace:default APIServerName:miniku"} +{"Time":"2023-05-31T13:10:29.114194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"beCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: "} +{"Time":"2023-05-31T13:10:29.114197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T13:10:29.114201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.037858 19668 start.go:886] status for docker: {Installed:true Healthy:true Running:false NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T13:10:29.114204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.040498 19668 cli_runner.go:164] Run: docker system info --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T13:10:29.114213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.145667 19668 info.go:266] docker info: {ID:c18f23ef-4e44-410e-b2ce-38db72a58e15 Containers:2 ContainersRunning:1 ContainersPaused:0 ContainersStopped:1 Images:3 Driver:overlay2 DriverStatus:[[Backing Filesystem extfs] [Supports d_type true] [Using metacopy false] [Native Overlay Diff true] [userxattr false]] SystemStatus:\u003cnil\u003e Plugins:{Volume:[local] Network:[bridge host ipvlan macvlan null overlay] Authorization:\u003cnil\u003e Log:[awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog]} MemoryLimit:true SwapLimit:true KernelMemory:false KernelMemoryTCP:false CPUCfsPeriod:true CPUCfsQuota:true CPUShares:true CPUSet:true PidsLimit:true IPv4Forwarding:true BridgeNfIptables:true BridgeNfIP6Tables:true Debug:false NFd:63 OomKillDisable:false NGoroutines:66 SystemTime:2023-05-31 20:06:06.125387595 +0000 UTC LoggingDriver:json-file CgroupDriver:cgroupfs NEventsListener:7 KernelVersion:5.15.49-linuxkit-pr OperatingSystem:Docker Desktop OSType:linux Architecture:x86_64 IndexS"} +{"Time":"2023-05-31T13:10:29.114219-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"erverAddress:https://index.docker.io/v1/ RegistryConfig:{AllowNondistributableArtifactsCIDRs:[] AllowNondistributableArtifactsHostnames:[] InsecureRegistryCIDRs:[127.0.0.0/8] IndexConfigs:{DockerIo:{Name:docker.io Mirrors:[] Secure:true Official:true}} Mirrors:[]} NCPU:6 MemTotal:6231715840 GenericResources:\u003cnil\u003e DockerRootDir:/var/lib/docker HTTPProxy:http.docker.internal:3128 HTTPSProxy:http.docker.internal:3128 NoProxy:hubproxy.docker.internal Name:docker-desktop Labels:[] ExperimentalBuild:false ServerVersion:24.0.2 ClusterStore: ClusterAdvertise: Runtimes:{Runc:{Path:runc}} DefaultRuntime:runc Swarm:{NodeID: NodeAddr: LocalNodeState:inactive ControlAvailable:false Error: RemoteManagers:\u003cnil\u003e} LiveRestoreEnabled:false Isolation: InitBinary:docker-init ContainerdCommit:{ID:3dce8eb055cbb6872793272b4f20ed16117344f8 Expected:3dce8eb055cbb6872793272b4f20ed16117344f8} RuncCommit:{ID:v1.1.7-0-g860f061 Expected:v1.1.7-0-g860f061} InitCommit:{ID:de40ad0 Expected:de40ad0} SecurityOptions:[name=seccomp,profile=built"} +{"Time":"2023-05-31T13:10:29.114222-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"in name=cgroupns] ProductLicense: Warnings:\u003cnil\u003e ServerErrors:[] ClientInfo:{Debug:false Plugins:[map[Name:buildx Path:/Users/jenkins/.docker/cli-plugins/docker-buildx SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-buildx] ShortDescription:Docker Buildx Vendor:Docker Inc. Version:v0.10.5] map[Name:compose Path:/Users/jenkins/.docker/cli-plugins/docker-compose SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-compose] ShortDescription:Docker Compose Vendor:Docker Inc. Version:v2.18.1] map[Name:dev Path:/Users/jenkins/.docker/cli-plugins/docker-dev SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-dev] ShortDescription:Docker Dev Environments Vendor:Docker Inc. Version:v0.1.0] map[Name:extension Path:/Users/jenkins/.docker/cli-plugins/docker-extension SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-extension] ShortDescription:Manages Docker extensions Vendor:Docker Inc. Version:v0.2.19] map[Name:init Pat"} +{"Time":"2023-05-31T13:10:29.114225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"h:/Users/jenkins/.docker/cli-plugins/docker-init SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-init] ShortDescription:Creates Docker-related starter files for your project Vendor:Docker Inc. Version:v0.1.0-beta.4] map[Name:sbom Path:/Users/jenkins/.docker/cli-plugins/docker-sbom SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-sbom] ShortDescription:View the packaged-based Software Bill Of Materials (SBOM) for an image URL:https://github.com/docker/sbom-cli-plugin Vendor:Anchore Inc. Version:0.6.0] map[Name:scan Path:/Users/jenkins/.docker/cli-plugins/docker-scan SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scan] ShortDescription:Docker Scan Vendor:Docker Inc. Version:v0.26.0] map[Name:scout Path:/Users/jenkins/.docker/cli-plugins/docker-scout SchemaVersion:0.1.0 ShadowedPaths:[/usr/local/lib/docker/cli-plugins/docker-scout] ShortDescription:Command line tool for Docker Scout Vendor:Docker Inc. Version:v0.12.0]] Warnings:\u003c"} +{"Time":"2023-05-31T13:10:29.114228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"nil\u003e}}\n"} +{"Time":"2023-05-31T13:10:29.11423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.145893 19668 start_flags.go:938] Waiting for components: map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true]\n"} +{"Time":"2023-05-31T13:10:29.114233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.145911 19668 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T13:10:29.114235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.145926 19668 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T13:10:29.114239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.145934 19668 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T13:10:29.114243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t{Name:newest-cni-533000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:newest-cni-533000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:"} +{"Time":"2023-05-31T13:10:29.114246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"docker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s"} +{"Time":"2023-05-31T13:10:29.11425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T13:10:29.114254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.188312 19668 out.go:177] * Starting control plane node newest-cni-533000 in cluster newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114256-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.209313 19668 cache.go:122] Beginning downloading kic base image for docker with docker\n"} +{"Time":"2023-05-31T13:10:29.11426-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.253327 19668 out.go:177] * Pulling base image ...\n"} +{"Time":"2023-05-31T13:10:29.114262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.274420 19668 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T13:10:29.114266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.274453 19668 image.go:79] Checking for gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon\n"} +{"Time":"2023-05-31T13:10:29.114269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.274485 19668 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T13:10:29.114271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.274499 19668 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T13:10:29.114273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.274646 19668 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1078/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-amd64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T13:10:29.114276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.274661 19668 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T13:10:29.114278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.275423 19668 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/config.json ...\n"} +{"Time":"2023-05-31T13:10:29.11428-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.324245 19668 image.go:83] Found gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 in local docker daemon, skipping pull\n"} +{"Time":"2023-05-31T13:10:29.114283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.324262 19668 cache.go:145] gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 exists in daemon, skipping load\n"} +{"Time":"2023-05-31T13:10:29.114287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.324281 19668 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T13:10:29.114289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.324328 19668 start.go:364] acquiring machines lock for newest-cni-533000: {Name:mk1396a2fb52bfeadd57df03cc9fa81dd734145f Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.114291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.324431 19668 start.go:368] acquired machines lock for \"newest-cni-533000\" in 81.922µs\n"} +{"Time":"2023-05-31T13:10:29.114294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.324458 19668 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T13:10:29.114296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.324466 19668 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T13:10:29.1143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.324724 19668 cli_runner.go:164] Run: docker container inspect newest-cni-533000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:10:29.114302-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.374877 19668 fix.go:103] recreateIfNeeded on newest-cni-533000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T13:10:29.114304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:06.374910 19668 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T13:10:29.114306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.396570 19668 out.go:177] * Restarting existing docker container for \"newest-cni-533000\" ...\n"} +{"Time":"2023-05-31T13:10:29.11431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.439551 19668 cli_runner.go:164] Run: docker start newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114312-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.696138 19668 cli_runner.go:164] Run: docker container inspect newest-cni-533000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:10:29.114319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.747995 19668 kic.go:426] container \"newest-cni-533000\" state is running.\n"} +{"Time":"2023-05-31T13:10:29.114322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.748571 19668 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114324-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.805173 19668 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/config.json ...\n"} +{"Time":"2023-05-31T13:10:29.114331-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.805709 19668 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T13:10:29.114333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.805735 19668 ubuntu.go:169] provisioning hostname \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.114336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.805824 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.866650 19668 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:10:29.11434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.867127 19668 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54748 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.114343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.867149 19668 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:10:29.114345-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tsudo hostname newest-cni-533000 \u0026\u0026 echo \"newest-cni-533000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T13:10:29.114347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:06.868643 19668 main.go:141] libmachine: Error dialing TCP: ssh: handshake failed: EOF\n"} +{"Time":"2023-05-31T13:10:29.114349-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:09.998230 19668 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:09.998314 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.047788 19668 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:10:29.114358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.048166 19668 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54748 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.114361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.048180 19668 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:10:29.114363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\t\tif ! grep -xq '.*\\snewest-cni-533000' /etc/hosts; then\n"} +{"Time":"2023-05-31T13:10:29.114367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T13:10:29.114369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 newest-cni-533000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T13:10:29.114371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T13:10:29.114374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\t\t\t\techo '127.0.1.1 newest-cni-533000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T13:10:29.114377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T13:10:29.11438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T13:10:29.114382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.164075 19668 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T13:10:29.114384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.164101 19668 ubuntu.go:175] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1078/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1078/.minikube}\n"} +{"Time":"2023-05-31T13:10:29.11439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.164128 19668 ubuntu.go:177] setting up certificates\n"} +{"Time":"2023-05-31T13:10:29.114392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.164136 19668 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T13:10:29.114394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.164212 19668 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114398-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.213820 19668 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T13:10:29.1144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.213913 19668 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T13:10:29.114403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.213921 19668 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem\n"} +{"Time":"2023-05-31T13:10:29.114405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.214040 19668 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T13:10:29.114408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.214260 19668 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T13:10:29.11441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.214266 19668 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem\n"} +{"Time":"2023-05-31T13:10:29.114413-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.214331 19668 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T13:10:29.114415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.214486 19668 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T13:10:29.114417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.214492 19668 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem\n"} +{"Time":"2023-05-31T13:10:29.114419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.214551 19668 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1078/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T13:10:29.114422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.214683 19668 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem org=jenkins.newest-cni-533000 san=[192.168.76.2 127.0.0.1 localhost 127.0.0.1 minikube newest-cni-533000]\n"} +{"Time":"2023-05-31T13:10:29.114425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.385529 19668 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T13:10:29.114427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.385590 19668 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T13:10:29.114429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.385644 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.435519 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.114434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.522961 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T13:10:29.114436-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.545808 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1229 bytes)\n"} +{"Time":"2023-05-31T13:10:29.114438-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.569131 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T13:10:29.114441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.592236 19668 provision.go:86] duration metric: configureAuth took 428.069074ms\n"} +{"Time":"2023-05-31T13:10:29.114443-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.592255 19668 ubuntu.go:193] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T13:10:29.114445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.592438 19668 config.go:182] Loaded profile config \"newest-cni-533000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.114448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.592508 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.11445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.644903 19668 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:10:29.114452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.645307 19668 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54748 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.114455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.645317 19668 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:10:29.114457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T13:10:29.114459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.761860 19668 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: overlay\n"} +{"Time":"2023-05-31T13:10:29.114463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.761881 19668 ubuntu.go:71] root file system type: overlay\n"} +{"Time":"2023-05-31T13:10:29.114468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.761976 19668 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T13:10:29.11447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.762074 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.114472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.811814 19668 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:10:29.114474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.812149 19668 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54748 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.114477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.812205 19668 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:10:29.114479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %!s(MISSING) \"[Unit]\n"} +{"Time":"2023-05-31T13:10:29.114481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T13:10:29.114483-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T13:10:29.114485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T13:10:29.114487-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T13:10:29.114489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T13:10:29.114491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T13:10:29.114493-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T13:10:29.114495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T13:10:29.114497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[Service]\n"} +{"Time":"2023-05-31T13:10:29.1145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tType=notify\n"} +{"Time":"2023-05-31T13:10:29.114502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T13:10:29.114505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.11451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T13:10:29.114512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T13:10:29.114516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T13:10:29.114519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T13:10:29.114521-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T13:10:29.114523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T13:10:29.114525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T13:10:29.114527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T13:10:29.114531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T13:10:29.114533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T13:10:29.114536-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T13:10:29.114538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T13:10:29.11454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T13:10:29.114544-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T13:10:29.114546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T13:10:29.114548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T13:10:29.11455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T13:10:29.114552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T13:10:29.114558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T13:10:29.11456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T13:10:29.114562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T13:10:29.114564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T13:10:29.114568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T13:10:29.11457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T13:10:29.114574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T13:10:29.114576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[Install]\n"} +{"Time":"2023-05-31T13:10:29.11458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T13:10:29.114582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T13:10:29.114584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.937676 19668 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T13:10:29.114587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T13:10:29.114589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T13:10:29.114591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tBindsTo=containerd.service\n"} +{"Time":"2023-05-31T13:10:29.114593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tAfter=network-online.target firewalld.service containerd.service\n"} +{"Time":"2023-05-31T13:10:29.114675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tWants=network-online.target\n"} +{"Time":"2023-05-31T13:10:29.11468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRequires=docker.socket\n"} +{"Time":"2023-05-31T13:10:29.114683-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T13:10:29.114685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T13:10:29.114687-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[Service]\n"} +{"Time":"2023-05-31T13:10:29.114694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tType=notify\n"} +{"Time":"2023-05-31T13:10:29.114697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T13:10:29.1147-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T13:10:29.114713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T13:10:29.114717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T13:10:29.114719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T13:10:29.114722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T13:10:29.114724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T13:10:29.114726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T13:10:29.114728-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T13:10:29.11482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T13:10:29.114824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T13:10:29.114828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=docker --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T13:10:29.114832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T13:10:29.114836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T13:10:29.114842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T13:10:29.114845-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T13:10:29.114848-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T13:10:29.114849-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T13:10:29.114852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T13:10:29.114871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T13:10:29.114884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T13:10:29.1149-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T13:10:29.114904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.114908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T13:10:29.114995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T13:10:29.115001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.115003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T13:10:29.115005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T13:10:29.115007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.115009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[Install]\n"} +{"Time":"2023-05-31T13:10:29.115011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T13:10:29.115015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.115025-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.937792 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.115031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.987563 19668 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T13:10:29.115033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.987925 19668 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x140c4a0] 0x140f540 \u003cnil\u003e [] 0s} 127.0.0.1 54748 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.115036-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:10.987939 19668 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T13:10:29.115038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T13:10:29.115041-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.107160 19668 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T13:10:29.115043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.107178 19668 machine.go:91] provisioned docker machine in 4.301329403s\n"} +{"Time":"2023-05-31T13:10:29.115046-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.107186 19668 start.go:300] post-start starting for \"newest-cni-533000\" (driver=\"docker\")\n"} +{"Time":"2023-05-31T13:10:29.115048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.107192 19668 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T13:10:29.115158-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.107256 19668 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T13:10:29.115165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.107310 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.115169-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.156753 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.115172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.244290 19668 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T13:10:29.115176-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.248466 19668 main.go:141] libmachine: Couldn't set key VERSION_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T13:10:29.115178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.248489 19668 main.go:141] libmachine: Couldn't set key PRIVACY_POLICY_URL, no corresponding struct field found\n"} +{"Time":"2023-05-31T13:10:29.115181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.248496 19668 main.go:141] libmachine: Couldn't set key UBUNTU_CODENAME, no corresponding struct field found\n"} +{"Time":"2023-05-31T13:10:29.115183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.248503 19668 info.go:137] Remote host: Ubuntu 22.04.2 LTS\n"} +{"Time":"2023-05-31T13:10:29.115185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.248522 19668 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T13:10:29.115188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.248622 19668 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1078/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T13:10:29.11519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.248788 19668 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem -\u003e 15662.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T13:10:29.115192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.248955 19668 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T13:10:29.115238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.258013 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T13:10:29.115241-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.280135 19668 start.go:303] post-start completed in 172.933604ms\n"} +{"Time":"2023-05-31T13:10:29.115243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.280217 19668 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T13:10:29.115246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.280276 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.115248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.331204 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.115251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.413605 19668 ssh_runner.go:195] Run: sh -c \"df -BG /var | awk 'NR==2{print $4}'\"\n"} +{"Time":"2023-05-31T13:10:29.115253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.418880 19668 fix.go:57] fixHost completed within 5.094253052s\n"} +{"Time":"2023-05-31T13:10:29.115255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.418898 19668 start.go:83] releasing machines lock for \"newest-cni-533000\", held for 5.094307137s\n"} +{"Time":"2023-05-31T13:10:29.115258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.418991 19668 cli_runner.go:164] Run: docker container inspect -f \"{{range .NetworkSettings.Networks}}{{.IPAddress}},{{.GlobalIPv6Address}}{{end}}\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.11526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.468694 19668 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T13:10:29.115262-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.468725 19668 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T13:10:29.115264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.468772 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.115267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.468799 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.115269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.522785 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.115301-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.522810 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.115304-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.713480 19668 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T13:10:29.115306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.718839 19668 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T13:10:29.115311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.724349 19668 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *loopback.conf* -not -name *.mk_disabled -exec sh -c \"grep -q loopback {} \u0026\u0026 ( grep -q name {} || sudo sed -i '/\"type\": \"loopback\"/i \\ \\ \\ \\ \"name\": \"loopback\",' {} ) \u0026\u0026 sudo sed -i 's|\"cniVersion\": \".*\"|\"cniVersion\": \"1.0.0\"|g' {}\" ;\n"} +{"Time":"2023-05-31T13:10:29.115314-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.742466 19668 cni.go:229] loopback cni configuration patched: \"/etc/cni/net.d/*loopback.conf*\" found\n"} +{"Time":"2023-05-31T13:10:29.115316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.742542 19668 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f ( ( -name *bridge* -or -name *podman* ) -and -not -name *.mk_disabled ) -printf \"%!p(MISSING), \" -exec sh -c \"sudo mv {} {}.mk_disabled\" ;\n"} +{"Time":"2023-05-31T13:10:29.115319-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.751812 19668 cni.go:258] no active bridge cni configs found in \"/etc/cni/net.d\" - nothing to disable\n"} +{"Time":"2023-05-31T13:10:29.115321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.751826 19668 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T13:10:29.115323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.751841 19668 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T13:10:29.115386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.751941 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T13:10:29.115389-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T13:10:29.115391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.767602 19668 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.9\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:10:29.115394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.778090 19668 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:10:29.115399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.788533 19668 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T13:10:29.115401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.788599 19668 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:10:29.115404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.798963 19668 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:10:29.115407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.809089 19668 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:10:29.11541-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.819422 19668 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:10:29.115412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.829743 19668 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T13:10:29.115414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.839378 19668 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T13:10:29.115417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.849246 19668 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T13:10:29.115458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.858110 19668 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T13:10:29.115464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.866624 19668 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T13:10:29.115467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:11.937499 19668 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T13:10:29.115469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.018764 19668 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T13:10:29.115472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.018788 19668 detect.go:196] detected \"cgroupfs\" cgroup driver on host os\n"} +{"Time":"2023-05-31T13:10:29.115474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.018856 19668 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T13:10:29.115476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.034000 19668 cruntime.go:276] skipping containerd shutdown because we are bound to it\n"} +{"Time":"2023-05-31T13:10:29.115478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.034094 19668 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T13:10:29.11548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.049213 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T13:10:29.115489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T13:10:29.115494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.070702 19668 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T13:10:29.115497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.077140 19668 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T13:10:29.115499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.103947 19668 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T13:10:29.115501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.127132 19668 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T13:10:29.115503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.234161 19668 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T13:10:29.115506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.336044 19668 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T13:10:29.115559-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.336061 19668 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T13:10:29.115562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.353524 19668 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T13:10:29.115565-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.441750 19668 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T13:10:29.115567-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.723557 19668 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T13:10:29.115569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.790096 19668 ssh_runner.go:195] Run: sudo systemctl unmask cri-docker.socket\n"} +{"Time":"2023-05-31T13:10:29.115572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.876960 19668 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T13:10:29.115574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:12.953971 19668 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T13:10:29.115576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.030199 19668 ssh_runner.go:195] Run: sudo systemctl restart cri-docker.socket\n"} +{"Time":"2023-05-31T13:10:29.11558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.053197 19668 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T13:10:29.115582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.122898 19668 ssh_runner.go:195] Run: sudo systemctl restart cri-docker\n"} +{"Time":"2023-05-31T13:10:29.115588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.198590 19668 start.go:528] Will wait 60s for socket path /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T13:10:29.115591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.198700 19668 ssh_runner.go:195] Run: stat /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T13:10:29.115593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.203613 19668 start.go:549] Will wait 60s for crictl version\n"} +{"Time":"2023-05-31T13:10:29.115595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.203713 19668 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T13:10:29.115597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.208575 19668 ssh_runner.go:195] Run: sudo /usr/bin/crictl version\n"} +{"Time":"2023-05-31T13:10:29.115601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.256960 19668 start.go:565] Version: 0.1.0\n"} +{"Time":"2023-05-31T13:10:29.115603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRuntimeName: docker\n"} +{"Time":"2023-05-31T13:10:29.115703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRuntimeVersion: 24.0.1\n"} +{"Time":"2023-05-31T13:10:29.115706-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tRuntimeApiVersion: v1\n"} +{"Time":"2023-05-31T13:10:29.115708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.257047 19668 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T13:10:29.115711-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.284577 19668 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T13:10:29.115713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.356330 19668 out.go:204] * Preparing Kubernetes v1.27.2 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T13:10:29.115715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.356506 19668 cli_runner.go:164] Run: docker exec -t newest-cni-533000 dig +short host.docker.internal\n"} +{"Time":"2023-05-31T13:10:29.115717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.477067 19668 network.go:96] got host ip for mount in container by digging dns: 192.168.65.254\n"} +{"Time":"2023-05-31T13:10:29.11572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.477204 19668 ssh_runner.go:195] Run: grep 192.168.65.254\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T13:10:29.115722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.482067 19668 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.65.254\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T13:10:29.115725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.493376 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.115727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.565553 19668 out.go:177] - kubeadm.pod-network-cidr=10.42.0.0/16\n"} +{"Time":"2023-05-31T13:10:29.115729-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.586238 19668 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T13:10:29.115732-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.586325 19668 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T13:10:29.115734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.608130 19668 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T13:10:29.115736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.115738-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.115882-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.115887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.115889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T13:10:29.115891-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T13:10:29.115893-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T13:10:29.115895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T13:10:29.115897-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.115899-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T13:10:29.115901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.608155 19668 docker.go:563] Images already preloaded, skipping extraction\n"} +{"Time":"2023-05-31T13:10:29.115904-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.608255 19668 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T13:10:29.115906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.630145 19668 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T13:10:29.115908-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.11591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.115912-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.115914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.115919-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T13:10:29.115922-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T13:10:29.115923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T13:10:29.115925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T13:10:29.115927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.116077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T13:10:29.116082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.630165 19668 cache_images.go:84] Images are preloaded, skipping loading\n"} +{"Time":"2023-05-31T13:10:29.116085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.630274 19668 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T13:10:29.116087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.680358 19668 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T13:10:29.11609-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.680383 19668 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T13:10:29.116092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.680402 19668 kubeadm.go:87] Using pod CIDR: 10.42.0.0/16\n"} +{"Time":"2023-05-31T13:10:29.116096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.680417 19668 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.42.0.0/16 AdvertiseAddress:192.168.76.2 APIServerPort:8443 KubernetesVersion:v1.27.2 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:newest-cni-533000 NodeName:newest-cni-533000 DNSDomain:cluster.local CRISocket:/var/run/cri-dockerd.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota feature-gates:ServerSideApply=true] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.76.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true feature-gates:ServerSideApply=true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[feature-gates:ServerSideApply=true leader-elect:false] Pairs:map[]}] FeatureArgs:map["} +{"Time":"2023-05-31T13:10:29.116103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"] NodeIP:192.168.76.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt StaticPodPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:true}\n"} +{"Time":"2023-05-31T13:10:29.116106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.680545 19668 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T13:10:29.116108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T13:10:29.11611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T13:10:29.116112-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T13:10:29.116114-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t advertiseAddress: 192.168.76.2\n"} +{"Time":"2023-05-31T13:10:29.116225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T13:10:29.11623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T13:10:29.116236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t - groups:\n"} +{"Time":"2023-05-31T13:10:29.116238-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T13:10:29.11624-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T13:10:29.116242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t usages:\n"} +{"Time":"2023-05-31T13:10:29.116244-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t - signing\n"} +{"Time":"2023-05-31T13:10:29.116246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t - authentication\n"} +{"Time":"2023-05-31T13:10:29.116249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T13:10:29.116251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t criSocket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T13:10:29.116253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t name: \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.116255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T13:10:29.116259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t node-ip: 192.168.76.2\n"} +{"Time":"2023-05-31T13:10:29.116261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t taints: []\n"} +{"Time":"2023-05-31T13:10:29.116263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t---\n"} +{"Time":"2023-05-31T13:10:29.116265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T13:10:29.116267-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T13:10:29.116269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T13:10:29.116271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.76.2\"]\n"} +{"Time":"2023-05-31T13:10:29.116275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T13:10:29.116278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T13:10:29.116371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t feature-gates: \"ServerSideApply=true\"\n"} +{"Time":"2023-05-31T13:10:29.116375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T13:10:29.116378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T13:10:29.11638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T13:10:29.116382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t feature-gates: \"ServerSideApply=true\"\n"} +{"Time":"2023-05-31T13:10:29.116384-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T13:10:29.116386-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T13:10:29.116388-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T13:10:29.11639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t feature-gates: \"ServerSideApply=true\"\n"} +{"Time":"2023-05-31T13:10:29.116392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T13:10:29.116394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T13:10:29.116396-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T13:10:29.116401-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T13:10:29.116405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tetcd:\n"} +{"Time":"2023-05-31T13:10:29.116408-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t local:\n"} +{"Time":"2023-05-31T13:10:29.11641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T13:10:29.116412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T13:10:29.116414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T13:10:29.116416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tkubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.116418-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T13:10:29.11642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T13:10:29.116424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t podSubnet: \"10.42.0.0/16\"\n"} +{"Time":"2023-05-31T13:10:29.116546-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T13:10:29.116551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t---\n"} +{"Time":"2023-05-31T13:10:29.116554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T13:10:29.116556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T13:10:29.116558-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T13:10:29.11656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t x509:\n"} +{"Time":"2023-05-31T13:10:29.116562-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T13:10:29.116564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T13:10:29.116566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T13:10:29.116568-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T13:10:29.11657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T13:10:29.116572-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T13:10:29.116574-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T13:10:29.116576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T13:10:29.116578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t nodefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T13:10:29.11658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t nodefs.inodesFree: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T13:10:29.116582-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t imagefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T13:10:29.116585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T13:10:29.116587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T13:10:29.116593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t---\n"} +{"Time":"2023-05-31T13:10:29.116595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T13:10:29.116597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T13:10:29.116765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tclusterCIDR: \"10.42.0.0/16\"\n"} +{"Time":"2023-05-31T13:10:29.11677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T13:10:29.116772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T13:10:29.116774-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T13:10:29.116776-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T13:10:29.116778-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T13:10:29.116785-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T13:10:29.116787-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T13:10:29.116789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.116792-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.680628 19668 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T13:10:29.116794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T13:10:29.116795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.116797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[Service]\n"} +{"Time":"2023-05-31T13:10:29.116799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T13:10:29.116802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --feature-gates=ServerSideApply=true --hostname-override=newest-cni-533000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.76.2\n"} +{"Time":"2023-05-31T13:10:29.116808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.11681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[Install]\n"} +{"Time":"2023-05-31T13:10:29.116812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t config:\n"} +{"Time":"2023-05-31T13:10:29.116814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t{KubernetesVersion:v1.27.2 ClusterName:newest-cni-533000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T13:10:29.116965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.680695 19668 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.11697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.690271 19668 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T13:10:29.116973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.690337 19668 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T13:10:29.116977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.699130 19668 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (415 bytes)\n"} +{"Time":"2023-05-31T13:10:29.116981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.716330 19668 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T13:10:29.116988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.733241 19668 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2224 bytes)\n"} +{"Time":"2023-05-31T13:10:29.116991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.750003 19668 ssh_runner.go:195] Run: grep 192.168.76.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T13:10:29.116994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.754705 19668 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.76.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T13:10:29.116998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766260 19668 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000 for IP: 192.168.76.2\n"} +{"Time":"2023-05-31T13:10:29.117002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766281 19668 certs.go:190] acquiring lock for shared ca certs: {Name:mked8c2dd055de2e1347e7d3eb67064ed45ef5f2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.117004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766442 19668 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key\n"} +{"Time":"2023-05-31T13:10:29.117008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766525 19668 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T13:10:29.117199-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766616 19668 certs.go:315] skipping minikube-user signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/client.key\n"} +{"Time":"2023-05-31T13:10:29.117204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766682 19668 certs.go:315] skipping minikube signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/apiserver.key.31bdca25\n"} +{"Time":"2023-05-31T13:10:29.117206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766741 19668 certs.go:315] skipping aggregator signed cert generation: /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/proxy-client.key\n"} +{"Time":"2023-05-31T13:10:29.117209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766944 19668 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:13.766979 19668 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T13:10:29.117215-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.766990 19668 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.767025 19668 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T13:10:29.11722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.767072 19668 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117225-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.767106 19668 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.767175 19668 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.767728 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.790281 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.812831 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.835127 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/profiles/newest-cni-533000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1675 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117417-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.857464 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.879858 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.902002 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117424-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.924546 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.947001 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T13:10:29.11743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.969489 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/certs/1566.pem --\u003e /usr/share/ca-certificates/1566.pem (1338 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:13.992437 19668 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1078/.minikube/files/etc/ssl/certs/15662.pem --\u003e /usr/share/ca-certificates/15662.pem (1708 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.014885 19668 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T13:10:29.117627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.031746 19668 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T13:10:29.117632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.037650 19668 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1566.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1566.pem /etc/ssl/certs/1566.pem\"\n"} +{"Time":"2023-05-31T13:10:29.117635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.047913 19668 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T13:10:29.117637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.052513 19668 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:49 /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T13:10:29.11764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.052560 19668 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1566.pem\n"} +{"Time":"2023-05-31T13:10:29.117642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.059890 19668 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1566.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T13:10:29.117645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.069306 19668 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/15662.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/15662.pem /etc/ssl/certs/15662.pem\"\n"} +{"Time":"2023-05-31T13:10:29.117647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.079132 19668 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T13:10:29.11765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.083954 19668 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:49 /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T13:10:29.117652-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.084018 19668 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/15662.pem\n"} +{"Time":"2023-05-31T13:10:29.117654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.091104 19668 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/15662.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T13:10:29.117657-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.100384 19668 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T13:10:29.117659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.110634 19668 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T13:10:29.117661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.115242 19668 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T13:10:29.117782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.115301 19668 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T13:10:29.11779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.122602 19668 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T13:10:29.117793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.131961 19668 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T13:10:29.11781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.136891 19668 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-etcd-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:10:29.117824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.143865 19668 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-kubelet-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:10:29.117829-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.151431 19668 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/server.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:10:29.117833-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.158762 19668 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/healthcheck-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:10:29.117835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.166438 19668 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/peer.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:10:29.117837-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.173616 19668 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/front-proxy-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T13:10:29.117842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.181064 19668 kubeadm.go:404] StartCluster: {Name:newest-cni-533000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:docker HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:newest-cni-533000 Namespace:default APIServerName:minikubeCA APIServerNames:"} +{"Time":"2023-05-31T13:10:29.117949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true default-storageclass:true metrics-server:true storage-provisioner:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: Mul"} +{"Time":"2023-05-31T13:10:29.117953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"tiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T13:10:29.117956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.181185 19668 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T13:10:29.117963-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.202954 19668 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T13:10:29.117965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.212934 19668 kubeadm.go:419] found existing configuration files, will attempt cluster restart\n"} +{"Time":"2023-05-31T13:10:29.117967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.212950 19668 kubeadm.go:636] restartCluster start\n"} +{"Time":"2023-05-31T13:10:29.11797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.213011 19668 ssh_runner.go:195] Run: sudo test -d /data/minikube\n"} +{"Time":"2023-05-31T13:10:29.117972-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.221925 19668 kubeadm.go:127] /data/minikube skipping compat symlinks: sudo test -d /data/minikube: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.117974-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.117976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.117978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.117981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.222001 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.118096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.272119 19668 kubeconfig.go:135] verify returned: extract IP: \"newest-cni-533000\" does not appear in /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T13:10:29.118099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.272290 19668 kubeconfig.go:146] \"newest-cni-533000\" context is missing from /Users/jenkins/minikube-integration/16569-1078/kubeconfig - will repair!\n"} +{"Time":"2023-05-31T13:10:29.118101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.272630 19668 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/kubeconfig: {Name:mk36b1fef13f0c406b5340544ea043a831d9fe53 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.118107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.274217 19668 ssh_runner.go:195] Run: sudo diff -u /var/tmp/minikube/kubeadm.yaml /var/tmp/minikube/kubeadm.yaml.new\n"} +{"Time":"2023-05-31T13:10:29.118109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.283929 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.283994 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:14.294947 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.795722 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:14.795881 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118126-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:14.809066 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118264-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:15.295975 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:15.296098 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118268-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:15.308519 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118275-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:15.795096 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:15.795165 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118282-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:15.806258 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118284-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118289-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:16.296757 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118292-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:16.296866 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:16.309393 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118422-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:16.795766 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:16.795897 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:16.808682 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118441-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:17.295387 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:17.295477 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:17.306319 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.11846-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:17.795828 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118463-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:17.795953 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:17.808643 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118604-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:18.295886 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118613-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:18.296012 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118615-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:18.309014 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.11862-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118622-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:18.795300 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:18.795375 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:18.806443 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.11864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:19.295702 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:19.295808 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:19.308115 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118651-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:19.796010 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:19.796078 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:19.807324 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118835-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.11885-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:20.295289 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:20.295371 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118863-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:20.306301 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118876-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:20.797283 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.11888-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:20.797479 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118884-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:20.810113 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118887-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.11889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.11898-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:21.295346 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:21.295477 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:21.306638 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118987-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.118989-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.118991-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.118993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:21.795263 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.118995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:21.795338 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.118997-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:21.806490 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.118999-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.119002-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.119004-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.119006-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:22.295294 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.119008-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:22.295362 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.119011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:22.306156 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.119013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.119015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.119017-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.119178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:22.795385 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.119182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:22.795574 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.119185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:22.807974 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.119187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.119189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.119191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.119193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:23.295323 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.119195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:23.295402 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.119197-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:23.306197 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.1192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.119202-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.119204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.119206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:23.795341 19668 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T13:10:29.119208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:23.795419 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.119214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:23.806789 19668 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.119216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.119218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.119347-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.119352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.285264 19668 kubeadm.go:611] needs reconfigure: apiserver error: context deadline exceeded\n"} +{"Time":"2023-05-31T13:10:29.119354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.285315 19668 kubeadm.go:1123] stopping kube-system containers ...\n"} +{"Time":"2023-05-31T13:10:29.119357-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.285442 19668 ssh_runner.go:195] Run: docker ps -a --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T13:10:29.119359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.311189 19668 docker.go:459] Stopping containers: [4449bd6da310 d319e1745777 d32849937f35 b9e6facb5ec2 c4f34b2e7bcd c290432510c3 89cdb406cdd8 0d90e0459673 4087f4c90dc1 82be8923222d ff00605a04b3 56425739cf73 f65a5ecda46a e359f3f2b24b 73933b818968 3d4e6807ae1d e93564dfe98e]\n"} +{"Time":"2023-05-31T13:10:29.119362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.311272 19668 ssh_runner.go:195] Run: docker stop 4449bd6da310 d319e1745777 d32849937f35 b9e6facb5ec2 c4f34b2e7bcd c290432510c3 89cdb406cdd8 0d90e0459673 4087f4c90dc1 82be8923222d ff00605a04b3 56425739cf73 f65a5ecda46a e359f3f2b24b 73933b818968 3d4e6807ae1d e93564dfe98e\n"} +{"Time":"2023-05-31T13:10:29.119364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.332487 19668 ssh_runner.go:195] Run: sudo systemctl stop kubelet\n"} +{"Time":"2023-05-31T13:10:29.119366-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.344814 19668 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T13:10:29.119368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.354058 19668 kubeadm.go:155] found existing configuration files:\n"} +{"Time":"2023-05-31T13:10:29.119371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t-rw------- 1 root root 5643 May 31 20:05 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T13:10:29.119373-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t-rw------- 1 root root 5656 May 31 20:05 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T13:10:29.119375-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t-rw------- 1 root root 2007 May 31 20:05 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T13:10:29.119377-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t-rw------- 1 root root 5600 May 31 20:05 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T13:10:29.119379-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.119381-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.354124 19668 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T13:10:29.119584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.363368 19668 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/kubelet.conf\n"} +{"Time":"2023-05-31T13:10:29.119593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.372595 19668 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T13:10:29.119595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.381598 19668 kubeadm.go:166] \"https://control-plane.minikube.internal:8443\" may not be in /etc/kubernetes/controller-manager.conf - will remove: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/controller-manager.conf: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.119601-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.119603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.119605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.119607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.381662 19668 ssh_runner.go:195] Run: sudo rm -f /etc/kubernetes/controller-manager.conf\n"} +{"Time":"2023-05-31T13:10:29.11961-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.390381 19668 ssh_runner.go:195] Run: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T13:10:29.119612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.399417 19668 kubeadm.go:166] \"https://control-plane.minikube.internal:8443\" may not be in /etc/kubernetes/scheduler.conf - will remove: sudo grep https://control-plane.minikube.internal:8443 /etc/kubernetes/scheduler.conf: Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.119614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.119616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.119618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.11962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.399475 19668 ssh_runner.go:195] Run: sudo rm -f /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T13:10:29.119623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.408336 19668 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T13:10:29.119625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.417406 19668 kubeadm.go:713] reconfiguring cluster from /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T13:10:29.119627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.417419 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase certs all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:10:29.119826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.468569 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase kubeconfig all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:10:29.119841-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:24.971134 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase kubelet-start --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:10:29.119847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:25.104867 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase control-plane all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:10:29.11985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:25.158055 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase etcd local --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:10:29.119852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:25.249388 19668 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T13:10:29.119854-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:25.249476 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.119857-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:25.810040 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.11986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:26.310726 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.119864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:26.326961 19668 api_server.go:72] duration metric: took 1.077538926s to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T13:10:29.119868-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:26.326981 19668 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T13:10:29.119871-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:26.327015 19668 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54752/healthz ...\n"} +{"Time":"2023-05-31T13:10:29.119875-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:26.328201 19668 api_server.go:269] stopped: https://127.0.0.1:54752/healthz: Get \"https://127.0.0.1:54752/healthz\": EOF\n"} +{"Time":"2023-05-31T13:10:29.119879-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:26.828539 19668 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54752/healthz ...\n"} +{"Time":"2023-05-31T13:10:29.120054-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:28.529983 19668 api_server.go:279] https://127.0.0.1:54752/healthz returned 403:\n"} +{"Time":"2023-05-31T13:10:29.120059-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T13:10:29.120062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:28.530001 19668 api_server.go:103] status: https://127.0.0.1:54752/healthz returned error 403:\n"} +{"Time":"2023-05-31T13:10:29.120064-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T13:10:29.120067-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:28.530009 19668 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54752/healthz ...\n"} +{"Time":"2023-05-31T13:10:29.12007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:28.563447 19668 api_server.go:279] https://127.0.0.1:54752/healthz returned 403:\n"} +{"Time":"2023-05-31T13:10:29.120072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T13:10:29.120074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:28.563501 19668 api_server.go:103] status: https://127.0.0.1:54752/healthz returned error 403:\n"} +{"Time":"2023-05-31T13:10:29.120077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T13:10:29.120079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:28.828939 19668 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54752/healthz ...\n"} +{"Time":"2023-05-31T13:10:29.120082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:28.835557 19668 api_server.go:279] https://127.0.0.1:54752/healthz returned 500:\n"} +{"Time":"2023-05-31T13:10:29.120084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:10:29.120086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:10:29.120088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:10:29.12009-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:10:29.120229-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:10:29.120236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:10:29.120239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:10:29.120242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:10:29.120245-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:10:29.120249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:10:29.120252-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:10:29.120255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.120266-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.120269-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:10:29.120272-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.120283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.120287-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:10:29.12029-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:10:29.120368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:10:29.120383-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:10:29.12039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:10:29.120393-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:10:29.1204-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120405-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:10:29.120409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:28.835571 19668 api_server.go:103] status: https://127.0.0.1:54752/healthz returned error 500:\n"} +{"Time":"2023-05-31T13:10:29.120423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:10:29.120425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:10:29.120427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:10:29.120429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:10:29.120432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:10:29.120434-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:10:29.120445-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:10:29.120448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:10:29.12045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:10:29.120502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:10:29.120508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:10:29.120512-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.120528-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.120531-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:10:29.120533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120537-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.120543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.120545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:10:29.120549-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:10:29.120551-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120554-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:10:29.120563-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:10:29.120566-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120713-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:10:29.120717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:29.328500 19668 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54752/healthz ...\n"} +{"Time":"2023-05-31T13:10:29.12072-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:29.333664 19668 api_server.go:279] https://127.0.0.1:54752/healthz returned 500:\n"} +{"Time":"2023-05-31T13:10:29.120724-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:10:29.120727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:10:29.12073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:10:29.120734-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:10:29.120737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:10:29.12074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:10:29.120744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:10:29.120747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:10:29.12076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:10:29.120763-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:10:29.120767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:10:29.12077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120781-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.120784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.120935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:10:29.12094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.120948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.120951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:10:29.120956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:10:29.120959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:10:29.120966-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:10:29.120969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120973-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:10:29.120975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:10:29.120977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:29.333680 19668 api_server.go:103] status: https://127.0.0.1:54752/healthz returned error 500:\n"} +{"Time":"2023-05-31T13:10:29.120979-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:10:29.121033-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:10:29.121038-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:10:29.121042-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:10:29.121055-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:10:29.121058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:10:29.12106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:10:29.121062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:10:29.121065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:10:29.121069-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:10:29.121071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:10:29.121073-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.121082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.121085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:10:29.121088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121091-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.121107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.1212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:10:29.12121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:10:29.121227-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121231-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:10:29.121235-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:10:29.121237-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:10:29.12124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121242-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121246-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:10:29.121249-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:29.828410 19668 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54752/healthz ...\n"} +{"Time":"2023-05-31T13:10:29.121251-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:29.834639 19668 api_server.go:279] https://127.0.0.1:54752/healthz returned 500:\n"} +{"Time":"2023-05-31T13:10:29.121253-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:10:29.121255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:10:29.121257-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:10:29.121259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:10:29.121261-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:10:29.121263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:10:29.121411-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:10:29.121416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:10:29.121419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:10:29.121421-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:10:29.121423-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:10:29.121425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121427-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121429-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.121431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T13:10:29.121433-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:10:29.121435-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121439-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.121442-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.121444-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121446-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:10:29.121448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:10:29.12145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:10:29.12161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:10:29.121612-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:10:29.121614-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121618-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:10:29.12162-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:10:29.121623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:29.834659 19668 api_server.go:103] status: https://127.0.0.1:54752/healthz returned error 500:\n"} +{"Time":"2023-05-31T13:10:29.121625-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T13:10:29.121627-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T13:10:29.121629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T13:10:29.121631-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T13:10:29.121633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T13:10:29.121635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T13:10:29.121637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T13:10:29.121639-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/storage-object-count-tracker-hook ok\n"} +{"Time":"2023-05-31T13:10:29.121641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T13:10:29.121643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T13:10:29.121645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T13:10:29.121802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-system-namespaces-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121805-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T13:10:29.12181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T13:10:29.121812-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T13:10:29.121814-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121821-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-deprecated-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.121823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-apiserver-identity-lease-garbage-collector ok\n"} +{"Time":"2023-05-31T13:10:29.121826-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-legacy-token-tracking-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121828-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T13:10:29.12183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T13:10:29.121832-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121834-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121836-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T13:10:29.121838-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T13:10:29.12184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121844-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t[+]poststarthook/apiservice-discovery-controller ok\n"} +{"Time":"2023-05-31T13:10:29.121995-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T13:10:29.122001-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.328420 19668 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54752/healthz ...\n"} +{"Time":"2023-05-31T13:10:29.122007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.333763 19668 api_server.go:279] https://127.0.0.1:54752/healthz returned 200:\n"} +{"Time":"2023-05-31T13:10:29.12201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tok\n"} +{"Time":"2023-05-31T13:10:29.122012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.342170 19668 api_server.go:141] control plane version: v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.122016-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.342187 19668 api_server.go:131] duration metric: took 4.015080128s to wait for apiserver health ...\n"} +{"Time":"2023-05-31T13:10:29.122019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.342195 19668 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T13:10:29.122021-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.342204 19668 cni.go:157] \"docker\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T13:10:29.122023-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.365958 19668 out.go:177] * Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T13:10:29.122026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.402920 19668 ssh_runner.go:195] Run: sudo mkdir -p /etc/cni/net.d\n"} +{"Time":"2023-05-31T13:10:29.12203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.414332 19668 ssh_runner.go:362] scp memory --\u003e /etc/cni/net.d/1-k8s.conflist (457 bytes)\n"} +{"Time":"2023-05-31T13:10:29.122032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.432529 19668 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T13:10:29.122034-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440346 19668 system_pods.go:59] 8 kube-system pods found\n"} +{"Time":"2023-05-31T13:10:29.122037-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440363 19668 system_pods.go:61] \"coredns-5d78c9869d-m5rbf\" [92f2ce3b-7847-4a7b-8aa2-1c0718a9b6d5] Running / Ready:ContainersNotReady (containers with unready status: [coredns]) / ContainersReady:ContainersNotReady (containers with unready status: [coredns])\n"} +{"Time":"2023-05-31T13:10:29.122039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440370 19668 system_pods.go:61] \"etcd-newest-cni-533000\" [37bd2c90-bbc8-42b1-8e80-9069957c24cc] Running / Ready:ContainersNotReady (containers with unready status: [etcd]) / ContainersReady:ContainersNotReady (containers with unready status: [etcd])\n"} +{"Time":"2023-05-31T13:10:29.122188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440375 19668 system_pods.go:61] \"kube-apiserver-newest-cni-533000\" [7cf9d12c-fc54-43c5-979d-b72cea2109e1] Running / Ready:ContainersNotReady (containers with unready status: [kube-apiserver]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-apiserver])\n"} +{"Time":"2023-05-31T13:10:29.122192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440380 19668 system_pods.go:61] \"kube-controller-manager-newest-cni-533000\" [e32b5ff8-5d52-4302-87dd-e99de0d39210] Running / Ready:ContainersNotReady (containers with unready status: [kube-controller-manager]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-controller-manager])\n"} +{"Time":"2023-05-31T13:10:29.122195-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440385 19668 system_pods.go:61] \"kube-proxy-2tx4x\" [bb6b00fb-0e24-42d7-8074-325e4a303447] Running / Ready:ContainersNotReady (containers with unready status: [kube-proxy]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-proxy])\n"} +{"Time":"2023-05-31T13:10:29.122198-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440390 19668 system_pods.go:61] \"kube-scheduler-newest-cni-533000\" [e0c778d8-cc53-40f4-9ef8-0a536fee8231] Running / Ready:ContainersNotReady (containers with unready status: [kube-scheduler]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-scheduler])\n"} +{"Time":"2023-05-31T13:10:29.122201-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440398 19668 system_pods.go:61] \"metrics-server-74d5c6b9c-jcrj8\" [efb88477-2117-481c-b66f-257d1a628f4d] Pending / Ready:ContainersNotReady (containers with unready status: [metrics-server]) / ContainersReady:ContainersNotReady (containers with unready status: [metrics-server])\n"} +{"Time":"2023-05-31T13:10:29.122203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440407 19668 system_pods.go:61] \"storage-provisioner\" [b5bc53ca-0900-43f6-bb5d-d6740378abae] Running / Ready:ContainersNotReady (containers with unready status: [storage-provisioner]) / ContainersReady:ContainersNotReady (containers with unready status: [storage-provisioner])\n"} +{"Time":"2023-05-31T13:10:29.122206-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440415 19668 system_pods.go:74] duration metric: took 7.872222ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T13:10:29.122208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.440423 19668 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T13:10:29.12221-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.444298 19668 node_conditions.go:122] node storage ephemeral capacity is 107016164Ki\n"} +{"Time":"2023-05-31T13:10:29.122212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.444315 19668 node_conditions.go:123] node cpu capacity is 6\n"} +{"Time":"2023-05-31T13:10:29.12239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.444323 19668 node_conditions.go:105] duration metric: took 3.895441ms to run NodePressure ...\n"} +{"Time":"2023-05-31T13:10:29.122394-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.444335 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init phase addon all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T13:10:29.122397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.736344 19668 ssh_runner.go:195] Run: /bin/bash -c \"cat /proc/$(pgrep kube-apiserver)/oom_adj\"\n"} +{"Time":"2023-05-31T13:10:29.122399-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.745896 19668 ops.go:34] apiserver oom_adj: -16\n"} +{"Time":"2023-05-31T13:10:29.122404-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.745908 19668 kubeadm.go:640] restartCluster took 16.532457028s\n"} +{"Time":"2023-05-31T13:10:29.122407-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.745913 19668 kubeadm.go:406] StartCluster complete in 16.564359032s\n"} +{"Time":"2023-05-31T13:10:29.122409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.745928 19668 settings.go:142] acquiring lock: {Name:mkadbf0242c93bf6c2425e391614d45302b1e1dc Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.122412-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746002 19668 settings.go:150] Updating kubeconfig: /Users/jenkins/minikube-integration/16569-1078/kubeconfig\n"} +{"Time":"2023-05-31T13:10:29.122414-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746585 19668 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1078/kubeconfig: {Name:mk36b1fef13f0c406b5340544ea043a831d9fe53 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T13:10:29.122416-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746804 19668 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml\"\n"} +{"Time":"2023-05-31T13:10:29.122419-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746867 19668 addons.go:496] enable addons start: toEnable=map[ambassador:false auto-pause:false cloud-spanner:false csi-hostpath-driver:false dashboard:true default-storageclass:true efk:false freshpod:false gcp-auth:false gvisor:false headlamp:false helm-tiller:false inaccel:false ingress:false ingress-dns:false inspektor-gadget:false istio:false istio-provisioner:false kong:false kubevirt:false logviewer:false metallb:false metrics-server:true nvidia-driver-installer:false nvidia-gpu-device-plugin:false olm:false pod-security-policy:false portainer:false registry:false registry-aliases:false registry-creds:false storage-provisioner:true storage-provisioner-gluster:false volumesnapshots:false]\n"} +{"Time":"2023-05-31T13:10:29.122569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746942 19668 addons.go:66] Setting storage-provisioner=true in profile \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.122573-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746958 19668 addons.go:228] Setting addon storage-provisioner=true in \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.122576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746958 19668 addons.go:66] Setting default-storageclass=true in profile \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.122578-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746969 19668 addons.go:66] Setting metrics-server=true in profile \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.12258-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746976 19668 addons.go:228] Setting addon metrics-server=true in \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.122583-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:30.746980 19668 addons.go:237] addon metrics-server should already be in state true\n"} +{"Time":"2023-05-31T13:10:29.122585-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746984 19668 addons_storage_classes.go:33] enableOrDisableStorageClasses default-storageclass=true on \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.122588-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.746988 19668 config.go:182] Loaded profile config \"newest-cni-533000\": Driver=docker, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.12259-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:30.746964 19668 addons.go:237] addon storage-provisioner should already be in state true\n"} +{"Time":"2023-05-31T13:10:29.122592-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.747002 19668 addons.go:66] Setting dashboard=true in profile \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.122594-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.747013 19668 host.go:66] Checking if \"newest-cni-533000\" exists ...\n"} +{"Time":"2023-05-31T13:10:29.122597-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.747038 19668 addons.go:228] Setting addon dashboard=true in \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.122599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:30.747055 19668 addons.go:237] addon dashboard should already be in state true\n"} +{"Time":"2023-05-31T13:10:29.122603-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.747101 19668 host.go:66] Checking if \"newest-cni-533000\" exists ...\n"} +{"Time":"2023-05-31T13:10:29.122606-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.747097 19668 host.go:66] Checking if \"newest-cni-533000\" exists ...\n"} +{"Time":"2023-05-31T13:10:29.122754-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.747237 19668 cli_runner.go:164] Run: docker container inspect newest-cni-533000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:10:29.122765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.747347 19668 cli_runner.go:164] Run: docker container inspect newest-cni-533000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:10:29.122768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.748411 19668 cli_runner.go:164] Run: docker container inspect newest-cni-533000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:10:29.12277-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.750620 19668 cli_runner.go:164] Run: docker container inspect newest-cni-533000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:10:29.122772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.755606 19668 kapi.go:248] \"coredns\" deployment in \"kube-system\" namespace and \"newest-cni-533000\" context rescaled to 1 replicas\n"} +{"Time":"2023-05-31T13:10:29.122775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.755650 19668 start.go:223] Will wait 6m0s for node \u0026{Name: IP:192.168.76.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T13:10:29.122777-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.777913 19668 out.go:177] * Verifying Kubernetes components...\n"} +{"Time":"2023-05-31T13:10:29.12278-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.798048 19668 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T13:10:29.122782-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.831890 19668 addons.go:228] Setting addon default-storageclass=true in \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.122784-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.889888 19668 out.go:177] - Using image gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T13:10:29.122786-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:30.889889 19668 addons.go:237] addon default-storageclass should already be in state true\n"} +{"Time":"2023-05-31T13:10:29.122788-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.854365 19668 start.go:889] CoreDNS already contains \"host.minikube.internal\" host record, skipping...\n"} +{"Time":"2023-05-31T13:10:29.122791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.854439 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"8443/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.122797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.868891 19668 out.go:177] - Using image fake.domain/registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T13:10:29.122799-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.910924 19668 host.go:66] Checking if \"newest-cni-533000\" exists ...\n"} +{"Time":"2023-05-31T13:10:29.122916-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.847988 19668 out.go:177] - Using image docker.io/kubernetesui/dashboard:v2.7.0\n"} +{"Time":"2023-05-31T13:10:29.122921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.910952 19668 addons.go:420] installing /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T13:10:29.122923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.931941 19668 addons.go:420] installing /etc/kubernetes/addons/metrics-apiservice.yaml\n"} +{"Time":"2023-05-31T13:10:29.122925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.932369 19668 cli_runner.go:164] Run: docker container inspect newest-cni-533000 --format={{.State.Status}}\n"} +{"Time":"2023-05-31T13:10:29.122931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.952862 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/metrics-apiservice.yaml (424 bytes)\n"} +{"Time":"2023-05-31T13:10:29.122934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.973888 19668 out.go:177] - Using image registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T13:10:29.122936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.952864 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storage-provisioner.yaml (2676 bytes)\n"} +{"Time":"2023-05-31T13:10:29.12294-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.974109 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.122944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.995047 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-ns.yaml\n"} +{"Time":"2023-05-31T13:10:29.122946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.995063 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-ns.yaml (759 bytes)\n"} +{"Time":"2023-05-31T13:10:29.122948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.995121 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.122951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:30.995128 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.122953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.003805 19668 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T13:10:29.122955-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.003974 19668 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T13:10:29.123076-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.008034 19668 addons.go:420] installing /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T13:10:29.12308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.008054 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storageclass.yaml (271 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.008173 19668 cli_runner.go:164] Run: docker container inspect -f \"'{{(index (index .NetworkSettings.Ports \"22/tcp\") 0).HostPort}}'\" newest-cni-533000\n"} +{"Time":"2023-05-31T13:10:29.123085-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.021749 19668 api_server.go:72] duration metric: took 266.029901ms to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T13:10:29.123087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.021784 19668 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T13:10:29.123089-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.021815 19668 api_server.go:253] Checking apiserver healthz at https://127.0.0.1:54752/healthz ...\n"} +{"Time":"2023-05-31T13:10:29.123092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.030933 19668 api_server.go:279] https://127.0.0.1:54752/healthz returned 200:\n"} +{"Time":"2023-05-31T13:10:29.123094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tok\n"} +{"Time":"2023-05-31T13:10:29.123096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.033569 19668 api_server.go:141] control plane version: v1.27.2\n"} +{"Time":"2023-05-31T13:10:29.123098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.033588 19668 api_server.go:131] duration metric: took 11.797523ms to wait for apiserver health ...\n"} +{"Time":"2023-05-31T13:10:29.123104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.033597 19668 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T13:10:29.123106-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.042895 19668 system_pods.go:59] 8 kube-system pods found\n"} +{"Time":"2023-05-31T13:10:29.123108-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.042914 19668 system_pods.go:61] \"coredns-5d78c9869d-m5rbf\" [92f2ce3b-7847-4a7b-8aa2-1c0718a9b6d5] Running\n"} +{"Time":"2023-05-31T13:10:29.123111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.042924 19668 system_pods.go:61] \"etcd-newest-cni-533000\" [37bd2c90-bbc8-42b1-8e80-9069957c24cc] Running / Ready:ContainersNotReady (containers with unready status: [etcd]) / ContainersReady:ContainersNotReady (containers with unready status: [etcd])\n"} +{"Time":"2023-05-31T13:10:29.123113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.042937 19668 system_pods.go:61] \"kube-apiserver-newest-cni-533000\" [7cf9d12c-fc54-43c5-979d-b72cea2109e1] Running / Ready:ContainersNotReady (containers with unready status: [kube-apiserver]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-apiserver])\n"} +{"Time":"2023-05-31T13:10:29.123273-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.042948 19668 system_pods.go:61] \"kube-controller-manager-newest-cni-533000\" [e32b5ff8-5d52-4302-87dd-e99de0d39210] Running / Ready:ContainersNotReady (containers with unready status: [kube-controller-manager]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-controller-manager])\n"} +{"Time":"2023-05-31T13:10:29.123279-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.042955 19668 system_pods.go:61] \"kube-proxy-2tx4x\" [bb6b00fb-0e24-42d7-8074-325e4a303447] Running\n"} +{"Time":"2023-05-31T13:10:29.123283-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.042964 19668 system_pods.go:61] \"kube-scheduler-newest-cni-533000\" [e0c778d8-cc53-40f4-9ef8-0a536fee8231] Running / Ready:ContainersNotReady (containers with unready status: [kube-scheduler]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-scheduler])\n"} +{"Time":"2023-05-31T13:10:29.123297-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.042971 19668 system_pods.go:61] \"metrics-server-74d5c6b9c-jcrj8\" [efb88477-2117-481c-b66f-257d1a628f4d] Pending / Ready:ContainersNotReady (containers with unready status: [metrics-server]) / ContainersReady:ContainersNotReady (containers with unready status: [metrics-server])\n"} +{"Time":"2023-05-31T13:10:29.1233-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.043014 19668 system_pods.go:61] \"storage-provisioner\" [b5bc53ca-0900-43f6-bb5d-d6740378abae] Running\n"} +{"Time":"2023-05-31T13:10:29.123303-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.043024 19668 system_pods.go:74] duration metric: took 9.420559ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T13:10:29.123306-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.043034 19668 default_sa.go:34] waiting for default service account to be created ...\n"} +{"Time":"2023-05-31T13:10:29.123308-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.047964 19668 default_sa.go:45] found service account: \"default\"\n"} +{"Time":"2023-05-31T13:10:29.123311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.047987 19668 default_sa.go:55] duration metric: took 4.946133ms for default service account to be created ...\n"} +{"Time":"2023-05-31T13:10:29.123313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.047999 19668 kubeadm.go:581] duration metric: took 292.291925ms to wait for : map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] ...\n"} +{"Time":"2023-05-31T13:10:29.123315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.048031 19668 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T13:10:29.123479-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.052601 19668 node_conditions.go:122] node storage ephemeral capacity is 107016164Ki\n"} +{"Time":"2023-05-31T13:10:29.123484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.052623 19668 node_conditions.go:123] node cpu capacity is 6\n"} +{"Time":"2023-05-31T13:10:29.123486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.052647 19668 node_conditions.go:105] duration metric: took 4.595069ms to run NodePressure ...\n"} +{"Time":"2023-05-31T13:10:29.123488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.052658 19668 start.go:228] waiting for startup goroutines ...\n"} +{"Time":"2023-05-31T13:10:29.123491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.069283 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.123494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.070895 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.123497-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.070975 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.123501-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.081572 19668 sshutil.go:53] new ssh client: \u0026{IP:127.0.0.1 Port:54748 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1078/.minikube/machines/newest-cni-533000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T13:10:29.123504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.171308 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-clusterrole.yaml\n"} +{"Time":"2023-05-31T13:10:29.123506-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.171323 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-clusterrole.yaml (1001 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123508-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.171947 19668 addons.go:420] installing /etc/kubernetes/addons/metrics-server-deployment.yaml\n"} +{"Time":"2023-05-31T13:10:29.123523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.171964 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/metrics-server-deployment.yaml (1825 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123526-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.172413 19668 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T13:10:29.123529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.181872 19668 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T13:10:29.123694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.196687 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-clusterrolebinding.yaml\n"} +{"Time":"2023-05-31T13:10:29.123698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.196696 19668 addons.go:420] installing /etc/kubernetes/addons/metrics-server-rbac.yaml\n"} +{"Time":"2023-05-31T13:10:29.123701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.196747 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/metrics-server-rbac.yaml (2175 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123703-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.196706 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-clusterrolebinding.yaml (1018 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.222800 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-configmap.yaml\n"} +{"Time":"2023-05-31T13:10:29.123708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.222818 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-configmap.yaml (837 bytes)\n"} +{"Time":"2023-05-31T13:10:29.12371-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.222860 19668 addons.go:420] installing /etc/kubernetes/addons/metrics-server-service.yaml\n"} +{"Time":"2023-05-31T13:10:29.123712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.222871 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/metrics-server-service.yaml (446 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.306900 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-dp.yaml\n"} +{"Time":"2023-05-31T13:10:29.123717-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.306915 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-dp.yaml (4201 bytes)\n"} +{"Time":"2023-05-31T13:10:29.12372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.310796 19668 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/metrics-apiservice.yaml -f /etc/kubernetes/addons/metrics-server-deployment.yaml -f /etc/kubernetes/addons/metrics-server-rbac.yaml -f /etc/kubernetes/addons/metrics-server-service.yaml\n"} +{"Time":"2023-05-31T13:10:29.123722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.403256 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-role.yaml\n"} +{"Time":"2023-05-31T13:10:29.123725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.403275 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-role.yaml (1724 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.434062 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-rolebinding.yaml\n"} +{"Time":"2023-05-31T13:10:29.1239-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.434080 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-rolebinding.yaml (1046 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123903-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.521590 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-sa.yaml\n"} +{"Time":"2023-05-31T13:10:29.123905-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.521616 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-sa.yaml (837 bytes)\n"} +{"Time":"2023-05-31T13:10:29.12391-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.609155 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-secret.yaml\n"} +{"Time":"2023-05-31T13:10:29.123913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.609205 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-secret.yaml (1389 bytes)\n"} +{"Time":"2023-05-31T13:10:29.123915-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.638727 19668 addons.go:420] installing /etc/kubernetes/addons/dashboard-svc.yaml\n"} +{"Time":"2023-05-31T13:10:29.123917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.638741 19668 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/dashboard-svc.yaml (1294 bytes)\n"} +{"Time":"2023-05-31T13:10:29.12392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:31.703503 19668 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/dashboard-ns.yaml -f /etc/kubernetes/addons/dashboard-clusterrole.yaml -f /etc/kubernetes/addons/dashboard-clusterrolebinding.yaml -f /etc/kubernetes/addons/dashboard-configmap.yaml -f /etc/kubernetes/addons/dashboard-dp.yaml -f /etc/kubernetes/addons/dashboard-role.yaml -f /etc/kubernetes/addons/dashboard-rolebinding.yaml -f /etc/kubernetes/addons/dashboard-sa.yaml -f /etc/kubernetes/addons/dashboard-secret.yaml -f /etc/kubernetes/addons/dashboard-svc.yaml\n"} +{"Time":"2023-05-31T13:10:29.123923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:32.539291 19668 ssh_runner.go:235] Completed: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storage-provisioner.yaml: (1.36681442s)\n"} +{"Time":"2023-05-31T13:10:29.123925-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:32.539328 19668 ssh_runner.go:235] Completed: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storageclass.yaml: (1.357393745s)\n"} +{"Time":"2023-05-31T13:10:29.123928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:32.610830 19668 ssh_runner.go:235] Completed: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/metrics-apiservice.yaml -f /etc/kubernetes/addons/metrics-server-deployment.yaml -f /etc/kubernetes/addons/metrics-server-rbac.yaml -f /etc/kubernetes/addons/metrics-server-service.yaml: (1.299961748s)\n"} +{"Time":"2023-05-31T13:10:29.124092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:32.610853 19668 addons.go:464] Verifying addon metrics-server=true in \"newest-cni-533000\"\n"} +{"Time":"2023-05-31T13:10:29.124098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:32.859749 19668 ssh_runner.go:235] Completed: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/dashboard-ns.yaml -f /etc/kubernetes/addons/dashboard-clusterrole.yaml -f /etc/kubernetes/addons/dashboard-clusterrolebinding.yaml -f /etc/kubernetes/addons/dashboard-configmap.yaml -f /etc/kubernetes/addons/dashboard-dp.yaml -f /etc/kubernetes/addons/dashboard-role.yaml -f /etc/kubernetes/addons/dashboard-rolebinding.yaml -f /etc/kubernetes/addons/dashboard-sa.yaml -f /etc/kubernetes/addons/dashboard-secret.yaml -f /etc/kubernetes/addons/dashboard-svc.yaml: (1.156181312s)\n"} +{"Time":"2023-05-31T13:10:29.124101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:32.885614 19668 out.go:177] * Some dashboard features require the metrics-server addon. To enable all features please run:\n"} +{"Time":"2023-05-31T13:10:29.124103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.124105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\tminikube -p newest-cni-533000 addons enable metrics-server\t\n"} +{"Time":"2023-05-31T13:10:29.124107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.124109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.124111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:32.927403 19668 out.go:177] * Enabled addons: storage-provisioner, default-storageclass, metrics-server, dashboard\n"} +{"Time":"2023-05-31T13:10:29.124113-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:33.022402 19668 addons.go:499] enable addons completed in 2.275491822s: enabled=[storage-provisioner default-storageclass metrics-server dashboard]\n"} +{"Time":"2023-05-31T13:10:29.124116-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:33.022470 19668 start.go:233] waiting for cluster config update ...\n"} +{"Time":"2023-05-31T13:10:29.124122-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:33.022490 19668 start.go:242] writing updated cluster config ...\n"} +{"Time":"2023-05-31T13:10:29.124128-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:33.023053 19668 ssh_runner.go:195] Run: rm -f paused\n"} +{"Time":"2023-05-31T13:10:29.124131-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:33.065075 19668 start.go:573] kubectl: 1.25.9, cluster: 1.27.2 (minor skew: 2)\n"} +{"Time":"2023-05-31T13:10:29.12431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:33.086468 19668 out.go:177] \n"} +{"Time":"2023-05-31T13:10:29.124315-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tW0531 13:06:33.107488 19668 out.go:239] ! /usr/local/bin/kubectl is version 1.25.9, which may have incompatibilities with Kubernetes 1.27.2.\n"} +{"Time":"2023-05-31T13:10:29.124317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:33.128453 19668 out.go:177] - Want kubectl v1.27.2? Try 'minikube kubectl -- get pods -A'\n"} +{"Time":"2023-05-31T13:10:29.12432-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tI0531 13:06:33.170512 19668 out.go:177] * Done! kubectl is now configured to use \"newest-cni-533000\" cluster and \"default\" namespace by default\n"} +{"Time":"2023-05-31T13:10:29.124322-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.124336-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.124338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* ==\u003e Docker \u003c==\n"} +{"Time":"2023-05-31T13:10:29.124341-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* May 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.099659784Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\n"} +{"Time":"2023-05-31T13:10:29.124343-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.138464945Z\" level=info msg=\"Loading containers: done.\"\n"} +{"Time":"2023-05-31T13:10:29.124355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.147458789Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\n"} +{"Time":"2023-05-31T13:10:29.124358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.147525112Z\" level=info msg=\"Daemon has completed initialization\"\n"} +{"Time":"2023-05-31T13:10:29.124361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.179519418Z\" level=info msg=\"API listen on /var/run/docker.sock\"\n"} +{"Time":"2023-05-31T13:10:29.124363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:25.179718200Z\" level=info msg=\"API listen on [::]:2376\"\n"} +{"Time":"2023-05-31T13:10:29.124365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:25 old-k8s-version-787000 systemd[1]: Started Docker Application Container Engine.\n"} +{"Time":"2023-05-31T13:10:29.124368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Stopping Docker Application Container Engine...\n"} +{"Time":"2023-05-31T13:10:29.124505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.403593532Z\" level=info msg=\"Processing signal 'terminated'\"\n"} +{"Time":"2023-05-31T13:10:29.124509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.404984583Z\" level=info msg=\"stopping event stream following graceful shutdown\" error=\"\u003cnil\u003e\" module=libcontainerd namespace=moby\n"} +{"Time":"2023-05-31T13:10:29.124518-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.405234397Z\" level=info msg=\"Daemon shutdown complete\"\n"} +{"Time":"2023-05-31T13:10:29.12452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[701]: time=\"2023-05-31T19:46:33.405446217Z\" level=info msg=\"stopping event stream following graceful shutdown\" error=\"context canceled\" module=libcontainerd namespace=plugins.moby\n"} +{"Time":"2023-05-31T13:10:29.124523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: docker.service: Deactivated successfully.\n"} +{"Time":"2023-05-31T13:10:29.124525-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Stopped Docker Application Container Engine.\n"} +{"Time":"2023-05-31T13:10:29.124527-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Starting Docker Application Container Engine...\n"} +{"Time":"2023-05-31T13:10:29.12453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.462213859Z\" level=info msg=\"Starting up\"\n"} +{"Time":"2023-05-31T13:10:29.124532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.596616592Z\" level=info msg=\"[graphdriver] trying configured driver: overlay2\"\n"} +{"Time":"2023-05-31T13:10:29.124535-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.824413968Z\" level=info msg=\"Loading containers: start.\"\n"} +{"Time":"2023-05-31T13:10:29.12454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.917938134Z\" level=info msg=\"Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address\"\n"} +{"Time":"2023-05-31T13:10:29.124542-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.956170411Z\" level=info msg=\"Loading containers: done.\"\n"} +{"Time":"2023-05-31T13:10:29.124545-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.965771934Z\" level=info msg=\"Docker daemon\" commit=463850e graphdriver=overlay2 version=24.0.1\n"} +{"Time":"2023-05-31T13:10:29.124718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.965840535Z\" level=info msg=\"Daemon has completed initialization\"\n"} +{"Time":"2023-05-31T13:10:29.124723-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.998089110Z\" level=info msg=\"API listen on /var/run/docker.sock\"\n"} +{"Time":"2023-05-31T13:10:29.124727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 dockerd[923]: time=\"2023-05-31T19:46:33.998137953Z\" level=info msg=\"API listen on [::]:2376\"\n"} +{"Time":"2023-05-31T13:10:29.12473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 19:46:33 old-k8s-version-787000 systemd[1]: Started Docker Application Container Engine.\n"} +{"Time":"2023-05-31T13:10:29.124733-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.124735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.124742-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* ==\u003e container status \u003c==\n"} +{"Time":"2023-05-31T13:10:29.124746-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES\n"} +{"Time":"2023-05-31T13:10:29.124748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \ttime=\"2023-05-31T20:10:28Z\" level=fatal msg=\"unable to determine runtime API version: rpc error: code = Unavailable desc = connection error: desc = \\\"transport: Error while dialing dial unix /var/run/dockershim.sock: connect: no such file or directory\\\"\"\n"} +{"Time":"2023-05-31T13:10:29.124751-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.124753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.124755-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* ==\u003e describe nodes \u003c==\n"} +{"Time":"2023-05-31T13:10:29.124757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.124759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* ==\u003e dmesg \u003c==\n"} +{"Time":"2023-05-31T13:10:29.124764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.124766-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.124768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* ==\u003e kernel \u003c==\n"} +{"Time":"2023-05-31T13:10:29.124914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* 20:10:28 up 1:39, 0 users, load average: 0.16, 0.66, 0.93\n"} +{"Time":"2023-05-31T13:10:29.124928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tLinux old-k8s-version-787000 5.15.49-linuxkit-pr #1 SMP Thu May 25 07:17:40 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux\n"} +{"Time":"2023-05-31T13:10:29.124932-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tPRETTY_NAME=\"Ubuntu 22.04.2 LTS\"\n"} +{"Time":"2023-05-31T13:10:29.124934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.124936-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T13:10:29.124939-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* ==\u003e kubelet \u003c==\n"} +{"Time":"2023-05-31T13:10:29.124941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t* May 31 20:10:27 old-k8s-version-787000 systemd[1]: kubelet.service: Failed with result 'exit-code'.\n"} +{"Time":"2023-05-31T13:10:29.124943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1411.\n"} +{"Time":"2023-05-31T13:10:29.124945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:10:29.124948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:10:29.12495-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33041]: I0531 20:10:28.126384 33041 server.go:410] Version: v1.16.0\n"} +{"Time":"2023-05-31T13:10:29.124952-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33041]: I0531 20:10:28.126555 33041 plugins.go:100] No cloud provider specified.\n"} +{"Time":"2023-05-31T13:10:29.124954-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33041]: I0531 20:10:28.126565 33041 server.go:773] Client rotation is on, will bootstrap in background\n"} +{"Time":"2023-05-31T13:10:29.124957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33041]: I0531 20:10:28.128456 33041 certificate_store.go:129] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\n"} +{"Time":"2023-05-31T13:10:29.124959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33041]: W0531 20:10:28.129252 33041 server.go:613] failed to get the kubelet's cgroup: mountpoint for cpu not found. Kubelet system container metrics may be missing.\n"} +{"Time":"2023-05-31T13:10:29.125123-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33041]: W0531 20:10:28.129321 33041 server.go:620] failed to get the container runtime's cgroup: failed to get container name for docker process: mountpoint for cpu not found. Runtime system container metrics may be missing.\n"} +{"Time":"2023-05-31T13:10:29.125129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33041]: F0531 20:10:28.129449 33041 server.go:271] failed to run Kubelet: mountpoint for cpu not found\n"} +{"Time":"2023-05-31T13:10:29.125132-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: kubelet.service: Main process exited, code=exited, status=255/EXCEPTION\n"} +{"Time":"2023-05-31T13:10:29.125134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: kubelet.service: Failed with result 'exit-code'.\n"} +{"Time":"2023-05-31T13:10:29.125137-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1412.\n"} +{"Time":"2023-05-31T13:10:29.125139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:10:29.125142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: Started kubelet: The Kubernetes Node Agent.\n"} +{"Time":"2023-05-31T13:10:29.125145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33158]: I0531 20:10:28.885631 33158 server.go:410] Version: v1.16.0\n"} +{"Time":"2023-05-31T13:10:29.125148-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33158]: I0531 20:10:28.885896 33158 plugins.go:100] No cloud provider specified.\n"} +{"Time":"2023-05-31T13:10:29.125152-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33158]: I0531 20:10:28.885933 33158 server.go:773] Client rotation is on, will bootstrap in background\n"} +{"Time":"2023-05-31T13:10:29.125156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33158]: I0531 20:10:28.887886 33158 certificate_store.go:129] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\n"} +{"Time":"2023-05-31T13:10:29.12516-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33158]: W0531 20:10:28.888657 33158 server.go:613] failed to get the kubelet's cgroup: mountpoint for cpu not found. Kubelet system container metrics may be missing.\n"} +{"Time":"2023-05-31T13:10:29.125164-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33158]: W0531 20:10:28.888733 33158 server.go:620] failed to get the container runtime's cgroup: failed to get container name for docker process: mountpoint for cpu not found. Runtime system container metrics may be missing.\n"} +{"Time":"2023-05-31T13:10:29.125309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 kubelet[33158]: F0531 20:10:28.888761 33158 server.go:271] failed to run Kubelet: mountpoint for cpu not found\n"} +{"Time":"2023-05-31T13:10:29.125313-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: kubelet.service: Main process exited, code=exited, status=255/EXCEPTION\n"} +{"Time":"2023-05-31T13:10:29.125317-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tMay 31 20:10:28 old-k8s-version-787000 systemd[1]: kubelet.service: Failed with result 'exit-code'.\n"} +{"Time":"2023-05-31T13:10:29.12532-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.125323-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.125325-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:29.125328-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:10:29.12533-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T13:10:29.125333-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tE0531 13:10:28.711340 19929 logs.go:195] command /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\" failed with error: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.16.0/kubectl describe nodes --kubeconfig=/var/lib/minikube/kubeconfig\": Process exited with status 1\n"} +{"Time":"2023-05-31T13:10:29.125335-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstdout:\n"} +{"Time":"2023-05-31T13:10:29.125337-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T13:10:29.125339-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tstderr:\n"} +{"Time":"2023-05-31T13:10:29.125342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tThe connection to the server localhost:8443 was refused - did you specify the right host or port?\n"} +{"Time":"2023-05-31T13:10:29.125344-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t output: \"\\n** stderr ** \\nThe connection to the server localhost:8443 was refused - did you specify the right host or port?\\n\\n** /stderr **\"\n"} +{"Time":"2023-05-31T13:10:29.125346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \t! unable to fetch logs for: describe nodes\n"} +{"Time":"2023-05-31T13:10:29.125352-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:29.125354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T13:10:29.125356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:254: (dbg) Run: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:10:29.469457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:254: (dbg) Non-zero exit: out/minikube-darwin-amd64 status --format={{.APIServer}} -p old-k8s-version-787000 -n old-k8s-version-787000: exit status 2 (352.511299ms)\n"} +{"Time":"2023-05-31T13:10:29.469471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:29.469474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T13:10:29.469476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T13:10:29.469478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T13:10:29.46948-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T13:10:29.469482-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:254: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T13:10:29.469486-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:256: \"old-k8s-version-787000\" apiserver is not running, skipping kubectl commands (state=\"Stopped\")\n"} +{"Time":"2023-05-31T13:10:29.469491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:148: Unable to run more tests (deadline exceeded)\n"} +{"Time":"2023-05-31T13:10:29.469556-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" helpers_test.go:175: Cleaning up \"old-k8s-version-787000\" profile ...\n"} +{"Time":"2023-05-31T13:10:29.469576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-amd64 delete -p old-k8s-version-787000\n"} +{"Time":"2023-05-31T13:10:31.728039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" helpers_test.go:178: (dbg) Done: out/minikube-darwin-amd64 delete -p old-k8s-version-787000: (2.258258292s)\n"} +{"Time":"2023-05-31T13:10:31.728148-07:00","Action":"output","Test":"TestStartStop","Output":"--- FAIL: TestStartStop (2451.29s)\n"} +{"Time":"2023-05-31T13:10:31.72816-07:00","Action":"output","Test":"TestStartStop/group","Output":" --- FAIL: TestStartStop/group (0.00s)\n"} +{"Time":"2023-05-31T13:10:31.728165-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":" --- PASS: TestStartStop/group/no-preload (448.73s)\n"} +{"Time":"2023-05-31T13:10:31.728169-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" --- PASS: TestStartStop/group/no-preload/serial (448.36s)\n"} +{"Time":"2023-05-31T13:10:31.728181-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" --- PASS: TestStartStop/group/no-preload/serial/FirstStart (68.52s)\n"} +{"Time":"2023-05-31T13:10:31.728187-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/FirstStart","Elapsed":68.52} +{"Time":"2023-05-31T13:10:31.728193-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" --- PASS: TestStartStop/group/no-preload/serial/DeployApp (10.31s)\n"} +{"Time":"2023-05-31T13:10:31.728201-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/DeployApp","Elapsed":10.31} +{"Time":"2023-05-31T13:10:31.728205-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/no-preload/serial/EnableAddonWhileActive (0.89s)\n"} +{"Time":"2023-05-31T13:10:31.728211-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Elapsed":0.89} +{"Time":"2023-05-31T13:10:31.728215-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":" --- PASS: TestStartStop/group/no-preload/serial/Stop (11.03s)\n"} +{"Time":"2023-05-31T13:10:31.72822-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/Stop","Elapsed":11.03} +{"Time":"2023-05-31T13:10:31.728225-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/no-preload/serial/EnableAddonAfterStop (0.34s)\n"} +{"Time":"2023-05-31T13:10:31.72823-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Elapsed":0.34} +{"Time":"2023-05-31T13:10:31.728234-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" --- PASS: TestStartStop/group/no-preload/serial/SecondStart (331.62s)\n"} +{"Time":"2023-05-31T13:10:31.728255-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/SecondStart","Elapsed":331.62} +{"Time":"2023-05-31T13:10:31.728261-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/no-preload/serial/UserAppExistsAfterStop (14.01s)\n"} +{"Time":"2023-05-31T13:10:31.728266-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Elapsed":14.01} +{"Time":"2023-05-31T13:10:31.728271-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/no-preload/serial/AddonExistsAfterStop (5.11s)\n"} +{"Time":"2023-05-31T13:10:31.728275-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Elapsed":5.11} +{"Time":"2023-05-31T13:10:31.728279-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/no-preload/serial/VerifyKubernetesImages (0.43s)\n"} +{"Time":"2023-05-31T13:10:31.728284-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Elapsed":0.43} +{"Time":"2023-05-31T13:10:31.728288-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" --- PASS: TestStartStop/group/no-preload/serial/Pause (3.10s)\n"} +{"Time":"2023-05-31T13:10:31.728292-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/Pause","Elapsed":3.1} +{"Time":"2023-05-31T13:10:31.728296-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial","Elapsed":448.36} +{"Time":"2023-05-31T13:10:31.7283-07:00","Action":"pass","Test":"TestStartStop/group/no-preload","Elapsed":448.73} +{"Time":"2023-05-31T13:10:31.728303-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" --- PASS: TestStartStop/group/embed-certs (638.60s)\n"} +{"Time":"2023-05-31T13:10:31.728314-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" --- PASS: TestStartStop/group/embed-certs/serial (638.22s)\n"} +{"Time":"2023-05-31T13:10:31.72832-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" --- PASS: TestStartStop/group/embed-certs/serial/FirstStart (41.74s)\n"} +{"Time":"2023-05-31T13:10:31.728324-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Elapsed":41.74} +{"Time":"2023-05-31T13:10:31.728329-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" --- PASS: TestStartStop/group/embed-certs/serial/DeployApp (9.31s)\n"} +{"Time":"2023-05-31T13:10:31.728333-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Elapsed":9.31} +{"Time":"2023-05-31T13:10:31.728337-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/embed-certs/serial/EnableAddonWhileActive (1.02s)\n"} +{"Time":"2023-05-31T13:10:31.728342-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Elapsed":1.02} +{"Time":"2023-05-31T13:10:31.728346-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/Stop (10.95s)\n"} +{"Time":"2023-05-31T13:10:31.728351-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/Stop","Elapsed":10.95} +{"Time":"2023-05-31T13:10:31.728355-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/EnableAddonAfterStop (0.36s)\n"} +{"Time":"2023-05-31T13:10:31.72836-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Elapsed":0.36} +{"Time":"2023-05-31T13:10:31.728364-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" --- PASS: TestStartStop/group/embed-certs/serial/SecondStart (558.57s)\n"} +{"Time":"2023-05-31T13:10:31.728369-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Elapsed":558.57} +{"Time":"2023-05-31T13:10:31.728373-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop (5.02s)\n"} +{"Time":"2023-05-31T13:10:31.728378-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Elapsed":5.02} +{"Time":"2023-05-31T13:10:31.728382-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/AddonExistsAfterStop (5.10s)\n"} +{"Time":"2023-05-31T13:10:31.728387-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Elapsed":5.1} +{"Time":"2023-05-31T13:10:31.728391-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/embed-certs/serial/VerifyKubernetesImages (0.41s)\n"} +{"Time":"2023-05-31T13:10:31.728396-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Elapsed":0.41} +{"Time":"2023-05-31T13:10:31.7284-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" --- PASS: TestStartStop/group/embed-certs/serial/Pause (2.92s)\n"} +{"Time":"2023-05-31T13:10:31.728404-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/Pause","Elapsed":2.92} +{"Time":"2023-05-31T13:10:31.728408-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial","Elapsed":638.22} +{"Time":"2023-05-31T13:10:31.728412-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs","Elapsed":638.6} +{"Time":"2023-05-31T13:10:31.728416-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" --- SKIP: TestStartStop/group/disable-driver-mounts (0.36s)\n"} +{"Time":"2023-05-31T13:10:31.728421-07:00","Action":"skip","Test":"TestStartStop/group/disable-driver-mounts","Elapsed":0.36} +{"Time":"2023-05-31T13:10:31.728425-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port (399.69s)\n"} +{"Time":"2023-05-31T13:10:31.72843-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial (399.33s)\n"} +{"Time":"2023-05-31T13:10:31.728435-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/FirstStart (40.75s)\n"} +{"Time":"2023-05-31T13:10:31.72844-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Elapsed":40.75} +{"Time":"2023-05-31T13:10:31.728444-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/DeployApp (9.31s)\n"} +{"Time":"2023-05-31T13:10:31.728449-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Elapsed":9.31} +{"Time":"2023-05-31T13:10:31.728453-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive (1.03s)\n"} +{"Time":"2023-05-31T13:10:31.728458-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Elapsed":1.03} +{"Time":"2023-05-31T13:10:31.728465-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/Stop (10.90s)\n"} +{"Time":"2023-05-31T13:10:31.72847-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Elapsed":10.9} +{"Time":"2023-05-31T13:10:31.728475-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop (0.35s)\n"} +{"Time":"2023-05-31T13:10:31.728479-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Elapsed":0.35} +{"Time":"2023-05-31T13:10:31.728483-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/SecondStart (311.58s)\n"} +{"Time":"2023-05-31T13:10:31.728493-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Elapsed":311.58} +{"Time":"2023-05-31T13:10:31.728497-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop (14.02s)\n"} +{"Time":"2023-05-31T13:10:31.728502-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Elapsed":14.02} +{"Time":"2023-05-31T13:10:31.728506-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop (5.09s)\n"} +{"Time":"2023-05-31T13:10:31.728511-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Elapsed":5.09} +{"Time":"2023-05-31T13:10:31.728515-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages (0.41s)\n"} +{"Time":"2023-05-31T13:10:31.728523-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Elapsed":0.41} +{"Time":"2023-05-31T13:10:31.728527-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/Pause (3.00s)\n"} +{"Time":"2023-05-31T13:10:31.728531-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Elapsed":3} +{"Time":"2023-05-31T13:10:31.728535-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial","Elapsed":399.33} +{"Time":"2023-05-31T13:10:31.728539-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port","Elapsed":399.69} +{"Time":"2023-05-31T13:10:31.728543-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" --- PASS: TestStartStop/group/newest-cni (85.02s)\n"} +{"Time":"2023-05-31T13:10:31.728548-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" --- PASS: TestStartStop/group/newest-cni/serial (84.66s)\n"} +{"Time":"2023-05-31T13:10:31.728557-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" --- PASS: TestStartStop/group/newest-cni/serial/FirstStart (38.34s)\n"} +{"Time":"2023-05-31T13:10:31.728562-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Elapsed":38.34} +{"Time":"2023-05-31T13:10:31.728566-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Output":" --- PASS: TestStartStop/group/newest-cni/serial/DeployApp (0.00s)\n"} +{"Time":"2023-05-31T13:10:31.728571-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Elapsed":0} +{"Time":"2023-05-31T13:10:31.728575-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/newest-cni/serial/EnableAddonWhileActive (0.99s)\n"} +{"Time":"2023-05-31T13:10:31.72858-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Elapsed":0.99} +{"Time":"2023-05-31T13:10:31.728583-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/Stop (10.89s)\n"} +{"Time":"2023-05-31T13:10:31.728588-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/Stop","Elapsed":10.89} +{"Time":"2023-05-31T13:10:31.728602-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/EnableAddonAfterStop (0.38s)\n"} +{"Time":"2023-05-31T13:10:31.728608-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Elapsed":0.38} +{"Time":"2023-05-31T13:10:31.728612-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" --- PASS: TestStartStop/group/newest-cni/serial/SecondStart (28.03s)\n"} +{"Time":"2023-05-31T13:10:31.728616-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Elapsed":28.03} +{"Time":"2023-05-31T13:10:31.728621-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop (0.00s)\n"} +{"Time":"2023-05-31T13:10:31.728626-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Elapsed":0} +{"Time":"2023-05-31T13:10:31.72863-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/AddonExistsAfterStop (0.00s)\n"} +{"Time":"2023-05-31T13:10:31.728635-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Elapsed":0} +{"Time":"2023-05-31T13:10:31.728638-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/newest-cni/serial/VerifyKubernetesImages (0.41s)\n"} +{"Time":"2023-05-31T13:10:31.728643-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Elapsed":0.41} +{"Time":"2023-05-31T13:10:31.728647-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" --- PASS: TestStartStop/group/newest-cni/serial/Pause (3.03s)\n"} +{"Time":"2023-05-31T13:10:31.728652-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/Pause","Elapsed":3.03} +{"Time":"2023-05-31T13:10:31.728655-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial","Elapsed":84.66} +{"Time":"2023-05-31T13:10:31.728659-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni","Elapsed":85.02} +{"Time":"2023-05-31T13:10:31.728662-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" --- FAIL: TestStartStop/group/old-k8s-version (1805.56s)\n"} +{"Time":"2023-05-31T13:10:31.728667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial (1803.30s)\n"} +{"Time":"2023-05-31T13:10:31.728672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/FirstStart (262.81s)\n"} +{"Time":"2023-05-31T13:10:31.728677-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Elapsed":262.81} +{"Time":"2023-05-31T13:10:31.728681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/DeployApp (0.86s)\n"} +{"Time":"2023-05-31T13:10:31.728686-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Elapsed":0.86} +{"Time":"2023-05-31T13:10:31.728691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive (86.47s)\n"} +{"Time":"2023-05-31T13:10:31.728695-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Elapsed":86.47} +{"Time":"2023-05-31T13:10:31.728699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/Stop (1.53s)\n"} +{"Time":"2023-05-31T13:10:31.728704-07:00","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Elapsed":1.53} +{"Time":"2023-05-31T13:10:31.728709-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop (0.38s)\n"} +{"Time":"2023-05-31T13:10:31.728713-07:00","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Elapsed":0.38} +{"Time":"2023-05-31T13:10:31.728718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/SecondStart (509.72s)\n"} +{"Time":"2023-05-31T13:10:31.728723-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Elapsed":509.72} +{"Time":"2023-05-31T13:10:31.728727-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop (542.93s)\n"} +{"Time":"2023-05-31T13:10:31.728732-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Elapsed":542.93} +{"Time":"2023-05-31T13:10:31.72874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop (398.60s)\n"} +{"Time":"2023-05-31T13:10:31.728747-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Elapsed":398.6} +{"Time":"2023-05-31T13:10:31.728751-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial","Elapsed":1803.3} +{"Time":"2023-05-31T13:10:31.728755-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version","Elapsed":1805.56} +{"Time":"2023-05-31T13:10:31.728758-07:00","Action":"fail","Test":"TestStartStop/group","Elapsed":0} +{"Time":"2023-05-31T13:10:31.728763-07:00","Action":"fail","Test":"TestStartStop","Elapsed":2451.29} +{"Time":"2023-05-31T13:10:31.728767-07:00","Action":"output","Output":"FAIL\n"} +{"Time":"2023-05-31T13:10:31.728771-07:00","Action":"output","Output":"Tests completed in 1h27m32.670953552s (result code 1)\n"} +{"Time":"2023-05-31T13:10:31.74289-07:00","Action":"fail","Elapsed":5253.377} diff --git a/testdata/testdb/KVM_Linux_containerd.json b/testdata/testdb/KVM_Linux_containerd.json new file mode 100644 index 0000000..1710b6a --- /dev/null +++ b/testdata/testdb/KVM_Linux_containerd.json @@ -0,0 +1,34100 @@ +{"Time":"2023-05-31T18:43:27.681482298Z","Action":"start"} +{"Time":"2023-05-31T18:43:27.716433154Z","Action":"output","Output":"Found 8 cores, limiting parallelism with --test.parallel=4\n"} +{"Time":"2023-05-31T18:43:27.716476622Z","Action":"run","Test":"TestDownloadOnly"} +{"Time":"2023-05-31T18:43:27.716481727Z","Action":"output","Test":"TestDownloadOnly","Output":"=== RUN TestDownloadOnly\n"} +{"Time":"2023-05-31T18:43:27.716485687Z","Action":"run","Test":"TestDownloadOnly/v1.16.0"} +{"Time":"2023-05-31T18:43:27.71648873Z","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":"=== RUN TestDownloadOnly/v1.16.0\n"} +{"Time":"2023-05-31T18:43:27.716494004Z","Action":"run","Test":"TestDownloadOnly/v1.16.0/json-events"} +{"Time":"2023-05-31T18:43:27.716497314Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":"=== RUN TestDownloadOnly/v1.16.0/json-events\n"} +{"Time":"2023-05-31T18:43:27.716667914Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" aaa_download_only_test.go:69: (dbg) Run: out/minikube-linux-amd64 start -o=json --download-only -p download-only-440052 --force --alsologtostderr --kubernetes-version=v1.16.0 --container-runtime=containerd --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:43:36.030354082Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" aaa_download_only_test.go:69: (dbg) Done: out/minikube-linux-amd64 start -o=json --download-only -p download-only-440052 --force --alsologtostderr --kubernetes-version=v1.16.0 --container-runtime=containerd --driver=kvm2 --container-runtime=containerd: (8.313601046s)\n"} +{"Time":"2023-05-31T18:43:36.030513039Z","Action":"run","Test":"TestDownloadOnly/v1.16.0/preload-exists"} +{"Time":"2023-05-31T18:43:36.030523844Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/preload-exists","Output":"=== RUN TestDownloadOnly/v1.16.0/preload-exists\n"} +{"Time":"2023-05-31T18:43:36.031303607Z","Action":"run","Test":"TestDownloadOnly/v1.16.0/cached-images"} +{"Time":"2023-05-31T18:43:36.031311743Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":"=== RUN TestDownloadOnly/v1.16.0/cached-images\n"} +{"Time":"2023-05-31T18:43:36.031317572Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":" aaa_download_only_test.go:117: Preload exists, images won't be cached\n"} +{"Time":"2023-05-31T18:43:36.031378305Z","Action":"run","Test":"TestDownloadOnly/v1.16.0/binaries"} +{"Time":"2023-05-31T18:43:36.031382273Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":"=== RUN TestDownloadOnly/v1.16.0/binaries\n"} +{"Time":"2023-05-31T18:43:36.031387517Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":" aaa_download_only_test.go:136: Preload exists, binaries are present within.\n"} +{"Time":"2023-05-31T18:43:36.031414827Z","Action":"run","Test":"TestDownloadOnly/v1.16.0/kubectl"} +{"Time":"2023-05-31T18:43:36.031419461Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/kubectl","Output":"=== RUN TestDownloadOnly/v1.16.0/kubectl\n"} +{"Time":"2023-05-31T18:43:36.031428089Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/kubectl","Output":" aaa_download_only_test.go:152: Test for darwin and windows\n"} +{"Time":"2023-05-31T18:43:36.031465513Z","Action":"run","Test":"TestDownloadOnly/v1.16.0/LogsDuration"} +{"Time":"2023-05-31T18:43:36.031469238Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"=== RUN TestDownloadOnly/v1.16.0/LogsDuration\n"} +{"Time":"2023-05-31T18:43:36.031522657Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Run: out/minikube-linux-amd64 logs -p download-only-440052\n"} +{"Time":"2023-05-31T18:43:36.087704101Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Non-zero exit: out/minikube-linux-amd64 logs -p download-only-440052: exit status 85 (55.856766ms)\n"} +{"Time":"2023-05-31T18:43:36.087734349Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T18:43:36.087738246Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:43:36.087740796Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T18:43:36.087743109Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T18:43:36.087746283Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* |---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T18:43:36.087748932Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T18:43:36.087751787Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T18:43:36.087754258Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-440052 | jenkins | v1.30.1 | 31 May 23 18:43 UTC | |\n"} +{"Time":"2023-05-31T18:43:36.087756618Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | -p download-only-440052 | | | | | |\n"} +{"Time":"2023-05-31T18:43:36.087758769Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T18:43:36.087760842Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T18:43:36.087763066Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T18:43:36.087765233Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --driver=kvm2 | | | | | |\n"} +{"Time":"2023-05-31T18:43:36.087768848Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T18:43:36.087771236Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T18:43:36.087773243Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T18:43:36.087775255Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T18:43:36.087777278Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T18:43:36.087782331Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* Log file created at: 2023/05/31 18:43:27\n"} +{"Time":"2023-05-31T18:43:36.08778539Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tRunning on machine: ubuntu-20-agent-12\n"} +{"Time":"2023-05-31T18:43:36.087787858Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tBinary: Built with gc go1.20.4 for linux/amd64\n"} +{"Time":"2023-05-31T18:43:36.087790641Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T18:43:36.0877929Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.749380 18162 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:43:36.087795241Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.749474 18162 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:43:36.087801061Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.749478 18162 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:43:36.087803376Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.749487 18162 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:43:36.087805458Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.749590 18162 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:43:36.087807743Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 18:43:27.749693 18162 root.go:312] Error reading config file at /home/jenkins/minikube-integration/16569-10887/.minikube/config/config.json: open /home/jenkins/minikube-integration/16569-10887/.minikube/config/config.json: no such file or directory\n"} +{"Time":"2023-05-31T18:43:36.087810022Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.750175 18162 out.go:303] Setting JSON to true\n"} +{"Time":"2023-05-31T18:43:36.087812605Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.750947 18162 start.go:127] hostinfo: {\"hostname\":\"ubuntu-20-agent-12\",\"uptime\":1561,\"bootTime\":1685557047,\"procs\":171,\"os\":\"linux\",\"platform\":\"ubuntu\",\"platformFamily\":\"debian\",\"platformVersion\":\"20.04\",\"kernelVersion\":\"5.15.0-1035-gcp\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"kvm\",\"virtualizationRole\":\"guest\",\"hostId\":\"591c9f12-2938-3743-e2bf-c56a050d43d1\"}\n"} +{"Time":"2023-05-31T18:43:36.087819515Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.751005 18162 start.go:137] virtualization: kvm guest\n"} +{"Time":"2023-05-31T18:43:36.087821654Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.753793 18162 out.go:97] [download-only-440052] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T18:43:36.087823674Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.755792 18162 out.go:169] MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T18:43:36.087825747Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.753894 18162 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T18:43:36.087828095Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 18:43:27.753916 18162 preload.go:295] Failed to list preload files: open /home/jenkins/minikube-integration/16569-10887/.minikube/cache/preloaded-tarball: no such file or directory\n"} +{"Time":"2023-05-31T18:43:36.087830934Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.759467 18162 out.go:169] MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T18:43:36.087835152Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.761270 18162 out.go:169] KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T18:43:36.087839582Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.763139 18162 out.go:169] MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T18:43:36.087842323Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.765010 18162 out.go:169] MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T18:43:36.087844632Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 18:43:27.768355 18162 out.go:272] minikube skips various validations when --force is supplied; this may lead to unexpected behavior\n"} +{"Time":"2023-05-31T18:43:36.087846854Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.768537 18162 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T18:43:36.087848977Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.869420 18162 out.go:97] Using the kvm2 driver based on user configuration\n"} +{"Time":"2023-05-31T18:43:36.087851417Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.869439 18162 start.go:297] selected driver: kvm2\n"} +{"Time":"2023-05-31T18:43:36.087853462Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.869445 18162 start.go:875] validating driver \"kvm2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T18:43:36.087858252Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.869719 18162 install.go:52] acquiring lock: {Name:mk900956b073697a4aa6c80a27c6bb0742a99a53 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T18:43:36.087860986Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.869821 18162 install.go:117] Validating docker-machine-driver-kvm2, PATH=/home/jenkins/minikube-integration/16569-10887/.minikube/bin:/home/jenkins/workspace/KVM_Linux_containerd_integration/out/:/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games:/usr/local/go/bin:/home/jenkins/go/bin:/usr/local/bin/:/usr/local/go/bin/:/home/jenkins/go/bin\n"} +{"Time":"2023-05-31T18:43:36.087863551Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.883207 18162 install.go:137] /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2 version is 1.30.1\n"} +{"Time":"2023-05-31T18:43:36.087865765Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.883278 18162 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T18:43:36.087867927Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.883775 18162 start_flags.go:382] Using suggested 6000MB memory alloc based on sys=32101MB, container=0MB\n"} +{"Time":"2023-05-31T18:43:36.087871682Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.883916 18162 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T18:43:36.087874632Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.883941 18162 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T18:43:36.087876804Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.883953 18162 cni.go:145] \"kvm2\" driver + \"containerd\" runtime found, recommending bridge\n"} +{"Time":"2023-05-31T18:43:36.087879072Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.883959 18162 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T18:43:36.087881151Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.883968 18162 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T18:43:36.087885111Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t{Name:download-only-440052 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:6000 CPUs:2 DiskSize:20000 VMDriver: Driver:kvm2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:download-only-440052 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRunt"} +{"Time":"2023-05-31T18:43:36.087894337Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"ime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/home/jenkins:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T18:43:36.087901683Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.884160 18162 iso.go:125] acquiring lock: {Name:mk5b083a948c9ceca29579261cce376d0ffdbeae Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T18:43:36.087905133Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.886648 18162 out.go:97] Downloading VM boot image ...\n"} +{"Time":"2023-05-31T18:43:36.087908999Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:27.886715 18162 download.go:107] Downloading: https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso?checksum=file:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso.sha256 -\u003e /home/jenkins/minikube-integration/16569-10887/.minikube/cache/iso/amd64/minikube-v1.30.1-1684885329-16572-amd64.iso\n"} +{"Time":"2023-05-31T18:43:36.087914194Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:30.673053 18162 out.go:97] Starting control plane node download-only-440052 in cluster download-only-440052\n"} +{"Time":"2023-05-31T18:43:36.087917404Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:30.673068 18162 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime containerd\n"} +{"Time":"2023-05-31T18:43:36.087921015Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:30.699043 18162 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.16.0/preloaded-images-k8s-v18-v1.16.0-containerd-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T18:43:36.087924268Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:30.699079 18162 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T18:43:36.087927574Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:30.699220 18162 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime containerd\n"} +{"Time":"2023-05-31T18:43:36.087931103Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:30.701252 18162 out.go:97] Downloading Kubernetes v1.16.0 preload ...\n"} +{"Time":"2023-05-31T18:43:36.087934857Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:30.701273 18162 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.16.0-containerd-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T18:43:36.087939015Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 18:43:30.733134 18162 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.16.0/preloaded-images-k8s-v18-v1.16.0-containerd-overlay2-amd64.tar.lz4?checksum=md5:d96a2b2afa188e17db7ddabb58d563fd -\u003e /home/jenkins/minikube-integration/16569-10887/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-containerd-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T18:43:36.087942963Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T18:43:36.087945927Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T18:43:36.087948821Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* The control plane node \"\" does not exist.\n"} +{"Time":"2023-05-31T18:43:36.087952159Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t To start a cluster, run: \"minikube start -p download-only-440052\"\n"} +{"Time":"2023-05-31T18:43:36.087955394Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T18:43:36.087958442Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:43:36.087961836Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:170: minikube logs failed with error: exit status 85\n"} +{"Time":"2023-05-31T18:43:36.087969338Z","Action":"run","Test":"TestDownloadOnly/v1.27.2"} +{"Time":"2023-05-31T18:43:36.08797809Z","Action":"output","Test":"TestDownloadOnly/v1.27.2","Output":"=== RUN TestDownloadOnly/v1.27.2\n"} +{"Time":"2023-05-31T18:43:36.087983351Z","Action":"run","Test":"TestDownloadOnly/v1.27.2/json-events"} +{"Time":"2023-05-31T18:43:36.087992373Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":"=== RUN TestDownloadOnly/v1.27.2/json-events\n"} +{"Time":"2023-05-31T18:43:36.08799636Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" aaa_download_only_test.go:69: (dbg) Run: out/minikube-linux-amd64 start -o=json --download-only -p download-only-440052 --force --alsologtostderr --kubernetes-version=v1.27.2 --container-runtime=containerd --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:43:42.191564701Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" aaa_download_only_test.go:69: (dbg) Done: out/minikube-linux-amd64 start -o=json --download-only -p download-only-440052 --force --alsologtostderr --kubernetes-version=v1.27.2 --container-runtime=containerd --driver=kvm2 --container-runtime=containerd: (6.103662308s)\n"} +{"Time":"2023-05-31T18:43:42.191665282Z","Action":"run","Test":"TestDownloadOnly/v1.27.2/preload-exists"} +{"Time":"2023-05-31T18:43:42.191671492Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/preload-exists","Output":"=== RUN TestDownloadOnly/v1.27.2/preload-exists\n"} +{"Time":"2023-05-31T18:43:42.191743882Z","Action":"run","Test":"TestDownloadOnly/v1.27.2/cached-images"} +{"Time":"2023-05-31T18:43:42.191751326Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":"=== RUN TestDownloadOnly/v1.27.2/cached-images\n"} +{"Time":"2023-05-31T18:43:42.191757824Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":" aaa_download_only_test.go:117: Preload exists, images won't be cached\n"} +{"Time":"2023-05-31T18:43:42.191801646Z","Action":"run","Test":"TestDownloadOnly/v1.27.2/binaries"} +{"Time":"2023-05-31T18:43:42.191809014Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":"=== RUN TestDownloadOnly/v1.27.2/binaries\n"} +{"Time":"2023-05-31T18:43:42.191814809Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":" aaa_download_only_test.go:136: Preload exists, binaries are present within.\n"} +{"Time":"2023-05-31T18:43:42.191833544Z","Action":"run","Test":"TestDownloadOnly/v1.27.2/kubectl"} +{"Time":"2023-05-31T18:43:42.191836965Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/kubectl","Output":"=== RUN TestDownloadOnly/v1.27.2/kubectl\n"} +{"Time":"2023-05-31T18:43:42.191842568Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/kubectl","Output":" aaa_download_only_test.go:152: Test for darwin and windows\n"} +{"Time":"2023-05-31T18:43:42.19188136Z","Action":"run","Test":"TestDownloadOnly/v1.27.2/LogsDuration"} +{"Time":"2023-05-31T18:43:42.191884727Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"=== RUN TestDownloadOnly/v1.27.2/LogsDuration\n"} +{"Time":"2023-05-31T18:43:42.191920707Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Run: out/minikube-linux-amd64 logs -p download-only-440052\n"} +{"Time":"2023-05-31T18:43:42.246383459Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Non-zero exit: out/minikube-linux-amd64 logs -p download-only-440052: exit status 85 (54.000943ms)\n"} +{"Time":"2023-05-31T18:43:42.246412159Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T18:43:42.246416056Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:43:42.246418754Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T18:43:42.246421208Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T18:43:42.246424916Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* |---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T18:43:42.246427451Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T18:43:42.246431313Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T18:43:42.246433599Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-440052 | jenkins | v1.30.1 | 31 May 23 18:43 UTC | |\n"} +{"Time":"2023-05-31T18:43:42.246435912Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | -p download-only-440052 | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246438156Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246440473Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246442964Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246445133Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --driver=kvm2 | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246447317Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246474829Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-440052 | jenkins | v1.30.1 | 31 May 23 18:43 UTC | |\n"} +{"Time":"2023-05-31T18:43:42.24648031Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | -p download-only-440052 | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246484603Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246488633Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246493266Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246497865Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --driver=kvm2 | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246511248Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T18:43:42.246514567Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T18:43:42.246518231Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T18:43:42.246520397Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T18:43:42.246522543Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T18:43:42.246525058Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* Log file created at: 2023/05/31 18:43:36\n"} +{"Time":"2023-05-31T18:43:42.246527354Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tRunning on machine: ubuntu-20-agent-12\n"} +{"Time":"2023-05-31T18:43:42.246529668Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tBinary: Built with gc go1.20.4 for linux/amd64\n"} +{"Time":"2023-05-31T18:43:42.246532469Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T18:43:42.246534631Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.120443 18218 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:43:42.246536977Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.120579 18218 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:43:42.246541843Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.120597 18218 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:43:42.246546324Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.120604 18218 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:43:42.246550451Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.120707 18218 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:43:42.246554793Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 18:43:36.120812 18218 root.go:312] Error reading config file at /home/jenkins/minikube-integration/16569-10887/.minikube/config/config.json: open /home/jenkins/minikube-integration/16569-10887/.minikube/config/config.json: no such file or directory\n"} +{"Time":"2023-05-31T18:43:42.246559353Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.121193 18218 out.go:303] Setting JSON to true\n"} +{"Time":"2023-05-31T18:43:42.246564549Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.121988 18218 start.go:127] hostinfo: {\"hostname\":\"ubuntu-20-agent-12\",\"uptime\":1569,\"bootTime\":1685557047,\"procs\":169,\"os\":\"linux\",\"platform\":\"ubuntu\",\"platformFamily\":\"debian\",\"platformVersion\":\"20.04\",\"kernelVersion\":\"5.15.0-1035-gcp\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"kvm\",\"virtualizationRole\":\"guest\",\"hostId\":\"591c9f12-2938-3743-e2bf-c56a050d43d1\"}\n"} +{"Time":"2023-05-31T18:43:42.246572319Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.122038 18218 start.go:137] virtualization: kvm guest\n"} +{"Time":"2023-05-31T18:43:42.246579939Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.124678 18218 out.go:97] [download-only-440052] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T18:43:42.246584459Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.126746 18218 out.go:169] MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T18:43:42.246589653Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.124803 18218 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T18:43:42.246593891Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.130552 18218 out.go:169] MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T18:43:42.246598317Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.132446 18218 out.go:169] KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T18:43:42.246603269Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.133988 18218 out.go:169] MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T18:43:42.246605893Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.135652 18218 out.go:169] MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T18:43:42.246607983Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 18:43:36.138641 18218 out.go:272] minikube skips various validations when --force is supplied; this may lead to unexpected behavior\n"} +{"Time":"2023-05-31T18:43:42.246610319Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.138967 18218 config.go:182] Loaded profile config \"download-only-440052\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T18:43:42.246612879Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 18:43:36.139003 18218 start.go:783] api.Load failed for download-only-440052: filestore \"download-only-440052\": Docker machine \"download-only-440052\" does not exist. Use \"docker-machine ls\" to list machines. Use \"docker-machine create\" to add a new one.\n"} +{"Time":"2023-05-31T18:43:42.246615449Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.139074 18218 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T18:43:42.246626835Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 18:43:36.139097 18218 start.go:783] api.Load failed for download-only-440052: filestore \"download-only-440052\": Docker machine \"download-only-440052\" does not exist. Use \"docker-machine ls\" to list machines. Use \"docker-machine create\" to add a new one.\n"} +{"Time":"2023-05-31T18:43:42.246638703Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.168987 18218 out.go:97] Using the kvm2 driver based on existing profile\n"} +{"Time":"2023-05-31T18:43:42.246642729Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.169007 18218 start.go:297] selected driver: kvm2\n"} +{"Time":"2023-05-31T18:43:42.246650253Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.169011 18218 start.go:875] validating driver \"kvm2\" against \u0026{Name:download-only-440052 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:6000 CPUs:2 DiskSize:20000 VMDriver: Driver:kvm2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesCon"} +{"Time":"2023-05-31T18:43:42.246659396Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"fig:{KubernetesVersion:v1.16.0 ClusterName:download-only-440052 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:containerd ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/home/jenkins:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker B"} +{"Time":"2023-05-31T18:43:42.246669967Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"inaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T18:43:42.246675047Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.169298 18218 install.go:52] acquiring lock: {Name:mk900956b073697a4aa6c80a27c6bb0742a99a53 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T18:43:42.246680153Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.169362 18218 install.go:117] Validating docker-machine-driver-kvm2, PATH=/home/jenkins/minikube-integration/16569-10887/.minikube/bin:/home/jenkins/workspace/KVM_Linux_containerd_integration/out/:/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games:/usr/local/go/bin:/home/jenkins/go/bin:/usr/local/bin/:/usr/local/go/bin/:/home/jenkins/go/bin\n"} +{"Time":"2023-05-31T18:43:42.246684823Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.182311 18218 install.go:137] /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2 version is 1.30.1\n"} +{"Time":"2023-05-31T18:43:42.246688894Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.182946 18218 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T18:43:42.246692708Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.182966 18218 cni.go:145] \"kvm2\" driver + \"containerd\" runtime found, recommending bridge\n"} +{"Time":"2023-05-31T18:43:42.246696715Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.182976 18218 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T18:43:42.246703943Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t{Name:download-only-440052 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:6000 CPUs:2 DiskSize:20000 VMDriver: Driver:kvm2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:download-only-440052 Namespace:defa"} +{"Time":"2023-05-31T18:43:42.246712242Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"ult APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:containerd ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/home/jenkins:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwar"} +{"Time":"2023-05-31T18:43:42.246717655Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"ePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T18:43:42.246721901Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.183139 18218 iso.go:125] acquiring lock: {Name:mk5b083a948c9ceca29579261cce376d0ffdbeae Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T18:43:42.24672612Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.185013 18218 out.go:97] Starting control plane node download-only-440052 in cluster download-only-440052\n"} +{"Time":"2023-05-31T18:43:42.246729656Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.185025 18218 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime containerd\n"} +{"Time":"2023-05-31T18:43:42.246734175Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.210084 18218 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.27.2/preloaded-images-k8s-v18-v1.27.2-containerd-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T18:43:42.246738605Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.210107 18218 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T18:43:42.246743149Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.210206 18218 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime containerd\n"} +{"Time":"2023-05-31T18:43:42.246747445Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.212041 18218 out.go:97] Downloading Kubernetes v1.27.2 preload ...\n"} +{"Time":"2023-05-31T18:43:42.24675217Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.212054 18218 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.27.2-containerd-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T18:43:42.246757132Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:36.240774 18218 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.27.2/preloaded-images-k8s-v18-v1.27.2-containerd-overlay2-amd64.tar.lz4?checksum=md5:2b54c0e28812c8d64cf43888ed9073ac -\u003e /home/jenkins/minikube-integration/16569-10887/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-containerd-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T18:43:42.246762111Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:40.667497 18218 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.27.2-containerd-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T18:43:42.246766602Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 18:43:40.667589 18218 preload.go:256] verifying checksum of /home/jenkins/minikube-integration/16569-10887/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-containerd-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T18:43:42.246771027Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T18:43:42.246774795Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T18:43:42.246778569Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* The control plane node \"\" does not exist.\n"} +{"Time":"2023-05-31T18:43:42.246782689Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t To start a cluster, run: \"minikube start -p download-only-440052\"\n"} +{"Time":"2023-05-31T18:43:42.246786565Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T18:43:42.246790394Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:43:42.246794252Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:170: minikube logs failed with error: exit status 85\n"} +{"Time":"2023-05-31T18:43:42.246807701Z","Action":"run","Test":"TestDownloadOnly/DeleteAll"} +{"Time":"2023-05-31T18:43:42.246812226Z","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":"=== RUN TestDownloadOnly/DeleteAll\n"} +{"Time":"2023-05-31T18:43:42.246816464Z","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":" aaa_download_only_test.go:187: (dbg) Run: out/minikube-linux-amd64 delete --all\n"} +{"Time":"2023-05-31T18:43:42.363517433Z","Action":"run","Test":"TestDownloadOnly/DeleteAlwaysSucceeds"} +{"Time":"2023-05-31T18:43:42.363536864Z","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":"=== RUN TestDownloadOnly/DeleteAlwaysSucceeds\n"} +{"Time":"2023-05-31T18:43:42.363543305Z","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":" aaa_download_only_test.go:199: (dbg) Run: out/minikube-linux-amd64 delete -p download-only-440052\n"} +{"Time":"2023-05-31T18:43:42.475979019Z","Action":"output","Test":"TestDownloadOnly","Output":" helpers_test.go:175: Cleaning up \"download-only-440052\" profile ...\n"} +{"Time":"2023-05-31T18:43:42.476001631Z","Action":"output","Test":"TestDownloadOnly","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p download-only-440052\n"} +{"Time":"2023-05-31T18:43:42.583354317Z","Action":"output","Test":"TestDownloadOnly","Output":"--- PASS: TestDownloadOnly (14.87s)\n"} +{"Time":"2023-05-31T18:43:42.583375762Z","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" --- PASS: TestDownloadOnly/v1.16.0 (8.37s)\n"} +{"Time":"2023-05-31T18:43:42.583379901Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" --- PASS: TestDownloadOnly/v1.16.0/json-events (8.31s)\n"} +{"Time":"2023-05-31T18:43:42.583383174Z","Action":"pass","Test":"TestDownloadOnly/v1.16.0/json-events","Elapsed":8.31} +{"Time":"2023-05-31T18:43:42.583388619Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/preload-exists","Output":" --- PASS: TestDownloadOnly/v1.16.0/preload-exists (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583391189Z","Action":"pass","Test":"TestDownloadOnly/v1.16.0/preload-exists","Elapsed":0} +{"Time":"2023-05-31T18:43:42.583393304Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":" --- SKIP: TestDownloadOnly/v1.16.0/cached-images (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583395706Z","Action":"skip","Test":"TestDownloadOnly/v1.16.0/cached-images","Elapsed":0} +{"Time":"2023-05-31T18:43:42.583397756Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":" --- SKIP: TestDownloadOnly/v1.16.0/binaries (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583405403Z","Action":"skip","Test":"TestDownloadOnly/v1.16.0/binaries","Elapsed":0} +{"Time":"2023-05-31T18:43:42.583409034Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/kubectl","Output":" --- SKIP: TestDownloadOnly/v1.16.0/kubectl (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583412639Z","Action":"skip","Test":"TestDownloadOnly/v1.16.0/kubectl","Elapsed":0} +{"Time":"2023-05-31T18:43:42.583416191Z","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" --- PASS: TestDownloadOnly/v1.16.0/LogsDuration (0.06s)\n"} +{"Time":"2023-05-31T18:43:42.583419516Z","Action":"pass","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Elapsed":0.06} +{"Time":"2023-05-31T18:43:42.583422396Z","Action":"pass","Test":"TestDownloadOnly/v1.16.0","Elapsed":8.37} +{"Time":"2023-05-31T18:43:42.583425476Z","Action":"output","Test":"TestDownloadOnly/v1.27.2","Output":" --- PASS: TestDownloadOnly/v1.27.2 (6.16s)\n"} +{"Time":"2023-05-31T18:43:42.583429672Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" --- PASS: TestDownloadOnly/v1.27.2/json-events (6.10s)\n"} +{"Time":"2023-05-31T18:43:42.583433352Z","Action":"pass","Test":"TestDownloadOnly/v1.27.2/json-events","Elapsed":6.1} +{"Time":"2023-05-31T18:43:42.583436522Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/preload-exists","Output":" --- PASS: TestDownloadOnly/v1.27.2/preload-exists (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583440232Z","Action":"pass","Test":"TestDownloadOnly/v1.27.2/preload-exists","Elapsed":0} +{"Time":"2023-05-31T18:43:42.583442881Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":" --- SKIP: TestDownloadOnly/v1.27.2/cached-images (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583445346Z","Action":"skip","Test":"TestDownloadOnly/v1.27.2/cached-images","Elapsed":0} +{"Time":"2023-05-31T18:43:42.583447194Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":" --- SKIP: TestDownloadOnly/v1.27.2/binaries (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583449609Z","Action":"skip","Test":"TestDownloadOnly/v1.27.2/binaries","Elapsed":0} +{"Time":"2023-05-31T18:43:42.58345156Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/kubectl","Output":" --- SKIP: TestDownloadOnly/v1.27.2/kubectl (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583453936Z","Action":"skip","Test":"TestDownloadOnly/v1.27.2/kubectl","Elapsed":0} +{"Time":"2023-05-31T18:43:42.58345581Z","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" --- PASS: TestDownloadOnly/v1.27.2/LogsDuration (0.05s)\n"} +{"Time":"2023-05-31T18:43:42.583458307Z","Action":"pass","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Elapsed":0.05} +{"Time":"2023-05-31T18:43:42.583460083Z","Action":"pass","Test":"TestDownloadOnly/v1.27.2","Elapsed":6.16} +{"Time":"2023-05-31T18:43:42.583461978Z","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":" --- PASS: TestDownloadOnly/DeleteAll (0.12s)\n"} +{"Time":"2023-05-31T18:43:42.583464047Z","Action":"pass","Test":"TestDownloadOnly/DeleteAll","Elapsed":0.12} +{"Time":"2023-05-31T18:43:42.583466533Z","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":" --- PASS: TestDownloadOnly/DeleteAlwaysSucceeds (0.11s)\n"} +{"Time":"2023-05-31T18:43:42.583468759Z","Action":"pass","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Elapsed":0.11} +{"Time":"2023-05-31T18:43:42.583470553Z","Action":"pass","Test":"TestDownloadOnly","Elapsed":14.87} +{"Time":"2023-05-31T18:43:42.58347228Z","Action":"run","Test":"TestDownloadOnlyKic"} +{"Time":"2023-05-31T18:43:42.583474197Z","Action":"output","Test":"TestDownloadOnlyKic","Output":"=== RUN TestDownloadOnlyKic\n"} +{"Time":"2023-05-31T18:43:42.583477929Z","Action":"output","Test":"TestDownloadOnlyKic","Output":" aaa_download_only_test.go:210: skipping, only for docker or podman driver\n"} +{"Time":"2023-05-31T18:43:42.583481541Z","Action":"output","Test":"TestDownloadOnlyKic","Output":"--- SKIP: TestDownloadOnlyKic (0.00s)\n"} +{"Time":"2023-05-31T18:43:42.583483573Z","Action":"skip","Test":"TestDownloadOnlyKic","Elapsed":0} +{"Time":"2023-05-31T18:43:42.583485195Z","Action":"run","Test":"TestBinaryMirror"} +{"Time":"2023-05-31T18:43:42.583486827Z","Action":"output","Test":"TestBinaryMirror","Output":"=== RUN TestBinaryMirror\n"} +{"Time":"2023-05-31T18:43:42.73510612Z","Action":"output","Test":"TestBinaryMirror","Output":" aaa_download_only_test.go:304: (dbg) Run: out/minikube-linux-amd64 start --download-only -p binary-mirror-408545 --alsologtostderr --binary-mirror http://127.0.0.1:41601 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:43:43.031640387Z","Action":"output","Test":"TestBinaryMirror","Output":" helpers_test.go:175: Cleaning up \"binary-mirror-408545\" profile ...\n"} +{"Time":"2023-05-31T18:43:43.031668138Z","Action":"output","Test":"TestBinaryMirror","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p binary-mirror-408545\n"} +{"Time":"2023-05-31T18:43:43.113321828Z","Action":"output","Test":"TestBinaryMirror","Output":"--- PASS: TestBinaryMirror (0.53s)\n"} +{"Time":"2023-05-31T18:43:43.113348324Z","Action":"pass","Test":"TestBinaryMirror","Elapsed":0.53} +{"Time":"2023-05-31T18:43:43.113355349Z","Action":"run","Test":"TestOffline"} +{"Time":"2023-05-31T18:43:43.113358409Z","Action":"output","Test":"TestOffline","Output":"=== RUN TestOffline\n"} +{"Time":"2023-05-31T18:43:43.113364912Z","Action":"output","Test":"TestOffline","Output":"=== PAUSE TestOffline\n"} +{"Time":"2023-05-31T18:43:43.113367525Z","Action":"pause","Test":"TestOffline"} +{"Time":"2023-05-31T18:43:43.113370125Z","Action":"run","Test":"TestAddons"} +{"Time":"2023-05-31T18:43:43.113372715Z","Action":"output","Test":"TestAddons","Output":"=== RUN TestAddons\n"} +{"Time":"2023-05-31T18:43:43.113376992Z","Action":"run","Test":"TestAddons/Setup"} +{"Time":"2023-05-31T18:43:43.113380155Z","Action":"output","Test":"TestAddons/Setup","Output":"=== RUN TestAddons/Setup\n"} +{"Time":"2023-05-31T18:43:43.11346534Z","Action":"output","Test":"TestAddons/Setup","Output":" addons_test.go:88: (dbg) Run: out/minikube-linux-amd64 start -p addons-346378 --wait=true --memory=4000 --alsologtostderr --addons=registry --addons=metrics-server --addons=volumesnapshots --addons=csi-hostpath-driver --addons=gcp-auth --addons=cloud-spanner --addons=inspektor-gadget --driver=kvm2 --container-runtime=containerd --addons=ingress --addons=ingress-dns --addons=helm-tiller\n"} +{"Time":"2023-05-31T18:46:08.273633133Z","Action":"output","Test":"TestAddons/Setup","Output":" addons_test.go:88: (dbg) Done: out/minikube-linux-amd64 start -p addons-346378 --wait=true --memory=4000 --alsologtostderr --addons=registry --addons=metrics-server --addons=volumesnapshots --addons=csi-hostpath-driver --addons=gcp-auth --addons=cloud-spanner --addons=inspektor-gadget --driver=kvm2 --container-runtime=containerd --addons=ingress --addons=ingress-dns --addons=helm-tiller: (2m25.160015192s)\n"} +{"Time":"2023-05-31T18:46:08.273696705Z","Action":"run","Test":"TestAddons/parallel"} +{"Time":"2023-05-31T18:46:08.273701587Z","Action":"output","Test":"TestAddons/parallel","Output":"=== RUN TestAddons/parallel\n"} +{"Time":"2023-05-31T18:46:08.273709069Z","Action":"run","Test":"TestAddons/parallel/Registry"} +{"Time":"2023-05-31T18:46:08.273714831Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":"=== RUN TestAddons/parallel/Registry\n"} +{"Time":"2023-05-31T18:46:08.273719493Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":"=== PAUSE TestAddons/parallel/Registry\n"} +{"Time":"2023-05-31T18:46:08.273722209Z","Action":"pause","Test":"TestAddons/parallel/Registry"} +{"Time":"2023-05-31T18:46:08.273726Z","Action":"run","Test":"TestAddons/parallel/Ingress"} +{"Time":"2023-05-31T18:46:08.273728789Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":"=== RUN TestAddons/parallel/Ingress\n"} +{"Time":"2023-05-31T18:46:08.273732099Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":"=== PAUSE TestAddons/parallel/Ingress\n"} +{"Time":"2023-05-31T18:46:08.273734946Z","Action":"pause","Test":"TestAddons/parallel/Ingress"} +{"Time":"2023-05-31T18:46:08.273738951Z","Action":"run","Test":"TestAddons/parallel/InspektorGadget"} +{"Time":"2023-05-31T18:46:08.273742424Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":"=== RUN TestAddons/parallel/InspektorGadget\n"} +{"Time":"2023-05-31T18:46:08.273749899Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":"=== PAUSE TestAddons/parallel/InspektorGadget\n"} +{"Time":"2023-05-31T18:46:08.273752696Z","Action":"pause","Test":"TestAddons/parallel/InspektorGadget"} +{"Time":"2023-05-31T18:46:08.27375616Z","Action":"run","Test":"TestAddons/parallel/MetricsServer"} +{"Time":"2023-05-31T18:46:08.273758719Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":"=== RUN TestAddons/parallel/MetricsServer\n"} +{"Time":"2023-05-31T18:46:08.273762463Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":"=== PAUSE TestAddons/parallel/MetricsServer\n"} +{"Time":"2023-05-31T18:46:08.273765456Z","Action":"pause","Test":"TestAddons/parallel/MetricsServer"} +{"Time":"2023-05-31T18:46:08.273768211Z","Action":"run","Test":"TestAddons/parallel/HelmTiller"} +{"Time":"2023-05-31T18:46:08.273770926Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":"=== RUN TestAddons/parallel/HelmTiller\n"} +{"Time":"2023-05-31T18:46:08.27377554Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":"=== PAUSE TestAddons/parallel/HelmTiller\n"} +{"Time":"2023-05-31T18:46:08.273778321Z","Action":"pause","Test":"TestAddons/parallel/HelmTiller"} +{"Time":"2023-05-31T18:46:08.273781071Z","Action":"run","Test":"TestAddons/parallel/Olm"} +{"Time":"2023-05-31T18:46:08.27378362Z","Action":"output","Test":"TestAddons/parallel/Olm","Output":"=== RUN TestAddons/parallel/Olm\n"} +{"Time":"2023-05-31T18:46:08.273787079Z","Action":"output","Test":"TestAddons/parallel/Olm","Output":"=== PAUSE TestAddons/parallel/Olm\n"} +{"Time":"2023-05-31T18:46:08.273794893Z","Action":"pause","Test":"TestAddons/parallel/Olm"} +{"Time":"2023-05-31T18:46:08.27379926Z","Action":"run","Test":"TestAddons/parallel/CSI"} +{"Time":"2023-05-31T18:46:08.273802095Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":"=== RUN TestAddons/parallel/CSI\n"} +{"Time":"2023-05-31T18:46:08.27380546Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":"=== PAUSE TestAddons/parallel/CSI\n"} +{"Time":"2023-05-31T18:46:08.273807838Z","Action":"pause","Test":"TestAddons/parallel/CSI"} +{"Time":"2023-05-31T18:46:08.273812013Z","Action":"run","Test":"TestAddons/parallel/Headlamp"} +{"Time":"2023-05-31T18:46:08.273814733Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":"=== RUN TestAddons/parallel/Headlamp\n"} +{"Time":"2023-05-31T18:46:08.273851478Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":"=== PAUSE TestAddons/parallel/Headlamp\n"} +{"Time":"2023-05-31T18:46:08.273854679Z","Action":"pause","Test":"TestAddons/parallel/Headlamp"} +{"Time":"2023-05-31T18:46:08.273863995Z","Action":"run","Test":"TestAddons/parallel/CloudSpanner"} +{"Time":"2023-05-31T18:46:08.273866955Z","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":"=== RUN TestAddons/parallel/CloudSpanner\n"} +{"Time":"2023-05-31T18:46:08.274213589Z","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":"=== PAUSE TestAddons/parallel/CloudSpanner\n"} +{"Time":"2023-05-31T18:46:08.27423282Z","Action":"pause","Test":"TestAddons/parallel/CloudSpanner"} +{"Time":"2023-05-31T18:46:08.274236371Z","Action":"cont","Test":"TestAddons/parallel/Registry"} +{"Time":"2023-05-31T18:46:08.274238835Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":"=== CONT TestAddons/parallel/Registry\n"} +{"Time":"2023-05-31T18:46:08.274243934Z","Action":"cont","Test":"TestAddons/parallel/Olm"} +{"Time":"2023-05-31T18:46:08.274246405Z","Action":"output","Test":"TestAddons/parallel/Olm","Output":"=== CONT TestAddons/parallel/Olm\n"} +{"Time":"2023-05-31T18:46:08.274251813Z","Action":"cont","Test":"TestAddons/parallel/HelmTiller"} +{"Time":"2023-05-31T18:46:08.27425457Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":"=== CONT TestAddons/parallel/HelmTiller\n"} +{"Time":"2023-05-31T18:46:08.274258473Z","Action":"output","Test":"TestAddons/parallel/Olm","Output":" addons_test.go:474: Skipping OLM addon test until https://github.com/operator-framework/operator-lifecycle-manager/issues/2534 is resolved\n"} +{"Time":"2023-05-31T18:46:08.274264678Z","Action":"cont","Test":"TestAddons/parallel/Headlamp"} +{"Time":"2023-05-31T18:46:08.274267014Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":"=== CONT TestAddons/parallel/Headlamp\n"} +{"Time":"2023-05-31T18:46:08.274269984Z","Action":"cont","Test":"TestAddons/parallel/MetricsServer"} +{"Time":"2023-05-31T18:46:08.27427292Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":"=== CONT TestAddons/parallel/MetricsServer\n"} +{"Time":"2023-05-31T18:46:08.274276385Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" addons_test.go:800: (dbg) Run: out/minikube-linux-amd64 addons enable headlamp -p addons-346378 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:46:08.315919287Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:306: registry stabilized in 40.014069ms\n"} +{"Time":"2023-05-31T18:46:08.315949173Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:432: tiller-deploy stabilized in 39.902967ms\n"} +{"Time":"2023-05-31T18:46:08.316618242Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:434: (dbg) TestAddons/parallel/HelmTiller: waiting 6m0s for pods matching \"app=helm\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T18:46:08.316736473Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:308: (dbg) TestAddons/parallel/Registry: waiting 6m0s for pods matching \"actual-registry=true\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T18:46:08.317432502Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:383: metrics-server stabilized in 41.509104ms\n"} +{"Time":"2023-05-31T18:46:08.318178542Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:385: (dbg) TestAddons/parallel/MetricsServer: waiting 6m0s for pods matching \"k8s-app=metrics-server\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T18:46:08.323236121Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" helpers_test.go:344: \"registry-srp2v\" [c2e35d44-2586-40ef-86c7-e5a72e0d22b9] Running\n"} +{"Time":"2023-05-31T18:46:08.323364044Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" helpers_test.go:344: \"tiller-deploy-6847666dc-r8tvj\" [e12359d3-d6d5-4cb0-a30b-cb57693906d1] Running\n"} +{"Time":"2023-05-31T18:46:08.325710984Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" helpers_test.go:344: \"metrics-server-844d8db974-rpcmj\" [bcba0151-88cc-46bb-9942-a00589abb457] Running\n"} +{"Time":"2023-05-31T18:46:09.655966772Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" addons_test.go:800: (dbg) Done: out/minikube-linux-amd64 addons enable headlamp -p addons-346378 --alsologtostderr -v=1: (1.381781826s)\n"} +{"Time":"2023-05-31T18:46:09.656863517Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" addons_test.go:805: (dbg) TestAddons/parallel/Headlamp: waiting 8m0s for pods matching \"app.kubernetes.io/name=headlamp\" in namespace \"headlamp\" ...\n"} +{"Time":"2023-05-31T18:46:09.664929159Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" helpers_test.go:344: \"headlamp-6b5756787-bls5w\" [f6c1eb1f-e4b1-494c-afe9-1a71be8f6896] Pending\n"} +{"Time":"2023-05-31T18:46:10.668677597Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" helpers_test.go:344: \"headlamp-6b5756787-bls5w\" [f6c1eb1f-e4b1-494c-afe9-1a71be8f6896] Pending / Ready:ContainersNotReady (containers with unready status: [headlamp]) / ContainersReady:ContainersNotReady (containers with unready status: [headlamp])\n"} +{"Time":"2023-05-31T18:46:13.33015254Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:308: (dbg) TestAddons/parallel/Registry: actual-registry=true healthy within 5.013393452s\n"} +{"Time":"2023-05-31T18:46:13.330821233Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:311: (dbg) TestAddons/parallel/Registry: waiting 10m0s for pods matching \"registry-proxy=true\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T18:46:13.331876214Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:434: (dbg) TestAddons/parallel/HelmTiller: app=helm healthy within 5.015243145s\n"} +{"Time":"2023-05-31T18:46:13.331941222Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:449: (dbg) Run: kubectl --context addons-346378 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version\n"} +{"Time":"2023-05-31T18:46:13.334282792Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:385: (dbg) TestAddons/parallel/MetricsServer: k8s-app=metrics-server healthy within 5.016095101s\n"} +{"Time":"2023-05-31T18:46:13.334343145Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:391: (dbg) Run: kubectl --context addons-346378 top pods -n kube-system\n"} +{"Time":"2023-05-31T18:46:13.338719842Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" helpers_test.go:344: \"registry-proxy-2cnzw\" [b67e7ffb-f810-43cd-ac87-38e3ba43c611] Running\n"} +{"Time":"2023-05-31T18:46:13.428156689Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" addons_test.go:408: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 addons disable metrics-server --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:46:14.056061165Z","Action":"cont","Test":"TestAddons/parallel/CloudSpanner"} +{"Time":"2023-05-31T18:46:14.05608718Z","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":"=== CONT TestAddons/parallel/CloudSpanner\n"} +{"Time":"2023-05-31T18:46:14.064481304Z","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" addons_test.go:833: (dbg) TestAddons/parallel/CloudSpanner: waiting 6m0s for pods matching \"app=cloud-spanner-emulator\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:46:14.074721998Z","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" helpers_test.go:344: \"cloud-spanner-emulator-6964794569-nnmll\" [f06e903d-e079-4011-a193-3918473c8793] Running\n"} +{"Time":"2023-05-31T18:46:16.669596647Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" helpers_test.go:344: \"headlamp-6b5756787-bls5w\" [f6c1eb1f-e4b1-494c-afe9-1a71be8f6896] Running\n"} +{"Time":"2023-05-31T18:46:18.345654757Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:311: (dbg) TestAddons/parallel/Registry: registry-proxy=true healthy within 5.014826198s\n"} +{"Time":"2023-05-31T18:46:18.345688652Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:316: (dbg) Run: kubectl --context addons-346378 delete po -l run=registry-test --now\n"} +{"Time":"2023-05-31T18:46:18.402159619Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:321: (dbg) Run: kubectl --context addons-346378 run --rm registry-test --restart=Never --image=gcr.io/k8s-minikube/busybox -it -- sh -c \"wget --spider -S http://registry.kube-system.svc.cluster.local\"\n"} +{"Time":"2023-05-31T18:46:19.078283191Z","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" addons_test.go:833: (dbg) TestAddons/parallel/CloudSpanner: app=cloud-spanner-emulator healthy within 5.013802115s\n"} +{"Time":"2023-05-31T18:46:19.078313355Z","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" addons_test.go:836: (dbg) Run: out/minikube-linux-amd64 addons disable cloud-spanner -p addons-346378\n"} +{"Time":"2023-05-31T18:46:19.514803124Z","Action":"cont","Test":"TestAddons/parallel/InspektorGadget"} +{"Time":"2023-05-31T18:46:19.514830443Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":"=== CONT TestAddons/parallel/InspektorGadget\n"} +{"Time":"2023-05-31T18:46:19.515657794Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" addons_test.go:814: (dbg) TestAddons/parallel/InspektorGadget: waiting 8m0s for pods matching \"k8s-app=gadget\" in namespace \"gadget\" ...\n"} +{"Time":"2023-05-31T18:46:19.520922036Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" helpers_test.go:344: \"gadget-rcq9l\" [de738a1e-1b89-46d1-88ec-9aa5385b8f69] Running\n"} +{"Time":"2023-05-31T18:46:19.635123266Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:449: (dbg) Done: kubectl --context addons-346378 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version: (6.303114597s)\n"} +{"Time":"2023-05-31T18:46:19.635151157Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:454: kubectl --context addons-346378 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version: unexpected stderr: Unable to use a TTY - input is not a terminal or the right kind of file\n"} +{"Time":"2023-05-31T18:46:19.635154533Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" If you don't see a command prompt, try pressing enter.\n"} +{"Time":"2023-05-31T18:46:19.635157312Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" warning: couldn't attach to pod/helm-test, falling back to streaming logs: \n"} +{"Time":"2023-05-31T18:46:20.094082932Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:449: (dbg) Run: kubectl --context addons-346378 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version\n"} +{"Time":"2023-05-31T18:46:21.512259339Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:321: (dbg) Done: kubectl --context addons-346378 run --rm registry-test --restart=Never --image=gcr.io/k8s-minikube/busybox -it -- sh -c \"wget --spider -S http://registry.kube-system.svc.cluster.local\": (3.110055455s)\n"} +{"Time":"2023-05-31T18:46:21.512292967Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:335: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 ip\n"} +{"Time":"2023-05-31T18:46:21.583911527Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":"2023/05/31 18:46:21 [DEBUG] GET http://192.168.39.171:5000\n"} +{"Time":"2023-05-31T18:46:21.585839794Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" addons_test.go:364: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 addons disable registry --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:46:21.669660397Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" addons_test.go:805: (dbg) TestAddons/parallel/Headlamp: app.kubernetes.io/name=headlamp healthy within 12.012784076s\n"} +{"Time":"2023-05-31T18:46:21.669697747Z","Action":"cont","Test":"TestAddons/parallel/CSI"} +{"Time":"2023-05-31T18:46:21.669700868Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":"=== CONT TestAddons/parallel/CSI\n"} +{"Time":"2023-05-31T18:46:21.676449717Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:537: csi-hostpath-driver pods stabilized in 6.104981ms\n"} +{"Time":"2023-05-31T18:46:21.676473732Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:540: (dbg) Run: kubectl --context addons-346378 create -f testdata/csi-hostpath-driver/pvc.yaml\n"} +{"Time":"2023-05-31T18:46:22.081343816Z","Action":"cont","Test":"TestAddons/parallel/Ingress"} +{"Time":"2023-05-31T18:46:22.081374512Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":"=== CONT TestAddons/parallel/Ingress\n"} +{"Time":"2023-05-31T18:46:22.082381697Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:183: (dbg) Run: kubectl --context addons-346378 wait --for=condition=ready --namespace=ingress-nginx pod --selector=app.kubernetes.io/component=controller --timeout=90s\n"} +{"Time":"2023-05-31T18:46:22.277277634Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:208: (dbg) Run: kubectl --context addons-346378 replace --force -f testdata/nginx-ingress-v1.yaml\n"} +{"Time":"2023-05-31T18:46:22.70324521Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:221: (dbg) Run: kubectl --context addons-346378 replace --force -f testdata/nginx-pod-svc.yaml\n"} +{"Time":"2023-05-31T18:46:22.713760824Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:540: (dbg) Done: kubectl --context addons-346378 create -f testdata/csi-hostpath-driver/pvc.yaml: (1.037245674s)\n"} +{"Time":"2023-05-31T18:46:22.713786665Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:545: (dbg) TestAddons/parallel/CSI: waiting 6m0s for pvc \"hpvc\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:46:22.713799797Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:22.985792842Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:449: (dbg) Done: kubectl --context addons-346378 run --rm helm-test --restart=Never --image=docker.io/alpine/helm:2.16.3 -it --namespace=kube-system -- version: (2.891647965s)\n"} +{"Time":"2023-05-31T18:46:22.98582158Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" addons_test.go:466: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 addons disable helm-tiller --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:46:23.027811978Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:226: (dbg) TestAddons/parallel/Ingress: waiting 8m0s for pods matching \"run=nginx\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:46:23.034851102Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" helpers_test.go:344: \"nginx\" [8a69601d-9563-4f26-9a34-81b277baa865] Pending / Ready:ContainersNotReady (containers with unready status: [nginx]) / ContainersReady:ContainersNotReady (containers with unready status: [nginx])\n"} +{"Time":"2023-05-31T18:46:23.784746943Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:24.526103261Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" addons_test.go:814: (dbg) TestAddons/parallel/InspektorGadget: k8s-app=gadget healthy within 5.01042656s\n"} +{"Time":"2023-05-31T18:46:24.526138385Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" addons_test.go:817: (dbg) Run: out/minikube-linux-amd64 addons disable inspektor-gadget -p addons-346378\n"} +{"Time":"2023-05-31T18:46:24.784804932Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:25.784934188Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:26.784673782Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:27.038172122Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" helpers_test.go:344: \"nginx\" [8a69601d-9563-4f26-9a34-81b277baa865] Running\n"} +{"Time":"2023-05-31T18:46:27.784963527Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:28.784955325Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:29.784442669Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:30.058432431Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" addons_test.go:817: (dbg) Done: out/minikube-linux-amd64 addons disable inspektor-gadget -p addons-346378: (5.532264076s)\n"} +{"Time":"2023-05-31T18:46:30.784291196Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:31.784238594Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:32.039026624Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:226: (dbg) TestAddons/parallel/Ingress: run=nginx healthy within 9.011198554s\n"} +{"Time":"2023-05-31T18:46:32.041481785Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:238: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 ssh \"curl -s http://127.0.0.1/ -H 'Host: nginx.example.com'\"\n"} +{"Time":"2023-05-31T18:46:32.228084853Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:262: (dbg) Run: kubectl --context addons-346378 replace --force -f testdata/ingress-dns-example-v1.yaml\n"} +{"Time":"2023-05-31T18:46:32.78439909Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:33.089138411Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:267: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 ip\n"} +{"Time":"2023-05-31T18:46:33.162362268Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:273: (dbg) Run: nslookup hello-john.test 192.168.39.171\n"} +{"Time":"2023-05-31T18:46:33.250406927Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:282: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 addons disable ingress-dns --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:46:33.785255912Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:34.618906364Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:282: (dbg) Done: out/minikube-linux-amd64 -p addons-346378 addons disable ingress-dns --alsologtostderr -v=1: (1.368439915s)\n"} +{"Time":"2023-05-31T18:46:34.61892873Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:287: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 addons disable ingress --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:46:34.785045704Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:35.784740171Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:36.784750833Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:37.784299748Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:38.784480702Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:39.784629268Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:40.784318241Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:41.784733533Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:42.270760293Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" addons_test.go:287: (dbg) Done: out/minikube-linux-amd64 -p addons-346378 addons disable ingress --alsologtostderr -v=1: (7.651757253s)\n"} +{"Time":"2023-05-31T18:46:42.784332214Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:42.839596004Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:550: (dbg) Run: kubectl --context addons-346378 create -f testdata/csi-hostpath-driver/pv-pod.yaml\n"} +{"Time":"2023-05-31T18:46:43.047994939Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:555: (dbg) TestAddons/parallel/CSI: waiting 6m0s for pods matching \"app=task-pv-pod\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:46:43.05298736Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod\" [baf05822-29ef-4f07-9014-4c7e0d89045f] Pending\n"} +{"Time":"2023-05-31T18:46:44.056661423Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod\" [baf05822-29ef-4f07-9014-4c7e0d89045f] Pending / Ready:ContainersNotReady (containers with unready status: [task-pv-container]) / ContainersReady:ContainersNotReady (containers with unready status: [task-pv-container])\n"} +{"Time":"2023-05-31T18:46:49.056975676Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod\" [baf05822-29ef-4f07-9014-4c7e0d89045f] Running\n"} +{"Time":"2023-05-31T18:46:54.058223186Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:555: (dbg) TestAddons/parallel/CSI: app=task-pv-pod healthy within 11.010209418s\n"} +{"Time":"2023-05-31T18:46:54.058256621Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:560: (dbg) Run: kubectl --context addons-346378 create -f testdata/csi-hostpath-driver/snapshot.yaml\n"} +{"Time":"2023-05-31T18:46:54.227201305Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:565: (dbg) TestAddons/parallel/CSI: waiting 6m0s for volume snapshot \"new-snapshot-demo\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:46:54.227227548Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:419: (dbg) Run: kubectl --context addons-346378 get volumesnapshot new-snapshot-demo -o jsonpath={.status.readyToUse} -n default\n"} +{"Time":"2023-05-31T18:46:54.282448437Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:427: TestAddons/parallel/CSI: WARNING: volume snapshot get for \"default\" \"new-snapshot-demo\" returned: \n"} +{"Time":"2023-05-31T18:46:55.283135126Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:419: (dbg) Run: kubectl --context addons-346378 get volumesnapshot new-snapshot-demo -o jsonpath={.status.readyToUse} -n default\n"} +{"Time":"2023-05-31T18:46:55.336598865Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:570: (dbg) Run: kubectl --context addons-346378 delete pod task-pv-pod\n"} +{"Time":"2023-05-31T18:46:56.682086526Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:570: (dbg) Done: kubectl --context addons-346378 delete pod task-pv-pod: (1.345428912s)\n"} +{"Time":"2023-05-31T18:46:56.682120126Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:576: (dbg) Run: kubectl --context addons-346378 delete pvc hpvc\n"} +{"Time":"2023-05-31T18:46:56.846969569Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:582: (dbg) Run: kubectl --context addons-346378 create -f testdata/csi-hostpath-driver/pvc-restore.yaml\n"} +{"Time":"2023-05-31T18:46:57.053265425Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:587: (dbg) TestAddons/parallel/CSI: waiting 6m0s for pvc \"hpvc-restore\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:46:57.053292104Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:58.105592633Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:46:59.105906062Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:47:00.106095483Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:47:01.105676686Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:47:02.106246287Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:47:03.106296792Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:47:04.106343247Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:47:05.105991196Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:47:06.106297088Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:394: (dbg) Run: kubectl --context addons-346378 get pvc hpvc-restore -o jsonpath={.status.phase} -n default\n"} +{"Time":"2023-05-31T18:47:06.158829501Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:592: (dbg) Run: kubectl --context addons-346378 create -f testdata/csi-hostpath-driver/pv-pod-restore.yaml\n"} +{"Time":"2023-05-31T18:47:06.357680144Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:597: (dbg) TestAddons/parallel/CSI: waiting 6m0s for pods matching \"app=task-pv-pod-restore\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:47:06.3701593Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod-restore\" [e35e8127-1110-4975-b456-77ccb1775936] Pending\n"} +{"Time":"2023-05-31T18:47:07.373581718Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod-restore\" [e35e8127-1110-4975-b456-77ccb1775936] Pending / Ready:ContainersNotReady (containers with unready status: [task-pv-container]) / ContainersReady:ContainersNotReady (containers with unready status: [task-pv-container])\n"} +{"Time":"2023-05-31T18:47:08.374042482Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" helpers_test.go:344: \"task-pv-pod-restore\" [e35e8127-1110-4975-b456-77ccb1775936] Running\n"} +{"Time":"2023-05-31T18:47:13.374388752Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:597: (dbg) TestAddons/parallel/CSI: app=task-pv-pod-restore healthy within 7.016712673s\n"} +{"Time":"2023-05-31T18:47:13.374413902Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:602: (dbg) Run: kubectl --context addons-346378 delete pod task-pv-pod-restore\n"} +{"Time":"2023-05-31T18:47:13.739747524Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:606: (dbg) Run: kubectl --context addons-346378 delete pvc hpvc-restore\n"} +{"Time":"2023-05-31T18:47:13.908324617Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:610: (dbg) Run: kubectl --context addons-346378 delete volumesnapshot new-snapshot-demo\n"} +{"Time":"2023-05-31T18:47:14.072751607Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:614: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 addons disable csi-hostpath-driver --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:47:20.580580363Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:614: (dbg) Done: out/minikube-linux-amd64 -p addons-346378 addons disable csi-hostpath-driver --alsologtostderr -v=1: (6.507765492s)\n"} +{"Time":"2023-05-31T18:47:20.58060529Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" addons_test.go:618: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 addons disable volumesnapshots --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:47:21.205247644Z","Action":"run","Test":"TestAddons/serial"} +{"Time":"2023-05-31T18:47:21.205286338Z","Action":"output","Test":"TestAddons/serial","Output":"=== RUN TestAddons/serial\n"} +{"Time":"2023-05-31T18:47:21.20529231Z","Action":"run","Test":"TestAddons/serial/GCPAuth"} +{"Time":"2023-05-31T18:47:21.205295637Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":"=== RUN TestAddons/serial/GCPAuth\n"} +{"Time":"2023-05-31T18:47:21.205302082Z","Action":"run","Test":"TestAddons/serial/GCPAuth/Namespaces"} +{"Time":"2023-05-31T18:47:21.205304587Z","Action":"output","Test":"TestAddons/serial/GCPAuth/Namespaces","Output":"=== RUN TestAddons/serial/GCPAuth/Namespaces\n"} +{"Time":"2023-05-31T18:47:21.205352818Z","Action":"output","Test":"TestAddons/serial/GCPAuth/Namespaces","Output":" addons_test.go:626: (dbg) Run: kubectl --context addons-346378 create ns new-namespace\n"} +{"Time":"2023-05-31T18:47:21.263110058Z","Action":"output","Test":"TestAddons/serial/GCPAuth/Namespaces","Output":" addons_test.go:640: (dbg) Run: kubectl --context addons-346378 get secret gcp-auth -n new-namespace\n"} +{"Time":"2023-05-31T18:47:21.317918127Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:661: (dbg) Run: kubectl --context addons-346378 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T18:47:21.532639432Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:668: (dbg) Run: kubectl --context addons-346378 create sa gcp-auth-test\n"} +{"Time":"2023-05-31T18:47:21.591867152Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:674: (dbg) TestAddons/serial/GCPAuth: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:47:21.595069535Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" helpers_test.go:344: \"busybox\" [f0ec63db-7e0d-4169-bfba-c7007792a8e2] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T18:47:24.598918217Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" helpers_test.go:344: \"busybox\" [f0ec63db-7e0d-4169-bfba-c7007792a8e2] Running\n"} +{"Time":"2023-05-31T18:47:29.600032506Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:674: (dbg) TestAddons/serial/GCPAuth: integration-test=busybox healthy within 8.008124465s\n"} +{"Time":"2023-05-31T18:47:29.600065632Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:680: (dbg) Run: kubectl --context addons-346378 exec busybox -- /bin/sh -c \"printenv GOOGLE_APPLICATION_CREDENTIALS\"\n"} +{"Time":"2023-05-31T18:47:29.729661172Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:692: (dbg) Run: kubectl --context addons-346378 describe sa gcp-auth-test\n"} +{"Time":"2023-05-31T18:47:29.791575312Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:730: (dbg) Run: kubectl --context addons-346378 exec busybox -- /bin/sh -c \"printenv GOOGLE_CLOUD_PROJECT\"\n"} +{"Time":"2023-05-31T18:47:29.920155886Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:743: (dbg) Run: out/minikube-linux-amd64 -p addons-346378 addons disable gcp-auth --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:47:37.200609124Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" addons_test.go:743: (dbg) Done: out/minikube-linux-amd64 -p addons-346378 addons disable gcp-auth --alsologtostderr -v=1: (7.280389771s)\n"} +{"Time":"2023-05-31T18:47:37.20197631Z","Action":"run","Test":"TestAddons/StoppedEnableDisable"} +{"Time":"2023-05-31T18:47:37.201994215Z","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":"=== RUN TestAddons/StoppedEnableDisable\n"} +{"Time":"2023-05-31T18:47:37.202000699Z","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:148: (dbg) Run: out/minikube-linux-amd64 stop -p addons-346378\n"} +{"Time":"2023-05-31T18:49:09.641435305Z","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:148: (dbg) Done: out/minikube-linux-amd64 stop -p addons-346378: (1m32.43934658s)\n"} +{"Time":"2023-05-31T18:49:09.641508024Z","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:152: (dbg) Run: out/minikube-linux-amd64 addons enable dashboard -p addons-346378\n"} +{"Time":"2023-05-31T18:49:09.719125912Z","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:156: (dbg) Run: out/minikube-linux-amd64 addons disable dashboard -p addons-346378\n"} +{"Time":"2023-05-31T18:49:09.789484647Z","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" addons_test.go:161: (dbg) Run: out/minikube-linux-amd64 addons disable gvisor -p addons-346378\n"} +{"Time":"2023-05-31T18:49:09.828584796Z","Action":"output","Test":"TestAddons","Output":" helpers_test.go:175: Cleaning up \"addons-346378\" profile ...\n"} +{"Time":"2023-05-31T18:49:09.828608254Z","Action":"output","Test":"TestAddons","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p addons-346378\n"} +{"Time":"2023-05-31T18:49:10.560429155Z","Action":"output","Test":"TestAddons","Output":"--- PASS: TestAddons (327.45s)\n"} +{"Time":"2023-05-31T18:49:10.560452152Z","Action":"output","Test":"TestAddons/Setup","Output":" --- PASS: TestAddons/Setup (145.16s)\n"} +{"Time":"2023-05-31T18:49:10.560455579Z","Action":"pass","Test":"TestAddons/Setup","Elapsed":145.16} +{"Time":"2023-05-31T18:49:10.560461882Z","Action":"output","Test":"TestAddons/parallel","Output":" --- PASS: TestAddons/parallel (0.00s)\n"} +{"Time":"2023-05-31T18:49:10.560464514Z","Action":"output","Test":"TestAddons/parallel/Olm","Output":" --- SKIP: TestAddons/parallel/Olm (0.00s)\n"} +{"Time":"2023-05-31T18:49:10.560467363Z","Action":"skip","Test":"TestAddons/parallel/Olm","Elapsed":0} +{"Time":"2023-05-31T18:49:10.560469465Z","Action":"output","Test":"TestAddons/parallel/MetricsServer","Output":" --- PASS: TestAddons/parallel/MetricsServer (5.78s)\n"} +{"Time":"2023-05-31T18:49:10.560472122Z","Action":"pass","Test":"TestAddons/parallel/MetricsServer","Elapsed":5.78} +{"Time":"2023-05-31T18:49:10.560474357Z","Action":"output","Test":"TestAddons/parallel/CloudSpanner","Output":" --- PASS: TestAddons/parallel/CloudSpanner (5.46s)\n"} +{"Time":"2023-05-31T18:49:10.560476902Z","Action":"pass","Test":"TestAddons/parallel/CloudSpanner","Elapsed":5.46} +{"Time":"2023-05-31T18:49:10.560478959Z","Action":"output","Test":"TestAddons/parallel/Headlamp","Output":" --- PASS: TestAddons/parallel/Headlamp (13.40s)\n"} +{"Time":"2023-05-31T18:49:10.560481222Z","Action":"pass","Test":"TestAddons/parallel/Headlamp","Elapsed":13.4} +{"Time":"2023-05-31T18:49:10.560483196Z","Action":"output","Test":"TestAddons/parallel/Registry","Output":" --- PASS: TestAddons/parallel/Registry (13.81s)\n"} +{"Time":"2023-05-31T18:49:10.560485452Z","Action":"pass","Test":"TestAddons/parallel/Registry","Elapsed":13.81} +{"Time":"2023-05-31T18:49:10.560487337Z","Action":"output","Test":"TestAddons/parallel/HelmTiller","Output":" --- PASS: TestAddons/parallel/HelmTiller (15.17s)\n"} +{"Time":"2023-05-31T18:49:10.560489434Z","Action":"pass","Test":"TestAddons/parallel/HelmTiller","Elapsed":15.17} +{"Time":"2023-05-31T18:49:10.560492388Z","Action":"output","Test":"TestAddons/parallel/InspektorGadget","Output":" --- PASS: TestAddons/parallel/InspektorGadget (10.54s)\n"} +{"Time":"2023-05-31T18:49:10.560494907Z","Action":"pass","Test":"TestAddons/parallel/InspektorGadget","Elapsed":10.54} +{"Time":"2023-05-31T18:49:10.56049684Z","Action":"output","Test":"TestAddons/parallel/Ingress","Output":" --- PASS: TestAddons/parallel/Ingress (20.19s)\n"} +{"Time":"2023-05-31T18:49:10.560499099Z","Action":"pass","Test":"TestAddons/parallel/Ingress","Elapsed":20.19} +{"Time":"2023-05-31T18:49:10.560501052Z","Action":"output","Test":"TestAddons/parallel/CSI","Output":" --- PASS: TestAddons/parallel/CSI (59.54s)\n"} +{"Time":"2023-05-31T18:49:10.560503297Z","Action":"pass","Test":"TestAddons/parallel/CSI","Elapsed":59.54} +{"Time":"2023-05-31T18:49:10.56050495Z","Action":"pass","Test":"TestAddons/parallel","Elapsed":0} +{"Time":"2023-05-31T18:49:10.560506805Z","Action":"output","Test":"TestAddons/serial","Output":" --- PASS: TestAddons/serial (16.00s)\n"} +{"Time":"2023-05-31T18:49:10.560509202Z","Action":"output","Test":"TestAddons/serial/GCPAuth","Output":" --- PASS: TestAddons/serial/GCPAuth (16.00s)\n"} +{"Time":"2023-05-31T18:49:10.560513194Z","Action":"output","Test":"TestAddons/serial/GCPAuth/Namespaces","Output":" --- PASS: TestAddons/serial/GCPAuth/Namespaces (0.11s)\n"} +{"Time":"2023-05-31T18:49:10.560515772Z","Action":"pass","Test":"TestAddons/serial/GCPAuth/Namespaces","Elapsed":0.11} +{"Time":"2023-05-31T18:49:10.560517871Z","Action":"pass","Test":"TestAddons/serial/GCPAuth","Elapsed":16} +{"Time":"2023-05-31T18:49:10.560519547Z","Action":"pass","Test":"TestAddons/serial","Elapsed":16} +{"Time":"2023-05-31T18:49:10.560521214Z","Action":"output","Test":"TestAddons/StoppedEnableDisable","Output":" --- PASS: TestAddons/StoppedEnableDisable (92.63s)\n"} +{"Time":"2023-05-31T18:49:10.560524412Z","Action":"pass","Test":"TestAddons/StoppedEnableDisable","Elapsed":92.63} +{"Time":"2023-05-31T18:49:10.560526979Z","Action":"pass","Test":"TestAddons","Elapsed":327.45} +{"Time":"2023-05-31T18:49:10.560529866Z","Action":"run","Test":"TestCertOptions"} +{"Time":"2023-05-31T18:49:10.560532553Z","Action":"output","Test":"TestCertOptions","Output":"=== RUN TestCertOptions\n"} +{"Time":"2023-05-31T18:49:10.560542977Z","Action":"output","Test":"TestCertOptions","Output":"=== PAUSE TestCertOptions\n"} +{"Time":"2023-05-31T18:49:10.560559126Z","Action":"pause","Test":"TestCertOptions"} +{"Time":"2023-05-31T18:49:10.560563945Z","Action":"run","Test":"TestCertExpiration"} +{"Time":"2023-05-31T18:49:10.560566636Z","Action":"output","Test":"TestCertExpiration","Output":"=== RUN TestCertExpiration\n"} +{"Time":"2023-05-31T18:49:10.560570149Z","Action":"output","Test":"TestCertExpiration","Output":"=== PAUSE TestCertExpiration\n"} +{"Time":"2023-05-31T18:49:10.56057297Z","Action":"pause","Test":"TestCertExpiration"} +{"Time":"2023-05-31T18:49:10.560575835Z","Action":"run","Test":"TestDockerFlags"} +{"Time":"2023-05-31T18:49:10.560584529Z","Action":"output","Test":"TestDockerFlags","Output":"=== RUN TestDockerFlags\n"} +{"Time":"2023-05-31T18:49:10.560590303Z","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:35: skipping: only runs with docker container runtime, currently testing containerd\n"} +{"Time":"2023-05-31T18:49:10.560593812Z","Action":"output","Test":"TestDockerFlags","Output":"--- SKIP: TestDockerFlags (0.00s)\n"} +{"Time":"2023-05-31T18:49:10.560596602Z","Action":"skip","Test":"TestDockerFlags","Elapsed":0} +{"Time":"2023-05-31T18:49:10.560602276Z","Action":"run","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T18:49:10.560604601Z","Action":"output","Test":"TestForceSystemdFlag","Output":"=== RUN TestForceSystemdFlag\n"} +{"Time":"2023-05-31T18:49:10.560608287Z","Action":"output","Test":"TestForceSystemdFlag","Output":"=== PAUSE TestForceSystemdFlag\n"} +{"Time":"2023-05-31T18:49:10.560610863Z","Action":"pause","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T18:49:10.560615411Z","Action":"run","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T18:49:10.560618456Z","Action":"output","Test":"TestForceSystemdEnv","Output":"=== RUN TestForceSystemdEnv\n"} +{"Time":"2023-05-31T18:49:10.560623962Z","Action":"output","Test":"TestForceSystemdEnv","Output":"=== PAUSE TestForceSystemdEnv\n"} +{"Time":"2023-05-31T18:49:10.560626868Z","Action":"pause","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T18:49:10.560630187Z","Action":"run","Test":"TestKVMDriverInstallOrUpdate"} +{"Time":"2023-05-31T18:49:10.560632903Z","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":"=== RUN TestKVMDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T18:49:10.560636498Z","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":"=== PAUSE TestKVMDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T18:49:10.560639355Z","Action":"pause","Test":"TestKVMDriverInstallOrUpdate"} +{"Time":"2023-05-31T18:49:10.560645685Z","Action":"run","Test":"TestHyperKitDriverInstallOrUpdate"} +{"Time":"2023-05-31T18:49:10.56064853Z","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"=== RUN TestHyperKitDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T18:49:10.56065318Z","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":" driver_install_or_update_test.go:105: Skip if not darwin.\n"} +{"Time":"2023-05-31T18:49:10.560657713Z","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"--- SKIP: TestHyperKitDriverInstallOrUpdate (0.00s)\n"} +{"Time":"2023-05-31T18:49:10.560662662Z","Action":"skip","Test":"TestHyperKitDriverInstallOrUpdate","Elapsed":0} +{"Time":"2023-05-31T18:49:10.56066595Z","Action":"run","Test":"TestHyperkitDriverSkipUpgrade"} +{"Time":"2023-05-31T18:49:10.560668278Z","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"=== RUN TestHyperkitDriverSkipUpgrade\n"} +{"Time":"2023-05-31T18:49:10.560691635Z","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":" driver_install_or_update_test.go:169: Skip if not darwin.\n"} +{"Time":"2023-05-31T18:49:10.560708332Z","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"--- SKIP: TestHyperkitDriverSkipUpgrade (0.00s)\n"} +{"Time":"2023-05-31T18:49:10.560721877Z","Action":"skip","Test":"TestHyperkitDriverSkipUpgrade","Elapsed":0} +{"Time":"2023-05-31T18:49:10.560724119Z","Action":"run","Test":"TestErrorSpam"} +{"Time":"2023-05-31T18:49:10.560726767Z","Action":"output","Test":"TestErrorSpam","Output":"=== RUN TestErrorSpam\n"} +{"Time":"2023-05-31T18:49:10.560851005Z","Action":"run","Test":"TestErrorSpam/setup"} +{"Time":"2023-05-31T18:49:10.560855273Z","Action":"output","Test":"TestErrorSpam/setup","Output":"=== RUN TestErrorSpam/setup\n"} +{"Time":"2023-05-31T18:49:10.560908447Z","Action":"output","Test":"TestErrorSpam/setup","Output":" error_spam_test.go:81: (dbg) Run: out/minikube-linux-amd64 start -p nospam-723072 -n=1 --memory=2250 --wait=false --log_dir=/tmp/nospam-723072 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:50:03.518058144Z","Action":"output","Test":"TestErrorSpam/setup","Output":" error_spam_test.go:81: (dbg) Done: out/minikube-linux-amd64 start -p nospam-723072 -n=1 --memory=2250 --wait=false --log_dir=/tmp/nospam-723072 --driver=kvm2 --container-runtime=containerd: (52.957040551s)\n"} +{"Time":"2023-05-31T18:50:03.51810554Z","Action":"run","Test":"TestErrorSpam/start"} +{"Time":"2023-05-31T18:50:03.51811085Z","Action":"output","Test":"TestErrorSpam/start","Output":"=== RUN TestErrorSpam/start\n"} +{"Time":"2023-05-31T18:50:03.518166349Z","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:216: Cleaning up 1 logfile(s) ...\n"} +{"Time":"2023-05-31T18:50:03.518323896Z","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 start --dry-run\n"} +{"Time":"2023-05-31T18:50:03.625601737Z","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 start --dry-run\n"} +{"Time":"2023-05-31T18:50:03.729093345Z","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 start --dry-run\n"} +{"Time":"2023-05-31T18:50:03.828814269Z","Action":"run","Test":"TestErrorSpam/status"} +{"Time":"2023-05-31T18:50:03.828844375Z","Action":"output","Test":"TestErrorSpam/status","Output":"=== RUN TestErrorSpam/status\n"} +{"Time":"2023-05-31T18:50:03.828855621Z","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T18:50:03.828882161Z","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 status\n"} +{"Time":"2023-05-31T18:50:04.050534957Z","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 status\n"} +{"Time":"2023-05-31T18:50:04.272278769Z","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 status\n"} +{"Time":"2023-05-31T18:50:04.500724186Z","Action":"run","Test":"TestErrorSpam/pause"} +{"Time":"2023-05-31T18:50:04.500749968Z","Action":"output","Test":"TestErrorSpam/pause","Output":"=== RUN TestErrorSpam/pause\n"} +{"Time":"2023-05-31T18:50:04.500758898Z","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T18:50:04.500811515Z","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 pause\n"} +{"Time":"2023-05-31T18:50:05.001053179Z","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 pause\n"} +{"Time":"2023-05-31T18:50:05.421807462Z","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 pause\n"} +{"Time":"2023-05-31T18:50:05.828597067Z","Action":"run","Test":"TestErrorSpam/unpause"} +{"Time":"2023-05-31T18:50:05.828656476Z","Action":"output","Test":"TestErrorSpam/unpause","Output":"=== RUN TestErrorSpam/unpause\n"} +{"Time":"2023-05-31T18:50:05.828668387Z","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T18:50:05.828673987Z","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 unpause\n"} +{"Time":"2023-05-31T18:50:06.301144939Z","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 unpause\n"} +{"Time":"2023-05-31T18:50:06.859721865Z","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 unpause\n"} +{"Time":"2023-05-31T18:50:07.318271192Z","Action":"run","Test":"TestErrorSpam/stop"} +{"Time":"2023-05-31T18:50:07.318297764Z","Action":"output","Test":"TestErrorSpam/stop","Output":"=== RUN TestErrorSpam/stop\n"} +{"Time":"2023-05-31T18:50:07.31830462Z","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T18:50:07.318334189Z","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 stop\n"} +{"Time":"2023-05-31T18:50:09.716980716Z","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Done: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 stop: (2.398564764s)\n"} +{"Time":"2023-05-31T18:50:09.717018819Z","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 stop\n"} +{"Time":"2023-05-31T18:50:09.780270318Z","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-linux-amd64 -p nospam-723072 --log_dir /tmp/nospam-723072 stop\n"} +{"Time":"2023-05-31T18:50:09.843477904Z","Action":"output","Test":"TestErrorSpam","Output":" helpers_test.go:175: Cleaning up \"nospam-723072\" profile ...\n"} +{"Time":"2023-05-31T18:50:09.843505436Z","Action":"output","Test":"TestErrorSpam","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p nospam-723072\n"} +{"Time":"2023-05-31T18:50:10.229392797Z","Action":"output","Test":"TestErrorSpam","Output":"--- PASS: TestErrorSpam (59.67s)\n"} +{"Time":"2023-05-31T18:50:10.22941491Z","Action":"output","Test":"TestErrorSpam/setup","Output":" --- PASS: TestErrorSpam/setup (52.96s)\n"} +{"Time":"2023-05-31T18:50:10.229418959Z","Action":"pass","Test":"TestErrorSpam/setup","Elapsed":52.96} +{"Time":"2023-05-31T18:50:10.229424188Z","Action":"output","Test":"TestErrorSpam/start","Output":" --- PASS: TestErrorSpam/start (0.31s)\n"} +{"Time":"2023-05-31T18:50:10.229426583Z","Action":"pass","Test":"TestErrorSpam/start","Elapsed":0.31} +{"Time":"2023-05-31T18:50:10.22942882Z","Action":"output","Test":"TestErrorSpam/status","Output":" --- PASS: TestErrorSpam/status (0.67s)\n"} +{"Time":"2023-05-31T18:50:10.2294323Z","Action":"pass","Test":"TestErrorSpam/status","Elapsed":0.67} +{"Time":"2023-05-31T18:50:10.229434243Z","Action":"output","Test":"TestErrorSpam/pause","Output":" --- PASS: TestErrorSpam/pause (1.33s)\n"} +{"Time":"2023-05-31T18:50:10.229436454Z","Action":"pass","Test":"TestErrorSpam/pause","Elapsed":1.33} +{"Time":"2023-05-31T18:50:10.229438626Z","Action":"output","Test":"TestErrorSpam/unpause","Output":" --- PASS: TestErrorSpam/unpause (1.49s)\n"} +{"Time":"2023-05-31T18:50:10.229441121Z","Action":"pass","Test":"TestErrorSpam/unpause","Elapsed":1.49} +{"Time":"2023-05-31T18:50:10.229443211Z","Action":"output","Test":"TestErrorSpam/stop","Output":" --- PASS: TestErrorSpam/stop (2.52s)\n"} +{"Time":"2023-05-31T18:50:10.229445318Z","Action":"pass","Test":"TestErrorSpam/stop","Elapsed":2.52} +{"Time":"2023-05-31T18:50:10.229448806Z","Action":"pass","Test":"TestErrorSpam","Elapsed":59.67} +{"Time":"2023-05-31T18:50:10.229451058Z","Action":"run","Test":"TestFunctional"} +{"Time":"2023-05-31T18:50:10.229453228Z","Action":"output","Test":"TestFunctional","Output":"=== RUN TestFunctional\n"} +{"Time":"2023-05-31T18:50:10.229456669Z","Action":"run","Test":"TestFunctional/serial"} +{"Time":"2023-05-31T18:50:10.229458516Z","Action":"output","Test":"TestFunctional/serial","Output":"=== RUN TestFunctional/serial\n"} +{"Time":"2023-05-31T18:50:10.229460888Z","Action":"run","Test":"TestFunctional/serial/CopySyncFile"} +{"Time":"2023-05-31T18:50:10.229462801Z","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":"=== RUN TestFunctional/serial/CopySyncFile\n"} +{"Time":"2023-05-31T18:50:10.229490316Z","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":" functional_test.go:1850: local sync path: /home/jenkins/minikube-integration/16569-10887/.minikube/files/etc/test/nested/copy/18150/hosts\n"} +{"Time":"2023-05-31T18:50:10.229988622Z","Action":"run","Test":"TestFunctional/serial/StartWithProxy"} +{"Time":"2023-05-31T18:50:10.230003706Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"=== RUN TestFunctional/serial/StartWithProxy\n"} +{"Time":"2023-05-31T18:50:10.23026702Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" functional_test.go:2229: (dbg) Run: out/minikube-linux-amd64 start -p functional-384583 --memory=4000 --apiserver-port=8441 --wait=all --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:51:08.276899249Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:08.276756 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:08.282672815Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:08.282597 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:08.292933063Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:08.292890 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:08.313255767Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:08.313206 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:08.353560584Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:08.353516 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:08.43401423Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:08.433897 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:08.594480581Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:08.594386 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:08.914999786Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:08.914935 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:09.555973213Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:09.555889 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:10.83644957Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:10.836359 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:13.39736784Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"E0531 18:51:13.397231 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:16.904714468Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" functional_test.go:2229: (dbg) Done: out/minikube-linux-amd64 start -p functional-384583 --memory=4000 --apiserver-port=8441 --wait=all --driver=kvm2 --container-runtime=containerd: (1m6.674355534s)\n"} +{"Time":"2023-05-31T18:51:16.904765699Z","Action":"run","Test":"TestFunctional/serial/AuditLog"} +{"Time":"2023-05-31T18:51:16.904771336Z","Action":"output","Test":"TestFunctional/serial/AuditLog","Output":"=== RUN TestFunctional/serial/AuditLog\n"} +{"Time":"2023-05-31T18:51:16.904921849Z","Action":"run","Test":"TestFunctional/serial/SoftStart"} +{"Time":"2023-05-31T18:51:16.904934674Z","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":"=== RUN TestFunctional/serial/SoftStart\n"} +{"Time":"2023-05-31T18:51:16.905505124Z","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:654: (dbg) Run: out/minikube-linux-amd64 start -p functional-384583 --alsologtostderr -v=8\n"} +{"Time":"2023-05-31T18:51:18.517399241Z","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":"E0531 18:51:18.517346 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:22.587177782Z","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:654: (dbg) Done: out/minikube-linux-amd64 start -p functional-384583 --alsologtostderr -v=8: (5.681611961s)\n"} +{"Time":"2023-05-31T18:51:22.587201105Z","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:658: soft start took 5.682222386s for \"functional-384583\" cluster.\n"} +{"Time":"2023-05-31T18:51:22.587362103Z","Action":"run","Test":"TestFunctional/serial/KubeContext"} +{"Time":"2023-05-31T18:51:22.587372686Z","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":"=== RUN TestFunctional/serial/KubeContext\n"} +{"Time":"2023-05-31T18:51:22.587421956Z","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":" functional_test.go:676: (dbg) Run: kubectl config current-context\n"} +{"Time":"2023-05-31T18:51:22.626724333Z","Action":"run","Test":"TestFunctional/serial/KubectlGetPods"} +{"Time":"2023-05-31T18:51:22.62675118Z","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":"=== RUN TestFunctional/serial/KubectlGetPods\n"} +{"Time":"2023-05-31T18:51:22.626771245Z","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":" functional_test.go:691: (dbg) Run: kubectl --context functional-384583 get po -A\n"} +{"Time":"2023-05-31T18:51:22.707325773Z","Action":"run","Test":"TestFunctional/serial/CacheCmd"} +{"Time":"2023-05-31T18:51:22.707346104Z","Action":"output","Test":"TestFunctional/serial/CacheCmd","Output":"=== RUN TestFunctional/serial/CacheCmd\n"} +{"Time":"2023-05-31T18:51:22.707364925Z","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache"} +{"Time":"2023-05-31T18:51:22.707367395Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache","Output":"=== RUN TestFunctional/serial/CacheCmd/cache\n"} +{"Time":"2023-05-31T18:51:22.707369852Z","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/add_remote"} +{"Time":"2023-05-31T18:51:22.707371818Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/add_remote\n"} +{"Time":"2023-05-31T18:51:22.70740964Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 cache add registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T18:51:23.784643087Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 cache add registry.k8s.io/pause:3.1: (1.077137986s)\n"} +{"Time":"2023-05-31T18:51:23.784668339Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 cache add registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T18:51:24.939421801Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 cache add registry.k8s.io/pause:3.3: (1.154702135s)\n"} +{"Time":"2023-05-31T18:51:24.939451348Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 cache add registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T18:51:26.006869042Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 cache add registry.k8s.io/pause:latest: (1.067381034s)\n"} +{"Time":"2023-05-31T18:51:26.006899486Z","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/add_local"} +{"Time":"2023-05-31T18:51:26.006904598Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/add_local\n"} +{"Time":"2023-05-31T18:51:26.007107679Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1072: (dbg) Run: docker build -t minikube-local-cache-test:functional-384583 /tmp/TestFunctionalserialCacheCmdcacheadd_local2636478558/001\n"} +{"Time":"2023-05-31T18:51:26.222819148Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1084: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 cache add minikube-local-cache-test:functional-384583\n"} +{"Time":"2023-05-31T18:51:27.432336556Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1084: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 cache add minikube-local-cache-test:functional-384583: (1.209475434s)\n"} +{"Time":"2023-05-31T18:51:27.432363566Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1089: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 cache delete minikube-local-cache-test:functional-384583\n"} +{"Time":"2023-05-31T18:51:27.473241452Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1078: (dbg) Run: docker rmi minikube-local-cache-test:functional-384583\n"} +{"Time":"2023-05-31T18:51:27.491955409Z","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete"} +{"Time":"2023-05-31T18:51:27.491978487Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/CacheDelete\n"} +{"Time":"2023-05-31T18:51:27.491986941Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":" functional_test.go:1097: (dbg) Run: out/minikube-linux-amd64 cache delete registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T18:51:27.530804403Z","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/list"} +{"Time":"2023-05-31T18:51:27.530829332Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/list\n"} +{"Time":"2023-05-31T18:51:27.53084707Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":" functional_test.go:1105: (dbg) Run: out/minikube-linux-amd64 cache list\n"} +{"Time":"2023-05-31T18:51:27.570095416Z","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node"} +{"Time":"2023-05-31T18:51:27.570113474Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node\n"} +{"Time":"2023-05-31T18:51:27.570119238Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":" functional_test.go:1119: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh sudo crictl images\n"} +{"Time":"2023-05-31T18:51:27.772115516Z","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload"} +{"Time":"2023-05-31T18:51:27.772136087Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/cache_reload\n"} +{"Time":"2023-05-31T18:51:27.772146906Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1142: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh sudo crictl rmi registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T18:51:27.996329061Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1148: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh sudo crictl inspecti registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T18:51:28.198575276Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1148: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 ssh sudo crictl inspecti registry.k8s.io/pause:latest: exit status 1 (202.169972ms)\n"} +{"Time":"2023-05-31T18:51:28.19860873Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T18:51:28.198614054Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:51:28.198616566Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \t\u001b[31mFATA\u001b[0m[0000] no such image \"registry.k8s.io/pause:latest\" present \n"} +{"Time":"2023-05-31T18:51:28.19861975Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T18:51:28.198632514Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:51:28.19863479Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:51:28.198636929Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T18:51:28.198649467Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T18:51:28.198652141Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:51:28.198655561Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1153: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 cache reload\n"} +{"Time":"2023-05-31T18:51:28.757614577Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":"E0531 18:51:28.757530 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:51:29.535457272Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1153: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 cache reload: (1.336803031s)\n"} +{"Time":"2023-05-31T18:51:29.53548831Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1158: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh sudo crictl inspecti registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T18:51:29.737996281Z","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/delete"} +{"Time":"2023-05-31T18:51:29.738034004Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/delete\n"} +{"Time":"2023-05-31T18:51:29.738043381Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" functional_test.go:1167: (dbg) Run: out/minikube-linux-amd64 cache delete registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T18:51:29.777348377Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" functional_test.go:1167: (dbg) Run: out/minikube-linux-amd64 cache delete registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T18:51:29.815140068Z","Action":"run","Test":"TestFunctional/serial/MinikubeKubectlCmd"} +{"Time":"2023-05-31T18:51:29.815166519Z","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":"=== RUN TestFunctional/serial/MinikubeKubectlCmd\n"} +{"Time":"2023-05-31T18:51:29.815174506Z","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":" functional_test.go:711: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 kubectl -- --context functional-384583 get pods\n"} +{"Time":"2023-05-31T18:51:29.910064873Z","Action":"run","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly"} +{"Time":"2023-05-31T18:51:29.910085553Z","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":"=== RUN TestFunctional/serial/MinikubeKubectlCmdDirectly\n"} +{"Time":"2023-05-31T18:51:29.910101574Z","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":" functional_test.go:736: (dbg) Run: out/kubectl --context functional-384583 get pods\n"} +{"Time":"2023-05-31T18:51:29.999910668Z","Action":"run","Test":"TestFunctional/serial/ExtraConfig"} +{"Time":"2023-05-31T18:51:29.999931452Z","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"=== RUN TestFunctional/serial/ExtraConfig\n"} +{"Time":"2023-05-31T18:51:29.999946701Z","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:752: (dbg) Run: out/minikube-linux-amd64 start -p functional-384583 --extra-config=apiserver.enable-admission-plugins=NamespaceAutoProvision --wait=all\n"} +{"Time":"2023-05-31T18:51:49.238540046Z","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"E0531 18:51:49.238460 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:52:12.340184291Z","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:752: (dbg) Done: out/minikube-linux-amd64 start -p functional-384583 --extra-config=apiserver.enable-admission-plugins=NamespaceAutoProvision --wait=all: (42.340152732s)\n"} +{"Time":"2023-05-31T18:52:12.340213914Z","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:756: restart took 42.340246895s for \"functional-384583\" cluster.\n"} +{"Time":"2023-05-31T18:52:12.340423869Z","Action":"run","Test":"TestFunctional/serial/ComponentHealth"} +{"Time":"2023-05-31T18:52:12.340434908Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":"=== RUN TestFunctional/serial/ComponentHealth\n"} +{"Time":"2023-05-31T18:52:12.340517834Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:805: (dbg) Run: kubectl --context functional-384583 get po -l tier=control-plane -n kube-system -o=json\n"} +{"Time":"2023-05-31T18:52:12.403337843Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: etcd phase: Running\n"} +{"Time":"2023-05-31T18:52:12.403362281Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: etcd status: Ready\n"} +{"Time":"2023-05-31T18:52:12.403365204Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-apiserver phase: Running\n"} +{"Time":"2023-05-31T18:52:12.403367528Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-apiserver status: Ready\n"} +{"Time":"2023-05-31T18:52:12.403371027Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-controller-manager phase: Running\n"} +{"Time":"2023-05-31T18:52:12.403373283Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-controller-manager status: Ready\n"} +{"Time":"2023-05-31T18:52:12.403375707Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-scheduler phase: Running\n"} +{"Time":"2023-05-31T18:52:12.403379524Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-scheduler status: Ready\n"} +{"Time":"2023-05-31T18:52:12.403383844Z","Action":"run","Test":"TestFunctional/serial/LogsCmd"} +{"Time":"2023-05-31T18:52:12.403385981Z","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":"=== RUN TestFunctional/serial/LogsCmd\n"} +{"Time":"2023-05-31T18:52:12.40339561Z","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":" functional_test.go:1231: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 logs\n"} +{"Time":"2023-05-31T18:52:13.657108571Z","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":" functional_test.go:1231: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 logs: (1.253627727s)\n"} +{"Time":"2023-05-31T18:52:13.657224603Z","Action":"run","Test":"TestFunctional/serial/LogsFileCmd"} +{"Time":"2023-05-31T18:52:13.657232895Z","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":"=== RUN TestFunctional/serial/LogsFileCmd\n"} +{"Time":"2023-05-31T18:52:13.65742574Z","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":" functional_test.go:1245: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 logs --file /tmp/TestFunctionalserialLogsFileCmd2733176145/001/logs.txt\n"} +{"Time":"2023-05-31T18:52:14.901617464Z","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":" functional_test.go:1245: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 logs --file /tmp/TestFunctionalserialLogsFileCmd2733176145/001/logs.txt: (1.244108766s)\n"} +{"Time":"2023-05-31T18:52:14.902660305Z","Action":"run","Test":"TestFunctional/parallel"} +{"Time":"2023-05-31T18:52:14.902676041Z","Action":"output","Test":"TestFunctional/parallel","Output":"=== RUN TestFunctional/parallel\n"} +{"Time":"2023-05-31T18:52:14.902705662Z","Action":"run","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T18:52:14.9027091Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== RUN TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T18:52:14.902712705Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== PAUSE TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T18:52:14.902715667Z","Action":"pause","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T18:52:14.902718639Z","Action":"run","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T18:52:14.902723944Z","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== RUN TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T18:52:14.902728106Z","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== PAUSE TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T18:52:14.9027311Z","Action":"pause","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T18:52:14.902735695Z","Action":"run","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T18:52:14.902738964Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== RUN TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T18:52:14.902742749Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== PAUSE TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T18:52:14.902745697Z","Action":"pause","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T18:52:14.902756967Z","Action":"run","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T18:52:14.902759759Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== RUN TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T18:52:14.902763274Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== PAUSE TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T18:52:14.902766047Z","Action":"pause","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T18:52:14.902769647Z","Action":"run","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T18:52:14.902771493Z","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== RUN TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T18:52:14.902807113Z","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== PAUSE TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T18:52:14.902811148Z","Action":"pause","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T18:52:14.902814229Z","Action":"run","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T18:52:14.902817123Z","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== RUN TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T18:52:14.902822042Z","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== PAUSE TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T18:52:14.902825177Z","Action":"pause","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T18:52:14.90282957Z","Action":"run","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T18:52:14.902832628Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== RUN TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T18:52:14.902915318Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== PAUSE TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T18:52:14.902921418Z","Action":"pause","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T18:52:14.902924246Z","Action":"run","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T18:52:14.902926847Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== RUN TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T18:52:14.90293436Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== PAUSE TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T18:52:14.902944629Z","Action":"pause","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T18:52:14.902947389Z","Action":"run","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T18:52:14.902949768Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== RUN TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T18:52:14.902952697Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== PAUSE TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T18:52:14.902955012Z","Action":"pause","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T18:52:14.902959253Z","Action":"run","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T18:52:14.902961799Z","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== RUN TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T18:52:14.902965259Z","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== PAUSE TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T18:52:14.902967925Z","Action":"pause","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T18:52:14.902970682Z","Action":"run","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T18:52:14.902976971Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== RUN TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T18:52:14.902980212Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== PAUSE TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T18:52:14.902982713Z","Action":"pause","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T18:52:14.902985454Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T18:52:14.902987974Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== RUN TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T18:52:14.902992481Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== PAUSE TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T18:52:14.902995108Z","Action":"pause","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T18:52:14.902997725Z","Action":"run","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T18:52:14.903000466Z","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== RUN TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T18:52:14.903003335Z","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== PAUSE TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T18:52:14.903005739Z","Action":"pause","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T18:52:14.90300816Z","Action":"run","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T18:52:14.903010503Z","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== RUN TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T18:52:14.903014636Z","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== PAUSE TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T18:52:14.903017029Z","Action":"pause","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T18:52:14.903022743Z","Action":"run","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T18:52:14.903025398Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== RUN TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T18:52:14.903034881Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== PAUSE TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T18:52:14.903037134Z","Action":"pause","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T18:52:14.903039649Z","Action":"run","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T18:52:14.903042554Z","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== RUN TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T18:52:14.903047295Z","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== PAUSE TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T18:52:14.903049559Z","Action":"pause","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T18:52:14.903052193Z","Action":"run","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T18:52:14.903054863Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== RUN TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T18:52:14.903058896Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== PAUSE TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T18:52:14.903061565Z","Action":"pause","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T18:52:14.903068633Z","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T18:52:14.903071496Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T18:52:14.903129855Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T18:52:14.903145334Z","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T18:52:14.903149316Z","Action":"run","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T18:52:14.903152258Z","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== RUN TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T18:52:14.903155829Z","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== PAUSE TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T18:52:14.903158958Z","Action":"pause","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T18:52:14.903164081Z","Action":"run","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T18:52:14.903167507Z","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== RUN TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T18:52:14.903174934Z","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== PAUSE TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T18:52:14.903178329Z","Action":"pause","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T18:52:14.903181893Z","Action":"run","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T18:52:14.903185316Z","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== RUN TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T18:52:14.903190981Z","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== PAUSE TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T18:52:14.903194038Z","Action":"pause","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T18:52:14.903197428Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T18:52:14.903200466Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== RUN TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T18:52:14.903205731Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== PAUSE TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T18:52:14.903208868Z","Action":"pause","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T18:52:14.903213873Z","Action":"run","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T18:52:14.903217458Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== RUN TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T18:52:14.903229711Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== PAUSE TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T18:52:14.903233058Z","Action":"pause","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T18:52:14.903237676Z","Action":"run","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T18:52:14.903240698Z","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== RUN TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T18:52:14.90325263Z","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== PAUSE TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T18:52:14.903255963Z","Action":"pause","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T18:52:14.903259683Z","Action":"run","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T18:52:14.903266096Z","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== RUN TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T18:52:14.903271948Z","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== PAUSE TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T18:52:14.903275025Z","Action":"pause","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T18:52:14.903290972Z","Action":"cont","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T18:52:14.903294322Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== CONT TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T18:52:14.903299135Z","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T18:52:14.903302428Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T18:52:14.903328735Z","Action":"cont","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T18:52:14.903332118Z","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== CONT TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T18:52:14.903341127Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 config unset cpus\n"} +{"Time":"2023-05-31T18:52:14.903345617Z","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T18:52:14.90334849Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T18:52:14.903356858Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T18:52:14.903360722Z","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T18:52:14.90339781Z","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T18:52:14.903406233Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T18:52:14.903411018Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T18:52:14.903414073Z","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T18:52:14.903418676Z","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T18:52:14.903421282Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T18:52:14.903424403Z","Action":"cont","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T18:52:14.903427193Z","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== CONT TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T18:52:14.903430535Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T18:52:14.903433345Z","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T18:52:14.903437848Z","Action":"cont","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T18:52:14.90344044Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== CONT TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T18:52:14.903443451Z","Action":"run","Test":"TestFunctional/parallel/MountCmd/any-port"} +{"Time":"2023-05-31T18:52:14.903446188Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":"=== RUN TestFunctional/parallel/MountCmd/any-port\n"} +{"Time":"2023-05-31T18:52:14.903461161Z","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" functional_test.go:1688: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 addons list\n"} +{"Time":"2023-05-31T18:52:14.903587679Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1627: (dbg) Run: kubectl --context functional-384583 create deployment hello-node-connect --image=registry.k8s.io/echoserver:1.8\n"} +{"Time":"2023-05-31T18:52:14.903665325Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:73: (dbg) daemon: [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdany-port817122147/001:/mount-9p --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T18:52:14.904381851Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685559134904185193\" to /tmp/TestFunctionalparallelMountCmdany-port817122147/001/created-by-test\n"} +{"Time":"2023-05-31T18:52:14.904397041Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685559134904185193\" to /tmp/TestFunctionalparallelMountCmdany-port817122147/001/created-by-test-removed-by-pod\n"} +{"Time":"2023-05-31T18:52:14.904402798Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685559134904185193\" to /tmp/TestFunctionalparallelMountCmdany-port817122147/001/test-1685559134904185193\n"} +{"Time":"2023-05-31T18:52:14.904408788Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T18:52:14.960917485Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 config get cpus\n"} +{"Time":"2023-05-31T18:52:14.986321472Z","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" functional_test.go:1700: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 addons list -o json\n"} +{"Time":"2023-05-31T18:52:14.995866605Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1633: (dbg) Run: kubectl --context functional-384583 expose deployment hello-node-connect --type=NodePort --port=8080\n"} +{"Time":"2023-05-31T18:52:15.014255039Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 config get cpus: exit status 14 (53.104395ms)\n"} +{"Time":"2023-05-31T18:52:15.014290006Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T18:52:15.01429478Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:15.014298796Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \tError: specified key could not be found in config\n"} +{"Time":"2023-05-31T18:52:15.014302993Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T18:52:15.014306689Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:15.014310203Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 config set cpus 2\n"} +{"Time":"2023-05-31T18:52:15.070552027Z","Action":"cont","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T18:52:15.070575988Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== CONT TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T18:52:15.070581574Z","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/DeployApp"} +{"Time":"2023-05-31T18:52:15.070584569Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":"=== RUN TestFunctional/parallel/ServiceCmd/DeployApp\n"} +{"Time":"2023-05-31T18:52:15.070589174Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1437: (dbg) Run: kubectl --context functional-384583 create deployment hello-node --image=registry.k8s.io/echoserver:1.8\n"} +{"Time":"2023-05-31T18:52:15.079558864Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 config get cpus\n"} +{"Time":"2023-05-31T18:52:15.13090559Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 config unset cpus\n"} +{"Time":"2023-05-31T18:52:15.146507406Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1638: (dbg) TestFunctional/parallel/ServiceCmdConnect: waiting 10m0s for pods matching \"app=hello-node-connect\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:52:15.170421581Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:344: \"hello-node-connect-6fb669fc84-b9cxx\" [2c039b13-20a4-4447-972d-9059ab6c078d] Pending / Ready:ContainersNotReady (containers with unready status: [echoserver]) / ContainersReady:ContainersNotReady (containers with unready status: [echoserver])\n"} +{"Time":"2023-05-31T18:52:15.176106292Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 config get cpus\n"} +{"Time":"2023-05-31T18:52:15.178118116Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1443: (dbg) Run: kubectl --context functional-384583 expose deployment hello-node --type=NodePort --port=8080\n"} +{"Time":"2023-05-31T18:52:15.184923294Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T /mount-9p | grep 9p\": exit status 1 (280.449605ms)\n"} +{"Time":"2023-05-31T18:52:15.184944249Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \n"} +{"Time":"2023-05-31T18:52:15.184948153Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:15.184951467Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T18:52:15.18495551Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \n"} +{"Time":"2023-05-31T18:52:15.184971055Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:15.225939657Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 config get cpus: exit status 14 (49.770286ms)\n"} +{"Time":"2023-05-31T18:52:15.225968676Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T18:52:15.225974018Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:15.225977848Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \tError: specified key could not be found in config\n"} +{"Time":"2023-05-31T18:52:15.225981828Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T18:52:15.225984776Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:15.225988745Z","Action":"cont","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T18:52:15.22599218Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== CONT TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T18:52:15.225999211Z","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create"} +{"Time":"2023-05-31T18:52:15.226002202Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_not_create\n"} +{"Time":"2023-05-31T18:52:15.226005894Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" functional_test.go:1268: (dbg) Run: out/minikube-linux-amd64 profile lis\n"} +{"Time":"2023-05-31T18:52:15.286566954Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" functional_test.go:1273: (dbg) Run: out/minikube-linux-amd64 profile list --output json\n"} +{"Time":"2023-05-31T18:52:15.315316367Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1448: (dbg) TestFunctional/parallel/ServiceCmd/DeployApp: waiting 10m0s for pods matching \"app=hello-node\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:52:15.319745238Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" helpers_test.go:344: \"hello-node-775766b4cc-n9c4g\" [d5914724-6183-4968-95a0-72b5617875c7] Pending / Ready:ContainersNotReady (containers with unready status: [echoserver]) / ContainersReady:ContainersNotReady (containers with unready status: [echoserver])\n"} +{"Time":"2023-05-31T18:52:15.463708221Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T18:52:15.542232836Z","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_list"} +{"Time":"2023-05-31T18:52:15.542256861Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_list\n"} +{"Time":"2023-05-31T18:52:15.542265628Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1308: (dbg) Run: out/minikube-linux-amd64 profile list\n"} +{"Time":"2023-05-31T18:52:15.677191628Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:129: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh -- ls -la /mount-9p\n"} +{"Time":"2023-05-31T18:52:15.80869234Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1313: Took \"266.383474ms\" to run \"out/minikube-linux-amd64 profile list\"\n"} +{"Time":"2023-05-31T18:52:15.808713897Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1322: (dbg) Run: out/minikube-linux-amd64 profile list -l\n"} +{"Time":"2023-05-31T18:52:15.846614579Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1327: Took \"37.847068ms\" to run \"out/minikube-linux-amd64 profile list -l\"\n"} +{"Time":"2023-05-31T18:52:15.846640327Z","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output"} +{"Time":"2023-05-31T18:52:15.846643089Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_json_output\n"} +{"Time":"2023-05-31T18:52:15.846690398Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1359: (dbg) Run: out/minikube-linux-amd64 profile list -o json\n"} +{"Time":"2023-05-31T18:52:15.878472482Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:133: guest mount directory contents\n"} +{"Time":"2023-05-31T18:52:15.878511342Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" total 2\r\n"} +{"Time":"2023-05-31T18:52:15.878516315Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:52 created-by-test\r\n"} +{"Time":"2023-05-31T18:52:15.878521894Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:52 created-by-test-removed-by-pod\r\n"} +{"Time":"2023-05-31T18:52:15.878525469Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:52 test-1685559134904185193\r\n"} +{"Time":"2023-05-31T18:52:15.878529106Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:137: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh cat /mount-9p/test-1685559134904185193\n"} +{"Time":"2023-05-31T18:52:16.109375643Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:148: (dbg) Run: kubectl --context functional-384583 replace --force -f testdata/busybox-mount-test.yaml\n"} +{"Time":"2023-05-31T18:52:16.128913104Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1364: Took \"282.166015ms\" to run \"out/minikube-linux-amd64 profile list -o json\"\n"} +{"Time":"2023-05-31T18:52:16.129090103Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1372: (dbg) Run: out/minikube-linux-amd64 profile list -o json --light\n"} +{"Time":"2023-05-31T18:52:16.170001799Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1377: Took \"40.88172ms\" to run \"out/minikube-linux-amd64 profile list -o json --light\"\n"} +{"Time":"2023-05-31T18:52:16.170168332Z","Action":"cont","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T18:52:16.170180741Z","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== CONT TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T18:52:16.170208558Z","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 cp testdata/cp-test.txt /home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T18:52:16.414752358Z","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh -n functional-384583 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T18:52:16.461783504Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:153: (dbg) TestFunctional/parallel/MountCmd/any-port: waiting 4m0s for pods matching \"integration-test=busybox-mount\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:52:16.46945934Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [26aa0d30-6147-4817-9c84-bbf8f2d37c89] Pending\n"} +{"Time":"2023-05-31T18:52:16.604358771Z","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 cp functional-384583:/home/docker/cp-test.txt /tmp/TestFunctionalparallelCpCmd342051639/001/cp-test.txt\n"} +{"Time":"2023-05-31T18:52:16.817246247Z","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh -n functional-384583 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T18:52:17.014045868Z","Action":"cont","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T18:52:17.014066075Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== CONT TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T18:52:17.01408096Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /etc/ssl/certs/18150.pem within VM\n"} +{"Time":"2023-05-31T18:52:17.014142789Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo cat /etc/ssl/certs/18150.pem\"\n"} +{"Time":"2023-05-31T18:52:17.207355238Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /usr/share/ca-certificates/18150.pem within VM\n"} +{"Time":"2023-05-31T18:52:17.207399185Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo cat /usr/share/ca-certificates/18150.pem\"\n"} +{"Time":"2023-05-31T18:52:17.407912962Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /etc/ssl/certs/51391683.0 within VM\n"} +{"Time":"2023-05-31T18:52:17.40793987Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo cat /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T18:52:17.475414274Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [26aa0d30-6147-4817-9c84-bbf8f2d37c89] Pending / Ready:ContainersNotReady (containers with unready status: [mount-munger]) / ContainersReady:ContainersNotReady (containers with unready status: [mount-munger])\n"} +{"Time":"2023-05-31T18:52:17.616760049Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /etc/ssl/certs/181502.pem within VM\n"} +{"Time":"2023-05-31T18:52:17.616788041Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo cat /etc/ssl/certs/181502.pem\"\n"} +{"Time":"2023-05-31T18:52:17.801867254Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /usr/share/ca-certificates/181502.pem within VM\n"} +{"Time":"2023-05-31T18:52:17.801897596Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo cat /usr/share/ca-certificates/181502.pem\"\n"} +{"Time":"2023-05-31T18:52:17.991341634Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /etc/ssl/certs/3ec20f2e.0 within VM\n"} +{"Time":"2023-05-31T18:52:17.991366686Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo cat /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T18:52:18.190141038Z","Action":"cont","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T18:52:18.190161171Z","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== CONT TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T18:52:18.190169646Z","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1924: Checking for existence of /etc/test/nested/copy/18150/hosts within VM\n"} +{"Time":"2023-05-31T18:52:18.190173711Z","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1926: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo cat /etc/test/nested/copy/18150/hosts\"\n"} +{"Time":"2023-05-31T18:52:18.391851685Z","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1931: file sync test content: Test file for checking file sync process\n"} +{"Time":"2023-05-31T18:52:18.391883445Z","Action":"cont","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T18:52:18.391895281Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== CONT TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T18:52:18.392042134Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1788: (dbg) Run: kubectl --context functional-384583 replace --force -f testdata/mysql.yaml\n"} +{"Time":"2023-05-31T18:52:18.657409039Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1794: (dbg) TestFunctional/parallel/MySQL: waiting 10m0s for pods matching \"app=mysql\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:52:19.666859625Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" helpers_test.go:344: \"mysql-7db894d786-rrxxl\" [36433c6b-a9b8-436f-951d-f7b27d596a2b] Pending / Ready:ContainersNotReady (containers with unready status: [mysql]) / ContainersReady:ContainersNotReady (containers with unready status: [mysql])\n"} +{"Time":"2023-05-31T18:52:20.228755702Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:344: \"hello-node-connect-6fb669fc84-b9cxx\" [2c039b13-20a4-4447-972d-9059ab6c078d] Running\n"} +{"Time":"2023-05-31T18:52:20.324103514Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" helpers_test.go:344: \"hello-node-775766b4cc-n9c4g\" [d5914724-6183-4968-95a0-72b5617875c7] Running\n"} +{"Time":"2023-05-31T18:52:21.474503138Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [26aa0d30-6147-4817-9c84-bbf8f2d37c89] Pending: Initialized:PodCompleted / Ready:PodCompleted / ContainersReady:PodCompleted\n"} +{"Time":"2023-05-31T18:52:22.474120149Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [26aa0d30-6147-4817-9c84-bbf8f2d37c89] Succeeded: Initialized:PodCompleted / Ready:PodCompleted / ContainersReady:PodCompleted\n"} +{"Time":"2023-05-31T18:52:22.474149039Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:153: (dbg) TestFunctional/parallel/MountCmd/any-port: integration-test=busybox-mount healthy within 6.012383267s\n"} +{"Time":"2023-05-31T18:52:22.474209393Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:169: (dbg) Run: kubectl --context functional-384583 logs busybox-mount\n"} +{"Time":"2023-05-31T18:52:22.555456917Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:181: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh stat /mount-9p/created-by-test\n"} +{"Time":"2023-05-31T18:52:22.758277306Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:181: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh stat /mount-9p/created-by-pod\n"} +{"Time":"2023-05-31T18:52:22.943989721Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:90: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo umount -f /mount-9p\"\n"} +{"Time":"2023-05-31T18:52:23.218434197Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:94: (dbg) stopping [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdany-port817122147/001:/mount-9p --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T18:52:23.525652323Z","Action":"run","Test":"TestFunctional/parallel/MountCmd/specific-port"} +{"Time":"2023-05-31T18:52:23.525689361Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":"=== RUN TestFunctional/parallel/MountCmd/specific-port\n"} +{"Time":"2023-05-31T18:52:23.5257546Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:213: (dbg) daemon: [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdspecific-port4257776150/001:/mount-9p --alsologtostderr -v=1 --port 46464]\n"} +{"Time":"2023-05-31T18:52:23.526134122Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T18:52:23.714214543Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T /mount-9p | grep 9p\": exit status 1 (187.993628ms)\n"} +{"Time":"2023-05-31T18:52:23.714239376Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T18:52:23.714243936Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:23.714247519Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T18:52:23.71425128Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T18:52:23.714254106Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:24.143764767Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T18:52:24.319575933Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:257: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh -- ls -la /mount-9p\n"} +{"Time":"2023-05-31T18:52:24.503419432Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:261: guest mount directory contents\n"} +{"Time":"2023-05-31T18:52:24.503448167Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" total 0\r\n"} +{"Time":"2023-05-31T18:52:24.503465941Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:263: (dbg) stopping [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdspecific-port4257776150/001:/mount-9p --alsologtostderr -v=1 --port 46464] ...\n"} +{"Time":"2023-05-31T18:52:24.810803947Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:264: reading mount text\n"} +{"Time":"2023-05-31T18:52:24.810830082Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:278: done reading mount text\n"} +{"Time":"2023-05-31T18:52:24.810840451Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:230: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo umount -f /mount-9p\"\n"} +{"Time":"2023-05-31T18:52:24.995855077Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:230: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo umount -f /mount-9p\": exit status 1 (184.911154ms)\n"} +{"Time":"2023-05-31T18:52:24.995877064Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T18:52:24.995880234Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:52:24.995882863Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tumount: /mount-9p: not mounted.\n"} +{"Time":"2023-05-31T18:52:24.995885285Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T18:52:24.995887393Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:52:24.995889594Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:24.995891723Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tssh: Process exited with status 32\n"} +{"Time":"2023-05-31T18:52:24.995893713Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T18:52:24.995895644Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:24.99589771Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:232: \"out/minikube-linux-amd64 -p functional-384583 ssh \\\"sudo umount -f /mount-9p\\\"\": exit status 1\n"} +{"Time":"2023-05-31T18:52:24.995902385Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:234: (dbg) stopping [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdspecific-port4257776150/001:/mount-9p --alsologtostderr -v=1 --port 46464] ...\n"} +{"Time":"2023-05-31T18:52:25.101180153Z","Action":"run","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup"} +{"Time":"2023-05-31T18:52:25.101200215Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":"=== RUN TestFunctional/parallel/MountCmd/VerifyCleanup\n"} +{"Time":"2023-05-31T18:52:25.101339457Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdVerifyCleanup1790559658/001:/mount1 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T18:52:25.101695674Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdVerifyCleanup1790559658/001:/mount2 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T18:52:25.102076383Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdVerifyCleanup1790559658/001:/mount3 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T18:52:25.10246933Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T\" /mount1\n"} +{"Time":"2023-05-31T18:52:25.383100074Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T\" /mount2\n"} +{"Time":"2023-05-31T18:52:25.583528315Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"findmnt -T\" /mount3\n"} +{"Time":"2023-05-31T18:52:25.772559999Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:370: (dbg) Run: out/minikube-linux-amd64 mount -p functional-384583 --kill=true\n"} +{"Time":"2023-05-31T18:52:25.821425896Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdVerifyCleanup1790559658/001:/mount1 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T18:52:25.821450912Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T18:52:25.821455659Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdVerifyCleanup1790559658/001:/mount2 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T18:52:25.82145941Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T18:52:25.821465512Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-linux-amd64 mount -p functional-384583 /tmp/TestFunctionalparallelMountCmdVerifyCleanup1790559658/001:/mount3 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T18:52:25.821469254Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T18:52:25.821548393Z","Action":"cont","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T18:52:25.821553767Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== CONT TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T18:52:25.821567147Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T18:52:25.821570723Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T18:52:25.82157608Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T18:52:25.821579055Z","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T18:52:25.821583865Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T18:52:25.821586706Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T18:52:25.821591417Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T18:52:25.82159441Z","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T18:52:25.821613255Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T18:52:25.821616755Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T18:52:25.821639892Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T18:52:25.821644547Z","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T18:52:25.82164811Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T18:52:25.821674405Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T18:52:25.821683283Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T18:52:25.821686484Z","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T18:52:25.821689271Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T18:52:25.821691836Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T18:52:25.821695712Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T18:52:25.821698432Z","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T18:52:25.821701411Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/Setup"} +{"Time":"2023-05-31T18:52:25.821703921Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":"=== RUN TestFunctional/parallel/ImageCommands/Setup\n"} +{"Time":"2023-05-31T18:52:25.82177605Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:340: (dbg) Run: docker pull gcr.io/google-containers/addon-resizer:1.8.8\n"} +{"Time":"2023-05-31T18:52:26.17500296Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1638: (dbg) TestFunctional/parallel/ServiceCmdConnect: app=hello-node-connect healthy within 11.028476073s\n"} +{"Time":"2023-05-31T18:52:26.175029374Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1647: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 service hello-node-connect --url\n"} +{"Time":"2023-05-31T18:52:26.323961078Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1448: (dbg) TestFunctional/parallel/ServiceCmd/DeployApp: app=hello-node healthy within 11.008661503s\n"} +{"Time":"2023-05-31T18:52:26.323989366Z","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/List"} +{"Time":"2023-05-31T18:52:26.323993823Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":"=== RUN TestFunctional/parallel/ServiceCmd/List\n"} +{"Time":"2023-05-31T18:52:26.324027769Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":" functional_test.go:1457: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 service list\n"} +{"Time":"2023-05-31T18:52:26.499594747Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1653: found endpoint for hello-node-connect: http://192.168.50.59:31613\n"} +{"Time":"2023-05-31T18:52:26.501974383Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1673: http://192.168.50.59:31613: success! body:\n"} +{"Time":"2023-05-31T18:52:26.501994741Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T18:52:26.502003713Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T18:52:26.502008418Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Hostname: hello-node-connect-6fb669fc84-b9cxx\n"} +{"Time":"2023-05-31T18:52:26.502012932Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T18:52:26.50201694Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Pod Information:\n"} +{"Time":"2023-05-31T18:52:26.502021378Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t-no pod information available-\n"} +{"Time":"2023-05-31T18:52:26.502025654Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T18:52:26.502029461Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Server values:\n"} +{"Time":"2023-05-31T18:52:26.502033353Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tserver_version=nginx: 1.13.3 - lua: 10008\n"} +{"Time":"2023-05-31T18:52:26.502037371Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T18:52:26.502041407Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Request Information:\n"} +{"Time":"2023-05-31T18:52:26.502045491Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tclient_address=10.244.0.1\n"} +{"Time":"2023-05-31T18:52:26.502049604Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tmethod=GET\n"} +{"Time":"2023-05-31T18:52:26.502054365Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \treal path=/\n"} +{"Time":"2023-05-31T18:52:26.502058434Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tquery=\n"} +{"Time":"2023-05-31T18:52:26.502070342Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \trequest_version=1.1\n"} +{"Time":"2023-05-31T18:52:26.502074409Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \trequest_uri=http://192.168.50.59:8080/\n"} +{"Time":"2023-05-31T18:52:26.502086508Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T18:52:26.502090961Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Request Headers:\n"} +{"Time":"2023-05-31T18:52:26.502094784Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \taccept-encoding=gzip\n"} +{"Time":"2023-05-31T18:52:26.50209872Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \thost=192.168.50.59:31613\n"} +{"Time":"2023-05-31T18:52:26.502102776Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tuser-agent=Go-http-client/1.1\n"} +{"Time":"2023-05-31T18:52:26.502106572Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T18:52:26.502110434Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Request Body:\n"} +{"Time":"2023-05-31T18:52:26.502114244Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t-no body in request-\n"} +{"Time":"2023-05-31T18:52:26.502118104Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T18:52:26.502123424Z","Action":"cont","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T18:52:26.502126889Z","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== CONT TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T18:52:26.502133078Z","Action":"output","Test":"TestFunctional/parallel/License","Output":" functional_test.go:2283: (dbg) Run: out/minikube-linux-amd64 license\n"} +{"Time":"2023-05-31T18:52:26.675420519Z","Action":"cont","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T18:52:26.675452738Z","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== CONT TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T18:52:26.675459273Z","Action":"run","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T18:52:26.67546242Z","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== RUN TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T18:52:26.675468969Z","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== PAUSE TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T18:52:26.675472411Z","Action":"pause","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T18:52:26.675476237Z","Action":"run","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T18:52:26.675479598Z","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== RUN TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T18:52:26.675483513Z","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== PAUSE TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T18:52:26.675486455Z","Action":"pause","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T18:52:26.675490325Z","Action":"cont","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T18:52:26.675494171Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== CONT TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T18:52:26.675500333Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" functional_test.go:2022: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo systemctl is-active docker\"\n"} +{"Time":"2023-05-31T18:52:26.824107661Z","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput"} +{"Time":"2023-05-31T18:52:26.824131125Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":"=== RUN TestFunctional/parallel/ServiceCmd/JSONOutput\n"} +{"Time":"2023-05-31T18:52:26.824139715Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" functional_test.go:1487: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 service list -o json\n"} +{"Time":"2023-05-31T18:52:26.885895657Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" functional_test.go:2022: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo systemctl is-active docker\": exit status 1 (210.290396ms)\n"} +{"Time":"2023-05-31T18:52:26.885926625Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T18:52:26.885931315Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:52:26.885935093Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \tinactive\n"} +{"Time":"2023-05-31T18:52:26.885938593Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T18:52:26.885942191Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:52:26.885945985Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:26.885949849Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \tssh: Process exited with status 3\n"} +{"Time":"2023-05-31T18:52:26.885953277Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T18:52:26.885956765Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:26.885960759Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" functional_test.go:2022: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo systemctl is-active crio\"\n"} +{"Time":"2023-05-31T18:52:26.979027397Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:340: (dbg) Done: docker pull gcr.io/google-containers/addon-resizer:1.8.8: (1.157167153s)\n"} +{"Time":"2023-05-31T18:52:26.979052693Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:345: (dbg) Run: docker tag gcr.io/google-containers/addon-resizer:1.8.8 gcr.io/google-containers/addon-resizer:functional-384583\n"} +{"Time":"2023-05-31T18:52:27.001228506Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon"} +{"Time":"2023-05-31T18:52:27.001246555Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageLoadDaemon\n"} +{"Time":"2023-05-31T18:52:27.001252342Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:353: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image load --daemon gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:27.09129711Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" functional_test.go:2022: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 ssh \"sudo systemctl is-active crio\": exit status 1 (205.304188ms)\n"} +{"Time":"2023-05-31T18:52:27.091336336Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T18:52:27.091341375Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:52:27.091345134Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \tinactive\n"} +{"Time":"2023-05-31T18:52:27.091350925Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T18:52:27.091354121Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:52:27.091359108Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:27.091363741Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \tssh: Process exited with status 3\n"} +{"Time":"2023-05-31T18:52:27.09136723Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T18:52:27.091372633Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:27.091376306Z","Action":"cont","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T18:52:27.091379463Z","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== CONT TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T18:52:27.091385797Z","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":" functional_test.go:545: only validate podman env with docker container runtime, currently testing containerd\n"} +{"Time":"2023-05-31T18:52:27.091392416Z","Action":"cont","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T18:52:27.091395275Z","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== CONT TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T18:52:27.091399052Z","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":" functional_test.go:217: (dbg) Run: kubectl --context functional-384583 get nodes --output=go-template \"--template='{{range $k, $v := (index .items 0).metadata.labels}}{{$k}} {{end}}'\"\n"} +{"Time":"2023-05-31T18:52:27.164913297Z","Action":"cont","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T18:52:27.164936459Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== CONT TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T18:52:27.164944544Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial"} +{"Time":"2023-05-31T18:52:27.164948247Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial\n"} +{"Time":"2023-05-31T18:52:27.164952152Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel"} +{"Time":"2023-05-31T18:52:27.164955466Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel\n"} +{"Time":"2023-05-31T18:52:27.172800242Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:90: password required to execute 'route', skipping testTunnel: exit status 1\n"} +{"Time":"2023-05-31T18:52:27.172850166Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel"} +{"Time":"2023-05-31T18:52:27.172855031Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/StartTunnel\n"} +{"Time":"2023-05-31T18:52:27.179068543Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":" functional_test_tunnel_test.go:90: password required to execute 'route', skipping testTunnel: exit status 1\n"} +{"Time":"2023-05-31T18:52:27.179093584Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService"} +{"Time":"2023-05-31T18:52:27.179097648Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/WaitService\n"} +{"Time":"2023-05-31T18:52:27.185316709Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Output":" functional_test_tunnel_test.go:90: password required to execute 'route', skipping testTunnel: exit status 1\n"} +{"Time":"2023-05-31T18:52:27.185370516Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect"} +{"Time":"2023-05-31T18:52:27.185376206Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/AccessDirect\n"} +{"Time":"2023-05-31T18:52:27.191885938Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":" functional_test_tunnel_test.go:90: password required to execute 'route', skipping testTunnel: exit status 1\n"} +{"Time":"2023-05-31T18:52:27.191917556Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig"} +{"Time":"2023-05-31T18:52:27.191920938Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig\n"} +{"Time":"2023-05-31T18:52:27.202944888Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":" functional_test_tunnel_test.go:90: password required to execute 'route', skipping testTunnel: exit status 1\n"} +{"Time":"2023-05-31T18:52:27.202977129Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil"} +{"Time":"2023-05-31T18:52:27.202982585Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil\n"} +{"Time":"2023-05-31T18:52:27.20886638Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":" functional_test_tunnel_test.go:90: password required to execute 'route', skipping testTunnel: exit status 1\n"} +{"Time":"2023-05-31T18:52:27.20888627Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS"} +{"Time":"2023-05-31T18:52:27.208890305Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS\n"} +{"Time":"2023-05-31T18:52:27.215167388Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":" functional_test_tunnel_test.go:90: password required to execute 'route', skipping testTunnel: exit status 1\n"} +{"Time":"2023-05-31T18:52:27.21518781Z","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel"} +{"Time":"2023-05-31T18:52:27.21519176Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel\n"} +{"Time":"2023-05-31T18:52:27.221857317Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":" functional_test_tunnel_test.go:90: password required to execute 'route', skipping testTunnel: exit status 1\n"} +{"Time":"2023-05-31T18:52:27.221913892Z","Action":"cont","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T18:52:27.221925763Z","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== CONT TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T18:52:27.221941761Z","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" functional_test.go:1723: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"echo hello\"\n"} +{"Time":"2023-05-31T18:52:27.297653198Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" functional_test.go:1492: Took \"473.087982ms\" to run \"out/minikube-linux-amd64 -p functional-384583 service list -o json\"\n"} +{"Time":"2023-05-31T18:52:27.297678437Z","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/HTTPS"} +{"Time":"2023-05-31T18:52:27.297689541Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":"=== RUN TestFunctional/parallel/ServiceCmd/HTTPS\n"} +{"Time":"2023-05-31T18:52:27.297700172Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" functional_test.go:1507: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 service --namespace=default --https --url hello-node\n"} +{"Time":"2023-05-31T18:52:27.474342745Z","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" functional_test.go:1740: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh \"cat /etc/hostname\"\n"} +{"Time":"2023-05-31T18:52:27.617000145Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" functional_test.go:1520: found endpoint: https://192.168.50.59:32537\n"} +{"Time":"2023-05-31T18:52:27.617035764Z","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/Format"} +{"Time":"2023-05-31T18:52:27.617041027Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":"=== RUN TestFunctional/parallel/ServiceCmd/Format\n"} +{"Time":"2023-05-31T18:52:27.617047576Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" functional_test.go:1538: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 service hello-node --url --format={{.IP}}\n"} +{"Time":"2023-05-31T18:52:27.712306103Z","Action":"cont","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T18:52:27.712330077Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== CONT TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T18:52:27.713403016Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:44: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 4m0s for pods matching \"integration-test=storage-provisioner\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T18:52:27.717861546Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"storage-provisioner\" [f17a6593-ad57-4ee5-90f3-32b711ed31fc] Running\n"} +{"Time":"2023-05-31T18:52:27.926584819Z","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/URL"} +{"Time":"2023-05-31T18:52:27.926613313Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":"=== RUN TestFunctional/parallel/ServiceCmd/URL\n"} +{"Time":"2023-05-31T18:52:27.926622031Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" functional_test.go:1557: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 service hello-node --url\n"} +{"Time":"2023-05-31T18:52:28.228695731Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" functional_test.go:1563: found endpoint for hello-node: http://192.168.50.59:32537\n"} +{"Time":"2023-05-31T18:52:28.228726723Z","Action":"cont","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T18:52:28.228731553Z","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== CONT TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T18:52:28.228737079Z","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":" functional_test.go:458: only validate docker env with docker container runtime, currently testing containerd\n"} +{"Time":"2023-05-31T18:52:28.228783857Z","Action":"cont","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T18:52:28.22878842Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== CONT TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T18:52:28.22883281Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" functional_test.go:1015: (dbg) Run: out/minikube-linux-amd64 start -p functional-384583 --dry-run --memory 250MB --alsologtostderr --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:52:28.387849818Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" functional_test.go:1015: (dbg) Non-zero exit: out/minikube-linux-amd64 start -p functional-384583 --dry-run --memory 250MB --alsologtostderr --driver=kvm2 --container-runtime=containerd: exit status 23 (158.777211ms)\n"} +{"Time":"2023-05-31T18:52:28.387878432Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T18:52:28.38788328Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:52:28.387887Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t* [functional-384583] minikube v1.30.1 sur Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T18:52:28.387890999Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T18:52:28.387906474Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T18:52:28.387910642Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T18:52:28.38791513Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T18:52:28.387919031Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T18:52:28.387922467Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T18:52:28.387940039Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t* Utilisation du pilote kvm2 basé sur le profil existant\n"} +{"Time":"2023-05-31T18:52:28.387944706Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t\n"} +{"Time":"2023-05-31T18:52:28.387948024Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t\n"} +{"Time":"2023-05-31T18:52:28.387951333Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T18:52:28.387954938Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:52:28.38795823Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:28.387961651Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.270184 24329 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:52:28.387965487Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.270335 24329 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:28.387969409Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.270346 24329 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:52:28.387972846Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.270354 24329 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:28.387976728Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.270618 24329 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:52:28.387983842Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.271295 24329 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T18:52:28.387987908Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.272540 24329 start.go:127] hostinfo: {\"hostname\":\"ubuntu-20-agent-12\",\"uptime\":2101,\"bootTime\":1685557047,\"procs\":261,\"os\":\"linux\",\"platform\":\"ubuntu\",\"platformFamily\":\"debian\",\"platformVersion\":\"20.04\",\"kernelVersion\":\"5.15.0-1035-gcp\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"kvm\",\"virtualizationRole\":\"guest\",\"hostId\":\"591c9f12-2938-3743-e2bf-c56a050d43d1\"}\n"} +{"Time":"2023-05-31T18:52:28.387999285Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.272632 24329 start.go:137] virtualization: kvm guest\n"} +{"Time":"2023-05-31T18:52:28.388003313Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.275097 24329 out.go:177] * [functional-384583] minikube v1.30.1 sur Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T18:52:28.388007075Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.277357 24329 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T18:52:28.388010405Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.277361 24329 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T18:52:28.388014869Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.279018 24329 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T18:52:28.388018759Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.280526 24329 out.go:177] - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T18:52:28.388022504Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.282122 24329 out.go:177] - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T18:52:28.388025705Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.283779 24329 out.go:177] - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T18:52:28.388032165Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.285303 24329 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T18:52:28.38803595Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.287870 24329 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:28.38804253Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.288645 24329 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:28.388045699Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.288695 24329 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:28.388048602Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.303566 24329 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:40507\n"} +{"Time":"2023-05-31T18:52:28.388054221Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.304010 24329 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:28.388057186Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.304607 24329 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:28.388060315Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.304630 24329 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:28.388063018Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.305092 24329 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:28.388065702Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.305297 24329 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:28.388068786Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.305549 24329 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T18:52:28.388071864Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.305892 24329 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:28.38807508Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.305933 24329 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:28.388080412Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.320756 24329 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:38405\n"} +{"Time":"2023-05-31T18:52:28.388083497Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.321136 24329 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:28.388086512Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.321585 24329 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:28.388089354Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.321614 24329 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:28.388092784Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.321931 24329 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:28.388095847Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.322091 24329 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:28.388098934Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.360912 24329 out.go:177] * Utilisation du pilote kvm2 basé sur le profil existant\n"} +{"Time":"2023-05-31T18:52:28.388102494Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.365796 24329 start.go:297] selected driver: kvm2\n"} +{"Time":"2023-05-31T18:52:28.388108157Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.365812 24329 start.go:875] validating driver \"kvm2\" against \u0026{Name:functional-384583 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:kvm2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig"} +{"Time":"2023-05-31T18:52:28.388129715Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":":{KubernetesVersion:v1.27.2 ClusterName:functional-384583 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:apiserver Key:enable-admission-plugins Value:NamespaceAutoProvision}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8441 NodeName:} Nodes:[{Name: IP:192.168.50.59 Port:8441 KubernetesVersion:v1.27.2 ContainerRuntime:containerd ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDi"} +{"Time":"2023-05-31T18:52:28.388135034Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"sks:0 CertExpiration:26280h0m0s Mount:false MountString:/home/jenkins:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T18:52:28.388139775Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.365930 24329 start.go:886] status for kvm2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T18:52:28.388143632Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.368282 24329 out.go:177] \n"} +{"Time":"2023-05-31T18:52:28.388147341Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tW0531 18:52:28.373636 24329 out.go:239] X Fermeture en raison de RSRC_INSUFFICIENT_REQ_MEMORY : L'allocation de mémoire demandée 250 Mio est inférieure au minimum utilisable de 1800 Mo\n"} +{"Time":"2023-05-31T18:52:28.388151487Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tX Fermeture en raison de RSRC_INSUFFICIENT_REQ_MEMORY : L'allocation de mémoire demandée 250 Mio est inférieure au minimum utilisable de 1800 Mo\n"} +{"Time":"2023-05-31T18:52:28.388155508Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 18:52:28.375156 24329 out.go:177] \n"} +{"Time":"2023-05-31T18:52:28.388159484Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T18:52:28.388163308Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:28.388168207Z","Action":"cont","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T18:52:28.388171128Z","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== CONT TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T18:52:28.388177908Z","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:849: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 status\n"} +{"Time":"2023-05-31T18:52:28.659185269Z","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:855: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 status -f host:{{.Host}},kublet:{{.Kubelet}},apiserver:{{.APIServer}},kubeconfig:{{.Kubeconfig}}\n"} +{"Time":"2023-05-31T18:52:28.934093208Z","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:867: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 status -o json\n"} +{"Time":"2023-05-31T18:52:29.18406623Z","Action":"cont","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T18:52:29.184099979Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== CONT TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T18:52:29.184117059Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:969: (dbg) Run: out/minikube-linux-amd64 start -p functional-384583 --dry-run --memory 250MB --alsologtostderr --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:52:29.313437934Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:969: (dbg) Non-zero exit: out/minikube-linux-amd64 start -p functional-384583 --dry-run --memory 250MB --alsologtostderr --driver=kvm2 --container-runtime=containerd: exit status 23 (129.130036ms)\n"} +{"Time":"2023-05-31T18:52:29.313464003Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T18:52:29.313467479Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:52:29.3134703Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t* [functional-384583] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T18:52:29.313482442Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T18:52:29.313484882Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T18:52:29.313487307Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T18:52:29.313489762Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T18:52:29.313493781Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T18:52:29.313495928Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T18:52:29.313497973Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t* Using the kvm2 driver based on existing profile\n"} +{"Time":"2023-05-31T18:52:29.313500043Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t\n"} +{"Time":"2023-05-31T18:52:29.313502231Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t\n"} +{"Time":"2023-05-31T18:52:29.313504449Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T18:52:29.313509609Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:52:29.313512843Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:29.313516081Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.223280 24444 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:52:29.313520449Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.223387 24444 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:29.313524124Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.223395 24444 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:52:29.313527913Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.223399 24444 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:29.31353138Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.223514 24444 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:52:29.313536181Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.224035 24444 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T18:52:29.313540266Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.224990 24444 start.go:127] hostinfo: {\"hostname\":\"ubuntu-20-agent-12\",\"uptime\":2102,\"bootTime\":1685557047,\"procs\":270,\"os\":\"linux\",\"platform\":\"ubuntu\",\"platformFamily\":\"debian\",\"platformVersion\":\"20.04\",\"kernelVersion\":\"5.15.0-1035-gcp\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"kvm\",\"virtualizationRole\":\"guest\",\"hostId\":\"591c9f12-2938-3743-e2bf-c56a050d43d1\"}\n"} +{"Time":"2023-05-31T18:52:29.313549153Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.225045 24444 start.go:137] virtualization: kvm guest\n"} +{"Time":"2023-05-31T18:52:29.313554563Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.227756 24444 out.go:177] * [functional-384583] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T18:52:29.313556939Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.229547 24444 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T18:52:29.313559204Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.229516 24444 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T18:52:29.313561302Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.231259 24444 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T18:52:29.313563463Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.232884 24444 out.go:177] - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T18:52:29.313565633Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.234424 24444 out.go:177] - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T18:52:29.313572608Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.235824 24444 out.go:177] - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T18:52:29.313575545Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.237601 24444 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T18:52:29.313577885Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.239572 24444 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:29.31358053Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.240090 24444 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:29.313585408Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.240147 24444 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:29.31358763Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.255363 24444 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:41945\n"} +{"Time":"2023-05-31T18:52:29.313589645Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.255738 24444 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:29.313591733Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.256306 24444 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:29.313593785Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.256330 24444 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:29.313595887Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.256684 24444 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:29.313598836Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.256860 24444 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:29.313602413Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.257091 24444 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T18:52:29.313606181Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.257373 24444 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:29.31360974Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.257407 24444 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:29.313613893Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.271388 24444 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:45651\n"} +{"Time":"2023-05-31T18:52:29.313617625Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.271715 24444 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:29.313621077Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.272190 24444 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:29.313624367Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.272204 24444 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:29.313627834Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.272530 24444 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:29.313632632Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.272723 24444 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:29.313636275Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.302462 24444 out.go:177] * Using the kvm2 driver based on existing profile\n"} +{"Time":"2023-05-31T18:52:29.313643222Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.303914 24444 start.go:297] selected driver: kvm2\n"} +{"Time":"2023-05-31T18:52:29.313649887Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.303925 24444 start.go:875] validating driver \"kvm2\" against \u0026{Name:functional-384583 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:kvm2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig"} +{"Time":"2023-05-31T18:52:29.313654952Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":":{KubernetesVersion:v1.27.2 ClusterName:functional-384583 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:apiserver Key:enable-admission-plugins Value:NamespaceAutoProvision}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8441 NodeName:} Nodes:[{Name: IP:192.168.50.59 Port:8441 KubernetesVersion:v1.27.2 ContainerRuntime:containerd ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDi"} +{"Time":"2023-05-31T18:52:29.313658267Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"sks:0 CertExpiration:26280h0m0s Mount:false MountString:/home/jenkins:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T18:52:29.313660908Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.304057 24444 start.go:886] status for kvm2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T18:52:29.313663378Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.306455 24444 out.go:177] \n"} +{"Time":"2023-05-31T18:52:29.313665532Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tW0531 18:52:29.308183 24444 out.go:239] X Exiting due to RSRC_INSUFFICIENT_REQ_MEMORY: Requested memory allocation 250MiB is less than the usable minimum of 1800MB\n"} +{"Time":"2023-05-31T18:52:29.313668911Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tX Exiting due to RSRC_INSUFFICIENT_REQ_MEMORY: Requested memory allocation 250MiB is less than the usable minimum of 1800MB\n"} +{"Time":"2023-05-31T18:52:29.313671151Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 18:52:29.309690 24444 out.go:177] \n"} +{"Time":"2023-05-31T18:52:29.313673065Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T18:52:29.313675417Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:29.313680945Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:986: (dbg) Run: out/minikube-linux-amd64 start -p functional-384583 --dry-run --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:52:29.43694069Z","Action":"cont","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T18:52:29.436977183Z","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== CONT TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T18:52:29.436987855Z","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" functional_test.go:900: (dbg) daemon: [out/minikube-linux-amd64 dashboard --url --port 36195 -p functional-384583 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T18:52:30.199290715Z","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"E0531 18:52:30.199221 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:52:32.722409565Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:44: (dbg) TestFunctional/parallel/PersistentVolumeClaim: integration-test=storage-provisioner healthy within 5.008966331s\n"} +{"Time":"2023-05-31T18:52:32.722439163Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:49: (dbg) Run: kubectl --context functional-384583 get storageclass -o=json\n"} +{"Time":"2023-05-31T18:52:32.775890751Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:69: (dbg) Run: kubectl --context functional-384583 apply -f testdata/storage-provisioner/pvc.yaml\n"} +{"Time":"2023-05-31T18:52:33.010314197Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:76: (dbg) Run: kubectl --context functional-384583 get pvc myclaim -o=json\n"} +{"Time":"2023-05-31T18:52:33.175255312Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:353: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 image load --daemon gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr: (6.173882193s)\n"} +{"Time":"2023-05-31T18:52:33.175285523Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls\n"} +{"Time":"2023-05-31T18:52:33.401352588Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon"} +{"Time":"2023-05-31T18:52:33.401377866Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageReloadDaemon\n"} +{"Time":"2023-05-31T18:52:33.40138766Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:363: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image load --daemon gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:34.626956404Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:76: (dbg) Run: kubectl --context functional-384583 get pvc myclaim -o=json\n"} +{"Time":"2023-05-31T18:52:34.694403624Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" helpers_test.go:344: \"mysql-7db894d786-rrxxl\" [36433c6b-a9b8-436f-951d-f7b27d596a2b] Running\n"} +{"Time":"2023-05-31T18:52:34.70398478Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:125: (dbg) Run: kubectl --context functional-384583 apply -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T18:52:34.964422697Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 3m0s for pods matching \"test=storage-provisioner\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:52:34.979820646Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [c4df6e83-13f8-43ca-89ff-088e06bca50b] Pending\n"} +{"Time":"2023-05-31T18:52:35.984423014Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [c4df6e83-13f8-43ca-89ff-088e06bca50b] Pending / Ready:ContainersNotReady (containers with unready status: [myfrontend]) / ContainersReady:ContainersNotReady (containers with unready status: [myfrontend])\n"} +{"Time":"2023-05-31T18:52:38.473628795Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:363: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 image load --daemon gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr: (5.072135492s)\n"} +{"Time":"2023-05-31T18:52:38.473668128Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls\n"} +{"Time":"2023-05-31T18:52:38.741055926Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon"} +{"Time":"2023-05-31T18:52:38.741076181Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon\n"} +{"Time":"2023-05-31T18:52:38.741109866Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:233: (dbg) Run: docker pull gcr.io/google-containers/addon-resizer:1.8.9\n"} +{"Time":"2023-05-31T18:52:39.644991744Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:238: (dbg) Run: docker tag gcr.io/google-containers/addon-resizer:1.8.9 gcr.io/google-containers/addon-resizer:functional-384583\n"} +{"Time":"2023-05-31T18:52:39.664870207Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:243: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image load --daemon gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:40.665712222Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1794: (dbg) TestFunctional/parallel/MySQL: app=mysql healthy within 22.00830461s\n"} +{"Time":"2023-05-31T18:52:40.665743743Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T18:52:40.858684362Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Non-zero exit: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\": exit status 1 (192.874013ms)\n"} +{"Time":"2023-05-31T18:52:40.858723557Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T18:52:40.858729902Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:40.858734424Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tmysql: [Warning] Using a password on the command line interface can be insecure.\n"} +{"Time":"2023-05-31T18:52:40.85873837Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tERROR 2002 (HY000): Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (2)\n"} +{"Time":"2023-05-31T18:52:40.858742192Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tcommand terminated with exit code 1\n"} +{"Time":"2023-05-31T18:52:40.858745429Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T18:52:40.858748625Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:41.915634471Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T18:52:42.175651274Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Non-zero exit: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\": exit status 1 (259.967301ms)\n"} +{"Time":"2023-05-31T18:52:42.175684624Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T18:52:42.175690255Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:42.175694728Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tmysql: [Warning] Using a password on the command line interface can be insecure.\n"} +{"Time":"2023-05-31T18:52:42.175699153Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: YES)\n"} +{"Time":"2023-05-31T18:52:42.175721769Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tcommand terminated with exit code 1\n"} +{"Time":"2023-05-31T18:52:42.175725973Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T18:52:42.175730747Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:44.106959267Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T18:52:44.468192873Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Non-zero exit: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\": exit status 1 (361.115313ms)\n"} +{"Time":"2023-05-31T18:52:44.468223805Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T18:52:44.468229407Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:44.468233503Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tmysql: [Warning] Using a password on the command line interface can be insecure.\n"} +{"Time":"2023-05-31T18:52:44.468237233Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: YES)\n"} +{"Time":"2023-05-31T18:52:44.468240678Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tcommand terminated with exit code 1\n"} +{"Time":"2023-05-31T18:52:44.468244366Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T18:52:44.468247502Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:45.399499305Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:243: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 image load --daemon gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr: (5.734562141s)\n"} +{"Time":"2023-05-31T18:52:45.399524533Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls\n"} +{"Time":"2023-05-31T18:52:45.64462493Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile"} +{"Time":"2023-05-31T18:52:45.644645669Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageSaveToFile\n"} +{"Time":"2023-05-31T18:52:45.644654165Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":" functional_test.go:378: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image save gcr.io/google-containers/addon-resizer:functional-384583 /home/jenkins/workspace/KVM_Linux_containerd_integration/addon-resizer-save.tar --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:45.917643666Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T18:52:46.150787254Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Non-zero exit: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\": exit status 1 (233.097466ms)\n"} +{"Time":"2023-05-31T18:52:46.150814491Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T18:52:46.15081914Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:46.150822994Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tmysql: [Warning] Using a password on the command line interface can be insecure.\n"} +{"Time":"2023-05-31T18:52:46.150825967Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tERROR 2002 (HY000): Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (2)\n"} +{"Time":"2023-05-31T18:52:46.150828698Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \tcommand terminated with exit code 1\n"} +{"Time":"2023-05-31T18:52:46.150831024Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" \n"} +{"Time":"2023-05-31T18:52:46.150833037Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:46.81873298Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":" functional_test.go:378: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 image save gcr.io/google-containers/addon-resizer:functional-384583 /home/jenkins/workspace/KVM_Linux_containerd_integration/addon-resizer-save.tar --alsologtostderr: (1.173956902s)\n"} +{"Time":"2023-05-31T18:52:46.818761914Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageRemove"} +{"Time":"2023-05-31T18:52:46.818765479Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageRemove\n"} +{"Time":"2023-05-31T18:52:46.818815667Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" functional_test.go:390: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image rm gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:47.434445794Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" functional_test.go:446: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls\n"} +{"Time":"2023-05-31T18:52:47.487783221Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":"2023/05/31 18:52:47 [DEBUG] GET http://127.0.0.1:36195/api/v1/namespaces/kubernetes-dashboard/services/http:kubernetes-dashboard:/proxy/\n"} +{"Time":"2023-05-31T18:52:47.525765846Z","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" functional_test.go:905: (dbg) stopping [out/minikube-linux-amd64 dashboard --url --port 36195 -p functional-384583 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T18:52:47.653778947Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile"} +{"Time":"2023-05-31T18:52:47.653806619Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageLoadFromFile\n"} +{"Time":"2023-05-31T18:52:47.653815816Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" functional_test.go:407: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image load /home/jenkins/workspace/KVM_Linux_containerd_integration/addon-resizer-save.tar --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:47.832109319Z","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" helpers_test.go:508: unable to kill pid 24566: os: process already finished\n"} +{"Time":"2023-05-31T18:52:47.932950953Z","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T18:52:47.932987438Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T18:52:47.933012462Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":" functional_test.go:2114: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T18:52:48.019988454Z","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T18:52:48.020024367Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T18:52:48.020160618Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":" functional_test.go:2114: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T18:52:48.101911723Z","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T18:52:48.101939263Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T18:52:48.102026135Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":" functional_test.go:2114: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T18:52:48.186135253Z","Action":"cont","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T18:52:48.186161411Z","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== CONT TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T18:52:48.186168739Z","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":" functional_test.go:2251: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 version --short\n"} +{"Time":"2023-05-31T18:52:48.225418529Z","Action":"cont","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T18:52:48.225468541Z","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== CONT TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T18:52:48.225479543Z","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":" functional_test.go:2265: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 version -o=json --components\n"} +{"Time":"2023-05-31T18:52:49.297057915Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" functional_test.go:407: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 image load /home/jenkins/workspace/KVM_Linux_containerd_integration/addon-resizer-save.tar --alsologtostderr: (1.643192438s)\n"} +{"Time":"2023-05-31T18:52:49.297266345Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" functional_test.go:446: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls\n"} +{"Time":"2023-05-31T18:52:49.482842209Z","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon"} +{"Time":"2023-05-31T18:52:49.48286323Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageSaveDaemon\n"} +{"Time":"2023-05-31T18:52:49.482875042Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:417: (dbg) Run: docker rmi gcr.io/google-containers/addon-resizer:functional-384583\n"} +{"Time":"2023-05-31T18:52:49.500982341Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:422: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image save --daemon gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:49.984161675Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [c4df6e83-13f8-43ca-89ff-088e06bca50b] Running\n"} +{"Time":"2023-05-31T18:52:49.997036759Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1802: (dbg) Run: kubectl --context functional-384583 exec mysql-7db894d786-rrxxl -- mysql -ppassword -e \"show databases;\"\n"} +{"Time":"2023-05-31T18:52:50.778469142Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:422: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 image save --daemon gcr.io/google-containers/addon-resizer:functional-384583 --alsologtostderr: (1.277432067s)\n"} +{"Time":"2023-05-31T18:52:50.778492592Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:427: (dbg) Run: docker image inspect gcr.io/google-containers/addon-resizer:functional-384583\n"} +{"Time":"2023-05-31T18:52:50.796203098Z","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T18:52:50.796229512Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T18:52:50.796236727Z","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T18:52:50.796240002Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T18:52:50.796249821Z","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T18:52:50.796253299Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T18:52:50.796260526Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:259: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls --format short --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:50.796265524Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:306: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 ssh pgrep buildkitd\n"} +{"Time":"2023-05-31T18:52:50.796270014Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:259: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls --format yaml --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:51.020622193Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:306: (dbg) Non-zero exit: out/minikube-linux-amd64 -p functional-384583 ssh pgrep buildkitd: exit status 1 (224.282873ms)\n"} +{"Time":"2023-05-31T18:52:51.020650847Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:51.020654712Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T18:52:51.020657178Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T18:52:51.020659764Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:51.020661819Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T18:52:51.020664087Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:313: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image build -t localhost/my-image:functional-384583 testdata/build --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:51.023483902Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-linux-amd64 -p functional-384583 image ls --format yaml --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:51.023506669Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:115053965e86b2df4d78af78d7951b8644839d20a03820c6df59a261103315f7\n"} +{"Time":"2023-05-31T18:52:51.023517047Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023520849Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/kubernetesui/metrics-scraper@sha256:76049887f07a0476dc93efc2d3569b9529bf982b22d29f356092ce206e98765c\n"} +{"Time":"2023-05-31T18:52:51.023525368Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags: []\n"} +{"Time":"2023-05-31T18:52:51.023529654Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"19746404\"\n"} +{"Time":"2023-05-31T18:52:51.023533803Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:5ca6d255fb617fcd3898b7480501a3dbf5e6d9779aa90e84007d36c118ee797e\n"} +{"Time":"2023-05-31T18:52:51.023537961Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T18:52:51.02354133Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023545108Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/minikube-local-cache-test:functional-384583\n"} +{"Time":"2023-05-31T18:52:51.023548966Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"1005\"\n"} +{"Time":"2023-05-31T18:52:51.023553281Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:dd6675b5cfea17abb655ea8229cbcfa5db9d0b041f839db0c24228c2e18a4bdf\n"} +{"Time":"2023-05-31T18:52:51.023557237Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023570665Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/mysql@sha256:f57eef421000aaf8332a91ab0b6c96b3c83ed2a981c29e6528b21ce10197cd16\n"} +{"Time":"2023-05-31T18:52:51.023578998Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023583088Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/mysql:5.7\n"} +{"Time":"2023-05-31T18:52:51.023585955Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"169284793\"\n"} +{"Time":"2023-05-31T18:52:51.023589893Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:6e38f40d628db3002f5617342c8872c935de530d867d0f709a2fbda1a302a562\n"} +{"Time":"2023-05-31T18:52:51.023594019Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023597322Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/k8s-minikube/storage-provisioner@sha256:18eb69d1418e854ad5a19e399310e52808a8321e4c441c1dddad8977a0d7a944\n"} +{"Time":"2023-05-31T18:52:51.02360186Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023604838Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T18:52:51.023608897Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"9058936\"\n"} +{"Time":"2023-05-31T18:52:51.023612226Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:89e70da428d29a45b89f5daa196229ceddea947f4708b3a61669e0069cb6b8b0\n"} +{"Time":"2023-05-31T18:52:51.023615969Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023619335Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-scheduler@sha256:89e8c591cc58bd0e8651dddee3de290399b1ae5ad14779afe84779083fe05177\n"} +{"Time":"2023-05-31T18:52:51.023623782Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023626811Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.023630742Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"18230943\"\n"} +{"Time":"2023-05-31T18:52:51.023635032Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:350b164e7ae1dcddeffadd65c76226c9b6dc5553f5179153fb0e36b78f2a5e06\n"} +{"Time":"2023-05-31T18:52:51.023639109Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T18:52:51.023642844Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023645994Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T18:52:51.023649758Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"72306\"\n"} +{"Time":"2023-05-31T18:52:51.023653108Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:ffd4cfbbe753e62419e129ee2ac618beb94e51baa7471df5038b0b516b59cf91\n"} +{"Time":"2023-05-31T18:52:51.023656087Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T18:52:51.023658959Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023661756Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/google-containers/addon-resizer:functional-384583\n"} +{"Time":"2023-05-31T18:52:51.023665134Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"10823156\"\n"} +{"Time":"2023-05-31T18:52:51.023668222Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:56cc512116c8f894f11ce1995460aef1ee0972d48bc2a3bdb1faaac7c020289c\n"} +{"Time":"2023-05-31T18:52:51.023671204Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023673906Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/k8s-minikube/busybox@sha256:2d03e6ceeb99250061dd110530b0ece7998cd84121f952adef120ea7c5a6f00e\n"} +{"Time":"2023-05-31T18:52:51.023677052Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023679969Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T18:52:51.023684103Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"2395207\"\n"} +{"Time":"2023-05-31T18:52:51.023687344Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:82e4c8a736a4fcf22b5ef9f6a4ff6207064c7187d7694bf97bd561605a538410\n"} +{"Time":"2023-05-31T18:52:51.023690546Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023693371Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/echoserver@sha256:cb3386f863f6a4b05f33c191361723f9d5927ac287463b1bea633bf859475969\n"} +{"Time":"2023-05-31T18:52:51.023696566Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023699486Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/echoserver:1.8\n"} +{"Time":"2023-05-31T18:52:51.023703167Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"46237695\"\n"} +{"Time":"2023-05-31T18:52:51.023706415Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:c5b13e4f7806de1dcc1c1146c7ec7c89d77ac340c3695118cf84bb0b5f989370\n"} +{"Time":"2023-05-31T18:52:51.023709498Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023712543Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T18:52:51.023715976Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023718833Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.023722012Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"33362711\"\n"} +{"Time":"2023-05-31T18:52:51.023724985Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:0184c1613d92931126feb4c548e5da11015513b9e4c104e7305ee8b53b50a9da\n"} +{"Time":"2023-05-31T18:52:51.023731452Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T18:52:51.023734684Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023737467Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T18:52:51.023740315Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"297686\"\n"} +{"Time":"2023-05-31T18:52:51.023743699Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\n"} +{"Time":"2023-05-31T18:52:51.023746744Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023750475Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097\n"} +{"Time":"2023-05-31T18:52:51.0237569Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.02376148Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T18:52:51.023764654Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"321520\"\n"} +{"Time":"2023-05-31T18:52:51.023768622Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\n"} +{"Time":"2023-05-31T18:52:51.023772346Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023775465Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T18:52:51.023779Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023782798Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T18:52:51.023786026Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"16190758\"\n"} +{"Time":"2023-05-31T18:52:51.023792317Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\n"} +{"Time":"2023-05-31T18:52:51.023795398Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023800719Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83\n"} +{"Time":"2023-05-31T18:52:51.023806083Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023809808Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T18:52:51.023817957Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"101639218\"\n"} +{"Time":"2023-05-31T18:52:51.023824124Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:b8aa50768fd675409bd7edcc4f6a18290dad5d9c2515aad12d32174dc13e7dee\n"} +{"Time":"2023-05-31T18:52:51.02382741Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023830927Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T18:52:51.023835828Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023839247Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.023842094Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"23895334\"\n"} +{"Time":"2023-05-31T18:52:51.023845005Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:b0b1fa0f58c6e932b7f20bf208b2841317a1e8c88cc51b18358310bbd8ec95da\n"} +{"Time":"2023-05-31T18:52:51.023852012Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023856321Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/kindest/kindnetd@sha256:6c00e28db008c2afa67d9ee085c86184ec9ae5281d5ae1bd15006746fb9a1974\n"} +{"Time":"2023-05-31T18:52:51.02385964Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023862941Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T18:52:51.023866073Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"27731571\"\n"} +{"Time":"2023-05-31T18:52:51.023869241Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:07655ddf2eebe5d250f7a72c25f638b27126805d61779741b4e62e69ba080558\n"} +{"Time":"2023-05-31T18:52:51.023872511Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023875683Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/kubernetesui/dashboard@sha256:2e500d29e9d5f4a086b908eb8dfe7ecac57d2ab09d65b24f588b1d449841ef93\n"} +{"Time":"2023-05-31T18:52:51.023879035Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags: []\n"} +{"Time":"2023-05-31T18:52:51.023882194Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"75788960\"\n"} +{"Time":"2023-05-31T18:52:51.023885409Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:f9c14fe76d502861ba0939bc3189e642c02e257f06f4c0214b1f8ca329326cda\n"} +{"Time":"2023-05-31T18:52:51.023888796Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023892109Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/nginx@sha256:af296b188c7b7df99ba960ca614439c99cb7cf252ed7bbc23e90cfda59092305\n"} +{"Time":"2023-05-31T18:52:51.023895459Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023898635Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/nginx:latest\n"} +{"Time":"2023-05-31T18:52:51.023901995Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"57191452\"\n"} +{"Time":"2023-05-31T18:52:51.023905281Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:ac2b7465ebba99362b6ea11fca1357b90ae6854b4464a25c55e6eef622103e12\n"} +{"Time":"2023-05-31T18:52:51.023908468Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests:\n"} +{"Time":"2023-05-31T18:52:51.023911788Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-controller-manager@sha256:b0990ef7c9ce9edd0f57355a7e4cb43a71e864bfd2cd55bc68e4998e00213b56\n"} +{"Time":"2023-05-31T18:52:51.023915217Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023918426Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.023921766Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"30971340\"\n"} +{"Time":"2023-05-31T18:52:51.023926181Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: sha256:da86e6ba6ca197bf6bc5e9d900febd906b133eaa4750e6bed647b0fbe50ed43e\n"} +{"Time":"2023-05-31T18:52:51.023929148Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T18:52:51.023932078Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T18:52:51.023934565Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T18:52:51.02393651Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"315399\"\n"} +{"Time":"2023-05-31T18:52:51.023938752Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" \n"} +{"Time":"2023-05-31T18:52:51.023941204Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-linux-amd64 -p functional-384583 image ls --format yaml --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:51.023946708Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.839079 25150 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:52:51.023958051Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.839214 25150 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:51.023960175Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.839224 25150 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:52:51.023962155Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.839229 25150 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:51.02396422Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.839341 25150 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:52:51.023966617Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.839887 25150 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.023969168Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.839978 25150 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.023971565Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.840310 25150 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:51.023978254Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.840372 25150 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:51.023981575Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.853046 25150 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:33313\n"} +{"Time":"2023-05-31T18:52:51.023988578Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.853518 25150 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:51.023993812Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.854183 25150 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:51.023997276Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.854209 25150 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:51.024000787Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.854569 25150 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:51.024004217Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.854754 25150 main.go:141] libmachine: (functional-384583) Calling .GetState\n"} +{"Time":"2023-05-31T18:52:51.024007307Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.857094 25150 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:51.024010529Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.857141 25150 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:51.024014144Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.871197 25150 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:43913\n"} +{"Time":"2023-05-31T18:52:51.024017657Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.871713 25150 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:51.024021467Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.872136 25150 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:51.024024891Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.872158 25150 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:51.024032419Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.872427 25150 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:51.024036129Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.872566 25150 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:51.024039403Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.872721 25150 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T18:52:51.024042764Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.872751 25150 main.go:141] libmachine: (functional-384583) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T18:52:51.024046576Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.875901 25150 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:51.024050794Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.876315 25150 main.go:141] libmachine: (functional-384583) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:fc:09:bb\", ip: \"\"} in network mk-functional-384583: {Iface:virbr1 ExpiryTime:2023-05-31 19:50:25 +0000 UTC Type:0 Mac:52:54:00:fc:09:bb Iaid: IPaddr:192.168.50.59 Prefix:24 Hostname:functional-384583 Clientid:01:52:54:00:fc:09:bb}\n"} +{"Time":"2023-05-31T18:52:51.024057417Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.876338 25150 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined IP address 192.168.50.59 and MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:51.024061201Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.876523 25150 main.go:141] libmachine: (functional-384583) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T18:52:51.024064751Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.876684 25150 main.go:141] libmachine: (functional-384583) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T18:52:51.024068288Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.876799 25150 main.go:141] libmachine: (functional-384583) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T18:52:51.024077027Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.876914 25150 sshutil.go:53] new ssh client: \u0026{IP:192.168.50.59 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/functional-384583/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T18:52:51.024081128Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:50.967756 25150 ssh_runner.go:195] Run: sudo crictl images --output json\n"} +{"Time":"2023-05-31T18:52:51.0240846Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.013939 25150 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.024087998Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.013954 25150 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:51.024091504Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.014218 25150 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.024094597Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.014244 25150 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:51.024097547Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.014259 25150 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.024100649Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.014270 25150 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:51.02410381Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.014496 25150 main.go:141] libmachine: (functional-384583) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T18:52:51.024107175Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.014544 25150 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.024110583Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 18:52:51.014568 25150 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:51.024119167Z","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T18:52:51.024122111Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T18:52:51.024125363Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:259: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls --format json --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:51.02700894Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-linux-amd64 -p functional-384583 image ls --format short --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:51.02703574Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T18:52:51.027040197Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T18:52:51.027042976Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T18:52:51.027050101Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T18:52:51.027056464Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.027059755Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.027063313Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.027069136Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.027072076Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T18:52:51.027075586Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/echoserver:1.8\n"} +{"Time":"2023-05-31T18:52:51.027081491Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T18:52:51.027084836Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T18:52:51.027088582Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T18:52:51.027092551Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/google-containers/addon-resizer:functional-384583\n"} +{"Time":"2023-05-31T18:52:51.027096366Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/nginx:latest\n"} +{"Time":"2023-05-31T18:52:51.027099493Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/mysql:5.7\n"} +{"Time":"2023-05-31T18:52:51.027102733Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/minikube-local-cache-test:functional-384583\n"} +{"Time":"2023-05-31T18:52:51.027105872Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T18:52:51.027113853Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-linux-amd64 -p functional-384583 image ls --format short --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:51.027127971Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.834026 25149 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:52:51.02713236Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.834259 25149 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:51.027137065Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.834308 25149 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:52:51.027140746Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.834326 25149 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:51.027148577Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.834486 25149 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:52:51.027152341Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.835252 25149 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.027155696Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.835419 25149 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.027159007Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.835939 25149 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:51.027162076Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.836050 25149 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:51.02716516Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.853604 25149 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:38859\n"} +{"Time":"2023-05-31T18:52:51.027168653Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.854149 25149 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:51.027171698Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.854829 25149 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:51.027174821Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.854853 25149 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:51.027178169Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.855209 25149 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:51.027182487Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.855342 25149 main.go:141] libmachine: (functional-384583) Calling .GetState\n"} +{"Time":"2023-05-31T18:52:51.027185735Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.858036 25149 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:51.027189274Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.858057 25149 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:51.027192439Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.870625 25149 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:45227\n"} +{"Time":"2023-05-31T18:52:51.027196589Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.870940 25149 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:51.027199909Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.871351 25149 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:51.027203193Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.871372 25149 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:51.027206438Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.871825 25149 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:51.02720977Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.872017 25149 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:51.027212712Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.872201 25149 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T18:52:51.027215822Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.872230 25149 main.go:141] libmachine: (functional-384583) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T18:52:51.027219671Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.875212 25149 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:51.027224322Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.875644 25149 main.go:141] libmachine: (functional-384583) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:fc:09:bb\", ip: \"\"} in network mk-functional-384583: {Iface:virbr1 ExpiryTime:2023-05-31 19:50:25 +0000 UTC Type:0 Mac:52:54:00:fc:09:bb Iaid: IPaddr:192.168.50.59 Prefix:24 Hostname:functional-384583 Clientid:01:52:54:00:fc:09:bb}\n"} +{"Time":"2023-05-31T18:52:51.027228289Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.875675 25149 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined IP address 192.168.50.59 and MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:51.027232305Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.875786 25149 main.go:141] libmachine: (functional-384583) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T18:52:51.027236058Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.875985 25149 main.go:141] libmachine: (functional-384583) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T18:52:51.027239381Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.876134 25149 main.go:141] libmachine: (functional-384583) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T18:52:51.027243579Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.876284 25149 sshutil.go:53] new ssh client: \u0026{IP:192.168.50.59 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/functional-384583/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T18:52:51.027248294Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:50.966622 25149 ssh_runner.go:195] Run: sudo crictl images --output json\n"} +{"Time":"2023-05-31T18:52:51.027252522Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.017812 25149 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.027256358Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.017824 25149 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:51.027259293Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.018131 25149 main.go:141] libmachine: (functional-384583) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T18:52:51.027266484Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.018147 25149 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.027270258Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.018162 25149 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:51.027273571Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.018182 25149 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.027276786Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.018202 25149 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:51.027280713Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.018440 25149 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.027284025Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.018462 25149 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:51.027287333Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 18:52:51.018482 25149 main.go:141] libmachine: (functional-384583) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T18:52:51.027296611Z","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T18:52:51.027301565Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T18:52:51.027306132Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:259: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls --format table --alsologtostderr\n"} +{"Time":"2023-05-31T18:52:51.228208699Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-linux-amd64 -p functional-384583 image ls --format json --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:51.228246676Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" [{\"id\":\"sha256:5ca6d255fb617fcd3898b7480501a3dbf5e6d9779aa90e84007d36c118ee797e\",\"repoDigests\":[],\"repoTags\":[\"docker.io/library/minikube-local-cache-test:functional-384583\"],\"size\":\"1005\"},{\"id\":\"sha256:f9c14fe76d502861ba0939bc3189e642c02e257f06f4c0214b1f8ca329326cda\",\"repoDigests\":[\"docker.io/library/nginx@sha256:af296b188c7b7df99ba960ca614439c99cb7cf252ed7bbc23e90cfda59092305\"],\"repoTags\":[\"docker.io/library/nginx:latest\"],\"size\":\"57191452\"},{\"id\":\"sha256:ac2b7465ebba99362b6ea11fca1357b90ae6854b4464a25c55e6eef622103e12\",\"repoDigests\":[\"registry.k8s.io/kube-controller-manager@sha256:b0990ef7c9ce9edd0f57355a7e4cb43a71e864bfd2cd55bc68e4998e00213b56\"],\"repoTags\":[\"registry.k8s.io/kube-controller-manager:v1.27.2\"],\"size\":\"30971340\"},{\"id\":\"sha256:da86e6ba6ca197bf6bc5e9d900febd906b133eaa4750e6bed647b0fbe50ed43e\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:3.1\"],\"size\":\"315399\"},{\"id\":\"sha256:0184c1613d92931126feb4c548e5da11015513b9e4c104e7305ee8b53b50a9da\",\"repoDigests\":[],\"repoTags\":[\"registry.k"} +{"Time":"2023-05-31T18:52:51.228256884Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"8s.io/pause:3.3\"],\"size\":\"297686\"},{\"id\":\"sha256:350b164e7ae1dcddeffadd65c76226c9b6dc5553f5179153fb0e36b78f2a5e06\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:latest\"],\"size\":\"72306\"},{\"id\":\"sha256:115053965e86b2df4d78af78d7951b8644839d20a03820c6df59a261103315f7\",\"repoDigests\":[\"docker.io/kubernetesui/metrics-scraper@sha256:76049887f07a0476dc93efc2d3569b9529bf982b22d29f356092ce206e98765c\"],\"repoTags\":[],\"size\":\"19746404\"},{\"id\":\"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\",\"repoDigests\":[\"registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83\"],\"repoTags\":[\"registry.k8s.io/etcd:3.5.7-0\"],\"size\":\"101639218\"},{\"id\":\"sha256:dd6675b5cfea17abb655ea8229cbcfa5db9d0b041f839db0c24228c2e18a4bdf\",\"repoDigests\":[\"docker.io/library/mysql@sha256:f57eef421000aaf8332a91ab0b6c96b3c83ed2a981c29e6528b21ce10197cd16\"],\"repoTags\":[\"docker.io/library/mysql:5.7\"],\"size\":\"169284793\"},{\"id\":\"sha256:ffd4cfbbe753e62419e129ee2ac618beb94e51baa7471df5038b0b516b59cf91"} +{"Time":"2023-05-31T18:52:51.228268461Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"\",\"repoDigests\":[],\"repoTags\":[\"gcr.io/google-containers/addon-resizer:functional-384583\"],\"size\":\"10823156\"},{\"id\":\"sha256:56cc512116c8f894f11ce1995460aef1ee0972d48bc2a3bdb1faaac7c020289c\",\"repoDigests\":[\"gcr.io/k8s-minikube/busybox@sha256:2d03e6ceeb99250061dd110530b0ece7998cd84121f952adef120ea7c5a6f00e\"],\"repoTags\":[\"gcr.io/k8s-minikube/busybox:1.28.4-glibc\"],\"size\":\"2395207\"},{\"id\":\"sha256:6e38f40d628db3002f5617342c8872c935de530d867d0f709a2fbda1a302a562\",\"repoDigests\":[\"gcr.io/k8s-minikube/storage-provisioner@sha256:18eb69d1418e854ad5a19e399310e52808a8321e4c441c1dddad8977a0d7a944\"],\"repoTags\":[\"gcr.io/k8s-minikube/storage-provisioner:v5\"],\"size\":\"9058936\"},{\"id\":\"sha256:82e4c8a736a4fcf22b5ef9f6a4ff6207064c7187d7694bf97bd561605a538410\",\"repoDigests\":[\"registry.k8s.io/echoserver@sha256:cb3386f863f6a4b05f33c191361723f9d5927ac287463b1bea633bf859475969\"],\"repoTags\":[\"registry.k8s.io/echoserver:1.8\"],\"size\":\"46237695\"},{\"id\":\"sha256:c5b13e4f7806de1dcc1c1146c7ec7c89d77ac340c3695118cf84bb0b5f989370\",\"repoDigests\":"} +{"Time":"2023-05-31T18:52:51.228288953Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"[\"registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\"],\"repoTags\":[\"registry.k8s.io/kube-apiserver:v1.27.2\"],\"size\":\"33362711\"},{\"id\":\"sha256:b8aa50768fd675409bd7edcc4f6a18290dad5d9c2515aad12d32174dc13e7dee\",\"repoDigests\":[\"registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\"],\"repoTags\":[\"registry.k8s.io/kube-proxy:v1.27.2\"],\"size\":\"23895334\"},{\"id\":\"sha256:89e70da428d29a45b89f5daa196229ceddea947f4708b3a61669e0069cb6b8b0\",\"repoDigests\":[\"registry.k8s.io/kube-scheduler@sha256:89e8c591cc58bd0e8651dddee3de290399b1ae5ad14779afe84779083fe05177\"],\"repoTags\":[\"registry.k8s.io/kube-scheduler:v1.27.2\"],\"size\":\"18230943\"},{\"id\":\"sha256:07655ddf2eebe5d250f7a72c25f638b27126805d61779741b4e62e69ba080558\",\"repoDigests\":[\"docker.io/kubernetesui/dashboard@sha256:2e500d29e9d5f4a086b908eb8dfe7ecac57d2ab09d65b24f588b1d449841ef93\"],\"repoTags\":[],\"size\":\"75788960\"},{\"id\":\"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8"} +{"Time":"2023-05-31T18:52:51.228296654Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"c9b601a4fc\",\"repoDigests\":[\"registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\"],\"repoTags\":[\"registry.k8s.io/coredns/coredns:v1.10.1\"],\"size\":\"16190758\"},{\"id\":\"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\",\"repoDigests\":[\"registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097\"],\"repoTags\":[\"registry.k8s.io/pause:3.9\"],\"size\":\"321520\"},{\"id\":\"sha256:b0b1fa0f58c6e932b7f20bf208b2841317a1e8c88cc51b18358310bbd8ec95da\",\"repoDigests\":[\"docker.io/kindest/kindnetd@sha256:6c00e28db008c2afa67d9ee085c86184ec9ae5281d5ae1bd15006746fb9a1974\"],\"repoTags\":[\"docker.io/kindest/kindnetd:v20230511-dc714da8\"],\"size\":\"27731571\"}]\n"} +{"Time":"2023-05-31T18:52:51.228303548Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-linux-amd64 -p functional-384583 image ls --format json --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:51.228307748Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.061647 25230 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:52:51.228311933Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.061786 25230 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:51.228315688Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.061804 25230 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:52:51.228320158Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.061816 25230 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:51.228323194Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.061949 25230 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:52:51.228325505Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.062477 25230 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.228328387Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.062616 25230 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.228330806Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.062952 25230 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:51.228333088Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.063024 25230 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:51.228335263Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.077138 25230 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:45183\n"} +{"Time":"2023-05-31T18:52:51.228337627Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.077564 25230 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:51.22833969Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.078157 25230 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:51.228341805Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.078174 25230 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:51.228346191Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.078449 25230 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:51.228348307Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.078597 25230 main.go:141] libmachine: (functional-384583) Calling .GetState\n"} +{"Time":"2023-05-31T18:52:51.228350597Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.080127 25230 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:51.228352827Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.080151 25230 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:51.228361002Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.093781 25230 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:33827\n"} +{"Time":"2023-05-31T18:52:51.22836327Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.094125 25230 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:51.228365682Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.094636 25230 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:51.228367725Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.094657 25230 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:51.228369716Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.094941 25230 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:51.228372301Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.095088 25230 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:51.228386352Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.095241 25230 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T18:52:51.228390521Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.095271 25230 main.go:141] libmachine: (functional-384583) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T18:52:51.228394719Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.098200 25230 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:51.228403197Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.098659 25230 main.go:141] libmachine: (functional-384583) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:fc:09:bb\", ip: \"\"} in network mk-functional-384583: {Iface:virbr1 ExpiryTime:2023-05-31 19:50:25 +0000 UTC Type:0 Mac:52:54:00:fc:09:bb Iaid: IPaddr:192.168.50.59 Prefix:24 Hostname:functional-384583 Clientid:01:52:54:00:fc:09:bb}\n"} +{"Time":"2023-05-31T18:52:51.228407065Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.098685 25230 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined IP address 192.168.50.59 and MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:51.228410256Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.098809 25230 main.go:141] libmachine: (functional-384583) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T18:52:51.228413095Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.098922 25230 main.go:141] libmachine: (functional-384583) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T18:52:51.228416291Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.099061 25230 main.go:141] libmachine: (functional-384583) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T18:52:51.228419447Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.099186 25230 sshutil.go:53] new ssh client: \u0026{IP:192.168.50.59 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/functional-384583/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T18:52:51.228423934Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.182641 25230 ssh_runner.go:195] Run: sudo crictl images --output json\n"} +{"Time":"2023-05-31T18:52:51.228429359Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219242 25230 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.228432301Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219256 25230 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:51.228435312Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219492 25230 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.228438534Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219514 25230 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:51.228442083Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219564 25230 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.228445007Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219574 25230 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:51.228448033Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219799 25230 main.go:141] libmachine: (functional-384583) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T18:52:51.228451423Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219896 25230 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.228454809Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 18:52:51.219931 25230 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:51.265413384Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-linux-amd64 -p functional-384583 image ls --format table --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:51.265435998Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|--------------------|---------------|--------|\n"} +{"Time":"2023-05-31T18:52:51.265443697Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | Image | Tag | Image ID | Size |\n"} +{"Time":"2023-05-31T18:52:51.26544664Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|--------------------|---------------|--------|\n"} +{"Time":"2023-05-31T18:52:51.265451368Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/k8s-minikube/storage-provisioner | v5 | sha256:6e38f4 | 9.06MB |\n"} +{"Time":"2023-05-31T18:52:51.265456108Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-apiserver | v1.27.2 | sha256:c5b13e | 33.4MB |\n"} +{"Time":"2023-05-31T18:52:51.265460684Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-scheduler | v1.27.2 | sha256:89e70d | 18.2MB |\n"} +{"Time":"2023-05-31T18:52:51.265465254Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/mysql | 5.7 | sha256:dd6675 | 169MB |\n"} +{"Time":"2023-05-31T18:52:51.265470758Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/etcd | 3.5.7-0 | sha256:86b6af | 102MB |\n"} +{"Time":"2023-05-31T18:52:51.265487944Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.3 | sha256:0184c1 | 298kB |\n"} +{"Time":"2023-05-31T18:52:51.265492254Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | latest | sha256:350b16 | 72.3kB |\n"} +{"Time":"2023-05-31T18:52:51.265496368Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/echoserver | 1.8 | sha256:82e4c8 | 46.2MB |\n"} +{"Time":"2023-05-31T18:52:51.265500506Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/nginx | latest | sha256:f9c14f | 57.2MB |\n"} +{"Time":"2023-05-31T18:52:51.265504791Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/k8s-minikube/busybox | 1.28.4-glibc | sha256:56cc51 | 2.4MB |\n"} +{"Time":"2023-05-31T18:52:51.265509025Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-proxy | v1.27.2 | sha256:b8aa50 | 23.9MB |\n"} +{"Time":"2023-05-31T18:52:51.265513583Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/kindest/kindnetd | v20230511-dc714da8 | sha256:b0b1fa | 27.7MB |\n"} +{"Time":"2023-05-31T18:52:51.265517627Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/minikube-local-cache-test | functional-384583 | sha256:5ca6d2 | 1kB |\n"} +{"Time":"2023-05-31T18:52:51.265521624Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/google-containers/addon-resizer | functional-384583 | sha256:ffd4cf | 10.8MB |\n"} +{"Time":"2023-05-31T18:52:51.265525629Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/coredns/coredns | v1.10.1 | sha256:ead0a4 | 16.2MB |\n"} +{"Time":"2023-05-31T18:52:51.265528938Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-controller-manager | v1.27.2 | sha256:ac2b74 | 31MB |\n"} +{"Time":"2023-05-31T18:52:51.265531154Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.1 | sha256:da86e6 | 315kB |\n"} +{"Time":"2023-05-31T18:52:51.265533188Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.9 | sha256:e6f181 | 322kB |\n"} +{"Time":"2023-05-31T18:52:51.265535253Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|--------------------|---------------|--------|\n"} +{"Time":"2023-05-31T18:52:51.265537438Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-linux-amd64 -p functional-384583 image ls --format table --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:51.26553984Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.071255 25236 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:52:51.265543425Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.071376 25236 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:51.265546413Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.071393 25236 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:52:51.265548829Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.071408 25236 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:51.265551188Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.071526 25236 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:52:51.265553589Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.072060 25236 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.265556058Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.072187 25236 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:51.265558416Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.072594 25236 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:51.265563385Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.072664 25236 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:51.265569769Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.090186 25236 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:42341\n"} +{"Time":"2023-05-31T18:52:51.265574345Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.090538 25236 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:51.265578044Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.091146 25236 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:51.265582289Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.091175 25236 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:51.265587159Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.091605 25236 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:51.265591632Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.091824 25236 main.go:141] libmachine: (functional-384583) Calling .GetState\n"} +{"Time":"2023-05-31T18:52:51.26559552Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.093674 25236 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:51.26560012Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.093716 25236 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:51.26561065Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.112344 25236 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:40907\n"} +{"Time":"2023-05-31T18:52:51.265615177Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.112714 25236 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:51.265618767Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.113179 25236 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:51.265622801Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.113196 25236 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:51.265626889Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.113461 25236 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:51.265631559Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.113612 25236 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:51.265635602Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.113746 25236 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T18:52:51.265639994Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.113767 25236 main.go:141] libmachine: (functional-384583) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T18:52:51.265644576Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.116608 25236 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:51.265650269Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.117045 25236 main.go:141] libmachine: (functional-384583) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:fc:09:bb\", ip: \"\"} in network mk-functional-384583: {Iface:virbr1 ExpiryTime:2023-05-31 19:50:25 +0000 UTC Type:0 Mac:52:54:00:fc:09:bb Iaid: IPaddr:192.168.50.59 Prefix:24 Hostname:functional-384583 Clientid:01:52:54:00:fc:09:bb}\n"} +{"Time":"2023-05-31T18:52:51.265655936Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.117068 25236 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined IP address 192.168.50.59 and MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:51.265660793Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.117196 25236 main.go:141] libmachine: (functional-384583) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T18:52:51.265664774Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.117359 25236 main.go:141] libmachine: (functional-384583) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T18:52:51.265669149Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.117479 25236 main.go:141] libmachine: (functional-384583) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T18:52:51.265673546Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.117587 25236 sshutil.go:53] new ssh client: \u0026{IP:192.168.50.59 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/functional-384583/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T18:52:51.265680348Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.217309 25236 ssh_runner.go:195] Run: sudo crictl images --output json\n"} +{"Time":"2023-05-31T18:52:51.265684506Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.256838 25236 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.265688652Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.256856 25236 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:51.265692668Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.257106 25236 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.26569991Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.257128 25236 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:51.265704513Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.257139 25236 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.265708484Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.257148 25236 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:51.265712638Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.257434 25236 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:51.265716746Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.257454 25236 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:51.265720717Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 18:52:51.257497 25236 main.go:141] libmachine: (functional-384583) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T18:52:53.612322195Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:313: (dbg) Done: out/minikube-linux-amd64 -p functional-384583 image build -t localhost/my-image:functional-384583 testdata/build --alsologtostderr: (2.591617315s)\n"} +{"Time":"2023-05-31T18:52:53.612358686Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:321: (dbg) Stderr: out/minikube-linux-amd64 -p functional-384583 image build -t localhost/my-image:functional-384583 testdata/build --alsologtostderr:\n"} +{"Time":"2023-05-31T18:52:53.61236391Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.063731 25224 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T18:52:53.612367644Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.063887 25224 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:53.612372359Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.063896 25224 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T18:52:53.612376293Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.063901 25224 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T18:52:53.61238054Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.063997 25224 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T18:52:53.612385321Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.064599 25224 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:53.612389317Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.065155 25224 config.go:182] Loaded profile config \"functional-384583\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T18:52:53.61239397Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.065485 25224 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:53.61239911Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.065560 25224 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:53.612402421Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.078888 25224 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:38125\n"} +{"Time":"2023-05-31T18:52:53.612406102Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.079414 25224 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:53.612420097Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.079965 25224 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:53.612424492Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.079984 25224 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:53.612427973Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.080262 25224 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:53.612431707Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.080391 25224 main.go:141] libmachine: (functional-384583) Calling .GetState\n"} +{"Time":"2023-05-31T18:52:53.612435313Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.081932 25224 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T18:52:53.612439482Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.081959 25224 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T18:52:53.612444566Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.094889 25224 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:38099\n"} +{"Time":"2023-05-31T18:52:53.61244816Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.095340 25224 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T18:52:53.612451286Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.095717 25224 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T18:52:53.612454402Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.095734 25224 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T18:52:53.612457758Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.096084 25224 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T18:52:53.612460964Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.096230 25224 main.go:141] libmachine: (functional-384583) Calling .DriverName\n"} +{"Time":"2023-05-31T18:52:53.61246694Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.096416 25224 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T18:52:53.612470222Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.096446 25224 main.go:141] libmachine: (functional-384583) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T18:52:53.612478266Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.099211 25224 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:53.6124826Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.099599 25224 main.go:141] libmachine: (functional-384583) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:fc:09:bb\", ip: \"\"} in network mk-functional-384583: {Iface:virbr1 ExpiryTime:2023-05-31 19:50:25 +0000 UTC Type:0 Mac:52:54:00:fc:09:bb Iaid: IPaddr:192.168.50.59 Prefix:24 Hostname:functional-384583 Clientid:01:52:54:00:fc:09:bb}\n"} +{"Time":"2023-05-31T18:52:53.612487061Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.099660 25224 main.go:141] libmachine: (functional-384583) DBG | domain functional-384583 has defined IP address 192.168.50.59 and MAC address 52:54:00:fc:09:bb in network mk-functional-384583\n"} +{"Time":"2023-05-31T18:52:53.612490983Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.099837 25224 main.go:141] libmachine: (functional-384583) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T18:52:53.612494465Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.100126 25224 main.go:141] libmachine: (functional-384583) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T18:52:53.6124977Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.100293 25224 main.go:141] libmachine: (functional-384583) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T18:52:53.612509066Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.100426 25224 sshutil.go:53] new ssh client: \u0026{IP:192.168.50.59 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/functional-384583/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T18:52:53.61251327Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.187409 25224 build_images.go:151] Building image from path: /tmp/build.1038970822.tar\n"} +{"Time":"2023-05-31T18:52:53.612517044Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.187471 25224 ssh_runner.go:195] Run: sudo mkdir -p /var/lib/minikube/build\n"} +{"Time":"2023-05-31T18:52:53.612520433Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.198868 25224 ssh_runner.go:195] Run: stat -c \"%s %y\" /var/lib/minikube/build/build.1038970822.tar\n"} +{"Time":"2023-05-31T18:52:53.612524393Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.206930 25224 ssh_runner.go:352] existence check for /var/lib/minikube/build/build.1038970822.tar: stat -c \"%s %y\" /var/lib/minikube/build/build.1038970822.tar: Process exited with status 1\n"} +{"Time":"2023-05-31T18:52:53.612528047Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stdout:\n"} +{"Time":"2023-05-31T18:52:53.612531565Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612535047Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stderr:\n"} +{"Time":"2023-05-31T18:52:53.612538494Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stat: cannot statx '/var/lib/minikube/build/build.1038970822.tar': No such file or directory\n"} +{"Time":"2023-05-31T18:52:53.612543657Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.206954 25224 ssh_runner.go:362] scp /tmp/build.1038970822.tar --\u003e /var/lib/minikube/build/build.1038970822.tar (3072 bytes)\n"} +{"Time":"2023-05-31T18:52:53.612560411Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.249290 25224 ssh_runner.go:195] Run: sudo mkdir -p /var/lib/minikube/build/build.1038970822\n"} +{"Time":"2023-05-31T18:52:53.612565044Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.263298 25224 ssh_runner.go:195] Run: sudo tar -C /var/lib/minikube/build/build.1038970822 -xf /var/lib/minikube/build/build.1038970822.tar\n"} +{"Time":"2023-05-31T18:52:53.612569318Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.275889 25224 containerd.go:378] Building image: /var/lib/minikube/build/build.1038970822\n"} +{"Time":"2023-05-31T18:52:53.612573621Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:51.275941 25224 ssh_runner.go:195] Run: sudo buildctl build --frontend dockerfile.v0 --local context=/var/lib/minikube/build/build.1038970822 --local dockerfile=/var/lib/minikube/build/build.1038970822 --output type=image,name=localhost/my-image:functional-384583\n"} +{"Time":"2023-05-31T18:52:53.612581788Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #1 [internal] load build definition from Dockerfile\n"} +{"Time":"2023-05-31T18:52:53.612585488Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #1 DONE 0.0s\n"} +{"Time":"2023-05-31T18:52:53.612588897Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612592109Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #1 [internal] load build definition from Dockerfile\n"} +{"Time":"2023-05-31T18:52:53.612594527Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #1 transferring dockerfile: 97B done\n"} +{"Time":"2023-05-31T18:52:53.612596761Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #1 DONE 0.1s\n"} +{"Time":"2023-05-31T18:52:53.6125987Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612600725Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #2 [internal] load .dockerignore\n"} +{"Time":"2023-05-31T18:52:53.61260295Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #2 transferring context: 2B done\n"} +{"Time":"2023-05-31T18:52:53.612605355Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #2 DONE 0.1s\n"} +{"Time":"2023-05-31T18:52:53.612607397Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612609694Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #3 [internal] load metadata for gcr.io/k8s-minikube/busybox:latest\n"} +{"Time":"2023-05-31T18:52:53.61261167Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #3 DONE 0.3s\n"} +{"Time":"2023-05-31T18:52:53.6126136Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612615571Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #4 [internal] load build context\n"} +{"Time":"2023-05-31T18:52:53.612617672Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #4 transferring context: 62B done\n"} +{"Time":"2023-05-31T18:52:53.612619663Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #4 DONE 0.0s\n"} +{"Time":"2023-05-31T18:52:53.61262144Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612630076Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 [1/3] FROM gcr.io/k8s-minikube/busybox@sha256:ca5ae90100d50772da31f3b5016209e25ad61972404e2ccd83d44f10dee7e79b\n"} +{"Time":"2023-05-31T18:52:53.612632891Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 resolve gcr.io/k8s-minikube/busybox@sha256:ca5ae90100d50772da31f3b5016209e25ad61972404e2ccd83d44f10dee7e79b 0.0s done\n"} +{"Time":"2023-05-31T18:52:53.612636252Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 sha256:5cc84ad355aaa64f46ea9c7bbcc319a9d808ab15088a27209c9e70ef86e5a2aa 772.79kB / 772.79kB 0.1s done\n"} +{"Time":"2023-05-31T18:52:53.61264011Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 extracting sha256:5cc84ad355aaa64f46ea9c7bbcc319a9d808ab15088a27209c9e70ef86e5a2aa 0.1s done\n"} +{"Time":"2023-05-31T18:52:53.612643348Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #5 DONE 0.3s\n"} +{"Time":"2023-05-31T18:52:53.612646456Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612679797Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #6 [2/3] RUN true\n"} +{"Time":"2023-05-31T18:52:53.612697117Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #6 DONE 1.1s\n"} +{"Time":"2023-05-31T18:52:53.612700113Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612703047Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #7 [3/3] ADD content.txt /\n"} +{"Time":"2023-05-31T18:52:53.612710734Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #7 DONE 0.1s\n"} +{"Time":"2023-05-31T18:52:53.612716669Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T18:52:53.612719649Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting to image\n"} +{"Time":"2023-05-31T18:52:53.612726396Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting layers\n"} +{"Time":"2023-05-31T18:52:53.612730154Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting layers 0.2s done\n"} +{"Time":"2023-05-31T18:52:53.612735941Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting manifest sha256:7ba317ffe8c974061e2f03a3db22b307f44f8fe466fcfcf6f60b2a1e774dabbf 0.0s done\n"} +{"Time":"2023-05-31T18:52:53.612739426Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting config sha256:beb4af00ce5db6f9cfa8c4e166414f529f2e559c8f36dcbd211f1340520bc789\n"} +{"Time":"2023-05-31T18:52:53.612742964Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 exporting config sha256:beb4af00ce5db6f9cfa8c4e166414f529f2e559c8f36dcbd211f1340520bc789 0.0s done\n"} +{"Time":"2023-05-31T18:52:53.612753561Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 naming to localhost/my-image:functional-384583 done\n"} +{"Time":"2023-05-31T18:52:53.612758445Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" #8 DONE 0.2s\n"} +{"Time":"2023-05-31T18:52:53.612765271Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.580339 25224 ssh_runner.go:235] Completed: sudo buildctl build --frontend dockerfile.v0 --local context=/var/lib/minikube/build/build.1038970822 --local dockerfile=/var/lib/minikube/build/build.1038970822 --output type=image,name=localhost/my-image:functional-384583: (2.304369937s)\n"} +{"Time":"2023-05-31T18:52:53.6127687Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.580402 25224 ssh_runner.go:195] Run: sudo rm -rf /var/lib/minikube/build/build.1038970822\n"} +{"Time":"2023-05-31T18:52:53.612771888Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.592852 25224 ssh_runner.go:195] Run: sudo rm -f /var/lib/minikube/build/build.1038970822.tar\n"} +{"Time":"2023-05-31T18:52:53.612775114Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605286 25224 build_images.go:207] Built localhost/my-image:functional-384583 from /tmp/build.1038970822.tar\n"} +{"Time":"2023-05-31T18:52:53.612779246Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605309 25224 build_images.go:123] succeeded building to: functional-384583\n"} +{"Time":"2023-05-31T18:52:53.612782706Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605313 25224 build_images.go:124] failed building to: \n"} +{"Time":"2023-05-31T18:52:53.612786565Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605391 25224 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:53.612790225Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605415 25224 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:53.612793873Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605651 25224 main.go:141] libmachine: (functional-384583) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T18:52:53.612798106Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605695 25224 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:53.612801045Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605709 25224 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:53.612804496Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605718 25224 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T18:52:53.612807665Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605727 25224 main.go:141] libmachine: (functional-384583) Calling .Close\n"} +{"Time":"2023-05-31T18:52:53.612811109Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.605981 25224 main.go:141] libmachine: (functional-384583) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T18:52:53.612815418Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.606033 25224 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T18:52:53.61282106Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 18:52:53.606047 25224 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T18:52:53.612824641Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:446: (dbg) Run: out/minikube-linux-amd64 -p functional-384583 image ls\n"} +{"Time":"2023-05-31T18:52:55.985049997Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: test=storage-provisioner healthy within 21.020618608s\n"} +{"Time":"2023-05-31T18:52:55.985077398Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:100: (dbg) Run: kubectl --context functional-384583 exec sp-pod -- touch /tmp/mount/foo\n"} +{"Time":"2023-05-31T18:52:56.111926792Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:106: (dbg) Run: kubectl --context functional-384583 delete -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T18:52:56.726980511Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:125: (dbg) Run: kubectl --context functional-384583 apply -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T18:52:56.93218323Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 3m0s for pods matching \"test=storage-provisioner\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:52:56.938984351Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [68f97eb6-0f94-4055-aa8f-68fa3f4003ad] Pending\n"} +{"Time":"2023-05-31T18:52:57.943146581Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [68f97eb6-0f94-4055-aa8f-68fa3f4003ad] Pending / Ready:ContainersNotReady (containers with unready status: [myfrontend]) / ContainersReady:ContainersNotReady (containers with unready status: [myfrontend])\n"} +{"Time":"2023-05-31T18:52:58.943395646Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [68f97eb6-0f94-4055-aa8f-68fa3f4003ad] Running\n"} +{"Time":"2023-05-31T18:53:04.9428834Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: test=storage-provisioner healthy within 8.010692712s\n"} +{"Time":"2023-05-31T18:53:04.942908319Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:114: (dbg) Run: kubectl --context functional-384583 exec sp-pod -- ls /tmp/mount\n"} +{"Time":"2023-05-31T18:53:05.065297749Z","Action":"run","Test":"TestFunctional/delete_addon-resizer_images"} +{"Time":"2023-05-31T18:53:05.065332399Z","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":"=== RUN TestFunctional/delete_addon-resizer_images\n"} +{"Time":"2023-05-31T18:53:05.065342316Z","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" functional_test.go:188: (dbg) Run: docker rmi -f gcr.io/google-containers/addon-resizer:1.8.8\n"} +{"Time":"2023-05-31T18:53:05.111380609Z","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" functional_test.go:188: (dbg) Run: docker rmi -f gcr.io/google-containers/addon-resizer:functional-384583\n"} +{"Time":"2023-05-31T18:53:05.128730357Z","Action":"run","Test":"TestFunctional/delete_my-image_image"} +{"Time":"2023-05-31T18:53:05.128754362Z","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":"=== RUN TestFunctional/delete_my-image_image\n"} +{"Time":"2023-05-31T18:53:05.128767887Z","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":" functional_test.go:196: (dbg) Run: docker rmi -f localhost/my-image:functional-384583\n"} +{"Time":"2023-05-31T18:53:05.143129191Z","Action":"run","Test":"TestFunctional/delete_minikube_cached_images"} +{"Time":"2023-05-31T18:53:05.143148981Z","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":"=== RUN TestFunctional/delete_minikube_cached_images\n"} +{"Time":"2023-05-31T18:53:05.143157683Z","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":" functional_test.go:204: (dbg) Run: docker rmi -f minikube-local-cache-test:functional-384583\n"} +{"Time":"2023-05-31T18:53:05.155519027Z","Action":"output","Test":"TestFunctional","Output":" helpers_test.go:175: Cleaning up \"functional-384583\" profile ...\n"} +{"Time":"2023-05-31T18:53:05.155539324Z","Action":"output","Test":"TestFunctional","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p functional-384583\n"} +{"Time":"2023-05-31T18:53:06.368765483Z","Action":"output","Test":"TestFunctional","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p functional-384583: (1.213141321s)\n"} +{"Time":"2023-05-31T18:53:06.368798748Z","Action":"output","Test":"TestFunctional","Output":"--- PASS: TestFunctional (176.14s)\n"} +{"Time":"2023-05-31T18:53:06.368802543Z","Action":"output","Test":"TestFunctional/serial","Output":" --- PASS: TestFunctional/serial (124.67s)\n"} +{"Time":"2023-05-31T18:53:06.368805287Z","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":" --- PASS: TestFunctional/serial/CopySyncFile (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.36880861Z","Action":"pass","Test":"TestFunctional/serial/CopySyncFile","Elapsed":0} +{"Time":"2023-05-31T18:53:06.368812989Z","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" --- PASS: TestFunctional/serial/StartWithProxy (66.67s)\n"} +{"Time":"2023-05-31T18:53:06.368815328Z","Action":"pass","Test":"TestFunctional/serial/StartWithProxy","Elapsed":66.67} +{"Time":"2023-05-31T18:53:06.368819846Z","Action":"output","Test":"TestFunctional/serial/AuditLog","Output":" --- PASS: TestFunctional/serial/AuditLog (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.368823591Z","Action":"pass","Test":"TestFunctional/serial/AuditLog","Elapsed":0} +{"Time":"2023-05-31T18:53:06.368826726Z","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" --- PASS: TestFunctional/serial/SoftStart (5.68s)\n"} +{"Time":"2023-05-31T18:53:06.368830595Z","Action":"pass","Test":"TestFunctional/serial/SoftStart","Elapsed":5.68} +{"Time":"2023-05-31T18:53:06.368833746Z","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":" --- PASS: TestFunctional/serial/KubeContext (0.04s)\n"} +{"Time":"2023-05-31T18:53:06.368837411Z","Action":"pass","Test":"TestFunctional/serial/KubeContext","Elapsed":0.04} +{"Time":"2023-05-31T18:53:06.36884066Z","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":" --- PASS: TestFunctional/serial/KubectlGetPods (0.08s)\n"} +{"Time":"2023-05-31T18:53:06.368844272Z","Action":"pass","Test":"TestFunctional/serial/KubectlGetPods","Elapsed":0.08} +{"Time":"2023-05-31T18:53:06.368847478Z","Action":"output","Test":"TestFunctional/serial/CacheCmd","Output":" --- PASS: TestFunctional/serial/CacheCmd (7.11s)\n"} +{"Time":"2023-05-31T18:53:06.368851532Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache (7.11s)\n"} +{"Time":"2023-05-31T18:53:06.368856532Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/add_remote (3.30s)\n"} +{"Time":"2023-05-31T18:53:06.368860231Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Elapsed":3.3} +{"Time":"2023-05-31T18:53:06.368863821Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/add_local (1.48s)\n"} +{"Time":"2023-05-31T18:53:06.368867185Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Elapsed":1.48} +{"Time":"2023-05-31T18:53:06.368869388Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/CacheDelete (0.04s)\n"} +{"Time":"2023-05-31T18:53:06.368874418Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Elapsed":0.04} +{"Time":"2023-05-31T18:53:06.368876593Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/list (0.04s)\n"} +{"Time":"2023-05-31T18:53:06.368879686Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/list","Elapsed":0.04} +{"Time":"2023-05-31T18:53:06.368881816Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node (0.20s)\n"} +{"Time":"2023-05-31T18:53:06.368884587Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Elapsed":0.2} +{"Time":"2023-05-31T18:53:06.368886915Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/cache_reload (1.97s)\n"} +{"Time":"2023-05-31T18:53:06.368889122Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Elapsed":1.97} +{"Time":"2023-05-31T18:53:06.36889101Z","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/delete (0.08s)\n"} +{"Time":"2023-05-31T18:53:06.36889404Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/delete","Elapsed":0.08} +{"Time":"2023-05-31T18:53:06.368896166Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache","Elapsed":7.11} +{"Time":"2023-05-31T18:53:06.368897791Z","Action":"pass","Test":"TestFunctional/serial/CacheCmd","Elapsed":7.11} +{"Time":"2023-05-31T18:53:06.368902077Z","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":" --- PASS: TestFunctional/serial/MinikubeKubectlCmd (0.09s)\n"} +{"Time":"2023-05-31T18:53:06.368904548Z","Action":"pass","Test":"TestFunctional/serial/MinikubeKubectlCmd","Elapsed":0.09} +{"Time":"2023-05-31T18:53:06.368907516Z","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":" --- PASS: TestFunctional/serial/MinikubeKubectlCmdDirectly (0.09s)\n"} +{"Time":"2023-05-31T18:53:06.368913817Z","Action":"pass","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Elapsed":0.09} +{"Time":"2023-05-31T18:53:06.368916827Z","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" --- PASS: TestFunctional/serial/ExtraConfig (42.34s)\n"} +{"Time":"2023-05-31T18:53:06.368921155Z","Action":"pass","Test":"TestFunctional/serial/ExtraConfig","Elapsed":42.34} +{"Time":"2023-05-31T18:53:06.368924496Z","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" --- PASS: TestFunctional/serial/ComponentHealth (0.06s)\n"} +{"Time":"2023-05-31T18:53:06.368928152Z","Action":"pass","Test":"TestFunctional/serial/ComponentHealth","Elapsed":0.06} +{"Time":"2023-05-31T18:53:06.368931254Z","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":" --- PASS: TestFunctional/serial/LogsCmd (1.25s)\n"} +{"Time":"2023-05-31T18:53:06.368934751Z","Action":"pass","Test":"TestFunctional/serial/LogsCmd","Elapsed":1.25} +{"Time":"2023-05-31T18:53:06.368937873Z","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":" --- PASS: TestFunctional/serial/LogsFileCmd (1.25s)\n"} +{"Time":"2023-05-31T18:53:06.368941474Z","Action":"pass","Test":"TestFunctional/serial/LogsFileCmd","Elapsed":1.25} +{"Time":"2023-05-31T18:53:06.368944197Z","Action":"pass","Test":"TestFunctional/serial","Elapsed":124.67} +{"Time":"2023-05-31T18:53:06.368947147Z","Action":"output","Test":"TestFunctional/parallel","Output":" --- PASS: TestFunctional/parallel (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.368951084Z","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" --- PASS: TestFunctional/parallel/AddonsCmd (0.17s)\n"} +{"Time":"2023-05-31T18:53:06.36895413Z","Action":"pass","Test":"TestFunctional/parallel/AddonsCmd","Elapsed":0.17} +{"Time":"2023-05-31T18:53:06.368966579Z","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" --- PASS: TestFunctional/parallel/ConfigCmd (0.32s)\n"} +{"Time":"2023-05-31T18:53:06.368970516Z","Action":"pass","Test":"TestFunctional/parallel/ConfigCmd","Elapsed":0.32} +{"Time":"2023-05-31T18:53:06.368973264Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":" --- PASS: TestFunctional/parallel/ProfileCmd (0.94s)\n"} +{"Time":"2023-05-31T18:53:06.368977635Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_not_create (0.32s)\n"} +{"Time":"2023-05-31T18:53:06.368981676Z","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Elapsed":0.32} +{"Time":"2023-05-31T18:53:06.368984981Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_list (0.30s)\n"} +{"Time":"2023-05-31T18:53:06.368991366Z","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Elapsed":0.3} +{"Time":"2023-05-31T18:53:06.368994726Z","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_json_output (0.32s)\n"} +{"Time":"2023-05-31T18:53:06.368999656Z","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Elapsed":0.32} +{"Time":"2023-05-31T18:53:06.369002858Z","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd","Elapsed":0.94} +{"Time":"2023-05-31T18:53:06.369006008Z","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" --- PASS: TestFunctional/parallel/CpCmd (0.84s)\n"} +{"Time":"2023-05-31T18:53:06.369018545Z","Action":"pass","Test":"TestFunctional/parallel/CpCmd","Elapsed":0.84} +{"Time":"2023-05-31T18:53:06.369021636Z","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" --- PASS: TestFunctional/parallel/CertSync (1.18s)\n"} +{"Time":"2023-05-31T18:53:06.369025246Z","Action":"pass","Test":"TestFunctional/parallel/CertSync","Elapsed":1.18} +{"Time":"2023-05-31T18:53:06.369028383Z","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" --- PASS: TestFunctional/parallel/FileSync (0.20s)\n"} +{"Time":"2023-05-31T18:53:06.369031965Z","Action":"pass","Test":"TestFunctional/parallel/FileSync","Elapsed":0.2} +{"Time":"2023-05-31T18:53:06.369035234Z","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":" --- PASS: TestFunctional/parallel/MountCmd (10.92s)\n"} +{"Time":"2023-05-31T18:53:06.369039014Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" --- PASS: TestFunctional/parallel/MountCmd/any-port (8.62s)\n"} +{"Time":"2023-05-31T18:53:06.36904261Z","Action":"pass","Test":"TestFunctional/parallel/MountCmd/any-port","Elapsed":8.62} +{"Time":"2023-05-31T18:53:06.369045725Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" --- PASS: TestFunctional/parallel/MountCmd/specific-port (1.58s)\n"} +{"Time":"2023-05-31T18:53:06.369049198Z","Action":"pass","Test":"TestFunctional/parallel/MountCmd/specific-port","Elapsed":1.58} +{"Time":"2023-05-31T18:53:06.369052273Z","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" --- PASS: TestFunctional/parallel/MountCmd/VerifyCleanup (0.72s)\n"} +{"Time":"2023-05-31T18:53:06.369055529Z","Action":"pass","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Elapsed":0.72} +{"Time":"2023-05-31T18:53:06.369057575Z","Action":"pass","Test":"TestFunctional/parallel/MountCmd","Elapsed":10.92} +{"Time":"2023-05-31T18:53:06.369059554Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" --- PASS: TestFunctional/parallel/ServiceCmdConnect (11.60s)\n"} +{"Time":"2023-05-31T18:53:06.369061892Z","Action":"pass","Test":"TestFunctional/parallel/ServiceCmdConnect","Elapsed":11.6} +{"Time":"2023-05-31T18:53:06.36906391Z","Action":"output","Test":"TestFunctional/parallel/License","Output":" --- PASS: TestFunctional/parallel/License (0.17s)\n"} +{"Time":"2023-05-31T18:53:06.369066341Z","Action":"pass","Test":"TestFunctional/parallel/License","Elapsed":0.17} +{"Time":"2023-05-31T18:53:06.369073796Z","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" --- PASS: TestFunctional/parallel/NonActiveRuntimeDisabled (0.42s)\n"} +{"Time":"2023-05-31T18:53:06.369077477Z","Action":"pass","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Elapsed":0.42} +{"Time":"2023-05-31T18:53:06.369080464Z","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":" --- SKIP: TestFunctional/parallel/PodmanEnv (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.369087114Z","Action":"skip","Test":"TestFunctional/parallel/PodmanEnv","Elapsed":0} +{"Time":"2023-05-31T18:53:06.369092931Z","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":" --- PASS: TestFunctional/parallel/NodeLabels (0.07s)\n"} +{"Time":"2023-05-31T18:53:06.369100135Z","Action":"pass","Test":"TestFunctional/parallel/NodeLabels","Elapsed":0.07} +{"Time":"2023-05-31T18:53:06.369105464Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":" --- PASS: TestFunctional/parallel/TunnelCmd (0.06s)\n"} +{"Time":"2023-05-31T18:53:06.369109016Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial (0.06s)\n"} +{"Time":"2023-05-31T18:53:06.369112944Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.369116457Z","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369119867Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/StartTunnel (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.36912368Z","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369126579Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/WaitService (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.369130054Z","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369133Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/AccessDirect (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.369136452Z","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369139341Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.369142956Z","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369145638Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.36914905Z","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369151884Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.369158632Z","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369161934Z","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":" --- SKIP: TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.369165616Z","Action":"skip","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.36917316Z","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial","Elapsed":0.06} +{"Time":"2023-05-31T18:53:06.369176068Z","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd","Elapsed":0.06} +{"Time":"2023-05-31T18:53:06.369179019Z","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" --- PASS: TestFunctional/parallel/SSHCmd (0.49s)\n"} +{"Time":"2023-05-31T18:53:06.369182599Z","Action":"pass","Test":"TestFunctional/parallel/SSHCmd","Elapsed":0.49} +{"Time":"2023-05-31T18:53:06.369185659Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":" --- PASS: TestFunctional/parallel/ServiceCmd (13.16s)\n"} +{"Time":"2023-05-31T18:53:06.369189642Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/DeployApp (11.25s)\n"} +{"Time":"2023-05-31T18:53:06.369193113Z","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Elapsed":11.25} +{"Time":"2023-05-31T18:53:06.369196115Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/List (0.50s)\n"} +{"Time":"2023-05-31T18:53:06.369204022Z","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/List","Elapsed":0.5} +{"Time":"2023-05-31T18:53:06.369207536Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/JSONOutput (0.47s)\n"} +{"Time":"2023-05-31T18:53:06.369211863Z","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Elapsed":0.47} +{"Time":"2023-05-31T18:53:06.369214971Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/HTTPS (0.32s)\n"} +{"Time":"2023-05-31T18:53:06.369218433Z","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Elapsed":0.32} +{"Time":"2023-05-31T18:53:06.369221403Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/Format (0.31s)\n"} +{"Time":"2023-05-31T18:53:06.369224896Z","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/Format","Elapsed":0.31} +{"Time":"2023-05-31T18:53:06.369227794Z","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/URL (0.30s)\n"} +{"Time":"2023-05-31T18:53:06.369231418Z","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/URL","Elapsed":0.3} +{"Time":"2023-05-31T18:53:06.369234129Z","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd","Elapsed":13.16} +{"Time":"2023-05-31T18:53:06.369237093Z","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":" --- SKIP: TestFunctional/parallel/DockerEnv (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.369240662Z","Action":"skip","Test":"TestFunctional/parallel/DockerEnv","Elapsed":0} +{"Time":"2023-05-31T18:53:06.369243593Z","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" --- PASS: TestFunctional/parallel/InternationalLanguage (0.16s)\n"} +{"Time":"2023-05-31T18:53:06.369246939Z","Action":"pass","Test":"TestFunctional/parallel/InternationalLanguage","Elapsed":0.16} +{"Time":"2023-05-31T18:53:06.36924982Z","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" --- PASS: TestFunctional/parallel/StatusCmd (0.80s)\n"} +{"Time":"2023-05-31T18:53:06.369253264Z","Action":"pass","Test":"TestFunctional/parallel/StatusCmd","Elapsed":0.8} +{"Time":"2023-05-31T18:53:06.369256376Z","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" --- PASS: TestFunctional/parallel/DryRun (0.25s)\n"} +{"Time":"2023-05-31T18:53:06.36926247Z","Action":"pass","Test":"TestFunctional/parallel/DryRun","Elapsed":0.25} +{"Time":"2023-05-31T18:53:06.369265494Z","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" --- PASS: TestFunctional/parallel/DashboardCmd (18.50s)\n"} +{"Time":"2023-05-31T18:53:06.36926879Z","Action":"pass","Test":"TestFunctional/parallel/DashboardCmd","Elapsed":18.5} +{"Time":"2023-05-31T18:53:06.369271749Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.369275384Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_changes (0.09s)\n"} +{"Time":"2023-05-31T18:53:06.369280275Z","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Elapsed":0.09} +{"Time":"2023-05-31T18:53:06.36928342Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_clusters (0.08s)\n"} +{"Time":"2023-05-31T18:53:06.369286722Z","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Elapsed":0.08} +{"Time":"2023-05-31T18:53:06.369289929Z","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster (0.08s)\n"} +{"Time":"2023-05-31T18:53:06.36929394Z","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Elapsed":0.08} +{"Time":"2023-05-31T18:53:06.369296847Z","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd","Elapsed":0} +{"Time":"2023-05-31T18:53:06.369299606Z","Action":"output","Test":"TestFunctional/parallel/Version","Output":" --- PASS: TestFunctional/parallel/Version (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.369310157Z","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":" --- PASS: TestFunctional/parallel/Version/short (0.04s)\n"} +{"Time":"2023-05-31T18:53:06.369313797Z","Action":"pass","Test":"TestFunctional/parallel/Version/short","Elapsed":0.04} +{"Time":"2023-05-31T18:53:06.369316838Z","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":" --- PASS: TestFunctional/parallel/Version/components (0.74s)\n"} +{"Time":"2023-05-31T18:53:06.369320299Z","Action":"pass","Test":"TestFunctional/parallel/Version/components","Elapsed":0.74} +{"Time":"2023-05-31T18:53:06.369323069Z","Action":"pass","Test":"TestFunctional/parallel/Version","Elapsed":0} +{"Time":"2023-05-31T18:53:06.369325908Z","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" --- PASS: TestFunctional/parallel/MySQL (31.80s)\n"} +{"Time":"2023-05-31T18:53:06.369329321Z","Action":"pass","Test":"TestFunctional/parallel/MySQL","Elapsed":31.8} +{"Time":"2023-05-31T18:53:06.369332273Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":" --- PASS: TestFunctional/parallel/ImageCommands (24.97s)\n"} +{"Time":"2023-05-31T18:53:06.369336172Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" --- PASS: TestFunctional/parallel/ImageCommands/Setup (1.18s)\n"} +{"Time":"2023-05-31T18:53:06.369339689Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/Setup","Elapsed":1.18} +{"Time":"2023-05-31T18:53:06.369342844Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageLoadDaemon (6.40s)\n"} +{"Time":"2023-05-31T18:53:06.369346433Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Elapsed":6.4} +{"Time":"2023-05-31T18:53:06.369356369Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageReloadDaemon (5.34s)\n"} +{"Time":"2023-05-31T18:53:06.369360799Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Elapsed":5.34} +{"Time":"2023-05-31T18:53:06.369363955Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon (6.90s)\n"} +{"Time":"2023-05-31T18:53:06.369367671Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Elapsed":6.9} +{"Time":"2023-05-31T18:53:06.369371022Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageSaveToFile (1.17s)\n"} +{"Time":"2023-05-31T18:53:06.369376274Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Elapsed":1.17} +{"Time":"2023-05-31T18:53:06.369379437Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageRemove (0.83s)\n"} +{"Time":"2023-05-31T18:53:06.369382921Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Elapsed":0.83} +{"Time":"2023-05-31T18:53:06.369385899Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageLoadFromFile (1.83s)\n"} +{"Time":"2023-05-31T18:53:06.369395608Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Elapsed":1.83} +{"Time":"2023-05-31T18:53:06.369398971Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageSaveDaemon (1.31s)\n"} +{"Time":"2023-05-31T18:53:06.369402595Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Elapsed":1.31} +{"Time":"2023-05-31T18:53:06.369405803Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListYaml (0.23s)\n"} +{"Time":"2023-05-31T18:53:06.369409346Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Elapsed":0.23} +{"Time":"2023-05-31T18:53:06.369414596Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListShort (0.23s)\n"} +{"Time":"2023-05-31T18:53:06.369418141Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Elapsed":0.23} +{"Time":"2023-05-31T18:53:06.369421371Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListJson (0.20s)\n"} +{"Time":"2023-05-31T18:53:06.36942489Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Elapsed":0.2} +{"Time":"2023-05-31T18:53:06.369429069Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListTable (0.24s)\n"} +{"Time":"2023-05-31T18:53:06.369435753Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Elapsed":0.24} +{"Time":"2023-05-31T18:53:06.369439031Z","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageBuild (3.01s)\n"} +{"Time":"2023-05-31T18:53:06.369442513Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Elapsed":3.01} +{"Time":"2023-05-31T18:53:06.369445283Z","Action":"pass","Test":"TestFunctional/parallel/ImageCommands","Elapsed":24.97} +{"Time":"2023-05-31T18:53:06.369448323Z","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" --- PASS: TestFunctional/parallel/PersistentVolumeClaim (37.35s)\n"} +{"Time":"2023-05-31T18:53:06.369451809Z","Action":"pass","Test":"TestFunctional/parallel/PersistentVolumeClaim","Elapsed":37.35} +{"Time":"2023-05-31T18:53:06.369454826Z","Action":"pass","Test":"TestFunctional/parallel","Elapsed":0} +{"Time":"2023-05-31T18:53:06.369460038Z","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" --- PASS: TestFunctional/delete_addon-resizer_images (0.06s)\n"} +{"Time":"2023-05-31T18:53:06.369463499Z","Action":"pass","Test":"TestFunctional/delete_addon-resizer_images","Elapsed":0.06} +{"Time":"2023-05-31T18:53:06.369466475Z","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":" --- PASS: TestFunctional/delete_my-image_image (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.369470965Z","Action":"pass","Test":"TestFunctional/delete_my-image_image","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369474037Z","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":" --- PASS: TestFunctional/delete_minikube_cached_images (0.01s)\n"} +{"Time":"2023-05-31T18:53:06.369480195Z","Action":"pass","Test":"TestFunctional/delete_minikube_cached_images","Elapsed":0.01} +{"Time":"2023-05-31T18:53:06.369482999Z","Action":"pass","Test":"TestFunctional","Elapsed":176.14} +{"Time":"2023-05-31T18:53:06.369485645Z","Action":"run","Test":"TestGvisorAddon"} +{"Time":"2023-05-31T18:53:06.369488841Z","Action":"output","Test":"TestGvisorAddon","Output":"=== RUN TestGvisorAddon\n"} +{"Time":"2023-05-31T18:53:06.369491749Z","Action":"output","Test":"TestGvisorAddon","Output":" gvisor_addon_test.go:34: skipping test because --gvisor=false\n"} +{"Time":"2023-05-31T18:53:06.369495265Z","Action":"output","Test":"TestGvisorAddon","Output":"--- SKIP: TestGvisorAddon (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.369497862Z","Action":"skip","Test":"TestGvisorAddon","Elapsed":0} +{"Time":"2023-05-31T18:53:06.369499447Z","Action":"run","Test":"TestImageBuild"} +{"Time":"2023-05-31T18:53:06.369501091Z","Action":"output","Test":"TestImageBuild","Output":"=== RUN TestImageBuild\n"} +{"Time":"2023-05-31T18:53:06.369502978Z","Action":"output","Test":"TestImageBuild","Output":" image_test.go:33: \n"} +{"Time":"2023-05-31T18:53:06.369506029Z","Action":"output","Test":"TestImageBuild","Output":"--- SKIP: TestImageBuild (0.00s)\n"} +{"Time":"2023-05-31T18:53:06.369509045Z","Action":"skip","Test":"TestImageBuild","Elapsed":0} +{"Time":"2023-05-31T18:53:06.369511499Z","Action":"run","Test":"TestIngressAddonLegacy"} +{"Time":"2023-05-31T18:53:06.369514033Z","Action":"output","Test":"TestIngressAddonLegacy","Output":"=== RUN TestIngressAddonLegacy\n"} +{"Time":"2023-05-31T18:53:06.369517275Z","Action":"run","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster"} +{"Time":"2023-05-31T18:53:06.369520109Z","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"=== RUN TestIngressAddonLegacy/StartLegacyK8sCluster\n"} +{"Time":"2023-05-31T18:53:06.36952357Z","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ingress_addon_legacy_test.go:39: (dbg) Run: out/minikube-linux-amd64 start -p ingress-addon-legacy-859355 --kubernetes-version=v1.18.20 --memory=4096 --wait=true --alsologtostderr -v=5 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:53:52.120515587Z","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"E0531 18:53:52.120402 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:55:04.853834944Z","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ingress_addon_legacy_test.go:39: (dbg) Done: out/minikube-linux-amd64 start -p ingress-addon-legacy-859355 --kubernetes-version=v1.18.20 --memory=4096 --wait=true --alsologtostderr -v=5 --driver=kvm2 --container-runtime=containerd: (1m58.484758739s)\n"} +{"Time":"2023-05-31T18:55:04.853897368Z","Action":"run","Test":"TestIngressAddonLegacy/serial"} +{"Time":"2023-05-31T18:55:04.853901616Z","Action":"output","Test":"TestIngressAddonLegacy/serial","Output":"=== RUN TestIngressAddonLegacy/serial\n"} +{"Time":"2023-05-31T18:55:04.853909041Z","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation"} +{"Time":"2023-05-31T18:55:04.853912331Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressAddonActivation\n"} +{"Time":"2023-05-31T18:55:04.85391649Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ingress_addon_legacy_test.go:70: (dbg) Run: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 addons enable ingress --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T18:55:20.107822713Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ingress_addon_legacy_test.go:70: (dbg) Done: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 addons enable ingress --alsologtostderr -v=5: (15.253855001s)\n"} +{"Time":"2023-05-31T18:55:20.10784789Z","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation"} +{"Time":"2023-05-31T18:55:20.107851697Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation\n"} +{"Time":"2023-05-31T18:55:20.107890394Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ingress_addon_legacy_test.go:79: (dbg) Run: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 addons enable ingress-dns --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T18:55:20.550118825Z","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons"} +{"Time":"2023-05-31T18:55:20.550140062Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressAddons\n"} +{"Time":"2023-05-31T18:55:20.55189197Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:183: (dbg) Run: kubectl --context ingress-addon-legacy-859355 wait --for=condition=ready --namespace=ingress-nginx pod --selector=app.kubernetes.io/component=controller --timeout=90s\n"} +{"Time":"2023-05-31T18:55:30.481255309Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:183: (dbg) Done: kubectl --context ingress-addon-legacy-859355 wait --for=condition=ready --namespace=ingress-nginx pod --selector=app.kubernetes.io/component=controller --timeout=90s: (9.929279235s)\n"} +{"Time":"2023-05-31T18:55:30.493889595Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:208: (dbg) Run: kubectl --context ingress-addon-legacy-859355 replace --force -f testdata/nginx-ingress-v1beta1.yaml\n"} +{"Time":"2023-05-31T18:55:30.782446248Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:221: (dbg) Run: kubectl --context ingress-addon-legacy-859355 replace --force -f testdata/nginx-pod-svc.yaml\n"} +{"Time":"2023-05-31T18:55:30.973456375Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:226: (dbg) TestIngressAddonLegacy/serial/ValidateIngressAddons: waiting 8m0s for pods matching \"run=nginx\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T18:55:30.982008624Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:344: \"nginx\" [fa8d60a1-4091-4823-a40e-23eb8c92c228] Pending / Ready:ContainersNotReady (containers with unready status: [nginx]) / ContainersReady:ContainersNotReady (containers with unready status: [nginx])\n"} +{"Time":"2023-05-31T18:55:33.985625634Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:344: \"nginx\" [fa8d60a1-4091-4823-a40e-23eb8c92c228] Running\n"} +{"Time":"2023-05-31T18:55:39.985374484Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:226: (dbg) TestIngressAddonLegacy/serial/ValidateIngressAddons: run=nginx healthy within 9.011928964s\n"} +{"Time":"2023-05-31T18:55:39.987643893Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:238: (dbg) Run: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 ssh \"curl -s http://127.0.0.1/ -H 'Host: nginx.example.com'\"\n"} +{"Time":"2023-05-31T18:55:40.164974299Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:262: (dbg) Run: kubectl --context ingress-addon-legacy-859355 replace --force -f testdata/ingress-dns-example-v1beta1.yaml\n"} +{"Time":"2023-05-31T18:55:40.419571045Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:267: (dbg) Run: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 ip\n"} +{"Time":"2023-05-31T18:55:40.49840008Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:273: (dbg) Run: nslookup hello-john.test 192.168.39.39\n"} +{"Time":"2023-05-31T18:55:40.568354004Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:282: (dbg) Run: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 addons disable ingress-dns --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:55:53.483585411Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:282: (dbg) Done: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 addons disable ingress-dns --alsologtostderr -v=1: (12.915081072s)\n"} +{"Time":"2023-05-31T18:55:53.483660837Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:287: (dbg) Run: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 addons disable ingress --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T18:56:00.806603357Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:287: (dbg) Done: out/minikube-linux-amd64 -p ingress-addon-legacy-859355 addons disable ingress --alsologtostderr -v=1: (7.322997467s)\n"} +{"Time":"2023-05-31T18:56:00.806638446Z","Action":"output","Test":"TestIngressAddonLegacy","Output":" helpers_test.go:175: Cleaning up \"ingress-addon-legacy-859355\" profile ...\n"} +{"Time":"2023-05-31T18:56:00.806645448Z","Action":"output","Test":"TestIngressAddonLegacy","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p ingress-addon-legacy-859355\n"} +{"Time":"2023-05-31T18:56:01.96222956Z","Action":"output","Test":"TestIngressAddonLegacy","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p ingress-addon-legacy-859355: (1.155535501s)\n"} +{"Time":"2023-05-31T18:56:01.96226021Z","Action":"output","Test":"TestIngressAddonLegacy","Output":"--- PASS: TestIngressAddonLegacy (175.59s)\n"} +{"Time":"2023-05-31T18:56:01.962265903Z","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" --- PASS: TestIngressAddonLegacy/StartLegacyK8sCluster (118.48s)\n"} +{"Time":"2023-05-31T18:56:01.962270647Z","Action":"pass","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Elapsed":118.48} +{"Time":"2023-05-31T18:56:01.962279129Z","Action":"output","Test":"TestIngressAddonLegacy/serial","Output":" --- PASS: TestIngressAddonLegacy/serial (55.95s)\n"} +{"Time":"2023-05-31T18:56:01.962284413Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" --- PASS: TestIngressAddonLegacy/serial/ValidateIngressAddonActivation (15.25s)\n"} +{"Time":"2023-05-31T18:56:01.962289222Z","Action":"pass","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Elapsed":15.25} +{"Time":"2023-05-31T18:56:01.962293185Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" --- PASS: TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation (0.44s)\n"} +{"Time":"2023-05-31T18:56:01.962297029Z","Action":"pass","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Elapsed":0.44} +{"Time":"2023-05-31T18:56:01.962300833Z","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" --- PASS: TestIngressAddonLegacy/serial/ValidateIngressAddons (40.26s)\n"} +{"Time":"2023-05-31T18:56:01.962304493Z","Action":"pass","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Elapsed":40.26} +{"Time":"2023-05-31T18:56:01.962307309Z","Action":"pass","Test":"TestIngressAddonLegacy/serial","Elapsed":55.95} +{"Time":"2023-05-31T18:56:01.962310497Z","Action":"pass","Test":"TestIngressAddonLegacy","Elapsed":175.59} +{"Time":"2023-05-31T18:56:01.96231293Z","Action":"run","Test":"TestJSONOutput"} +{"Time":"2023-05-31T18:56:01.962314703Z","Action":"output","Test":"TestJSONOutput","Output":"=== RUN TestJSONOutput\n"} +{"Time":"2023-05-31T18:56:01.962318746Z","Action":"run","Test":"TestJSONOutput/start"} +{"Time":"2023-05-31T18:56:01.96232103Z","Action":"output","Test":"TestJSONOutput/start","Output":"=== RUN TestJSONOutput/start\n"} +{"Time":"2023-05-31T18:56:01.962323148Z","Action":"run","Test":"TestJSONOutput/start/Command"} +{"Time":"2023-05-31T18:56:01.962324931Z","Action":"output","Test":"TestJSONOutput/start/Command","Output":"=== RUN TestJSONOutput/start/Command\n"} +{"Time":"2023-05-31T18:56:01.962327148Z","Action":"output","Test":"TestJSONOutput/start/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-linux-amd64 start -p json-output-222217 --output=json --user=testUser --memory=2200 --wait=true --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:56:08.276050383Z","Action":"output","Test":"TestJSONOutput/start/Command","Output":"E0531 18:56:08.275965 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:56:35.960844372Z","Action":"output","Test":"TestJSONOutput/start/Command","Output":"E0531 18:56:35.960657 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:13.286556668Z","Action":"output","Test":"TestJSONOutput/start/Command","Output":" json_output_test.go:63: (dbg) Done: out/minikube-linux-amd64 start -p json-output-222217 --output=json --user=testUser --memory=2200 --wait=true --driver=kvm2 --container-runtime=containerd: (1m11.324073729s)\n"} +{"Time":"2023-05-31T18:57:13.286870979Z","Action":"run","Test":"TestJSONOutput/start/Audit"} +{"Time":"2023-05-31T18:57:13.286890254Z","Action":"output","Test":"TestJSONOutput/start/Audit","Output":"=== RUN TestJSONOutput/start/Audit\n"} +{"Time":"2023-05-31T18:57:13.287063945Z","Action":"run","Test":"TestJSONOutput/start/parallel"} +{"Time":"2023-05-31T18:57:13.287114306Z","Action":"output","Test":"TestJSONOutput/start/parallel","Output":"=== RUN TestJSONOutput/start/parallel\n"} +{"Time":"2023-05-31T18:57:13.287121853Z","Action":"run","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:13.287130601Z","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.287143599Z","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.287147345Z","Action":"pause","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:13.287152935Z","Action":"run","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:13.287156139Z","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.287195767Z","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.287203552Z","Action":"pause","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:13.287206907Z","Action":"cont","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:13.28720942Z","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.287215196Z","Action":"cont","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:13.287217943Z","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.287290305Z","Action":"run","Test":"TestJSONOutput/pause"} +{"Time":"2023-05-31T18:57:13.287302492Z","Action":"output","Test":"TestJSONOutput/pause","Output":"=== RUN TestJSONOutput/pause\n"} +{"Time":"2023-05-31T18:57:13.287309294Z","Action":"run","Test":"TestJSONOutput/pause/Command"} +{"Time":"2023-05-31T18:57:13.287312066Z","Action":"output","Test":"TestJSONOutput/pause/Command","Output":"=== RUN TestJSONOutput/pause/Command\n"} +{"Time":"2023-05-31T18:57:13.287368984Z","Action":"output","Test":"TestJSONOutput/pause/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-linux-amd64 pause -p json-output-222217 --output=json --user=testUser\n"} +{"Time":"2023-05-31T18:57:13.921449398Z","Action":"run","Test":"TestJSONOutput/pause/Audit"} +{"Time":"2023-05-31T18:57:13.921479688Z","Action":"output","Test":"TestJSONOutput/pause/Audit","Output":"=== RUN TestJSONOutput/pause/Audit\n"} +{"Time":"2023-05-31T18:57:13.921564822Z","Action":"run","Test":"TestJSONOutput/pause/parallel"} +{"Time":"2023-05-31T18:57:13.921571313Z","Action":"output","Test":"TestJSONOutput/pause/parallel","Output":"=== RUN TestJSONOutput/pause/parallel\n"} +{"Time":"2023-05-31T18:57:13.921578673Z","Action":"run","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:13.921582827Z","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.92160433Z","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.921609357Z","Action":"pause","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:13.921614707Z","Action":"run","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:13.921618427Z","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.921638675Z","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.92164298Z","Action":"pause","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:13.921647976Z","Action":"cont","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:13.921651665Z","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.921656997Z","Action":"cont","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:13.921660684Z","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:13.921748703Z","Action":"run","Test":"TestJSONOutput/unpause"} +{"Time":"2023-05-31T18:57:13.92175324Z","Action":"output","Test":"TestJSONOutput/unpause","Output":"=== RUN TestJSONOutput/unpause\n"} +{"Time":"2023-05-31T18:57:13.921770305Z","Action":"run","Test":"TestJSONOutput/unpause/Command"} +{"Time":"2023-05-31T18:57:13.921774785Z","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":"=== RUN TestJSONOutput/unpause/Command\n"} +{"Time":"2023-05-31T18:57:13.9218136Z","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-linux-amd64 unpause -p json-output-222217 --output=json --user=testUser\n"} +{"Time":"2023-05-31T18:57:14.474751458Z","Action":"run","Test":"TestJSONOutput/unpause/Audit"} +{"Time":"2023-05-31T18:57:14.474776958Z","Action":"output","Test":"TestJSONOutput/unpause/Audit","Output":"=== RUN TestJSONOutput/unpause/Audit\n"} +{"Time":"2023-05-31T18:57:14.474866472Z","Action":"run","Test":"TestJSONOutput/unpause/parallel"} +{"Time":"2023-05-31T18:57:14.474871808Z","Action":"output","Test":"TestJSONOutput/unpause/parallel","Output":"=== RUN TestJSONOutput/unpause/parallel\n"} +{"Time":"2023-05-31T18:57:14.47487783Z","Action":"run","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:14.474881518Z","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:14.474899806Z","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:14.474903283Z","Action":"pause","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:14.474908095Z","Action":"run","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:14.47491079Z","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:14.474929231Z","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:14.474933403Z","Action":"pause","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:14.474944711Z","Action":"cont","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:14.474947811Z","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:14.474975585Z","Action":"cont","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:14.474979119Z","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:14.475309551Z","Action":"run","Test":"TestJSONOutput/stop"} +{"Time":"2023-05-31T18:57:14.475326408Z","Action":"output","Test":"TestJSONOutput/stop","Output":"=== RUN TestJSONOutput/stop\n"} +{"Time":"2023-05-31T18:57:14.475330949Z","Action":"run","Test":"TestJSONOutput/stop/Command"} +{"Time":"2023-05-31T18:57:14.475333123Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"=== RUN TestJSONOutput/stop/Command\n"} +{"Time":"2023-05-31T18:57:14.475336151Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-linux-amd64 stop -p json-output-222217 --output=json --user=testUser\n"} +{"Time":"2023-05-31T18:57:15.146539622Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:15.146458 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:15.151771755Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:15.151714 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:15.161979074Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:15.161940 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:15.18226439Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:15.182187 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:15.222459129Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:15.222410 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:15.302736261Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:15.302687 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:15.463179822Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:15.463113 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:15.783765212Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:15.783690 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:16.42479265Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:16.424718 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:17.704930802Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:17.704867 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:20.266825248Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 18:57:20.266719 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:21.555069916Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" json_output_test.go:63: (dbg) Done: out/minikube-linux-amd64 stop -p json-output-222217 --output=json --user=testUser: (7.07982439s)\n"} +{"Time":"2023-05-31T18:57:21.555119756Z","Action":"run","Test":"TestJSONOutput/stop/Audit"} +{"Time":"2023-05-31T18:57:21.555123033Z","Action":"output","Test":"TestJSONOutput/stop/Audit","Output":"=== RUN TestJSONOutput/stop/Audit\n"} +{"Time":"2023-05-31T18:57:21.555326726Z","Action":"run","Test":"TestJSONOutput/stop/parallel"} +{"Time":"2023-05-31T18:57:21.555343382Z","Action":"output","Test":"TestJSONOutput/stop/parallel","Output":"=== RUN TestJSONOutput/stop/parallel\n"} +{"Time":"2023-05-31T18:57:21.555349937Z","Action":"run","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:21.555353337Z","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:21.555358882Z","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:21.55536223Z","Action":"pause","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:21.555365409Z","Action":"run","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:21.555369276Z","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:21.555374598Z","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:21.555377285Z","Action":"pause","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:21.555380118Z","Action":"cont","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T18:57:21.555382492Z","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T18:57:21.555386939Z","Action":"cont","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T18:57:21.555395954Z","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T18:57:21.555491455Z","Action":"output","Test":"TestJSONOutput","Output":" helpers_test.go:175: Cleaning up \"json-output-222217\" profile ...\n"} +{"Time":"2023-05-31T18:57:21.555534525Z","Action":"output","Test":"TestJSONOutput","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p json-output-222217\n"} +{"Time":"2023-05-31T18:57:21.963093989Z","Action":"output","Test":"TestJSONOutput","Output":"--- PASS: TestJSONOutput (80.00s)\n"} +{"Time":"2023-05-31T18:57:21.963115654Z","Action":"output","Test":"TestJSONOutput/start","Output":" --- PASS: TestJSONOutput/start (71.32s)\n"} +{"Time":"2023-05-31T18:57:21.963119011Z","Action":"output","Test":"TestJSONOutput/start/Command","Output":" --- PASS: TestJSONOutput/start/Command (71.32s)\n"} +{"Time":"2023-05-31T18:57:21.963121693Z","Action":"pass","Test":"TestJSONOutput/start/Command","Elapsed":71.32} +{"Time":"2023-05-31T18:57:21.963127431Z","Action":"output","Test":"TestJSONOutput/start/Audit","Output":" --- PASS: TestJSONOutput/start/Audit (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963130192Z","Action":"pass","Test":"TestJSONOutput/start/Audit","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963132518Z","Action":"output","Test":"TestJSONOutput/start/parallel","Output":" --- PASS: TestJSONOutput/start/parallel (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963146275Z","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/start/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963150712Z","Action":"pass","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T18:57:21.96315372Z","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/start/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.96315719Z","Action":"pass","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963159734Z","Action":"pass","Test":"TestJSONOutput/start/parallel","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963161995Z","Action":"pass","Test":"TestJSONOutput/start","Elapsed":71.32} +{"Time":"2023-05-31T18:57:21.963165293Z","Action":"output","Test":"TestJSONOutput/pause","Output":" --- PASS: TestJSONOutput/pause (0.63s)\n"} +{"Time":"2023-05-31T18:57:21.96316949Z","Action":"output","Test":"TestJSONOutput/pause/Command","Output":" --- PASS: TestJSONOutput/pause/Command (0.63s)\n"} +{"Time":"2023-05-31T18:57:21.963173133Z","Action":"pass","Test":"TestJSONOutput/pause/Command","Elapsed":0.63} +{"Time":"2023-05-31T18:57:21.963175904Z","Action":"output","Test":"TestJSONOutput/pause/Audit","Output":" --- PASS: TestJSONOutput/pause/Audit (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963178135Z","Action":"pass","Test":"TestJSONOutput/pause/Audit","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963179939Z","Action":"output","Test":"TestJSONOutput/pause/parallel","Output":" --- PASS: TestJSONOutput/pause/parallel (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963182379Z","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/pause/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963184798Z","Action":"pass","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963186904Z","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/pause/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963189203Z","Action":"pass","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963190916Z","Action":"pass","Test":"TestJSONOutput/pause/parallel","Elapsed":0} +{"Time":"2023-05-31T18:57:21.96319247Z","Action":"pass","Test":"TestJSONOutput/pause","Elapsed":0.63} +{"Time":"2023-05-31T18:57:21.963194384Z","Action":"output","Test":"TestJSONOutput/unpause","Output":" --- PASS: TestJSONOutput/unpause (0.55s)\n"} +{"Time":"2023-05-31T18:57:21.963196668Z","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":" --- PASS: TestJSONOutput/unpause/Command (0.55s)\n"} +{"Time":"2023-05-31T18:57:21.963198968Z","Action":"pass","Test":"TestJSONOutput/unpause/Command","Elapsed":0.55} +{"Time":"2023-05-31T18:57:21.963201008Z","Action":"output","Test":"TestJSONOutput/unpause/Audit","Output":" --- PASS: TestJSONOutput/unpause/Audit (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963203056Z","Action":"pass","Test":"TestJSONOutput/unpause/Audit","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963205069Z","Action":"output","Test":"TestJSONOutput/unpause/parallel","Output":" --- PASS: TestJSONOutput/unpause/parallel (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.96320753Z","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/unpause/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963212152Z","Action":"pass","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963214041Z","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/unpause/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963216227Z","Action":"pass","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963219712Z","Action":"pass","Test":"TestJSONOutput/unpause/parallel","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963224727Z","Action":"pass","Test":"TestJSONOutput/unpause","Elapsed":0.55} +{"Time":"2023-05-31T18:57:21.963226592Z","Action":"output","Test":"TestJSONOutput/stop","Output":" --- PASS: TestJSONOutput/stop (7.08s)\n"} +{"Time":"2023-05-31T18:57:21.963228829Z","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" --- PASS: TestJSONOutput/stop/Command (7.08s)\n"} +{"Time":"2023-05-31T18:57:21.963230881Z","Action":"pass","Test":"TestJSONOutput/stop/Command","Elapsed":7.08} +{"Time":"2023-05-31T18:57:21.963235739Z","Action":"output","Test":"TestJSONOutput/stop/Audit","Output":" --- PASS: TestJSONOutput/stop/Audit (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963239116Z","Action":"pass","Test":"TestJSONOutput/stop/Audit","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963242049Z","Action":"output","Test":"TestJSONOutput/stop/parallel","Output":" --- PASS: TestJSONOutput/stop/parallel (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.96324607Z","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/stop/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963249913Z","Action":"pass","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963253928Z","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/stop/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T18:57:21.963257658Z","Action":"pass","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963260317Z","Action":"pass","Test":"TestJSONOutput/stop/parallel","Elapsed":0} +{"Time":"2023-05-31T18:57:21.963262726Z","Action":"pass","Test":"TestJSONOutput/stop","Elapsed":7.08} +{"Time":"2023-05-31T18:57:21.963265356Z","Action":"pass","Test":"TestJSONOutput","Elapsed":80} +{"Time":"2023-05-31T18:57:21.963268328Z","Action":"run","Test":"TestErrorJSONOutput"} +{"Time":"2023-05-31T18:57:21.963270828Z","Action":"output","Test":"TestErrorJSONOutput","Output":"=== RUN TestErrorJSONOutput\n"} +{"Time":"2023-05-31T18:57:21.963274862Z","Action":"output","Test":"TestErrorJSONOutput","Output":" json_output_test.go:160: (dbg) Run: out/minikube-linux-amd64 start -p json-output-error-056676 --memory=2200 --output=json --wait=true --driver=fail\n"} +{"Time":"2023-05-31T18:57:22.023031099Z","Action":"output","Test":"TestErrorJSONOutput","Output":" json_output_test.go:160: (dbg) Non-zero exit: out/minikube-linux-amd64 start -p json-output-error-056676 --memory=2200 --output=json --wait=true --driver=fail: exit status 56 (59.80606ms)\n"} +{"Time":"2023-05-31T18:57:22.023056539Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \n"} +{"Time":"2023-05-31T18:57:22.023061739Z","Action":"output","Test":"TestErrorJSONOutput","Output":" -- stdout --\n"} +{"Time":"2023-05-31T18:57:22.023065913Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"3d175dec-e318-4c07-b47d-534cfb33b95f\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"0\",\"message\":\"[json-output-error-056676] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\",\"name\":\"Initial Minikube Setup\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T18:57:22.023073128Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"76ec0090-449f-45f6-b95b-71894cb03132\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_LOCATION=16569\"}}\n"} +{"Time":"2023-05-31T18:57:22.023078039Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"05b58341-4055-4c74-b876-4228bd16694f\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\"}}\n"} +{"Time":"2023-05-31T18:57:22.023082385Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"aa5dd1f9-72e8-41ef-9c99-65d4581d4e6c\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\"}}\n"} +{"Time":"2023-05-31T18:57:22.023086835Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"8cf23d29-248b-4612-9749-bdfa63400eda\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\"}}\n"} +{"Time":"2023-05-31T18:57:22.023091542Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"99f6243a-4f9b-4da7-869c-d89d61e8679c\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_BIN=out/minikube-linux-amd64\"}}\n"} +{"Time":"2023-05-31T18:57:22.023101913Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"bbfbb1be-4555-48fb-8967-ac1f5e78f6e5\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_FORCE_SYSTEMD=\"}}\n"} +{"Time":"2023-05-31T18:57:22.023109858Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"727659be-99f3-4f26-8a61-741ac9ae7264\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.error\",\"datacontenttype\":\"application/json\",\"data\":{\"advice\":\"\",\"exitcode\":\"56\",\"issues\":\"\",\"message\":\"The driver 'fail' is not supported on linux/amd64\",\"name\":\"DRV_UNSUPPORTED_OS\",\"url\":\"\"}}\n"} +{"Time":"2023-05-31T18:57:22.023115439Z","Action":"output","Test":"TestErrorJSONOutput","Output":" \n"} +{"Time":"2023-05-31T18:57:22.02311875Z","Action":"output","Test":"TestErrorJSONOutput","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T18:57:22.023177106Z","Action":"output","Test":"TestErrorJSONOutput","Output":" helpers_test.go:175: Cleaning up \"json-output-error-056676\" profile ...\n"} +{"Time":"2023-05-31T18:57:22.023206382Z","Action":"output","Test":"TestErrorJSONOutput","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p json-output-error-056676\n"} +{"Time":"2023-05-31T18:57:22.138867579Z","Action":"output","Test":"TestErrorJSONOutput","Output":"--- PASS: TestErrorJSONOutput (0.18s)\n"} +{"Time":"2023-05-31T18:57:22.138892174Z","Action":"pass","Test":"TestErrorJSONOutput","Elapsed":0.18} +{"Time":"2023-05-31T18:57:22.138908162Z","Action":"run","Test":"TestKicCustomNetwork"} +{"Time":"2023-05-31T18:57:22.138917341Z","Action":"output","Test":"TestKicCustomNetwork","Output":"=== RUN TestKicCustomNetwork\n"} +{"Time":"2023-05-31T18:57:22.138923723Z","Action":"output","Test":"TestKicCustomNetwork","Output":" kic_custom_network_test.go:34: only runs with docker driver\n"} +{"Time":"2023-05-31T18:57:22.138928972Z","Action":"output","Test":"TestKicCustomNetwork","Output":"--- SKIP: TestKicCustomNetwork (0.00s)\n"} +{"Time":"2023-05-31T18:57:22.138931809Z","Action":"skip","Test":"TestKicCustomNetwork","Elapsed":0} +{"Time":"2023-05-31T18:57:22.138934485Z","Action":"run","Test":"TestKicExistingNetwork"} +{"Time":"2023-05-31T18:57:22.138937243Z","Action":"output","Test":"TestKicExistingNetwork","Output":"=== RUN TestKicExistingNetwork\n"} +{"Time":"2023-05-31T18:57:22.138945049Z","Action":"output","Test":"TestKicExistingNetwork","Output":" kic_custom_network_test.go:73: only runs with docker driver\n"} +{"Time":"2023-05-31T18:57:22.138949862Z","Action":"output","Test":"TestKicExistingNetwork","Output":"--- SKIP: TestKicExistingNetwork (0.00s)\n"} +{"Time":"2023-05-31T18:57:22.138956893Z","Action":"skip","Test":"TestKicExistingNetwork","Elapsed":0} +{"Time":"2023-05-31T18:57:22.138959739Z","Action":"run","Test":"TestKicCustomSubnet"} +{"Time":"2023-05-31T18:57:22.138962617Z","Action":"output","Test":"TestKicCustomSubnet","Output":"=== RUN TestKicCustomSubnet\n"} +{"Time":"2023-05-31T18:57:22.138965956Z","Action":"output","Test":"TestKicCustomSubnet","Output":" kic_custom_network_test.go:102: only runs with docker/podman driver\n"} +{"Time":"2023-05-31T18:57:22.138970086Z","Action":"output","Test":"TestKicCustomSubnet","Output":"--- SKIP: TestKicCustomSubnet (0.00s)\n"} +{"Time":"2023-05-31T18:57:22.138973163Z","Action":"skip","Test":"TestKicCustomSubnet","Elapsed":0} +{"Time":"2023-05-31T18:57:22.138975627Z","Action":"run","Test":"TestKicStaticIP"} +{"Time":"2023-05-31T18:57:22.138978092Z","Action":"output","Test":"TestKicStaticIP","Output":"=== RUN TestKicStaticIP\n"} +{"Time":"2023-05-31T18:57:22.138981766Z","Action":"output","Test":"TestKicStaticIP","Output":" kic_custom_network_test.go:123: only run with docker/podman driver\n"} +{"Time":"2023-05-31T18:57:22.139026083Z","Action":"output","Test":"TestKicStaticIP","Output":"--- SKIP: TestKicStaticIP (0.00s)\n"} +{"Time":"2023-05-31T18:57:22.139051126Z","Action":"skip","Test":"TestKicStaticIP","Elapsed":0} +{"Time":"2023-05-31T18:57:22.13905732Z","Action":"run","Test":"TestMainNoArgs"} +{"Time":"2023-05-31T18:57:22.139064998Z","Action":"output","Test":"TestMainNoArgs","Output":"=== RUN TestMainNoArgs\n"} +{"Time":"2023-05-31T18:57:22.139071584Z","Action":"output","Test":"TestMainNoArgs","Output":" main_test.go:68: (dbg) Run: out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T18:57:22.176967259Z","Action":"output","Test":"TestMainNoArgs","Output":"--- PASS: TestMainNoArgs (0.04s)\n"} +{"Time":"2023-05-31T18:57:22.176990682Z","Action":"pass","Test":"TestMainNoArgs","Elapsed":0.04} +{"Time":"2023-05-31T18:57:22.176997616Z","Action":"run","Test":"TestMinikubeProfile"} +{"Time":"2023-05-31T18:57:22.177000518Z","Action":"output","Test":"TestMinikubeProfile","Output":"=== RUN TestMinikubeProfile\n"} +{"Time":"2023-05-31T18:57:22.177034679Z","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Run: out/minikube-linux-amd64 start -p first-972403 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:57:25.38757821Z","Action":"output","Test":"TestMinikubeProfile","Output":"E0531 18:57:25.387477 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:35.628676648Z","Action":"output","Test":"TestMinikubeProfile","Output":"E0531 18:57:35.628614 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:57:56.109115673Z","Action":"output","Test":"TestMinikubeProfile","Output":"E0531 18:57:56.109024 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:58:18.857045097Z","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Done: out/minikube-linux-amd64 start -p first-972403 --driver=kvm2 --container-runtime=containerd: (56.67990591s)\n"} +{"Time":"2023-05-31T18:58:18.857074Z","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Run: out/minikube-linux-amd64 start -p second-975276 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:58:37.069414473Z","Action":"output","Test":"TestMinikubeProfile","Output":"E0531 18:58:37.069313 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T18:59:10.157611007Z","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Done: out/minikube-linux-amd64 start -p second-975276 --driver=kvm2 --container-runtime=containerd: (51.300383405s)\n"} +{"Time":"2023-05-31T18:59:10.157654781Z","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:51: (dbg) Run: out/minikube-linux-amd64 profile first-972403\n"} +{"Time":"2023-05-31T18:59:10.215175915Z","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:55: (dbg) Run: out/minikube-linux-amd64 profile list -ojson\n"} +{"Time":"2023-05-31T18:59:10.546873144Z","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:51: (dbg) Run: out/minikube-linux-amd64 profile second-975276\n"} +{"Time":"2023-05-31T18:59:10.605172785Z","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:55: (dbg) Run: out/minikube-linux-amd64 profile list -ojson\n"} +{"Time":"2023-05-31T18:59:10.930013632Z","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:175: Cleaning up \"second-975276\" profile ...\n"} +{"Time":"2023-05-31T18:59:10.930043965Z","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p second-975276\n"} +{"Time":"2023-05-31T18:59:11.855835641Z","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:175: Cleaning up \"first-972403\" profile ...\n"} +{"Time":"2023-05-31T18:59:11.855857085Z","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p first-972403\n"} +{"Time":"2023-05-31T18:59:12.808961159Z","Action":"output","Test":"TestMinikubeProfile","Output":"--- PASS: TestMinikubeProfile (110.63s)\n"} +{"Time":"2023-05-31T18:59:12.808985234Z","Action":"pass","Test":"TestMinikubeProfile","Elapsed":110.63} +{"Time":"2023-05-31T18:59:12.808991234Z","Action":"run","Test":"TestMountStart"} +{"Time":"2023-05-31T18:59:12.808993709Z","Action":"output","Test":"TestMountStart","Output":"=== RUN TestMountStart\n"} +{"Time":"2023-05-31T18:59:12.808998047Z","Action":"run","Test":"TestMountStart/serial"} +{"Time":"2023-05-31T18:59:12.809000048Z","Action":"output","Test":"TestMountStart/serial","Output":"=== RUN TestMountStart/serial\n"} +{"Time":"2023-05-31T18:59:12.809002954Z","Action":"run","Test":"TestMountStart/serial/StartWithMountFirst"} +{"Time":"2023-05-31T18:59:12.809004918Z","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":"=== RUN TestMountStart/serial/StartWithMountFirst\n"} +{"Time":"2023-05-31T18:59:12.809071824Z","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" mount_start_test.go:98: (dbg) Run: out/minikube-linux-amd64 start -p mount-start-1-925142 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46464 --mount-uid 0 --no-kubernetes --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:59:40.059582994Z","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" mount_start_test.go:98: (dbg) Done: out/minikube-linux-amd64 start -p mount-start-1-925142 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46464 --mount-uid 0 --no-kubernetes --driver=kvm2 --container-runtime=containerd: (27.250395831s)\n"} +{"Time":"2023-05-31T18:59:41.060093714Z","Action":"run","Test":"TestMountStart/serial/VerifyMountFirst"} +{"Time":"2023-05-31T18:59:41.060114635Z","Action":"output","Test":"TestMountStart/serial/VerifyMountFirst","Output":"=== RUN TestMountStart/serial/VerifyMountFirst\n"} +{"Time":"2023-05-31T18:59:41.060129992Z","Action":"output","Test":"TestMountStart/serial/VerifyMountFirst","Output":" mount_start_test.go:114: (dbg) Run: out/minikube-linux-amd64 -p mount-start-1-925142 ssh -- ls /minikube-host\n"} +{"Time":"2023-05-31T18:59:41.239306682Z","Action":"output","Test":"TestMountStart/serial/VerifyMountFirst","Output":" mount_start_test.go:127: (dbg) Run: out/minikube-linux-amd64 -p mount-start-1-925142 ssh -- mount | grep 9p\n"} +{"Time":"2023-05-31T18:59:41.410446927Z","Action":"run","Test":"TestMountStart/serial/StartWithMountSecond"} +{"Time":"2023-05-31T18:59:41.410469071Z","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":"=== RUN TestMountStart/serial/StartWithMountSecond\n"} +{"Time":"2023-05-31T18:59:41.410489324Z","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":" mount_start_test.go:98: (dbg) Run: out/minikube-linux-amd64 start -p mount-start-2-955788 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46465 --mount-uid 0 --no-kubernetes --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T18:59:58.989901514Z","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":"E0531 18:59:58.989810 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:04.885150043Z","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":" mount_start_test.go:98: (dbg) Done: out/minikube-linux-amd64 start -p mount-start-2-955788 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46465 --mount-uid 0 --no-kubernetes --driver=kvm2 --container-runtime=containerd: (23.474555014s)\n"} +{"Time":"2023-05-31T19:00:05.885387011Z","Action":"run","Test":"TestMountStart/serial/VerifyMountSecond"} +{"Time":"2023-05-31T19:00:05.88540886Z","Action":"output","Test":"TestMountStart/serial/VerifyMountSecond","Output":"=== RUN TestMountStart/serial/VerifyMountSecond\n"} +{"Time":"2023-05-31T19:00:05.885414941Z","Action":"output","Test":"TestMountStart/serial/VerifyMountSecond","Output":" mount_start_test.go:114: (dbg) Run: out/minikube-linux-amd64 -p mount-start-2-955788 ssh -- ls /minikube-host\n"} +{"Time":"2023-05-31T19:00:06.069401192Z","Action":"output","Test":"TestMountStart/serial/VerifyMountSecond","Output":" mount_start_test.go:127: (dbg) Run: out/minikube-linux-amd64 -p mount-start-2-955788 ssh -- mount | grep 9p\n"} +{"Time":"2023-05-31T19:00:06.246899672Z","Action":"run","Test":"TestMountStart/serial/DeleteFirst"} +{"Time":"2023-05-31T19:00:06.246925652Z","Action":"output","Test":"TestMountStart/serial/DeleteFirst","Output":"=== RUN TestMountStart/serial/DeleteFirst\n"} +{"Time":"2023-05-31T19:00:06.246933924Z","Action":"output","Test":"TestMountStart/serial/DeleteFirst","Output":" pause_test.go:132: (dbg) Run: out/minikube-linux-amd64 delete -p mount-start-1-925142 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T19:00:06.884023345Z","Action":"run","Test":"TestMountStart/serial/VerifyMountPostDelete"} +{"Time":"2023-05-31T19:00:06.884052065Z","Action":"output","Test":"TestMountStart/serial/VerifyMountPostDelete","Output":"=== RUN TestMountStart/serial/VerifyMountPostDelete\n"} +{"Time":"2023-05-31T19:00:06.884061098Z","Action":"output","Test":"TestMountStart/serial/VerifyMountPostDelete","Output":" mount_start_test.go:114: (dbg) Run: out/minikube-linux-amd64 -p mount-start-2-955788 ssh -- ls /minikube-host\n"} +{"Time":"2023-05-31T19:00:07.070379025Z","Action":"output","Test":"TestMountStart/serial/VerifyMountPostDelete","Output":" mount_start_test.go:127: (dbg) Run: out/minikube-linux-amd64 -p mount-start-2-955788 ssh -- mount | grep 9p\n"} +{"Time":"2023-05-31T19:00:07.250999904Z","Action":"run","Test":"TestMountStart/serial/Stop"} +{"Time":"2023-05-31T19:00:07.251020049Z","Action":"output","Test":"TestMountStart/serial/Stop","Output":"=== RUN TestMountStart/serial/Stop\n"} +{"Time":"2023-05-31T19:00:07.25102627Z","Action":"output","Test":"TestMountStart/serial/Stop","Output":" mount_start_test.go:155: (dbg) Run: out/minikube-linux-amd64 stop -p mount-start-2-955788\n"} +{"Time":"2023-05-31T19:00:08.404308069Z","Action":"output","Test":"TestMountStart/serial/Stop","Output":" mount_start_test.go:155: (dbg) Done: out/minikube-linux-amd64 stop -p mount-start-2-955788: (1.153206947s)\n"} +{"Time":"2023-05-31T19:00:08.404334437Z","Action":"run","Test":"TestMountStart/serial/RestartStopped"} +{"Time":"2023-05-31T19:00:08.404343931Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"=== RUN TestMountStart/serial/RestartStopped\n"} +{"Time":"2023-05-31T19:00:08.40434883Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":" mount_start_test.go:166: (dbg) Run: out/minikube-linux-amd64 start -p mount-start-2-955788\n"} +{"Time":"2023-05-31T19:00:20.553911281Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:20.553843 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:20.559128105Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:20.559084 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:20.569410874Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:20.569369 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:20.589662441Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:20.589613 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:20.629942468Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:20.629859 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:20.710236229Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:20.710173 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:20.870662315Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:20.870567 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:21.191190455Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:21.191132 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:21.831691773Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:21.831620 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:23.112214606Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:23.112119 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:25.672896821Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:25.672825 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:30.330878524Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":" mount_start_test.go:166: (dbg) Done: out/minikube-linux-amd64 start -p mount-start-2-955788: (21.926411809s)\n"} +{"Time":"2023-05-31T19:00:30.793579648Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":"E0531 19:00:30.793518 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:00:31.331294852Z","Action":"run","Test":"TestMountStart/serial/VerifyMountPostStop"} +{"Time":"2023-05-31T19:00:31.33132718Z","Action":"output","Test":"TestMountStart/serial/VerifyMountPostStop","Output":"=== RUN TestMountStart/serial/VerifyMountPostStop\n"} +{"Time":"2023-05-31T19:00:31.331333552Z","Action":"output","Test":"TestMountStart/serial/VerifyMountPostStop","Output":" mount_start_test.go:114: (dbg) Run: out/minikube-linux-amd64 -p mount-start-2-955788 ssh -- ls /minikube-host\n"} +{"Time":"2023-05-31T19:00:31.509392787Z","Action":"output","Test":"TestMountStart/serial/VerifyMountPostStop","Output":" mount_start_test.go:127: (dbg) Run: out/minikube-linux-amd64 -p mount-start-2-955788 ssh -- mount | grep 9p\n"} +{"Time":"2023-05-31T19:00:31.683573049Z","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:175: Cleaning up \"mount-start-2-955788\" profile ...\n"} +{"Time":"2023-05-31T19:00:31.683594614Z","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p mount-start-2-955788\n"} +{"Time":"2023-05-31T19:00:32.53050136Z","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:175: Cleaning up \"mount-start-1-925142\" profile ...\n"} +{"Time":"2023-05-31T19:00:32.530522704Z","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p mount-start-1-925142\n"} +{"Time":"2023-05-31T19:00:32.645165058Z","Action":"output","Test":"TestMountStart","Output":"--- PASS: TestMountStart (79.84s)\n"} +{"Time":"2023-05-31T19:00:32.645187292Z","Action":"output","Test":"TestMountStart/serial","Output":" --- PASS: TestMountStart/serial (78.87s)\n"} +{"Time":"2023-05-31T19:00:32.645193131Z","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" --- PASS: TestMountStart/serial/StartWithMountFirst (28.25s)\n"} +{"Time":"2023-05-31T19:00:32.645197783Z","Action":"pass","Test":"TestMountStart/serial/StartWithMountFirst","Elapsed":28.25} +{"Time":"2023-05-31T19:00:32.645204973Z","Action":"output","Test":"TestMountStart/serial/VerifyMountFirst","Output":" --- PASS: TestMountStart/serial/VerifyMountFirst (0.35s)\n"} +{"Time":"2023-05-31T19:00:32.645208455Z","Action":"pass","Test":"TestMountStart/serial/VerifyMountFirst","Elapsed":0.35} +{"Time":"2023-05-31T19:00:32.645211599Z","Action":"output","Test":"TestMountStart/serial/StartWithMountSecond","Output":" --- PASS: TestMountStart/serial/StartWithMountSecond (24.47s)\n"} +{"Time":"2023-05-31T19:00:32.645215718Z","Action":"pass","Test":"TestMountStart/serial/StartWithMountSecond","Elapsed":24.47} +{"Time":"2023-05-31T19:00:32.645218994Z","Action":"output","Test":"TestMountStart/serial/VerifyMountSecond","Output":" --- PASS: TestMountStart/serial/VerifyMountSecond (0.36s)\n"} +{"Time":"2023-05-31T19:00:32.645222852Z","Action":"pass","Test":"TestMountStart/serial/VerifyMountSecond","Elapsed":0.36} +{"Time":"2023-05-31T19:00:32.645248549Z","Action":"output","Test":"TestMountStart/serial/DeleteFirst","Output":" --- PASS: TestMountStart/serial/DeleteFirst (0.64s)\n"} +{"Time":"2023-05-31T19:00:32.645253935Z","Action":"pass","Test":"TestMountStart/serial/DeleteFirst","Elapsed":0.64} +{"Time":"2023-05-31T19:00:32.645256919Z","Action":"output","Test":"TestMountStart/serial/VerifyMountPostDelete","Output":" --- PASS: TestMountStart/serial/VerifyMountPostDelete (0.37s)\n"} +{"Time":"2023-05-31T19:00:32.645260272Z","Action":"pass","Test":"TestMountStart/serial/VerifyMountPostDelete","Elapsed":0.37} +{"Time":"2023-05-31T19:00:32.645262911Z","Action":"output","Test":"TestMountStart/serial/Stop","Output":" --- PASS: TestMountStart/serial/Stop (1.15s)\n"} +{"Time":"2023-05-31T19:00:32.645266105Z","Action":"pass","Test":"TestMountStart/serial/Stop","Elapsed":1.15} +{"Time":"2023-05-31T19:00:32.645269588Z","Action":"output","Test":"TestMountStart/serial/RestartStopped","Output":" --- PASS: TestMountStart/serial/RestartStopped (22.93s)\n"} +{"Time":"2023-05-31T19:00:32.645273043Z","Action":"pass","Test":"TestMountStart/serial/RestartStopped","Elapsed":22.93} +{"Time":"2023-05-31T19:00:32.645276038Z","Action":"output","Test":"TestMountStart/serial/VerifyMountPostStop","Output":" --- PASS: TestMountStart/serial/VerifyMountPostStop (0.35s)\n"} +{"Time":"2023-05-31T19:00:32.645279752Z","Action":"pass","Test":"TestMountStart/serial/VerifyMountPostStop","Elapsed":0.35} +{"Time":"2023-05-31T19:00:32.645282104Z","Action":"pass","Test":"TestMountStart/serial","Elapsed":78.87} +{"Time":"2023-05-31T19:00:32.645284611Z","Action":"pass","Test":"TestMountStart","Elapsed":79.84} +{"Time":"2023-05-31T19:00:32.645287642Z","Action":"run","Test":"TestMultiNode"} +{"Time":"2023-05-31T19:00:32.645291249Z","Action":"output","Test":"TestMultiNode","Output":"=== RUN TestMultiNode\n"} +{"Time":"2023-05-31T19:00:32.645298095Z","Action":"run","Test":"TestMultiNode/serial"} +{"Time":"2023-05-31T19:00:32.645301437Z","Action":"output","Test":"TestMultiNode/serial","Output":"=== RUN TestMultiNode/serial\n"} +{"Time":"2023-05-31T19:00:32.645305229Z","Action":"run","Test":"TestMultiNode/serial/FreshStart2Nodes"} +{"Time":"2023-05-31T19:00:32.645308175Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"=== RUN TestMultiNode/serial/FreshStart2Nodes\n"} +{"Time":"2023-05-31T19:00:32.645311858Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:85: (dbg) Run: out/minikube-linux-amd64 start -p multinode-155596 --wait=true --memory=2200 --nodes=2 -v=8 --alsologtostderr --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:00:41.034801525Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"E0531 19:00:41.034723 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:01:01.515818724Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"E0531 19:01:01.515720 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:01:08.275865435Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"E0531 19:01:08.275798 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:01:42.47630274Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"E0531 19:01:42.476204 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:02:15.146572117Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"E0531 19:02:15.146504 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:02:33.394213768Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:85: (dbg) Done: out/minikube-linux-amd64 start -p multinode-155596 --wait=true --memory=2200 --nodes=2 -v=8 --alsologtostderr --driver=kvm2 --container-runtime=containerd: (2m0.748850252s)\n"} +{"Time":"2023-05-31T19:02:33.39425499Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:91: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status --alsologtostderr\n"} +{"Time":"2023-05-31T19:02:33.811665036Z","Action":"run","Test":"TestMultiNode/serial/DeployApp2Nodes"} +{"Time":"2023-05-31T19:02:33.811695365Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"=== RUN TestMultiNode/serial/DeployApp2Nodes\n"} +{"Time":"2023-05-31T19:02:33.811709647Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:481: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- apply -f ./testdata/multinodes/multinode-pod-dns-test.yaml\n"} +{"Time":"2023-05-31T19:02:34.130298689Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:486: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- rollout status deployment/busybox\n"} +{"Time":"2023-05-31T19:02:36.366028247Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:486: (dbg) Done: out/minikube-linux-amd64 kubectl -p multinode-155596 -- rollout status deployment/busybox: (2.235685763s)\n"} +{"Time":"2023-05-31T19:02:36.366054208Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T19:02:36.465545751Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:516: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- get pods -o jsonpath='{.items[*].metadata.name}'\n"} +{"Time":"2023-05-31T19:02:36.563188245Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:524: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-8dt89 -- nslookup kubernetes.io\n"} +{"Time":"2023-05-31T19:02:36.790090401Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:524: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-dl28f -- nslookup kubernetes.io\n"} +{"Time":"2023-05-31T19:02:36.977919208Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:534: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-8dt89 -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:02:37.200387301Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:534: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-dl28f -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:02:37.383622124Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:542: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-8dt89 -- nslookup kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:02:37.554468941Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:542: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-dl28f -- nslookup kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:02:37.71661614Z","Action":"run","Test":"TestMultiNode/serial/PingHostFrom2Pods"} +{"Time":"2023-05-31T19:02:37.716645391Z","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":"=== RUN TestMultiNode/serial/PingHostFrom2Pods\n"} +{"Time":"2023-05-31T19:02:37.71666468Z","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:552: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- get pods -o jsonpath='{.items[*].metadata.name}'\n"} +{"Time":"2023-05-31T19:02:37.816155833Z","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:560: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-8dt89 -- sh -c \"nslookup host.minikube.internal | awk 'NR==5' | cut -d' ' -f3\"\n"} +{"Time":"2023-05-31T19:02:37.982721523Z","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:571: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-8dt89 -- sh -c \"ping -c 1 192.168.39.1\"\n"} +{"Time":"2023-05-31T19:02:38.168119251Z","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:560: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-dl28f -- sh -c \"nslookup host.minikube.internal | awk 'NR==5' | cut -d' ' -f3\"\n"} +{"Time":"2023-05-31T19:02:38.348483177Z","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:571: (dbg) Run: out/minikube-linux-amd64 kubectl -p multinode-155596 -- exec busybox-67b7f59bb-dl28f -- sh -c \"ping -c 1 192.168.39.1\"\n"} +{"Time":"2023-05-31T19:02:38.512596062Z","Action":"run","Test":"TestMultiNode/serial/AddNode"} +{"Time":"2023-05-31T19:02:38.512617195Z","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":"=== RUN TestMultiNode/serial/AddNode\n"} +{"Time":"2023-05-31T19:02:38.512626184Z","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:110: (dbg) Run: out/minikube-linux-amd64 node add -p multinode-155596 -v 3 --alsologtostderr\n"} +{"Time":"2023-05-31T19:02:42.830533637Z","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":"E0531 19:02:42.830469 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:03:04.397763817Z","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":"E0531 19:03:04.397676 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:03:25.287895147Z","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:110: (dbg) Done: out/minikube-linux-amd64 node add -p multinode-155596 -v 3 --alsologtostderr: (46.77516591s)\n"} +{"Time":"2023-05-31T19:03:25.2879247Z","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:116: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status --alsologtostderr\n"} +{"Time":"2023-05-31T19:03:25.84252614Z","Action":"run","Test":"TestMultiNode/serial/ProfileList"} +{"Time":"2023-05-31T19:03:25.842556257Z","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":"=== RUN TestMultiNode/serial/ProfileList\n"} +{"Time":"2023-05-31T19:03:25.842565091Z","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" multinode_test.go:132: (dbg) Run: out/minikube-linux-amd64 profile list --output json\n"} +{"Time":"2023-05-31T19:03:26.05851734Z","Action":"run","Test":"TestMultiNode/serial/CopyFile"} +{"Time":"2023-05-31T19:03:26.058538617Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":"=== RUN TestMultiNode/serial/CopyFile\n"} +{"Time":"2023-05-31T19:03:26.058545219Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" multinode_test.go:173: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status --output json --alsologtostderr\n"} +{"Time":"2023-05-31T19:03:26.618760475Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp testdata/cp-test.txt multinode-155596:/home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T19:03:26.823607571Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:27.008379384Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596:/home/docker/cp-test.txt /tmp/TestMultiNodeserialCopyFile735312601/001/cp-test_multinode-155596.txt\n"} +{"Time":"2023-05-31T19:03:27.190158526Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:27.379169567Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596:/home/docker/cp-test.txt multinode-155596-m02:/home/docker/cp-test_multinode-155596_multinode-155596-m02.txt\n"} +{"Time":"2023-05-31T19:03:27.683067472Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:27.872810494Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m02 \"sudo cat /home/docker/cp-test_multinode-155596_multinode-155596-m02.txt\"\n"} +{"Time":"2023-05-31T19:03:28.061002425Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596:/home/docker/cp-test.txt multinode-155596-m03:/home/docker/cp-test_multinode-155596_multinode-155596-m03.txt\n"} +{"Time":"2023-05-31T19:03:28.363601148Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:28.561059249Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m03 \"sudo cat /home/docker/cp-test_multinode-155596_multinode-155596-m03.txt\"\n"} +{"Time":"2023-05-31T19:03:28.752616694Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp testdata/cp-test.txt multinode-155596-m02:/home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T19:03:28.950534785Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m02 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:29.140121716Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596-m02:/home/docker/cp-test.txt /tmp/TestMultiNodeserialCopyFile735312601/001/cp-test_multinode-155596-m02.txt\n"} +{"Time":"2023-05-31T19:03:29.325283241Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m02 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:29.512536715Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596-m02:/home/docker/cp-test.txt multinode-155596:/home/docker/cp-test_multinode-155596-m02_multinode-155596.txt\n"} +{"Time":"2023-05-31T19:03:29.819921488Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m02 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:30.006541747Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596 \"sudo cat /home/docker/cp-test_multinode-155596-m02_multinode-155596.txt\"\n"} +{"Time":"2023-05-31T19:03:30.196857072Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596-m02:/home/docker/cp-test.txt multinode-155596-m03:/home/docker/cp-test_multinode-155596-m02_multinode-155596-m03.txt\n"} +{"Time":"2023-05-31T19:03:30.504845798Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m02 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:30.690727921Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m03 \"sudo cat /home/docker/cp-test_multinode-155596-m02_multinode-155596-m03.txt\"\n"} +{"Time":"2023-05-31T19:03:30.8832078Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp testdata/cp-test.txt multinode-155596-m03:/home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T19:03:31.083458006Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m03 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:31.272303807Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596-m03:/home/docker/cp-test.txt /tmp/TestMultiNodeserialCopyFile735312601/001/cp-test_multinode-155596-m03.txt\n"} +{"Time":"2023-05-31T19:03:31.465351493Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m03 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:31.656236677Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596-m03:/home/docker/cp-test.txt multinode-155596:/home/docker/cp-test_multinode-155596-m03_multinode-155596.txt\n"} +{"Time":"2023-05-31T19:03:31.962053463Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m03 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:32.151088494Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596 \"sudo cat /home/docker/cp-test_multinode-155596-m03_multinode-155596.txt\"\n"} +{"Time":"2023-05-31T19:03:32.335267928Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:556: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 cp multinode-155596-m03:/home/docker/cp-test.txt multinode-155596-m02:/home/docker/cp-test_multinode-155596-m03_multinode-155596-m02.txt\n"} +{"Time":"2023-05-31T19:03:32.643236883Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m03 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T19:03:32.835841813Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:534: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 ssh -n multinode-155596-m02 \"sudo cat /home/docker/cp-test_multinode-155596-m03_multinode-155596-m02.txt\"\n"} +{"Time":"2023-05-31T19:03:33.019107824Z","Action":"run","Test":"TestMultiNode/serial/StopNode"} +{"Time":"2023-05-31T19:03:33.019131123Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":"=== RUN TestMultiNode/serial/StopNode\n"} +{"Time":"2023-05-31T19:03:33.019137345Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:210: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 node stop m03\n"} +{"Time":"2023-05-31T19:03:34.30684404Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:210: (dbg) Done: out/minikube-linux-amd64 -p multinode-155596 node stop m03: (1.287647593s)\n"} +{"Time":"2023-05-31T19:03:34.306871402Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:216: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status\n"} +{"Time":"2023-05-31T19:03:34.711040981Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:216: (dbg) Non-zero exit: out/minikube-linux-amd64 -p multinode-155596 status: exit status 7 (404.085477ms)\n"} +{"Time":"2023-05-31T19:03:34.711074087Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T19:03:34.711080687Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:03:34.71108449Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-155596\n"} +{"Time":"2023-05-31T19:03:34.711087653Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T19:03:34.711090689Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Running\n"} +{"Time":"2023-05-31T19:03:34.711094315Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Running\n"} +{"Time":"2023-05-31T19:03:34.711097198Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tapiserver: Running\n"} +{"Time":"2023-05-31T19:03:34.71110026Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubeconfig: Configured\n"} +{"Time":"2023-05-31T19:03:34.711102884Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T19:03:34.711105953Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-155596-m02\n"} +{"Time":"2023-05-31T19:03:34.711108733Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T19:03:34.711111605Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Running\n"} +{"Time":"2023-05-31T19:03:34.711114601Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Running\n"} +{"Time":"2023-05-31T19:03:34.711117521Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T19:03:34.711120293Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-155596-m03\n"} +{"Time":"2023-05-31T19:03:34.711123895Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T19:03:34.711126775Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T19:03:34.711130397Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T19:03:34.711133548Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T19:03:34.7111364Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T19:03:34.711139004Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:03:34.711144473Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:223: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status --alsologtostderr\n"} +{"Time":"2023-05-31T19:03:35.122408551Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:223: (dbg) Non-zero exit: out/minikube-linux-amd64 -p multinode-155596 status --alsologtostderr: exit status 7 (410.661358ms)\n"} +{"Time":"2023-05-31T19:03:35.122433554Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T19:03:35.122438975Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:03:35.122442731Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-155596\n"} +{"Time":"2023-05-31T19:03:35.122445974Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T19:03:35.122455027Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Running\n"} +{"Time":"2023-05-31T19:03:35.122457914Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Running\n"} +{"Time":"2023-05-31T19:03:35.122461777Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tapiserver: Running\n"} +{"Time":"2023-05-31T19:03:35.122464819Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubeconfig: Configured\n"} +{"Time":"2023-05-31T19:03:35.122467756Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T19:03:35.122470757Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-155596-m02\n"} +{"Time":"2023-05-31T19:03:35.122476721Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T19:03:35.122479426Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Running\n"} +{"Time":"2023-05-31T19:03:35.122481923Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Running\n"} +{"Time":"2023-05-31T19:03:35.122484688Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T19:03:35.122487877Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-155596-m03\n"} +{"Time":"2023-05-31T19:03:35.122490693Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T19:03:35.122493648Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T19:03:35.122506194Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T19:03:35.122509917Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T19:03:35.122515051Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T19:03:35.122517619Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:03:35.122520572Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:03:35.122524121Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.744421 31732 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T19:03:35.122527546Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.744518 31732 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T19:03:35.122531697Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.744526 31732 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T19:03:35.122541405Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.744531 31732 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T19:03:35.122545902Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.744661 31732 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T19:03:35.12255032Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.744815 31732 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T19:03:35.122554047Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.744841 31732 mustload.go:65] Loading cluster: multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.122557603Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.744950 31732 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T19:03:35.122561269Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.745301 31732 config.go:182] Loaded profile config \"multinode-155596\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T19:03:35.12256563Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.745319 31732 status.go:255] checking status of multinode-155596 ...\n"} +{"Time":"2023-05-31T19:03:35.122570693Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.745726 31732 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:03:35.122574472Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.745768 31732 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:03:35.122578463Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.759945 31732 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:40827\n"} +{"Time":"2023-05-31T19:03:35.122582104Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.760361 31732 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:03:35.122585963Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.760861 31732 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:03:35.122589587Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.760887 31732 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:03:35.122593112Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.761317 31732 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:03:35.12259604Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.761511 31732 main.go:141] libmachine: (multinode-155596) Calling .GetState\n"} +{"Time":"2023-05-31T19:03:35.122599296Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.763100 31732 status.go:330] multinode-155596 host status = \"Running\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T19:03:35.122603465Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.763118 31732 host.go:66] Checking if \"multinode-155596\" exists ...\n"} +{"Time":"2023-05-31T19:03:35.122607587Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.763384 31732 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:03:35.12261142Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.763418 31732 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:03:35.122614866Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.779007 31732 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:41949\n"} +{"Time":"2023-05-31T19:03:35.122618432Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.779363 31732 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:03:35.122622316Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.779841 31732 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:03:35.122625675Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.779855 31732 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:03:35.122629428Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.780155 31732 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:03:35.122633083Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.780338 31732 main.go:141] libmachine: (multinode-155596) Calling .GetIP\n"} +{"Time":"2023-05-31T19:03:35.122637961Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.783004 31732 main.go:141] libmachine: (multinode-155596) DBG | domain multinode-155596 has defined MAC address 52:54:00:2b:ea:d0 in network mk-multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.12264297Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.783416 31732 main.go:141] libmachine: (multinode-155596) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:2b:ea:d0\", ip: \"\"} in network mk-multinode-155596: {Iface:virbr1 ExpiryTime:2023-05-31 20:00:48 +0000 UTC Type:0 Mac:52:54:00:2b:ea:d0 Iaid: IPaddr:192.168.39.209 Prefix:24 Hostname:multinode-155596 Clientid:01:52:54:00:2b:ea:d0}\n"} +{"Time":"2023-05-31T19:03:35.122649069Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.783441 31732 main.go:141] libmachine: (multinode-155596) DBG | domain multinode-155596 has defined IP address 192.168.39.209 and MAC address 52:54:00:2b:ea:d0 in network mk-multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.122653246Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.783571 31732 host.go:66] Checking if \"multinode-155596\" exists ...\n"} +{"Time":"2023-05-31T19:03:35.122657236Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.783865 31732 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:03:35.122661393Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.783904 31732 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:03:35.12266518Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.797030 31732 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:36933\n"} +{"Time":"2023-05-31T19:03:35.122668653Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.797329 31732 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:03:35.122672183Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.797694 31732 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:03:35.122681708Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.797713 31732 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:03:35.122687273Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.798007 31732 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:03:35.122690847Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.798223 31732 main.go:141] libmachine: (multinode-155596) Calling .DriverName\n"} +{"Time":"2023-05-31T19:03:35.122694503Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.798398 31732 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T19:03:35.122702474Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.798429 31732 main.go:141] libmachine: (multinode-155596) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:03:35.122706368Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.801065 31732 main.go:141] libmachine: (multinode-155596) DBG | domain multinode-155596 has defined MAC address 52:54:00:2b:ea:d0 in network mk-multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.122711165Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.801485 31732 main.go:141] libmachine: (multinode-155596) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:2b:ea:d0\", ip: \"\"} in network mk-multinode-155596: {Iface:virbr1 ExpiryTime:2023-05-31 20:00:48 +0000 UTC Type:0 Mac:52:54:00:2b:ea:d0 Iaid: IPaddr:192.168.39.209 Prefix:24 Hostname:multinode-155596 Clientid:01:52:54:00:2b:ea:d0}\n"} +{"Time":"2023-05-31T19:03:35.122716577Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.801510 31732 main.go:141] libmachine: (multinode-155596) DBG | domain multinode-155596 has defined IP address 192.168.39.209 and MAC address 52:54:00:2b:ea:d0 in network mk-multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.122719926Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.801581 31732 main.go:141] libmachine: (multinode-155596) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:03:35.122725693Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.801848 31732 main.go:141] libmachine: (multinode-155596) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:03:35.122729478Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.801987 31732 main.go:141] libmachine: (multinode-155596) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:03:35.122732967Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.802140 31732 sshutil.go:53] new ssh client: \u0026{IP:192.168.39.209 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/multinode-155596/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T19:03:35.122736795Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.888938 31732 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T19:03:35.122740291Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.897411 31732 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T19:03:35.1227444Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.914151 31732 kubeconfig.go:92] found \"multinode-155596\" server: \"https://192.168.39.209:8443\"\n"} +{"Time":"2023-05-31T19:03:35.122750912Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.914172 31732 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:03:35.122754542Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.914195 31732 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:03:35.122758455Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.928807 31732 ssh_runner.go:195] Run: sudo egrep ^[0-9]+:freezer: /proc/1062/cgroup\n"} +{"Time":"2023-05-31T19:03:35.122762153Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.938702 31732 api_server.go:182] apiserver freezer: \"9:freezer:/kubepods/burstable/pod55bf39a2ba229889a0e9405cf773fb0a/0d9f7b4efeb6b4a26eba18dd6c8a9e02db7bd8d50cc79453807a1e0c95bad27e\"\n"} +{"Time":"2023-05-31T19:03:35.122766848Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.938734 31732 ssh_runner.go:195] Run: sudo cat /sys/fs/cgroup/freezer/kubepods/burstable/pod55bf39a2ba229889a0e9405cf773fb0a/0d9f7b4efeb6b4a26eba18dd6c8a9e02db7bd8d50cc79453807a1e0c95bad27e/freezer.state\n"} +{"Time":"2023-05-31T19:03:35.122770812Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.949071 31732 api_server.go:204] freezer state: \"THAWED\"\n"} +{"Time":"2023-05-31T19:03:35.122774404Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.949085 31732 api_server.go:253] Checking apiserver healthz at https://192.168.39.209:8443/healthz ...\n"} +{"Time":"2023-05-31T19:03:35.122779736Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.955205 31732 api_server.go:279] https://192.168.39.209:8443/healthz returned 200:\n"} +{"Time":"2023-05-31T19:03:35.122783356Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tok\n"} +{"Time":"2023-05-31T19:03:35.122787331Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.955222 31732 status.go:421] multinode-155596 apiserver status = Running (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T19:03:35.122791576Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.955236 31732 status.go:257] multinode-155596 status: \u0026{Name:multinode-155596 Host:Running Kubelet:Running APIServer:Running Kubeconfig:Configured Worker:false TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T19:03:35.12279549Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.955254 31732 status.go:255] checking status of multinode-155596-m02 ...\n"} +{"Time":"2023-05-31T19:03:35.12279974Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.955496 31732 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:03:35.122803545Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.955516 31732 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:03:35.122807192Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.969121 31732 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:40251\n"} +{"Time":"2023-05-31T19:03:35.122810973Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.969418 31732 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:03:35.122814387Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.969869 31732 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:03:35.122817922Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.969885 31732 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:03:35.122821632Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.970156 31732 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:03:35.122825244Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.970337 31732 main.go:141] libmachine: (multinode-155596-m02) Calling .GetState\n"} +{"Time":"2023-05-31T19:03:35.122829413Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.971749 31732 status.go:330] multinode-155596-m02 host status = \"Running\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T19:03:35.122837609Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.971765 31732 host.go:66] Checking if \"multinode-155596-m02\" exists ...\n"} +{"Time":"2023-05-31T19:03:35.122841754Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.972012 31732 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:03:35.122845202Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.972051 31732 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:03:35.122848994Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.985419 31732 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:44463\n"} +{"Time":"2023-05-31T19:03:35.122854417Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.985703 31732 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:03:35.122857866Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.986070 31732 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:03:35.122861339Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.986096 31732 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:03:35.122865467Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.986368 31732 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:03:35.122868939Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.986518 31732 main.go:141] libmachine: (multinode-155596-m02) Calling .GetIP\n"} +{"Time":"2023-05-31T19:03:35.122877199Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.988696 31732 main.go:141] libmachine: (multinode-155596-m02) DBG | domain multinode-155596-m02 has defined MAC address 52:54:00:f2:b4:fd in network mk-multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.12288179Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.989035 31732 main.go:141] libmachine: (multinode-155596-m02) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:f2:b4:fd\", ip: \"\"} in network mk-multinode-155596: {Iface:virbr1 ExpiryTime:2023-05-31 20:02:02 +0000 UTC Type:0 Mac:52:54:00:f2:b4:fd Iaid: IPaddr:192.168.39.116 Prefix:24 Hostname:multinode-155596-m02 Clientid:01:52:54:00:f2:b4:fd}\n"} +{"Time":"2023-05-31T19:03:35.122894411Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.989072 31732 main.go:141] libmachine: (multinode-155596-m02) DBG | domain multinode-155596-m02 has defined IP address 192.168.39.116 and MAC address 52:54:00:f2:b4:fd in network mk-multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.122898479Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.989168 31732 host.go:66] Checking if \"multinode-155596-m02\" exists ...\n"} +{"Time":"2023-05-31T19:03:35.122902554Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.989422 31732 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:03:35.122906216Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:34.989473 31732 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:03:35.122910106Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.002003 31732 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:33539\n"} +{"Time":"2023-05-31T19:03:35.122913126Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.002340 31732 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:03:35.122916703Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.002728 31732 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:03:35.122920299Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.002755 31732 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:03:35.122923786Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.003040 31732 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:03:35.122927627Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.003191 31732 main.go:141] libmachine: (multinode-155596-m02) Calling .DriverName\n"} +{"Time":"2023-05-31T19:03:35.122931655Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.003356 31732 ssh_runner.go:195] Run: sh -c \"df -h /var | awk 'NR==2{print $5}'\"\n"} +{"Time":"2023-05-31T19:03:35.12293796Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.003373 31732 main.go:141] libmachine: (multinode-155596-m02) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:03:35.122942093Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.005861 31732 main.go:141] libmachine: (multinode-155596-m02) DBG | domain multinode-155596-m02 has defined MAC address 52:54:00:f2:b4:fd in network mk-multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.122954882Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.006245 31732 main.go:141] libmachine: (multinode-155596-m02) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:f2:b4:fd\", ip: \"\"} in network mk-multinode-155596: {Iface:virbr1 ExpiryTime:2023-05-31 20:02:02 +0000 UTC Type:0 Mac:52:54:00:f2:b4:fd Iaid: IPaddr:192.168.39.116 Prefix:24 Hostname:multinode-155596-m02 Clientid:01:52:54:00:f2:b4:fd}\n"} +{"Time":"2023-05-31T19:03:35.122959395Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.006274 31732 main.go:141] libmachine: (multinode-155596-m02) DBG | domain multinode-155596-m02 has defined IP address 192.168.39.116 and MAC address 52:54:00:f2:b4:fd in network mk-multinode-155596\n"} +{"Time":"2023-05-31T19:03:35.122964147Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.006390 31732 main.go:141] libmachine: (multinode-155596-m02) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:03:35.122967555Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.006575 31732 main.go:141] libmachine: (multinode-155596-m02) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:03:35.122970887Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.006708 31732 main.go:141] libmachine: (multinode-155596-m02) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:03:35.122974444Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.006834 31732 sshutil.go:53] new ssh client: \u0026{IP:192.168.39.116 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/multinode-155596-m02/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T19:03:35.122978562Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.090959 31732 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T19:03:35.122982845Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.102192 31732 status.go:257] multinode-155596-m02 status: \u0026{Name:multinode-155596-m02 Host:Running Kubelet:Running APIServer:Irrelevant Kubeconfig:Irrelevant Worker:true TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T19:03:35.122986442Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.102211 31732 status.go:255] checking status of multinode-155596-m03 ...\n"} +{"Time":"2023-05-31T19:03:35.122990542Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.102472 31732 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:03:35.122994402Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.102511 31732 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:03:35.122999667Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.116196 31732 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:37679\n"} +{"Time":"2023-05-31T19:03:35.123003355Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.116524 31732 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:03:35.123006757Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.117028 31732 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:03:35.123015179Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.117046 31732 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:03:35.123018752Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.117339 31732 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:03:35.12302254Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.117519 31732 main.go:141] libmachine: (multinode-155596-m03) Calling .GetState\n"} +{"Time":"2023-05-31T19:03:35.123026264Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.118903 31732 status.go:330] multinode-155596-m03 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T19:03:35.123029889Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.118918 31732 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T19:03:35.123033942Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 19:03:35.118925 31732 status.go:257] multinode-155596-m03 status: \u0026{Name:multinode-155596-m03 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:true TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T19:03:35.123041665Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T19:03:35.123044874Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:03:35.123053835Z","Action":"run","Test":"TestMultiNode/serial/StartAfterStop"} +{"Time":"2023-05-31T19:03:35.123057719Z","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":"=== RUN TestMultiNode/serial/StartAfterStop\n"} +{"Time":"2023-05-31T19:03:35.123061465Z","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:254: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 node start m03 --alsologtostderr\n"} +{"Time":"2023-05-31T19:04:42.388733558Z","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:254: (dbg) Done: out/minikube-linux-amd64 -p multinode-155596 node start m03 --alsologtostderr: (1m7.266143267s)\n"} +{"Time":"2023-05-31T19:04:42.388766092Z","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:261: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status\n"} +{"Time":"2023-05-31T19:04:42.938928265Z","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:275: (dbg) Run: kubectl get nodes\n"} +{"Time":"2023-05-31T19:04:42.996462094Z","Action":"run","Test":"TestMultiNode/serial/RestartKeepsNodes"} +{"Time":"2023-05-31T19:04:42.996483853Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"=== RUN TestMultiNode/serial/RestartKeepsNodes\n"} +{"Time":"2023-05-31T19:04:42.996495127Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:283: (dbg) Run: out/minikube-linux-amd64 node list -p multinode-155596\n"} +{"Time":"2023-05-31T19:04:43.034415402Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:290: (dbg) Run: out/minikube-linux-amd64 stop -p multinode-155596\n"} +{"Time":"2023-05-31T19:05:20.552923018Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:05:20.552840 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:05:48.23893831Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:05:48.238878 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:06:08.276718569Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:06:08.276656 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:07:15.148955135Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:07:15.148793 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:07:31.321309591Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:07:31.321215 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:07:48.018635891Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:290: (dbg) Done: out/minikube-linux-amd64 stop -p multinode-155596: (3m4.984144986s)\n"} +{"Time":"2023-05-31T19:07:48.018661193Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:295: (dbg) Run: out/minikube-linux-amd64 start -p multinode-155596 --wait=true -v=8 --alsologtostderr\n"} +{"Time":"2023-05-31T19:10:20.552103314Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:10:20.551991 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:11:08.276572316Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:11:08.276467 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:12:15.147544239Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:12:15.147478 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:13:38.190755678Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"E0531 19:13:38.190648 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:14:41.216155338Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:295: (dbg) Done: out/minikube-linux-amd64 start -p multinode-155596 --wait=true -v=8 --alsologtostderr: (6m53.197157643s)\n"} +{"Time":"2023-05-31T19:14:41.216301046Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:300: (dbg) Run: out/minikube-linux-amd64 node list -p multinode-155596\n"} +{"Time":"2023-05-31T19:14:41.255308706Z","Action":"run","Test":"TestMultiNode/serial/DeleteNode"} +{"Time":"2023-05-31T19:14:41.255328898Z","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":"=== RUN TestMultiNode/serial/DeleteNode\n"} +{"Time":"2023-05-31T19:14:41.255335111Z","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:394: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 node delete m03\n"} +{"Time":"2023-05-31T19:14:42.700418579Z","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:394: (dbg) Done: out/minikube-linux-amd64 -p multinode-155596 node delete m03: (1.444980711s)\n"} +{"Time":"2023-05-31T19:14:42.700442499Z","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:400: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status --alsologtostderr\n"} +{"Time":"2023-05-31T19:14:43.108135524Z","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:424: (dbg) Run: kubectl get nodes\n"} +{"Time":"2023-05-31T19:14:43.163024367Z","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:432: (dbg) Run: kubectl get nodes -o \"go-template='{{range .items}}{{range .status.conditions}}{{if eq .type \"Ready\"}} {{.status}}{{\"\\n\"}}{{end}}{{end}}{{end}}'\"\n"} +{"Time":"2023-05-31T19:14:43.221857277Z","Action":"run","Test":"TestMultiNode/serial/StopMultiNode"} +{"Time":"2023-05-31T19:14:43.221882475Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":"=== RUN TestMultiNode/serial/StopMultiNode\n"} +{"Time":"2023-05-31T19:14:43.221890883Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:314: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 stop\n"} +{"Time":"2023-05-31T19:15:20.553591481Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":"E0531 19:15:20.553393 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:16:08.276509546Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":"E0531 19:16:08.276414 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:16:43.601014997Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":"E0531 19:16:43.600796 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:17:15.150011816Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":"E0531 19:17:15.149932 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:17:46.396400439Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:314: (dbg) Done: out/minikube-linux-amd64 -p multinode-155596 stop: (3m3.174442119s)\n"} +{"Time":"2023-05-31T19:17:46.396424126Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:320: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status\n"} +{"Time":"2023-05-31T19:17:46.47567219Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:320: (dbg) Non-zero exit: out/minikube-linux-amd64 -p multinode-155596 status: exit status 7 (79.171809ms)\n"} +{"Time":"2023-05-31T19:17:46.47569383Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T19:17:46.475728568Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:17:46.475732744Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-155596\n"} +{"Time":"2023-05-31T19:17:46.475735672Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T19:17:46.475738666Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T19:17:46.475742224Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T19:17:46.475745735Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T19:17:46.475748802Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T19:17:46.475752228Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T19:17:46.475755517Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-155596-m02\n"} +{"Time":"2023-05-31T19:17:46.475764549Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T19:17:46.475767539Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T19:17:46.475770433Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T19:17:46.475773628Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T19:17:46.475776788Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T19:17:46.475780031Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:17:46.475783614Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:327: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status --alsologtostderr\n"} +{"Time":"2023-05-31T19:17:46.545035603Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:327: (dbg) Non-zero exit: out/minikube-linux-amd64 -p multinode-155596 status --alsologtostderr: exit status 7 (69.182972ms)\n"} +{"Time":"2023-05-31T19:17:46.545058067Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T19:17:46.545062596Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:17:46.545066965Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-155596\n"} +{"Time":"2023-05-31T19:17:46.545070458Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T19:17:46.545073937Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T19:17:46.545081953Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T19:17:46.545085101Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T19:17:46.545087883Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T19:17:46.545090882Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T19:17:46.545094425Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-155596-m02\n"} +{"Time":"2023-05-31T19:17:46.545097436Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Worker\n"} +{"Time":"2023-05-31T19:17:46.545116357Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T19:17:46.545119645Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T19:17:46.545122173Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T19:17:46.545124783Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T19:17:46.545127801Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:17:46.54513076Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:17:46.545133868Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.508039 35237 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T19:17:46.54513728Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.508447 35237 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T19:17:46.54514049Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.508498 35237 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T19:17:46.545144222Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.508520 35237 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T19:17:46.545148723Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.508845 35237 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T19:17:46.545156647Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.509344 35237 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T19:17:46.54516114Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.509372 35237 mustload.go:65] Loading cluster: multinode-155596\n"} +{"Time":"2023-05-31T19:17:46.545165071Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.509416 35237 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T19:17:46.545168578Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.509864 35237 config.go:182] Loaded profile config \"multinode-155596\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T19:17:46.545172785Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.509885 35237 status.go:255] checking status of multinode-155596 ...\n"} +{"Time":"2023-05-31T19:17:46.545180667Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.510360 35237 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:17:46.545184998Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.510405 35237 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:17:46.545188813Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.523874 35237 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:45627\n"} +{"Time":"2023-05-31T19:17:46.545192769Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.524161 35237 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:17:46.545197014Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.524771 35237 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:17:46.545201733Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.524795 35237 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:17:46.545205733Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.525105 35237 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:17:46.545209562Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.525301 35237 main.go:141] libmachine: (multinode-155596) Calling .GetState\n"} +{"Time":"2023-05-31T19:17:46.545212875Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.526563 35237 status.go:330] multinode-155596 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T19:17:46.54521763Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.526574 35237 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T19:17:46.545221253Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.526578 35237 status.go:257] multinode-155596 status: \u0026{Name:multinode-155596 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:false TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T19:17:46.545225437Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.526591 35237 status.go:255] checking status of multinode-155596-m02 ...\n"} +{"Time":"2023-05-31T19:17:46.545229158Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.526834 35237 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:17:46.545233162Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.526864 35237 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:17:46.545236847Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.539835 35237 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:42585\n"} +{"Time":"2023-05-31T19:17:46.545240823Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.540168 35237 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:17:46.545244323Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.540531 35237 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:17:46.545247574Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.540570 35237 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:17:46.545251399Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.540871 35237 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:17:46.545255738Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.541003 35237 main.go:141] libmachine: (multinode-155596-m02) Calling .GetState\n"} +{"Time":"2023-05-31T19:17:46.545259315Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.542279 35237 status.go:330] multinode-155596-m02 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T19:17:46.545263963Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.542290 35237 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T19:17:46.545270086Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 19:17:46.542294 35237 status.go:257] multinode-155596-m02 status: \u0026{Name:multinode-155596-m02 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:true TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T19:17:46.545273932Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T19:17:46.545277123Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:17:46.545289574Z","Action":"run","Test":"TestMultiNode/serial/RestartMultiNode"} +{"Time":"2023-05-31T19:17:46.545293969Z","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"=== RUN TestMultiNode/serial/RestartMultiNode\n"} +{"Time":"2023-05-31T19:17:46.545297964Z","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:354: (dbg) Run: out/minikube-linux-amd64 start -p multinode-155596 --wait=true -v=8 --alsologtostderr --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:20:20.552983494Z","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"E0531 19:20:20.552883 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:21:04.687679765Z","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:354: (dbg) Done: out/minikube-linux-amd64 start -p multinode-155596 --wait=true -v=8 --alsologtostderr --driver=kvm2 --container-runtime=containerd: (3m18.142452147s)\n"} +{"Time":"2023-05-31T19:21:04.687708149Z","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:360: (dbg) Run: out/minikube-linux-amd64 -p multinode-155596 status --alsologtostderr\n"} +{"Time":"2023-05-31T19:21:05.092119314Z","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:374: (dbg) Run: kubectl get nodes\n"} +{"Time":"2023-05-31T19:21:05.152252339Z","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:382: (dbg) Run: kubectl get nodes -o \"go-template='{{range .items}}{{range .status.conditions}}{{if eq .type \"Ready\"}} {{.status}}{{\"\\n\"}}{{end}}{{end}}{{end}}'\"\n"} +{"Time":"2023-05-31T19:21:05.209253193Z","Action":"run","Test":"TestMultiNode/serial/ValidateNameConflict"} +{"Time":"2023-05-31T19:21:05.209286748Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":"=== RUN TestMultiNode/serial/ValidateNameConflict\n"} +{"Time":"2023-05-31T19:21:05.209295018Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:443: (dbg) Run: out/minikube-linux-amd64 node list -p multinode-155596\n"} +{"Time":"2023-05-31T19:21:05.246174561Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:452: (dbg) Run: out/minikube-linux-amd64 start -p multinode-155596-m02 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:21:05.304596253Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:452: (dbg) Non-zero exit: out/minikube-linux-amd64 start -p multinode-155596-m02 --driver=kvm2 --container-runtime=containerd: exit status 14 (58.324869ms)\n"} +{"Time":"2023-05-31T19:21:05.304621906Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T19:21:05.304627479Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:21:05.304632376Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* [multinode-155596-m02] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T19:21:05.304636393Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T19:21:05.304640367Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T19:21:05.304644228Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T19:21:05.304648098Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T19:21:05.304666471Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T19:21:05.304674338Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T19:21:05.30467853Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T19:21:05.304682341Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T19:21:05.30468566Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T19:21:05.304689237Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:21:05.304695387Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:21:05.30470302Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t! Profile name 'multinode-155596-m02' is duplicated with machine name 'multinode-155596-m02' in profile 'multinode-155596'\n"} +{"Time":"2023-05-31T19:21:05.304707429Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tX Exiting due to MK_USAGE: Profile name should be unique\n"} +{"Time":"2023-05-31T19:21:05.304710907Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T19:21:05.304714193Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:21:05.304717624Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:460: (dbg) Run: out/minikube-linux-amd64 start -p multinode-155596-m03 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:21:08.276193268Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":"E0531 19:21:08.276116 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:22:01.752895128Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:460: (dbg) Done: out/minikube-linux-amd64 start -p multinode-155596-m03 --driver=kvm2 --container-runtime=containerd: (56.448258515s)\n"} +{"Time":"2023-05-31T19:22:01.752919923Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:467: (dbg) Run: out/minikube-linux-amd64 node add -p multinode-155596\n"} +{"Time":"2023-05-31T19:22:01.96187627Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:467: (dbg) Non-zero exit: out/minikube-linux-amd64 node add -p multinode-155596: exit status 80 (208.825007ms)\n"} +{"Time":"2023-05-31T19:22:01.961904371Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T19:22:01.961910128Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:22:01.961914186Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Adding node m03 to cluster multinode-155596\n"} +{"Time":"2023-05-31T19:22:01.96191842Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T19:22:01.961921763Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T19:22:01.961925113Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T19:22:01.961928503Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:22:01.961932327Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:22:01.961935934Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tX Exiting due to GUEST_NODE_ADD: failed to add node: Node multinode-155596-m03 already exists in multinode-155596-m03 profile\n"} +{"Time":"2023-05-31T19:22:01.961939799Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* \n"} +{"Time":"2023-05-31T19:22:01.96194344Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T19:22:01.961950413Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T19:22:01.961954582Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T19:22:01.961957756Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T19:22:01.961961139Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T19:22:01.961964497Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T19:22:01.961968116Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T19:22:01.961972581Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * - /tmp/minikube_node_040ea7097fd6ed71e65be9a474587f81f0ccd21d_0.log │\n"} +{"Time":"2023-05-31T19:22:01.961976348Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T19:22:01.961980563Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T19:22:01.961984966Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T19:22:01.961988553Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:22:01.961991862Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:472: (dbg) Run: out/minikube-linux-amd64 delete -p multinode-155596-m03\n"} +{"Time":"2023-05-31T19:22:02.907826254Z","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:175: Cleaning up \"multinode-155596\" profile ...\n"} +{"Time":"2023-05-31T19:22:02.907861431Z","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p multinode-155596\n"} +{"Time":"2023-05-31T19:22:05.068507562Z","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p multinode-155596: (2.160596543s)\n"} +{"Time":"2023-05-31T19:22:05.068585302Z","Action":"output","Test":"TestMultiNode","Output":"--- PASS: TestMultiNode (1292.42s)\n"} +{"Time":"2023-05-31T19:22:05.068593298Z","Action":"output","Test":"TestMultiNode/serial","Output":" --- PASS: TestMultiNode/serial (1290.26s)\n"} +{"Time":"2023-05-31T19:22:05.068598588Z","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" --- PASS: TestMultiNode/serial/FreshStart2Nodes (121.17s)\n"} +{"Time":"2023-05-31T19:22:05.068615132Z","Action":"pass","Test":"TestMultiNode/serial/FreshStart2Nodes","Elapsed":121.17} +{"Time":"2023-05-31T19:22:05.06862193Z","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" --- PASS: TestMultiNode/serial/DeployApp2Nodes (3.90s)\n"} +{"Time":"2023-05-31T19:22:05.068624562Z","Action":"pass","Test":"TestMultiNode/serial/DeployApp2Nodes","Elapsed":3.9} +{"Time":"2023-05-31T19:22:05.068631175Z","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" --- PASS: TestMultiNode/serial/PingHostFrom2Pods (0.80s)\n"} +{"Time":"2023-05-31T19:22:05.068635378Z","Action":"pass","Test":"TestMultiNode/serial/PingHostFrom2Pods","Elapsed":0.8} +{"Time":"2023-05-31T19:22:05.06863884Z","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" --- PASS: TestMultiNode/serial/AddNode (47.33s)\n"} +{"Time":"2023-05-31T19:22:05.06864316Z","Action":"pass","Test":"TestMultiNode/serial/AddNode","Elapsed":47.33} +{"Time":"2023-05-31T19:22:05.068647173Z","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" --- PASS: TestMultiNode/serial/ProfileList (0.22s)\n"} +{"Time":"2023-05-31T19:22:05.068651055Z","Action":"pass","Test":"TestMultiNode/serial/ProfileList","Elapsed":0.22} +{"Time":"2023-05-31T19:22:05.068654273Z","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" --- PASS: TestMultiNode/serial/CopyFile (6.96s)\n"} +{"Time":"2023-05-31T19:22:05.068657914Z","Action":"pass","Test":"TestMultiNode/serial/CopyFile","Elapsed":6.96} +{"Time":"2023-05-31T19:22:05.06866111Z","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" --- PASS: TestMultiNode/serial/StopNode (2.10s)\n"} +{"Time":"2023-05-31T19:22:05.068664424Z","Action":"pass","Test":"TestMultiNode/serial/StopNode","Elapsed":2.1} +{"Time":"2023-05-31T19:22:05.068667464Z","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" --- PASS: TestMultiNode/serial/StartAfterStop (67.87s)\n"} +{"Time":"2023-05-31T19:22:05.06867054Z","Action":"pass","Test":"TestMultiNode/serial/StartAfterStop","Elapsed":67.87} +{"Time":"2023-05-31T19:22:05.068673877Z","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" --- PASS: TestMultiNode/serial/RestartKeepsNodes (598.26s)\n"} +{"Time":"2023-05-31T19:22:05.068676732Z","Action":"pass","Test":"TestMultiNode/serial/RestartKeepsNodes","Elapsed":598.26} +{"Time":"2023-05-31T19:22:05.068682383Z","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" --- PASS: TestMultiNode/serial/DeleteNode (1.97s)\n"} +{"Time":"2023-05-31T19:22:05.068685961Z","Action":"pass","Test":"TestMultiNode/serial/DeleteNode","Elapsed":1.97} +{"Time":"2023-05-31T19:22:05.068692105Z","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" --- PASS: TestMultiNode/serial/StopMultiNode (183.32s)\n"} +{"Time":"2023-05-31T19:22:05.068695379Z","Action":"pass","Test":"TestMultiNode/serial/StopMultiNode","Elapsed":183.32} +{"Time":"2023-05-31T19:22:05.068697782Z","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" --- PASS: TestMultiNode/serial/RestartMultiNode (198.66s)\n"} +{"Time":"2023-05-31T19:22:05.068701077Z","Action":"pass","Test":"TestMultiNode/serial/RestartMultiNode","Elapsed":198.66} +{"Time":"2023-05-31T19:22:05.068703647Z","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" --- PASS: TestMultiNode/serial/ValidateNameConflict (57.70s)\n"} +{"Time":"2023-05-31T19:22:05.068707895Z","Action":"pass","Test":"TestMultiNode/serial/ValidateNameConflict","Elapsed":57.7} +{"Time":"2023-05-31T19:22:05.068710431Z","Action":"pass","Test":"TestMultiNode/serial","Elapsed":1290.26} +{"Time":"2023-05-31T19:22:05.068713097Z","Action":"pass","Test":"TestMultiNode","Elapsed":1292.42} +{"Time":"2023-05-31T19:22:05.068715973Z","Action":"run","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T19:22:05.068718836Z","Action":"output","Test":"TestNetworkPlugins","Output":"=== RUN TestNetworkPlugins\n"} +{"Time":"2023-05-31T19:22:05.068725352Z","Action":"output","Test":"TestNetworkPlugins","Output":"=== PAUSE TestNetworkPlugins\n"} +{"Time":"2023-05-31T19:22:05.068728333Z","Action":"pause","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T19:22:05.06873079Z","Action":"run","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T19:22:05.068733127Z","Action":"output","Test":"TestNoKubernetes","Output":"=== RUN TestNoKubernetes\n"} +{"Time":"2023-05-31T19:22:05.068736061Z","Action":"output","Test":"TestNoKubernetes","Output":"=== PAUSE TestNoKubernetes\n"} +{"Time":"2023-05-31T19:22:05.068738252Z","Action":"pause","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T19:22:05.068740627Z","Action":"run","Test":"TestChangeNoneUser"} +{"Time":"2023-05-31T19:22:05.06874293Z","Action":"output","Test":"TestChangeNoneUser","Output":"=== RUN TestChangeNoneUser\n"} +{"Time":"2023-05-31T19:22:05.06875782Z","Action":"output","Test":"TestChangeNoneUser","Output":" none_test.go:38: Test requires none driver and SUDO_USER env to not be empty\n"} +{"Time":"2023-05-31T19:22:05.068762226Z","Action":"output","Test":"TestChangeNoneUser","Output":"--- SKIP: TestChangeNoneUser (0.00s)\n"} +{"Time":"2023-05-31T19:22:05.068765619Z","Action":"skip","Test":"TestChangeNoneUser","Elapsed":0} +{"Time":"2023-05-31T19:22:05.068774108Z","Action":"run","Test":"TestPause"} +{"Time":"2023-05-31T19:22:05.068777571Z","Action":"output","Test":"TestPause","Output":"=== RUN TestPause\n"} +{"Time":"2023-05-31T19:22:05.068781704Z","Action":"output","Test":"TestPause","Output":"=== PAUSE TestPause\n"} +{"Time":"2023-05-31T19:22:05.068784799Z","Action":"pause","Test":"TestPause"} +{"Time":"2023-05-31T19:22:05.06878776Z","Action":"run","Test":"TestPreload"} +{"Time":"2023-05-31T19:22:05.068790721Z","Action":"output","Test":"TestPreload","Output":"=== RUN TestPreload\n"} +{"Time":"2023-05-31T19:22:05.068795077Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:44: (dbg) Run: out/minikube-linux-amd64 start -p test-preload-677810 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.24.4\n"} +{"Time":"2023-05-31T19:22:15.147697965Z","Action":"output","Test":"TestPreload","Output":"E0531 19:22:15.147626 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:24:02.081819754Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:44: (dbg) Done: out/minikube-linux-amd64 start -p test-preload-677810 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.24.4: (1m57.012955046s)\n"} +{"Time":"2023-05-31T19:24:02.081854678Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:57: (dbg) Run: out/minikube-linux-amd64 ssh -p test-preload-677810 -- sudo crictl pull gcr.io/k8s-minikube/busybox\n"} +{"Time":"2023-05-31T19:24:02.754944081Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:63: (dbg) Run: out/minikube-linux-amd64 stop -p test-preload-677810\n"} +{"Time":"2023-05-31T19:24:11.322311563Z","Action":"output","Test":"TestPreload","Output":"E0531 19:24:11.322252 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:25:20.55320118Z","Action":"output","Test":"TestPreload","Output":"E0531 19:25:20.553127 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:25:34.208211149Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:63: (dbg) Done: out/minikube-linux-amd64 stop -p test-preload-677810: (1m31.453152943s)\n"} +{"Time":"2023-05-31T19:25:34.208261295Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:71: (dbg) Run: out/minikube-linux-amd64 start -p test-preload-677810 --memory=2200 --alsologtostderr -v=1 --wait=true --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:26:08.275830777Z","Action":"output","Test":"TestPreload","Output":"E0531 19:26:08.275718 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:27:02.162733741Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:71: (dbg) Done: out/minikube-linux-amd64 start -p test-preload-677810 --memory=2200 --alsologtostderr -v=1 --wait=true --driver=kvm2 --container-runtime=containerd: (1m27.954442191s)\n"} +{"Time":"2023-05-31T19:27:02.162773Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:80: (dbg) Run: out/minikube-linux-amd64 ssh -p test-preload-677810 -- sudo crictl image ls\n"} +{"Time":"2023-05-31T19:27:02.384896663Z","Action":"output","Test":"TestPreload","Output":" preload_test.go:85: Expected to find gcr.io/k8s-minikube/busybox in image list output, instead got \n"} +{"Time":"2023-05-31T19:27:02.384928816Z","Action":"output","Test":"TestPreload","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:27:02.384932725Z","Action":"output","Test":"TestPreload","Output":" \tIMAGE TAG IMAGE ID SIZE\n"} +{"Time":"2023-05-31T19:27:02.38493626Z","Action":"output","Test":"TestPreload","Output":" \tdocker.io/kindest/kindnetd v20220726-ed811e41 d921cee849482 25.8MB\n"} +{"Time":"2023-05-31T19:27:02.38493918Z","Action":"output","Test":"TestPreload","Output":" \tgcr.io/k8s-minikube/storage-provisioner v5 6e38f40d628db 9.06MB\n"} +{"Time":"2023-05-31T19:27:02.384941947Z","Action":"output","Test":"TestPreload","Output":" \tk8s.gcr.io/coredns/coredns v1.8.6 a4ca41631cc7a 13.6MB\n"} +{"Time":"2023-05-31T19:27:02.384944381Z","Action":"output","Test":"TestPreload","Output":" \tregistry.k8s.io/coredns/coredns v1.8.6 a4ca41631cc7a 13.6MB\n"} +{"Time":"2023-05-31T19:27:02.384946657Z","Action":"output","Test":"TestPreload","Output":" \tk8s.gcr.io/etcd 3.5.3-0 aebe758cef4cd 102MB\n"} +{"Time":"2023-05-31T19:27:02.38495016Z","Action":"output","Test":"TestPreload","Output":" \tregistry.k8s.io/etcd 3.5.3-0 aebe758cef4cd 102MB\n"} +{"Time":"2023-05-31T19:27:02.384953607Z","Action":"output","Test":"TestPreload","Output":" \tk8s.gcr.io/kube-apiserver v1.24.4 6cab9d1bed1be 33.8MB\n"} +{"Time":"2023-05-31T19:27:02.384957014Z","Action":"output","Test":"TestPreload","Output":" \tregistry.k8s.io/kube-apiserver v1.24.4 6cab9d1bed1be 33.8MB\n"} +{"Time":"2023-05-31T19:27:02.384960463Z","Action":"output","Test":"TestPreload","Output":" \tk8s.gcr.io/kube-controller-manager v1.24.4 1f99cb6da9a82 31MB\n"} +{"Time":"2023-05-31T19:27:02.384964469Z","Action":"output","Test":"TestPreload","Output":" \tregistry.k8s.io/kube-controller-manager v1.24.4 1f99cb6da9a82 31MB\n"} +{"Time":"2023-05-31T19:27:02.384968109Z","Action":"output","Test":"TestPreload","Output":" \tk8s.gcr.io/kube-proxy v1.24.4 7a53d1e08ef58 39.5MB\n"} +{"Time":"2023-05-31T19:27:02.384971819Z","Action":"output","Test":"TestPreload","Output":" \tregistry.k8s.io/kube-proxy v1.24.4 7a53d1e08ef58 39.5MB\n"} +{"Time":"2023-05-31T19:27:02.384975305Z","Action":"output","Test":"TestPreload","Output":" \tk8s.gcr.io/kube-scheduler v1.24.4 03fa22539fc1c 15.5MB\n"} +{"Time":"2023-05-31T19:27:02.384978862Z","Action":"output","Test":"TestPreload","Output":" \tregistry.k8s.io/kube-scheduler v1.24.4 03fa22539fc1c 15.5MB\n"} +{"Time":"2023-05-31T19:27:02.384982268Z","Action":"output","Test":"TestPreload","Output":" \tk8s.gcr.io/pause 3.7 221177c6082a8 311kB\n"} +{"Time":"2023-05-31T19:27:02.384985857Z","Action":"output","Test":"TestPreload","Output":" \tregistry.k8s.io/pause 3.7 221177c6082a8 311kB\n"} +{"Time":"2023-05-31T19:27:02.384989355Z","Action":"output","Test":"TestPreload","Output":" \n"} +{"Time":"2023-05-31T19:27:02.384992849Z","Action":"output","Test":"TestPreload","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:27:02.384998268Z","Action":"output","Test":"TestPreload","Output":" panic.go:522: *** TestPreload FAILED at 2023-05-31 19:27:02.38487495 +0000 UTC m=+2614.700034927\n"} +{"Time":"2023-05-31T19:27:02.385001389Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T19:27:02.385004557Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:239: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p test-preload-677810 -n test-preload-677810\n"} +{"Time":"2023-05-31T19:27:02.617456024Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:244: \u003c\u003c\u003c TestPreload FAILED: start of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T19:27:02.617486717Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:245: ======\u003e post-mortem[TestPreload]: minikube logs \u003c======\n"} +{"Time":"2023-05-31T19:27:02.6174939Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:247: (dbg) Run: out/minikube-linux-amd64 -p test-preload-677810 logs -n 25\n"} +{"Time":"2023-05-31T19:27:03.625162671Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:247: (dbg) Done: out/minikube-linux-amd64 -p test-preload-677810 logs -n 25: (1.007590611s)\n"} +{"Time":"2023-05-31T19:27:03.67322615Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:252: TestPreload logs: \n"} +{"Time":"2023-05-31T19:27:03.673250604Z","Action":"output","Test":"TestPreload","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:27:03.673254902Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.67326125Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T19:27:03.673265605Z","Action":"output","Test":"TestPreload","Output":" \t* |---------|-----------------------------------------------------------------------------------------|----------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T19:27:03.673270088Z","Action":"output","Test":"TestPreload","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T19:27:03.673273744Z","Action":"output","Test":"TestPreload","Output":" \t|---------|-----------------------------------------------------------------------------------------|----------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T19:27:03.673277526Z","Action":"output","Test":"TestPreload","Output":" \t| ssh | multinode-155596 ssh -n | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:03 UTC | 31 May 23 19:03 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673281029Z","Action":"output","Test":"TestPreload","Output":" \t| | multinode-155596-m03 sudo cat | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673284224Z","Action":"output","Test":"TestPreload","Output":" \t| | /home/docker/cp-test.txt | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.67328753Z","Action":"output","Test":"TestPreload","Output":" \t| ssh | multinode-155596 ssh -n multinode-155596 sudo cat | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:03 UTC | 31 May 23 19:03 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673291087Z","Action":"output","Test":"TestPreload","Output":" \t| | /home/docker/cp-test_multinode-155596-m03_multinode-155596.txt | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673295313Z","Action":"output","Test":"TestPreload","Output":" \t| cp | multinode-155596 cp multinode-155596-m03:/home/docker/cp-test.txt | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:03 UTC | 31 May 23 19:03 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673298984Z","Action":"output","Test":"TestPreload","Output":" \t| | multinode-155596-m02:/home/docker/cp-test_multinode-155596-m03_multinode-155596-m02.txt | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673302301Z","Action":"output","Test":"TestPreload","Output":" \t| ssh | multinode-155596 ssh -n | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:03 UTC | 31 May 23 19:03 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673306373Z","Action":"output","Test":"TestPreload","Output":" \t| | multinode-155596-m03 sudo cat | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673325336Z","Action":"output","Test":"TestPreload","Output":" \t| | /home/docker/cp-test.txt | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.67332907Z","Action":"output","Test":"TestPreload","Output":" \t| ssh | multinode-155596 ssh -n multinode-155596-m02 sudo cat | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:03 UTC | 31 May 23 19:03 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673337358Z","Action":"output","Test":"TestPreload","Output":" \t| | /home/docker/cp-test_multinode-155596-m03_multinode-155596-m02.txt | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.67334059Z","Action":"output","Test":"TestPreload","Output":" \t| node | multinode-155596 node stop m03 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:03 UTC | 31 May 23 19:03 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673343807Z","Action":"output","Test":"TestPreload","Output":" \t| node | multinode-155596 node start | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:03 UTC | 31 May 23 19:04 UTC |\n"} +{"Time":"2023-05-31T19:27:03.67334705Z","Action":"output","Test":"TestPreload","Output":" \t| | m03 --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673353379Z","Action":"output","Test":"TestPreload","Output":" \t| node | list -p multinode-155596 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:04 UTC | |\n"} +{"Time":"2023-05-31T19:27:03.673357588Z","Action":"output","Test":"TestPreload","Output":" \t| stop | -p multinode-155596 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:04 UTC | 31 May 23 19:07 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673361597Z","Action":"output","Test":"TestPreload","Output":" \t| start | -p multinode-155596 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:07 UTC | 31 May 23 19:14 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673365252Z","Action":"output","Test":"TestPreload","Output":" \t| | --wait=true -v=8 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673370228Z","Action":"output","Test":"TestPreload","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673374102Z","Action":"output","Test":"TestPreload","Output":" \t| node | list -p multinode-155596 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:14 UTC | |\n"} +{"Time":"2023-05-31T19:27:03.673380919Z","Action":"output","Test":"TestPreload","Output":" \t| node | multinode-155596 node delete | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:14 UTC | 31 May 23 19:14 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673384932Z","Action":"output","Test":"TestPreload","Output":" \t| | m03 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.67338932Z","Action":"output","Test":"TestPreload","Output":" \t| stop | multinode-155596 stop | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:14 UTC | 31 May 23 19:17 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673393309Z","Action":"output","Test":"TestPreload","Output":" \t| start | -p multinode-155596 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:17 UTC | 31 May 23 19:21 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673397148Z","Action":"output","Test":"TestPreload","Output":" \t| | --wait=true -v=8 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.67340133Z","Action":"output","Test":"TestPreload","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.67340535Z","Action":"output","Test":"TestPreload","Output":" \t| | --driver=kvm2 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673409Z","Action":"output","Test":"TestPreload","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673412595Z","Action":"output","Test":"TestPreload","Output":" \t| node | list -p multinode-155596 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:21 UTC | |\n"} +{"Time":"2023-05-31T19:27:03.673416209Z","Action":"output","Test":"TestPreload","Output":" \t| start | -p multinode-155596-m02 | multinode-155596-m02 | jenkins | v1.30.1 | 31 May 23 19:21 UTC | |\n"} +{"Time":"2023-05-31T19:27:03.67341985Z","Action":"output","Test":"TestPreload","Output":" \t| | --driver=kvm2 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673423819Z","Action":"output","Test":"TestPreload","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673428425Z","Action":"output","Test":"TestPreload","Output":" \t| start | -p multinode-155596-m03 | multinode-155596-m03 | jenkins | v1.30.1 | 31 May 23 19:21 UTC | 31 May 23 19:22 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673435428Z","Action":"output","Test":"TestPreload","Output":" \t| | --driver=kvm2 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673439449Z","Action":"output","Test":"TestPreload","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673443067Z","Action":"output","Test":"TestPreload","Output":" \t| node | add -p multinode-155596 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:22 UTC | |\n"} +{"Time":"2023-05-31T19:27:03.673447764Z","Action":"output","Test":"TestPreload","Output":" \t| delete | -p multinode-155596-m03 | multinode-155596-m03 | jenkins | v1.30.1 | 31 May 23 19:22 UTC | 31 May 23 19:22 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673451398Z","Action":"output","Test":"TestPreload","Output":" \t| delete | -p multinode-155596 | multinode-155596 | jenkins | v1.30.1 | 31 May 23 19:22 UTC | 31 May 23 19:22 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673455394Z","Action":"output","Test":"TestPreload","Output":" \t| start | -p test-preload-677810 | test-preload-677810 | jenkins | v1.30.1 | 31 May 23 19:22 UTC | 31 May 23 19:24 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673459413Z","Action":"output","Test":"TestPreload","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673463532Z","Action":"output","Test":"TestPreload","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673467363Z","Action":"output","Test":"TestPreload","Output":" \t| | --preload=false --driver=kvm2 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673471242Z","Action":"output","Test":"TestPreload","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673475373Z","Action":"output","Test":"TestPreload","Output":" \t| | --kubernetes-version=v1.24.4 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673479219Z","Action":"output","Test":"TestPreload","Output":" \t| ssh | -p test-preload-677810 | test-preload-677810 | jenkins | v1.30.1 | 31 May 23 19:24 UTC | 31 May 23 19:24 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673486528Z","Action":"output","Test":"TestPreload","Output":" \t| | -- sudo crictl pull | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673490841Z","Action":"output","Test":"TestPreload","Output":" \t| | gcr.io/k8s-minikube/busybox | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673494681Z","Action":"output","Test":"TestPreload","Output":" \t| stop | -p test-preload-677810 | test-preload-677810 | jenkins | v1.30.1 | 31 May 23 19:24 UTC | 31 May 23 19:25 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673498553Z","Action":"output","Test":"TestPreload","Output":" \t| start | -p test-preload-677810 | test-preload-677810 | jenkins | v1.30.1 | 31 May 23 19:25 UTC | 31 May 23 19:27 UTC |\n"} +{"Time":"2023-05-31T19:27:03.67350258Z","Action":"output","Test":"TestPreload","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673511012Z","Action":"output","Test":"TestPreload","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673515083Z","Action":"output","Test":"TestPreload","Output":" \t| | --wait=true --driver=kvm2 | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673518724Z","Action":"output","Test":"TestPreload","Output":" \t| | --container-runtime=containerd | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.67352273Z","Action":"output","Test":"TestPreload","Output":" \t| ssh | -p test-preload-677810 -- sudo | test-preload-677810 | jenkins | v1.30.1 | 31 May 23 19:27 UTC | 31 May 23 19:27 UTC |\n"} +{"Time":"2023-05-31T19:27:03.673526306Z","Action":"output","Test":"TestPreload","Output":" \t| | crictl image ls | | | | | |\n"} +{"Time":"2023-05-31T19:27:03.673530318Z","Action":"output","Test":"TestPreload","Output":" \t|---------|-----------------------------------------------------------------------------------------|----------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T19:27:03.673533703Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.673536849Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.673540045Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T19:27:03.673543766Z","Action":"output","Test":"TestPreload","Output":" \t* Log file created at: 2023/05/31 19:25:34\n"} +{"Time":"2023-05-31T19:27:03.673643646Z","Action":"output","Test":"TestPreload","Output":" \tRunning on machine: ubuntu-20-agent-12\n"} +{"Time":"2023-05-31T19:27:03.673649205Z","Action":"output","Test":"TestPreload","Output":" \tBinary: Built with gc go1.20.4 for linux/amd64\n"} +{"Time":"2023-05-31T19:27:03.673652242Z","Action":"output","Test":"TestPreload","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T19:27:03.673655981Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.241079 37468 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T19:27:03.673659832Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.241190 37468 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T19:27:03.673666159Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.241198 37468 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T19:27:03.673669786Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.241202 37468 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T19:27:03.673673032Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.241298 37468 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T19:27:03.673676829Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.241778 37468 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T19:27:03.673680401Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.242565 37468 start.go:127] hostinfo: {\"hostname\":\"ubuntu-20-agent-12\",\"uptime\":4087,\"bootTime\":1685557047,\"procs\":200,\"os\":\"linux\",\"platform\":\"ubuntu\",\"platformFamily\":\"debian\",\"platformVersion\":\"20.04\",\"kernelVersion\":\"5.15.0-1035-gcp\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"kvm\",\"virtualizationRole\":\"guest\",\"hostId\":\"591c9f12-2938-3743-e2bf-c56a050d43d1\"}\n"} +{"Time":"2023-05-31T19:27:03.673701826Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.242611 37468 start.go:137] virtualization: kvm guest\n"} +{"Time":"2023-05-31T19:27:03.673706565Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.245217 37468 out.go:177] * [test-preload-677810] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T19:27:03.673710066Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.247226 37468 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T19:27:03.673713945Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.248853 37468 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T19:27:03.673717739Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.247242 37468 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T19:27:03.673721116Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.252288 37468 out.go:177] - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T19:27:03.673724572Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.253843 37468 out.go:177] - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T19:27:03.67372862Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.255215 37468 out.go:177] - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T19:27:03.67373221Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.256802 37468 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T19:27:03.67373549Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.258718 37468 config.go:182] Loaded profile config \"test-preload-677810\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.67374051Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.259094 37468 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:27:03.673744694Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.259141 37468 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:27:03.673748208Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.273838 37468 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:33273\n"} +{"Time":"2023-05-31T19:27:03.673751566Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.274233 37468 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:27:03.673754957Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.274825 37468 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:27:03.673758601Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.274849 37468 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.673762319Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.275172 37468 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.673765819Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.275362 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.673774683Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.277043 37468 out.go:177] * Kubernetes 1.27.2 is now available. If you would like to upgrade, specify: --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:27:03.673778442Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.278489 37468 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T19:27:03.673782422Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.278733 37468 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:27:03.673788418Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.278779 37468 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:27:03.673792015Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.291943 37468 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:35109\n"} +{"Time":"2023-05-31T19:27:03.673795825Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.292279 37468 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:27:03.673799183Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.292660 37468 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:27:03.673805845Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.292685 37468 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.673809301Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.292946 37468 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.673813249Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.293126 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.673817207Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.324679 37468 out.go:177] * Using the kvm2 driver based on existing profile\n"} +{"Time":"2023-05-31T19:27:03.673820975Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.326058 37468 start.go:297] selected driver: kvm2\n"} +{"Time":"2023-05-31T19:27:03.67382801Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.326070 37468 start.go:875] validating driver \"kvm2\" against \u0026{Name:test-preload-677810 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:kvm2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T19:27:03.67384099Z","Action":"output","Test":"TestPreload","Output":"ig:{KubernetesVersion:v1.24.4 ClusterName:test-preload-677810 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.39.220 Port:8443 KubernetesVersion:v1.24.4 ContainerRuntime:containerd ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/home/jenkins:/min"} +{"Time":"2023-05-31T19:27:03.673846456Z","Action":"output","Test":"TestPreload","Output":"ikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T19:27:03.673854649Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.326156 37468 start.go:886] status for kvm2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T19:27:03.673859106Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.326689 37468 install.go:52] acquiring lock: {Name:mk900956b073697a4aa6c80a27c6bb0742a99a53 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.673863246Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.326740 37468 install.go:117] Validating docker-machine-driver-kvm2, PATH=/home/jenkins/minikube-integration/16569-10887/.minikube/bin:/home/jenkins/workspace/KVM_Linux_containerd_integration/out/:/usr/local/bin:/usr/bin:/bin:/usr/local/games:/usr/games:/usr/local/go/bin:/home/jenkins/go/bin:/usr/local/bin/:/usr/local/go/bin/:/home/jenkins/go/bin\n"} +{"Time":"2023-05-31T19:27:03.673867429Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.340216 37468 install.go:137] /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2 version is 1.30.1\n"} +{"Time":"2023-05-31T19:27:03.673874557Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.340536 37468 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T19:27:03.673877553Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.340587 37468 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T19:27:03.673881159Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.340602 37468 cni.go:145] \"kvm2\" driver + \"containerd\" runtime found, recommending bridge\n"} +{"Time":"2023-05-31T19:27:03.673885151Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.340610 37468 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T19:27:03.673891904Z","Action":"output","Test":"TestPreload","Output":" \t{Name:test-preload-677810 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:kvm2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.24.4 ClusterName:test-preload-677810 Namespace:defaul"} +{"Time":"2023-05-31T19:27:03.673896901Z","Action":"output","Test":"TestPreload","Output":"t APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.39.220 Port:8443 KubernetesVersion:v1.24.4 ContainerRuntime:containerd ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/home/jenkins:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 "} +{"Time":"2023-05-31T19:27:03.673903751Z","Action":"output","Test":"TestPreload","Output":"MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T19:27:03.673907351Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.340734 37468 iso.go:125] acquiring lock: {Name:mk5b083a948c9ceca29579261cce376d0ffdbeae Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.673911281Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.343329 37468 out.go:177] * Starting control plane node test-preload-677810 in cluster test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.673918928Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.344848 37468 preload.go:132] Checking if preload exists for k8s version v1.24.4 and runtime containerd\n"} +{"Time":"2023-05-31T19:27:03.67392576Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.367231 37468 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.24.4/preloaded-images-k8s-v18-v1.24.4-containerd-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T19:27:03.673933118Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.367251 37468 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T19:27:03.673937069Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.367358 37468 preload.go:132] Checking if preload exists for k8s version v1.24.4 and runtime containerd\n"} +{"Time":"2023-05-31T19:27:03.673940426Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.368983 37468 out.go:177] * Downloading Kubernetes v1.24.4 preload ...\n"} +{"Time":"2023-05-31T19:27:03.673944063Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.370297 37468 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.24.4-containerd-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T19:27:03.673948926Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:34.398014 37468 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.24.4/preloaded-images-k8s-v18-v1.24.4-containerd-overlay2-amd64.tar.lz4?checksum=md5:41d292e9d8b8bb8fdf3bc94dc3c43bf0 -\u003e /home/jenkins/minikube-integration/16569-10887/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.24.4-containerd-overlay2-amd64.tar.lz4\n"} +{"Time":"2023-05-31T19:27:03.673953293Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:41.982642 37468 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.24.4-containerd-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T19:27:03.673957959Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:41.982774 37468 preload.go:256] verifying checksum of /home/jenkins/minikube-integration/16569-10887/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.24.4-containerd-overlay2-amd64.tar.lz4 ...\n"} +{"Time":"2023-05-31T19:27:03.673964557Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.846155 37468 cache.go:60] Finished verifying existence of preloaded tar for v1.24.4 on containerd\n"} +{"Time":"2023-05-31T19:27:03.673968159Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.846341 37468 profile.go:148] Saving config to /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/config.json ...\n"} +{"Time":"2023-05-31T19:27:03.673972062Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.846592 37468 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T19:27:03.673976048Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.846631 37468 start.go:364] acquiring machines lock for test-preload-677810: {Name:mk2322c73b53d6d6fea3ca5f175109a8d162cecc Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.673979907Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.846707 37468 start.go:368] acquired machines lock for \"test-preload-677810\" in 55.652µs\n"} +{"Time":"2023-05-31T19:27:03.673984741Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.846729 37468 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T19:27:03.673988204Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.846738 37468 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T19:27:03.673991701Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.847061 37468 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:27:03.673995647Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.847111 37468 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:27:03.673999097Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.861197 37468 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:38055\n"} +{"Time":"2023-05-31T19:27:03.674014827Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.861588 37468 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:27:03.674018957Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.862034 37468 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:27:03.674022727Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.862051 37468 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.674026239Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.862405 37468 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.674029632Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.862630 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.674033309Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.862780 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetState\n"} +{"Time":"2023-05-31T19:27:03.674037041Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.864610 37468 fix.go:103] recreateIfNeeded on test-preload-677810: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T19:27:03.674040444Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.864651 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.674043852Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:25:42.864839 37468 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:27:03.674047503Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.867758 37468 out.go:177] * Restarting existing kvm2 VM for \"test-preload-677810\" ...\n"} +{"Time":"2023-05-31T19:27:03.674051168Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.869566 37468 main.go:141] libmachine: (test-preload-677810) Calling .Start\n"} +{"Time":"2023-05-31T19:27:03.674054552Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.869717 37468 main.go:141] libmachine: (test-preload-677810) Ensuring networks are active...\n"} +{"Time":"2023-05-31T19:27:03.674058444Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.870515 37468 main.go:141] libmachine: (test-preload-677810) Ensuring network default is active\n"} +{"Time":"2023-05-31T19:27:03.674062024Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.870891 37468 main.go:141] libmachine: (test-preload-677810) Ensuring network mk-test-preload-677810 is active\n"} +{"Time":"2023-05-31T19:27:03.674065417Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.871323 37468 main.go:141] libmachine: (test-preload-677810) Getting domain xml...\n"} +{"Time":"2023-05-31T19:27:03.674069181Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:42.872107 37468 main.go:141] libmachine: (test-preload-677810) Creating domain...\n"} +{"Time":"2023-05-31T19:27:03.674072988Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.061407 37468 main.go:141] libmachine: (test-preload-677810) Waiting to get IP...\n"} +{"Time":"2023-05-31T19:27:03.67407757Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.062284 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674082298Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.062706 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674086098Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.062788 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:44.062698 37534 retry.go:31] will retry after 279.292116ms: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674090026Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.343102 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674094543Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.343492 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674098413Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.343519 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:44.343456 37534 retry.go:31] will retry after 262.810768ms: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674102403Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.607842 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674106476Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.608294 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674110303Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.608327 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:44.608233 37534 retry.go:31] will retry after 316.20612ms: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674114616Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.925628 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674118571Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.926054 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674122383Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:44.926089 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:44.925994 37534 retry.go:31] will retry after 421.515856ms: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.67412642Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:45.349639 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.67413051Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:45.349977 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674134439Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:45.350012 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:45.349919 37534 retry.go:31] will retry after 758.630964ms: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674141826Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:46.109794 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674145928Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:46.110350 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.67415373Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:46.110373 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:46.110307 37534 retry.go:31] will retry after 659.555508ms: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674157686Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:46.771034 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674165638Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:46.771423 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674169573Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:46.771449 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:46.771378 37534 retry.go:31] will retry after 1.141536471s: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.67417349Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:47.914913 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674177701Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:47.915271 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674181546Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:47.915296 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:47.915222 37534 retry.go:31] will retry after 1.35463141s: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674185145Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:49.271799 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674189427Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:49.272266 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674193195Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:49.272296 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:49.272224 37534 retry.go:31] will retry after 1.408986189s: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674197189Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:50.682846 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674226077Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:50.683332 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674230801Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:50.683361 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:50.683280 37534 retry.go:31] will retry after 1.688946981s: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674234831Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:52.374361 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674238893Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:52.374823 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674242564Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:52.374848 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:52.374782 37534 retry.go:31] will retry after 2.081421769s: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674246439Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:54.458478 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674250321Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:54.458889 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.67425439Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:54.458916 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:54.458840 37534 retry.go:31] will retry after 2.766889734s: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674258274Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:57.226761 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674262026Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:57.227139 37468 main.go:141] libmachine: (test-preload-677810) DBG | unable to find current IP address of domain test-preload-677810 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674266084Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:25:57.227161 37468 main.go:141] libmachine: (test-preload-677810) DBG | I0531 19:25:57.227095 37534 retry.go:31] will retry after 3.797678289s: waiting for machine to come up\n"} +{"Time":"2023-05-31T19:27:03.674270168Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.028076 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674278308Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.028570 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has current primary IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674282339Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.028597 37468 main.go:141] libmachine: (test-preload-677810) Found IP for machine: 192.168.39.220\n"} +{"Time":"2023-05-31T19:27:03.674287158Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.028608 37468 main.go:141] libmachine: (test-preload-677810) Reserving static IP address...\n"} +{"Time":"2023-05-31T19:27:03.674291201Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.029003 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"test-preload-677810\", mac: \"52:54:00:9f:cd:66\", ip: \"192.168.39.220\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674295863Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.029034 37468 main.go:141] libmachine: (test-preload-677810) Reserved static IP address: 192.168.39.220\n"} +{"Time":"2023-05-31T19:27:03.674299893Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.029053 37468 main.go:141] libmachine: (test-preload-677810) DBG | skip adding static IP to network mk-test-preload-677810 - found existing host DHCP lease matching {name: \"test-preload-677810\", mac: \"52:54:00:9f:cd:66\", ip: \"192.168.39.220\"}\n"} +{"Time":"2023-05-31T19:27:03.67430419Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.029072 37468 main.go:141] libmachine: (test-preload-677810) DBG | Getting to WaitForSSH function...\n"} +{"Time":"2023-05-31T19:27:03.674308003Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.029086 37468 main.go:141] libmachine: (test-preload-677810) Waiting for SSH to be available...\n"} +{"Time":"2023-05-31T19:27:03.674311728Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.030922 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674316315Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.031284 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674321475Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.031313 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674325136Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.031417 37468 main.go:141] libmachine: (test-preload-677810) DBG | Using SSH client type: external\n"} +{"Time":"2023-05-31T19:27:03.674329289Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.031440 37468 main.go:141] libmachine: (test-preload-677810) DBG | Using SSH private key: /home/jenkins/minikube-integration/16569-10887/.minikube/machines/test-preload-677810/id_rsa (-rw-------)\n"} +{"Time":"2023-05-31T19:27:03.6743337Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.031477 37468 main.go:141] libmachine: (test-preload-677810) DBG | \u0026{[-F /dev/null -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none -o LogLevel=quiet -o PasswordAuthentication=no -o ServerAliveInterval=60 -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null docker@192.168.39.220 -o IdentitiesOnly=yes -i /home/jenkins/minikube-integration/16569-10887/.minikube/machines/test-preload-677810/id_rsa -p 22] /usr/bin/ssh \u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.674338866Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.031499 37468 main.go:141] libmachine: (test-preload-677810) DBG | About to run SSH command:\n"} +{"Time":"2023-05-31T19:27:03.674342359Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.031541 37468 main.go:141] libmachine: (test-preload-677810) DBG | exit 0\n"} +{"Time":"2023-05-31T19:27:03.674345913Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.123712 37468 main.go:141] libmachine: (test-preload-677810) DBG | SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T19:27:03.674349685Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.123965 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.674352855Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.124518 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetIP\n"} +{"Time":"2023-05-31T19:27:03.674356473Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.126740 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674360352Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.126988 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674364757Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.127011 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674368839Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.127248 37468 profile.go:148] Saving config to /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/config.json ...\n"} +{"Time":"2023-05-31T19:27:03.674372072Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.127453 37468 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T19:27:03.67437546Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.127475 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.674378829Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.127675 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.67438889Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.127845 37468 buildroot.go:166] provisioning hostname \"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.674392765Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.127864 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.674397055Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.128018 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.674404428Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.130156 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674409199Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.130442 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674413401Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.130475 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674417296Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.130585 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.674420693Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.130772 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.674424446Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.130922 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.674427956Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.131033 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.674431265Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.131190 37468 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T19:27:03.674434866Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.131785 37468 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x80dc80] 0x810d20 \u003cnil\u003e [] 0s} 192.168.39.220 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.674438856Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.131803 37468 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T19:27:03.674442663Z","Action":"output","Test":"TestPreload","Output":" \tsudo hostname test-preload-677810 \u0026\u0026 echo \"test-preload-677810\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T19:27:03.674445919Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.264098 37468 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674448534Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.674451334Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.264130 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.674455041Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.266690 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674458973Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.267013 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674464273Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.267043 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674468619Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.267186 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.674472167Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.267372 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.674475311Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.267511 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.674479006Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.267639 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.674481958Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.267800 37468 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T19:27:03.674489529Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.268171 37468 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x80dc80] 0x810d20 \u003cnil\u003e [] 0s} 192.168.39.220 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.674493168Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.268189 37468 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T19:27:03.674496453Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.674499756Z","Action":"output","Test":"TestPreload","Output":" \t\t\tif ! grep -xq '.*\\stest-preload-677810' /etc/hosts; then\n"} +{"Time":"2023-05-31T19:27:03.674503485Z","Action":"output","Test":"TestPreload","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T19:27:03.674506688Z","Action":"output","Test":"TestPreload","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 test-preload-677810/g' /etc/hosts;\n"} +{"Time":"2023-05-31T19:27:03.67451007Z","Action":"output","Test":"TestPreload","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T19:27:03.674513575Z","Action":"output","Test":"TestPreload","Output":" \t\t\t\t\techo '127.0.1.1 test-preload-677810' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T19:27:03.674516963Z","Action":"output","Test":"TestPreload","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T19:27:03.674520312Z","Action":"output","Test":"TestPreload","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T19:27:03.674523441Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.396096 37468 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T19:27:03.674539888Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.396121 37468 buildroot.go:172] set auth options {CertDir:/home/jenkins/minikube-integration/16569-10887/.minikube CaCertPath:/home/jenkins/minikube-integration/16569-10887/.minikube/certs/ca.pem CaPrivateKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/server.pem ServerKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/server-key.pem ClientKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/home/jenkins/minikube-integration/16569-10887/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/home/jenkins/minikube-integration/16569-10887/.minikube}\n"} +{"Time":"2023-05-31T19:27:03.674549741Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.396143 37468 buildroot.go:174] setting up certificates\n"} +{"Time":"2023-05-31T19:27:03.674553622Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.396153 37468 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T19:27:03.674556949Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.396167 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.674560735Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.396384 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetIP\n"} +{"Time":"2023-05-31T19:27:03.674564507Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.398850 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.67457166Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.399164 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.67457633Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.399194 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674580195Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.399314 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.674584835Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.401448 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674588954Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.401757 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.67459874Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.401781 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674602941Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.401911 37468 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T19:27:03.674606315Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.401961 37468 exec_runner.go:144] found /home/jenkins/minikube-integration/16569-10887/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T19:27:03.674610312Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.401973 37468 exec_runner.go:203] rm: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.pem\n"} +{"Time":"2023-05-31T19:27:03.674616917Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.402039 37468 exec_runner.go:151] cp: /home/jenkins/minikube-integration/16569-10887/.minikube/certs/ca.pem --\u003e /home/jenkins/minikube-integration/16569-10887/.minikube/ca.pem (1082 bytes)\n"} +{"Time":"2023-05-31T19:27:03.674621343Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.402127 37468 exec_runner.go:144] found /home/jenkins/minikube-integration/16569-10887/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T19:27:03.674625199Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.402137 37468 exec_runner.go:203] rm: /home/jenkins/minikube-integration/16569-10887/.minikube/cert.pem\n"} +{"Time":"2023-05-31T19:27:03.674632488Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.402162 37468 exec_runner.go:151] cp: /home/jenkins/minikube-integration/16569-10887/.minikube/certs/cert.pem --\u003e /home/jenkins/minikube-integration/16569-10887/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T19:27:03.674636522Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.402214 37468 exec_runner.go:144] found /home/jenkins/minikube-integration/16569-10887/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T19:27:03.674642148Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.402220 37468 exec_runner.go:203] rm: /home/jenkins/minikube-integration/16569-10887/.minikube/key.pem\n"} +{"Time":"2023-05-31T19:27:03.674646122Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.402239 37468 exec_runner.go:151] cp: /home/jenkins/minikube-integration/16569-10887/.minikube/certs/key.pem --\u003e /home/jenkins/minikube-integration/16569-10887/.minikube/key.pem (1679 bytes)\n"} +{"Time":"2023-05-31T19:27:03.674650477Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.402283 37468 provision.go:112] generating server cert: /home/jenkins/minikube-integration/16569-10887/.minikube/machines/server.pem ca-key=/home/jenkins/minikube-integration/16569-10887/.minikube/certs/ca.pem private-key=/home/jenkins/minikube-integration/16569-10887/.minikube/certs/ca-key.pem org=jenkins.test-preload-677810 san=[192.168.39.220 192.168.39.220 localhost 127.0.0.1 minikube test-preload-677810]\n"} +{"Time":"2023-05-31T19:27:03.674655065Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.619033 37468 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T19:27:03.674664225Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.619075 37468 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T19:27:03.674668121Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.619094 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.674674059Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.621222 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674679427Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.621503 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674683878Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.621524 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674687906Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.621656 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.674691473Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.621826 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.67469524Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.621957 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.674699376Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.622069 37468 sshutil.go:53] new ssh client: \u0026{IP:192.168.39.220 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/test-preload-677810/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T19:27:03.674703275Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.708699 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1082 bytes)\n"} +{"Time":"2023-05-31T19:27:03.674707265Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.731008 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1233 bytes)\n"} +{"Time":"2023-05-31T19:27:03.674711378Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.752338 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1679 bytes)\n"} +{"Time":"2023-05-31T19:27:03.674715153Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.773600 37468 provision.go:86] duration metric: configureAuth took 377.437077ms\n"} +{"Time":"2023-05-31T19:27:03.674719122Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.773619 37468 buildroot.go:189] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T19:27:03.674722758Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.773756 37468 config.go:182] Loaded profile config \"test-preload-677810\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.674726153Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.773768 37468 machine.go:91] provisioned docker machine in 646.30307ms\n"} +{"Time":"2023-05-31T19:27:03.674730143Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.773776 37468 start.go:300] post-start starting for \"test-preload-677810\" (driver=\"kvm2\")\n"} +{"Time":"2023-05-31T19:27:03.674734332Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.773784 37468 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T19:27:03.674739888Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.773816 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.674744013Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.774041 37468 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:27:03.674747731Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.774062 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.674750948Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.776370 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674755445Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.776711 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674760292Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.776744 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674764088Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.776894 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.674767849Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.777069 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.674771232Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.777224 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.6747754Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.777333 37468 sshutil.go:53] new ssh client: \u0026{IP:192.168.39.220 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/test-preload-677810/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T19:27:03.674782237Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.868616 37468 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T19:27:03.674785937Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.873060 37468 info.go:137] Remote host: Buildroot 2021.02.12\n"} +{"Time":"2023-05-31T19:27:03.674789635Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.873077 37468 filesync.go:126] Scanning /home/jenkins/minikube-integration/16569-10887/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T19:27:03.674793316Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.873131 37468 filesync.go:126] Scanning /home/jenkins/minikube-integration/16569-10887/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T19:27:03.674797615Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.873219 37468 filesync.go:149] local asset: /home/jenkins/minikube-integration/16569-10887/.minikube/files/etc/ssl/certs/181502.pem -\u003e 181502.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:27:03.674805012Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.873321 37468 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:27:03.674808517Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.880986 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/files/etc/ssl/certs/181502.pem --\u003e /etc/ssl/certs/181502.pem (1708 bytes)\n"} +{"Time":"2023-05-31T19:27:03.674816217Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.902722 37468 start.go:303] post-start completed in 128.935918ms\n"} +{"Time":"2023-05-31T19:27:03.674819724Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.902739 37468 fix.go:57] fixHost completed within 19.056000756s\n"} +{"Time":"2023-05-31T19:27:03.674823121Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.902756 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.674826856Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.904833 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674831341Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.905203 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674835758Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.905235 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674839739Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.905303 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.674846613Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.905468 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.674850014Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.905576 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.674852957Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.905712 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.674856075Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.905904 37468 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T19:27:03.674859541Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.906291 37468 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x80dc80] 0x810d20 \u003cnil\u003e [] 0s} 192.168.39.220 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.674863672Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:01.906302 37468 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T19:27:03.674867011Z","Action":"output","Test":"TestPreload","Output":" \tdate +%!s(MISSING).%!N(MISSING)\n"} +{"Time":"2023-05-31T19:27:03.674870603Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.028596 37468 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: 1685561161.978308054\n"} +{"Time":"2023-05-31T19:27:03.674873955Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.674876748Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.028610 37468 fix.go:207] guest clock: 1685561161.978308054\n"} +{"Time":"2023-05-31T19:27:03.674880314Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.028618 37468 fix.go:220] Guest: 2023-05-31 19:26:01.978308054 +0000 UTC Remote: 2023-05-31 19:26:01.902743014 +0000 UTC m=+27.692052257 (delta=75.56504ms)\n"} +{"Time":"2023-05-31T19:27:03.674883813Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.028638 37468 fix.go:191] guest clock delta is within tolerance: 75.56504ms\n"} +{"Time":"2023-05-31T19:27:03.674887467Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.028642 37468 start.go:83] releasing machines lock for \"test-preload-677810\", held for 19.181923388s\n"} +{"Time":"2023-05-31T19:27:03.674890964Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.028661 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.674894451Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.028862 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetIP\n"} +{"Time":"2023-05-31T19:27:03.674898075Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.031156 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674902114Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.031459 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.674906838Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.031480 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674910753Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.031623 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.674914204Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.032031 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.674921135Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.032218 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.674924954Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.032296 37468 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T19:27:03.674928833Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.032329 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.674932076Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.032405 37468 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T19:27:03.674935584Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.032430 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.674939564Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.034824 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674978083Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035085 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.674995854Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035250 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.675001939Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035280 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.675008572Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035375 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.675022712Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035543 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.675028455Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035549 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.675033376Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035573 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.675038586Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035693 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.675042911Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035767 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.675047282Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035863 37468 sshutil.go:53] new ssh client: \u0026{IP:192.168.39.220 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/test-preload-677810/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T19:27:03.675051376Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.035905 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.675054954Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.036026 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.675059435Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.036135 37468 sshutil.go:53] new ssh client: \u0026{IP:192.168.39.220 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/test-preload-677810/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T19:27:03.67506415Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.141980 37468 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T19:27:03.675148142Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.147081 37468 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T19:27:03.675154368Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:02.152182 37468 cni.go:208] loopback cni configuration skipped: \"/etc/cni/net.d/*loopback.conf*\" not found\n"} +{"Time":"2023-05-31T19:27:03.675159813Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.152235 37468 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f ( ( -name *bridge* -or -name *podman* ) -and -not -name *.mk_disabled ) -printf \"%!p(MISSING), \" -exec sh -c \"sudo mv {} {}.mk_disabled\" ;\n"} +{"Time":"2023-05-31T19:27:03.675174689Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.165597 37468 cni.go:261] disabled [/etc/cni/net.d/87-podman-bridge.conflist] bridge cni config(s)\n"} +{"Time":"2023-05-31T19:27:03.675180129Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.165615 37468 preload.go:132] Checking if preload exists for k8s version v1.24.4 and runtime containerd\n"} +{"Time":"2023-05-31T19:27:03.675184636Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:02.165677 37468 ssh_runner.go:195] Run: sudo crictl images --output json\n"} +{"Time":"2023-05-31T19:27:03.675188857Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:06.197880 37468 ssh_runner.go:235] Completed: sudo crictl images --output json: (4.032178278s)\n"} +{"Time":"2023-05-31T19:27:03.675192872Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:06.198033 37468 containerd.go:600] couldn't find preloaded image for \"registry.k8s.io/kube-apiserver:v1.24.4\". assuming images are not preloaded.\n"} +{"Time":"2023-05-31T19:27:03.675196951Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:06.198097 37468 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T19:27:03.675200083Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:06.202517 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T19:27:03.67520281Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:06.206681 37468 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.675225579Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.675228693Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.675230906Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.675233224Z","Action":"output","Test":"TestPreload","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T19:27:03.675235908Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:06.206705 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.24.4-containerd-overlay2-amd64.tar.lz4 --\u003e /preloaded.tar.lz4 (458696921 bytes)\n"} +{"Time":"2023-05-31T19:27:03.675238675Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:08.029208 37468 containerd.go:547] Took 1.826740 seconds to copy over tarball\n"} +{"Time":"2023-05-31T19:27:03.675241117Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:08.029272 37468 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T19:27:03.675243612Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:11.114480 37468 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (3.085181337s)\n"} +{"Time":"2023-05-31T19:27:03.675303246Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:11.114503 37468 containerd.go:554] Took 3.085275 seconds to extract the tarball\n"} +{"Time":"2023-05-31T19:27:03.675307007Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:11.114511 37468 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T19:27:03.675309522Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:11.154332 37468 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T19:27:03.675312047Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:11.248602 37468 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T19:27:03.675314522Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:11.265336 37468 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T19:27:03.67531688Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:11.265377 37468 ssh_runner.go:195] Run: sudo systemctl stop -f crio\n"} +{"Time":"2023-05-31T19:27:03.67531934Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:13.923399 37468 ssh_runner.go:235] Completed: sudo systemctl stop -f crio: (2.657999885s)\n"} +{"Time":"2023-05-31T19:27:03.67532178Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:13.923467 37468 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T19:27:03.675324106Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:13.935551 37468 docker.go:193] disabling cri-docker service (if available) ...\n"} +{"Time":"2023-05-31T19:27:03.675326447Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:13.935606 37468 ssh_runner.go:195] Run: sudo systemctl stop -f cri-docker.socket\n"} +{"Time":"2023-05-31T19:27:03.675328734Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:13.947678 37468 ssh_runner.go:195] Run: sudo systemctl stop -f cri-docker.service\n"} +{"Time":"2023-05-31T19:27:03.675333725Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:13.961129 37468 ssh_runner.go:195] Run: sudo systemctl disable cri-docker.socket\n"} +{"Time":"2023-05-31T19:27:03.675359014Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.060441 37468 ssh_runner.go:195] Run: sudo systemctl mask cri-docker.service\n"} +{"Time":"2023-05-31T19:27:03.675363441Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.159111 37468 docker.go:209] disabling docker service ...\n"} +{"Time":"2023-05-31T19:27:03.675367139Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.159169 37468 ssh_runner.go:195] Run: sudo systemctl stop -f docker.socket\n"} +{"Time":"2023-05-31T19:27:03.675371292Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.170853 37468 ssh_runner.go:195] Run: sudo systemctl stop -f docker.service\n"} +{"Time":"2023-05-31T19:27:03.675375989Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.182445 37468 ssh_runner.go:195] Run: sudo systemctl disable docker.socket\n"} +{"Time":"2023-05-31T19:27:03.675380399Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.281863 37468 ssh_runner.go:195] Run: sudo systemctl mask docker.service\n"} +{"Time":"2023-05-31T19:27:03.675384888Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.392289 37468 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service docker\n"} +{"Time":"2023-05-31T19:27:03.675389167Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.404097 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T19:27:03.675506028Z","Action":"output","Test":"TestPreload","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T19:27:03.675510559Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.420104 37468 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.7\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:27:03.675516896Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.428735 37468 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:27:03.675519753Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.437042 37468 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T19:27:03.675522403Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.437090 37468 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:27:03.675525121Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.445296 37468 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:27:03.675539794Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.453583 37468 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:27:03.67554886Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.461953 37468 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:27:03.675551818Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.470360 37468 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T19:27:03.675554453Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.479037 37468 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:27:03.675557191Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.487420 37468 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T19:27:03.675559845Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.494849 37468 crio.go:148] couldn't verify netfilter by \"sudo sysctl net.bridge.bridge-nf-call-iptables\" which might be okay. error: sudo sysctl net.bridge.bridge-nf-call-iptables: Process exited with status 255\n"} +{"Time":"2023-05-31T19:27:03.675562369Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.675564604Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.675566992Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.675569307Z","Action":"output","Test":"TestPreload","Output":" \tsysctl: cannot stat /proc/sys/net/bridge/bridge-nf-call-iptables: No such file or directory\n"} +{"Time":"2023-05-31T19:27:03.675571822Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.494880 37468 ssh_runner.go:195] Run: sudo modprobe br_netfilter\n"} +{"Time":"2023-05-31T19:27:03.675574289Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.506300 37468 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T19:27:03.675695281Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.515135 37468 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T19:27:03.675704328Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.614678 37468 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T19:27:03.675712473Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.642522 37468 start.go:528] Will wait 60s for socket path /run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T19:27:03.67571629Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.642563 37468 ssh_runner.go:195] Run: stat /run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T19:27:03.67572005Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:14.647929 37468 retry.go:31] will retry after 679.591004ms: stat /run/containerd/containerd.sock: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.675729015Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.675733047Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.675736564Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.675739682Z","Action":"output","Test":"TestPreload","Output":" \tstat: cannot statx '/run/containerd/containerd.sock': No such file or directory\n"} +{"Time":"2023-05-31T19:27:03.675743038Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.327774 37468 ssh_runner.go:195] Run: stat /run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T19:27:03.675746862Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.333532 37468 start.go:549] Will wait 60s for crictl version\n"} +{"Time":"2023-05-31T19:27:03.675750505Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.333586 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.675754417Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.337530 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl version\n"} +{"Time":"2023-05-31T19:27:03.675758444Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.366325 37468 start.go:565] Version: 0.1.0\n"} +{"Time":"2023-05-31T19:27:03.67576189Z","Action":"output","Test":"TestPreload","Output":" \tRuntimeName: containerd\n"} +{"Time":"2023-05-31T19:27:03.675765469Z","Action":"output","Test":"TestPreload","Output":" \tRuntimeVersion: v1.7.1\n"} +{"Time":"2023-05-31T19:27:03.675768601Z","Action":"output","Test":"TestPreload","Output":" \tRuntimeApiVersion: v1alpha2\n"} +{"Time":"2023-05-31T19:27:03.675780141Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.366375 37468 ssh_runner.go:195] Run: containerd --version\n"} +{"Time":"2023-05-31T19:27:03.675786032Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.390430 37468 ssh_runner.go:195] Run: containerd --version\n"} +{"Time":"2023-05-31T19:27:03.675789794Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.420416 37468 out.go:177] * Preparing Kubernetes v1.24.4 on containerd 1.7.1 ...\n"} +{"Time":"2023-05-31T19:27:03.675793569Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.422212 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetIP\n"} +{"Time":"2023-05-31T19:27:03.675797077Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.424860 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.675801914Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.425202 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.675863991Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.425228 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.675869128Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.425463 37468 ssh_runner.go:195] Run: grep 192.168.39.1\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T19:27:03.675872851Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.429320 37468 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.39.1\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T19:27:03.675878038Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.440515 37468 preload.go:132] Checking if preload exists for k8s version v1.24.4 and runtime containerd\n"} +{"Time":"2023-05-31T19:27:03.675881473Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.440590 37468 ssh_runner.go:195] Run: sudo crictl images --output json\n"} +{"Time":"2023-05-31T19:27:03.675884914Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.465930 37468 containerd.go:600] couldn't find preloaded image for \"registry.k8s.io/kube-apiserver:v1.24.4\". assuming images are not preloaded.\n"} +{"Time":"2023-05-31T19:27:03.675889314Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.465971 37468 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T19:27:03.675892838Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.469481 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T19:27:03.675896295Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.473384 37468 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.67589998Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.675903514Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.67590661Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.675909778Z","Action":"output","Test":"TestPreload","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T19:27:03.675913874Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:15.473404 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.24.4-containerd-overlay2-amd64.tar.lz4 --\u003e /preloaded.tar.lz4 (458696921 bytes)\n"} +{"Time":"2023-05-31T19:27:03.675918026Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:17.187309 37468 containerd.go:547] Took 1.717850 seconds to copy over tarball\n"} +{"Time":"2023-05-31T19:27:03.675921584Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:17.187383 37468 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T19:27:03.67592546Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:20.072279 37468 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (2.884873394s)\n"} +{"Time":"2023-05-31T19:27:03.676034852Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:20.072302 37468 containerd.go:554] Took 2.884968 seconds to extract the tarball\n"} +{"Time":"2023-05-31T19:27:03.676039152Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:20.072309 37468 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T19:27:03.676042302Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:20.111619 37468 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T19:27:03.676045039Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:20.215446 37468 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T19:27:03.676048357Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:20.240956 37468 ssh_runner.go:195] Run: sudo crictl images --output json\n"} +{"Time":"2023-05-31T19:27:03.676051937Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281010 37468 ssh_runner.go:235] Completed: sudo crictl images --output json: (1.040019614s)\n"} +{"Time":"2023-05-31T19:27:03.676055605Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281148 37468 containerd.go:600] couldn't find preloaded image for \"registry.k8s.io/kube-apiserver:v1.24.4\". assuming images are not preloaded.\n"} +{"Time":"2023-05-31T19:27:03.676060331Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281164 37468 cache_images.go:88] LoadImages start: [registry.k8s.io/kube-apiserver:v1.24.4 registry.k8s.io/kube-controller-manager:v1.24.4 registry.k8s.io/kube-scheduler:v1.24.4 registry.k8s.io/kube-proxy:v1.24.4 registry.k8s.io/pause:3.7 registry.k8s.io/etcd:3.5.3-0 registry.k8s.io/coredns/coredns:v1.8.6 gcr.io/k8s-minikube/storage-provisioner:v5]\n"} +{"Time":"2023-05-31T19:27:03.676065021Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281226 37468 image.go:134] retrieving image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T19:27:03.676069156Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281250 37468 image.go:134] retrieving image: registry.k8s.io/kube-scheduler:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676072544Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281263 37468 image.go:134] retrieving image: registry.k8s.io/kube-controller-manager:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.67607622Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281296 37468 image.go:134] retrieving image: registry.k8s.io/kube-apiserver:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676079919Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281336 37468 image.go:134] retrieving image: registry.k8s.io/etcd:3.5.3-0\n"} +{"Time":"2023-05-31T19:27:03.676088176Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281417 37468 image.go:134] retrieving image: registry.k8s.io/coredns/coredns:v1.8.6\n"} +{"Time":"2023-05-31T19:27:03.67609156Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281230 37468 image.go:134] retrieving image: registry.k8s.io/kube-proxy:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676094455Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.281481 37468 image.go:134] retrieving image: registry.k8s.io/pause:3.7\n"} +{"Time":"2023-05-31T19:27:03.676100405Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.282620 37468 image.go:177] daemon lookup for registry.k8s.io/etcd:3.5.3-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.5.3-0\n"} +{"Time":"2023-05-31T19:27:03.676104341Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.282639 37468 image.go:177] daemon lookup for gcr.io/k8s-minikube/storage-provisioner:v5: Error response from daemon: No such image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T19:27:03.676199926Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.282643 37468 image.go:177] daemon lookup for registry.k8s.io/pause:3.7: Error response from daemon: No such image: registry.k8s.io/pause:3.7\n"} +{"Time":"2023-05-31T19:27:03.676215168Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.282632 37468 image.go:177] daemon lookup for registry.k8s.io/kube-controller-manager:v1.24.4: Error response from daemon: No such image: registry.k8s.io/kube-controller-manager:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676219718Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.282671 37468 image.go:177] daemon lookup for registry.k8s.io/coredns/coredns:v1.8.6: Error response from daemon: No such image: registry.k8s.io/coredns/coredns:v1.8.6\n"} +{"Time":"2023-05-31T19:27:03.676224134Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.282685 37468 image.go:177] daemon lookup for registry.k8s.io/kube-apiserver:v1.24.4: Error response from daemon: No such image: registry.k8s.io/kube-apiserver:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676227905Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.282690 37468 image.go:177] daemon lookup for registry.k8s.io/kube-scheduler:v1.24.4: Error response from daemon: No such image: registry.k8s.io/kube-scheduler:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676231696Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.282674 37468 image.go:177] daemon lookup for registry.k8s.io/kube-proxy:v1.24.4: Error response from daemon: No such image: registry.k8s.io/kube-proxy:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676235458Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.433497 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/etcd:3.5.3-0\"\n"} +{"Time":"2023-05-31T19:27:03.676239586Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.444032 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/coredns/coredns:v1.8.6\"\n"} +{"Time":"2023-05-31T19:27:03.676243556Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.444100 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/kube-scheduler:v1.24.4\"\n"} +{"Time":"2023-05-31T19:27:03.676247863Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.447193 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/kube-controller-manager:v1.24.4\"\n"} +{"Time":"2023-05-31T19:27:03.676251933Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.459681 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/kube-apiserver:v1.24.4\"\n"} +{"Time":"2023-05-31T19:27:03.676255639Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.462090 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/pause:3.7\"\n"} +{"Time":"2023-05-31T19:27:03.676259716Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.509421 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep gcr.io/k8s-minikube/storage-provisioner:v5\"\n"} +{"Time":"2023-05-31T19:27:03.676267713Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:21.524058 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/kube-proxy:v1.24.4\"\n"} +{"Time":"2023-05-31T19:27:03.676272853Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.262807 37468 cache_images.go:116] \"registry.k8s.io/etcd:3.5.3-0\" needs transfer: \"registry.k8s.io/etcd:3.5.3-0\" does not exist at hash \"aebe758cef4cd05b9f8cee39758227714d02f42ef3088023c1e3cd454f927a2b\" in container runtime\n"} +{"Time":"2023-05-31T19:27:03.676390534Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.262855 37468 cri.go:217] Removing image: registry.k8s.io/etcd:3.5.3-0\n"} +{"Time":"2023-05-31T19:27:03.67639566Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.262896 37468 cache_images.go:116] \"registry.k8s.io/kube-scheduler:v1.24.4\" needs transfer: \"registry.k8s.io/kube-scheduler:v1.24.4\" does not exist at hash \"03fa22539fc1ccdb96fb15098e7a02fff03d0e366ce5d80891eb0a3a8594a0c9\" in container runtime\n"} +{"Time":"2023-05-31T19:27:03.67639977Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.262933 37468 cri.go:217] Removing image: registry.k8s.io/kube-scheduler:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676403991Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.262979 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.67640759Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.262904 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.67641116Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.344631 37468 cache_images.go:116] \"registry.k8s.io/coredns/coredns:v1.8.6\" needs transfer: \"registry.k8s.io/coredns/coredns:v1.8.6\" does not exist at hash \"a4ca41631cc7ac19ce1be3ebf0314ac5f47af7c711f17066006db82ee3b75b03\" in container runtime\n"} +{"Time":"2023-05-31T19:27:03.676415235Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.344666 37468 cri.go:217] Removing image: registry.k8s.io/coredns/coredns:v1.8.6\n"} +{"Time":"2023-05-31T19:27:03.676418837Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.344704 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.676422626Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.688994 37468 ssh_runner.go:235] Completed: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/kube-controller-manager:v1.24.4\": (1.241767234s)\n"} +{"Time":"2023-05-31T19:27:03.676426867Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689045 37468 ssh_runner.go:235] Completed: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/kube-apiserver:v1.24.4\": (1.2293392s)\n"} +{"Time":"2023-05-31T19:27:03.676430892Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689045 37468 cache_images.go:116] \"registry.k8s.io/kube-controller-manager:v1.24.4\" needs transfer: \"registry.k8s.io/kube-controller-manager:v1.24.4\" does not exist at hash \"1f99cb6da9a82e81081f65acdad10cdca2e5ec4084f91009bdcff31dd6151d48\" in container runtime\n"} +{"Time":"2023-05-31T19:27:03.676435804Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689087 37468 cache_images.go:116] \"registry.k8s.io/kube-apiserver:v1.24.4\" needs transfer: \"registry.k8s.io/kube-apiserver:v1.24.4\" does not exist at hash \"6cab9d1bed1be49c215505c1a438ce0af66eb54b4e95f06e52037fcd36631f3d\" in container runtime\n"} +{"Time":"2023-05-31T19:27:03.676440236Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689110 37468 cri.go:217] Removing image: registry.k8s.io/kube-controller-manager:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676443652Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689155 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.676447491Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689112 37468 cri.go:217] Removing image: registry.k8s.io/kube-apiserver:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676450964Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689250 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.676609035Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689696 37468 ssh_runner.go:235] Completed: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/pause:3.7\": (1.227581606s)\n"} +{"Time":"2023-05-31T19:27:03.676621224Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689721 37468 cache_images.go:116] \"registry.k8s.io/pause:3.7\" needs transfer: \"registry.k8s.io/pause:3.7\" does not exist at hash \"221177c6082a88ea4f6240ab2450d540955ac6f4d5454f0e15751b653ebda165\" in container runtime\n"} +{"Time":"2023-05-31T19:27:03.676625664Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689739 37468 cri.go:217] Removing image: registry.k8s.io/pause:3.7\n"} +{"Time":"2023-05-31T19:27:03.676629011Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.689766 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.676633162Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694636 37468 ssh_runner.go:235] Completed: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep gcr.io/k8s-minikube/storage-provisioner:v5\": (1.185193756s)\n"} +{"Time":"2023-05-31T19:27:03.676638088Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694657 37468 cache_images.go:116] \"gcr.io/k8s-minikube/storage-provisioner:v5\" needs transfer: \"gcr.io/k8s-minikube/storage-provisioner:v5\" does not exist at hash \"6e38f40d628db3002f5617342c8872c935de530d867d0f709a2fbda1a302a562\" in container runtime\n"} +{"Time":"2023-05-31T19:27:03.676654315Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694676 37468 ssh_runner.go:235] Completed: /bin/bash -c \"sudo ctr -n=k8s.io images check | grep registry.k8s.io/kube-proxy:v1.24.4\": (1.170596086s)\n"} +{"Time":"2023-05-31T19:27:03.676658876Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694688 37468 cri.go:217] Removing image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T19:27:03.676664487Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694708 37468 cache_images.go:116] \"registry.k8s.io/kube-proxy:v1.24.4\" needs transfer: \"registry.k8s.io/kube-proxy:v1.24.4\" does not exist at hash \"7a53d1e08ef58144850b48d05908b4ef5b611bff99a5a66dbcba7ab9f79433f7\" in container runtime\n"} +{"Time":"2023-05-31T19:27:03.676668684Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694720 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.676672908Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694728 37468 cri.go:217] Removing image: registry.k8s.io/kube-proxy:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.67667772Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694757 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl rmi registry.k8s.io/kube-scheduler:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676688113Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694760 37468 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T19:27:03.676692324Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694798 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl rmi registry.k8s.io/etcd:3.5.3-0\n"} +{"Time":"2023-05-31T19:27:03.676702978Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.694820 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl rmi registry.k8s.io/coredns/coredns:v1.8.6\n"} +{"Time":"2023-05-31T19:27:03.67670783Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.699704 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl rmi registry.k8s.io/kube-controller-manager:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676712956Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.699736 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl rmi registry.k8s.io/kube-apiserver:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676861463Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.703254 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl rmi registry.k8s.io/pause:3.7\n"} +{"Time":"2023-05-31T19:27:03.676878004Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.800880 37468 cache_images.go:286] Loading image from: /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/kube-scheduler_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676883024Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.800928 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl rmi gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T19:27:03.676886704Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.800974 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/kube-scheduler_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676890616Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.800988 37468 cache_images.go:286] Loading image from: /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/etcd_3.5.3-0\n"} +{"Time":"2023-05-31T19:27:03.676894825Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801036 37468 cache_images.go:286] Loading image from: /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/coredns/coredns_v1.8.6\n"} +{"Time":"2023-05-31T19:27:03.676898586Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801062 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/etcd_3.5.3-0\n"} +{"Time":"2023-05-31T19:27:03.676902565Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801108 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/coredns_v1.8.6\n"} +{"Time":"2023-05-31T19:27:03.67690621Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801124 37468 ssh_runner.go:195] Run: sudo /usr/bin/crictl rmi registry.k8s.io/kube-proxy:v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676909821Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801177 37468 cache_images.go:286] Loading image from: /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/kube-controller-manager_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676913881Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801211 37468 cache_images.go:286] Loading image from: /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/kube-apiserver_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676917777Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801229 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/kube-controller-manager_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676921491Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801278 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/kube-apiserver_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.676925647Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801276 37468 cache_images.go:286] Loading image from: /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/pause_3.7\n"} +{"Time":"2023-05-31T19:27:03.676929145Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.801376 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/pause_3.7\n"} +{"Time":"2023-05-31T19:27:03.676933004Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.876926 37468 cache_images.go:286] Loading image from: /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/gcr.io/k8s-minikube/storage-provisioner_v5\n"} +{"Time":"2023-05-31T19:27:03.677031903Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877026 37468 ssh_runner.go:356] copy: skipping /var/lib/minikube/images/etcd_3.5.3-0 (exists)\n"} +{"Time":"2023-05-31T19:27:03.677036399Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877035 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/storage-provisioner_v5\n"} +{"Time":"2023-05-31T19:27:03.677040364Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877074 37468 containerd.go:269] Loading image: /var/lib/minikube/images/etcd_3.5.3-0\n"} +{"Time":"2023-05-31T19:27:03.677043862Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877076 37468 ssh_runner.go:356] copy: skipping /var/lib/minikube/images/kube-scheduler_v1.24.4 (exists)\n"} +{"Time":"2023-05-31T19:27:03.677047954Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877137 37468 ssh_runner.go:195] Run: sudo ctr -n=k8s.io images import /var/lib/minikube/images/etcd_3.5.3-0\n"} +{"Time":"2023-05-31T19:27:03.677051943Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877143 37468 ssh_runner.go:356] copy: skipping /var/lib/minikube/images/coredns_v1.8.6 (exists)\n"} +{"Time":"2023-05-31T19:27:03.67705597Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877214 37468 cache_images.go:286] Loading image from: /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/kube-proxy_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.677059452Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877269 37468 ssh_runner.go:356] copy: skipping /var/lib/minikube/images/kube-controller-manager_v1.24.4 (exists)\n"} +{"Time":"2023-05-31T19:27:03.677063225Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877284 37468 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/kube-proxy_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.677066719Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877310 37468 ssh_runner.go:356] copy: skipping /var/lib/minikube/images/kube-apiserver_v1.24.4 (exists)\n"} +{"Time":"2023-05-31T19:27:03.67707048Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.877342 37468 ssh_runner.go:356] copy: skipping /var/lib/minikube/images/pause_3.7 (exists)\n"} +{"Time":"2023-05-31T19:27:03.677074168Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:22.881468 37468 ssh_runner.go:356] copy: skipping /var/lib/minikube/images/storage-provisioner_v5 (exists)\n"} +{"Time":"2023-05-31T19:27:03.677078266Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:24.766500 37468 ssh_runner.go:235] Completed: stat -c \"%!s(MISSING) %!y(MISSING)\" /var/lib/minikube/images/kube-proxy_v1.24.4: (1.889193606s)\n"} +{"Time":"2023-05-31T19:27:03.67708531Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:24.766544 37468 ssh_runner.go:356] copy: skipping /var/lib/minikube/images/kube-proxy_v1.24.4 (exists)\n"} +{"Time":"2023-05-31T19:27:03.677089193Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:24.766641 37468 ssh_runner.go:235] Completed: sudo ctr -n=k8s.io images import /var/lib/minikube/images/etcd_3.5.3-0: (1.889475748s)\n"} +{"Time":"2023-05-31T19:27:03.677092888Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:24.766663 37468 cache_images.go:315] Transferred and loaded /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/etcd_3.5.3-0 from cache\n"} +{"Time":"2023-05-31T19:27:03.677096297Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:24.766685 37468 containerd.go:269] Loading image: /var/lib/minikube/images/kube-scheduler_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.677265973Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:24.766745 37468 ssh_runner.go:195] Run: sudo ctr -n=k8s.io images import /var/lib/minikube/images/kube-scheduler_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.67727136Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:25.142972 37468 cache_images.go:315] Transferred and loaded /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/kube-scheduler_v1.24.4 from cache\n"} +{"Time":"2023-05-31T19:27:03.677275113Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:25.143011 37468 containerd.go:269] Loading image: /var/lib/minikube/images/coredns_v1.8.6\n"} +{"Time":"2023-05-31T19:27:03.677278745Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:25.143050 37468 ssh_runner.go:195] Run: sudo ctr -n=k8s.io images import /var/lib/minikube/images/coredns_v1.8.6\n"} +{"Time":"2023-05-31T19:27:03.677282395Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:25.486171 37468 cache_images.go:315] Transferred and loaded /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/coredns/coredns_v1.8.6 from cache\n"} +{"Time":"2023-05-31T19:27:03.677287358Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:25.486204 37468 containerd.go:269] Loading image: /var/lib/minikube/images/kube-controller-manager_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.677311545Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:25.486251 37468 ssh_runner.go:195] Run: sudo ctr -n=k8s.io images import /var/lib/minikube/images/kube-controller-manager_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.677332357Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.065691 37468 cache_images.go:315] Transferred and loaded /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/kube-controller-manager_v1.24.4 from cache\n"} +{"Time":"2023-05-31T19:27:03.677339827Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.065733 37468 containerd.go:269] Loading image: /var/lib/minikube/images/kube-apiserver_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.67734359Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.065783 37468 ssh_runner.go:195] Run: sudo ctr -n=k8s.io images import /var/lib/minikube/images/kube-apiserver_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.677347324Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.694923 37468 cache_images.go:315] Transferred and loaded /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/kube-apiserver_v1.24.4 from cache\n"} +{"Time":"2023-05-31T19:27:03.677350658Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.694964 37468 containerd.go:269] Loading image: /var/lib/minikube/images/pause_3.7\n"} +{"Time":"2023-05-31T19:27:03.677355102Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.695032 37468 ssh_runner.go:195] Run: sudo ctr -n=k8s.io images import /var/lib/minikube/images/pause_3.7\n"} +{"Time":"2023-05-31T19:27:03.677362419Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.816755 37468 cache_images.go:315] Transferred and loaded /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/pause_3.7 from cache\n"} +{"Time":"2023-05-31T19:27:03.677366328Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.816798 37468 containerd.go:269] Loading image: /var/lib/minikube/images/storage-provisioner_v5\n"} +{"Time":"2023-05-31T19:27:03.677369889Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:26.816845 37468 ssh_runner.go:195] Run: sudo ctr -n=k8s.io images import /var/lib/minikube/images/storage-provisioner_v5\n"} +{"Time":"2023-05-31T19:27:03.677513809Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:27.387207 37468 cache_images.go:315] Transferred and loaded /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/gcr.io/k8s-minikube/storage-provisioner_v5 from cache\n"} +{"Time":"2023-05-31T19:27:03.677519156Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:27.387257 37468 containerd.go:269] Loading image: /var/lib/minikube/images/kube-proxy_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.677522918Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:27.387321 37468 ssh_runner.go:195] Run: sudo ctr -n=k8s.io images import /var/lib/minikube/images/kube-proxy_v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.677530074Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.076611 37468 cache_images.go:315] Transferred and loaded /home/jenkins/minikube-integration/16569-10887/.minikube/cache/images/amd64/registry.k8s.io/kube-proxy_v1.24.4 from cache\n"} +{"Time":"2023-05-31T19:27:03.677533649Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.076654 37468 cache_images.go:123] Successfully loaded all cached images\n"} +{"Time":"2023-05-31T19:27:03.677537776Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.076662 37468 cache_images.go:92] LoadImages completed in 6.795485787s\n"} +{"Time":"2023-05-31T19:27:03.677541121Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.076716 37468 ssh_runner.go:195] Run: sudo crictl info\n"} +{"Time":"2023-05-31T19:27:03.67754453Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.111267 37468 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T19:27:03.677547807Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.111290 37468 cni.go:145] \"kvm2\" driver + \"containerd\" runtime found, recommending bridge\n"} +{"Time":"2023-05-31T19:27:03.677551644Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.111305 37468 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:27:03.677557454Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.111322 37468 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.39.220 APIServerPort:8443 KubernetesVersion:v1.24.4 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:test-preload-677810 NodeName:test-preload-677810 DNSDomain:cluster.local CRISocket:/run/containerd/containerd.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.39.220\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.39.220 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt "} +{"Time":"2023-05-31T19:27:03.677563174Z","Action":"output","Test":"TestPreload","Output":"StaticPodPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:true}\n"} +{"Time":"2023-05-31T19:27:03.677567342Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.111487 37468 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T19:27:03.677570479Z","Action":"output","Test":"TestPreload","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:27:03.677758881Z","Action":"output","Test":"TestPreload","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T19:27:03.677763996Z","Action":"output","Test":"TestPreload","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T19:27:03.677767459Z","Action":"output","Test":"TestPreload","Output":" \t advertiseAddress: 192.168.39.220\n"} +{"Time":"2023-05-31T19:27:03.677779081Z","Action":"output","Test":"TestPreload","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T19:27:03.67778758Z","Action":"output","Test":"TestPreload","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T19:27:03.677790681Z","Action":"output","Test":"TestPreload","Output":" \t - groups:\n"} +{"Time":"2023-05-31T19:27:03.677793651Z","Action":"output","Test":"TestPreload","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T19:27:03.677796929Z","Action":"output","Test":"TestPreload","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T19:27:03.677800083Z","Action":"output","Test":"TestPreload","Output":" \t usages:\n"} +{"Time":"2023-05-31T19:27:03.677803511Z","Action":"output","Test":"TestPreload","Output":" \t - signing\n"} +{"Time":"2023-05-31T19:27:03.677806517Z","Action":"output","Test":"TestPreload","Output":" \t - authentication\n"} +{"Time":"2023-05-31T19:27:03.6778098Z","Action":"output","Test":"TestPreload","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T19:27:03.677813121Z","Action":"output","Test":"TestPreload","Output":" \t criSocket: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T19:27:03.677816833Z","Action":"output","Test":"TestPreload","Output":" \t name: \"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.677820063Z","Action":"output","Test":"TestPreload","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T19:27:03.677822968Z","Action":"output","Test":"TestPreload","Output":" \t node-ip: 192.168.39.220\n"} +{"Time":"2023-05-31T19:27:03.67782634Z","Action":"output","Test":"TestPreload","Output":" \t taints: []\n"} +{"Time":"2023-05-31T19:27:03.677829071Z","Action":"output","Test":"TestPreload","Output":" \t---\n"} +{"Time":"2023-05-31T19:27:03.677832491Z","Action":"output","Test":"TestPreload","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:27:03.677839308Z","Action":"output","Test":"TestPreload","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T19:27:03.677842563Z","Action":"output","Test":"TestPreload","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T19:27:03.677845924Z","Action":"output","Test":"TestPreload","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.39.220\"]\n"} +{"Time":"2023-05-31T19:27:03.677849494Z","Action":"output","Test":"TestPreload","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T19:27:03.677853511Z","Action":"output","Test":"TestPreload","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T19:27:03.677857257Z","Action":"output","Test":"TestPreload","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T19:27:03.677860389Z","Action":"output","Test":"TestPreload","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T19:27:03.677863475Z","Action":"output","Test":"TestPreload","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T19:27:03.677866637Z","Action":"output","Test":"TestPreload","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:27:03.677869851Z","Action":"output","Test":"TestPreload","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T19:27:03.677877767Z","Action":"output","Test":"TestPreload","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T19:27:03.67803265Z","Action":"output","Test":"TestPreload","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:27:03.6780374Z","Action":"output","Test":"TestPreload","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:27:03.678040485Z","Action":"output","Test":"TestPreload","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T19:27:03.678044008Z","Action":"output","Test":"TestPreload","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:27:03.678050473Z","Action":"output","Test":"TestPreload","Output":" \tetcd:\n"} +{"Time":"2023-05-31T19:27:03.678053988Z","Action":"output","Test":"TestPreload","Output":" \t local:\n"} +{"Time":"2023-05-31T19:27:03.678069905Z","Action":"output","Test":"TestPreload","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:27:03.678074226Z","Action":"output","Test":"TestPreload","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T19:27:03.678077126Z","Action":"output","Test":"TestPreload","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T19:27:03.678080419Z","Action":"output","Test":"TestPreload","Output":" \tkubernetesVersion: v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.67808963Z","Action":"output","Test":"TestPreload","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T19:27:03.678093383Z","Action":"output","Test":"TestPreload","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T19:27:03.67809647Z","Action":"output","Test":"TestPreload","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T19:27:03.678099806Z","Action":"output","Test":"TestPreload","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T19:27:03.67810283Z","Action":"output","Test":"TestPreload","Output":" \t---\n"} +{"Time":"2023-05-31T19:27:03.678106331Z","Action":"output","Test":"TestPreload","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T19:27:03.678109679Z","Action":"output","Test":"TestPreload","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T19:27:03.678112687Z","Action":"output","Test":"TestPreload","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T19:27:03.678116179Z","Action":"output","Test":"TestPreload","Output":" \t x509:\n"} +{"Time":"2023-05-31T19:27:03.678119782Z","Action":"output","Test":"TestPreload","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:27:03.678123152Z","Action":"output","Test":"TestPreload","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T19:27:03.678126292Z","Action":"output","Test":"TestPreload","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T19:27:03.678129614Z","Action":"output","Test":"TestPreload","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T19:27:03.678132679Z","Action":"output","Test":"TestPreload","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T19:27:03.678136265Z","Action":"output","Test":"TestPreload","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T19:27:03.678151514Z","Action":"output","Test":"TestPreload","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T19:27:03.678155537Z","Action":"output","Test":"TestPreload","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T19:27:03.678158839Z","Action":"output","Test":"TestPreload","Output":" \t nodefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T19:27:03.678161995Z","Action":"output","Test":"TestPreload","Output":" \t nodefs.inodesFree: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T19:27:03.678165493Z","Action":"output","Test":"TestPreload","Output":" \t imagefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T19:27:03.678169257Z","Action":"output","Test":"TestPreload","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T19:27:03.678286827Z","Action":"output","Test":"TestPreload","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T19:27:03.678291604Z","Action":"output","Test":"TestPreload","Output":" \t---\n"} +{"Time":"2023-05-31T19:27:03.678294802Z","Action":"output","Test":"TestPreload","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T19:27:03.678298102Z","Action":"output","Test":"TestPreload","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T19:27:03.678301307Z","Action":"output","Test":"TestPreload","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T19:27:03.678304775Z","Action":"output","Test":"TestPreload","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T19:27:03.678312115Z","Action":"output","Test":"TestPreload","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T19:27:03.678315469Z","Action":"output","Test":"TestPreload","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T19:27:03.678318752Z","Action":"output","Test":"TestPreload","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T19:27:03.678322134Z","Action":"output","Test":"TestPreload","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T19:27:03.678325257Z","Action":"output","Test":"TestPreload","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T19:27:03.678328366Z","Action":"output","Test":"TestPreload","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T19:27:03.67833103Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.678334112Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.111577 37468 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T19:27:03.678337324Z","Action":"output","Test":"TestPreload","Output":" \tWants=containerd.service\n"} +{"Time":"2023-05-31T19:27:03.678340779Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.678343974Z","Action":"output","Test":"TestPreload","Output":" \t[Service]\n"} +{"Time":"2023-05-31T19:27:03.678346909Z","Action":"output","Test":"TestPreload","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T19:27:03.678350884Z","Action":"output","Test":"TestPreload","Output":" \tExecStart=/var/lib/minikube/binaries/v1.24.4/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=test-preload-677810 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.39.220\n"} +{"Time":"2023-05-31T19:27:03.678354703Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.678357604Z","Action":"output","Test":"TestPreload","Output":" \t[Install]\n"} +{"Time":"2023-05-31T19:27:03.678360611Z","Action":"output","Test":"TestPreload","Output":" \t config:\n"} +{"Time":"2023-05-31T19:27:03.678364365Z","Action":"output","Test":"TestPreload","Output":" \t{KubernetesVersion:v1.24.4 ClusterName:test-preload-677810 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T19:27:03.678371334Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.111645 37468 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.678374925Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.121851 37468 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T19:27:03.678491464Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.121914 37468 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T19:27:03.678496464Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.131602 37468 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (393 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678500047Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.148045 37468 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678503809Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.164255 37468 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2114 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678507039Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.180623 37468 ssh_runner.go:195] Run: grep 192.168.39.220\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T19:27:03.678515001Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.184134 37468 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.39.220\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T19:27:03.678519833Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195016 37468 certs.go:56] Setting up /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810 for IP: 192.168.39.220\n"} +{"Time":"2023-05-31T19:27:03.678523815Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195042 37468 certs.go:190] acquiring lock for shared ca certs: {Name:mk1d6e7779afb08ce6255df0534a35d32939f350 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.678527919Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195176 37468 certs.go:199] skipping minikubeCA CA generation: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.key\n"} +{"Time":"2023-05-31T19:27:03.678531528Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195213 37468 certs.go:199] skipping proxyClientCA CA generation: /home/jenkins/minikube-integration/16569-10887/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T19:27:03.678551195Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195274 37468 certs.go:315] skipping minikube-user signed cert generation: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/client.key\n"} +{"Time":"2023-05-31T19:27:03.678555714Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195325 37468 certs.go:315] skipping minikube signed cert generation: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/apiserver.key.14dd3156\n"} +{"Time":"2023-05-31T19:27:03.678559363Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195377 37468 certs.go:315] skipping aggregator signed cert generation: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/proxy-client.key\n"} +{"Time":"2023-05-31T19:27:03.678563069Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195484 37468 certs.go:437] found cert: /home/jenkins/minikube-integration/16569-10887/.minikube/certs/home/jenkins/minikube-integration/16569-10887/.minikube/certs/18150.pem (1338 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678566681Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:28.195510 37468 certs.go:433] ignoring /home/jenkins/minikube-integration/16569-10887/.minikube/certs/home/jenkins/minikube-integration/16569-10887/.minikube/certs/18150_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T19:27:03.678752468Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195520 37468 certs.go:437] found cert: /home/jenkins/minikube-integration/16569-10887/.minikube/certs/home/jenkins/minikube-integration/16569-10887/.minikube/certs/ca-key.pem (1679 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678757861Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195552 37468 certs.go:437] found cert: /home/jenkins/minikube-integration/16569-10887/.minikube/certs/home/jenkins/minikube-integration/16569-10887/.minikube/certs/ca.pem (1082 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678762156Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195579 37468 certs.go:437] found cert: /home/jenkins/minikube-integration/16569-10887/.minikube/certs/home/jenkins/minikube-integration/16569-10887/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678773164Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195603 37468 certs.go:437] found cert: /home/jenkins/minikube-integration/16569-10887/.minikube/certs/home/jenkins/minikube-integration/16569-10887/.minikube/certs/key.pem (1679 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678777267Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.195639 37468 certs.go:437] found cert: /home/jenkins/minikube-integration/16569-10887/.minikube/files/etc/ssl/certs/home/jenkins/minikube-integration/16569-10887/.minikube/files/etc/ssl/certs/181502.pem (1708 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678781379Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.196193 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678785376Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.218354 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678789527Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.240735 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678793652Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.264562 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678797506Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.286702 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678801465Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.308770 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1679 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678805271Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.331902 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T19:27:03.67880901Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.355742 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678982623Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.378218 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/files/etc/ssl/certs/181502.pem --\u003e /usr/share/ca-certificates/181502.pem (1708 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678988353Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.398713 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678992468Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.419082 37468 ssh_runner.go:362] scp /home/jenkins/minikube-integration/16569-10887/.minikube/certs/18150.pem --\u003e /usr/share/ca-certificates/18150.pem (1338 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678996226Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.439409 37468 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T19:27:03.678999899Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.454619 37468 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T19:27:03.679003444Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.459910 37468 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/18150.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/18150.pem /etc/ssl/certs/18150.pem\"\n"} +{"Time":"2023-05-31T19:27:03.679012276Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.470693 37468 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/18150.pem\n"} +{"Time":"2023-05-31T19:27:03.679016148Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.475073 37468 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:50 /usr/share/ca-certificates/18150.pem\n"} +{"Time":"2023-05-31T19:27:03.679019792Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.475104 37468 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/18150.pem\n"} +{"Time":"2023-05-31T19:27:03.679023562Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.480415 37468 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/18150.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T19:27:03.679027697Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.491095 37468 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/181502.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/181502.pem /etc/ssl/certs/181502.pem\"\n"} +{"Time":"2023-05-31T19:27:03.679031605Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.501849 37468 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/181502.pem\n"} +{"Time":"2023-05-31T19:27:03.679035109Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.506345 37468 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:50 /usr/share/ca-certificates/181502.pem\n"} +{"Time":"2023-05-31T19:27:03.679038701Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.506378 37468 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/181502.pem\n"} +{"Time":"2023-05-31T19:27:03.679042188Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.511672 37468 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/181502.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T19:27:03.6790464Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.522556 37468 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T19:27:03.679194941Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.533606 37468 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T19:27:03.679199978Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.538033 37468 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:44 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T19:27:03.679203656Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.538075 37468 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T19:27:03.679207249Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.543545 37468 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T19:27:03.679210943Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.554489 37468 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T19:27:03.679214278Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.558368 37468 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-etcd-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T19:27:03.679217572Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.563831 37468 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/apiserver-kubelet-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T19:27:03.679220828Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.569365 37468 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/server.crt -checkend 86400\n"} +{"Time":"2023-05-31T19:27:03.679224236Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.574770 37468 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/healthcheck-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T19:27:03.67922722Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.580269 37468 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/etcd/peer.crt -checkend 86400\n"} +{"Time":"2023-05-31T19:27:03.679230988Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.585707 37468 ssh_runner.go:195] Run: openssl x509 -noout -in /var/lib/minikube/certs/front-proxy-client.crt -checkend 86400\n"} +{"Time":"2023-05-31T19:27:03.679237955Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.591327 37468 kubeadm.go:404] StartCluster: {Name:test-preload-677810 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-amd64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:kvm2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVers"} +{"Time":"2023-05-31T19:27:03.679249314Z","Action":"output","Test":"TestPreload","Output":"ion:v1.24.4 ClusterName:test-preload-677810 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:containerd CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.39.220 Port:8443 KubernetesVersion:v1.24.4 ContainerRuntime:containerd ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network: Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/home/jenkins:/minikube-host Mount9P"} +{"Time":"2023-05-31T19:27:03.679445747Z","Action":"output","Test":"TestPreload","Output":"Version:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath: SocketVMnetPath: StaticIP:}\n"} +{"Time":"2023-05-31T19:27:03.679451122Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.591396 37468 cri.go:53] listing CRI containers in root /run/containerd/runc/k8s.io: {State:paused Name: Namespaces:[kube-system]}\n"} +{"Time":"2023-05-31T19:27:03.679455234Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.591424 37468 ssh_runner.go:195] Run: sudo -s eval \"crictl ps -a --quiet --label io.kubernetes.pod.namespace=kube-system\"\n"} +{"Time":"2023-05-31T19:27:03.679463155Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.628681 37468 cri.go:88] found id: \"\"\n"} +{"Time":"2023-05-31T19:27:03.679466972Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.628738 37468 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:27:03.679470741Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.638676 37468 kubeadm.go:419] found existing configuration files, will attempt cluster restart\n"} +{"Time":"2023-05-31T19:27:03.679474157Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.638689 37468 kubeadm.go:636] restartCluster start\n"} +{"Time":"2023-05-31T19:27:03.679477645Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.638715 37468 ssh_runner.go:195] Run: sudo test -d /data/minikube\n"} +{"Time":"2023-05-31T19:27:03.679481136Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.648401 37468 kubeadm.go:127] /data/minikube skipping compat symlinks: sudo test -d /data/minikube: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.679484762Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.679487962Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.679490855Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.679496958Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.648809 37468 kubeconfig.go:135] verify returned: extract IP: \"test-preload-677810\" does not appear in /home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T19:27:03.679501177Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.648912 37468 kubeconfig.go:146] \"test-preload-677810\" context is missing from /home/jenkins/minikube-integration/16569-10887/kubeconfig - will repair!\n"} +{"Time":"2023-05-31T19:27:03.679505058Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.649249 37468 lock.go:35] WriteFile acquiring /home/jenkins/minikube-integration/16569-10887/kubeconfig: {Name:mke3148b1dee4eb284a24a0decf47d085247076c Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.679675304Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.649854 37468 kapi.go:59] client config for test-preload-677810: \u0026rest.Config{Host:\"https://192.168.39.220:8443\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/client.crt\", KeyFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/client.key\", CAFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint8(nil), CAData:[]uint8("} +{"Time":"2023-05-31T19:27:03.679691557Z","Action":"output","Test":"TestPreload","Output":"nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x19b95a0), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T19:27:03.679695876Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.650654 37468 ssh_runner.go:195] Run: sudo diff -u /var/tmp/minikube/kubeadm.yaml /var/tmp/minikube/kubeadm.yaml.new\n"} +{"Time":"2023-05-31T19:27:03.679699521Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.660024 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.679703054Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:28.660067 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.679706614Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:28.671977 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.679714186Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.679717338Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.679720758Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.679724224Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:29.172717 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.679727826Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:29.172816 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.67973148Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:29.184142 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.679735053Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.679738179Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.679741422Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.67991618Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:29.672696 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.679926028Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:29.672756 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.679930001Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:29.685230 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.679933513Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.679936673Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.67993966Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.679943022Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:30.172828 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.679950849Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:30.172884 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.679957253Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:30.185655 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.679960599Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.679963548Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.679966656Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.679969903Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:30.672290 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.679973152Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:30.672393 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.679976532Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:30.685793 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.679979496Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.679986036Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.679989308Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.679992561Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:31.172397 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.679995883Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:31.172484 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680002283Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:31.185167 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680010997Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680014086Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680016843Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680020262Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:31.672947 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680137751Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:31.673038 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680142814Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:31.685839 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680146268Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680149278Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680152318Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680155688Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:32.172406 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680159074Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:32.172579 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680162608Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:32.185055 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680165958Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680169028Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680172159Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680175427Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:32.672754 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680178684Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:32.672824 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680182418Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:32.684162 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680185667Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680188793Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680191753Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.68019512Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:33.172152 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680198603Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:33.172219 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680202348Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:33.182995 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680205658Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.68020889Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680211972Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680215577Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:33.672525 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680219022Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:33.672635 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680351291Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:33.683889 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680355973Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.68035893Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680361898Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680365012Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:34.172413 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680368596Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:34.172492 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.68037179Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:34.183420 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680375431Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680381486Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680384979Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680387844Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:34.672461 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680391647Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:34.672529 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680395009Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:34.685261 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680398365Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680406365Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680409162Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680412717Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:35.172891 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.68041613Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:35.172972 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.68041983Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:35.184570 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680423154Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680426308Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680434521Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680437916Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:35.672116 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.68044158Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:35.672179 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680611483Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:35.685933 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680620243Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.68062359Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680626821Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680629897Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:36.172457 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680633592Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:36.172560 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680637232Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:36.184733 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.68064054Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.68064342Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680646362Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680649847Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:36.672970 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.68065402Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:36.673071 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680657604Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:36.685056 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680661039Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680664122Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680667049Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680670403Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:37.172602 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680673801Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:37.172679 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680677331Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:37.184035 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680680754Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680683964Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680686951Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680690003Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:37.672598 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680693687Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:37.672704 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.68085255Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:37.684329 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.680857752Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680861327Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680870057Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680873304Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.172222 37468 api_server.go:166] Checking apiserver status ...\n"} +{"Time":"2023-05-31T19:27:03.680876889Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.172282 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.680880367Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:38.183658 37468 api_server.go:170] stopped: unable to get apiserver pid: sudo pgrep -xnf kube-apiserver.*minikube.*: Process exited with status 1\n"} +{"Time":"2023-05-31T19:27:03.68088377Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680886773Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.680889972Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680893296Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.660594 37468 kubeadm.go:611] needs reconfigure: apiserver error: context deadline exceeded\n"} +{"Time":"2023-05-31T19:27:03.680897166Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.660643 37468 kubeadm.go:1123] stopping kube-system containers ...\n"} +{"Time":"2023-05-31T19:27:03.680900583Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.660666 37468 cri.go:53] listing CRI containers in root /run/containerd/runc/k8s.io: {State:all Name: Namespaces:[kube-system]}\n"} +{"Time":"2023-05-31T19:27:03.680904272Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.660726 37468 ssh_runner.go:195] Run: sudo -s eval \"crictl ps -a --quiet --label io.kubernetes.pod.namespace=kube-system\"\n"} +{"Time":"2023-05-31T19:27:03.680907803Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.694018 37468 cri.go:88] found id: \"\"\n"} +{"Time":"2023-05-31T19:27:03.680911602Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.694073 37468 ssh_runner.go:195] Run: sudo systemctl stop kubelet\n"} +{"Time":"2023-05-31T19:27:03.680915111Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.708671 37468 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T19:27:03.680919295Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.716901 37468 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T19:27:03.680923014Z","Action":"output","Test":"TestPreload","Output":" \tstdout:\n"} +{"Time":"2023-05-31T19:27:03.680926246Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.68092928Z","Action":"output","Test":"TestPreload","Output":" \tstderr:\n"} +{"Time":"2023-05-31T19:27:03.680932399Z","Action":"output","Test":"TestPreload","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:27:03.681067494Z","Action":"output","Test":"TestPreload","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:27:03.681075202Z","Action":"output","Test":"TestPreload","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:27:03.681081329Z","Action":"output","Test":"TestPreload","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:27:03.681085192Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.716955 37468 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T19:27:03.681088686Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.725051 37468 kubeadm.go:713] reconfiguring cluster from /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T19:27:03.68109194Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.725067 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.24.4:$PATH\" kubeadm init phase certs all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T19:27:03.681096185Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:38.816534 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.24.4:$PATH\" kubeadm init phase kubeconfig all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T19:27:03.681100327Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:40.026732 37468 ssh_runner.go:235] Completed: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.24.4:$PATH\" kubeadm init phase kubeconfig all --config /var/tmp/minikube/kubeadm.yaml\": (1.210156448s)\n"} +{"Time":"2023-05-31T19:27:03.681105072Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:40.026758 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.24.4:$PATH\" kubeadm init phase kubelet-start --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T19:27:03.681114756Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:40.356888 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.24.4:$PATH\" kubeadm init phase control-plane all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T19:27:03.681118928Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:40.431764 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.24.4:$PATH\" kubeadm init phase etcd local --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T19:27:03.681122555Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:40.535729 37468 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T19:27:03.681125761Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:40.535783 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.681129411Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:41.049751 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.681137076Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:41.549772 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.68114078Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:42.049915 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.681144098Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:42.549869 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.681276931Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:42.645403 37468 api_server.go:72] duration metric: took 2.10967287s to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T19:27:03.681281657Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:42.645432 37468 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T19:27:03.681288382Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:42.645448 37468 api_server.go:253] Checking apiserver healthz at https://192.168.39.220:8443/healthz ...\n"} +{"Time":"2023-05-31T19:27:03.681292239Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:42.645979 37468 api_server.go:269] stopped: https://192.168.39.220:8443/healthz: Get \"https://192.168.39.220:8443/healthz\": dial tcp 192.168.39.220:8443: connect: connection refused\n"} +{"Time":"2023-05-31T19:27:03.681296343Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:43.146150 37468 api_server.go:253] Checking apiserver healthz at https://192.168.39.220:8443/healthz ...\n"} +{"Time":"2023-05-31T19:27:03.681299754Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.455005 37468 api_server.go:279] https://192.168.39.220:8443/healthz returned 403:\n"} +{"Time":"2023-05-31T19:27:03.681304502Z","Action":"output","Test":"TestPreload","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T19:27:03.681312661Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:47.455036 37468 api_server.go:103] status: https://192.168.39.220:8443/healthz returned error 403:\n"} +{"Time":"2023-05-31T19:27:03.681316395Z","Action":"output","Test":"TestPreload","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T19:27:03.681321367Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.455050 37468 api_server.go:253] Checking apiserver healthz at https://192.168.39.220:8443/healthz ...\n"} +{"Time":"2023-05-31T19:27:03.681324851Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.479635 37468 api_server.go:279] https://192.168.39.220:8443/healthz returned 403:\n"} +{"Time":"2023-05-31T19:27:03.681328456Z","Action":"output","Test":"TestPreload","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T19:27:03.681333126Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:47.479668 37468 api_server.go:103] status: https://192.168.39.220:8443/healthz returned error 403:\n"} +{"Time":"2023-05-31T19:27:03.681336768Z","Action":"output","Test":"TestPreload","Output":" \t{\"kind\":\"Status\",\"apiVersion\":\"v1\",\"metadata\":{},\"status\":\"Failure\",\"message\":\"forbidden: User \\\"system:anonymous\\\" cannot get path \\\"/healthz\\\"\",\"reason\":\"Forbidden\",\"details\":{},\"code\":403}\n"} +{"Time":"2023-05-31T19:27:03.681341401Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.646941 37468 api_server.go:253] Checking apiserver healthz at https://192.168.39.220:8443/healthz ...\n"} +{"Time":"2023-05-31T19:27:03.681344616Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.659925 37468 api_server.go:279] https://192.168.39.220:8443/healthz returned 500:\n"} +{"Time":"2023-05-31T19:27:03.681489418Z","Action":"output","Test":"TestPreload","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T19:27:03.68149447Z","Action":"output","Test":"TestPreload","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T19:27:03.681497537Z","Action":"output","Test":"TestPreload","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T19:27:03.68150056Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T19:27:03.681503529Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T19:27:03.681506499Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T19:27:03.681509755Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T19:27:03.681513174Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T19:27:03.68151631Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T19:27:03.681519656Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T19:27:03.6815236Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681527142Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.681530728Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.681534001Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T19:27:03.68153729Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681540643Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T19:27:03.6815442Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T19:27:03.681547579Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681551111Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681554337Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T19:27:03.681561882Z","Action":"output","Test":"TestPreload","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T19:27:03.681565522Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681568711Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T19:27:03.68157228Z","Action":"output","Test":"TestPreload","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T19:27:03.681575696Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:47.659952 37468 api_server.go:103] status: https://192.168.39.220:8443/healthz returned error 500:\n"} +{"Time":"2023-05-31T19:27:03.681579005Z","Action":"output","Test":"TestPreload","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T19:27:03.681816608Z","Action":"output","Test":"TestPreload","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T19:27:03.681820935Z","Action":"output","Test":"TestPreload","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T19:27:03.68182454Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T19:27:03.681827749Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T19:27:03.68183123Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T19:27:03.681834741Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T19:27:03.681838199Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T19:27:03.681845366Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T19:27:03.681851462Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T19:27:03.681854677Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681858438Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.681861679Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.681865096Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T19:27:03.681868549Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681871995Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T19:27:03.681875202Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T19:27:03.681878574Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681881779Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681885378Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T19:27:03.681888544Z","Action":"output","Test":"TestPreload","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T19:27:03.681891714Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T19:27:03.681895281Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T19:27:03.68189827Z","Action":"output","Test":"TestPreload","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T19:27:03.681901611Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:48.146951 37468 api_server.go:253] Checking apiserver healthz at https://192.168.39.220:8443/healthz ...\n"} +{"Time":"2023-05-31T19:27:03.681905365Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:48.152260 37468 api_server.go:279] https://192.168.39.220:8443/healthz returned 500:\n"} +{"Time":"2023-05-31T19:27:03.681908348Z","Action":"output","Test":"TestPreload","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T19:27:03.682126071Z","Action":"output","Test":"TestPreload","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T19:27:03.682130775Z","Action":"output","Test":"TestPreload","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T19:27:03.682134153Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T19:27:03.682137615Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682141048Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T19:27:03.682144206Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T19:27:03.682147488Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682150943Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T19:27:03.682154355Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T19:27:03.682157485Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682160806Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.68216414Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.68216773Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T19:27:03.68217103Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682174451Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T19:27:03.682177698Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682181205Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682184491Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682187687Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T19:27:03.682194563Z","Action":"output","Test":"TestPreload","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T19:27:03.682198046Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T19:27:03.68220123Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682204813Z","Action":"output","Test":"TestPreload","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T19:27:03.68220838Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:48.152316 37468 api_server.go:103] status: https://192.168.39.220:8443/healthz returned error 500:\n"} +{"Time":"2023-05-31T19:27:03.682216945Z","Action":"output","Test":"TestPreload","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T19:27:03.682220163Z","Action":"output","Test":"TestPreload","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T19:27:03.68222359Z","Action":"output","Test":"TestPreload","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T19:27:03.682391127Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T19:27:03.682395507Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682398779Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T19:27:03.682409892Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T19:27:03.682413154Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682416665Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T19:27:03.682419791Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T19:27:03.682423294Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682426668Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.682430052Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/scheduling/bootstrap-system-priority-classes failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.682433426Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T19:27:03.68243691Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682456239Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T19:27:03.682460156Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682463286Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682466701Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682469858Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T19:27:03.682473048Z","Action":"output","Test":"TestPreload","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T19:27:03.682476162Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682483848Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682487345Z","Action":"output","Test":"TestPreload","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T19:27:03.68249085Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:48.646907 37468 api_server.go:253] Checking apiserver healthz at https://192.168.39.220:8443/healthz ...\n"} +{"Time":"2023-05-31T19:27:03.682494406Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:48.653976 37468 api_server.go:279] https://192.168.39.220:8443/healthz returned 500:\n"} +{"Time":"2023-05-31T19:27:03.682497824Z","Action":"output","Test":"TestPreload","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T19:27:03.682500856Z","Action":"output","Test":"TestPreload","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T19:27:03.682503871Z","Action":"output","Test":"TestPreload","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T19:27:03.682605558Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T19:27:03.682610377Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682613553Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T19:27:03.682616869Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T19:27:03.682620052Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682623547Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T19:27:03.682626699Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T19:27:03.682629794Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682633243Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.682636492Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T19:27:03.682639367Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T19:27:03.682642679Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682645709Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T19:27:03.682653388Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682656947Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682660071Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682663414Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T19:27:03.682670426Z","Action":"output","Test":"TestPreload","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T19:27:03.68267403Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682676951Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682680127Z","Action":"output","Test":"TestPreload","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T19:27:03.682683352Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:48.654007 37468 api_server.go:103] status: https://192.168.39.220:8443/healthz returned error 500:\n"} +{"Time":"2023-05-31T19:27:03.682686656Z","Action":"output","Test":"TestPreload","Output":" \t[+]ping ok\n"} +{"Time":"2023-05-31T19:27:03.682689804Z","Action":"output","Test":"TestPreload","Output":" \t[+]log ok\n"} +{"Time":"2023-05-31T19:27:03.682692734Z","Action":"output","Test":"TestPreload","Output":" \t[+]etcd ok\n"} +{"Time":"2023-05-31T19:27:03.682696093Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-apiserver-admission-initializer ok\n"} +{"Time":"2023-05-31T19:27:03.682801155Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/generic-apiserver-start-informers ok\n"} +{"Time":"2023-05-31T19:27:03.68280567Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-consumer ok\n"} +{"Time":"2023-05-31T19:27:03.68280894Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-filter ok\n"} +{"Time":"2023-05-31T19:27:03.682812214Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682815543Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-apiextensions-controllers ok\n"} +{"Time":"2023-05-31T19:27:03.682819048Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/crd-informer-synced ok\n"} +{"Time":"2023-05-31T19:27:03.682822216Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/bootstrap-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682825364Z","Action":"output","Test":"TestPreload","Output":" \t[-]poststarthook/rbac/bootstrap-roles failed: reason withheld\n"} +{"Time":"2023-05-31T19:27:03.682828889Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/scheduling/bootstrap-system-priority-classes ok\n"} +{"Time":"2023-05-31T19:27:03.682832072Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/priority-and-fairness-config-producer ok\n"} +{"Time":"2023-05-31T19:27:03.682835521Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-cluster-authentication-info-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682838713Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/aggregator-reload-proxy-client-cert ok\n"} +{"Time":"2023-05-31T19:27:03.682841677Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/start-kube-aggregator-informers ok\n"} +{"Time":"2023-05-31T19:27:03.682845153Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-registration-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682848189Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-status-available-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682851609Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/kube-apiserver-autoregistration ok\n"} +{"Time":"2023-05-31T19:27:03.682854803Z","Action":"output","Test":"TestPreload","Output":" \t[+]autoregister-completion ok\n"} +{"Time":"2023-05-31T19:27:03.682857821Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapi-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682861264Z","Action":"output","Test":"TestPreload","Output":" \t[+]poststarthook/apiservice-openapiv3-controller ok\n"} +{"Time":"2023-05-31T19:27:03.682864665Z","Action":"output","Test":"TestPreload","Output":" \thealthz check failed\n"} +{"Time":"2023-05-31T19:27:03.682868079Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.146498 37468 api_server.go:253] Checking apiserver healthz at https://192.168.39.220:8443/healthz ...\n"} +{"Time":"2023-05-31T19:27:03.682871595Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.152365 37468 api_server.go:279] https://192.168.39.220:8443/healthz returned 200:\n"} +{"Time":"2023-05-31T19:27:03.682874752Z","Action":"output","Test":"TestPreload","Output":" \tok\n"} +{"Time":"2023-05-31T19:27:03.682878179Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.159864 37468 api_server.go:141] control plane version: v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.682881574Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.159884 37468 api_server.go:131] duration metric: took 6.51444677s to wait for apiserver health ...\n"} +{"Time":"2023-05-31T19:27:03.683052579Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.159892 37468 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T19:27:03.683060236Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.159897 37468 cni.go:145] \"kvm2\" driver + \"containerd\" runtime found, recommending bridge\n"} +{"Time":"2023-05-31T19:27:03.683064194Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.161554 37468 out.go:177] * Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T19:27:03.683067653Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.162910 37468 ssh_runner.go:195] Run: sudo mkdir -p /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:27:03.683071109Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.172387 37468 ssh_runner.go:362] scp memory --\u003e /etc/cni/net.d/1-k8s.conflist (457 bytes)\n"} +{"Time":"2023-05-31T19:27:03.683079783Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.191845 37468 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T19:27:03.683083719Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200602 37468 system_pods.go:59] 7 kube-system pods found\n"} +{"Time":"2023-05-31T19:27:03.683087699Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200635 37468 system_pods.go:61] \"coredns-6d4b75cb6d-vdz2m\" [f8812727-46cf-4d58-b5fa-0c899aaaa1d5] Running / Ready:ContainersNotReady (containers with unready status: [coredns]) / ContainersReady:ContainersNotReady (containers with unready status: [coredns])\n"} +{"Time":"2023-05-31T19:27:03.683092101Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200647 37468 system_pods.go:61] \"etcd-test-preload-677810\" [807886e1-c4d7-469d-9a9e-7de987a0087b] Running / Ready:ContainersNotReady (containers with unready status: [etcd]) / ContainersReady:ContainersNotReady (containers with unready status: [etcd])\n"} +{"Time":"2023-05-31T19:27:03.683095944Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200659 37468 system_pods.go:61] \"kube-apiserver-test-preload-677810\" [8607f0a9-8d5d-405e-afd5-b14e4cee5490] Running\n"} +{"Time":"2023-05-31T19:27:03.683099913Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200669 37468 system_pods.go:61] \"kube-controller-manager-test-preload-677810\" [d8a723e2-08b4-4f6b-b3e1-bd804cb7e046] Running\n"} +{"Time":"2023-05-31T19:27:03.683103947Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200680 37468 system_pods.go:61] \"kube-proxy-xstcm\" [0b61fbe1-b80f-4e22-8456-80667f9bae1f] Running / Ready:ContainersNotReady (containers with unready status: [kube-proxy]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-proxy])\n"} +{"Time":"2023-05-31T19:27:03.683108363Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200692 37468 system_pods.go:61] \"kube-scheduler-test-preload-677810\" [64f83fed-ae06-477f-8a72-58e0d0f2dfaa] Running / Ready:ContainersNotReady (containers with unready status: [kube-scheduler]) / ContainersReady:ContainersNotReady (containers with unready status: [kube-scheduler])\n"} +{"Time":"2023-05-31T19:27:03.683112907Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200703 37468 system_pods.go:61] \"storage-provisioner\" [dc7eefba-7203-4990-a022-31d135925ee0] Running / Ready:ContainersNotReady (containers with unready status: [storage-provisioner]) / ContainersReady:ContainersNotReady (containers with unready status: [storage-provisioner])\n"} +{"Time":"2023-05-31T19:27:03.683117236Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200716 37468 system_pods.go:74] duration metric: took 8.852738ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T19:27:03.683240381Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.200726 37468 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T19:27:03.683245123Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.203440 37468 node_conditions.go:122] node storage ephemeral capacity is 17784752Ki\n"} +{"Time":"2023-05-31T19:27:03.683251836Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.203474 37468 node_conditions.go:123] node cpu capacity is 2\n"} +{"Time":"2023-05-31T19:27:03.683255404Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.203484 37468 node_conditions.go:105] duration metric: took 2.74976ms to run NodePressure ...\n"} +{"Time":"2023-05-31T19:27:03.683259004Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.203496 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.24.4:$PATH\" kubeadm init phase addon all --config /var/tmp/minikube/kubeadm.yaml\"\n"} +{"Time":"2023-05-31T19:27:03.683263139Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.409513 37468 kubeadm.go:772] waiting for restarted kubelet to initialise ...\n"} +{"Time":"2023-05-31T19:27:03.683266448Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.413918 37468 kubeadm.go:787] kubelet initialised\n"} +{"Time":"2023-05-31T19:27:03.683270014Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.413940 37468 kubeadm.go:788] duration metric: took 4.401401ms waiting for restarted kubelet to initialise ...\n"} +{"Time":"2023-05-31T19:27:03.683274237Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.413949 37468 pod_ready.go:35] extra waiting up to 4m0s for all system-critical pods including labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683278341Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.420119 37468 pod_ready.go:78] waiting up to 4m0s for pod \"coredns-6d4b75cb6d-vdz2m\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683283831Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.425634 37468 pod_ready.go:97] node \"test-preload-677810\" hosting pod \"coredns-6d4b75cb6d-vdz2m\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683291256Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.425658 37468 pod_ready.go:81] duration metric: took 5.520264ms waiting for pod \"coredns-6d4b75cb6d-vdz2m\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683295516Z","Action":"output","Test":"TestPreload","Output":" \tE0531 19:26:49.425669 37468 pod_ready.go:66] WaitExtra: waitPodCondition: node \"test-preload-677810\" hosting pod \"coredns-6d4b75cb6d-vdz2m\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683300154Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.425679 37468 pod_ready.go:78] waiting up to 4m0s for pod \"etcd-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683306879Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.434737 37468 pod_ready.go:97] node \"test-preload-677810\" hosting pod \"etcd-test-preload-677810\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.68346484Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.434757 37468 pod_ready.go:81] duration metric: took 9.070185ms waiting for pod \"etcd-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683470696Z","Action":"output","Test":"TestPreload","Output":" \tE0531 19:26:49.434765 37468 pod_ready.go:66] WaitExtra: waitPodCondition: node \"test-preload-677810\" hosting pod \"etcd-test-preload-677810\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683475214Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.434773 37468 pod_ready.go:78] waiting up to 4m0s for pod \"kube-apiserver-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683479347Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.446172 37468 pod_ready.go:97] node \"test-preload-677810\" hosting pod \"kube-apiserver-test-preload-677810\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683483457Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.446194 37468 pod_ready.go:81] duration metric: took 11.415343ms waiting for pod \"kube-apiserver-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683492076Z","Action":"output","Test":"TestPreload","Output":" \tE0531 19:26:49.446201 37468 pod_ready.go:66] WaitExtra: waitPodCondition: node \"test-preload-677810\" hosting pod \"kube-apiserver-test-preload-677810\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.68349679Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.446207 37468 pod_ready.go:78] waiting up to 4m0s for pod \"kube-controller-manager-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683500913Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.595888 37468 pod_ready.go:97] node \"test-preload-677810\" hosting pod \"kube-controller-manager-test-preload-677810\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683505065Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.595923 37468 pod_ready.go:81] duration metric: took 149.709558ms waiting for pod \"kube-controller-manager-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683509034Z","Action":"output","Test":"TestPreload","Output":" \tE0531 19:26:49.595933 37468 pod_ready.go:66] WaitExtra: waitPodCondition: node \"test-preload-677810\" hosting pod \"kube-controller-manager-test-preload-677810\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683513206Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.595944 37468 pod_ready.go:78] waiting up to 4m0s for pod \"kube-proxy-xstcm\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683516847Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.996930 37468 pod_ready.go:97] node \"test-preload-677810\" hosting pod \"kube-proxy-xstcm\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683671559Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.996965 37468 pod_ready.go:81] duration metric: took 401.006413ms waiting for pod \"kube-proxy-xstcm\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683677931Z","Action":"output","Test":"TestPreload","Output":" \tE0531 19:26:49.996978 37468 pod_ready.go:66] WaitExtra: waitPodCondition: node \"test-preload-677810\" hosting pod \"kube-proxy-xstcm\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.68368203Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.996986 37468 pod_ready.go:78] waiting up to 4m0s for pod \"kube-scheduler-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683686242Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.395899 37468 pod_ready.go:97] node \"test-preload-677810\" hosting pod \"kube-scheduler-test-preload-677810\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683690588Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.395921 37468 pod_ready.go:81] duration metric: took 398.927452ms waiting for pod \"kube-scheduler-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683698658Z","Action":"output","Test":"TestPreload","Output":" \tE0531 19:26:50.395928 37468 pod_ready.go:66] WaitExtra: waitPodCondition: node \"test-preload-677810\" hosting pod \"kube-scheduler-test-preload-677810\" in \"kube-system\" namespace is currently not \"Ready\" (skipping!): node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.683703413Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.395939 37468 pod_ready.go:38] duration metric: took 981.979476ms for extra waiting for all system-critical and pods with labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.683707379Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.395971 37468 ssh_runner.go:195] Run: /bin/bash -c \"cat /proc/$(pgrep kube-apiserver)/oom_adj\"\n"} +{"Time":"2023-05-31T19:27:03.68371088Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.406902 37468 ops.go:34] apiserver oom_adj: -16\n"} +{"Time":"2023-05-31T19:27:03.683714435Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.406919 37468 kubeadm.go:640] restartCluster took 21.768225278s\n"} +{"Time":"2023-05-31T19:27:03.683717883Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.406927 37468 kubeadm.go:406] StartCluster complete in 21.815603976s\n"} +{"Time":"2023-05-31T19:27:03.683721537Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.406969 37468 settings.go:142] acquiring lock: {Name:mk66c99fb047ee62df8afae557628d92d538fc46 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.683725655Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.407043 37468 settings.go:150] Updating kubeconfig: /home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T19:27:03.683732429Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.407638 37468 lock.go:35] WriteFile acquiring /home/jenkins/minikube-integration/16569-10887/kubeconfig: {Name:mke3148b1dee4eb284a24a0decf47d085247076c Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T19:27:03.683938665Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.407824 37468 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.24.4/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml\"\n"} +{"Time":"2023-05-31T19:27:03.683945132Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.407938 37468 addons.go:496] enable addons start: toEnable=map[ambassador:false auto-pause:false cloud-spanner:false csi-hostpath-driver:false dashboard:false default-storageclass:true efk:false freshpod:false gcp-auth:false gvisor:false headlamp:false helm-tiller:false inaccel:false ingress:false ingress-dns:false inspektor-gadget:false istio:false istio-provisioner:false kong:false kubevirt:false logviewer:false metallb:false metrics-server:false nvidia-driver-installer:false nvidia-gpu-device-plugin:false olm:false pod-security-policy:false portainer:false registry:false registry-aliases:false registry-creds:false storage-provisioner:true storage-provisioner-gluster:false volumesnapshots:false]\n"} +{"Time":"2023-05-31T19:27:03.683950758Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408039 37468 config.go:182] Loaded profile config \"test-preload-677810\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.683954395Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408065 37468 addons.go:66] Setting default-storageclass=true in profile \"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.683957841Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408093 37468 addons_storage_classes.go:33] enableOrDisableStorageClasses default-storageclass=true on \"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.683960951Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408047 37468 addons.go:66] Setting storage-provisioner=true in profile \"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.68396462Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408115 37468 addons.go:228] Setting addon storage-provisioner=true in \"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.683967712Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:50.408130 37468 addons.go:237] addon storage-provisioner should already be in state true\n"} +{"Time":"2023-05-31T19:27:03.683971796Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408168 37468 host.go:66] Checking if \"test-preload-677810\" exists ...\n"} +{"Time":"2023-05-31T19:27:03.683982921Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408404 37468 kapi.go:59] client config for test-preload-677810: \u0026rest.Config{Host:\"https://192.168.39.220:8443\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/client.crt\", KeyFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/client.key\", CAFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint8(nil), CAData:[]uint8("} +{"Time":"2023-05-31T19:27:03.68421646Z","Action":"output","Test":"TestPreload","Output":"nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x19b95a0), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T19:27:03.684222637Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408531 37468 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:27:03.684232648Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408587 37468 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:27:03.684236821Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408596 37468 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:27:03.684239924Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.408627 37468 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:27:03.684243266Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.410988 37468 kapi.go:248] \"coredns\" deployment in \"kube-system\" namespace and \"test-preload-677810\" context rescaled to 1 replicas\n"} +{"Time":"2023-05-31T19:27:03.68424703Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.411022 37468 start.go:223] Will wait 6m0s for node \u0026{Name: IP:192.168.39.220 Port:8443 KubernetesVersion:v1.24.4 ContainerRuntime:containerd ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T19:27:03.684250596Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.413174 37468 out.go:177] * Verifying Kubernetes components...\n"} +{"Time":"2023-05-31T19:27:03.684254054Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.414747 37468 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T19:27:03.684257594Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.423149 37468 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:42009\n"} +{"Time":"2023-05-31T19:27:03.684261243Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.423265 37468 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:39723\n"} +{"Time":"2023-05-31T19:27:03.684264676Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.423681 37468 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:27:03.684445967Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.423748 37468 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:27:03.684450799Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.424168 37468 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:27:03.684454271Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.424197 37468 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.684457334Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.424279 37468 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:27:03.684470111Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.424312 37468 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.684478508Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.424523 37468 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.684481983Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.424613 37468 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.684485353Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.424711 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetState\n"} +{"Time":"2023-05-31T19:27:03.684494014Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.425085 37468 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:27:03.684497813Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.425135 37468 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:27:03.684504238Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.426983 37468 kapi.go:59] client config for test-preload-677810: \u0026rest.Config{Host:\"https://192.168.39.220:8443\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/client.crt\", KeyFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/profiles/test-preload-677810/client.key\", CAFile:\"/home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint8(nil), CAData:[]uint8("} +{"Time":"2023-05-31T19:27:03.684510636Z","Action":"output","Test":"TestPreload","Output":"nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x19b95a0), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T19:27:03.684517489Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.433375 37468 addons.go:228] Setting addon default-storageclass=true in \"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.684521065Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:50.433388 37468 addons.go:237] addon default-storageclass should already be in state true\n"} +{"Time":"2023-05-31T19:27:03.684736215Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.433404 37468 host.go:66] Checking if \"test-preload-677810\" exists ...\n"} +{"Time":"2023-05-31T19:27:03.684742258Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.433687 37468 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:27:03.68474592Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.433718 37468 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:27:03.684749725Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.439839 37468 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:41781\n"} +{"Time":"2023-05-31T19:27:03.684753097Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.440181 37468 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:27:03.684756499Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.440672 37468 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:27:03.684759751Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.440701 37468 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.684763334Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.440984 37468 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.684767032Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.441184 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetState\n"} +{"Time":"2023-05-31T19:27:03.684770502Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.442654 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.684773995Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.444891 37468 out.go:177] - Using image gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T19:27:03.684777348Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.446644 37468 addons.go:420] installing /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T19:27:03.684780992Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.446664 37468 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storage-provisioner.yaml (2676 bytes)\n"} +{"Time":"2023-05-31T19:27:03.684784639Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.446681 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.684788247Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.449643 37468 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:35165\n"} +{"Time":"2023-05-31T19:27:03.684792009Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.449852 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.684809259Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.449980 37468 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:27:03.684814187Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.450329 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.685009224Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.450362 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.685015041Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.450521 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.685018619Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.450629 37468 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:27:03.685021958Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.450659 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.685025197Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.450698 37468 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.685028779Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.450815 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.685032438Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.450957 37468 sshutil.go:53] new ssh client: \u0026{IP:192.168.39.220 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/test-preload-677810/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T19:27:03.685036144Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.451088 37468 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.685039896Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.451508 37468 main.go:141] libmachine: Found binary path at /home/jenkins/workspace/KVM_Linux_containerd_integration/out/docker-machine-driver-kvm2\n"} +{"Time":"2023-05-31T19:27:03.685046593Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.451553 37468 main.go:141] libmachine: Launching plugin server for driver kvm2\n"} +{"Time":"2023-05-31T19:27:03.685050481Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.464704 37468 main.go:141] libmachine: Plugin server listening at address 127.0.0.1:43845\n"} +{"Time":"2023-05-31T19:27:03.685053949Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.465024 37468 main.go:141] libmachine: () Calling .GetVersion\n"} +{"Time":"2023-05-31T19:27:03.685057297Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.465474 37468 main.go:141] libmachine: Using API Version 1\n"} +{"Time":"2023-05-31T19:27:03.685060494Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.465513 37468 main.go:141] libmachine: () Calling .SetConfigRaw\n"} +{"Time":"2023-05-31T19:27:03.685063802Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.465810 37468 main.go:141] libmachine: () Calling .GetMachineName\n"} +{"Time":"2023-05-31T19:27:03.685067089Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.466020 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetState\n"} +{"Time":"2023-05-31T19:27:03.685070806Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.467379 37468 main.go:141] libmachine: (test-preload-677810) Calling .DriverName\n"} +{"Time":"2023-05-31T19:27:03.68507431Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.467603 37468 addons.go:420] installing /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T19:27:03.685224615Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.467617 37468 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storageclass.yaml (271 bytes)\n"} +{"Time":"2023-05-31T19:27:03.685229502Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.467629 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHHostname\n"} +{"Time":"2023-05-31T19:27:03.685232964Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.470598 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.685237091Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.470957 37468 main.go:141] libmachine: (test-preload-677810) DBG | found host DHCP lease matching {name: \"\", mac: \"52:54:00:9f:cd:66\", ip: \"\"} in network mk-test-preload-677810: {Iface:virbr1 ExpiryTime:2023-05-31 20:25:54 +0000 UTC Type:0 Mac:52:54:00:9f:cd:66 Iaid: IPaddr:192.168.39.220 Prefix:24 Hostname:test-preload-677810 Clientid:01:52:54:00:9f:cd:66}\n"} +{"Time":"2023-05-31T19:27:03.685246475Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.470996 37468 main.go:141] libmachine: (test-preload-677810) DBG | domain test-preload-677810 has defined IP address 192.168.39.220 and MAC address 52:54:00:9f:cd:66 in network mk-test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.685250549Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.471241 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHPort\n"} +{"Time":"2023-05-31T19:27:03.685253974Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.471408 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHKeyPath\n"} +{"Time":"2023-05-31T19:27:03.685257549Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.471565 37468 main.go:141] libmachine: (test-preload-677810) Calling .GetSSHUsername\n"} +{"Time":"2023-05-31T19:27:03.685261559Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.471713 37468 sshutil.go:53] new ssh client: \u0026{IP:192.168.39.220 Port:22 SSHKeyPath:/home/jenkins/minikube-integration/16569-10887/.minikube/machines/test-preload-677810/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T19:27:03.685265207Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.575989 37468 node_ready.go:35] waiting up to 6m0s for node \"test-preload-677810\" to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.685273776Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.576045 37468 start.go:889] CoreDNS already contains \"host.minikube.internal\" host record, skipping...\n"} +{"Time":"2023-05-31T19:27:03.685278887Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.612627 37468 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.24.4/kubectl apply -f /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T19:27:03.685283019Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:50.614917 37468 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.24.4/kubectl apply -f /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T19:27:03.685286207Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536109 37468 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685293253Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536138 37468 main.go:141] libmachine: (test-preload-677810) Calling .Close\n"} +{"Time":"2023-05-31T19:27:03.685297128Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536425 37468 main.go:141] libmachine: (test-preload-677810) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T19:27:03.685452472Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536482 37468 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685465031Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536496 37468 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T19:27:03.685469121Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536512 37468 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685473051Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536524 37468 main.go:141] libmachine: (test-preload-677810) Calling .Close\n"} +{"Time":"2023-05-31T19:27:03.685476296Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536775 37468 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685479608Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536792 37468 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T19:27:03.685483879Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536804 37468 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685487983Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536809 37468 main.go:141] libmachine: (test-preload-677810) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T19:27:03.685491426Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536812 37468 main.go:141] libmachine: (test-preload-677810) Calling .Close\n"} +{"Time":"2023-05-31T19:27:03.685494366Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536810 37468 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.68549759Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.536885 37468 main.go:141] libmachine: (test-preload-677810) Calling .Close\n"} +{"Time":"2023-05-31T19:27:03.685500783Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537116 37468 main.go:141] libmachine: (test-preload-677810) DBG | Closing plugin on server side\n"} +{"Time":"2023-05-31T19:27:03.68550493Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537135 37468 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685508786Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537149 37468 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T19:27:03.685512621Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537154 37468 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685516788Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537183 37468 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T19:27:03.685520675Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537205 37468 main.go:141] libmachine: Making call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685523935Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537218 37468 main.go:141] libmachine: (test-preload-677810) Calling .Close\n"} +{"Time":"2023-05-31T19:27:03.685527108Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537437 37468 main.go:141] libmachine: Successfully made call to close driver server\n"} +{"Time":"2023-05-31T19:27:03.685530715Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.537457 37468 main.go:141] libmachine: Making call to close connection to plugin binary\n"} +{"Time":"2023-05-31T19:27:03.685814334Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.539616 37468 out.go:177] * Enabled addons: default-storageclass, storage-provisioner\n"} +{"Time":"2023-05-31T19:27:03.685825697Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:51.541509 37468 addons.go:499] enable addons completed in 1.133587744s: enabled=[default-storageclass storage-provisioner]\n"} +{"Time":"2023-05-31T19:27:03.685835632Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:52.598863 37468 node_ready.go:58] node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.685839704Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:55.098763 37468 node_ready.go:58] node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.685843574Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:57.598004 37468 node_ready.go:58] node \"test-preload-677810\" has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T19:27:03.685846961Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:58.098842 37468 node_ready.go:49] node \"test-preload-677810\" has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T19:27:03.685855881Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:58.098863 37468 node_ready.go:38] duration metric: took 7.522842664s waiting for node \"test-preload-677810\" to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.685868754Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:58.098870 37468 pod_ready.go:35] extra waiting up to 6m0s for all system-critical pods including labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.685873539Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:58.103906 37468 pod_ready.go:78] waiting up to 6m0s for pod \"coredns-6d4b75cb6d-vdz2m\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.685877097Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:58.108752 37468 pod_ready.go:92] pod \"coredns-6d4b75cb6d-vdz2m\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T19:27:03.685880774Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:58.108769 37468 pod_ready.go:81] duration metric: took 4.843148ms waiting for pod \"coredns-6d4b75cb6d-vdz2m\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.685885659Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:58.108777 37468 pod_ready.go:78] waiting up to 6m0s for pod \"etcd-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.685895366Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.618717 37468 pod_ready.go:92] pod \"etcd-test-preload-677810\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T19:27:03.685899068Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.618738 37468 pod_ready.go:81] duration metric: took 1.509956087s waiting for pod \"etcd-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.685918448Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.618747 37468 pod_ready.go:78] waiting up to 6m0s for pod \"kube-apiserver-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.685924708Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.622952 37468 pod_ready.go:92] pod \"kube-apiserver-test-preload-677810\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T19:27:03.686156892Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.622969 37468 pod_ready.go:81] duration metric: took 4.217122ms waiting for pod \"kube-apiserver-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.686167336Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.622977 37468 pod_ready.go:78] waiting up to 6m0s for pod \"kube-controller-manager-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.686171733Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.627237 37468 pod_ready.go:92] pod \"kube-controller-manager-test-preload-677810\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T19:27:03.686175947Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.627253 37468 pod_ready.go:81] duration metric: took 4.271401ms waiting for pod \"kube-controller-manager-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.68618016Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.627260 37468 pod_ready.go:78] waiting up to 6m0s for pod \"kube-proxy-xstcm\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.686184647Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.700327 37468 pod_ready.go:92] pod \"kube-proxy-xstcm\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T19:27:03.686189595Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.700341 37468 pod_ready.go:81] duration metric: took 73.076978ms waiting for pod \"kube-proxy-xstcm\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.686193881Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.700348 37468 pod_ready.go:78] waiting up to 6m0s for pod \"kube-scheduler-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.686199165Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.606434 37468 pod_ready.go:92] pod \"kube-scheduler-test-preload-677810\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T19:27:03.686203907Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.606456 37468 pod_ready.go:81] duration metric: took 1.906101461s waiting for pod \"kube-scheduler-test-preload-677810\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.686209046Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.606467 37468 pod_ready.go:38] duration metric: took 3.507574187s for extra waiting for all system-critical and pods with labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T19:27:03.686214637Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.606492 37468 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T19:27:03.686219139Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.606547 37468 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T19:27:03.686223152Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.619397 37468 api_server.go:72] duration metric: took 11.208351595s to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T19:27:03.686227738Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.619414 37468 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T19:27:03.686552995Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.619425 37468 api_server.go:253] Checking apiserver healthz at https://192.168.39.220:8443/healthz ...\n"} +{"Time":"2023-05-31T19:27:03.686562448Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.624661 37468 api_server.go:279] https://192.168.39.220:8443/healthz returned 200:\n"} +{"Time":"2023-05-31T19:27:03.686566238Z","Action":"output","Test":"TestPreload","Output":" \tok\n"} +{"Time":"2023-05-31T19:27:03.686570122Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.625621 37468 api_server.go:141] control plane version: v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.686573702Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.625637 37468 api_server.go:131] duration metric: took 6.217057ms to wait for apiserver health ...\n"} +{"Time":"2023-05-31T19:27:03.686577595Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.625643 37468 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T19:27:03.686581142Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631412 37468 system_pods.go:59] 7 kube-system pods found\n"} +{"Time":"2023-05-31T19:27:03.686584659Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631432 37468 system_pods.go:61] \"coredns-6d4b75cb6d-vdz2m\" [f8812727-46cf-4d58-b5fa-0c899aaaa1d5] Running\n"} +{"Time":"2023-05-31T19:27:03.686588447Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631436 37468 system_pods.go:61] \"etcd-test-preload-677810\" [807886e1-c4d7-469d-9a9e-7de987a0087b] Running\n"} +{"Time":"2023-05-31T19:27:03.686592324Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631440 37468 system_pods.go:61] \"kube-apiserver-test-preload-677810\" [8607f0a9-8d5d-405e-afd5-b14e4cee5490] Running\n"} +{"Time":"2023-05-31T19:27:03.686595885Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631445 37468 system_pods.go:61] \"kube-controller-manager-test-preload-677810\" [d8a723e2-08b4-4f6b-b3e1-bd804cb7e046] Running\n"} +{"Time":"2023-05-31T19:27:03.686600021Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631448 37468 system_pods.go:61] \"kube-proxy-xstcm\" [0b61fbe1-b80f-4e22-8456-80667f9bae1f] Running\n"} +{"Time":"2023-05-31T19:27:03.686604332Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631452 37468 system_pods.go:61] \"kube-scheduler-test-preload-677810\" [64f83fed-ae06-477f-8a72-58e0d0f2dfaa] Running\n"} +{"Time":"2023-05-31T19:27:03.686608065Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631456 37468 system_pods.go:61] \"storage-provisioner\" [dc7eefba-7203-4990-a022-31d135925ee0] Running\n"} +{"Time":"2023-05-31T19:27:03.686612036Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631460 37468 system_pods.go:74] duration metric: took 5.813118ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T19:27:03.686615597Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.631464 37468 default_sa.go:34] waiting for default service account to be created ...\n"} +{"Time":"2023-05-31T19:27:03.686619332Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.698638 37468 default_sa.go:45] found service account: \"default\"\n"} +{"Time":"2023-05-31T19:27:03.686623329Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.698655 37468 default_sa.go:55] duration metric: took 67.187139ms for default service account to be created ...\n"} +{"Time":"2023-05-31T19:27:03.686626867Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.698661 37468 system_pods.go:116] waiting for k8s-apps to be running ...\n"} +{"Time":"2023-05-31T19:27:03.68682167Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901921 37468 system_pods.go:86] 7 kube-system pods found\n"} +{"Time":"2023-05-31T19:27:03.686827555Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901945 37468 system_pods.go:89] \"coredns-6d4b75cb6d-vdz2m\" [f8812727-46cf-4d58-b5fa-0c899aaaa1d5] Running\n"} +{"Time":"2023-05-31T19:27:03.686831537Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901950 37468 system_pods.go:89] \"etcd-test-preload-677810\" [807886e1-c4d7-469d-9a9e-7de987a0087b] Running\n"} +{"Time":"2023-05-31T19:27:03.686839634Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901955 37468 system_pods.go:89] \"kube-apiserver-test-preload-677810\" [8607f0a9-8d5d-405e-afd5-b14e4cee5490] Running\n"} +{"Time":"2023-05-31T19:27:03.686843472Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901959 37468 system_pods.go:89] \"kube-controller-manager-test-preload-677810\" [d8a723e2-08b4-4f6b-b3e1-bd804cb7e046] Running\n"} +{"Time":"2023-05-31T19:27:03.686847032Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901966 37468 system_pods.go:89] \"kube-proxy-xstcm\" [0b61fbe1-b80f-4e22-8456-80667f9bae1f] Running\n"} +{"Time":"2023-05-31T19:27:03.686850449Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901970 37468 system_pods.go:89] \"kube-scheduler-test-preload-677810\" [64f83fed-ae06-477f-8a72-58e0d0f2dfaa] Running\n"} +{"Time":"2023-05-31T19:27:03.686857124Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901973 37468 system_pods.go:89] \"storage-provisioner\" [dc7eefba-7203-4990-a022-31d135925ee0] Running\n"} +{"Time":"2023-05-31T19:27:03.686860753Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901978 37468 system_pods.go:126] duration metric: took 203.313783ms to wait for k8s-apps to be running ...\n"} +{"Time":"2023-05-31T19:27:03.6868643Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.901983 37468 system_svc.go:44] waiting for kubelet service to be running ....\n"} +{"Time":"2023-05-31T19:27:03.686867774Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.902021 37468 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T19:27:03.686871398Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.914072 37468 system_svc.go:56] duration metric: took 12.082903ms WaitForService to wait for kubelet.\n"} +{"Time":"2023-05-31T19:27:03.686875321Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.914088 37468 kubeadm.go:581] duration metric: took 11.503045485s to wait for : map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] ...\n"} +{"Time":"2023-05-31T19:27:03.686879268Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:01.914103 37468 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T19:27:03.686882844Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.099145 37468 node_conditions.go:122] node storage ephemeral capacity is 17784752Ki\n"} +{"Time":"2023-05-31T19:27:03.686886376Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.099166 37468 node_conditions.go:123] node cpu capacity is 2\n"} +{"Time":"2023-05-31T19:27:03.686893149Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.099177 37468 node_conditions.go:105] duration metric: took 185.070357ms to run NodePressure ...\n"} +{"Time":"2023-05-31T19:27:03.686896619Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.099185 37468 start.go:228] waiting for startup goroutines ...\n"} +{"Time":"2023-05-31T19:27:03.687156466Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.099190 37468 start.go:233] waiting for cluster config update ...\n"} +{"Time":"2023-05-31T19:27:03.687168174Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.099198 37468 start.go:242] writing updated cluster config ...\n"} +{"Time":"2023-05-31T19:27:03.687172137Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.099438 37468 ssh_runner.go:195] Run: rm -f paused\n"} +{"Time":"2023-05-31T19:27:03.687175814Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.144674 37468 start.go:573] kubectl: 1.27.2, cluster: 1.24.4 (minor skew: 3)\n"} +{"Time":"2023-05-31T19:27:03.687179348Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.147000 37468 out.go:177] \n"} +{"Time":"2023-05-31T19:27:03.687182763Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:27:02.148607 37468 out.go:239] ! /usr/local/bin/kubectl is version 1.27.2, which may have incompatibilities with Kubernetes 1.24.4.\n"} +{"Time":"2023-05-31T19:27:03.687186848Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.150183 37468 out.go:177] - Want kubectl v1.24.4? Try 'minikube kubectl -- get pods -A'\n"} +{"Time":"2023-05-31T19:27:03.68719065Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:02.151725 37468 out.go:177] * Done! kubectl is now configured to use \"test-preload-677810\" cluster and \"default\" namespace by default\n"} +{"Time":"2023-05-31T19:27:03.687194988Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.687198271Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.687201447Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e container status \u003c==\n"} +{"Time":"2023-05-31T19:27:03.687206228Z","Action":"output","Test":"TestPreload","Output":" \t* CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\n"} +{"Time":"2023-05-31T19:27:03.687216813Z","Action":"output","Test":"TestPreload","Output":" \t236f96a3495f4 a4ca41631cc7a 7 seconds ago Running coredns 1 5fc41fe665e88\n"} +{"Time":"2023-05-31T19:27:03.68722074Z","Action":"output","Test":"TestPreload","Output":" \tc2ab5b39228b7 6e38f40d628db 14 seconds ago Running storage-provisioner 1 4b5add7491138\n"} +{"Time":"2023-05-31T19:27:03.68724128Z","Action":"output","Test":"TestPreload","Output":" \t69e8baa570528 7a53d1e08ef58 14 seconds ago Running kube-proxy 1 6003e30e617f3\n"} +{"Time":"2023-05-31T19:27:03.687245602Z","Action":"output","Test":"TestPreload","Output":" \t6bfe707c88172 aebe758cef4cd 20 seconds ago Running etcd 1 cb9f0e41583fb\n"} +{"Time":"2023-05-31T19:27:03.687249168Z","Action":"output","Test":"TestPreload","Output":" \t2dd5f1f6ea0cf 03fa22539fc1c 20 seconds ago Running kube-scheduler 1 3c50225544b33\n"} +{"Time":"2023-05-31T19:27:03.687252862Z","Action":"output","Test":"TestPreload","Output":" \t251b18a6ee128 6cab9d1bed1be 21 seconds ago Running kube-apiserver 1 6c4b9bd416ac9\n"} +{"Time":"2023-05-31T19:27:03.687256479Z","Action":"output","Test":"TestPreload","Output":" \td29d66db419b2 1f99cb6da9a82 21 seconds ago Running kube-controller-manager 1 6e9f2d6a647db\n"} +{"Time":"2023-05-31T19:27:03.687259492Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.687478558Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.687483561Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e containerd \u003c==\n"} +{"Time":"2023-05-31T19:27:03.687487653Z","Action":"output","Test":"TestPreload","Output":" \t* -- Journal begins at Wed 2023-05-31 19:25:53 UTC, ends at Wed 2023-05-31 19:27:03 UTC. --\n"} +{"Time":"2023-05-31T19:27:03.687491349Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.449111953Z\" level=info msg=\"RunPodSandbox for \u0026PodSandboxMetadata{Name:kube-proxy-xstcm,Uid:0b61fbe1-b80f-4e22-8456-80667f9bae1f,Namespace:kube-system,Attempt:0,}\"\n"} +{"Time":"2023-05-31T19:27:03.687495799Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.496434031Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T19:27:03.687500047Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.512110233Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T19:27:03.687504002Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.512168457Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T19:27:03.687508138Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.512180743Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T19:27:03.687512607Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.634631488Z\" level=info msg=\"RunPodSandbox for \u0026PodSandboxMetadata{Name:kube-proxy-xstcm,Uid:0b61fbe1-b80f-4e22-8456-80667f9bae1f,Namespace:kube-system,Attempt:0,} returns sandbox id \\\"6003e30e617f317e70ada44cfdf6285d5ba81b6b5c63fa3eb5eb2c93d2dbbafb\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.687523023Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.643086102Z\" level=info msg=\"CreateContainer within sandbox \\\"6003e30e617f317e70ada44cfdf6285d5ba81b6b5c63fa3eb5eb2c93d2dbbafb\\\" for container \u0026ContainerMetadata{Name:kube-proxy,Attempt:1,}\"\n"} +{"Time":"2023-05-31T19:27:03.687528171Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.714300344Z\" level=info msg=\"CreateContainer within sandbox \\\"6003e30e617f317e70ada44cfdf6285d5ba81b6b5c63fa3eb5eb2c93d2dbbafb\\\" for \u0026ContainerMetadata{Name:kube-proxy,Attempt:1,} returns container id \\\"69e8baa5705287944e9439ccb2e2b98a1ff9a5bf9cae39c094d3d46a23de0f39\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.687532873Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.715532150Z\" level=info msg=\"StartContainer for \\\"69e8baa5705287944e9439ccb2e2b98a1ff9a5bf9cae39c094d3d46a23de0f39\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.68753736Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.785220672Z\" level=info msg=\"RunPodSandbox for \u0026PodSandboxMetadata{Name:storage-provisioner,Uid:dc7eefba-7203-4990-a022-31d135925ee0,Namespace:kube-system,Attempt:0,} returns sandbox id \\\"4b5add7491138440b50441f72429bd0436149fe1f70d2fbf0e4f686fe9078eab\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.687722009Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.794167990Z\" level=info msg=\"CreateContainer within sandbox \\\"4b5add7491138440b50441f72429bd0436149fe1f70d2fbf0e4f686fe9078eab\\\" for container \u0026ContainerMetadata{Name:storage-provisioner,Attempt:1,}\"\n"} +{"Time":"2023-05-31T19:27:03.687732121Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.820151641Z\" level=info msg=\"CreateContainer within sandbox \\\"4b5add7491138440b50441f72429bd0436149fe1f70d2fbf0e4f686fe9078eab\\\" for \u0026ContainerMetadata{Name:storage-provisioner,Attempt:1,} returns container id \\\"c2ab5b39228b784a4aa7e0a5202fb3e4083a6dcff3e48dfe381868108dd4169e\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.687736963Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.827721076Z\" level=info msg=\"StartContainer for \\\"c2ab5b39228b784a4aa7e0a5202fb3e4083a6dcff3e48dfe381868108dd4169e\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.687741261Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.909092058Z\" level=info msg=\"StartContainer for \\\"69e8baa5705287944e9439ccb2e2b98a1ff9a5bf9cae39c094d3d46a23de0f39\\\" returns successfully\"\n"} +{"Time":"2023-05-31T19:27:03.687745657Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:48.951178436Z\" level=info msg=\"StartContainer for \\\"c2ab5b39228b784a4aa7e0a5202fb3e4083a6dcff3e48dfe381868108dd4169e\\\" returns successfully\"\n"} +{"Time":"2023-05-31T19:27:03.687750096Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.533749655Z\" level=info msg=\"RunPodSandbox for \u0026PodSandboxMetadata{Name:coredns-6d4b75cb6d-vdz2m,Uid:f8812727-46cf-4d58-b5fa-0c899aaaa1d5,Namespace:kube-system,Attempt:0,}\"\n"} +{"Time":"2023-05-31T19:27:03.68775459Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.645656878Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T19:27:03.687764621Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.645799401Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T19:27:03.687772538Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.645919304Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T19:27:03.687776485Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.645988272Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T19:27:03.687779549Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.967191937Z\" level=info msg=\"RunPodSandbox for \u0026PodSandboxMetadata{Name:coredns-6d4b75cb6d-vdz2m,Uid:f8812727-46cf-4d58-b5fa-0c899aaaa1d5,Namespace:kube-system,Attempt:0,} returns sandbox id \\\"5fc41fe665e889605d37bbc0f8dde916e458a4a2a6e6dbf04978c13538d87a5c\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.688019215Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.976750425Z\" level=info msg=\"CreateContainer within sandbox \\\"5fc41fe665e889605d37bbc0f8dde916e458a4a2a6e6dbf04978c13538d87a5c\\\" for container \u0026ContainerMetadata{Name:coredns,Attempt:1,}\"\n"} +{"Time":"2023-05-31T19:27:03.688028478Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.995904046Z\" level=info msg=\"CreateContainer within sandbox \\\"5fc41fe665e889605d37bbc0f8dde916e458a4a2a6e6dbf04978c13538d87a5c\\\" for \u0026ContainerMetadata{Name:coredns,Attempt:1,} returns container id \\\"236f96a3495f4969c902286cbe0de55ed8acbba156a04e342a6642a583742097\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.68803325Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:55 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:55.997421366Z\" level=info msg=\"StartContainer for \\\"236f96a3495f4969c902286cbe0de55ed8acbba156a04e342a6642a583742097\\\"\"\n"} +{"Time":"2023-05-31T19:27:03.688043311Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:56 test-preload-677810 containerd[691]: time=\"2023-05-31T19:26:56.077357666Z\" level=info msg=\"StartContainer for \\\"236f96a3495f4969c902286cbe0de55ed8acbba156a04e342a6642a583742097\\\" returns successfully\"\n"} +{"Time":"2023-05-31T19:27:03.6880473Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.688050471Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.688053619Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e coredns [236f96a3495f4969c902286cbe0de55ed8acbba156a04e342a6642a583742097] \u003c==\n"} +{"Time":"2023-05-31T19:27:03.688056981Z","Action":"output","Test":"TestPreload","Output":" \t* .:53\n"} +{"Time":"2023-05-31T19:27:03.688074582Z","Action":"output","Test":"TestPreload","Output":" \t[INFO] plugin/reload: Running configuration MD5 = bbeeddb09682f41960fef01b05cb3a3d\n"} +{"Time":"2023-05-31T19:27:03.688079306Z","Action":"output","Test":"TestPreload","Output":" \tCoreDNS-1.8.6\n"} +{"Time":"2023-05-31T19:27:03.688082614Z","Action":"output","Test":"TestPreload","Output":" \tlinux/amd64, go1.17.1, 13a9191\n"} +{"Time":"2023-05-31T19:27:03.688085971Z","Action":"output","Test":"TestPreload","Output":" \t[INFO] 127.0.0.1:35547 - 51288 \"HINFO IN 8842795340011658344.7129949316647561269. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.02727133s\n"} +{"Time":"2023-05-31T19:27:03.688089464Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.688092622Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.688095744Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e describe nodes \u003c==\n"} +{"Time":"2023-05-31T19:27:03.688098894Z","Action":"output","Test":"TestPreload","Output":" \t* Name: test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.688102516Z","Action":"output","Test":"TestPreload","Output":" \tRoles: control-plane\n"} +{"Time":"2023-05-31T19:27:03.688105669Z","Action":"output","Test":"TestPreload","Output":" \tLabels: beta.kubernetes.io/arch=amd64\n"} +{"Time":"2023-05-31T19:27:03.688112522Z","Action":"output","Test":"TestPreload","Output":" \t beta.kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:27:03.688115613Z","Action":"output","Test":"TestPreload","Output":" \t kubernetes.io/arch=amd64\n"} +{"Time":"2023-05-31T19:27:03.688222405Z","Action":"output","Test":"TestPreload","Output":" \t kubernetes.io/hostname=test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.688232865Z","Action":"output","Test":"TestPreload","Output":" \t kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:27:03.688236395Z","Action":"output","Test":"TestPreload","Output":" \t minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140\n"} +{"Time":"2023-05-31T19:27:03.6882397Z","Action":"output","Test":"TestPreload","Output":" \t minikube.k8s.io/name=test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.688242874Z","Action":"output","Test":"TestPreload","Output":" \t minikube.k8s.io/primary=true\n"} +{"Time":"2023-05-31T19:27:03.688246123Z","Action":"output","Test":"TestPreload","Output":" \t minikube.k8s.io/updated_at=2023_05_31T19_23_07_0700\n"} +{"Time":"2023-05-31T19:27:03.688254177Z","Action":"output","Test":"TestPreload","Output":" \t minikube.k8s.io/version=v1.30.1\n"} +{"Time":"2023-05-31T19:27:03.688257343Z","Action":"output","Test":"TestPreload","Output":" \t node-role.kubernetes.io/control-plane=\n"} +{"Time":"2023-05-31T19:27:03.688260268Z","Action":"output","Test":"TestPreload","Output":" \t node.kubernetes.io/exclude-from-external-load-balancers=\n"} +{"Time":"2023-05-31T19:27:03.688263248Z","Action":"output","Test":"TestPreload","Output":" \tAnnotations: kubeadm.alpha.kubernetes.io/cri-socket: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T19:27:03.688266825Z","Action":"output","Test":"TestPreload","Output":" \t node.alpha.kubernetes.io/ttl: 0\n"} +{"Time":"2023-05-31T19:27:03.688270027Z","Action":"output","Test":"TestPreload","Output":" \t volumes.kubernetes.io/controller-managed-attach-detach: true\n"} +{"Time":"2023-05-31T19:27:03.688273231Z","Action":"output","Test":"TestPreload","Output":" \tCreationTimestamp: Wed, 31 May 2023 19:23:04 +0000\n"} +{"Time":"2023-05-31T19:27:03.688276322Z","Action":"output","Test":"TestPreload","Output":" \tTaints: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:27:03.68828005Z","Action":"output","Test":"TestPreload","Output":" \tUnschedulable: false\n"} +{"Time":"2023-05-31T19:27:03.688283588Z","Action":"output","Test":"TestPreload","Output":" \tLease:\n"} +{"Time":"2023-05-31T19:27:03.688286832Z","Action":"output","Test":"TestPreload","Output":" \t HolderIdentity: test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.688289882Z","Action":"output","Test":"TestPreload","Output":" \t AcquireTime: \u003cunset\u003e\n"} +{"Time":"2023-05-31T19:27:03.688297639Z","Action":"output","Test":"TestPreload","Output":" \t RenewTime: Wed, 31 May 2023 19:26:57 +0000\n"} +{"Time":"2023-05-31T19:27:03.688300811Z","Action":"output","Test":"TestPreload","Output":" \tConditions:\n"} +{"Time":"2023-05-31T19:27:03.688304066Z","Action":"output","Test":"TestPreload","Output":" \t Type Status LastHeartbeatTime LastTransitionTime Reason Message\n"} +{"Time":"2023-05-31T19:27:03.688307767Z","Action":"output","Test":"TestPreload","Output":" \t ---- ------ ----------------- ------------------ ------ -------\n"} +{"Time":"2023-05-31T19:27:03.688311429Z","Action":"output","Test":"TestPreload","Output":" \t MemoryPressure False Wed, 31 May 2023 19:26:57 +0000 Wed, 31 May 2023 19:23:01 +0000 KubeletHasSufficientMemory kubelet has sufficient memory available\n"} +{"Time":"2023-05-31T19:27:03.688315089Z","Action":"output","Test":"TestPreload","Output":" \t DiskPressure False Wed, 31 May 2023 19:26:57 +0000 Wed, 31 May 2023 19:23:01 +0000 KubeletHasNoDiskPressure kubelet has no disk pressure\n"} +{"Time":"2023-05-31T19:27:03.688636444Z","Action":"output","Test":"TestPreload","Output":" \t PIDPressure False Wed, 31 May 2023 19:26:57 +0000 Wed, 31 May 2023 19:23:01 +0000 KubeletHasSufficientPID kubelet has sufficient PID available\n"} +{"Time":"2023-05-31T19:27:03.688646976Z","Action":"output","Test":"TestPreload","Output":" \t Ready True Wed, 31 May 2023 19:26:57 +0000 Wed, 31 May 2023 19:26:57 +0000 KubeletReady kubelet is posting ready status\n"} +{"Time":"2023-05-31T19:27:03.688650865Z","Action":"output","Test":"TestPreload","Output":" \tAddresses:\n"} +{"Time":"2023-05-31T19:27:03.688660313Z","Action":"output","Test":"TestPreload","Output":" \t InternalIP: 192.168.39.220\n"} +{"Time":"2023-05-31T19:27:03.688664042Z","Action":"output","Test":"TestPreload","Output":" \t Hostname: test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.688666911Z","Action":"output","Test":"TestPreload","Output":" \tCapacity:\n"} +{"Time":"2023-05-31T19:27:03.688670478Z","Action":"output","Test":"TestPreload","Output":" \t cpu: 2\n"} +{"Time":"2023-05-31T19:27:03.688673964Z","Action":"output","Test":"TestPreload","Output":" \t ephemeral-storage: 17784752Ki\n"} +{"Time":"2023-05-31T19:27:03.688677167Z","Action":"output","Test":"TestPreload","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T19:27:03.688680582Z","Action":"output","Test":"TestPreload","Output":" \t memory: 2165900Ki\n"} +{"Time":"2023-05-31T19:27:03.688683608Z","Action":"output","Test":"TestPreload","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T19:27:03.688687189Z","Action":"output","Test":"TestPreload","Output":" \tAllocatable:\n"} +{"Time":"2023-05-31T19:27:03.688690062Z","Action":"output","Test":"TestPreload","Output":" \t cpu: 2\n"} +{"Time":"2023-05-31T19:27:03.688693282Z","Action":"output","Test":"TestPreload","Output":" \t ephemeral-storage: 17784752Ki\n"} +{"Time":"2023-05-31T19:27:03.688696249Z","Action":"output","Test":"TestPreload","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T19:27:03.688700134Z","Action":"output","Test":"TestPreload","Output":" \t memory: 2165900Ki\n"} +{"Time":"2023-05-31T19:27:03.688703381Z","Action":"output","Test":"TestPreload","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T19:27:03.688707002Z","Action":"output","Test":"TestPreload","Output":" \tSystem Info:\n"} +{"Time":"2023-05-31T19:27:03.688710964Z","Action":"output","Test":"TestPreload","Output":" \t Machine ID: 18e129c6af4841158643c666096930ec\n"} +{"Time":"2023-05-31T19:27:03.688714837Z","Action":"output","Test":"TestPreload","Output":" \t System UUID: 18e129c6-af48-4115-8643-c666096930ec\n"} +{"Time":"2023-05-31T19:27:03.688718141Z","Action":"output","Test":"TestPreload","Output":" \t Boot ID: df6a3882-b990-42fe-bd01-6c201b2e8e85\n"} +{"Time":"2023-05-31T19:27:03.688722251Z","Action":"output","Test":"TestPreload","Output":" \t Kernel Version: 5.10.57\n"} +{"Time":"2023-05-31T19:27:03.688725274Z","Action":"output","Test":"TestPreload","Output":" \t OS Image: Buildroot 2021.02.12\n"} +{"Time":"2023-05-31T19:27:03.688728919Z","Action":"output","Test":"TestPreload","Output":" \t Operating System: linux\n"} +{"Time":"2023-05-31T19:27:03.688731829Z","Action":"output","Test":"TestPreload","Output":" \t Architecture: amd64\n"} +{"Time":"2023-05-31T19:27:03.688734651Z","Action":"output","Test":"TestPreload","Output":" \t Container Runtime Version: containerd://1.7.1\n"} +{"Time":"2023-05-31T19:27:03.688744149Z","Action":"output","Test":"TestPreload","Output":" \t Kubelet Version: v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.68885118Z","Action":"output","Test":"TestPreload","Output":" \t Kube-Proxy Version: v1.24.4\n"} +{"Time":"2023-05-31T19:27:03.688856169Z","Action":"output","Test":"TestPreload","Output":" \tPodCIDR: 10.244.0.0/24\n"} +{"Time":"2023-05-31T19:27:03.688859448Z","Action":"output","Test":"TestPreload","Output":" \tPodCIDRs: 10.244.0.0/24\n"} +{"Time":"2023-05-31T19:27:03.688863507Z","Action":"output","Test":"TestPreload","Output":" \tNon-terminated Pods: (7 in total)\n"} +{"Time":"2023-05-31T19:27:03.688867572Z","Action":"output","Test":"TestPreload","Output":" \t Namespace Name CPU Requests CPU Limits Memory Requests Memory Limits Age\n"} +{"Time":"2023-05-31T19:27:03.688871976Z","Action":"output","Test":"TestPreload","Output":" \t --------- ---- ------------ ---------- --------------- ------------- ---\n"} +{"Time":"2023-05-31T19:27:03.688875806Z","Action":"output","Test":"TestPreload","Output":" \t kube-system coredns-6d4b75cb6d-vdz2m 100m (5%!)(MISSING) 0 (0%!)(MISSING) 70Mi (3%!)(MISSING) 170Mi (8%!)(MISSING) 3m43s\n"} +{"Time":"2023-05-31T19:27:03.688879564Z","Action":"output","Test":"TestPreload","Output":" \t kube-system etcd-test-preload-677810 100m (5%!)(MISSING) 0 (0%!)(MISSING) 100Mi (4%!)(MISSING) 0 (0%!)(MISSING) 3m58s\n"} +{"Time":"2023-05-31T19:27:03.688883219Z","Action":"output","Test":"TestPreload","Output":" \t kube-system kube-apiserver-test-preload-677810 250m (12%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 3m56s\n"} +{"Time":"2023-05-31T19:27:03.688886931Z","Action":"output","Test":"TestPreload","Output":" \t kube-system kube-controller-manager-test-preload-677810 200m (10%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 3m56s\n"} +{"Time":"2023-05-31T19:27:03.688890793Z","Action":"output","Test":"TestPreload","Output":" \t kube-system kube-proxy-xstcm 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 3m44s\n"} +{"Time":"2023-05-31T19:27:03.688894568Z","Action":"output","Test":"TestPreload","Output":" \t kube-system kube-scheduler-test-preload-677810 100m (5%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 3m58s\n"} +{"Time":"2023-05-31T19:27:03.688902834Z","Action":"output","Test":"TestPreload","Output":" \t kube-system storage-provisioner 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 3m42s\n"} +{"Time":"2023-05-31T19:27:03.688906446Z","Action":"output","Test":"TestPreload","Output":" \tAllocated resources:\n"} +{"Time":"2023-05-31T19:27:03.688909478Z","Action":"output","Test":"TestPreload","Output":" \t (Total limits may be over 100 percent, i.e., overcommitted.)\n"} +{"Time":"2023-05-31T19:27:03.688912317Z","Action":"output","Test":"TestPreload","Output":" \t Resource Requests Limits\n"} +{"Time":"2023-05-31T19:27:03.688915351Z","Action":"output","Test":"TestPreload","Output":" \t -------- -------- ------\n"} +{"Time":"2023-05-31T19:27:03.688918512Z","Action":"output","Test":"TestPreload","Output":" \t cpu 750m (37%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T19:27:03.68892184Z","Action":"output","Test":"TestPreload","Output":" \t memory 170Mi (8%!)(MISSING) 170Mi (8%!)(MISSING)\n"} +{"Time":"2023-05-31T19:27:03.689097419Z","Action":"output","Test":"TestPreload","Output":" \t ephemeral-storage 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T19:27:03.68910603Z","Action":"output","Test":"TestPreload","Output":" \t hugepages-2Mi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T19:27:03.689109489Z","Action":"output","Test":"TestPreload","Output":" \tEvents:\n"} +{"Time":"2023-05-31T19:27:03.689112701Z","Action":"output","Test":"TestPreload","Output":" \t Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:27:03.689116254Z","Action":"output","Test":"TestPreload","Output":" \t ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:27:03.689119661Z","Action":"output","Test":"TestPreload","Output":" \t Normal Starting 14s kube-proxy \n"} +{"Time":"2023-05-31T19:27:03.689122719Z","Action":"output","Test":"TestPreload","Output":" \t Normal Starting 3m41s kube-proxy \n"} +{"Time":"2023-05-31T19:27:03.689125784Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasSufficientMemory 4m5s (x5 over 4m6s) kubelet Node test-preload-677810 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T19:27:03.689135143Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasNoDiskPressure 4m5s (x4 over 4m6s) kubelet Node test-preload-677810 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T19:27:03.689139687Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasSufficientPID 4m5s (x4 over 4m6s) kubelet Node test-preload-677810 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T19:27:03.689143631Z","Action":"output","Test":"TestPreload","Output":" \t Normal Starting 3m56s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T19:27:03.68914806Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasSufficientMemory 3m56s kubelet Node test-preload-677810 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T19:27:03.689152133Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasNoDiskPressure 3m56s kubelet Node test-preload-677810 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T19:27:03.689155759Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasSufficientPID 3m56s kubelet Node test-preload-677810 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T19:27:03.689159933Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeAllocatableEnforced 3m56s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T19:27:03.689172286Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeReady 3m46s kubelet Node test-preload-677810 status is now: NodeReady\n"} +{"Time":"2023-05-31T19:27:03.689176403Z","Action":"output","Test":"TestPreload","Output":" \t Normal RegisteredNode 3m44s node-controller Node test-preload-677810 event: Registered Node test-preload-677810 in Controller\n"} +{"Time":"2023-05-31T19:27:03.689180738Z","Action":"output","Test":"TestPreload","Output":" \t Normal Starting 23s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T19:27:03.689186033Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasSufficientMemory 23s (x8 over 23s) kubelet Node test-preload-677810 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T19:27:03.689413445Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasNoDiskPressure 23s (x8 over 23s) kubelet Node test-preload-677810 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T19:27:03.689420207Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeHasSufficientPID 23s (x7 over 23s) kubelet Node test-preload-677810 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T19:27:03.689428233Z","Action":"output","Test":"TestPreload","Output":" \t Normal NodeAllocatableEnforced 23s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T19:27:03.689432295Z","Action":"output","Test":"TestPreload","Output":" \t Normal RegisteredNode 4s node-controller Node test-preload-677810 event: Registered Node test-preload-677810 in Controller\n"} +{"Time":"2023-05-31T19:27:03.689435683Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.689439458Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.689442984Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e dmesg \u003c==\n"} +{"Time":"2023-05-31T19:27:03.689447133Z","Action":"output","Test":"TestPreload","Output":" \t* [May31 19:25] You have booted with nomodeset. This means your GPU drivers are DISABLED\n"} +{"Time":"2023-05-31T19:27:03.689451029Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.000000] Any video related functionality will be severely degraded, and you may not even be able to suspend the system properly\n"} +{"Time":"2023-05-31T19:27:03.689454675Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.000001] Unless you actually understand what nomodeset does, you should reboot without enabling it\n"} +{"Time":"2023-05-31T19:27:03.68945823Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.072955] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.\n"} +{"Time":"2023-05-31T19:27:03.689461809Z","Action":"output","Test":"TestPreload","Output":" \t[ +3.929936] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2\n"} +{"Time":"2023-05-31T19:27:03.689465262Z","Action":"output","Test":"TestPreload","Output":" \t[ +3.211130] systemd-fstab-generator[114]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689468982Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.156486] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.\n"} +{"Time":"2023-05-31T19:27:03.689472522Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.000001] systemd[1]: (This warning is only shown for the first unit using IP firewalling.)\n"} +{"Time":"2023-05-31T19:27:03.689475782Z","Action":"output","Test":"TestPreload","Output":" \t[ +2.495258] NFSD: Using /var/lib/nfs/v4recovery as the NFSv4 state recovery directory\n"} +{"Time":"2023-05-31T19:27:03.689479059Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.000007] NFSD: unable to find recovery directory /var/lib/nfs/v4recovery\n"} +{"Time":"2023-05-31T19:27:03.68948224Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.000001] NFSD: Unable to initialize client recovery tracking! (-2)\n"} +{"Time":"2023-05-31T19:27:03.689485529Z","Action":"output","Test":"TestPreload","Output":" \t[May31 19:26] systemd-fstab-generator[528]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689488944Z","Action":"output","Test":"TestPreload","Output":" \t[ +2.812309] systemd-fstab-generator[558]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689709303Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.097973] systemd-fstab-generator[569]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689717122Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.119409] systemd-fstab-generator[582]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689720629Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.102091] systemd-fstab-generator[593]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689724011Z","Action":"output","Test":"TestPreload","Output":" \t[ +0.228809] systemd-fstab-generator[620]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689733518Z","Action":"output","Test":"TestPreload","Output":" \t[ +5.596096] systemd-fstab-generator[681]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689737051Z","Action":"output","Test":"TestPreload","Output":" \t[ +20.139119] systemd-fstab-generator[1023]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T19:27:03.689740433Z","Action":"output","Test":"TestPreload","Output":" \t[ +8.841226] kauditd_printk_skb: 7 callbacks suppressed\n"} +{"Time":"2023-05-31T19:27:03.689743968Z","Action":"output","Test":"TestPreload","Output":" \t[ +6.472901] kauditd_printk_skb: 8 callbacks suppressed\n"} +{"Time":"2023-05-31T19:27:03.689747159Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.689749779Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.689752845Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e etcd [6bfe707c881726fdb02d46dccf085f795b0809e248b4a3749e4f71bf6fd8b346] \u003c==\n"} +{"Time":"2023-05-31T19:27:03.689763846Z","Action":"output","Test":"TestPreload","Output":" \t* {\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.855Z\",\"caller\":\"etcdserver/server.go:851\",\"msg\":\"starting etcd server\",\"local-member-id\":\"9bf1b68912964415\",\"local-server-version\":\"3.5.3\",\"cluster-version\":\"to_be_decided\"}\n"} +{"Time":"2023-05-31T19:27:03.689769464Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.856Z\",\"caller\":\"etcdserver/server.go:752\",\"msg\":\"starting initial election tick advance\",\"election-ticks\":10}\n"} +{"Time":"2023-05-31T19:27:03.689774147Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.859Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"9bf1b68912964415 switched to configuration voters=(11236963245104710677)\"}\n"} +{"Time":"2023-05-31T19:27:03.689778718Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.859Z\",\"caller\":\"membership/cluster.go:421\",\"msg\":\"added member\",\"cluster-id\":\"6ea3af572c164fb3\",\"local-member-id\":\"9bf1b68912964415\",\"added-peer-id\":\"9bf1b68912964415\",\"added-peer-peer-urls\":[\"https://192.168.39.220:2380\"]}\n"} +{"Time":"2023-05-31T19:27:03.689788539Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.860Z\",\"caller\":\"membership/cluster.go:584\",\"msg\":\"set initial cluster version\",\"cluster-id\":\"6ea3af572c164fb3\",\"local-member-id\":\"9bf1b68912964415\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T19:27:03.689793425Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.860Z\",\"caller\":\"api/capability.go:75\",\"msg\":\"enabled capabilities for version\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T19:27:03.689798578Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.863Z\",\"caller\":\"embed/etcd.go:688\",\"msg\":\"starting with client TLS\",\"tls-info\":\"cert = /var/lib/minikube/certs/etcd/server.crt, key = /var/lib/minikube/certs/etcd/server.key, client-cert=, client-key=, trusted-ca = /var/lib/minikube/certs/etcd/ca.crt, client-cert-auth = true, crl-file = \",\"cipher-suites\":[]}\n"} +{"Time":"2023-05-31T19:27:03.690046207Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.864Z\",\"caller\":\"embed/etcd.go:277\",\"msg\":\"now serving peer/client/metrics\",\"local-member-id\":\"9bf1b68912964415\",\"initial-advertise-peer-urls\":[\"https://192.168.39.220:2380\"],\"listen-peer-urls\":[\"https://192.168.39.220:2380\"],\"advertise-client-urls\":[\"https://192.168.39.220:2379\"],\"listen-client-urls\":[\"https://127.0.0.1:2379\",\"https://192.168.39.220:2379\"],\"listen-metrics-urls\":[\"http://127.0.0.1:2381\"]}\n"} +{"Time":"2023-05-31T19:27:03.690057087Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.864Z\",\"caller\":\"embed/etcd.go:763\",\"msg\":\"serving metrics\",\"address\":\"http://127.0.0.1:2381\"}\n"} +{"Time":"2023-05-31T19:27:03.690065258Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.864Z\",\"caller\":\"embed/etcd.go:581\",\"msg\":\"serving peer traffic\",\"address\":\"192.168.39.220:2380\"}\n"} +{"Time":"2023-05-31T19:27:03.690069557Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:43.864Z\",\"caller\":\"embed/etcd.go:553\",\"msg\":\"cmux::serve\",\"address\":\"192.168.39.220:2380\"}\n"} +{"Time":"2023-05-31T19:27:03.690073822Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.031Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"9bf1b68912964415 is starting a new election at term 2\"}\n"} +{"Time":"2023-05-31T19:27:03.690078238Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.031Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"9bf1b68912964415 became pre-candidate at term 2\"}\n"} +{"Time":"2023-05-31T19:27:03.69008279Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.031Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"9bf1b68912964415 received MsgPreVoteResp from 9bf1b68912964415 at term 2\"}\n"} +{"Time":"2023-05-31T19:27:03.690087049Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.032Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"9bf1b68912964415 became candidate at term 3\"}\n"} +{"Time":"2023-05-31T19:27:03.690093607Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.032Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"9bf1b68912964415 received MsgVoteResp from 9bf1b68912964415 at term 3\"}\n"} +{"Time":"2023-05-31T19:27:03.690097659Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.032Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"9bf1b68912964415 became leader at term 3\"}\n"} +{"Time":"2023-05-31T19:27:03.690102152Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.032Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"raft.node: 9bf1b68912964415 elected leader 9bf1b68912964415 at term 3\"}\n"} +{"Time":"2023-05-31T19:27:03.690107256Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.032Z\",\"caller\":\"etcdserver/server.go:2042\",\"msg\":\"published local member to cluster through raft\",\"local-member-id\":\"9bf1b68912964415\",\"local-member-attributes\":\"{Name:test-preload-677810 ClientURLs:[https://192.168.39.220:2379]}\",\"request-path\":\"/0/members/9bf1b68912964415/attributes\",\"cluster-id\":\"6ea3af572c164fb3\",\"publish-timeout\":\"7s\"}\n"} +{"Time":"2023-05-31T19:27:03.690375418Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.033Z\",\"caller\":\"embed/serve.go:98\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T19:27:03.690386755Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.033Z\",\"caller\":\"embed/serve.go:98\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T19:27:03.690407438Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.034Z\",\"caller\":\"embed/serve.go:188\",\"msg\":\"serving client traffic securely\",\"address\":\"127.0.0.1:2379\"}\n"} +{"Time":"2023-05-31T19:27:03.690412265Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.034Z\",\"caller\":\"etcdmain/main.go:44\",\"msg\":\"notifying init daemon\"}\n"} +{"Time":"2023-05-31T19:27:03.690416235Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.034Z\",\"caller\":\"etcdmain/main.go:50\",\"msg\":\"successfully notified init daemon\"}\n"} +{"Time":"2023-05-31T19:27:03.690420427Z","Action":"output","Test":"TestPreload","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T19:26:45.035Z\",\"caller\":\"embed/serve.go:188\",\"msg\":\"serving client traffic securely\",\"address\":\"192.168.39.220:2379\"}\n"} +{"Time":"2023-05-31T19:27:03.690424545Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.690427757Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.690430982Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e kernel \u003c==\n"} +{"Time":"2023-05-31T19:27:03.690434503Z","Action":"output","Test":"TestPreload","Output":" \t* 19:27:03 up 1 min, 0 users, load average: 1.43, 0.43, 0.15\n"} +{"Time":"2023-05-31T19:27:03.690437858Z","Action":"output","Test":"TestPreload","Output":" \tLinux test-preload-677810 5.10.57 #1 SMP Wed May 24 02:58:02 UTC 2023 x86_64 GNU/Linux\n"} +{"Time":"2023-05-31T19:27:03.690452335Z","Action":"output","Test":"TestPreload","Output":" \tPRETTY_NAME=\"Buildroot 2021.02.12\"\n"} +{"Time":"2023-05-31T19:27:03.690455674Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.690458703Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.690461884Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e kube-apiserver [251b18a6ee12839bd02a873b18cd4afb289d5c64ce4d3b6e497746cf601789ce] \u003c==\n"} +{"Time":"2023-05-31T19:27:03.690465592Z","Action":"output","Test":"TestPreload","Output":" \t* I0531 19:26:47.556517 1 shared_informer.go:262] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T19:27:03.690469032Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.413439 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T19:27:03.690472255Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.413654 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T19:27:03.690475436Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.414098 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T19:27:03.690478714Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.414117 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T19:27:03.690739257Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.414228 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T19:27:03.690747677Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.414236 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T19:27:03.690751321Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.414243 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T19:27:03.690755024Z","Action":"output","Test":"TestPreload","Output":" \tE0531 19:26:47.572677 1 controller.go:169] Error removing old endpoints from kubernetes service: no master IPs were listed in storage, refusing to erase all endpoints for the kubernetes service\n"} +{"Time":"2023-05-31T19:27:03.690758683Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.596511 1 shared_informer.go:262] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T19:27:03.690762135Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.596565 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:27:03.690766008Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.602230 1 shared_informer.go:262] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:27:03.690769563Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.608314 1 apf_controller.go:322] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T19:27:03.690772933Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.608993 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:27:03.690776278Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.621337 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T19:27:03.690780005Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:48.065372 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T19:27:03.690787055Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:48.407076 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T19:27:03.690790362Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.128267 1 controller.go:611] quota admission added evaluator for: events.events.k8s.io\n"} +{"Time":"2023-05-31T19:27:03.690793387Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.315135 1 controller.go:611] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T19:27:03.690796365Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.325648 1 controller.go:611] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T19:27:03.6907991Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.365025 1 controller.go:611] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T19:27:03.690801204Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.382794 1 controller.go:611] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:27:03.690807689Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.396453 1 controller.go:611] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:27:03.693274851Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.962156 1 controller.go:611] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T19:27:03.693287818Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.029286 1 controller.go:611] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T19:27:03.693292065Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.693306599Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.69331309Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e kube-controller-manager [d29d66db419b28a9b2efb17dcf01d36211ef207d1843686336df20dec2d43cbb] \u003c==\n"} +{"Time":"2023-05-31T19:27:03.693317267Z","Action":"output","Test":"TestPreload","Output":" \t* I0531 19:26:59.877751 1 shared_informer.go:262] Caches are synced for certificate-csrsigning-kube-apiserver-client\n"} +{"Time":"2023-05-31T19:27:03.693321732Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.880114 1 shared_informer.go:262] Caches are synced for certificate-csrsigning-legacy-unknown\n"} +{"Time":"2023-05-31T19:27:03.693325364Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.885610 1 shared_informer.go:262] Caches are synced for taint\n"} +{"Time":"2023-05-31T19:27:03.693329967Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.885660 1 node_lifecycle_controller.go:1399] Initializing eviction metric for zone: \n"} +{"Time":"2023-05-31T19:27:03.693334135Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:59.885720 1 node_lifecycle_controller.go:1014] Missing timestamp for Node test-preload-677810. Assuming now as a timestamp.\n"} +{"Time":"2023-05-31T19:27:03.693340791Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.885775 1 node_lifecycle_controller.go:1215] Controller detected that zone is now in state Normal.\n"} +{"Time":"2023-05-31T19:27:03.693344325Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.886164 1 taint_manager.go:187] \"Starting NoExecuteTaintManager\"\n"} +{"Time":"2023-05-31T19:27:03.693351541Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.886476 1 event.go:294] \"Event occurred\" object=\"test-preload-677810\" fieldPath=\"\" kind=\"Node\" apiVersion=\"v1\" type=\"Normal\" reason=\"RegisteredNode\" message=\"Node test-preload-677810 event: Registered Node test-preload-677810 in Controller\"\n"} +{"Time":"2023-05-31T19:27:03.6933617Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.888570 1 shared_informer.go:262] Caches are synced for ReplicaSet\n"} +{"Time":"2023-05-31T19:27:03.693365517Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.890045 1 shared_informer.go:262] Caches are synced for persistent volume\n"} +{"Time":"2023-05-31T19:27:03.693372137Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.896744 1 shared_informer.go:262] Caches are synced for ephemeral\n"} +{"Time":"2023-05-31T19:27:03.693376502Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.896769 1 shared_informer.go:262] Caches are synced for HPA\n"} +{"Time":"2023-05-31T19:27:03.693382672Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.931528 1 shared_informer.go:262] Caches are synced for cronjob\n"} +{"Time":"2023-05-31T19:27:03.693386233Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.945400 1 shared_informer.go:262] Caches are synced for TTL after finished\n"} +{"Time":"2023-05-31T19:27:03.693730963Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.954010 1 shared_informer.go:262] Caches are synced for endpoint\n"} +{"Time":"2023-05-31T19:27:03.693743627Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.971459 1 shared_informer.go:262] Caches are synced for job\n"} +{"Time":"2023-05-31T19:27:03.69374839Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:59.989298 1 shared_informer.go:262] Caches are synced for resource quota\n"} +{"Time":"2023-05-31T19:27:03.693754915Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.002203 1 shared_informer.go:262] Caches are synced for resource quota\n"} +{"Time":"2023-05-31T19:27:03.693758722Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.020317 1 shared_informer.go:262] Caches are synced for endpoint_slice\n"} +{"Time":"2023-05-31T19:27:03.693770444Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.022543 1 shared_informer.go:262] Caches are synced for endpoint_slice_mirroring\n"} +{"Time":"2023-05-31T19:27:03.693774687Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.074368 1 shared_informer.go:262] Caches are synced for ClusterRoleAggregator\n"} +{"Time":"2023-05-31T19:27:03.693782253Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.093773 1 shared_informer.go:262] Caches are synced for attach detach\n"} +{"Time":"2023-05-31T19:27:03.693785542Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.536145 1 shared_informer.go:262] Caches are synced for garbage collector\n"} +{"Time":"2023-05-31T19:27:03.693788887Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.547616 1 shared_informer.go:262] Caches are synced for garbage collector\n"} +{"Time":"2023-05-31T19:27:03.693792619Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:27:00.547698 1 garbagecollector.go:158] Garbage collector: all resource monitors have synced. Proceeding to collect garbage\n"} +{"Time":"2023-05-31T19:27:03.693800474Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.693804181Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.693808021Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e kube-proxy [69e8baa5705287944e9439ccb2e2b98a1ff9a5bf9cae39c094d3d46a23de0f39] \u003c==\n"} +{"Time":"2023-05-31T19:27:03.693821322Z","Action":"output","Test":"TestPreload","Output":" \t* I0531 19:26:49.064425 1 node.go:163] Successfully retrieved node IP: 192.168.39.220\n"} +{"Time":"2023-05-31T19:27:03.693825289Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.064496 1 server_others.go:138] \"Detected node IP\" address=\"192.168.39.220\"\n"} +{"Time":"2023-05-31T19:27:03.693828932Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.064983 1 server_others.go:578] \"Unknown proxy mode, assuming iptables proxy\" proxyMode=\"\"\n"} +{"Time":"2023-05-31T19:27:03.693833218Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.118943 1 server_others.go:199] \"kube-proxy running in single-stack mode, this ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T19:27:03.693840029Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.118982 1 server_others.go:206] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T19:27:03.693844004Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.119362 1 proxier.go:259] \"Setting route_localnet=1, use nodePortAddresses to filter loopback addresses for NodePorts to skip it https://issues.k8s.io/90259\"\n"} +{"Time":"2023-05-31T19:27:03.694207004Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.120337 1 server.go:661] \"Version info\" version=\"v1.24.4\"\n"} +{"Time":"2023-05-31T19:27:03.694219092Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.120389 1 server.go:663] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:27:03.694223631Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.121715 1 config.go:317] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T19:27:03.694230224Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.121945 1 shared_informer.go:255] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T19:27:03.694236406Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.122064 1 config.go:226] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T19:27:03.694248968Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.122106 1 shared_informer.go:255] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T19:27:03.694252748Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.123434 1 config.go:444] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T19:27:03.694259546Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.123566 1 shared_informer.go:255] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T19:27:03.694263245Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.222300 1 shared_informer.go:262] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T19:27:03.694267728Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.222336 1 shared_informer.go:262] Caches are synced for service config\n"} +{"Time":"2023-05-31T19:27:03.694271368Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:49.224101 1 shared_informer.go:262] Caches are synced for node config\n"} +{"Time":"2023-05-31T19:27:03.694277575Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.694281022Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.694287474Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e kube-scheduler [2dd5f1f6ea0cfa97c714e245880d6ac617cce47bc7832bd89d56f64da1ea462b] \u003c==\n"} +{"Time":"2023-05-31T19:27:03.694291378Z","Action":"output","Test":"TestPreload","Output":" \t* I0531 19:26:44.119044 1 serving.go:348] Generated self-signed cert in-memory\n"} +{"Time":"2023-05-31T19:27:03.694303485Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:47.478932 1 requestheader_controller.go:193] Unable to get configmap/extension-apiserver-authentication in kube-system. Usually fixed by 'kubectl create rolebinding -n kube-system ROLEBINDING_NAME --role=extension-apiserver-authentication-reader --serviceaccount=YOUR_NS:YOUR_SA'\n"} +{"Time":"2023-05-31T19:27:03.69431159Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:47.479223 1 authentication.go:346] Error looking up in-cluster authentication configuration: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T19:27:03.694319227Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:47.479362 1 authentication.go:347] Continuing without authentication configuration. This may treat all requests as anonymous.\n"} +{"Time":"2023-05-31T19:27:03.694546409Z","Action":"output","Test":"TestPreload","Output":" \tW0531 19:26:47.479582 1 authentication.go:348] To require authentication configuration lookup to succeed, set --authentication-tolerate-lookup-failure=false\n"} +{"Time":"2023-05-31T19:27:03.694553629Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.542681 1 server.go:147] \"Starting Kubernetes Scheduler\" version=\"v1.24.4\"\n"} +{"Time":"2023-05-31T19:27:03.694557474Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.542699 1 server.go:149] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:27:03.694565932Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.544386 1 secure_serving.go:210] Serving securely on 127.0.0.1:10259\n"} +{"Time":"2023-05-31T19:27:03.694570832Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.544717 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T19:27:03.694577863Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.544950 1 configmap_cafile_content.go:202] \"Starting controller\" name=\"client-ca::kube-system::extension-apiserver-authentication::client-ca-file\"\n"} +{"Time":"2023-05-31T19:27:03.694581957Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.553584 1 shared_informer.go:255] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T19:27:03.694588899Z","Action":"output","Test":"TestPreload","Output":" \tI0531 19:26:47.653902 1 shared_informer.go:262] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T19:27:03.694592241Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.694594719Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.694596827Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e kubelet \u003c==\n"} +{"Time":"2023-05-31T19:27:03.69459938Z","Action":"output","Test":"TestPreload","Output":" \t* -- Journal begins at Wed 2023-05-31 19:25:53 UTC, ends at Wed 2023-05-31 19:27:03 UTC. --\n"} +{"Time":"2023-05-31T19:27:03.694601749Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.536605 1029 topology_manager.go:200] \"Topology Admit Handler\"\n"} +{"Time":"2023-05-31T19:27:03.6946041Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.538953 1029 topology_manager.go:200] \"Topology Admit Handler\"\n"} +{"Time":"2023-05-31T19:27:03.694606438Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.539302 1029 topology_manager.go:200] \"Topology Admit Handler\"\n"} +{"Time":"2023-05-31T19:27:03.694611791Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: E0531 19:26:47.542255 1029 pod_workers.go:951] \"Error syncing pod, skipping\" err=\"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized\" pod=\"kube-system/coredns-6d4b75cb6d-vdz2m\" podUID=f8812727-46cf-4d58-b5fa-0c899aaaa1d5\n"} +{"Time":"2023-05-31T19:27:03.694614815Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.581716 1029 kubelet_node_status.go:108] \"Node was previously registered\" node=\"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.694854503Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.582168 1029 kubelet_node_status.go:73] \"Successfully registered node\" node=\"test-preload-677810\"\n"} +{"Time":"2023-05-31T19:27:03.694858231Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.585213 1029 setters.go:532] \"Node became not ready\" node=\"test-preload-677810\" condition={Type:Ready Status:False LastHeartbeatTime:2023-05-31 19:26:47.585174702 +0000 UTC m=+7.235386831 LastTransitionTime:2023-05-31 19:26:47.585174702 +0000 UTC m=+7.235386831 Reason:KubeletNotReady Message:container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized}\n"} +{"Time":"2023-05-31T19:27:03.694861791Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690212 1029 reconciler.go:342] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/dc7eefba-7203-4990-a022-31d135925ee0-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"dc7eefba-7203-4990-a022-31d135925ee0\\\") \" pod=\"kube-system/storage-provisioner\"\n"} +{"Time":"2023-05-31T19:27:03.694872262Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690283 1029 reconciler.go:342] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-7vmxf\\\" (UniqueName: \\\"kubernetes.io/projected/0b61fbe1-b80f-4e22-8456-80667f9bae1f-kube-api-access-7vmxf\\\") pod \\\"kube-proxy-xstcm\\\" (UID: \\\"0b61fbe1-b80f-4e22-8456-80667f9bae1f\\\") \" pod=\"kube-system/kube-proxy-xstcm\"\n"} +{"Time":"2023-05-31T19:27:03.694875962Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690304 1029 reconciler.go:342] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/0b61fbe1-b80f-4e22-8456-80667f9bae1f-xtables-lock\\\") pod \\\"kube-proxy-xstcm\\\" (UID: \\\"0b61fbe1-b80f-4e22-8456-80667f9bae1f\\\") \" pod=\"kube-system/kube-proxy-xstcm\"\n"} +{"Time":"2023-05-31T19:27:03.694881658Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690324 1029 reconciler.go:342] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume\\\") pod \\\"coredns-6d4b75cb6d-vdz2m\\\" (UID: \\\"f8812727-46cf-4d58-b5fa-0c899aaaa1d5\\\") \" pod=\"kube-system/coredns-6d4b75cb6d-vdz2m\"\n"} +{"Time":"2023-05-31T19:27:03.694885303Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690342 1029 reconciler.go:342] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-lwshp\\\" (UniqueName: \\\"kubernetes.io/projected/dc7eefba-7203-4990-a022-31d135925ee0-kube-api-access-lwshp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"dc7eefba-7203-4990-a022-31d135925ee0\\\") \" pod=\"kube-system/storage-provisioner\"\n"} +{"Time":"2023-05-31T19:27:03.694895187Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690361 1029 reconciler.go:342] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/0b61fbe1-b80f-4e22-8456-80667f9bae1f-kube-proxy\\\") pod \\\"kube-proxy-xstcm\\\" (UID: \\\"0b61fbe1-b80f-4e22-8456-80667f9bae1f\\\") \" pod=\"kube-system/kube-proxy-xstcm\"\n"} +{"Time":"2023-05-31T19:27:03.695069268Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690377 1029 reconciler.go:342] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/0b61fbe1-b80f-4e22-8456-80667f9bae1f-lib-modules\\\") pod \\\"kube-proxy-xstcm\\\" (UID: \\\"0b61fbe1-b80f-4e22-8456-80667f9bae1f\\\") \" pod=\"kube-system/kube-proxy-xstcm\"\n"} +{"Time":"2023-05-31T19:27:03.695073236Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690401 1029 reconciler.go:342] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-d25lz\\\" (UniqueName: \\\"kubernetes.io/projected/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-kube-api-access-d25lz\\\") pod \\\"coredns-6d4b75cb6d-vdz2m\\\" (UID: \\\"f8812727-46cf-4d58-b5fa-0c899aaaa1d5\\\") \" pod=\"kube-system/coredns-6d4b75cb6d-vdz2m\"\n"} +{"Time":"2023-05-31T19:27:03.695078575Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: I0531 19:26:47.690415 1029 reconciler.go:159] \"Reconciler: start to sync state\"\n"} +{"Time":"2023-05-31T19:27:03.695080988Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: E0531 19:26:47.792815 1029 configmap.go:193] Couldn't get configMap kube-system/coredns: object \"kube-system\"/\"coredns\" not registered\n"} +{"Time":"2023-05-31T19:27:03.695084255Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:47 test-preload-677810 kubelet[1029]: E0531 19:26:47.793156 1029 nestedpendingoperations.go:335] Operation for \"{volumeName:kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume podName:f8812727-46cf-4d58-b5fa-0c899aaaa1d5 nodeName:}\" failed. No retries permitted until 2023-05-31 19:26:48.293063415 +0000 UTC m=+7.943275564 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume\") pod \"coredns-6d4b75cb6d-vdz2m\" (UID: \"f8812727-46cf-4d58-b5fa-0c899aaaa1d5\") : object \"kube-system\"/\"coredns\" not registered\n"} +{"Time":"2023-05-31T19:27:03.69510027Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 kubelet[1029]: E0531 19:26:48.295193 1029 configmap.go:193] Couldn't get configMap kube-system/coredns: object \"kube-system\"/\"coredns\" not registered\n"} +{"Time":"2023-05-31T19:27:03.695107921Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:48 test-preload-677810 kubelet[1029]: E0531 19:26:48.295304 1029 nestedpendingoperations.go:335] Operation for \"{volumeName:kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume podName:f8812727-46cf-4d58-b5fa-0c899aaaa1d5 nodeName:}\" failed. No retries permitted until 2023-05-31 19:26:49.295288162 +0000 UTC m=+8.945500292 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume\") pod \"coredns-6d4b75cb6d-vdz2m\" (UID: \"f8812727-46cf-4d58-b5fa-0c899aaaa1d5\") : object \"kube-system\"/\"coredns\" not registered\n"} +{"Time":"2023-05-31T19:27:03.695117186Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:49 test-preload-677810 kubelet[1029]: E0531 19:26:49.304229 1029 configmap.go:193] Couldn't get configMap kube-system/coredns: object \"kube-system\"/\"coredns\" not registered\n"} +{"Time":"2023-05-31T19:27:03.6952686Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:49 test-preload-677810 kubelet[1029]: E0531 19:26:49.304299 1029 nestedpendingoperations.go:335] Operation for \"{volumeName:kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume podName:f8812727-46cf-4d58-b5fa-0c899aaaa1d5 nodeName:}\" failed. No retries permitted until 2023-05-31 19:26:51.304284067 +0000 UTC m=+10.954496197 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume\") pod \"coredns-6d4b75cb6d-vdz2m\" (UID: \"f8812727-46cf-4d58-b5fa-0c899aaaa1d5\") : object \"kube-system\"/\"coredns\" not registered\n"} +{"Time":"2023-05-31T19:27:03.695280883Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:49 test-preload-677810 kubelet[1029]: E0531 19:26:49.624116 1029 pod_workers.go:951] \"Error syncing pod, skipping\" err=\"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized\" pod=\"kube-system/coredns-6d4b75cb6d-vdz2m\" podUID=f8812727-46cf-4d58-b5fa-0c899aaaa1d5\n"} +{"Time":"2023-05-31T19:27:03.69528909Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:51 test-preload-677810 kubelet[1029]: E0531 19:26:51.322057 1029 configmap.go:193] Couldn't get configMap kube-system/coredns: object \"kube-system\"/\"coredns\" not registered\n"} +{"Time":"2023-05-31T19:27:03.695293943Z","Action":"output","Test":"TestPreload","Output":" \tMay 31 19:26:51 test-preload-677810 kubelet[1029]: E0531 19:26:51.322122 1029 nestedpendingoperations.go:335] Operation for \"{volumeName:kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume podName:f8812727-46cf-4d58-b5fa-0c899aaaa1d5 nodeName:}\" failed. No retries permitted until 2023-05-31 19:26:55.322107292 +0000 UTC m=+14.972319434 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f8812727-46cf-4d58-b5fa-0c899aaaa1d5-config-volume\") pod \"coredns-6d4b75cb6d-vdz2m\" (UID: \"f8812727-46cf-4d58-b5fa-0c899aaaa1d5\") : object \"kube-system\"/\"coredns\" not registered\n"} +{"Time":"2023-05-31T19:27:03.69530176Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.695305426Z","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T19:27:03.695309707Z","Action":"output","Test":"TestPreload","Output":" \t* ==\u003e storage-provisioner [c2ab5b39228b784a4aa7e0a5202fb3e4083a6dcff3e48dfe381868108dd4169e] \u003c==\n"} +{"Time":"2023-05-31T19:27:03.695313568Z","Action":"output","Test":"TestPreload","Output":" \t* I0531 19:26:48.962928 1 storage_provisioner.go:116] Initializing the minikube storage provisioner...\n"} +{"Time":"2023-05-31T19:27:03.695317Z","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T19:27:03.695322124Z","Action":"output","Test":"TestPreload","Output":" \n"} +{"Time":"2023-05-31T19:27:03.695324165Z","Action":"output","Test":"TestPreload","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:27:03.695326337Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:254: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p test-preload-677810 -n test-preload-677810\n"} +{"Time":"2023-05-31T19:27:03.928432964Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:261: (dbg) Run: kubectl --context test-preload-677810 get po -o=jsonpath={.items[*].metadata.name} -A --field-selector=status.phase!=Running\n"} +{"Time":"2023-05-31T19:27:04.01840398Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:285: \u003c\u003c\u003c TestPreload FAILED: end of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T19:27:04.018433774Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:286: ---------------------/post-mortem---------------------------------\n"} +{"Time":"2023-05-31T19:27:04.018451742Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:175: Cleaning up \"test-preload-677810\" profile ...\n"} +{"Time":"2023-05-31T19:27:04.018458289Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p test-preload-677810\n"} +{"Time":"2023-05-31T19:27:05.297309705Z","Action":"output","Test":"TestPreload","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p test-preload-677810: (1.278805991s)\n"} +{"Time":"2023-05-31T19:27:05.297342287Z","Action":"output","Test":"TestPreload","Output":"--- FAIL: TestPreload (300.23s)\n"} +{"Time":"2023-05-31T19:27:05.297350003Z","Action":"fail","Test":"TestPreload","Elapsed":300.23} +{"Time":"2023-05-31T19:27:05.297356423Z","Action":"run","Test":"TestScheduledStopWindows"} +{"Time":"2023-05-31T19:27:05.29735946Z","Action":"output","Test":"TestScheduledStopWindows","Output":"=== RUN TestScheduledStopWindows\n"} +{"Time":"2023-05-31T19:27:05.297363525Z","Action":"output","Test":"TestScheduledStopWindows","Output":" scheduled_stop_test.go:42: test only runs on windows\n"} +{"Time":"2023-05-31T19:27:05.297369219Z","Action":"output","Test":"TestScheduledStopWindows","Output":"--- SKIP: TestScheduledStopWindows (0.00s)\n"} +{"Time":"2023-05-31T19:27:05.297372549Z","Action":"skip","Test":"TestScheduledStopWindows","Elapsed":0} +{"Time":"2023-05-31T19:27:05.297375493Z","Action":"run","Test":"TestScheduledStopUnix"} +{"Time":"2023-05-31T19:27:05.297378635Z","Action":"output","Test":"TestScheduledStopUnix","Output":"=== RUN TestScheduledStopUnix\n"} +{"Time":"2023-05-31T19:27:05.297465214Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:128: (dbg) Run: out/minikube-linux-amd64 start -p scheduled-stop-375206 --memory=2048 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:27:15.148751626Z","Action":"output","Test":"TestScheduledStopUnix","Output":"E0531 19:27:15.148674 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:27:57.870403993Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:128: (dbg) Done: out/minikube-linux-amd64 start -p scheduled-stop-375206 --memory=2048 --driver=kvm2 --container-runtime=containerd: (52.572858688s)\n"} +{"Time":"2023-05-31T19:27:57.870435504Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:137: (dbg) Run: out/minikube-linux-amd64 stop -p scheduled-stop-375206 --schedule 5m\n"} +{"Time":"2023-05-31T19:27:57.908839505Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:191: (dbg) Run: out/minikube-linux-amd64 status --format={{.TimeToStop}} -p scheduled-stop-375206 -n scheduled-stop-375206\n"} +{"Time":"2023-05-31T19:27:57.952280949Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:191: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.TimeToStop}} -p scheduled-stop-375206 -n scheduled-stop-375206: exit status 85 (43.38753ms)\n"} +{"Time":"2023-05-31T19:27:57.952311336Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T19:27:57.952327877Z","Action":"output","Test":"TestScheduledStopUnix","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:27:57.952332477Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Profile \"scheduled-stop-375206\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:27:57.952336274Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \t To start a cluster, run: \"minikube start -p scheduled-stop-375206\"\n"} +{"Time":"2023-05-31T19:27:57.952339774Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T19:27:57.952343162Z","Action":"output","Test":"TestScheduledStopUnix","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:27:57.952347787Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:191: status error: exit status 85 (may be ok)\n"} +{"Time":"2023-05-31T19:27:57.984298427Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:169: signal error was: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:27:57.984334618Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:137: (dbg) Run: out/minikube-linux-amd64 stop -p scheduled-stop-375206 --schedule 15s\n"} +{"Time":"2023-05-31T19:27:58.020265006Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:169: signal error was: os: process already finished\n"} +{"Time":"2023-05-31T19:27:58.09045802Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:137: (dbg) Run: out/minikube-linux-amd64 stop -p scheduled-stop-375206 --cancel-scheduled\n"} +{"Time":"2023-05-31T19:28:23.135004025Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:176: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p scheduled-stop-375206 -n scheduled-stop-375206\n"} +{"Time":"2023-05-31T19:28:23.359053006Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:205: (dbg) Run: out/minikube-linux-amd64 status -p scheduled-stop-375206\n"} +{"Time":"2023-05-31T19:28:23.590177632Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:137: (dbg) Run: out/minikube-linux-amd64 stop -p scheduled-stop-375206 --schedule 15s\n"} +{"Time":"2023-05-31T19:28:38.626400816Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:169: signal error was: os: process already finished\n"} +{"Time":"2023-05-31T19:29:08.627287267Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:205: (dbg) Run: out/minikube-linux-amd64 status -p scheduled-stop-375206\n"} +{"Time":"2023-05-31T19:29:08.690603036Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:205: (dbg) Non-zero exit: out/minikube-linux-amd64 status -p scheduled-stop-375206: exit status 7 (63.245296ms)\n"} +{"Time":"2023-05-31T19:29:08.690626685Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T19:29:08.690631147Z","Action":"output","Test":"TestScheduledStopUnix","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:29:08.690634116Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \tscheduled-stop-375206\n"} +{"Time":"2023-05-31T19:29:08.690637363Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T19:29:08.690639502Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T19:29:08.690642007Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T19:29:08.690644364Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T19:29:08.690646325Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T19:29:08.690648413Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T19:29:08.690650495Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T19:29:08.690653822Z","Action":"output","Test":"TestScheduledStopUnix","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:29:08.69065929Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:176: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p scheduled-stop-375206 -n scheduled-stop-375206\n"} +{"Time":"2023-05-31T19:29:08.745427566Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:176: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Host}} -p scheduled-stop-375206 -n scheduled-stop-375206: exit status 7 (54.720099ms)\n"} +{"Time":"2023-05-31T19:29:08.745451311Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T19:29:08.745455831Z","Action":"output","Test":"TestScheduledStopUnix","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:29:08.745458711Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:29:08.745465858Z","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T19:29:08.7454683Z","Action":"output","Test":"TestScheduledStopUnix","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:29:08.745470423Z","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:176: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T19:29:08.74547281Z","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:175: Cleaning up \"scheduled-stop-375206\" profile ...\n"} +{"Time":"2023-05-31T19:29:08.74547685Z","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p scheduled-stop-375206\n"} +{"Time":"2023-05-31T19:29:09.128346764Z","Action":"output","Test":"TestScheduledStopUnix","Output":"--- PASS: TestScheduledStopUnix (123.83s)\n"} +{"Time":"2023-05-31T19:29:09.128368607Z","Action":"pass","Test":"TestScheduledStopUnix","Elapsed":123.83} +{"Time":"2023-05-31T19:29:09.128374557Z","Action":"run","Test":"TestSkaffold"} +{"Time":"2023-05-31T19:29:09.128377507Z","Action":"output","Test":"TestSkaffold","Output":"=== RUN TestSkaffold\n"} +{"Time":"2023-05-31T19:29:09.1283821Z","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:45: skaffold requires docker-env, currently testing containerd container runtime\n"} +{"Time":"2023-05-31T19:29:09.12838564Z","Action":"output","Test":"TestSkaffold","Output":"--- SKIP: TestSkaffold (0.00s)\n"} +{"Time":"2023-05-31T19:29:09.128400812Z","Action":"skip","Test":"TestSkaffold","Elapsed":0} +{"Time":"2023-05-31T19:29:09.128403152Z","Action":"run","Test":"TestStartStop"} +{"Time":"2023-05-31T19:29:09.128405868Z","Action":"output","Test":"TestStartStop","Output":"=== RUN TestStartStop\n"} +{"Time":"2023-05-31T19:29:09.128410662Z","Action":"output","Test":"TestStartStop","Output":"=== PAUSE TestStartStop\n"} +{"Time":"2023-05-31T19:29:09.128417639Z","Action":"pause","Test":"TestStartStop"} +{"Time":"2023-05-31T19:29:09.12842196Z","Action":"run","Test":"TestInsufficientStorage"} +{"Time":"2023-05-31T19:29:09.128424504Z","Action":"output","Test":"TestInsufficientStorage","Output":"=== RUN TestInsufficientStorage\n"} +{"Time":"2023-05-31T19:29:09.128436244Z","Action":"output","Test":"TestInsufficientStorage","Output":" status_test.go:38: only runs with docker driver\n"} +{"Time":"2023-05-31T19:29:09.128457044Z","Action":"output","Test":"TestInsufficientStorage","Output":"--- SKIP: TestInsufficientStorage (0.00s)\n"} +{"Time":"2023-05-31T19:29:09.12846151Z","Action":"skip","Test":"TestInsufficientStorage","Elapsed":0} +{"Time":"2023-05-31T19:29:09.128463289Z","Action":"run","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T19:29:09.128465091Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== RUN TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T19:29:09.128479631Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== PAUSE TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T19:29:09.128481533Z","Action":"pause","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T19:29:09.128484316Z","Action":"run","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T19:29:09.128486151Z","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== RUN TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T19:29:09.128510676Z","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== PAUSE TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T19:29:09.12851494Z","Action":"pause","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T19:29:09.128519252Z","Action":"run","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T19:29:09.128521959Z","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== RUN TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T19:29:09.128526263Z","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== PAUSE TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T19:29:09.128529033Z","Action":"pause","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T19:29:09.128533008Z","Action":"run","Test":"TestMissingContainerUpgrade"} +{"Time":"2023-05-31T19:29:09.128536163Z","Action":"output","Test":"TestMissingContainerUpgrade","Output":"=== RUN TestMissingContainerUpgrade\n"} +{"Time":"2023-05-31T19:29:09.128572352Z","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:296: This test is only for Docker\n"} +{"Time":"2023-05-31T19:29:09.128591354Z","Action":"output","Test":"TestMissingContainerUpgrade","Output":"--- SKIP: TestMissingContainerUpgrade (0.00s)\n"} +{"Time":"2023-05-31T19:29:09.128611432Z","Action":"skip","Test":"TestMissingContainerUpgrade","Elapsed":0} +{"Time":"2023-05-31T19:29:09.128614129Z","Action":"cont","Test":"TestOffline"} +{"Time":"2023-05-31T19:29:09.128616124Z","Action":"output","Test":"TestOffline","Output":"=== CONT TestOffline\n"} +{"Time":"2023-05-31T19:29:09.128703561Z","Action":"cont","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T19:29:09.128720285Z","Action":"output","Test":"TestNoKubernetes","Output":"=== CONT TestNoKubernetes\n"} +{"Time":"2023-05-31T19:29:09.128727011Z","Action":"output","Test":"TestOffline","Output":" aab_offline_test.go:55: (dbg) Run: out/minikube-linux-amd64 start -p offline-containerd-612417 --alsologtostderr -v=1 --memory=2048 --wait=true --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:29:09.128807799Z","Action":"run","Test":"TestNoKubernetes/serial"} +{"Time":"2023-05-31T19:29:09.128818046Z","Action":"output","Test":"TestNoKubernetes/serial","Output":"=== RUN TestNoKubernetes/serial\n"} +{"Time":"2023-05-31T19:29:09.128824919Z","Action":"cont","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T19:29:09.128828109Z","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== CONT TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T19:29:09.128844667Z","Action":"run","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion"} +{"Time":"2023-05-31T19:29:09.128849271Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":"=== RUN TestNoKubernetes/serial/StartNoK8sWithVersion\n"} +{"Time":"2023-05-31T19:29:09.128918821Z","Action":"cont","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T19:29:09.128931695Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== CONT TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T19:29:09.129047126Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" no_kubernetes_test.go:83: (dbg) Run: out/minikube-linux-amd64 start -p NoKubernetes-651857 --no-kubernetes --kubernetes-version=1.20 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:29:09.129179387Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:234: (dbg) Run: out/minikube-linux-amd64 start -p kubernetes-upgrade-827996 --memory=2200 --kubernetes-version=v1.16.0 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:29:09.201828765Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" no_kubernetes_test.go:83: (dbg) Non-zero exit: out/minikube-linux-amd64 start -p NoKubernetes-651857 --no-kubernetes --kubernetes-version=1.20 --driver=kvm2 --container-runtime=containerd: exit status 14 (72.659608ms)\n"} +{"Time":"2023-05-31T19:29:09.201851471Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T19:29:09.201857336Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:29:09.201861219Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t* [NoKubernetes-651857] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T19:29:09.201865907Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T19:29:09.201869155Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T19:29:09.201873091Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T19:29:09.201876214Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T19:29:09.201879186Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T19:29:09.201882174Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T19:29:09.201885284Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T19:29:09.20188801Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T19:29:09.201891532Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T19:29:09.201894727Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:29:09.201897586Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:29:09.201900544Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \tX Exiting due to MK_USAGE: cannot specify --kubernetes-version with --no-kubernetes,\n"} +{"Time":"2023-05-31T19:29:09.201903753Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \tto unset a global config run:\n"} +{"Time":"2023-05-31T19:29:09.201912684Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T19:29:09.201922106Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t$ minikube config unset kubernetes-version\n"} +{"Time":"2023-05-31T19:29:09.201925086Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T19:29:09.201927922Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:29:09.201931572Z","Action":"run","Test":"TestNoKubernetes/serial/StartWithK8s"} +{"Time":"2023-05-31T19:29:09.20193458Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":"=== RUN TestNoKubernetes/serial/StartWithK8s\n"} +{"Time":"2023-05-31T19:29:09.20194437Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:95: (dbg) Run: out/minikube-linux-amd64 start -p NoKubernetes-651857 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:29:09.948661015Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:132: (dbg) Run: /tmp/minikube-v1.22.0.1183461980.exe start -p running-upgrade-922074 --memory=2200 --vm-driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:30:18.191907198Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"E0531 19:30:18.191592 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:30:20.552232208Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"E0531 19:30:20.552163 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:30:27.785591206Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:234: (dbg) Done: out/minikube-linux-amd64 start -p kubernetes-upgrade-827996 --memory=2200 --kubernetes-version=v1.16.0 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd: (1m18.656305456s)\n"} +{"Time":"2023-05-31T19:30:27.785620106Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:239: (dbg) Run: out/minikube-linux-amd64 stop -p kubernetes-upgrade-827996\n"} +{"Time":"2023-05-31T19:30:30.146023454Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:239: (dbg) Done: out/minikube-linux-amd64 stop -p kubernetes-upgrade-827996: (2.360339134s)\n"} +{"Time":"2023-05-31T19:30:30.146051846Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:244: (dbg) Run: out/minikube-linux-amd64 -p kubernetes-upgrade-827996 status --format={{.Host}}\n"} +{"Time":"2023-05-31T19:30:30.245954388Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:244: (dbg) Non-zero exit: out/minikube-linux-amd64 -p kubernetes-upgrade-827996 status --format={{.Host}}: exit status 7 (99.846308ms)\n"} +{"Time":"2023-05-31T19:30:30.245982589Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T19:30:30.246029645Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:30:30.246033587Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:30:30.246036875Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T19:30:30.246040189Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:30:30.246046277Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:246: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T19:30:30.246052969Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:255: (dbg) Run: out/minikube-linux-amd64 start -p kubernetes-upgrade-827996 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:30:54.602725835Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:95: (dbg) Done: out/minikube-linux-amd64 start -p NoKubernetes-651857 --driver=kvm2 --container-runtime=containerd: (1m45.400696408s)\n"} +{"Time":"2023-05-31T19:30:54.602766479Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:200: (dbg) Run: out/minikube-linux-amd64 -p NoKubernetes-651857 status -o json\n"} +{"Time":"2023-05-31T19:30:54.8510923Z","Action":"run","Test":"TestNoKubernetes/serial/StartWithStopK8s"} +{"Time":"2023-05-31T19:30:54.851126147Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":"=== RUN TestNoKubernetes/serial/StartWithStopK8s\n"} +{"Time":"2023-05-31T19:30:54.851133807Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:112: (dbg) Run: out/minikube-linux-amd64 start -p NoKubernetes-651857 --no-kubernetes --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:31:08.275966585Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":"E0531 19:31:08.275864 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:31:20.659872791Z","Action":"output","Test":"TestOffline","Output":" aab_offline_test.go:55: (dbg) Done: out/minikube-linux-amd64 start -p offline-containerd-612417 --alsologtostderr -v=1 --memory=2048 --wait=true --driver=kvm2 --container-runtime=containerd: (2m11.530981492s)\n"} +{"Time":"2023-05-31T19:31:20.659901656Z","Action":"output","Test":"TestOffline","Output":" helpers_test.go:175: Cleaning up \"offline-containerd-612417\" profile ...\n"} +{"Time":"2023-05-31T19:31:20.659906936Z","Action":"output","Test":"TestOffline","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p offline-containerd-612417\n"} +{"Time":"2023-05-31T19:31:21.654849074Z","Action":"output","Test":"TestOffline","Output":"--- PASS: TestOffline (132.53s)\n"} +{"Time":"2023-05-31T19:31:21.654876268Z","Action":"pass","Test":"TestOffline","Elapsed":132.53} +{"Time":"2023-05-31T19:31:21.654884467Z","Action":"cont","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T19:31:21.654887967Z","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== CONT TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T19:31:21.654893949Z","Action":"run","Test":"TestStoppedBinaryUpgrade/Setup"} +{"Time":"2023-05-31T19:31:21.654897689Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Setup","Output":"=== RUN TestStoppedBinaryUpgrade/Setup\n"} +{"Time":"2023-05-31T19:31:22.18689821Z","Action":"run","Test":"TestStoppedBinaryUpgrade/Upgrade"} +{"Time":"2023-05-31T19:31:22.18692352Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"=== RUN TestStoppedBinaryUpgrade/Upgrade\n"} +{"Time":"2023-05-31T19:31:22.187087505Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Run: /tmp/minikube-v1.22.0.4215360760.exe start -p stopped-upgrade-814323 --memory=2200 --vm-driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:31:28.518466328Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:112: (dbg) Done: out/minikube-linux-amd64 start -p NoKubernetes-651857 --no-kubernetes --driver=kvm2 --container-runtime=containerd: (33.667291327s)\n"} +{"Time":"2023-05-31T19:31:28.518494726Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:200: (dbg) Run: out/minikube-linux-amd64 -p NoKubernetes-651857 status -o json\n"} +{"Time":"2023-05-31T19:31:28.751228656Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:200: (dbg) Non-zero exit: out/minikube-linux-amd64 -p NoKubernetes-651857 status -o json: exit status 2 (232.671955ms)\n"} +{"Time":"2023-05-31T19:31:28.751257468Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T19:31:28.751262086Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:31:28.751266274Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t{\"Name\":\"NoKubernetes-651857\",\"Host\":\"Running\",\"Kubelet\":\"Stopped\",\"APIServer\":\"Stopped\",\"Kubeconfig\":\"Configured\",\"Worker\":false}\n"} +{"Time":"2023-05-31T19:31:28.751271154Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T19:31:28.751274898Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:31:28.751280523Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:124: (dbg) Run: out/minikube-linux-amd64 delete -p NoKubernetes-651857\n"} +{"Time":"2023-05-31T19:31:29.860258655Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:124: (dbg) Done: out/minikube-linux-amd64 delete -p NoKubernetes-651857: (1.108922047s)\n"} +{"Time":"2023-05-31T19:31:29.860288947Z","Action":"run","Test":"TestNoKubernetes/serial/Start"} +{"Time":"2023-05-31T19:31:29.860292993Z","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":"=== RUN TestNoKubernetes/serial/Start\n"} +{"Time":"2023-05-31T19:31:29.860299213Z","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" no_kubernetes_test.go:136: (dbg) Run: out/minikube-linux-amd64 start -p NoKubernetes-651857 --no-kubernetes --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:31:53.689633955Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:132: (dbg) Done: /tmp/minikube-v1.22.0.1183461980.exe start -p running-upgrade-922074 --memory=2200 --vm-driver=kvm2 --container-runtime=containerd: (2m43.740790072s)\n"} +{"Time":"2023-05-31T19:31:53.689684759Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:142: (dbg) Run: out/minikube-linux-amd64 start -p running-upgrade-922074 --memory=2200 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:31:58.87663402Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:255: (dbg) Done: out/minikube-linux-amd64 start -p kubernetes-upgrade-827996 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd: (1m28.627407808s)\n"} +{"Time":"2023-05-31T19:31:58.876664406Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:260: (dbg) Run: kubectl --context kubernetes-upgrade-827996 version --output=json\n"} +{"Time":"2023-05-31T19:31:58.948658951Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:279: Attempting to downgrade Kubernetes (should fail)\n"} +{"Time":"2023-05-31T19:31:58.94869101Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:281: (dbg) Run: out/minikube-linux-amd64 start -p kubernetes-upgrade-827996 --memory=2200 --kubernetes-version=v1.16.0 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:31:59.046762733Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:281: (dbg) Non-zero exit: out/minikube-linux-amd64 start -p kubernetes-upgrade-827996 --memory=2200 --kubernetes-version=v1.16.0 --driver=kvm2 --container-runtime=containerd: exit status 106 (97.940061ms)\n"} +{"Time":"2023-05-31T19:31:59.046797186Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T19:31:59.046803102Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:31:59.046806966Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* [kubernetes-upgrade-827996] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T19:31:59.046810737Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T19:31:59.046814542Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T19:31:59.046817998Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T19:31:59.04682122Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T19:31:59.046823856Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T19:31:59.046826072Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T19:31:59.046828064Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T19:31:59.04683089Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T19:31:59.046834006Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T19:31:59.046846947Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:31:59.046851002Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:31:59.046854517Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tX Exiting due to K8S_DOWNGRADE_UNSUPPORTED: Unable to safely downgrade existing Kubernetes v1.27.2 cluster to v1.16.0\n"} +{"Time":"2023-05-31T19:31:59.046858372Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Suggestion: \n"} +{"Time":"2023-05-31T19:31:59.046862009Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T19:31:59.046865446Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t 1) Recreate the cluster with Kubernetes 1.16.0, by running:\n"} +{"Time":"2023-05-31T19:31:59.046868774Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T19:31:59.046872086Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube delete -p kubernetes-upgrade-827996\n"} +{"Time":"2023-05-31T19:31:59.046876122Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube start -p kubernetes-upgrade-827996 --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T19:31:59.046879362Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T19:31:59.046882429Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t 2) Create a second cluster with Kubernetes 1.16.0, by running:\n"} +{"Time":"2023-05-31T19:31:59.046885694Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T19:31:59.046889092Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube start -p kubernetes-upgrade-8279962 --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T19:31:59.046897116Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T19:31:59.046900349Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t 3) Use the existing cluster at version Kubernetes 1.27.2, by running:\n"} +{"Time":"2023-05-31T19:31:59.046903176Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T19:31:59.046906319Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t minikube start -p kubernetes-upgrade-827996 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:31:59.046914031Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t \n"} +{"Time":"2023-05-31T19:31:59.046919766Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T19:31:59.046923212Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:31:59.046926384Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:285: Attempting restart after unsuccessful downgrade\n"} +{"Time":"2023-05-31T19:31:59.046930266Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:287: (dbg) Run: out/minikube-linux-amd64 start -p kubernetes-upgrade-827996 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:32:15.14876521Z","Action":"output","Test":"TestKubernetesUpgrade","Output":"E0531 19:32:15.148692 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:32:24.405330322Z","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" no_kubernetes_test.go:136: (dbg) Done: out/minikube-linux-amd64 start -p NoKubernetes-651857 --no-kubernetes --driver=kvm2 --container-runtime=containerd: (54.544926356s)\n"} +{"Time":"2023-05-31T19:32:24.405361334Z","Action":"run","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning"} +{"Time":"2023-05-31T19:32:24.405366215Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":"=== RUN TestNoKubernetes/serial/VerifyK8sNotRunning\n"} +{"Time":"2023-05-31T19:32:24.405632504Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" no_kubernetes_test.go:147: (dbg) Run: out/minikube-linux-amd64 ssh -p NoKubernetes-651857 \"sudo systemctl is-active --quiet service kubelet\"\n"} +{"Time":"2023-05-31T19:32:24.638564895Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" no_kubernetes_test.go:147: (dbg) Non-zero exit: out/minikube-linux-amd64 ssh -p NoKubernetes-651857 \"sudo systemctl is-active --quiet service kubelet\": exit status 1 (233.040053ms)\n"} +{"Time":"2023-05-31T19:32:24.638610918Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \n"} +{"Time":"2023-05-31T19:32:24.638616343Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:32:24.638620402Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \tssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:32:24.638623405Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \n"} +{"Time":"2023-05-31T19:32:24.63862564Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:32:24.638631172Z","Action":"run","Test":"TestNoKubernetes/serial/ProfileList"} +{"Time":"2023-05-31T19:32:24.638633335Z","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":"=== RUN TestNoKubernetes/serial/ProfileList\n"} +{"Time":"2023-05-31T19:32:24.638635536Z","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" no_kubernetes_test.go:169: (dbg) Run: out/minikube-linux-amd64 profile list\n"} +{"Time":"2023-05-31T19:32:25.695244281Z","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" no_kubernetes_test.go:169: (dbg) Done: out/minikube-linux-amd64 profile list: (1.056298831s)\n"} +{"Time":"2023-05-31T19:32:25.695273724Z","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" no_kubernetes_test.go:179: (dbg) Run: out/minikube-linux-amd64 profile list --output=json\n"} +{"Time":"2023-05-31T19:32:26.451723571Z","Action":"run","Test":"TestNoKubernetes/serial/Stop"} +{"Time":"2023-05-31T19:32:26.451747852Z","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":"=== RUN TestNoKubernetes/serial/Stop\n"} +{"Time":"2023-05-31T19:32:26.451754395Z","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":" no_kubernetes_test.go:158: (dbg) Run: out/minikube-linux-amd64 stop -p NoKubernetes-651857\n"} +{"Time":"2023-05-31T19:32:28.645999168Z","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":" no_kubernetes_test.go:158: (dbg) Done: out/minikube-linux-amd64 stop -p NoKubernetes-651857: (2.194339498s)\n"} +{"Time":"2023-05-31T19:32:28.646032115Z","Action":"run","Test":"TestNoKubernetes/serial/StartNoArgs"} +{"Time":"2023-05-31T19:32:28.646037033Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":"=== RUN TestNoKubernetes/serial/StartNoArgs\n"} +{"Time":"2023-05-31T19:32:28.646043215Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" no_kubernetes_test.go:191: (dbg) Run: out/minikube-linux-amd64 start -p NoKubernetes-651857 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:32:52.550480527Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:287: (dbg) Done: out/minikube-linux-amd64 start -p kubernetes-upgrade-827996 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd: (53.503365151s)\n"} +{"Time":"2023-05-31T19:32:52.550512947Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:175: Cleaning up \"kubernetes-upgrade-827996\" profile ...\n"} +{"Time":"2023-05-31T19:32:52.550517566Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p kubernetes-upgrade-827996\n"} +{"Time":"2023-05-31T19:32:53.82696523Z","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p kubernetes-upgrade-827996: (1.276589127s)\n"} +{"Time":"2023-05-31T19:32:53.827030361Z","Action":"output","Test":"TestKubernetesUpgrade","Output":"--- PASS: TestKubernetesUpgrade (224.70s)\n"} +{"Time":"2023-05-31T19:32:53.827036958Z","Action":"pass","Test":"TestKubernetesUpgrade","Elapsed":224.7} +{"Time":"2023-05-31T19:32:53.827044403Z","Action":"cont","Test":"TestCertExpiration"} +{"Time":"2023-05-31T19:32:53.827048104Z","Action":"output","Test":"TestCertExpiration","Output":"=== CONT TestCertExpiration\n"} +{"Time":"2023-05-31T19:32:53.827054214Z","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:123: (dbg) Run: out/minikube-linux-amd64 start -p cert-expiration-913900 --memory=2048 --cert-expiration=3m --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:32:53.828070325Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" no_kubernetes_test.go:191: (dbg) Done: out/minikube-linux-amd64 start -p NoKubernetes-651857 --driver=kvm2 --container-runtime=containerd: (25.181753533s)\n"} +{"Time":"2023-05-31T19:32:53.828092888Z","Action":"run","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond"} +{"Time":"2023-05-31T19:32:53.828097682Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":"=== RUN TestNoKubernetes/serial/VerifyK8sNotRunningSecond\n"} +{"Time":"2023-05-31T19:32:53.828102266Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" no_kubernetes_test.go:147: (dbg) Run: out/minikube-linux-amd64 ssh -p NoKubernetes-651857 \"sudo systemctl is-active --quiet service kubelet\"\n"} +{"Time":"2023-05-31T19:32:54.054165066Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" no_kubernetes_test.go:147: (dbg) Non-zero exit: out/minikube-linux-amd64 ssh -p NoKubernetes-651857 \"sudo systemctl is-active --quiet service kubelet\": exit status 1 (226.186359ms)\n"} +{"Time":"2023-05-31T19:32:54.054203045Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \n"} +{"Time":"2023-05-31T19:32:54.054209395Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:32:54.05421288Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \tssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:32:54.05421663Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \n"} +{"Time":"2023-05-31T19:32:54.054220188Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:32:54.054229484Z","Action":"output","Test":"TestNoKubernetes","Output":" helpers_test.go:175: Cleaning up \"NoKubernetes-651857\" profile ...\n"} +{"Time":"2023-05-31T19:32:54.054233307Z","Action":"output","Test":"TestNoKubernetes","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p NoKubernetes-651857\n"} +{"Time":"2023-05-31T19:32:55.075671472Z","Action":"output","Test":"TestNoKubernetes","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p NoKubernetes-651857: (1.021392042s)\n"} +{"Time":"2023-05-31T19:32:55.075706382Z","Action":"output","Test":"TestNoKubernetes","Output":"--- PASS: TestNoKubernetes (225.95s)\n"} +{"Time":"2023-05-31T19:32:55.075712229Z","Action":"output","Test":"TestNoKubernetes/serial","Output":" --- PASS: TestNoKubernetes/serial (224.93s)\n"} +{"Time":"2023-05-31T19:32:55.075717813Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" --- PASS: TestNoKubernetes/serial/StartNoK8sWithVersion (0.07s)\n"} +{"Time":"2023-05-31T19:32:55.075721701Z","Action":"pass","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Elapsed":0.07} +{"Time":"2023-05-31T19:32:55.075728526Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" --- PASS: TestNoKubernetes/serial/StartWithK8s (105.65s)\n"} +{"Time":"2023-05-31T19:32:55.075732438Z","Action":"pass","Test":"TestNoKubernetes/serial/StartWithK8s","Elapsed":105.65} +{"Time":"2023-05-31T19:32:55.075735867Z","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" --- PASS: TestNoKubernetes/serial/StartWithStopK8s (35.01s)\n"} +{"Time":"2023-05-31T19:32:55.075739546Z","Action":"pass","Test":"TestNoKubernetes/serial/StartWithStopK8s","Elapsed":35.01} +{"Time":"2023-05-31T19:32:55.075742595Z","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" --- PASS: TestNoKubernetes/serial/Start (54.55s)\n"} +{"Time":"2023-05-31T19:32:55.075746354Z","Action":"pass","Test":"TestNoKubernetes/serial/Start","Elapsed":54.55} +{"Time":"2023-05-31T19:32:55.075750601Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" --- PASS: TestNoKubernetes/serial/VerifyK8sNotRunning (0.23s)\n"} +{"Time":"2023-05-31T19:32:55.075754321Z","Action":"pass","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Elapsed":0.23} +{"Time":"2023-05-31T19:32:55.075757603Z","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" --- PASS: TestNoKubernetes/serial/ProfileList (1.81s)\n"} +{"Time":"2023-05-31T19:32:55.075761043Z","Action":"pass","Test":"TestNoKubernetes/serial/ProfileList","Elapsed":1.81} +{"Time":"2023-05-31T19:32:55.075764161Z","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":" --- PASS: TestNoKubernetes/serial/Stop (2.19s)\n"} +{"Time":"2023-05-31T19:32:55.075767821Z","Action":"pass","Test":"TestNoKubernetes/serial/Stop","Elapsed":2.19} +{"Time":"2023-05-31T19:32:55.075771014Z","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" --- PASS: TestNoKubernetes/serial/StartNoArgs (25.18s)\n"} +{"Time":"2023-05-31T19:32:55.075774497Z","Action":"pass","Test":"TestNoKubernetes/serial/StartNoArgs","Elapsed":25.18} +{"Time":"2023-05-31T19:32:55.075777658Z","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" --- PASS: TestNoKubernetes/serial/VerifyK8sNotRunningSecond (0.23s)\n"} +{"Time":"2023-05-31T19:32:55.075781342Z","Action":"pass","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Elapsed":0.23} +{"Time":"2023-05-31T19:32:55.075790211Z","Action":"pass","Test":"TestNoKubernetes/serial","Elapsed":224.93} +{"Time":"2023-05-31T19:32:55.075792853Z","Action":"pass","Test":"TestNoKubernetes","Elapsed":225.95} +{"Time":"2023-05-31T19:32:55.075795488Z","Action":"cont","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T19:32:55.075798373Z","Action":"output","Test":"TestForceSystemdFlag","Output":"=== CONT TestForceSystemdFlag\n"} +{"Time":"2023-05-31T19:32:55.075804Z","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:85: (dbg) Run: out/minikube-linux-amd64 start -p force-systemd-flag-657121 --memory=2048 --force-systemd --alsologtostderr -v=5 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:32:59.267291615Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:142: (dbg) Done: out/minikube-linux-amd64 start -p running-upgrade-922074 --memory=2200 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd: (1m5.577578906s)\n"} +{"Time":"2023-05-31T19:32:59.278506811Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:175: Cleaning up \"running-upgrade-922074\" profile ...\n"} +{"Time":"2023-05-31T19:32:59.278529985Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p running-upgrade-922074\n"} +{"Time":"2023-05-31T19:32:59.387297427Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Done: /tmp/minikube-v1.22.0.4215360760.exe start -p stopped-upgrade-814323 --memory=2200 --vm-driver=kvm2 --container-runtime=containerd: (1m37.200121633s)\n"} +{"Time":"2023-05-31T19:32:59.401688588Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:204: (dbg) Run: /tmp/minikube-v1.22.0.4215360760.exe -p stopped-upgrade-814323 stop\n"} +{"Time":"2023-05-31T19:33:00.829071548Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p running-upgrade-922074: (1.55050357s)\n"} +{"Time":"2023-05-31T19:33:00.829096488Z","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"--- PASS: TestRunningBinaryUpgrade (231.70s)\n"} +{"Time":"2023-05-31T19:33:00.829099935Z","Action":"pass","Test":"TestRunningBinaryUpgrade","Elapsed":231.7} +{"Time":"2023-05-31T19:33:00.829104813Z","Action":"cont","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T19:33:00.829114644Z","Action":"output","Test":"TestForceSystemdEnv","Output":"=== CONT TestForceSystemdEnv\n"} +{"Time":"2023-05-31T19:33:00.82913677Z","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:149: (dbg) Run: out/minikube-linux-amd64 start -p force-systemd-env-056788 --memory=2048 --alsologtostderr -v=5 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:33:03.73421418Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:204: (dbg) Done: /tmp/minikube-v1.22.0.4215360760.exe -p stopped-upgrade-814323 stop: (4.332483701s)\n"} +{"Time":"2023-05-31T19:33:03.734246175Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:210: (dbg) Run: out/minikube-linux-amd64 start -p stopped-upgrade-814323 --memory=2200 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:33:23.601776767Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"E0531 19:33:23.601703 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:33:49.023697832Z","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:123: (dbg) Done: out/minikube-linux-amd64 start -p cert-expiration-913900 --memory=2048 --cert-expiration=3m --driver=kvm2 --container-runtime=containerd: (55.196629768s)\n"} +{"Time":"2023-05-31T19:34:13.713103049Z","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:85: (dbg) Done: out/minikube-linux-amd64 start -p force-systemd-flag-657121 --memory=2048 --force-systemd --alsologtostderr -v=5 --driver=kvm2 --container-runtime=containerd: (1m18.637242215s)\n"} +{"Time":"2023-05-31T19:34:13.713136279Z","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:115: (dbg) Run: out/minikube-linux-amd64 -p force-systemd-flag-657121 ssh \"cat /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:34:13.924688871Z","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:175: Cleaning up \"force-systemd-flag-657121\" profile ...\n"} +{"Time":"2023-05-31T19:34:13.924715503Z","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p force-systemd-flag-657121\n"} +{"Time":"2023-05-31T19:34:14.930687079Z","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p force-systemd-flag-657121: (1.005909989s)\n"} +{"Time":"2023-05-31T19:34:14.930722185Z","Action":"output","Test":"TestForceSystemdFlag","Output":"--- PASS: TestForceSystemdFlag (79.85s)\n"} +{"Time":"2023-05-31T19:34:14.930745067Z","Action":"pass","Test":"TestForceSystemdFlag","Elapsed":79.85} +{"Time":"2023-05-31T19:34:14.930758134Z","Action":"cont","Test":"TestCertOptions"} +{"Time":"2023-05-31T19:34:14.930763117Z","Action":"output","Test":"TestCertOptions","Output":"=== CONT TestCertOptions\n"} +{"Time":"2023-05-31T19:34:14.930771203Z","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:49: (dbg) Run: out/minikube-linux-amd64 start -p cert-options-660610 --memory=2048 --apiserver-ips=127.0.0.1 --apiserver-ips=192.168.15.15 --apiserver-names=localhost --apiserver-names=www.google.com --apiserver-port=8555 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:34:41.056116235Z","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:149: (dbg) Done: out/minikube-linux-amd64 start -p force-systemd-env-056788 --memory=2048 --alsologtostderr -v=5 --driver=kvm2 --container-runtime=containerd: (1m40.22684149s)\n"} +{"Time":"2023-05-31T19:34:41.056148845Z","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:115: (dbg) Run: out/minikube-linux-amd64 -p force-systemd-env-056788 ssh \"cat /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T19:34:41.271097629Z","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:175: Cleaning up \"force-systemd-env-056788\" profile ...\n"} +{"Time":"2023-05-31T19:34:41.271129982Z","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p force-systemd-env-056788\n"} +{"Time":"2023-05-31T19:34:42.712779049Z","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p force-systemd-env-056788: (1.441599797s)\n"} +{"Time":"2023-05-31T19:34:42.712846218Z","Action":"output","Test":"TestForceSystemdEnv","Output":"--- PASS: TestForceSystemdEnv (101.88s)\n"} +{"Time":"2023-05-31T19:34:42.712854128Z","Action":"pass","Test":"TestForceSystemdEnv","Elapsed":101.88} +{"Time":"2023-05-31T19:34:42.712860963Z","Action":"cont","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T19:34:42.712864651Z","Action":"output","Test":"TestNetworkPlugins","Output":"=== CONT TestNetworkPlugins\n"} +{"Time":"2023-05-31T19:34:42.71287404Z","Action":"run","Test":"TestNetworkPlugins/group"} +{"Time":"2023-05-31T19:34:42.712876944Z","Action":"output","Test":"TestNetworkPlugins/group","Output":"=== RUN TestNetworkPlugins/group\n"} +{"Time":"2023-05-31T19:34:42.712880131Z","Action":"run","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T19:34:42.712883364Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== RUN TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T19:34:42.712888883Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== PAUSE TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T19:34:42.71289183Z","Action":"pause","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T19:34:42.712895376Z","Action":"run","Test":"TestNetworkPlugins/group/kubenet"} +{"Time":"2023-05-31T19:34:42.712898265Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"=== RUN TestNetworkPlugins/group/kubenet\n"} +{"Time":"2023-05-31T19:34:42.71290285Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" net_test.go:92: Skipping the test as containerd container runtimes requires CNI\n"} +{"Time":"2023-05-31T19:34:46.360894455Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" panic.go:522: \n"} +{"Time":"2023-05-31T19:34:46.36093215Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ----------------------- debugLogs start: kubenet-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:34:46.360938215Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:34:46.360943825Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.360947001Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.360949936Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.360953012Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T19:34:46.36096335Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.360966557Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36096936Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.360974765Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T19:34:46.36097796Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.360980472Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36098342Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36098607Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T19:34:46.360989017Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.360994084Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.360996915Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361000069Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T19:34:46.361003109Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.361006173Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361008753Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361011569Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:34:46.361014999Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.361017994Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361021101Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361024218Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:34:46.361027462Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.361030839Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361033919Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361037077Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:34:46.361040749Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.361044571Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361213674Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361225329Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:34:46.361230099Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.361233434Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361236392Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361239951Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:34:46.361243604Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.361246716Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361250239Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361255783Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:34:46.361259669Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361263874Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361268414Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361271503Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361274931Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:34:46.361278795Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361294588Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361298093Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361300973Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361304347Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:34:46.361308291Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361312259Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361315911Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361318988Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361322352Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:34:46.361334255Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.361337968Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361340845Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361344101Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:34:46.3613515Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361355587Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.36136145Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361364682Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361368132Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:34:46.361374997Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361378451Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.36138193Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361385002Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361388135Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:34:46.361391742Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361395244Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361398248Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361401765Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:34:46.361405696Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361411677Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361415068Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361422644Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:34:46.361426571Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361429862Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361433156Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361443308Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:34:46.361447267Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361450441Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361453677Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361456265Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:34:46.361458816Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361461319Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361463771Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361466618Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:34:46.361470314Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361474571Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361477558Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361480555Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:34:46.361483676Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361486768Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361490129Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361493478Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:34:46.361496941Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361500238Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361503417Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361506588Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:34:46.36151055Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.3615152Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361518796Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361522019Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361525131Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:34:46.361531923Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361536074Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361539263Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36154225Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361545733Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:34:46.361549423Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361552926Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361556349Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361559528Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361562697Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:34:46.361566688Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361570395Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361573925Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361577234Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361580382Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:34:46.361583973Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361587902Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361591032Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361593717Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361597327Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:34:46.361600938Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361603991Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361607089Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36161049Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:34:46.361613932Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361620104Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361623365Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361626511Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:34:46.36163006Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:46.361633591Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361636557Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361639798Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:34:46.361643699Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361647214Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361650625Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361655519Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361658851Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:34:46.361662664Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361666454Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361669827Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361673147Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361679044Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:34:46.361683394Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361688058Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361696504Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361699447Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361702697Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:34:46.361706497Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361710147Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361713929Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361716885Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361723811Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:34:46.361727493Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361731214Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361734635Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361737675Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361740823Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:34:46.36174384Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:34:46.36174727Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusters:\n"} +{"Time":"2023-05-31T19:34:46.361750652Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:34:46.361756046Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:34:46.361759461Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extensions:\n"} +{"Time":"2023-05-31T19:34:46.361762877Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - extension:\n"} +{"Time":"2023-05-31T19:34:46.361766629Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" last-update: Wed, 31 May 2023 19:33:47 UTC\n"} +{"Time":"2023-05-31T19:34:46.36177Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:34:46.36177343Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:34:46.361779367Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:34:46.361782752Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" server: https://192.168.39.167:8443\n"} +{"Time":"2023-05-31T19:34:46.361786517Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:46.361789805Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" contexts:\n"} +{"Time":"2023-05-31T19:34:46.36179278Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - context:\n"} +{"Time":"2023-05-31T19:34:46.361796136Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" cluster: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:46.361799363Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" extensions:\n"} +{"Time":"2023-05-31T19:34:46.361802899Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - extension:\n"} +{"Time":"2023-05-31T19:34:46.361806439Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" last-update: Wed, 31 May 2023 19:33:47 UTC\n"} +{"Time":"2023-05-31T19:34:46.361814371Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:34:46.361818027Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:34:46.361821436Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:34:46.361824944Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:34:46.361828419Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:46.361831716Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:46.361835405Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:34:46.361839094Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:34:46.361842444Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:34:46.361845995Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" users:\n"} +{"Time":"2023-05-31T19:34:46.361849447Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" - name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:46.361852671Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" user:\n"} +{"Time":"2023-05-31T19:34:46.361856586Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/cert-expiration-913900/client.crt\n"} +{"Time":"2023-05-31T19:34:46.361861042Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/cert-expiration-913900/client.key\n"} +{"Time":"2023-05-31T19:34:46.361864833Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361867961Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36187116Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:34:46.361874903Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.361878461Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361881407Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361885107Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:34:46.361888636Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361892268Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361896276Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36189924Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361902275Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:34:46.361906451Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361912453Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361916329Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361919385Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36192268Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:34:46.361926413Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361929987Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361933303Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361936323Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36194345Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:34:46.361949534Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361953103Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361956497Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361959836Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361963043Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:34:46.361966782Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361973427Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361977126Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361980337Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361983491Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:34:46.361987163Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.361991033Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.361994399Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.361997519Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362001024Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:34:46.362004665Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362008524Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362016524Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362022634Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362025896Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:34:46.362029463Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362033472Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362036726Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362039654Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362045029Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:34:46.362048674Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362052392Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.36205586Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362058726Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362062123Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:34:46.362065988Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362069343Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362072726Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362075623Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362079063Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:34:46.362083016Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.3620865Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362089476Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362092741Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.36209966Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:34:46.362103844Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362107413Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362114693Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362117916Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362121013Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:34:46.362125345Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362129118Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362132443Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362135982Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362139282Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:34:46.362142835Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362146695Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362149907Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362153015Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362156553Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:34:46.36216007Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.36216389Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362167242Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362170185Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362173436Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:34:46.362177327Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362180979Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362184665Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362187798Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362190902Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:34:46.362194676Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362198402Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.362201612Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362204863Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362208038Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:34:46.36221171Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * Profile \"kubenet-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:46.362215586Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-509041\"\n"} +{"Time":"2023-05-31T19:34:46.36221876Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T19:34:46.362223262Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ----------------------- debugLogs end: kubenet-509041 [took: 3.647783085s] --------------------------------\n"} +{"Time":"2023-05-31T19:34:46.362230454Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:175: Cleaning up \"kubenet-509041\" profile ...\n"} +{"Time":"2023-05-31T19:34:46.362234181Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p kubenet-509041\n"} +{"Time":"2023-05-31T19:34:46.518122855Z","Action":"run","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T19:34:46.518150573Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== RUN TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T19:34:46.518159154Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== PAUSE TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T19:34:46.518162Z","Action":"pause","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T19:34:46.5181662Z","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T19:34:46.518169384Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T19:34:46.518179442Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== PAUSE TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T19:34:46.518182243Z","Action":"pause","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T19:34:46.51818682Z","Action":"run","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T19:34:46.518189513Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== RUN TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T19:34:46.51819311Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== PAUSE TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T19:34:46.518195512Z","Action":"pause","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T19:34:46.518198417Z","Action":"run","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T19:34:46.518201069Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== RUN TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T19:34:46.518205114Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== PAUSE TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T19:34:46.518207773Z","Action":"pause","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T19:34:46.518210651Z","Action":"run","Test":"TestNetworkPlugins/group/false"} +{"Time":"2023-05-31T19:34:46.518216614Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"=== RUN TestNetworkPlugins/group/false\n"} +{"Time":"2023-05-31T19:34:46.518328455Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" net_test.go:230: (dbg) Run: out/minikube-linux-amd64 start -p false-509041 --memory=2048 --alsologtostderr --cni=false --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:34:46.636501948Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" net_test.go:230: (dbg) Non-zero exit: out/minikube-linux-amd64 start -p false-509041 --memory=2048 --alsologtostderr --cni=false --driver=kvm2 --container-runtime=containerd: exit status 14 (118.034535ms)\n"} +{"Time":"2023-05-31T19:34:46.636533669Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:46.636538597Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:34:46.636543118Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t* [false-509041] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T19:34:46.636564197Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T19:34:46.636568593Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T19:34:46.636572689Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T19:34:46.636576732Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T19:34:46.63658026Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T19:34:46.636583819Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T19:34:46.636587804Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t* Using the kvm2 driver based on user configuration\n"} +{"Time":"2023-05-31T19:34:46.636591264Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t\n"} +{"Time":"2023-05-31T19:34:46.636600825Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \t\n"} +{"Time":"2023-05-31T19:34:46.636612441Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:46.636616429Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:34:46.636619796Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:34:46.636622628Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.564130 44049 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T19:34:46.636627834Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.564350 44049 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T19:34:46.636632244Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.564381 44049 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T19:34:46.636639079Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.564396 44049 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T19:34:46.636644078Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.564585 44049 root.go:336] Updating PATH: /home/jenkins/minikube-integration/16569-10887/.minikube/bin\n"} +{"Time":"2023-05-31T19:34:46.636647788Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.565341 44049 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T19:34:46.636651631Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.566658 44049 start.go:127] hostinfo: {\"hostname\":\"ubuntu-20-agent-12\",\"uptime\":4640,\"bootTime\":1685557047,\"procs\":236,\"os\":\"linux\",\"platform\":\"ubuntu\",\"platformFamily\":\"debian\",\"platformVersion\":\"20.04\",\"kernelVersion\":\"5.15.0-1035-gcp\",\"kernelArch\":\"x86_64\",\"virtualizationSystem\":\"kvm\",\"virtualizationRole\":\"guest\",\"hostId\":\"591c9f12-2938-3743-e2bf-c56a050d43d1\"}\n"} +{"Time":"2023-05-31T19:34:46.636658796Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.566765 44049 start.go:137] virtualization: kvm guest\n"} +{"Time":"2023-05-31T19:34:46.636662481Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.569494 44049 out.go:177] * [false-509041] minikube v1.30.1 on Ubuntu 20.04 (kvm/amd64)\n"} +{"Time":"2023-05-31T19:34:46.636666481Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.571141 44049 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T19:34:46.636670316Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.572773 44049 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T19:34:46.636673464Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.571208 44049 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T19:34:46.636676968Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.574760 44049 out.go:177] - KUBECONFIG=/home/jenkins/minikube-integration/16569-10887/kubeconfig\n"} +{"Time":"2023-05-31T19:34:46.636680556Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.576266 44049 out.go:177] - MINIKUBE_HOME=/home/jenkins/minikube-integration/16569-10887/.minikube\n"} +{"Time":"2023-05-31T19:34:46.636685955Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.577778 44049 out.go:177] - MINIKUBE_BIN=out/minikube-linux-amd64\n"} +{"Time":"2023-05-31T19:34:46.636689118Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.579441 44049 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T19:34:46.636692687Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.581656 44049 config.go:182] Loaded profile config \"cert-expiration-913900\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T19:34:46.636696746Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.581821 44049 config.go:182] Loaded profile config \"cert-options-660610\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T19:34:46.636700402Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.581965 44049 config.go:182] Loaded profile config \"stopped-upgrade-814323\": Driver=kvm2, ContainerRuntime=containerd, KubernetesVersion=v1.21.2\n"} +{"Time":"2023-05-31T19:34:46.636703728Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.582114 44049 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T19:34:46.636707167Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.624245 44049 out.go:177] * Using the kvm2 driver based on user configuration\n"} +{"Time":"2023-05-31T19:34:46.63671647Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.625775 44049 start.go:297] selected driver: kvm2\n"} +{"Time":"2023-05-31T19:34:46.636720111Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.625791 44049 start.go:875] validating driver \"kvm2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:34:46.636724248Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.625804 44049 start.go:886] status for kvm2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T19:34:46.636728227Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.628247 44049 out.go:177] \n"} +{"Time":"2023-05-31T19:34:46.636731416Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tW0531 19:34:46.629794 44049 out.go:239] X Exiting due to MK_USAGE: The \"containerd\" container runtime requires CNI\n"} +{"Time":"2023-05-31T19:34:46.636734968Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tX Exiting due to MK_USAGE: The \"containerd\" container runtime requires CNI\n"} +{"Time":"2023-05-31T19:34:46.636738598Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tI0531 19:34:46.631363 44049 out.go:177] \n"} +{"Time":"2023-05-31T19:34:46.63674181Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:46.636744681Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:34:51.503113639Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" net_test.go:86: \n"} +{"Time":"2023-05-31T19:34:51.503137812Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ----------------------- debugLogs start: false-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:34:51.503141346Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:34:51.503156518Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503159711Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503161841Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503164063Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T19:34:51.503167499Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503169612Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503171668Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50317352Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T19:34:51.503176212Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503178683Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503180477Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503182418Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T19:34:51.503185154Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503187146Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503188918Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503190721Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T19:34:51.50319751Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.50319958Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503201466Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503206528Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:34:51.503208728Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503210555Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503212304Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503214087Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:34:51.503216475Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503218669Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503220565Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503224625Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:34:51.503228696Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503231645Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503233506Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.5032354Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:34:51.503237798Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503239607Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503241298Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503243105Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:34:51.503245162Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503247027Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503248761Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503250635Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:34:51.503252646Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503254927Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503256867Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503258546Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503260354Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:34:51.503262335Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503265441Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503268726Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503271451Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503277042Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:34:51.503280307Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503286359Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503289598Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50329254Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503295963Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:34:51.503300414Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503303095Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503304861Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503306637Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:34:51.503308781Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503311293Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.50331459Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503316388Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503318254Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:34:51.503320358Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503322429Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503324396Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503326051Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503327908Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:34:51.503329921Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503331832Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503333541Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503335368Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:34:51.503337317Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503339158Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503340833Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503342668Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:34:51.503344613Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503346491Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503348216Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503350113Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:34:51.503352203Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503354169Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503356011Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503357886Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:34:51.503360425Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503363403Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503366235Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503369321Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:34:51.503377634Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503380634Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503383382Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503386417Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:34:51.503389671Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503392766Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50339582Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503402723Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:34:51.503405907Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503408515Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503411261Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503414271Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:34:51.503417561Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503424567Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503427766Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50343256Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503434949Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:34:51.503437002Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503439074Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503442315Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503444079Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503445878Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:34:51.503448427Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503451719Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.50345495Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503457832Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503460587Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:34:51.503463987Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503467593Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503470638Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503473707Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503476725Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:34:51.503479984Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503483549Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503486834Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503489704Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503492644Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:34:51.503496201Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503499165Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503501964Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503504961Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:34:51.503507506Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503513085Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503514865Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50351665Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:34:51.503523046Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:51.503525086Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503526804Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50352862Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:34:51.503530595Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503532674Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503535291Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503537816Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503540746Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:34:51.503544197Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503547493Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503550738Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503553584Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503556718Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:34:51.503560139Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503563563Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503570582Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503573506Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50357654Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:34:51.50358463Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.50358816Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503591585Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503594552Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503597676Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:34:51.503601183Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503608365Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503610424Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503612135Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503613986Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:34:51.503616148Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:34:51.503618305Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusters:\n"} +{"Time":"2023-05-31T19:34:51.503624405Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:34:51.50362779Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:34:51.50363105Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" extensions:\n"} +{"Time":"2023-05-31T19:34:51.503634016Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - extension:\n"} +{"Time":"2023-05-31T19:34:51.503637032Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" last-update: Wed, 31 May 2023 19:33:47 UTC\n"} +{"Time":"2023-05-31T19:34:51.503640648Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:34:51.503643673Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:34:51.503646453Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:34:51.503649592Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" server: https://192.168.39.167:8443\n"} +{"Time":"2023-05-31T19:34:51.503653276Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:51.503656389Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" contexts:\n"} +{"Time":"2023-05-31T19:34:51.50365944Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - context:\n"} +{"Time":"2023-05-31T19:34:51.50366248Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" cluster: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:51.503665747Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" extensions:\n"} +{"Time":"2023-05-31T19:34:51.503668829Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - extension:\n"} +{"Time":"2023-05-31T19:34:51.503672001Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" last-update: Wed, 31 May 2023 19:33:47 UTC\n"} +{"Time":"2023-05-31T19:34:51.503675128Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:34:51.503678298Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:34:51.503681268Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:34:51.503683986Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:34:51.503687093Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" user: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:51.503690588Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:51.5036938Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:34:51.503696989Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:34:51.503704159Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:34:51.503707093Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" users:\n"} +{"Time":"2023-05-31T19:34:51.503709419Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" - name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:51.503711254Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" user:\n"} +{"Time":"2023-05-31T19:34:51.503713629Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/cert-expiration-913900/client.crt\n"} +{"Time":"2023-05-31T19:34:51.503715898Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/cert-expiration-913900/client.key\n"} +{"Time":"2023-05-31T19:34:51.503718764Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503721641Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503727125Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:34:51.5037306Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-509041\n"} +{"Time":"2023-05-31T19:34:51.503733739Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503736843Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503740031Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:34:51.50374337Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503746936Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503753133Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50375608Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503758881Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:34:51.503762554Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503766237Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.50376968Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503772763Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503775741Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:34:51.503780609Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503784116Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503787203Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503790233Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503793159Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:34:51.50379668Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503800185Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.50380608Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503809113Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503811995Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:34:51.503815358Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503818938Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503822379Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503825639Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.50382885Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:34:51.503832312Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.50383548Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503838452Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503841265Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503844652Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:34:51.503848078Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503851555Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503854914Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503858302Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503861532Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:34:51.503866445Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503870405Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503873671Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503876669Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503879739Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:34:51.503883112Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503886434Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503889517Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503892606Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503895918Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:34:51.503899555Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503903043Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503906366Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503909339Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503912421Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:34:51.503915948Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503919149Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503922549Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503928549Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503932303Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:34:51.503935782Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503939749Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503942902Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503945771Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503949086Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:34:51.503954105Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503958154Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503961359Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503964008Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503966905Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:34:51.503970202Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503973748Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.503976668Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503988223Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.503991375Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:34:51.503994683Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.503998118Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.504004456Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.504007555Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.504014545Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:34:51.504018283Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.504021873Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.504025123Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.504027893Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.504030808Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:34:51.504034191Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.504041509Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.504046957Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.504049874Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.504052988Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:34:51.504057938Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * Profile \"false-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:51.504061493Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-509041\"\n"} +{"Time":"2023-05-31T19:34:51.50406455Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T19:34:51.504067738Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ----------------------- debugLogs end: false-509041 [took: 4.866370524s] --------------------------------\n"} +{"Time":"2023-05-31T19:34:51.504071311Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:175: Cleaning up \"false-509041\" profile ...\n"} +{"Time":"2023-05-31T19:34:51.504074652Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p false-509041\n"} +{"Time":"2023-05-31T19:34:51.903167462Z","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T19:34:51.903194413Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== RUN TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T19:34:51.90320044Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== PAUSE TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T19:34:51.903203332Z","Action":"pause","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T19:34:51.90320897Z","Action":"run","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T19:34:51.903213006Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== RUN TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T19:34:51.903217063Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== PAUSE TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T19:34:51.903219693Z","Action":"pause","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T19:34:51.903222706Z","Action":"run","Test":"TestNetworkPlugins/group/cilium"} +{"Time":"2023-05-31T19:34:51.903224666Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":"=== RUN TestNetworkPlugins/group/cilium\n"} +{"Time":"2023-05-31T19:34:51.903233273Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" net_test.go:101: Skipping the test as it's interfering with other tests and is outdated\n"} +{"Time":"2023-05-31T19:34:54.833484295Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" panic.go:522: \n"} +{"Time":"2023-05-31T19:34:54.83351052Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" ----------------------- debugLogs start: cilium-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:34:54.833524675Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:34:54.833530786Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833533329Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833535372Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833537781Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T19:34:54.833540042Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833542522Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833544219Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833546169Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T19:34:54.833548323Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833550191Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833552052Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833554002Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T19:34:54.833556187Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833558009Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833559673Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83356148Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T19:34:54.833564349Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833567632Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833569499Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833571328Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:34:54.833575359Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833579138Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833580865Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833582626Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:34:54.833584712Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833586547Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833588234Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833590334Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:34:54.83359243Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833594233Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833595908Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833597724Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:34:54.83360079Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833602643Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833604358Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833606196Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:34:54.833608188Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833610006Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833611654Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833613431Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:34:54.833615536Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.833617724Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833620579Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833622534Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833624356Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:34:54.833626511Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.833628736Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833630778Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833632696Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833634563Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:34:54.833641468Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.833643794Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833645791Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833647596Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833649516Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:34:54.833651712Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833654352Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833659445Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833662332Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:34:54.833665566Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.833669105Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833672257Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833674857Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833677677Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:34:54.83368035Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.833683548Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.83368628Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833690021Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833692774Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:34:54.83369577Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.833699045Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833701405Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833703843Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:34:54.833706443Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.83370884Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833711403Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833714258Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:34:54.833717406Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.833720052Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833722515Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83372499Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:34:54.833727722Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.83373015Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833732564Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83373499Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:34:54.833741147Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.833744314Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833746941Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833750069Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:34:54.833753431Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.833766186Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833769564Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833773201Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:34:54.833777022Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.833779981Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833783759Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833787229Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:34:54.833790285Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.833793329Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833796217Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833799504Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:34:54.833831982Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.833839983Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833844501Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833847901Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833850638Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:34:54.833854089Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.833858515Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833861865Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833864951Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833868165Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:34:54.833872455Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.83387679Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833881153Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833884698Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833888406Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:34:54.833892584Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.83389619Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833899635Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833902709Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833906186Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:34:54.833909906Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.833912985Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.833915319Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83391734Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83391954Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium daemon set:\n"} +{"Time":"2023-05-31T19:34:54.833926787Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833929243Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833952908Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833956696Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium daemon set pod(s):\n"} +{"Time":"2023-05-31T19:34:54.833960385Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.833963522Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833975431Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833979036Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium daemon set container(s) logs (current):\n"} +{"Time":"2023-05-31T19:34:54.833983939Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.833990621Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833993651Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.833997089Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium daemon set container(s) logs (previous):\n"} +{"Time":"2023-05-31T19:34:54.834000784Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.834004519Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834007914Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834011406Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium deployment:\n"} +{"Time":"2023-05-31T19:34:54.834015236Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.834018791Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834021571Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834024775Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium deployment pod(s):\n"} +{"Time":"2023-05-31T19:34:54.834028594Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.834033791Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834036882Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834040051Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium deployment container(s) logs (current):\n"} +{"Time":"2023-05-31T19:34:54.834043933Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.834047274Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834053325Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834056745Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium deployment container(s) logs (previous):\n"} +{"Time":"2023-05-31T19:34:54.834060514Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.834063888Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834067043Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834070463Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:34:54.834074505Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.834077958Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834088066Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834091795Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:34:54.834095545Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.834099057Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834102112Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834105424Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:34:54.834109107Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-509041\" does not exist\n"} +{"Time":"2023-05-31T19:34:54.834112736Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834115819Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834119419Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:34:54.834124547Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834131876Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834139809Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83414331Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834146564Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:34:54.834150551Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834154796Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834158553Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834161749Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83416517Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:34:54.834168744Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834171352Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834173607Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834175641Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834177903Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:34:54.834181021Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834185786Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834188004Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834189979Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834192028Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:34:54.834194594Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834196964Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834199172Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834201166Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834203198Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:34:54.834205446Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:34:54.834207763Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" clusters:\n"} +{"Time":"2023-05-31T19:34:54.834209847Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:34:54.834212289Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:34:54.834215728Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" extensions:\n"} +{"Time":"2023-05-31T19:34:54.834217985Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" - extension:\n"} +{"Time":"2023-05-31T19:34:54.834220443Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" last-update: Wed, 31 May 2023 19:33:47 UTC\n"} +{"Time":"2023-05-31T19:34:54.834222833Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:34:54.834228069Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:34:54.834230468Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:34:54.834233131Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" server: https://192.168.39.167:8443\n"} +{"Time":"2023-05-31T19:34:54.834235331Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:54.834237593Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" contexts:\n"} +{"Time":"2023-05-31T19:34:54.834239766Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" - context:\n"} +{"Time":"2023-05-31T19:34:54.834241916Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" cluster: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:54.834244584Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" extensions:\n"} +{"Time":"2023-05-31T19:34:54.834246785Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" - extension:\n"} +{"Time":"2023-05-31T19:34:54.834248942Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" last-update: Wed, 31 May 2023 19:33:47 UTC\n"} +{"Time":"2023-05-31T19:34:54.834251199Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:34:54.834253532Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:34:54.834255811Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:34:54.834258018Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:34:54.834260435Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" user: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:54.834262589Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:54.834264816Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:34:54.834270876Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:34:54.834273168Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:34:54.834275417Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" users:\n"} +{"Time":"2023-05-31T19:34:54.834279986Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" - name: cert-expiration-913900\n"} +{"Time":"2023-05-31T19:34:54.834282255Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" user:\n"} +{"Time":"2023-05-31T19:34:54.834284619Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/cert-expiration-913900/client.crt\n"} +{"Time":"2023-05-31T19:34:54.834288326Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/cert-expiration-913900/client.key\n"} +{"Time":"2023-05-31T19:34:54.834291095Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834293155Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834295291Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:34:54.834297732Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.834299858Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834301865Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83430397Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:34:54.834306367Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.83430892Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834311192Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834313253Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834315405Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:34:54.834317849Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834320236Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834322395Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834324372Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834326684Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:34:54.834329109Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834331583Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834333843Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834335913Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834338037Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:34:54.834340371Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834344033Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834346357Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834348387Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834350564Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:34:54.834357278Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834359803Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834364033Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834366051Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834368189Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:34:54.834370561Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834372992Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834375101Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834377029Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834379145Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:34:54.834381594Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834383957Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834386251Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834388269Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834390436Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:34:54.834392758Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834395061Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834397181Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83439919Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834401341Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:34:54.834404034Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834406566Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.83440882Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834410871Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834413059Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:34:54.834415383Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834417791Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834419951Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834421986Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834424188Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:34:54.834426553Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834428889Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834431025Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834432979Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834435131Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:34:54.834437511Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834439881Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834442018Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834444064Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834446141Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:34:54.834448458Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834450778Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834452973Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.83445498Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834457208Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:34:54.834460833Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834463316Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834465473Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834467494Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834472984Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:34:54.834475557Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834482896Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.83448861Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834490771Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834492892Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:34:54.834495261Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834502896Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834505197Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834507206Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834509303Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:34:54.834511692Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834514097Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834516295Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834518403Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834520555Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:34:54.834522938Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-509041\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T19:34:54.834525272Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-509041\"\n"} +{"Time":"2023-05-31T19:34:54.834527404Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T19:34:54.834529712Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" ----------------------- debugLogs end: cilium-509041 [took: 2.930049475s] --------------------------------\n"} +{"Time":"2023-05-31T19:34:54.834533497Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" helpers_test.go:175: Cleaning up \"cilium-509041\" profile ...\n"} +{"Time":"2023-05-31T19:34:54.834538969Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p cilium-509041\n"} +{"Time":"2023-05-31T19:34:54.965990055Z","Action":"cont","Test":"TestStartStop"} +{"Time":"2023-05-31T19:34:54.966016363Z","Action":"output","Test":"TestStartStop","Output":"=== CONT TestStartStop\n"} +{"Time":"2023-05-31T19:34:54.966020907Z","Action":"run","Test":"TestStartStop/group"} +{"Time":"2023-05-31T19:34:54.966023181Z","Action":"output","Test":"TestStartStop/group","Output":"=== RUN TestStartStop/group\n"} +{"Time":"2023-05-31T19:34:54.96602735Z","Action":"run","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T19:34:54.966030154Z","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== RUN TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T19:34:54.96603344Z","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== PAUSE TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T19:34:54.966036214Z","Action":"pause","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T19:34:54.966039515Z","Action":"run","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T19:34:54.96604312Z","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== RUN TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T19:34:54.966047784Z","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== PAUSE TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T19:34:54.966062626Z","Action":"pause","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T19:34:54.966067099Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T19:34:54.966070422Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== RUN TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T19:34:54.966075457Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== PAUSE TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T19:34:54.966077944Z","Action":"pause","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T19:34:54.966086652Z","Action":"run","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T19:34:54.966090001Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== RUN TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T19:34:54.966099149Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== PAUSE TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T19:34:54.966102107Z","Action":"pause","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T19:34:54.966126031Z","Action":"run","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T19:34:54.966133513Z","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== RUN TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T19:34:54.966148001Z","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== PAUSE TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T19:34:54.966150956Z","Action":"pause","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T19:34:54.966164163Z","Action":"run","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T19:34:54.966167308Z","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== RUN TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T19:34:54.966179777Z","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== PAUSE TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T19:34:54.966182763Z","Action":"pause","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T19:34:54.966186828Z","Action":"cont","Test":"TestKVMDriverInstallOrUpdate"} +{"Time":"2023-05-31T19:34:54.966189761Z","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":"=== CONT TestKVMDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T19:34:57.846767374Z","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":"--- PASS: TestKVMDriverInstallOrUpdate (2.88s)\n"} +{"Time":"2023-05-31T19:34:57.846789646Z","Action":"pass","Test":"TestKVMDriverInstallOrUpdate","Elapsed":2.88} +{"Time":"2023-05-31T19:34:57.846797561Z","Action":"cont","Test":"TestPause"} +{"Time":"2023-05-31T19:34:57.846801045Z","Action":"output","Test":"TestPause","Output":"=== CONT TestPause\n"} +{"Time":"2023-05-31T19:34:57.846807203Z","Action":"run","Test":"TestPause/serial"} +{"Time":"2023-05-31T19:34:57.846810769Z","Action":"output","Test":"TestPause/serial","Output":"=== RUN TestPause/serial\n"} +{"Time":"2023-05-31T19:34:57.846813966Z","Action":"run","Test":"TestPause/serial/Start"} +{"Time":"2023-05-31T19:34:57.846816268Z","Action":"output","Test":"TestPause/serial/Start","Output":"=== RUN TestPause/serial/Start\n"} +{"Time":"2023-05-31T19:34:57.846842545Z","Action":"output","Test":"TestPause/serial/Start","Output":" pause_test.go:80: (dbg) Run: out/minikube-linux-amd64 start -p pause-725328 --memory=2048 --install-addons=false --wait=all --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:35:12.080850662Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:210: (dbg) Done: out/minikube-linux-amd64 start -p stopped-upgrade-814323 --memory=2200 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd: (2m8.346268049s)\n"} +{"Time":"2023-05-31T19:35:12.0808788Z","Action":"run","Test":"TestStoppedBinaryUpgrade/MinikubeLogs"} +{"Time":"2023-05-31T19:35:12.080882353Z","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":"=== RUN TestStoppedBinaryUpgrade/MinikubeLogs\n"} +{"Time":"2023-05-31T19:35:12.08088663Z","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" version_upgrade_test.go:218: (dbg) Run: out/minikube-linux-amd64 logs -p stopped-upgrade-814323\n"} +{"Time":"2023-05-31T19:35:12.866682836Z","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:175: Cleaning up \"stopped-upgrade-814323\" profile ...\n"} +{"Time":"2023-05-31T19:35:12.866704537Z","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p stopped-upgrade-814323\n"} +{"Time":"2023-05-31T19:35:14.452096319Z","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p stopped-upgrade-814323: (1.58532695s)\n"} +{"Time":"2023-05-31T19:35:14.452130762Z","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"--- PASS: TestStoppedBinaryUpgrade (232.80s)\n"} +{"Time":"2023-05-31T19:35:14.452149727Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Setup","Output":" --- PASS: TestStoppedBinaryUpgrade/Setup (0.53s)\n"} +{"Time":"2023-05-31T19:35:14.452154311Z","Action":"pass","Test":"TestStoppedBinaryUpgrade/Setup","Elapsed":0.53} +{"Time":"2023-05-31T19:35:14.452161236Z","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" --- PASS: TestStoppedBinaryUpgrade/Upgrade (229.89s)\n"} +{"Time":"2023-05-31T19:35:14.452164943Z","Action":"pass","Test":"TestStoppedBinaryUpgrade/Upgrade","Elapsed":229.89} +{"Time":"2023-05-31T19:35:14.452169068Z","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" --- PASS: TestStoppedBinaryUpgrade/MinikubeLogs (0.77s)\n"} +{"Time":"2023-05-31T19:35:14.452187208Z","Action":"pass","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Elapsed":0.77} +{"Time":"2023-05-31T19:35:14.452190137Z","Action":"pass","Test":"TestStoppedBinaryUpgrade","Elapsed":232.8} +{"Time":"2023-05-31T19:35:14.45219306Z","Action":"cont","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T19:35:14.452196932Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== CONT TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T19:35:14.45220234Z","Action":"run","Test":"TestNetworkPlugins/group/auto/Start"} +{"Time":"2023-05-31T19:35:14.452205054Z","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"=== RUN TestNetworkPlugins/group/auto/Start\n"} +{"Time":"2023-05-31T19:35:14.452208547Z","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-linux-amd64 start -p auto-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:35:20.553879846Z","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"E0531 19:35:20.553802 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:35:28.617842148Z","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:49: (dbg) Done: out/minikube-linux-amd64 start -p cert-options-660610 --memory=2048 --apiserver-ips=127.0.0.1 --apiserver-ips=192.168.15.15 --apiserver-names=localhost --apiserver-names=www.google.com --apiserver-port=8555 --driver=kvm2 --container-runtime=containerd: (1m13.687007045s)\n"} +{"Time":"2023-05-31T19:35:28.61788068Z","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:60: (dbg) Run: out/minikube-linux-amd64 -p cert-options-660610 ssh \"openssl x509 -text -noout -in /var/lib/minikube/certs/apiserver.crt\"\n"} +{"Time":"2023-05-31T19:35:28.814137756Z","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:88: (dbg) Run: kubectl --context cert-options-660610 config view\n"} +{"Time":"2023-05-31T19:35:28.867048144Z","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:100: (dbg) Run: out/minikube-linux-amd64 ssh -p cert-options-660610 -- \"sudo cat /etc/kubernetes/admin.conf\"\n"} +{"Time":"2023-05-31T19:35:29.071314399Z","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:175: Cleaning up \"cert-options-660610\" profile ...\n"} +{"Time":"2023-05-31T19:35:29.07134088Z","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p cert-options-660610\n"} +{"Time":"2023-05-31T19:35:30.146700326Z","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p cert-options-660610: (1.075323116s)\n"} +{"Time":"2023-05-31T19:35:30.146737221Z","Action":"output","Test":"TestCertOptions","Output":"--- PASS: TestCertOptions (75.22s)\n"} +{"Time":"2023-05-31T19:35:30.146743121Z","Action":"pass","Test":"TestCertOptions","Elapsed":75.22} +{"Time":"2023-05-31T19:35:30.146749679Z","Action":"cont","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T19:35:30.146752353Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== CONT TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T19:35:30.146757708Z","Action":"run","Test":"TestNetworkPlugins/group/kindnet/Start"} +{"Time":"2023-05-31T19:35:30.14676098Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"=== RUN TestNetworkPlugins/group/kindnet/Start\n"} +{"Time":"2023-05-31T19:35:30.146766678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-linux-amd64 start -p kindnet-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=kindnet --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:36:08.276408492Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"E0531 19:36:08.276353 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:36:37.181916383Z","Action":"output","Test":"TestPause/serial/Start","Output":" pause_test.go:80: (dbg) Done: out/minikube-linux-amd64 start -p pause-725328 --memory=2048 --install-addons=false --wait=all --driver=kvm2 --container-runtime=containerd: (1m39.334965848s)\n"} +{"Time":"2023-05-31T19:36:37.181948219Z","Action":"run","Test":"TestPause/serial/SecondStartNoReconfiguration"} +{"Time":"2023-05-31T19:36:37.18195314Z","Action":"output","Test":"TestPause/serial/SecondStartNoReconfiguration","Output":"=== RUN TestPause/serial/SecondStartNoReconfiguration\n"} +{"Time":"2023-05-31T19:36:37.182018881Z","Action":"output","Test":"TestPause/serial/SecondStartNoReconfiguration","Output":" pause_test.go:92: (dbg) Run: out/minikube-linux-amd64 start -p pause-725328 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:36:43.159489155Z","Action":"output","Test":"TestPause/serial/SecondStartNoReconfiguration","Output":" pause_test.go:92: (dbg) Done: out/minikube-linux-amd64 start -p pause-725328 --alsologtostderr -v=1 --driver=kvm2 --container-runtime=containerd: (5.977368039s)\n"} +{"Time":"2023-05-31T19:36:43.173665962Z","Action":"run","Test":"TestPause/serial/Pause"} +{"Time":"2023-05-31T19:36:43.173692315Z","Action":"output","Test":"TestPause/serial/Pause","Output":"=== RUN TestPause/serial/Pause\n"} +{"Time":"2023-05-31T19:36:43.173852217Z","Action":"output","Test":"TestPause/serial/Pause","Output":" pause_test.go:110: (dbg) Run: out/minikube-linux-amd64 pause -p pause-725328 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T19:36:43.86676489Z","Action":"run","Test":"TestPause/serial/VerifyStatus"} +{"Time":"2023-05-31T19:36:43.866801195Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":"=== RUN TestPause/serial/VerifyStatus\n"} +{"Time":"2023-05-31T19:36:43.86680979Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" status_test.go:76: (dbg) Run: out/minikube-linux-amd64 status -p pause-725328 --output=json --layout=cluster\n"} +{"Time":"2023-05-31T19:36:44.110702439Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" status_test.go:76: (dbg) Non-zero exit: out/minikube-linux-amd64 status -p pause-725328 --output=json --layout=cluster: exit status 2 (243.772841ms)\n"} +{"Time":"2023-05-31T19:36:44.110734194Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" \n"} +{"Time":"2023-05-31T19:36:44.110739642Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:36:44.110744886Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" \t{\"Name\":\"pause-725328\",\"StatusCode\":418,\"StatusName\":\"Paused\",\"Step\":\"Done\",\"StepDetail\":\"* Paused 6 containers in: kube-system, kubernetes-dashboard, storage-gluster, istio-operator\",\"BinaryVersion\":\"v1.30.1\",\"Components\":{\"kubeconfig\":{\"Name\":\"kubeconfig\",\"StatusCode\":200,\"StatusName\":\"OK\"}},\"Nodes\":[{\"Name\":\"pause-725328\",\"StatusCode\":200,\"StatusName\":\"OK\",\"Components\":{\"apiserver\":{\"Name\":\"apiserver\",\"StatusCode\":418,\"StatusName\":\"Paused\"},\"kubelet\":{\"Name\":\"kubelet\",\"StatusCode\":405,\"StatusName\":\"Stopped\"}}}]}\n"} +{"Time":"2023-05-31T19:36:44.110754156Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" \n"} +{"Time":"2023-05-31T19:36:44.110757295Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:36:44.110945153Z","Action":"run","Test":"TestPause/serial/Unpause"} +{"Time":"2023-05-31T19:36:44.110977592Z","Action":"output","Test":"TestPause/serial/Unpause","Output":"=== RUN TestPause/serial/Unpause\n"} +{"Time":"2023-05-31T19:36:44.110985963Z","Action":"output","Test":"TestPause/serial/Unpause","Output":" pause_test.go:121: (dbg) Run: out/minikube-linux-amd64 unpause -p pause-725328 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T19:36:44.694468841Z","Action":"run","Test":"TestPause/serial/PauseAgain"} +{"Time":"2023-05-31T19:36:44.69450734Z","Action":"output","Test":"TestPause/serial/PauseAgain","Output":"=== RUN TestPause/serial/PauseAgain\n"} +{"Time":"2023-05-31T19:36:44.694517865Z","Action":"output","Test":"TestPause/serial/PauseAgain","Output":" pause_test.go:110: (dbg) Run: out/minikube-linux-amd64 pause -p pause-725328 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T19:36:45.446805955Z","Action":"run","Test":"TestPause/serial/DeletePaused"} +{"Time":"2023-05-31T19:36:45.446835075Z","Action":"output","Test":"TestPause/serial/DeletePaused","Output":"=== RUN TestPause/serial/DeletePaused\n"} +{"Time":"2023-05-31T19:36:45.446843462Z","Action":"output","Test":"TestPause/serial/DeletePaused","Output":" pause_test.go:132: (dbg) Run: out/minikube-linux-amd64 delete -p pause-725328 --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T19:36:46.426041484Z","Action":"run","Test":"TestPause/serial/VerifyDeletedResources"} +{"Time":"2023-05-31T19:36:46.42606933Z","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":"=== RUN TestPause/serial/VerifyDeletedResources\n"} +{"Time":"2023-05-31T19:36:46.426078184Z","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" pause_test.go:142: (dbg) Run: out/minikube-linux-amd64 profile list --output json\n"} +{"Time":"2023-05-31T19:36:49.024243906Z","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:131: (dbg) Run: out/minikube-linux-amd64 start -p cert-expiration-913900 --memory=2048 --cert-expiration=8760h --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:36:53.799420054Z","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" pause_test.go:142: (dbg) Done: out/minikube-linux-amd64 profile list --output json: (7.373255443s)\n"} +{"Time":"2023-05-31T19:36:53.799769431Z","Action":"output","Test":"TestPause","Output":" helpers_test.go:175: Cleaning up \"pause-725328\" profile ...\n"} +{"Time":"2023-05-31T19:36:53.799788658Z","Action":"output","Test":"TestPause","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p pause-725328\n"} +{"Time":"2023-05-31T19:36:53.926495837Z","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:131: (dbg) Done: out/minikube-linux-amd64 start -p cert-expiration-913900 --memory=2048 --cert-expiration=8760h --driver=kvm2 --container-runtime=containerd: (4.901989302s)\n"} +{"Time":"2023-05-31T19:36:53.926528117Z","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:175: Cleaning up \"cert-expiration-913900\" profile ...\n"} +{"Time":"2023-05-31T19:36:53.926554243Z","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p cert-expiration-913900\n"} +{"Time":"2023-05-31T19:36:53.948935533Z","Action":"output","Test":"TestPause","Output":"--- PASS: TestPause (116.10s)\n"} +{"Time":"2023-05-31T19:36:53.948962426Z","Action":"output","Test":"TestPause/serial","Output":" --- PASS: TestPause/serial (115.95s)\n"} +{"Time":"2023-05-31T19:36:53.948967724Z","Action":"output","Test":"TestPause/serial/Start","Output":" --- PASS: TestPause/serial/Start (99.34s)\n"} +{"Time":"2023-05-31T19:36:53.948971847Z","Action":"pass","Test":"TestPause/serial/Start","Elapsed":99.34} +{"Time":"2023-05-31T19:36:53.948978222Z","Action":"output","Test":"TestPause/serial/SecondStartNoReconfiguration","Output":" --- PASS: TestPause/serial/SecondStartNoReconfiguration (5.99s)\n"} +{"Time":"2023-05-31T19:36:53.948982802Z","Action":"pass","Test":"TestPause/serial/SecondStartNoReconfiguration","Elapsed":5.99} +{"Time":"2023-05-31T19:36:53.948985993Z","Action":"output","Test":"TestPause/serial/Pause","Output":" --- PASS: TestPause/serial/Pause (0.69s)\n"} +{"Time":"2023-05-31T19:36:53.948989137Z","Action":"pass","Test":"TestPause/serial/Pause","Elapsed":0.69} +{"Time":"2023-05-31T19:36:53.948991893Z","Action":"output","Test":"TestPause/serial/VerifyStatus","Output":" --- PASS: TestPause/serial/VerifyStatus (0.24s)\n"} +{"Time":"2023-05-31T19:36:53.948995369Z","Action":"pass","Test":"TestPause/serial/VerifyStatus","Elapsed":0.24} +{"Time":"2023-05-31T19:36:53.949004879Z","Action":"output","Test":"TestPause/serial/Unpause","Output":" --- PASS: TestPause/serial/Unpause (0.58s)\n"} +{"Time":"2023-05-31T19:36:53.949016204Z","Action":"pass","Test":"TestPause/serial/Unpause","Elapsed":0.58} +{"Time":"2023-05-31T19:36:53.949019166Z","Action":"output","Test":"TestPause/serial/PauseAgain","Output":" --- PASS: TestPause/serial/PauseAgain (0.75s)\n"} +{"Time":"2023-05-31T19:36:53.949022539Z","Action":"pass","Test":"TestPause/serial/PauseAgain","Elapsed":0.75} +{"Time":"2023-05-31T19:36:53.949025476Z","Action":"output","Test":"TestPause/serial/DeletePaused","Output":" --- PASS: TestPause/serial/DeletePaused (0.98s)\n"} +{"Time":"2023-05-31T19:36:53.949031321Z","Action":"pass","Test":"TestPause/serial/DeletePaused","Elapsed":0.98} +{"Time":"2023-05-31T19:36:53.949034277Z","Action":"output","Test":"TestPause/serial/VerifyDeletedResources","Output":" --- PASS: TestPause/serial/VerifyDeletedResources (7.37s)\n"} +{"Time":"2023-05-31T19:36:53.949038Z","Action":"pass","Test":"TestPause/serial/VerifyDeletedResources","Elapsed":7.37} +{"Time":"2023-05-31T19:36:53.949041021Z","Action":"pass","Test":"TestPause/serial","Elapsed":115.95} +{"Time":"2023-05-31T19:36:53.94904348Z","Action":"pass","Test":"TestPause","Elapsed":116.1} +{"Time":"2023-05-31T19:36:53.94904685Z","Action":"cont","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T19:36:53.949049456Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== CONT TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T19:36:53.949055854Z","Action":"run","Test":"TestNetworkPlugins/group/calico/Start"} +{"Time":"2023-05-31T19:36:53.949058709Z","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":"=== RUN TestNetworkPlugins/group/calico/Start\n"} +{"Time":"2023-05-31T19:36:53.949062876Z","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-linux-amd64 start -p calico-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=calico --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:36:54.999036523Z","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p cert-expiration-913900: (1.072613918s)\n"} +{"Time":"2023-05-31T19:36:54.999069052Z","Action":"output","Test":"TestCertExpiration","Output":"--- PASS: TestCertExpiration (241.17s)\n"} +{"Time":"2023-05-31T19:36:54.999075528Z","Action":"pass","Test":"TestCertExpiration","Elapsed":241.17} +{"Time":"2023-05-31T19:36:54.999082351Z","Action":"cont","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T19:36:54.999085519Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== CONT TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T19:36:54.999089148Z","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/Start"} +{"Time":"2023-05-31T19:36:54.999092158Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/Start\n"} +{"Time":"2023-05-31T19:36:54.999111511Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-linux-amd64 start -p custom-flannel-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=testdata/kube-flannel.yaml --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:37:03.005991248Z","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-linux-amd64 start -p auto-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --driver=kvm2 --container-runtime=containerd: (1m48.553731562s)\n"} +{"Time":"2023-05-31T19:37:03.006020639Z","Action":"run","Test":"TestNetworkPlugins/group/auto/KubeletFlags"} +{"Time":"2023-05-31T19:37:03.006025763Z","Action":"output","Test":"TestNetworkPlugins/group/auto/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/auto/KubeletFlags\n"} +{"Time":"2023-05-31T19:37:03.00603933Z","Action":"output","Test":"TestNetworkPlugins/group/auto/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-linux-amd64 ssh -p auto-509041 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T19:37:03.244626643Z","Action":"run","Test":"TestNetworkPlugins/group/auto/NetCatPod"} +{"Time":"2023-05-31T19:37:03.244654273Z","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/auto/NetCatPod\n"} +{"Time":"2023-05-31T19:37:03.244663534Z","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context auto-509041 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T19:37:03.632576214Z","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/auto/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:37:03.636356167Z","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-z5czz\" [58d70507-7d92-46ab-9e13-bcb97899f688] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T19:37:04.286903206Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-linux-amd64 start -p kindnet-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=kindnet --driver=kvm2 --container-runtime=containerd: (1m34.140041855s)\n"} +{"Time":"2023-05-31T19:37:04.286932337Z","Action":"run","Test":"TestNetworkPlugins/group/kindnet/ControllerPod"} +{"Time":"2023-05-31T19:37:04.286937108Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":"=== RUN TestNetworkPlugins/group/kindnet/ControllerPod\n"} +{"Time":"2023-05-31T19:37:04.288497198Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/kindnet/ControllerPod: waiting 10m0s for pods matching \"app=kindnet\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T19:37:04.305833149Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":" helpers_test.go:344: \"kindnet-hmx2r\" [bac87e7f-68fe-40b7-8296-00f05c742cea] Running\n"} +{"Time":"2023-05-31T19:37:08.640148443Z","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-z5czz\" [58d70507-7d92-46ab-9e13-bcb97899f688] Running\n"} +{"Time":"2023-05-31T19:37:09.31064585Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/kindnet/ControllerPod: app=kindnet healthy within 5.02212142s\n"} +{"Time":"2023-05-31T19:37:09.310691505Z","Action":"run","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags"} +{"Time":"2023-05-31T19:37:09.31069608Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/kindnet/KubeletFlags\n"} +{"Time":"2023-05-31T19:37:09.310702692Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-linux-amd64 ssh -p kindnet-509041 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T19:37:09.508869443Z","Action":"run","Test":"TestNetworkPlugins/group/kindnet/NetCatPod"} +{"Time":"2023-05-31T19:37:09.508887981Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/kindnet/NetCatPod\n"} +{"Time":"2023-05-31T19:37:09.50889431Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context kindnet-509041 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T19:37:09.829998342Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/kindnet/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:37:09.834262306Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-9ggwz\" [b9f49332-4a09-462c-84fb-70fb102722c9] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T19:37:13.83819926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-9ggwz\" [b9f49332-4a09-462c-84fb-70fb102722c9] Running\n"} +{"Time":"2023-05-31T19:37:14.640120012Z","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/auto/NetCatPod: app=netcat healthy within 11.007597449s\n"} +{"Time":"2023-05-31T19:37:14.640160862Z","Action":"run","Test":"TestNetworkPlugins/group/auto/DNS"} +{"Time":"2023-05-31T19:37:14.640164339Z","Action":"output","Test":"TestNetworkPlugins/group/auto/DNS","Output":"=== RUN TestNetworkPlugins/group/auto/DNS\n"} +{"Time":"2023-05-31T19:37:14.640168577Z","Action":"output","Test":"TestNetworkPlugins/group/auto/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context auto-509041 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:37:14.809453089Z","Action":"run","Test":"TestNetworkPlugins/group/auto/Localhost"} +{"Time":"2023-05-31T19:37:14.809478656Z","Action":"output","Test":"TestNetworkPlugins/group/auto/Localhost","Output":"=== RUN TestNetworkPlugins/group/auto/Localhost\n"} +{"Time":"2023-05-31T19:37:14.809548528Z","Action":"output","Test":"TestNetworkPlugins/group/auto/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context auto-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T19:37:14.942188115Z","Action":"run","Test":"TestNetworkPlugins/group/auto/HairPin"} +{"Time":"2023-05-31T19:37:14.942214467Z","Action":"output","Test":"TestNetworkPlugins/group/auto/HairPin","Output":"=== RUN TestNetworkPlugins/group/auto/HairPin\n"} +{"Time":"2023-05-31T19:37:14.942282163Z","Action":"output","Test":"TestNetworkPlugins/group/auto/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context auto-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T19:37:15.068727724Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" net_test.go:209: \"auto\" test finished in 2m32.355792067s, failed=false\n"} +{"Time":"2023-05-31T19:37:15.147100888Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"E0531 19:37:15.147022 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:37:19.839250453Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/kindnet/NetCatPod: app=netcat healthy within 10.009209014s\n"} +{"Time":"2023-05-31T19:37:19.83928457Z","Action":"run","Test":"TestNetworkPlugins/group/kindnet/DNS"} +{"Time":"2023-05-31T19:37:19.839290214Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/DNS","Output":"=== RUN TestNetworkPlugins/group/kindnet/DNS\n"} +{"Time":"2023-05-31T19:37:19.83929877Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context kindnet-509041 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:37:20.006526293Z","Action":"run","Test":"TestNetworkPlugins/group/kindnet/Localhost"} +{"Time":"2023-05-31T19:37:20.006553554Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Localhost","Output":"=== RUN TestNetworkPlugins/group/kindnet/Localhost\n"} +{"Time":"2023-05-31T19:37:20.006737579Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context kindnet-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T19:37:20.157188497Z","Action":"run","Test":"TestNetworkPlugins/group/kindnet/HairPin"} +{"Time":"2023-05-31T19:37:20.157230046Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/HairPin","Output":"=== RUN TestNetworkPlugins/group/kindnet/HairPin\n"} +{"Time":"2023-05-31T19:37:20.157258544Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context kindnet-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T19:37:20.302086366Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" net_test.go:209: \"kindnet\" test finished in 2m33.783784409s, failed=false\n"} +{"Time":"2023-05-31T19:37:31.218762157Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T19:37:31.21878725Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ----------------------- debugLogs start: auto-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:37:31.218797063Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:37:31.218801079Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T19:37:31.218804522Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T19:37:31.218807956Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218811601Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:37:31.218814706Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T19:37:31.218817703Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218820679Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218823305Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218826126Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:37:31.21882959Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T19:37:31.218833069Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218836119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218839134Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:37:31.218842721Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T19:37:31.218845725Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218848771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218860148Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:37:31.218864041Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:37:31.218867974Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T19:37:31.218871276Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218874331Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218877608Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:37:31.21889065Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T19:37:31.218896403Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T19:37:31.21889956Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T19:37:31.218904133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T19:37:31.218907137Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T19:37:31.218910795Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T19:37:31.218914048Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T19:37:31.218917416Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 10.244.0.4\tnetcat-7458db8b8-z5czz\n"} +{"Time":"2023-05-31T19:37:31.218920581Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218923141Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.2189262Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:37:31.218929182Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T19:37:31.218937398Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T19:37:31.218940321Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" options ndots:5\n"} +{"Time":"2023-05-31T19:37:31.218943105Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218945752Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.218948293Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:37:31.218951165Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T19:37:31.21895399Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.21895675Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" passwd: files mymachines systemd\r\n"} +{"Time":"2023-05-31T19:37:31.218959587Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" group: files [SUCCESS=merge] mymachines [SUCCESS=merge] systemd\r\n"} +{"Time":"2023-05-31T19:37:31.218962669Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T19:37:31.218965224Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.218970402Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname\r\n"} +{"Time":"2023-05-31T19:37:31.218973187Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" networks: files dns\r\n"} +{"Time":"2023-05-31T19:37:31.218976054Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.218978899Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" protocols: files\r\n"} +{"Time":"2023-05-31T19:37:31.218982016Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" services: files\r\n"} +{"Time":"2023-05-31T19:37:31.218985152Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ethers: files\r\n"} +{"Time":"2023-05-31T19:37:31.218994784Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rpc: files\r\n"} +{"Time":"2023-05-31T19:37:31.218998101Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219001996Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219005136Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:37:31.219011186Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T19:37:31.219014648Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 127.0.1.1 auto-509041\r\n"} +{"Time":"2023-05-31T19:37:31.21901775Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.50.1\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T19:37:31.219021085Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.50.171\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T19:37:31.219024509Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219027446Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219030528Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:37:31.219033879Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This is /run/systemd/resolve/resolv.conf managed by man:systemd-resolved(8).\r\n"} +{"Time":"2023-05-31T19:37:31.21903715Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Do not edit.\r\n"} +{"Time":"2023-05-31T19:37:31.219040463Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.219043533Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This file might be symlinked as /etc/resolv.conf. If you're looking at\r\n"} +{"Time":"2023-05-31T19:37:31.219047234Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # /etc/resolv.conf and seeing this text, you have followed the symlink.\r\n"} +{"Time":"2023-05-31T19:37:31.2190494Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.219051377Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This is a dynamic resolv.conf file for connecting local clients directly to\r\n"} +{"Time":"2023-05-31T19:37:31.219053431Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # all known uplink DNS servers. This file lists all configured search domains.\r\n"} +{"Time":"2023-05-31T19:37:31.219055363Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.219057227Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Third party programs should typically not access this file directly, but only\r\n"} +{"Time":"2023-05-31T19:37:31.219059672Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # through the symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a\r\n"} +{"Time":"2023-05-31T19:37:31.219064971Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # different way, replace this symlink by a static file or a different symlink.\r\n"} +{"Time":"2023-05-31T19:37:31.21906828Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.21907143Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # See man:systemd-resolved.service(8) for details about the supported modes of\r\n"} +{"Time":"2023-05-31T19:37:31.219074976Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # operation for /etc/resolv.conf.\r\n"} +{"Time":"2023-05-31T19:37:31.219077944Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.21908171Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nameserver 192.168.122.1\r\n"} +{"Time":"2023-05-31T19:37:31.219085008Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" search .\r\n"} +{"Time":"2023-05-31T19:37:31.21909906Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219102279Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219105545Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:37:31.219110071Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T19:37:31.219114093Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node/auto-509041 Ready control-plane 67s v1.27.2 192.168.50.171 \u003cnone\u003e Buildroot 2021.02.12 5.10.57 containerd://1.7.1\n"} +{"Time":"2023-05-31T19:37:31.219117658Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219120998Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T19:37:31.219125023Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 65s \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219129172Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default service/netcat ClusterIP 10.97.223.212 \u003cnone\u003e 8080/TCP 18s app=netcat\n"} +{"Time":"2023-05-31T19:37:31.21913289Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 63s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:31.219136224Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219139367Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T19:37:31.219143459Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default endpoints/kubernetes 192.168.50.171:8443 65s\n"} +{"Time":"2023-05-31T19:37:31.219146931Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default endpoints/netcat 10.244.0.4:8080 18s\n"} +{"Time":"2023-05-31T19:37:31.219150257Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 47s\n"} +{"Time":"2023-05-31T19:37:31.21915389Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 50s\n"} +{"Time":"2023-05-31T19:37:31.219157158Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219160577Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:37:31.219165403Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 63s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.21916893Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219172331Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:37:31.219176059Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default deployment.apps/netcat 1/1 1 1 18s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T19:37:31.219179697Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system deployment.apps/coredns 1/1 1 1 63s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:31.219182954Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219186246Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T19:37:31.219189757Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default pod/netcat-7458db8b8-z5czz 1/1 Running 0 18s 10.244.0.4 auto-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219193951Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/coredns-5d78c9869d-p8xrk 1/1 Running 0 50s 10.244.0.2 auto-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219197844Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/etcd-auto-509041 1/1 Running 0 63s 192.168.50.171 auto-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219204259Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/kube-apiserver-auto-509041 1/1 Running 0 65s 192.168.50.171 auto-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219207994Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/kube-controller-manager-auto-509041 1/1 Running 0 63s 192.168.50.171 auto-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219211801Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/kube-proxy-79w7r 1/1 Running 0 50s 192.168.50.171 auto-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.21921564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/kube-scheduler-auto-509041 1/1 Running 0 63s 192.168.50.171 auto-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219221544Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-system pod/storage-provisioner 1/1 Running 0 47s 192.168.50.171 auto-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219225594Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219228404Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219230887Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:37:31.219233097Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T19:37:31.219235928Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3fcf25ba51e68 18 seconds ago Ready netcat-7458db8b8-z5czz default 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:31.219239571Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ffb3db4821dcc 47 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:31.219243013Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 274d7be7ca83e 50 seconds ago Ready kube-proxy-79w7r kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:31.219246517Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 6b07b913b4870 50 seconds ago Ready coredns-5d78c9869d-p8xrk kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:31.219250317Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 504fca68531ac About a minute ago Ready kube-apiserver-auto-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:31.21925419Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fd764e08f6018 About a minute ago Ready kube-scheduler-auto-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:31.219257788Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7ecc091e5f332 About a minute ago Ready kube-controller-manager-auto-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:31.219264391Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" d65823b7cc81d About a minute ago Ready etcd-auto-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:31.219267754Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219270648Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219273667Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:37:31.219279356Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\r\n"} +{"Time":"2023-05-31T19:37:31.219283223Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 99672e3f21915 28081458d86cc 15 seconds ago Running dnsutils 0 3fcf25ba51e68\r\n"} +{"Time":"2023-05-31T19:37:31.219286893Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 688a886414904 6e38f40d628db 47 seconds ago Running storage-provisioner 0 ffb3db4821dcc\r\n"} +{"Time":"2023-05-31T19:37:31.219291183Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 52679206eeada ead0a4a53df89 49 seconds ago Running coredns 0 6b07b913b4870\r\n"} +{"Time":"2023-05-31T19:37:31.219294713Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 93ff01808f049 b8aa50768fd67 50 seconds ago Running kube-proxy 0 274d7be7ca83e\r\n"} +{"Time":"2023-05-31T19:37:31.219301769Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 56bf4c11dfe26 89e70da428d29 About a minute ago Running kube-scheduler 0 fd764e08f6018\r\n"} +{"Time":"2023-05-31T19:37:31.219305375Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 88e3247b22d95 c5b13e4f7806d About a minute ago Running kube-apiserver 0 504fca68531ac\r\n"} +{"Time":"2023-05-31T19:37:31.219308833Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 240d2fd6c4719 86b6af7dd652c About a minute ago Running etcd 0 d65823b7cc81d\r\n"} +{"Time":"2023-05-31T19:37:31.219312161Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" d6814824040e1 ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 7ecc091e5f332\r\n"} +{"Time":"2023-05-31T19:37:31.21931507Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219316922Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219318793Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:37:31.219320742Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: netcat\n"} +{"Time":"2023-05-31T19:37:31.21932312Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:37:31.219326055Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CreationTimestamp: Wed, 31 May 2023 19:37:03 +0000\n"} +{"Time":"2023-05-31T19:37:31.219329132Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:37:31.21933237Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:37:31.219335319Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T19:37:31.219338652Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:37:31.219341962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:37:31.21934504Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:37:31.219348313Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:37:31.219351477Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:37:31.219354506Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:37:31.219358291Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:31.219361433Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:37:31.219364686Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:37:31.219367887Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219371179Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.21937429Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:31.219377234Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:37:31.219380169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -c\n"} +{"Time":"2023-05-31T19:37:31.219383586Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:37:31.219386798Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219390073Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219393229Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219396383Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:31.219403526Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:37:31.21940557Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:37:31.219407571Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:37:31.219409508Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:37:31.219411376Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219413384Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:37:31.219415593Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:31.219417516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:31.219419469Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:31.219421476Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal ScalingReplicaSet 19s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T19:37:31.219425892Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219427839Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219429707Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:37:31.219433127Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: netcat-7458db8b8-z5czz\n"} +{"Time":"2023-05-31T19:37:31.219435188Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:37:31.219437026Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority: 0\n"} +{"Time":"2023-05-31T19:37:31.219438901Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: default\n"} +{"Time":"2023-05-31T19:37:31.219440939Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node: auto-509041/192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.219442911Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Start Time: Wed, 31 May 2023 19:37:03 +0000\n"} +{"Time":"2023-05-31T19:37:31.219444862Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:37:31.219446849Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T19:37:31.219448698Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.21945065Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:31.219452575Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T19:37:31.219454428Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:31.219456353Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T19:37:31.219458313Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T19:37:31.219460166Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:31.219475565Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:37:31.219481828Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Container ID: containerd://99672e3f21915ec77ebc573f4dfc26dade3fc3b02d1f9a19a7125e0d52c86305\n"} +{"Time":"2023-05-31T19:37:31.219483936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:37:31.219486422Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image ID: registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T19:37:31.219488605Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219490578Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219496029Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:31.219498069Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:37:31.219499892Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -c\n"} +{"Time":"2023-05-31T19:37:31.219502255Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:37:31.219505399Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:31.219510242Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Started: Wed, 31 May 2023 19:37:06 +0000\n"} +{"Time":"2023-05-31T19:37:31.21951326Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:31.21951621Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:31.219518737Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219521736Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:31.21952424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-p6m56 (ro)\n"} +{"Time":"2023-05-31T19:37:31.21952694Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:31.219529281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:31.219531738Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:31.219534176Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:31.219536505Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:31.219538797Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:31.2195411Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:31.219543375Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-api-access-p6m56:\n"} +{"Time":"2023-05-31T19:37:31.21954611Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:37:31.219548704Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:37:31.21955155Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:31.219554569Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:37:31.219557641Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:37:31.219561012Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:37:31.219564191Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.21956701Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:37:31.219573516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:37:31.219576875Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:31.219580137Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:31.219585154Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:31.219588394Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Scheduled 19s default-scheduler Successfully assigned default/netcat-7458db8b8-z5czz to auto-509041\n"} +{"Time":"2023-05-31T19:37:31.219591739Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulling 18s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T19:37:31.219595229Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulled 16s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 2.40898803s (2.408998142s including waiting)\n"} +{"Time":"2023-05-31T19:37:31.219599386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Created 16s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T19:37:31.219602772Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Started 16s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T19:37:31.219605541Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219612485Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219615306Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:37:31.219618246Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219621187Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219624063Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:37:31.219627145Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:37:31.219629986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.219633213Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CreationTimestamp: Wed, 31 May 2023 19:36:18 +0000\n"} +{"Time":"2023-05-31T19:37:31.21963628Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:31.219639202Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:37:31.219642413Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:31.219645405Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:37:31.219648562Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:37:31.219651633Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:37:31.219657216Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:37:31.2196602Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:37:31.219664829Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:31.219667822Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:37:31.219670965Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:31.219674072Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" coredns:\n"} +{"Time":"2023-05-31T19:37:31.219677122Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:37:31.219679932Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:37:31.21969119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:37:31.219694089Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Args:\n"} +{"Time":"2023-05-31T19:37:31.21969683Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -conf\n"} +{"Time":"2023-05-31T19:37:31.219699828Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:37:31.21970252Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Limits:\n"} +{"Time":"2023-05-31T19:37:31.219705469Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:37:31.219708682Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requests:\n"} +{"Time":"2023-05-31T19:37:31.219711552Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:37:31.219717166Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:37:31.21972021Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:37:31.219723589Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:37:31.219726418Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.2197294Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:31.21973222Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:37:31.219734978Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:31.219737835Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:37:31.21974095Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:37:31.219744119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:37:31.219747334Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:37:31.219753429Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:37:31.219759973Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:31.219763104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:37:31.219768299Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:37:31.219771592Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:37:31.21977544Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:37:31.219778544Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219781774Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:37:31.219784784Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:31.219787861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:31.219791036Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:31.219794148Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal ScalingReplicaSet 51s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T19:37:31.219797388Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal ScalingReplicaSet 51s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T19:37:31.219799891Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219801666Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219803566Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:37:31.219805516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: coredns-5d78c9869d-p8xrk\n"} +{"Time":"2023-05-31T19:37:31.219807355Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.219809231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T19:37:31.219811101Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:37:31.219813061Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:37:31.219814958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node: auto-509041/192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.219816879Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Start Time: Wed, 31 May 2023 19:36:31 +0000\n"} +{"Time":"2023-05-31T19:37:31.219818804Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:31.219820756Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T19:37:31.219824061Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219826058Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:31.219827948Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:37:31.219829871Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:31.219831774Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:37:31.219833626Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T19:37:31.219835448Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:31.219837208Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" coredns:\n"} +{"Time":"2023-05-31T19:37:31.219839137Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Container ID: containerd://52679206eeadacd7a6206628cb0721dcba4622e3f907c0af32135460293503ea\n"} +{"Time":"2023-05-31T19:37:31.219841128Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:37:31.219843141Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image ID: registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T19:37:31.219845604Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:37:31.219847511Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:37:31.219849357Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Args:\n"} +{"Time":"2023-05-31T19:37:31.21985115Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -conf\n"} +{"Time":"2023-05-31T19:37:31.219852958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:37:31.219854775Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:31.219856638Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Started: Wed, 31 May 2023 19:36:33 +0000\n"} +{"Time":"2023-05-31T19:37:31.219858523Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:31.219860564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:31.219862446Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Limits:\n"} +{"Time":"2023-05-31T19:37:31.219864265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:37:31.219866134Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requests:\n"} +{"Time":"2023-05-31T19:37:31.219867945Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:37:31.219869755Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:37:31.219871695Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:37:31.219877254Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:37:31.219879372Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.219881326Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:31.219883188Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:37:31.219885132Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-jjjpf (ro)\n"} +{"Time":"2023-05-31T19:37:31.219887044Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:31.219888879Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:31.219893568Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:31.219895478Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:31.219897334Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:31.219899188Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:31.219901006Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:31.21990298Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:37:31.219904871Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:37:31.219906774Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:37:31.219908744Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:37:31.21991064Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-api-access-jjjpf:\n"} +{"Time":"2023-05-31T19:37:31.219912637Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:37:31.219914627Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:37:31.219916564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:31.21991843Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:37:31.219920385Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:37:31.219922265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:37:31.219924247Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:37:31.219926232Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:37:31.21992974Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T19:37:31.21993375Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:37:31.219935832Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:37:31.219938Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:31.219939892Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:31.219941904Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:31.219943917Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Scheduled 51s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-p8xrk to auto-509041\n"} +{"Time":"2023-05-31T19:37:31.219946564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulled 50s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T19:37:31.219948761Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Created 50s kubelet Created container coredns\n"} +{"Time":"2023-05-31T19:37:31.219950761Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Started 49s kubelet Started container coredns\n"} +{"Time":"2023-05-31T19:37:31.219954231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Warning Unhealthy 31s (x4 over 49s) kubelet Readiness probe failed: HTTP probe failed with statuscode: 503\n"} +{"Time":"2023-05-31T19:37:31.219958287Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219960097Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.219961934Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:37:31.219963867Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:37:31.219965839Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.219967781Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.219969717Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:37:31.219971694Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.2199737Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.219975671Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.220750442Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.220767226Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.220771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.220774971Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:37:31.220778266Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [WARNING] plugin/kubernetes: starting server with unsynced Kubernetes API\n"} +{"Time":"2023-05-31T19:37:31.220790825Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" .:53\n"} +{"Time":"2023-05-31T19:37:31.220794658Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/reload: Running configuration SHA512 = 591cf328cccc12bc490481273e738df59329c62c0b729d94e8b61db9961c2fa5f046dd37f1cf888b953814040d180f52594972691cd6ff41be96639138a43908\n"} +{"Time":"2023-05-31T19:37:31.220798602Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T19:37:31.220802075Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T19:37:31.220813591Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:37:31.220817662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:37:31.220820705Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] Reloading\n"} +{"Time":"2023-05-31T19:37:31.220824112Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] plugin/reload: Running configuration SHA512 = b1a455670bb5d7fd89b1330085768be95fff75b4bad96aaa3401a966da5ff6e52d21b0affe6cd8290073027bf8b56132a09c4a2bf21619d1b275a531761a3578\n"} +{"Time":"2023-05-31T19:37:31.220830685Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] Reloading complete\n"} +{"Time":"2023-05-31T19:37:31.220833912Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 127.0.0.1:47098 - 57434 \"HINFO IN 5389645389131863739.6302800506695436482. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.02813954s\n"} +{"Time":"2023-05-31T19:37:31.220837987Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 10.244.0.4:51663 - 31684 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.00030148s\n"} +{"Time":"2023-05-31T19:37:31.220841373Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 10.244.0.4:46838 - 37068 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.00011233s\n"} +{"Time":"2023-05-31T19:37:31.220844701Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 10.244.0.4:43978 - 40519 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000096306s\n"} +{"Time":"2023-05-31T19:37:31.220850933Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 10.244.0.4:40473 - 24431 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000229065s\n"} +{"Time":"2023-05-31T19:37:31.220854471Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 10.244.0.4:40473 - 24202 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000232111s\n"} +{"Time":"2023-05-31T19:37:31.220961187Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 10.244.0.4:48118 - 34931 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000134932s\n"} +{"Time":"2023-05-31T19:37:31.220966962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 10.244.0.4:56483 - 3703 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.00006889s\n"} +{"Time":"2023-05-31T19:37:31.220970477Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [INFO] 10.244.0.4:43069 - 787 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000051989s\n"} +{"Time":"2023-05-31T19:37:31.220973837Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.220976541Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.22097949Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:37:31.220983167Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-apiserver-auto-509041\n"} +{"Time":"2023-05-31T19:37:31.220989571Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.220997666Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:37:31.221000841Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:37:31.221004068Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node: auto-509041/192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.22100721Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Start Time: Wed, 31 May 2023 19:36:18 +0000\n"} +{"Time":"2023-05-31T19:37:31.221010222Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T19:37:31.221013374Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T19:37:31.221016821Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.50.171:8443\n"} +{"Time":"2023-05-31T19:37:31.221020612Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/config.hash: 2b71540673f00b5460fbc0d63b155b33\n"} +{"Time":"2023-05-31T19:37:31.221032393Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/config.mirror: 2b71540673f00b5460fbc0d63b155b33\n"} +{"Time":"2023-05-31T19:37:31.221037548Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/config.seen: 2023-05-31T19:36:09.621190699Z\n"} +{"Time":"2023-05-31T19:37:31.221041971Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T19:37:31.22104503Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:31.221048183Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" SeccompProfile: RuntimeDefault\n"} +{"Time":"2023-05-31T19:37:31.221051071Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.221244381Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:31.221249961Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.221252881Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Controlled By: Node/auto-509041\n"} +{"Time":"2023-05-31T19:37:31.221255803Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:31.221262034Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T19:37:31.221265256Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Container ID: containerd://88e3247b22d95693e5cb8caefb662c780250f33957d93cbe616289f2680f675e\n"} +{"Time":"2023-05-31T19:37:31.221268807Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T19:37:31.221272047Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image ID: registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T19:37:31.221275328Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.221278578Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.22128168Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:31.22128468Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T19:37:31.221292645Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --advertise-address=192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.221296265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T19:37:31.221301973Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T19:37:31.221304955Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:37:31.221308253Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:37:31.221319412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T19:37:31.22132304Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T19:37:31.221326149Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T19:37:31.221332411Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T19:37:31.221335552Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T19:37:31.221338625Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T19:37:31.221343302Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T19:37:31.221346301Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T19:37:31.221349689Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T19:37:31.221352999Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T19:37:31.221360296Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T19:37:31.221363677Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T19:37:31.221366962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T19:37:31.221369907Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T19:37:31.221373169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T19:37:31.221376592Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T19:37:31.221382495Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:37:31.221385705Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T19:37:31.221388679Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T19:37:31.221391735Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T19:37:31.221394769Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T19:37:31.221397666Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T19:37:31.221400619Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:31.221404156Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Started: Wed, 31 May 2023 19:36:12 +0000\n"} +{"Time":"2023-05-31T19:37:31.221407041Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:31.221415449Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:31.221418636Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requests:\n"} +{"Time":"2023-05-31T19:37:31.221421398Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:37:31.221424281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Liveness: http-get https://192.168.50.171:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T19:37:31.221464781Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Readiness: http-get https://192.168.50.171:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:37:31.221468993Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Startup: http-get https://192.168.50.171:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T19:37:31.221472318Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.221475434Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:31.221478382Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T19:37:31.221481342Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T19:37:31.221484489Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T19:37:31.221492238Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:31.221495625Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:31.22149854Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:31.221508511Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:31.221511758Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:31.221514785Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:31.221517551Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:31.221521012Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca-certs:\n"} +{"Time":"2023-05-31T19:37:31.221524052Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:31.221527452Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:37:31.221530929Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:37:31.221534017Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T19:37:31.22154084Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:31.221544272Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:37:31.221547525Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:37:31.221550439Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T19:37:31.221553512Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:31.221556586Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T19:37:31.221666493Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:37:31.221674651Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:37:31.221677956Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.221680941Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:37:31.221684059Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:31.22168711Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:31.221690585Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:31.221694005Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulled 71s kubelet Container image \"registry.k8s.io/kube-apiserver:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:37:31.221697182Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Created 71s kubelet Created container kube-apiserver\n"} +{"Time":"2023-05-31T19:37:31.221700199Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Started 70s kubelet Started container kube-apiserver\n"} +{"Time":"2023-05-31T19:37:31.221703191Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.221705891Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.221708791Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:37:31.221712288Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:12.140508 1 server.go:551] external host was not specified, using 192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.221715905Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:12.143390 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T19:37:31.221719075Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:12.143499 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:37:31.221722941Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:12.670903 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T19:37:31.221726472Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:12.710497 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T19:37:31.221745124Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:12.710602 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T19:37:31.221750008Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:12.771557 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.221865407Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:12.771626 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.221870461Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:12.773229 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T19:37:31.221873583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.274371 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.221877458Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.274954 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:37:31.221881005Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.831028 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:37:31.221889025Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.871179 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.221892638Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.871313 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.221896104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.871418 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.221899668Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.873911 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.221902861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.874032 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.221906113Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.876571 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.22190937Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.877378 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.221912815Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.877496 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.221916401Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.877678 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.221932363Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.880940 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.221936168Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.881068 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.221939406Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.888108 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.222097882Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.888301 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222102968Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.888428 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222135225Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.891437 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.222139798Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.891578 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222143542Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.894143 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222147456Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.895205 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.222152137Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.899915 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.222155977Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.900024 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.22216318Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.900048 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222171504Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.902140 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.222179217Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.902252 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222183044Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.902379 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222186322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.905027 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.222189724Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.905139 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222192958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.908530 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.222196297Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.908646 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.222199827Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.908669 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.223995762Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.910912 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.224013412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.911054 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.22401767Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.911178 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224021297Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.914981 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.224025106Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.915100 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.2240286Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.915204 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224035441Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.918009 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.224039152Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.919259 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.224043863Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.919366 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224047421Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.919387 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224052133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.924900 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.224055675Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.924999 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224060097Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.925020 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224063263Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.927464 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.224070156Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.927541 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224074339Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.927646 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224078872Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.929999 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.224088179Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.930074 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224091917Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:13.947648 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:31.224095096Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:13.947812 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:31.224098523Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.790061 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:37:31.224102226Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.790576 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:37:31.224110268Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.791120 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T19:37:31.224114061Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.791392 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T19:37:31.224117423Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.791573 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T19:37:31.224120218Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.793504 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:37:31.224123771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.794094 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T19:37:31.224127083Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.794188 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:37:31.224134964Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.794615 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T19:37:31.224138421Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.794656 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:37:31.22414173Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.794683 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T19:37:31.224144992Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.794687 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T19:37:31.22414805Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.795260 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T19:37:31.224151849Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.795280 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T19:37:31.2241563Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.795405 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T19:37:31.22415974Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.795373 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:37:31.224163113Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.795759 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T19:37:31.22416648Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.796017 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T19:37:31.224172993Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.796213 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T19:37:31.224176952Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.796563 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T19:37:31.224180232Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.796801 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T19:37:31.224183284Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.797642 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T19:37:31.22419263Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.798268 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:37:31.22419607Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.798353 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T19:37:31.224199867Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.802024 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:37:31.224203776Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.802454 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:37:31.224207298Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.802993 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T19:37:31.2242104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.803107 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T19:37:31.224213507Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.803216 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T19:37:31.224219386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.803277 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T19:37:31.224222466Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.803303 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T19:37:31.224227232Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.803410 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T19:37:31.224230499Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.803436 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T19:37:31.224233833Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.843978 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T19:37:31.224237062Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.844012 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T19:37:31.224240246Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.935283 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:37:31.224246577Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.937195 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:37:31.224249809Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.938413 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T19:37:31.224253006Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.938455 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T19:37:31.224256439Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.939482 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T19:37:31.224259709Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.946810 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T19:37:31.224263262Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.971967 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T19:37:31.224266399Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.973953 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.224269412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.994772 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:37:31.22427245Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.994999 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T19:37:31.224275424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:14.995438 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T19:37:31.224278591Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:15.425029 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T19:37:31.224281876Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:15.801052 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T19:37:31.225012341Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:15.816242 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T19:37:31.225027077Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:15.816790 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T19:37:31.225037269Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:16.424454 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.225040922Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:16.476476 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.225044349Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:16.532318 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T19:37:31.225048017Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" W0531 19:36:16.545475 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.50.171]\n"} +{"Time":"2023-05-31T19:37:31.225051463Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:16.546865 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T19:37:31.225055104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:16.551562 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.225058479Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:16.884064 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T19:37:31.225061884Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:18.208360 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T19:37:31.225075246Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:18.234302 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T19:37:31.225079478Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:18.249063 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T19:37:31.22508271Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:31.159113 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T19:37:31.225091249Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:31.281297 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T19:37:31.225095074Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:37:03.603671 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.97.223.212]\n"} +{"Time":"2023-05-31T19:37:31.225098521Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.225101733Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.225104959Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:37:31.225306622Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/cni/net.d/1-k8s.conflist\r\n"} +{"Time":"2023-05-31T19:37:31.225312611Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.225316371Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225319308Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T19:37:31.225323021Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"name\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:37:31.225326304Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:37:31.225329361Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225335584Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:37:31.225338507Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"bridge\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:37:31.22534196Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"addIf\": \"true\",\r\n"} +{"Time":"2023-05-31T19:37:31.225344908Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"isDefaultGateway\": true,\r\n"} +{"Time":"2023-05-31T19:37:31.225347934Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"forceAddress\": false,\r\n"} +{"Time":"2023-05-31T19:37:31.225351055Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:37:31.22535394Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:37:31.225357088Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:37:31.225368785Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:37:31.225372248Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"subnet\": \"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T19:37:31.225375442Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.225378557Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:31.225381804Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225384618Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:37:31.225387651Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:37:31.22539082Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:37:31.225393917Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.225397042Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.225400192Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.225403383Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.22540632Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T19:37:31.225567145Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225572095Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T19:37:31.225581672Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T19:37:31.22558526Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:37:31.225588236Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225591381Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:37:31.225594707Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T19:37:31.225597996Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T19:37:31.225600956Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:37:31.225612265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:37:31.225615504Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:37:31.225618748Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:37:31.225622232Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T19:37:31.225629667Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T19:37:31.225632994Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [\r\n"} +{"Time":"2023-05-31T19:37:31.225636161Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225639514Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T19:37:31.225642665Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T19:37:31.225645801Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.225648924Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.225656575Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.225659148Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.225662065Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:31.225667707Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225670967Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:37:31.225673816Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:37:31.22567699Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:37:31.225679899Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.225835339Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:31.225840469Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225848789Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T19:37:31.225860759Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:31.225864578Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.225867929Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T19:37:31.225871159Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.22587417Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.225876736Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.225879538Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/cni/net.d/.keep\r\n"} +{"Time":"2023-05-31T19:37:31.225882583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.225885325Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.22588826Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:37:31.225891621Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:31.22590088Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T19:37:31.225904136Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T19:37:31.225907369Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:37:31.225910886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 2: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:31.225914313Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether 52:54:00:98:26:ea brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:37:31.225921458Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" inet 192.168.50.171/24 brd 192.168.50.255 scope global dynamic eth0\r\n"} +{"Time":"2023-05-31T19:37:31.225924808Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" valid_lft 3499sec preferred_lft 3499sec\r\n"} +{"Time":"2023-05-31T19:37:31.225928965Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3: eth1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:31.225935018Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether 52:54:00:06:d5:e3 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:37:31.225938416Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" inet 192.168.122.161/24 brd 192.168.122.255 scope global dynamic eth1\r\n"} +{"Time":"2023-05-31T19:37:31.225941836Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" valid_lft 3499sec preferred_lft 3499sec\r\n"} +{"Time":"2023-05-31T19:37:31.227124475Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 4: sit0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:31.227138451Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/sit 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T19:37:31.227142479Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 5: bridge: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:31.227145852Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether 5a:cc:86:98:36:b3 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:37:31.227149301Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" inet 10.244.0.1/16 brd 10.244.255.255 scope global bridge\r\n"} +{"Time":"2023-05-31T19:37:31.227152226Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:37:31.227155503Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 6: veth0c1c43a1@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T19:37:31.227159365Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether d2:f3:a3:f7:70:23 brd ff:ff:ff:ff:ff:ff link-netns cni-0d55174d-957c-0d92-3851-56a11c61f814\r\n"} +{"Time":"2023-05-31T19:37:31.22716244Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 8: vethd2dedbe1@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T19:37:31.227165719Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" link/ether 9e:c2:ad:03:58:68 brd ff:ff:ff:ff:ff:ff link-netns cni-c2527efc-294f-9fc7-9a62-4a749b879d78\r\n"} +{"Time":"2023-05-31T19:37:31.227186023Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.227189509Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.227192937Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:37:31.227197076Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default via 192.168.122.1 dev eth1 proto dhcp src 192.168.122.161 metric 1024 \r\n"} +{"Time":"2023-05-31T19:37:31.22720122Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 10.244.0.0/16 dev bridge proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T19:37:31.22720509Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.50.0/24 dev eth0 proto kernel scope link src 192.168.50.171 \r\n"} +{"Time":"2023-05-31T19:37:31.227208997Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.122.0/24 dev eth1 proto kernel scope link src 192.168.122.161 \r\n"} +{"Time":"2023-05-31T19:37:31.227213391Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.122.1 dev eth1 proto dhcp scope link src 192.168.122.161 metric 1024 \r\n"} +{"Time":"2023-05-31T19:37:31.227216769Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.227219879Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.227223264Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:37:31.22722716Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:37:23 2023\r\n"} +{"Time":"2023-05-31T19:37:31.227232274Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" *nat\r\n"} +{"Time":"2023-05-31T19:37:31.227235519Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :PREROUTING ACCEPT [26:1560]\r\n"} +{"Time":"2023-05-31T19:37:31.227238741Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :INPUT ACCEPT [26:1560]\r\n"} +{"Time":"2023-05-31T19:37:31.227242788Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :OUTPUT ACCEPT [17:1020]\r\n"} +{"Time":"2023-05-31T19:37:31.227246139Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :POSTROUTING ACCEPT [17:1020]\r\n"} +{"Time":"2023-05-31T19:37:31.227249369Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :CNI-1f81d8d4b810fb85ac6ad74e - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227256381Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :CNI-dfce0faf69cefd6c9b09d73f - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.22726021Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227263818Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227267066Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.22727074Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227274281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227277731Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227281281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-MV3TOXN6ZQLABT3O - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227291425Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227295638Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-XPTUC4FRAFEFDBGF - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227299205Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227302545Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227306431Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227309883Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227313437Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227317149Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227320263Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227323008Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:31.227327135Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:31.22733115Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:37:31.227336071Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A POSTROUTING -s 10.244.0.2/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"6b07b913b48703bc7399163d87ec3435b8e7d64f9570b9eed09bf852aa5e73b5\\\"\" -j CNI-dfce0faf69cefd6c9b09d73f\r\n"} +{"Time":"2023-05-31T19:37:31.227341301Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A POSTROUTING -s 10.244.0.4/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"3fcf25ba51e6819ddcae3d1bd10166ad457877d1bc8f0503bc24a04960a7e569\\\"\" -j CNI-1f81d8d4b810fb85ac6ad74e\r\n"} +{"Time":"2023-05-31T19:37:31.227345708Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A CNI-1f81d8d4b810fb85ac6ad74e -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"3fcf25ba51e6819ddcae3d1bd10166ad457877d1bc8f0503bc24a04960a7e569\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:37:31.22735001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A CNI-1f81d8d4b810fb85ac6ad74e ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"3fcf25ba51e6819ddcae3d1bd10166ad457877d1bc8f0503bc24a04960a7e569\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T19:37:31.227356875Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A CNI-dfce0faf69cefd6c9b09d73f -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"6b07b913b48703bc7399163d87ec3435b8e7d64f9570b9eed09bf852aa5e73b5\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:37:31.227361272Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A CNI-dfce0faf69cefd6c9b09d73f ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"6b07b913b48703bc7399163d87ec3435b8e7d64f9570b9eed09bf852aa5e73b5\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T19:37:31.227369505Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:37:31.22737275Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:37:31.227376481Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T19:37:31.227380072Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:37:31.227384007Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.227388367Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:37:31.227392011Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-MV3TOXN6ZQLABT3O -s 192.168.50.171/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.227395911Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-MV3TOXN6ZQLABT3O -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.50.171:8443\r\n"} +{"Time":"2023-05-31T19:37:31.227400109Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.227403891Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:37:31.22740949Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -s 10.244.0.4/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.227414339Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T19:37:31.227418429Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.227422574Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:37:31.227426308Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T19:37:31.227430929Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T19:37:31.227434948Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.97.223.212/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T19:37:31.227439602Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T19:37:31.22744413Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T19:37:31.227452258Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:37:31.227456537Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.227460643Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T19:37:31.227464412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.22746854Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T19:37:31.227477496Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.22749735Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.50.171:8443\" -j KUBE-SEP-MV3TOXN6ZQLABT3O\r\n"} +{"Time":"2023-05-31T19:37:31.227501987Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.22750611Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T19:37:31.227516445Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.97.223.212/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:31.227520593Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.4:8080\" -j KUBE-SEP-XPTUC4FRAFEFDBGF\r\n"} +{"Time":"2023-05-31T19:37:31.227524337Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:37:31.227527997Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Completed on Wed May 31 19:37:23 2023\r\n"} +{"Time":"2023-05-31T19:37:31.227531727Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:37:23 2023\r\n"} +{"Time":"2023-05-31T19:37:31.227535415Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" *mangle\r\n"} +{"Time":"2023-05-31T19:37:31.227538813Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :PREROUTING ACCEPT [19556:58905655]\r\n"} +{"Time":"2023-05-31T19:37:31.22754238Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :INPUT ACCEPT [19506:58901847]\r\n"} +{"Time":"2023-05-31T19:37:31.227546155Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :FORWARD ACCEPT [48:3728]\r\n"} +{"Time":"2023-05-31T19:37:31.227549442Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :OUTPUT ACCEPT [16647:8703266]\r\n"} +{"Time":"2023-05-31T19:37:31.227552793Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :POSTROUTING ACCEPT [16695:8706994]\r\n"} +{"Time":"2023-05-31T19:37:31.22755655Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227560078Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227563424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227566416Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:37:31.227569906Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Completed on Wed May 31 19:37:23 2023\r\n"} +{"Time":"2023-05-31T19:37:31.227573421Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:37:23 2023\r\n"} +{"Time":"2023-05-31T19:37:31.227580602Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" *filter\r\n"} +{"Time":"2023-05-31T19:37:31.227587474Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :INPUT ACCEPT [6251:1296537]\r\n"} +{"Time":"2023-05-31T19:37:31.227592084Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :FORWARD ACCEPT [16:927]\r\n"} +{"Time":"2023-05-31T19:37:31.227595224Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :OUTPUT ACCEPT [6143:1589228]\r\n"} +{"Time":"2023-05-31T19:37:31.227598539Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.22760183Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227605466Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227609104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227612424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227615798Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227619227Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227622502Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:31.227625967Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:31.227629828Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:37:31.227634Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:31.227637549Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:31.227641199Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:31.227645171Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T19:37:31.227651566Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:31.227656291Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:31.227660623Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:31.227664837Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:31.227668719Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:31.227676193Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T19:37:31.227680301Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:37:31.22768428Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:37:31.22768848Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:37:31.227692435Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:37:31.227696177Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Completed on Wed May 31 19:37:23 2023\r\n"} +{"Time":"2023-05-31T19:37:31.22769959Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.227702661Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.227708993Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:37:31.22771225Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain PREROUTING (policy ACCEPT 27 packets, 1620 bytes)\r\n"} +{"Time":"2023-05-31T19:37:31.227714983Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227718802Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 61 4070 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:37:31.227722576Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227726139Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain INPUT (policy ACCEPT 27 packets, 1620 bytes)\r\n"} +{"Time":"2023-05-31T19:37:31.227729862Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227853241Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227857228Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain OUTPUT (policy ACCEPT 17 packets, 1020 bytes)\r\n"} +{"Time":"2023-05-31T19:37:31.227861069Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227864776Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 109 6602 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:37:31.227868753Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227871973Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain POSTROUTING (policy ACCEPT 17 packets, 1020 bytes)\r\n"} +{"Time":"2023-05-31T19:37:31.227876029Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227879939Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 122 7592 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T19:37:31.227883996Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3 230 CNI-dfce0faf69cefd6c9b09d73f all -- * * 10.244.0.2 0.0.0.0/0 /* name: \"bridge\" id: \"6b07b913b48703bc7399163d87ec3435b8e7d64f9570b9eed09bf852aa5e73b5\" */\r\n"} +{"Time":"2023-05-31T19:37:31.227888543Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 9 675 CNI-1f81d8d4b810fb85ac6ad74e all -- * * 10.244.0.4 0.0.0.0/0 /* name: \"bridge\" id: \"3fcf25ba51e6819ddcae3d1bd10166ad457877d1bc8f0503bc24a04960a7e569\" */\r\n"} +{"Time":"2023-05-31T19:37:31.227892537Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227896386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain CNI-1f81d8d4b810fb85ac6ad74e (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.227899915Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227903976Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 9 675 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"3fcf25ba51e6819ddcae3d1bd10166ad457877d1bc8f0503bc24a04960a7e569\" */\r\n"} +{"Time":"2023-05-31T19:37:31.22790761Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"3fcf25ba51e6819ddcae3d1bd10166ad457877d1bc8f0503bc24a04960a7e569\" */\r\n"} +{"Time":"2023-05-31T19:37:31.227911488Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227914556Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain CNI-dfce0faf69cefd6c9b09d73f (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.22791742Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227921157Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"6b07b913b48703bc7399163d87ec3435b8e7d64f9570b9eed09bf852aa5e73b5\" */\r\n"} +{"Time":"2023-05-31T19:37:31.227925871Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 3 230 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"6b07b913b48703bc7399163d87ec3435b8e7d64f9570b9eed09bf852aa5e73b5\" */\r\n"} +{"Time":"2023-05-31T19:37:31.227929962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227933426Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:37:31.227936946Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227940851Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227944436Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T19:37:31.227948139Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227952311Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T19:37:31.227955692Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227959821Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.227963861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227972976Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227977014Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.227981133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.227984587Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 53 3331 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:37:31.227988009Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T19:37:31.22799107Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T19:37:31.227994484Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.227997946Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228001996Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.22800557Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228009379Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228016341Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228019921Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T19:37:31.228023766Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:37:31.228031282Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228038797Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-MV3TOXN6ZQLABT3O (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228043184Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228081205Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ all -- * * 192.168.50.171 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T19:37:31.228085706Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 2 120 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.50.171:8443\r\n"} +{"Time":"2023-05-31T19:37:31.228089315Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228093099Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228096821Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228100962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T19:37:31.22810546Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:37:31.228109071Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228112777Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-XPTUC4FRAFEFDBGF (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228116661Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228123608Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.4 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T19:37:31.228136198Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T19:37:31.22813983Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228143848Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228147829Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228152486Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T19:37:31.228159909Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:37:31.228163761Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228167294Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T19:37:31.22817085Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228217315Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:37:31.228222529Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:37:31.228226221Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.97.223.212 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:37:31.228229812Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:37:31.228234368Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:37:31.228239127Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 78 4680 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T19:37:31.228243595Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228247178Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228284548Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228289065Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:37:31.228297628Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:37:31.228302028Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228305019Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228308213Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228311001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:37:31.22831437Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T19:37:31.228318022Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228402824Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228413476Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228417394Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:37:31.228421156Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 2 120 KUBE-SEP-MV3TOXN6ZQLABT3O all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.50.171:8443 */\r\n"} +{"Time":"2023-05-31T19:37:31.228424856Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228428283Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228431568Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228435712Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:37:31.228439226Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:37:31.228442737Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.228445873Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T19:37:31.228452941Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:31.228456814Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.97.223.212 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:37:31.228460126Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 1 60 KUBE-SEP-XPTUC4FRAFEFDBGF all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.4:8080 */\r\n"} +{"Time":"2023-05-31T19:37:31.228463178Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.228465893Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.228468539Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:37:31.228471561Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.22847451Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.228477544Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:37:31.228480618Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.228609637Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:37:31.228617825Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:37:31.22862188Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:37:31.228625258Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:37:31.228628607Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:37:31.228631995Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:37:31.228635453Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:37:31.228646338Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:37:31.228650022Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.228653323Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.228665113Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:31.22866809Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:37:31.228671189Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:37:31.22867482Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.228679059Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.228682656Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:31.228686023Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.228689943Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:37:31.228693932Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:37:31.228697253Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment:\n"} +{"Time":"2023-05-31T19:37:31.228700868Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:37:31.228704235Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:31.228707775Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:37:31.22871171Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:37:31.228715208Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:37:31.228718535Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:31.228838009Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:37:31.228842633Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:37:31.228845449Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.228847999Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:37:31.22885058Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:37:31.228853936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:31.228857655Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:37:31.228860295Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:37:31.228862813Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:37:31.228865955Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:31.228868588Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:37:31.22887109Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:37:31.228873585Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:37:31.228876123Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:31.22887861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:31.228888368Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:31.228891941Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal SuccessfulCreate 53s daemonset-controller Created pod: kube-proxy-79w7r\n"} +{"Time":"2023-05-31T19:37:31.22889515Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.228897962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.228901083Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:37:31.22891286Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-proxy-79w7r\n"} +{"Time":"2023-05-31T19:37:31.228918668Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.228921725Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:37:31.2289245Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:37:31.228930371Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.228933302Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node: auto-509041/192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.229087542Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Start Time: Wed, 31 May 2023 19:36:31 +0000\n"} +{"Time":"2023-05-31T19:37:31.229094272Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T19:37:31.229098057Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.229101942Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:37:31.229117932Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.229121486Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:31.229124725Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.229127683Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:31.229130774Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP: 192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.229133814Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.229136792Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:31.229139632Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:37:31.229142661Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Container ID: containerd://93ff01808f0497867e9810bf9dba0c3826bdff51d42ee768b8916601f1b18071\n"} +{"Time":"2023-05-31T19:37:31.229149746Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:37:31.229153134Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Image ID: registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T19:37:31.229156417Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.229159602Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:31.229162764Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:31.229165885Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.229168979Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:37:31.229172147Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:37:31.22917523Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:31.229178341Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Started: Wed, 31 May 2023 19:36:33 +0000\n"} +{"Time":"2023-05-31T19:37:31.229181378Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:31.229184668Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:31.229309268Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment:\n"} +{"Time":"2023-05-31T19:37:31.229314113Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:37:31.2293177Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:31.229320918Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:37:31.229324806Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:37:31.229328231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:37:31.229331661Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-jgzfp (ro)\n"} +{"Time":"2023-05-31T19:37:31.229335088Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:31.229338173Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:31.229341269Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:31.229344439Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:31.229347563Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:31.229350602Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:31.229372135Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:31.229376321Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:37:31.229382832Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:37:31.229386294Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.229389426Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:37:31.229393725Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:37:31.229399524Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:31.229403264Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:37:31.229406572Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:37:31.229409708Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:37:31.229413141Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:31.229416661Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:37:31.229423333Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:37:31.229430083Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-api-access-jgzfp:\n"} +{"Time":"2023-05-31T19:37:31.229589279Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:37:31.229594748Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:37:31.2295985Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:31.229602043Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:37:31.229607624Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:37:31.229611054Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:37:31.229614343Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:37:31.229617657Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T19:37:31.229621104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:31.229624987Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:31.229629583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:31.229633763Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:37:31.229637753Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:31.229641453Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:37:31.229649046Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:31.229652944Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:31.229676175Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:31.22968347Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:31.22968735Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Scheduled 53s default-scheduler Successfully assigned kube-system/kube-proxy-79w7r to auto-509041\n"} +{"Time":"2023-05-31T19:37:31.229692783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Pulled 52s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:37:31.229696603Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Created 52s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.229703015Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Normal Started 51s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.229780833Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.229815483Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.229819531Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:37:31.229823937Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.655508 1 node.go:141] Successfully retrieved node IP: 192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.229834157Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.655572 1 server_others.go:110] \"Detected node IP\" address=\"192.168.50.171\"\n"} +{"Time":"2023-05-31T19:37:31.229837518Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.655587 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T19:37:31.229840974Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.711366 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T19:37:31.229844781Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.711469 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T19:37:31.229848249Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.711498 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T19:37:31.229852035Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.712979 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T19:37:31.229855409Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.713027 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:37:31.229888723Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.714140 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T19:37:31.229893017Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.714195 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T19:37:31.229896182Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.714218 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T19:37:31.229899612Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.714223 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T19:37:31.229902909Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.714867 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T19:37:31.229906703Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.715004 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T19:37:31.229916659Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.815348 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T19:37:31.229920012Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.815403 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T19:37:31.230050818Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" I0531 19:36:33.815425 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T19:37:31.230063328Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.230066802Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.230070199Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:37:31.230073927Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:37:31.23008375Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: loaded (\u001b]8;;file://auto-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:37:31.230087885Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T19:37:31.230091448Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─\u001b]8;;file://auto-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:37:31.230095698Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:36:18 UTC; 1min 6s ago\r\n"} +{"Time":"2023-05-31T19:37:31.230099263Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:37:31.230113295Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Main PID: 1242 (kubelet)\r\n"} +{"Time":"2023-05-31T19:37:31.230116828Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tasks: 12 (limit: 3251)\r\n"} +{"Time":"2023-05-31T19:37:31.230120104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Memory: 33.2M\r\n"} +{"Time":"2023-05-31T19:37:31.230123539Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T19:37:31.230127721Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─1242 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=auto-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.50.171\r\n"} +{"Time":"2023-05-31T19:37:31.230132242Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.230135942Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:46 auto-509041 kubelet[1242]: I0531 19:36:46.502387 1242 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=14941ccf-4388-466a-ad78-0d9d3c97e5a5 path=\"/var/lib/kubelet/pods/14941ccf-4388-466a-ad78-0d9d3c97e5a5/volumes\"\r\n"} +{"Time":"2023-05-31T19:37:31.230141261Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:03 auto-509041 kubelet[1242]: I0531 19:37:03.546475 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.230145131Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:03 auto-509041 kubelet[1242]: E0531 19:37:03.546583 1242 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T19:37:31.230232968Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:03 auto-509041 kubelet[1242]: I0531 19:37:03.546611 1242 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T19:37:31.230244518Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:03 auto-509041 kubelet[1242]: I0531 19:37:03.697765 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-p6m56\\\" (UniqueName: \\\"kubernetes.io/projected/58d70507-7d92-46ab-9e13-bcb97899f688-kube-api-access-p6m56\\\") pod \\\"netcat-7458db8b8-z5czz\\\" (UID: \\\"58d70507-7d92-46ab-9e13-bcb97899f688\\\") \" pod=\"default/netcat-7458db8b8-z5czz\"\r\n"} +{"Time":"2023-05-31T19:37:31.230250314Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 kubelet[1242]: E0531 19:37:18.572848 1242 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:37:31.230258441Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 kubelet[1242]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:37:31.230267871Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 kubelet[1242]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:37:31.230271678Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 kubelet[1242]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:37:31.230292987Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:20 auto-509041 kubelet[1242]: E0531 19:37:20.666857 1242 upgradeaware.go:426] Error proxying data from client to backend: readfrom tcp 192.168.122.161:34356-\u003e192.168.122.161:10010: write tcp 192.168.122.161:34356-\u003e192.168.122.161:10010: write: broken pipe\r\n"} +{"Time":"2023-05-31T19:37:31.23029691Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.230299865Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.230303049Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:37:31.230306757Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.230310401Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:31.230314218Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:37:31.2303178Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T19:37:31.230321218Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T19:37:31.230324524Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.230331137Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:31.23042566Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T19:37:31.230439063Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:37:31.230443368Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T19:37:31.230449637Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T19:37:31.230453327Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.230457463Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:31.230460867Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:31.230467975Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.230471771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.23047955Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:31.230482786Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Wants=containerd.service\r\n"} +{"Time":"2023-05-31T19:37:31.230486024Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.2304911Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:31.230502359Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T19:37:31.230509844Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=auto-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.50.171\r\n"} +{"Time":"2023-05-31T19:37:31.230514027Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.230517169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:31.230520089Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.230525894Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.230528922Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:37:31.230532619Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -- Journal begins at Wed 2023-05-31 19:35:37 UTC, ends at Wed 2023-05-31 19:37:24 UTC. --\r\n"} +{"Time":"2023-05-31T19:37:31.230536047Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:37:31.230546003Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.230550564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.230656085Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.23066099Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.230664965Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.230676169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.230679687Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 554.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.230683853Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:37:31.230687457Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.595361 865 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:37:31.230690901Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.595511 865 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.230695412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.595841 865 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:37:31.230698782Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.601012 865 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:37:31.230702767Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.601332 865 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.230706764Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.605085 865 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:37:31.230710015Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.605553 865 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:37:31.230714549Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.605624 865 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:37:31.230886042Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.605641 865 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:37:31.230891713Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.605651 865 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:37:31.230895644Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.605771 865 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:31.230899419Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.610144 865 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:37:31.230903243Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.610198 865 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:37:31.230906645Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.610218 865 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:37:31.230910065Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.610230 865 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:37:31.230913472Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.613969 865 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:37:31.230918085Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: W0531 19:36:09.614232 865 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T19:37:31.230922958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.614548 865 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:37:31.230927482Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: W0531 19:36:09.614669 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dauto-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.23113768Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.614765 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dauto-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.231147931Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.616371 865 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:37:31.231151896Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.621927 865 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:37:31.231157771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.622074 865 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"auto-509041.1764517fbcda69a6\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"auto-509041\", UID:\"auto-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"auto-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 36, 9, 614535078, time.Local), LastTimestamp:time.Date(2023, time."} +{"Time":"2023-05-31T19:37:31.231167631Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"May, 31, 19, 36, 9, 614535078, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.50.171:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:37:31.231177421Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.624475 865 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:37:31.231180876Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.625102 865 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:37:31.231185254Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: W0531 19:36:09.627354 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.231345335Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.627421 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.231351662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.627945 865 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:37:31.231356162Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.629087 865 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:37:31.231360151Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.629960 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/auto-509041?timeout=10s\\\": dial tcp 192.168.50.171:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T19:37:31.231365133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: W0531 19:36:09.635900 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.231373062Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.635969 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.23137701Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.661377 865 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:37:31.231384595Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.661414 865 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:37:31.231388486Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.661429 865 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:31.23139554Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.667674 865 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:37:31.231399586Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.668311 865 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:37:31.231556233Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.668392 865 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:31.231575841Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.680965 865 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:37:31.231580813Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.681355 865 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:37:31.231584339Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.682613 865 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"auto-509041\\\" not found\"\r\n"} +{"Time":"2023-05-31T19:37:31.231588626Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.684073 865 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:37:31.231592102Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.728989 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.231596309Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.729823 865 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.50.171:8443: connect: connection refused\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.231601133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.788119 865 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:37:31.231607413Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.788169 865 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:37:31.23161881Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.788185 865 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:37:31.231623464Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.788223 865 kubelet.go:2281] \"Skipping pod synchronization\" err=\"PLEG is not healthy: pleg has yet to be successful\"\r\n"} +{"Time":"2023-05-31T19:37:31.231631765Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: W0531 19:36:09.789949 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.231636805Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.790020 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.231809481Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.794435 865 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:37:31.23181936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:37:31.231823665Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:37:31.231830403Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:37:31.231841087Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.831200 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/auto-509041?timeout=10s\\\": dial tcp 192.168.50.171:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T19:37:31.231848632Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.888583 865 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.231852289Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.889653 865 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.231855839Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.891416 865 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.231865497Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.892882 865 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.231869189Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: I0531 19:36:09.931059 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.231873342Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:09 auto-509041 kubelet[865]: E0531 19:36:09.931875 865 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.50.171:8443: connect: connection refused\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.231881129Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.030510 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/4f6d4dc27e55517aab6eeaf247a30b5d-etcd-certs\\\") pod \\\"etcd-auto-509041\\\" (UID: \\\"4f6d4dc27e55517aab6eeaf247a30b5d\\\") \" pod=\"kube-system/etcd-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.232012153Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.030936 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/2b71540673f00b5460fbc0d63b155b33-ca-certs\\\") pod \\\"kube-apiserver-auto-509041\\\" (UID: \\\"2b71540673f00b5460fbc0d63b155b33\\\") \" pod=\"kube-system/kube-apiserver-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.23202305Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.031151 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/2b71540673f00b5460fbc0d63b155b33-k8s-certs\\\") pod \\\"kube-apiserver-auto-509041\\\" (UID: \\\"2b71540673f00b5460fbc0d63b155b33\\\") \" pod=\"kube-system/kube-apiserver-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.23202899Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.031248 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-ca-certs\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.232037021Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.031505 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-k8s-certs\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.232073999Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.031605 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/4f6d4dc27e55517aab6eeaf247a30b5d-etcd-data\\\") pod \\\"etcd-auto-509041\\\" (UID: \\\"4f6d4dc27e55517aab6eeaf247a30b5d\\\") \" pod=\"kube-system/etcd-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.232101369Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.031810 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/2b71540673f00b5460fbc0d63b155b33-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-auto-509041\\\" (UID: \\\"2b71540673f00b5460fbc0d63b155b33\\\") \" pod=\"kube-system/kube-apiserver-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.232110491Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.032002 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-flexvolume-dir\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.233493851Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.032098 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-kubeconfig\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.233507111Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.032336 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.233513519Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.032552 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/10b8f3ceca5e86d0e7e2353035ab60e0-kubeconfig\\\") pod \\\"kube-scheduler-auto-509041\\\" (UID: \\\"10b8f3ceca5e86d0e7e2353035ab60e0\\\") \" pod=\"kube-system/kube-scheduler-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.233524742Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: E0531 19:36:10.232329 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/auto-509041?timeout=10s\\\": dial tcp 192.168.50.171:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T19:37:31.233535033Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: I0531 19:36:10.335818 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.233539009Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: E0531 19:36:10.337970 865 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.50.171:8443: connect: connection refused\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.233543754Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: W0531 19:36:10.496447 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.233548447Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: E0531 19:36:10.496478 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.237057386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: W0531 19:36:10.618117 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.237069963Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: E0531 19:36:10.618151 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.237075136Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: W0531 19:36:10.738132 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dauto-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.237083716Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:10 auto-509041 kubelet[865]: E0531 19:36:10.738180 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dauto-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.23708886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:11 auto-509041 kubelet[865]: W0531 19:36:11.017137 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.237096703Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:11 auto-509041 kubelet[865]: E0531 19:36:11.017349 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.237101815Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:11 auto-509041 kubelet[865]: E0531 19:36:11.033027 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/auto-509041?timeout=10s\\\": dial tcp 192.168.50.171:8443: connect: connection refused\" interval=\"1.6s\"\r\n"} +{"Time":"2023-05-31T19:37:31.237116016Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:11 auto-509041 kubelet[865]: I0531 19:36:11.153119 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.23712523Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:11 auto-509041 kubelet[865]: E0531 19:36:11.153460 865 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.50.171:8443: connect: connection refused\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237133492Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:11 auto-509041 kubelet[865]: E0531 19:36:11.606501 865 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.50.171:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:31.237138287Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:12 auto-509041 kubelet[865]: I0531 19:36:12.755001 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237145687Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:14 auto-509041 kubelet[865]: E0531 19:36:14.932971 865 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"auto-509041\\\" not found\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237151514Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:14 auto-509041 kubelet[865]: I0531 19:36:14.964577 865 kubelet_node_status.go:73] \"Successfully registered node\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237159675Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:15 auto-509041 kubelet[865]: I0531 19:36:15.624062 865 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:37:31.237164289Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:15 auto-509041 kubelet[865]: I0531 19:36:15.629979 865 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:37:31.237171069Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:15 auto-509041 kubelet[865]: I0531 19:36:15.681257 865 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:37:31.237175085Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[865]: I0531 19:36:18.143578 865 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:37:31.237190944Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T19:37:31.237195489Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237202788Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237206649Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237214619Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237218502Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237223215Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237226872Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 608.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237234492Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 systemd[1]: kubelet.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:37:31.237239109Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237245783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237249701Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237256642Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237260406Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237273356Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:37:31.237277221Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237283838Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237287495Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237294157Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.23729798Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237304547Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237308576Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 608 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.23731519Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:37:31.237320165Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237326484Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237330485Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237336757Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237340758Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237347585Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.23735121Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 608.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.237358312Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:37:31.237362674Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.294298 1242 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:37:31.237372402Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.294380 1242 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.237376572Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.294627 1242 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:37:31.237383563Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.305544 1242 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T19:37:31.237388031Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.316877 1242 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:37:31.237395042Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.356842 1242 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:37:31.237399011Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.357419 1242 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:37:31.237408183Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.357498 1242 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:37:31.237418204Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.357521 1242 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:37:31.237426681Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.357540 1242 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:37:31.237435041Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.357575 1242 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:31.237442081Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.363688 1242 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:37:31.237445611Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.363835 1242 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:37:31.237452564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.363882 1242 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:37:31.237458853Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.363927 1242 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:37:31.237465588Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.367838 1242 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:37:31.237469954Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.368276 1242 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:37:31.237474185Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.378229 1242 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:37:31.237481119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.386629 1242 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:37:31.237486258Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.387936 1242 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:37:31.237489898Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.392068 1242 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:37:31.237493858Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.419255 1242 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:37:31.23750032Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.436365 1242 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:37:31.237511215Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.489979 1242 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:37:31.237515805Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.497143 1242 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:37:31.237530963Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.497262 1242 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:37:31.237535008Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.497382 1242 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:37:31.237542074Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: E0531 19:36:18.497498 1242 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:37:31.237546217Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.527006 1242 kubelet_node_status.go:70] \"Attempting to register node\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237552517Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.554750 1242 kubelet_node_status.go:108] \"Node was previously registered\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237556671Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.554828 1242 kubelet_node_status.go:73] \"Successfully registered node\" node=\"auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237563402Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: E0531 19:36:18.565944 1242 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:37:31.237567547Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:37:31.237577595Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:37:31.23758142Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:37:31.237588641Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: E0531 19:36:18.600654 1242 kubelet.go:2281] \"Skipping pod synchronization\" err=\"container runtime status check may not have completed yet\"\r\n"} +{"Time":"2023-05-31T19:37:31.237592488Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.707582 1242 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:37:31.237599177Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.707639 1242 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:37:31.237602831Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.707668 1242 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:31.237610546Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.707932 1242 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.237616311Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.707987 1242 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T19:37:31.237623237Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.707999 1242 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:37:31.237627357Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.712044 1242 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:37:31.237631633Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.712149 1242 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:31.23763503Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.712383 1242 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T19:37:31.237642303Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.714153 1242 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:37:31.237646636Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.716149 1242 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T19:37:31.237654353Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.716873 1242 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:37:31.237662448Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.801844 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.237666192Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.802021 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.23767842Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.802295 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.237682928Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.802666 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.23768936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: E0531 19:36:18.832614 1242 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-auto-509041\\\" already exists\" pod=\"kube-system/kube-apiserver-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.23769413Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.838801 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237703327Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.839077 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/4f6d4dc27e55517aab6eeaf247a30b5d-etcd-certs\\\") pod \\\"etcd-auto-509041\\\" (UID: \\\"4f6d4dc27e55517aab6eeaf247a30b5d\\\") \" pod=\"kube-system/etcd-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237714325Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.839678 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/2b71540673f00b5460fbc0d63b155b33-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-auto-509041\\\" (UID: \\\"2b71540673f00b5460fbc0d63b155b33\\\") \" pod=\"kube-system/kube-apiserver-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237722512Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.840084 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/2b71540673f00b5460fbc0d63b155b33-k8s-certs\\\") pod \\\"kube-apiserver-auto-509041\\\" (UID: \\\"2b71540673f00b5460fbc0d63b155b33\\\") \" pod=\"kube-system/kube-apiserver-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.237727482Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.840415 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-ca-certs\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.238181044Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.840966 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-flexvolume-dir\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.238202439Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.841403 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-k8s-certs\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.23820914Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.841821 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/bb388e8a74e2f2019e1cfd4e255f8117-kubeconfig\\\") pod \\\"kube-controller-manager-auto-509041\\\" (UID: \\\"bb388e8a74e2f2019e1cfd4e255f8117\\\") \" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.238220963Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.842180 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/10b8f3ceca5e86d0e7e2353035ab60e0-kubeconfig\\\") pod \\\"kube-scheduler-auto-509041\\\" (UID: \\\"10b8f3ceca5e86d0e7e2353035ab60e0\\\") \" pod=\"kube-system/kube-scheduler-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.238237942Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.842374 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/4f6d4dc27e55517aab6eeaf247a30b5d-etcd-data\\\") pod \\\"etcd-auto-509041\\\" (UID: \\\"4f6d4dc27e55517aab6eeaf247a30b5d\\\") \" pod=\"kube-system/etcd-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.238243919Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:18 auto-509041 kubelet[1242]: I0531 19:36:18.842685 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/2b71540673f00b5460fbc0d63b155b33-ca-certs\\\") pod \\\"kube-apiserver-auto-509041\\\" (UID: \\\"2b71540673f00b5460fbc0d63b155b33\\\") \" pod=\"kube-system/kube-apiserver-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.238252716Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: I0531 19:36:19.368066 1242 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:37:31.238261297Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: I0531 19:36:19.437228 1242 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:37:31.238350442Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: I0531 19:36:19.447943 1242 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:37:31.238359323Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: E0531 19:36:19.549304 1242 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-auto-509041\\\" already exists\" pod=\"kube-system/kube-controller-manager-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.238374771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: E0531 19:36:19.551449 1242 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-auto-509041\\\" already exists\" pod=\"kube-system/kube-apiserver-auto-509041\"\r\n"} +{"Time":"2023-05-31T19:37:31.238380185Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: I0531 19:36:19.589397 1242 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-auto-509041\" podStartSLOduration=3.589143532 podCreationTimestamp=\"2023-05-31 19:36:16 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:19.566079852 +0000 UTC m=+1.392076025\" watchObservedRunningTime=\"2023-05-31 19:36:19.589143532 +0000 UTC m=+1.415139686\"\r\n"} +{"Time":"2023-05-31T19:37:31.238392367Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: I0531 19:36:19.589670 1242 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-auto-509041\" podStartSLOduration=1.589650655 podCreationTimestamp=\"2023-05-31 19:36:18 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:19.587783312 +0000 UTC m=+1.413779485\" watchObservedRunningTime=\"2023-05-31 19:36:19.589650655 +0000 UTC m=+1.415646822\"\r\n"} +{"Time":"2023-05-31T19:37:31.238399456Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: I0531 19:36:19.641319 1242 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-auto-509041\" podStartSLOduration=1.6412756229999999 podCreationTimestamp=\"2023-05-31 19:36:18 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:19.61294142 +0000 UTC m=+1.438937593\" watchObservedRunningTime=\"2023-05-31 19:36:19.641275623 +0000 UTC m=+1.467271798\"\r\n"} +{"Time":"2023-05-31T19:37:31.238408616Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:19 auto-509041 kubelet[1242]: I0531 19:36:19.661937 1242 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-auto-509041\" podStartSLOduration=1.661894599 podCreationTimestamp=\"2023-05-31 19:36:18 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:19.642049802 +0000 UTC m=+1.468045975\" watchObservedRunningTime=\"2023-05-31 19:36:19.661894599 +0000 UTC m=+1.487890774\"\r\n"} +{"Time":"2023-05-31T19:37:31.238416218Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.261567 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.238683434Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.336613 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.23869023Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.379475 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.238694078Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.436515 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/14941ccf-4388-466a-ad78-0d9d3c97e5a5-config-volume\\\") pod \\\"coredns-5d78c9869d-gvzdz\\\" (UID: \\\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\\\") \" pod=\"kube-system/coredns-5d78c9869d-gvzdz\"\r\n"} +{"Time":"2023-05-31T19:37:31.238702982Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.436591 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/8739e80e-1c23-4f83-9470-506ce5eafaed-config-volume\\\") pod \\\"coredns-5d78c9869d-p8xrk\\\" (UID: \\\"8739e80e-1c23-4f83-9470-506ce5eafaed\\\") \" pod=\"kube-system/coredns-5d78c9869d-p8xrk\"\r\n"} +{"Time":"2023-05-31T19:37:31.238708019Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.436631 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-f86dq\\\" (UniqueName: \\\"kubernetes.io/projected/14941ccf-4388-466a-ad78-0d9d3c97e5a5-kube-api-access-f86dq\\\") pod \\\"coredns-5d78c9869d-gvzdz\\\" (UID: \\\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\\\") \" pod=\"kube-system/coredns-5d78c9869d-gvzdz\"\r\n"} +{"Time":"2023-05-31T19:37:31.238716714Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.436650 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-jjjpf\\\" (UniqueName: \\\"kubernetes.io/projected/8739e80e-1c23-4f83-9470-506ce5eafaed-kube-api-access-jjjpf\\\") pod \\\"coredns-5d78c9869d-p8xrk\\\" (UID: \\\"8739e80e-1c23-4f83-9470-506ce5eafaed\\\") \" pod=\"kube-system/coredns-5d78c9869d-p8xrk\"\r\n"} +{"Time":"2023-05-31T19:37:31.238725674Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.537998 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-jgzfp\\\" (UniqueName: \\\"kubernetes.io/projected/3f46716d-7902-47d7-b8ef-b04a4315e0db-kube-api-access-jgzfp\\\") pod \\\"kube-proxy-79w7r\\\" (UID: \\\"3f46716d-7902-47d7-b8ef-b04a4315e0db\\\") \" pod=\"kube-system/kube-proxy-79w7r\"\r\n"} +{"Time":"2023-05-31T19:37:31.238738969Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.538088 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/3f46716d-7902-47d7-b8ef-b04a4315e0db-xtables-lock\\\") pod \\\"kube-proxy-79w7r\\\" (UID: \\\"3f46716d-7902-47d7-b8ef-b04a4315e0db\\\") \" pod=\"kube-system/kube-proxy-79w7r\"\r\n"} +{"Time":"2023-05-31T19:37:31.238747203Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.538129 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/3f46716d-7902-47d7-b8ef-b04a4315e0db-lib-modules\\\") pod \\\"kube-proxy-79w7r\\\" (UID: \\\"3f46716d-7902-47d7-b8ef-b04a4315e0db\\\") \" pod=\"kube-system/kube-proxy-79w7r\"\r\n"} +{"Time":"2023-05-31T19:37:31.238929583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:31 auto-509041 kubelet[1242]: I0531 19:36:31.538149 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/3f46716d-7902-47d7-b8ef-b04a4315e0db-kube-proxy\\\") pod \\\"kube-proxy-79w7r\\\" (UID: \\\"3f46716d-7902-47d7-b8ef-b04a4315e0db\\\") \" pod=\"kube-system/kube-proxy-79w7r\"\r\n"} +{"Time":"2023-05-31T19:37:31.238936822Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:33 auto-509041 kubelet[1242]: I0531 19:36:33.594020 1242 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-79w7r\" podStartSLOduration=2.593980517 podCreationTimestamp=\"2023-05-31 19:36:31 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:33.593359163 +0000 UTC m=+15.419355336\" watchObservedRunningTime=\"2023-05-31 19:36:33.593980517 +0000 UTC m=+15.419976694\"\r\n"} +{"Time":"2023-05-31T19:37:31.238942348Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:33 auto-509041 kubelet[1242]: I0531 19:36:33.640532 1242 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-gvzdz\" podStartSLOduration=2.6405005409999998 podCreationTimestamp=\"2023-05-31 19:36:31 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:33.622080883 +0000 UTC m=+15.448077056\" watchObservedRunningTime=\"2023-05-31 19:36:33.640500541 +0000 UTC m=+15.466496705\"\r\n"} +{"Time":"2023-05-31T19:37:31.238967628Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:34 auto-509041 kubelet[1242]: I0531 19:36:34.189073 1242 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-p8xrk\" podStartSLOduration=3.188681805 podCreationTimestamp=\"2023-05-31 19:36:31 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:33.642406756 +0000 UTC m=+15.468402929\" watchObservedRunningTime=\"2023-05-31 19:36:34.188681805 +0000 UTC m=+16.014677978\"\r\n"} +{"Time":"2023-05-31T19:37:31.238972026Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:34 auto-509041 kubelet[1242]: I0531 19:36:34.189335 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.238976076Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:34 auto-509041 kubelet[1242]: I0531 19:36:34.363990 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-dktjq\\\" (UniqueName: \\\"kubernetes.io/projected/89c79712-ab09-46a2-a0eb-a5aa86f2fb19-kube-api-access-dktjq\\\") pod \\\"storage-provisioner\\\" (UID: \\\"89c79712-ab09-46a2-a0eb-a5aa86f2fb19\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:37:31.238981081Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:34 auto-509041 kubelet[1242]: I0531 19:36:34.364080 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/89c79712-ab09-46a2-a0eb-a5aa86f2fb19-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"89c79712-ab09-46a2-a0eb-a5aa86f2fb19\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:37:31.23920684Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:38 auto-509041 kubelet[1242]: I0531 19:36:38.825284 1242 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:37:31.239213348Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:38 auto-509041 kubelet[1242]: I0531 19:36:38.828880 1242 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:37:31.239217808Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:43 auto-509041 kubelet[1242]: I0531 19:36:43.840692 1242 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=9.840560517 podCreationTimestamp=\"2023-05-31 19:36:34 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:35.609371865 +0000 UTC m=+17.435368038\" watchObservedRunningTime=\"2023-05-31 19:36:43.840560517 +0000 UTC m=+25.666556686\"\r\n"} +{"Time":"2023-05-31T19:37:31.239222601Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:43 auto-509041 kubelet[1242]: I0531 19:36:43.935092 1242 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/14941ccf-4388-466a-ad78-0d9d3c97e5a5-config-volume\\\") pod \\\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\\\" (UID: \\\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\\\") \"\r\n"} +{"Time":"2023-05-31T19:37:31.239227222Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:43 auto-509041 kubelet[1242]: I0531 19:36:43.935173 1242 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-f86dq\\\" (UniqueName: \\\"kubernetes.io/projected/14941ccf-4388-466a-ad78-0d9d3c97e5a5-kube-api-access-f86dq\\\") pod \\\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\\\" (UID: \\\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\\\") \"\r\n"} +{"Time":"2023-05-31T19:37:31.239233059Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:43 auto-509041 kubelet[1242]: W0531 19:36:43.935344 1242 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/14941ccf-4388-466a-ad78-0d9d3c97e5a5/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T19:37:31.239238385Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:43 auto-509041 kubelet[1242]: I0531 19:36:43.935493 1242 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/14941ccf-4388-466a-ad78-0d9d3c97e5a5-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"14941ccf-4388-466a-ad78-0d9d3c97e5a5\" (UID: \"14941ccf-4388-466a-ad78-0d9d3c97e5a5\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.239248639Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:43 auto-509041 kubelet[1242]: I0531 19:36:43.942395 1242 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/14941ccf-4388-466a-ad78-0d9d3c97e5a5-kube-api-access-f86dq\" (OuterVolumeSpecName: \"kube-api-access-f86dq\") pod \"14941ccf-4388-466a-ad78-0d9d3c97e5a5\" (UID: \"14941ccf-4388-466a-ad78-0d9d3c97e5a5\"). InnerVolumeSpecName \"kube-api-access-f86dq\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.239547774Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:44 auto-509041 kubelet[1242]: I0531 19:36:44.035366 1242 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/14941ccf-4388-466a-ad78-0d9d3c97e5a5-config-volume\\\") on node \\\"auto-509041\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.239558512Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:44 auto-509041 kubelet[1242]: I0531 19:36:44.035542 1242 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-f86dq\\\" (UniqueName: \\\"kubernetes.io/projected/14941ccf-4388-466a-ad78-0d9d3c97e5a5-kube-api-access-f86dq\\\") on node \\\"auto-509041\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.239569997Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:44 auto-509041 kubelet[1242]: I0531 19:36:44.617303 1242 scope.go:115] \"RemoveContainer\" containerID=\"63aedbab26074d5ceb8a538ce10ec4f35acb46b3136847a3995b3cabd2540ee3\"\r\n"} +{"Time":"2023-05-31T19:37:31.239573843Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:44 auto-509041 kubelet[1242]: I0531 19:36:44.640970 1242 scope.go:115] \"RemoveContainer\" containerID=\"63aedbab26074d5ceb8a538ce10ec4f35acb46b3136847a3995b3cabd2540ee3\"\r\n"} +{"Time":"2023-05-31T19:37:31.239581376Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:44 auto-509041 kubelet[1242]: E0531 19:36:44.642248 1242 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = NotFound desc = an error occurred when try to find container \\\"63aedbab26074d5ceb8a538ce10ec4f35acb46b3136847a3995b3cabd2540ee3\\\": not found\" containerID=\"63aedbab26074d5ceb8a538ce10ec4f35acb46b3136847a3995b3cabd2540ee3\"\r\n"} +{"Time":"2023-05-31T19:37:31.239586794Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:44 auto-509041 kubelet[1242]: I0531 19:36:44.642339 1242 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:containerd ID:63aedbab26074d5ceb8a538ce10ec4f35acb46b3136847a3995b3cabd2540ee3} err=\"failed to get container status \\\"63aedbab26074d5ceb8a538ce10ec4f35acb46b3136847a3995b3cabd2540ee3\\\": rpc error: code = NotFound desc = an error occurred when try to find container \\\"63aedbab26074d5ceb8a538ce10ec4f35acb46b3136847a3995b3cabd2540ee3\\\": not found\"\r\n"} +{"Time":"2023-05-31T19:37:31.239594641Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:46 auto-509041 kubelet[1242]: I0531 19:36:46.502387 1242 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=14941ccf-4388-466a-ad78-0d9d3c97e5a5 path=\"/var/lib/kubelet/pods/14941ccf-4388-466a-ad78-0d9d3c97e5a5/volumes\"\r\n"} +{"Time":"2023-05-31T19:37:31.239607071Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:03 auto-509041 kubelet[1242]: I0531 19:37:03.546475 1242 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:31.239611136Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:03 auto-509041 kubelet[1242]: E0531 19:37:03.546583 1242 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T19:37:31.239827775Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:03 auto-509041 kubelet[1242]: I0531 19:37:03.546611 1242 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"14941ccf-4388-466a-ad78-0d9d3c97e5a5\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T19:37:31.2398345Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:03 auto-509041 kubelet[1242]: I0531 19:37:03.697765 1242 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-p6m56\\\" (UniqueName: \\\"kubernetes.io/projected/58d70507-7d92-46ab-9e13-bcb97899f688-kube-api-access-p6m56\\\") pod \\\"netcat-7458db8b8-z5czz\\\" (UID: \\\"58d70507-7d92-46ab-9e13-bcb97899f688\\\") \" pod=\"default/netcat-7458db8b8-z5czz\"\r\n"} +{"Time":"2023-05-31T19:37:31.239845222Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 kubelet[1242]: E0531 19:37:18.572848 1242 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:37:31.239853353Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 kubelet[1242]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:37:31.239857077Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 kubelet[1242]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:37:31.239864368Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 kubelet[1242]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:37:31.239872385Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:20 auto-509041 kubelet[1242]: E0531 19:37:20.666857 1242 upgradeaware.go:426] Error proxying data from client to backend: readfrom tcp 192.168.122.161:34356-\u003e192.168.122.161:10010: write tcp 192.168.122.161:34356-\u003e192.168.122.161:10010: write: broken pipe\r\n"} +{"Time":"2023-05-31T19:37:31.239876559Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.239882492Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.239885859Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:37:31.239891901Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T19:37:31.23989522Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters:\r\n"} +{"Time":"2023-05-31T19:37:31.23989817Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T19:37:31.239906838Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:37:31.240045386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"UjY3QwpBNXcxQzg2MWNYMVV6MlN5WlNjT05GeG9mNmRSWTB6T2ZrQ0gzNDJPS1pEQnhOcmZmOGNkL3kwMUE4RmZYQXlHCmNkeDFJM3lQREJ1OHIzOW82eSt4c0FpRGNSSnMyUmY3UU5BTWV2MEszbm8zQlpoc1loeDdNNXllZ2hNemdxTW4KUU50bnY3T2lYTllMVFpRZDd6dSs5Y3NNbXRnNDBLUU9DWUQyTG1jMkpOWHRSNjcyT013eGpkRG5hNVpGZlZSMgpEcXR6SFRlTFZrSXhIUi9UT0hoQ09xSm0yMHF6dEVjRVd2d3hXcm1rdk5QNkFURnVHck1UVlVRRjBybFQrMDNwCnluUHdmdFRZbXJjOEVwWDUzUmVaUlVHWHZEM1N4QnlKWFdySGEzNFJhQURGaGEvdnJMZTN3ZEppNVlLRFZrVWIKN0NnQkFieU9VWXM1cmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T19:37:31.240077385Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T19:37:31.240082613Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: mk\r\n"} +{"Time":"2023-05-31T19:37:31.240085747Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts:\r\n"} +{"Time":"2023-05-31T19:37:31.240091161Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - context:\r\n"} +{"Time":"2023-05-31T19:37:31.240094515Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T19:37:31.240097932Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user: system:node:auto-509041\r\n"} +{"Time":"2023-05-31T19:37:31.240104693Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: system:node:auto-509041@mk\r\n"} +{"Time":"2023-05-31T19:37:31.240108014Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: system:node:auto-509041@mk\r\n"} +{"Time":"2023-05-31T19:37:31.240111104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T19:37:31.240118472Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T19:37:31.240123081Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users:\r\n"} +{"Time":"2023-05-31T19:37:31.240130713Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - name: system:node:auto-509041\r\n"} +{"Time":"2023-05-31T19:37:31.240134752Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user:\r\n"} +{"Time":"2023-05-31T19:37:31.240141715Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:37:31.240146049Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:37:31.240152814Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.240323086Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.240340479Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:37:31.240344444Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T19:37:31.240354734Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authentication:\r\n"} +{"Time":"2023-05-31T19:37:31.240358233Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T19:37:31.240364722Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T19:37:31.240368814Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:37:31.240373611Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240376739Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T19:37:31.240379816Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" x509:\r\n"} +{"Time":"2023-05-31T19:37:31.240382936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T19:37:31.240389431Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authorization:\r\n"} +{"Time":"2023-05-31T19:37:31.240392476Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T19:37:31.240401581Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:37:31.240404908Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240414285Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240417736Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T19:37:31.240420994Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T19:37:31.240423858Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T19:37:31.24042704Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T19:37:31.240430019Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.240433358Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240436177Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T19:37:31.240439246Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:37:31.24044265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:37:31.240452893Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T19:37:31.240460022Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240463372Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T19:37:31.240644805Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240650823Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T19:37:31.240653828Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T19:37:31.240660214Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T19:37:31.240663372Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240669624Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T19:37:31.240677392Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240680931Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T19:37:31.240684582Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" logging:\r\n"} +{"Time":"2023-05-31T19:37:31.2406886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T19:37:31.240695572Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" options:\r\n"} +{"Time":"2023-05-31T19:37:31.240698571Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" json:\r\n"} +{"Time":"2023-05-31T19:37:31.240701534Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T19:37:31.240704706Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T19:37:31.240709716Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T19:37:31.240712822Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240715836Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240720822Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resolvConf: /run/systemd/resolve/resolv.conf\r\n"} +{"Time":"2023-05-31T19:37:31.240724472Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T19:37:31.240734396Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T19:37:31.240737689Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240743343Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240746582Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T19:37:31.24074954Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240755781Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240759039Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:37:31.240762127Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.240767677Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.241134865Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:37:31.241142175Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.241145368Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters:\n"} +{"Time":"2023-05-31T19:37:31.241148412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:37:31.241155519Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:37:31.241159377Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extensions:\n"} +{"Time":"2023-05-31T19:37:31.241165743Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - extension:\n"} +{"Time":"2023-05-31T19:37:31.241172929Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" last-update: Wed, 31 May 2023 19:36:31 UTC\n"} +{"Time":"2023-05-31T19:37:31.241176481Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.241182387Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:37:31.241185977Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:37:31.241191175Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://192.168.50.171:8443\n"} +{"Time":"2023-05-31T19:37:31.241194344Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: auto-509041\n"} +{"Time":"2023-05-31T19:37:31.241197396Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:37:31.241200616Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:37:31.241206641Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extensions:\n"} +{"Time":"2023-05-31T19:37:31.241219281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - extension:\n"} +{"Time":"2023-05-31T19:37:31.241222803Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" last-update: Wed, 31 May 2023 19:36:55 UTC\n"} +{"Time":"2023-05-31T19:37:31.24122869Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.241231854Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:37:31.241244284Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:37:31.241250897Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://192.168.61.57:8443\n"} +{"Time":"2023-05-31T19:37:31.241254244Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:31.241260273Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts:\n"} +{"Time":"2023-05-31T19:37:31.24126311Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - context:\n"} +{"Time":"2023-05-31T19:37:31.241266284Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cluster: auto-509041\n"} +{"Time":"2023-05-31T19:37:31.241272195Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extensions:\n"} +{"Time":"2023-05-31T19:37:31.241755678Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - extension:\n"} +{"Time":"2023-05-31T19:37:31.241762598Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" last-update: Wed, 31 May 2023 19:36:31 UTC\n"} +{"Time":"2023-05-31T19:37:31.241765863Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.241769745Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:37:31.241773298Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:37:31.241780212Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:37:31.241783574Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user: auto-509041\n"} +{"Time":"2023-05-31T19:37:31.241786685Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: auto-509041\n"} +{"Time":"2023-05-31T19:37:31.241792644Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - context:\n"} +{"Time":"2023-05-31T19:37:31.241796169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cluster: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:31.241802125Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extensions:\n"} +{"Time":"2023-05-31T19:37:31.241805231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - extension:\n"} +{"Time":"2023-05-31T19:37:31.241811403Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" last-update: Wed, 31 May 2023 19:36:55 UTC\n"} +{"Time":"2023-05-31T19:37:31.241814862Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.24182134Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:37:31.241824715Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:37:31.241830872Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:37:31.241843295Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:31.24184651Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:31.241850356Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:31.241853455Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:37:31.241859783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:37:31.241862839Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users:\n"} +{"Time":"2023-05-31T19:37:31.241866993Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - name: auto-509041\n"} +{"Time":"2023-05-31T19:37:31.241870014Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user:\n"} +{"Time":"2023-05-31T19:37:31.241876243Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt\n"} +{"Time":"2023-05-31T19:37:31.241880107Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.key\n"} +{"Time":"2023-05-31T19:37:31.242169407Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - name: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:31.242176164Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user:\n"} +{"Time":"2023-05-31T19:37:31.242179969Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt\n"} +{"Time":"2023-05-31T19:37:31.242188888Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.key\n"} +{"Time":"2023-05-31T19:37:31.242192251Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.242195211Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.242198204Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:37:31.242205069Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.242208101Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" items:\n"} +{"Time":"2023-05-31T19:37:31.242211309Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.242221361Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.242224567Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:37:31.242227859Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.242231169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:31.242238946Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:31.242245851Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:31.242248984Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:31.242254199Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:31.242257483Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:31.24226062Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:31.242263733Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:31.242266847Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:31.242274126Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:31.242277218Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:31.242527986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:31.242534654Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:31.242538069Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:31.242541306Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:31.242544342Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:31.242547672Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:31.242550962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.242553938Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.242556971Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.242559936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" annotations:\n"} +{"Time":"2023-05-31T19:37:31.242563154Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:37:31.242566821Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:37:31.24257002Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:37:31.242580515Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:37:31.242583563Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:31Z\"\n"} +{"Time":"2023-05-31T19:37:31.242586986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:31.242590309Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:37:31.242596985Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"338\"\n"} +{"Time":"2023-05-31T19:37:31.242608526Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: b06e2426-4dfd-43bc-bd62-d2d751e5cf09\n"} +{"Time":"2023-05-31T19:37:31.242613514Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.242620219Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.242623236Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:37:31.242626444Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.242629573Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:31.242911077Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:31.242923861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:31.242928192Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:31.242953442Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:31.242958194Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:31.242963133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:31.24297625Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:31.242995409Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:31.243007569Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:31.243027965Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:31.243039473Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:31.24304829Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:31.243052397Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:31.243057071Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:31.243061162Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:31.243064906Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:31.243072883Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.243076708Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.243083885Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.243087509Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" annotations:\n"} +{"Time":"2023-05-31T19:37:31.243100329Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:37:31.243116817Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:37:31.243202944Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:37:31.243213652Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:37:31.243217931Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:31Z\"\n"} +{"Time":"2023-05-31T19:37:31.243234413Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:31.243246203Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T19:37:31.243261875Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"340\"\n"} +{"Time":"2023-05-31T19:37:31.24327418Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 65c1748d-abdd-4419-a070-d6598d9bf18f\n"} +{"Time":"2023-05-31T19:37:31.243285605Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.243304538Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.24331232Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" jws-kubeconfig-2zzfkp: eyJhbGciOiJIUzI1NiIsImtpZCI6IjJ6emZrcCJ9..aTbhvg7UNFpQ2GkE6WL6RUDFIOtmtIscCjC8NrGgDbE\n"} +{"Time":"2023-05-31T19:37:31.243326017Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T19:37:31.243329721Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.243336795Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters:\n"} +{"Time":"2023-05-31T19:37:31.24334006Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:37:31.243348337Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:37:31.24337232Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"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\n"} +{"Time":"2023-05-31T19:37:31.243384302Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:37:31.24339323Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: \"\"\n"} +{"Time":"2023-05-31T19:37:31.243396552Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts: null\n"} +{"Time":"2023-05-31T19:37:31.243399932Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:37:31.243406102Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:37:31.243409433Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:37:31.243415285Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users: null\n"} +{"Time":"2023-05-31T19:37:31.243418567Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.243422417Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.243425527Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:17Z\"\n"} +{"Time":"2023-05-31T19:37:31.243439978Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T19:37:31.243443262Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:37:31.24344645Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"334\"\n"} +{"Time":"2023-05-31T19:37:31.243452519Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 99833e52-361b-4d2b-8ad3-44243d4d7b97\n"} +{"Time":"2023-05-31T19:37:31.243455523Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.243458424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.243461459Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:37:31.24346457Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.243470808Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:31.243474107Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:31.243477573Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:31.243486878Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:31.243490347Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:31.243583259Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:31.243595643Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:31.243603749Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:31.243607532Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:31.243613934Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:31.243617312Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:31.243626941Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:31.243630564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:31.243637272Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:31.243640798Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:31.243649883Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:31.243656406Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:31.243667804Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.243671338Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.243677676Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.243680739Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" annotations:\n"} +{"Time":"2023-05-31T19:37:31.243687008Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:37:31.243690423Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:37:31.24369668Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:37:31.243699973Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:37:31.24370621Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:31Z\"\n"} +{"Time":"2023-05-31T19:37:31.243709755Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:31.243716253Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:37:31.243911683Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"344\"\n"} +{"Time":"2023-05-31T19:37:31.243916845Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 8c00b202-a3b8-4719-84c2-cf0346bdd114\n"} +{"Time":"2023-05-31T19:37:31.24392022Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.243926462Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.243929757Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Corefile: |\n"} +{"Time":"2023-05-31T19:37:31.24393265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" .:53 {\n"} +{"Time":"2023-05-31T19:37:31.243935607Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" log\n"} +{"Time":"2023-05-31T19:37:31.243942991Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" errors\n"} +{"Time":"2023-05-31T19:37:31.243946659Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" health {\n"} +{"Time":"2023-05-31T19:37:31.243953664Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T19:37:31.243957592Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T19:37:31.243964437Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ready\n"} +{"Time":"2023-05-31T19:37:31.243968489Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T19:37:31.243972279Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pods insecure\n"} +{"Time":"2023-05-31T19:37:31.243979234Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T19:37:31.243982406Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ttl 30\n"} +{"Time":"2023-05-31T19:37:31.243986275Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T19:37:31.243989759Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T19:37:31.243993458Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hosts {\n"} +{"Time":"2023-05-31T19:37:31.243999756Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 192.168.50.1 host.minikube.internal\n"} +{"Time":"2023-05-31T19:37:31.244002927Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fallthrough\n"} +{"Time":"2023-05-31T19:37:31.244006568Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T19:37:31.244012658Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T19:37:31.244015727Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T19:37:31.244018798Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T19:37:31.244024712Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cache 30\n"} +{"Time":"2023-05-31T19:37:31.24402775Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" loop\n"} +{"Time":"2023-05-31T19:37:31.244030814Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" reload\n"} +{"Time":"2023-05-31T19:37:31.244275191Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" loadbalance\n"} +{"Time":"2023-05-31T19:37:31.244280236Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\n"} +{"Time":"2023-05-31T19:37:31.244283659Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.24428657Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.244289646Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:18Z\"\n"} +{"Time":"2023-05-31T19:37:31.244296957Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: coredns\n"} +{"Time":"2023-05-31T19:37:31.244299933Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.244302955Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"406\"\n"} +{"Time":"2023-05-31T19:37:31.244306164Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: d555cbe2-203a-4036-a5bd-c33e931b2df3\n"} +{"Time":"2023-05-31T19:37:31.244309541Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.244321663Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.24432839Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T19:37:31.244331687Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.244339044Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:31.24434367Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:31.244347316Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:31.244353642Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:31.244357202Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:31.244363608Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:31.244366642Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:31.244369675Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:31.244376796Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:31.244380512Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:31.244387147Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:31.244641376Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:31.244650744Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:31.244654564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:31.244658086Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:31.244668558Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:31.244672055Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:31.244681003Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.244684608Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T19:37:31.244689241Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T19:37:31.244695426Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.244701466Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T19:37:31.244705152Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM2MDZaFw0zMzA1MjgxOTM2MDZaMBkxFzAV\n"} +{"Time":"2023-05-31T19:37:31.244708423Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T19:37:31.244712Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CgKCAQEAmMtssAHt7I3LXPHrFoRWQXSlCsQtgyWZ1fr0mQxTW1O+lCdxe9eySWLT\n"} +{"Time":"2023-05-31T19:37:31.244715405Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 4LkDb2Vnsvf5M+gMzMCxH/4thpTSkfQHFidJ6nIdLJQPI2TajKeYpntIDLP4UTi7\n"} +{"Time":"2023-05-31T19:37:31.244718869Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hCPy2SQthp0oo8tnUI1ORuf63M5cYGrEsnlnpSKAfZjoyoJzDsKDAtuPQaiWdCu7\n"} +{"Time":"2023-05-31T19:37:31.244722578Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" oii5zl0CKSpLPwdEmAMI+KmNzfYUBLYBzzO6xDQcjCcL7HjWLQ1T1ODwcBk1uk+z\n"} +{"Time":"2023-05-31T19:37:31.24472613Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AwK/y3IDUNmXjaBXkPuBNopFJGqp0mVfDWJO/td4xHH6WvwrhxTKziOlnUAfHExt\n"} +{"Time":"2023-05-31T19:37:31.244729665Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" NkW/joEWdvndk2UZD0EPPaY7lJsVpQIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T19:37:31.244733312Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUAUbDq38Pvj5w+apf1GAtenZYt0Mw\n"} +{"Time":"2023-05-31T19:37:31.244736758Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBADf1\n"} +{"Time":"2023-05-31T19:37:31.244740371Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 2fPWUG21ZaLsa38qea5Fx3XXHSSWnGbbwBJYHn1cBvpdOw2MDti4VocqbJyemu8R\n"} +{"Time":"2023-05-31T19:37:31.244825809Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 360qJI0iKz0t1MYNrp+xRWtvsC+Ly7qN27ELMFJSKlMJSz6oLgFVK01h2SvAo5sS\n"} +{"Time":"2023-05-31T19:37:31.244833417Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uReDlTtsP7zYwHXvfrVko/0cZuxWdbExAKz/v0vpFKdg0Pv/5/IatLZT9bnfyaeV\n"} +{"Time":"2023-05-31T19:37:31.244840651Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" g9ZjS3nikELeNQrosygYFs82tJZqQ30Jn/MPY5Ho1zDqjQ9FcbrXyrPG6pNINY0t\n"} +{"Time":"2023-05-31T19:37:31.244843986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nVkSnjfYX2iTGi0uYv45+u7sJjMc/WUq7h/e7veb29fWFNGFQRwtVMH6tm6mtnw7\n"} +{"Time":"2023-05-31T19:37:31.244846861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" FhawUmygjNyNFGqyGmE=\n"} +{"Time":"2023-05-31T19:37:31.244850095Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.244853353Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T19:37:31.244857667Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T19:37:31.244861153Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T19:37:31.244864358Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.244867338Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.244870151Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:14Z\"\n"} +{"Time":"2023-05-31T19:37:31.244872938Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T19:37:31.244875757Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.244878863Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"7\"\n"} +{"Time":"2023-05-31T19:37:31.244886135Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 33e686b0-f1b1-436b-b5a1-bae91101fbbb\n"} +{"Time":"2023-05-31T19:37:31.244904875Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.244908341Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.244911922Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T19:37:31.244915424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.244918905Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.244926728Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:14Z\"\n"} +{"Time":"2023-05-31T19:37:31.24493007Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T19:37:31.244943428Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.244946597Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"12\"\n"} +{"Time":"2023-05-31T19:37:31.24527118Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 24c44f22-a88f-47a8-93cf-c73f352b502d\n"} +{"Time":"2023-05-31T19:37:31.245286901Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.245292187Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.245296481Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T19:37:31.245305238Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T19:37:31.245309835Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T19:37:31.245314437Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T19:37:31.24531827Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clientConnection:\n"} +{"Time":"2023-05-31T19:37:31.245322981Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245326927Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" burst: 0\n"} +{"Time":"2023-05-31T19:37:31.245331475Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T19:37:31.24533576Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T19:37:31.245345394Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" qps: 0\n"} +{"Time":"2023-05-31T19:37:31.245350177Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:37:31.245359567Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.245363439Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conntrack:\n"} +{"Time":"2023-05-31T19:37:31.245367321Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T19:37:31.245376064Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" min: null\n"} +{"Time":"2023-05-31T19:37:31.245379648Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:31.245402745Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:31.245407507Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" detectLocal:\n"} +{"Time":"2023-05-31T19:37:31.245411166Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245415319Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245423861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245427782Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T19:37:31.245431341Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245442941Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245508718Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" iptables:\n"} +{"Time":"2023-05-31T19:37:31.245516413Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T19:37:31.245525565Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T19:37:31.245528845Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T19:37:31.245532105Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.245534983Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.245538242Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ipvs:\n"} +{"Time":"2023-05-31T19:37:31.245541127Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T19:37:31.24554989Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.24555337Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245556449Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" strictARP: false\n"} +{"Time":"2023-05-31T19:37:31.24555949Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.245562716Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:31.245565676Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:31.245572253Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:31.245575359Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T19:37:31.245578432Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T19:37:31.245581424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245584317Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T19:37:31.245587654Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T19:37:31.245593703Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245600929Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245604129Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" winkernel:\n"} +{"Time":"2023-05-31T19:37:31.245607126Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T19:37:31.245620346Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T19:37:31.245623626Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245629948Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245909935Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T19:37:31.245916811Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T19:37:31.245919923Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.245922901Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:37:31.245925688Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters:\n"} +{"Time":"2023-05-31T19:37:31.245928658Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:37:31.245931664Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T19:37:31.245935165Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:37:31.245938452Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: default\n"} +{"Time":"2023-05-31T19:37:31.245941375Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts:\n"} +{"Time":"2023-05-31T19:37:31.245944182Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - context:\n"} +{"Time":"2023-05-31T19:37:31.245947014Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cluster: default\n"} +{"Time":"2023-05-31T19:37:31.24594999Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:37:31.245953185Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user: default\n"} +{"Time":"2023-05-31T19:37:31.245956357Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: default\n"} +{"Time":"2023-05-31T19:37:31.245959334Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: default\n"} +{"Time":"2023-05-31T19:37:31.245968192Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users:\n"} +{"Time":"2023-05-31T19:37:31.245971162Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - name: default\n"} +{"Time":"2023-05-31T19:37:31.245973992Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" user:\n"} +{"Time":"2023-05-31T19:37:31.245976987Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T19:37:31.245980104Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.245983066Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.245986138Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:18Z\"\n"} +{"Time":"2023-05-31T19:37:31.245989059Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" labels:\n"} +{"Time":"2023-05-31T19:37:31.24599233Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.245995217Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T19:37:31.245998311Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.246549959Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"276\"\n"} +{"Time":"2023-05-31T19:37:31.246556758Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 2a7d890d-9452-45df-881e-69606b441280\n"} +{"Time":"2023-05-31T19:37:31.246559932Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.246563138Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.246566484Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:37:31.246575062Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.246578565Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:31.246581683Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:31.246584965Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:31.246588064Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:31.246591479Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:31.246597677Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:31.246601062Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:31.246604171Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:31.246607559Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:31.24661057Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:31.246613761Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:31.246616786Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:31.246625183Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:31.246628361Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:31.246631515Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:31.246634433Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:31.246637614Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:31.247101743Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:31.247108363Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.247111446Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.247114383Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" annotations:\n"} +{"Time":"2023-05-31T19:37:31.247117274Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:37:31.247120795Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:37:31.247124187Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:37:31.24712749Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:37:31.24713041Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:31Z\"\n"} +{"Time":"2023-05-31T19:37:31.247137758Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:31.247140947Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.247143847Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"352\"\n"} +{"Time":"2023-05-31T19:37:31.247150285Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: e7c8b4da-24aa-4f58-97f3-af9a1e131801\n"} +{"Time":"2023-05-31T19:37:31.247153603Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.247160179Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.247163352Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T19:37:31.247166634Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiServer:\n"} +{"Time":"2023-05-31T19:37:31.247172479Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certSANs:\n"} +{"Time":"2023-05-31T19:37:31.247182406Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T19:37:31.247206057Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - localhost\n"} +{"Time":"2023-05-31T19:37:31.247213398Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - 192.168.50.171\n"} +{"Time":"2023-05-31T19:37:31.247217231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:37:31.247220769Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T19:37:31.247224244Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:37:31.247227691Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T19:37:31.247614662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:37:31.24762178Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:37:31.247628775Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T19:37:31.247639993Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:37:31.247647127Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" controllerManager:\n"} +{"Time":"2023-05-31T19:37:31.247650795Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:37:31.247656924Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T19:37:31.247660305Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:37:31.247668622Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dns: {}\n"} +{"Time":"2023-05-31T19:37:31.247672148Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" etcd:\n"} +{"Time":"2023-05-31T19:37:31.247679448Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" local:\n"} +{"Time":"2023-05-31T19:37:31.2476868Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:37:31.247690309Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:37:31.247696657Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T19:37:31.247702577Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T19:37:31.247709057Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T19:37:31.247712428Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T19:37:31.247718545Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" networking:\n"} +{"Time":"2023-05-31T19:37:31.24772242Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T19:37:31.247729172Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:37:31.247735501Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T19:37:31.247738979Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" scheduler:\n"} +{"Time":"2023-05-31T19:37:31.247744857Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:37:31.247748272Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:37:31.247754341Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.247757621Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.247763851Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:16Z\"\n"} +{"Time":"2023-05-31T19:37:31.248132234Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T19:37:31.248140412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.248143954Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"198\"\n"} +{"Time":"2023-05-31T19:37:31.248147192Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: 0a2b8606-f1c4-43b4-948b-b410cfc08e3c\n"} +{"Time":"2023-05-31T19:37:31.248149943Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:31.248152904Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" data:\n"} +{"Time":"2023-05-31T19:37:31.248156119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kubelet: |\n"} +{"Time":"2023-05-31T19:37:31.248162593Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T19:37:31.248165885Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authentication:\n"} +{"Time":"2023-05-31T19:37:31.248176139Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" anonymous:\n"} +{"Time":"2023-05-31T19:37:31.248179138Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enabled: false\n"} +{"Time":"2023-05-31T19:37:31.248182363Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" webhook:\n"} +{"Time":"2023-05-31T19:37:31.248185615Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T19:37:31.248188819Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enabled: true\n"} +{"Time":"2023-05-31T19:37:31.24819197Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" x509:\n"} +{"Time":"2023-05-31T19:37:31.248195231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:37:31.248202064Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" authorization:\n"} +{"Time":"2023-05-31T19:37:31.248205119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T19:37:31.248217547Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" webhook:\n"} +{"Time":"2023-05-31T19:37:31.248220854Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:37:31.248224108Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:37:31.248229961Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T19:37:31.248233085Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T19:37:31.248236433Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T19:37:31.248242503Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T19:37:31.248245922Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T19:37:31.248249125Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.248597454Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" evictionHard:\n"} +{"Time":"2023-05-31T19:37:31.248607516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T19:37:31.248611361Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T19:37:31.248614307Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T19:37:31.248620484Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.24862405Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T19:37:31.24863175Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:31.248635344Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T19:37:31.248643014Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T19:37:31.248646363Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T19:37:31.248650113Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:31.248656785Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T19:37:31.248660342Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T19:37:31.248663369Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T19:37:31.24867444Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" logging:\n"} +{"Time":"2023-05-31T19:37:31.248677815Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T19:37:31.24868407Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" options:\n"} +{"Time":"2023-05-31T19:37:31.248687498Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" json:\n"} +{"Time":"2023-05-31T19:37:31.248693666Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T19:37:31.248696958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T19:37:31.248702998Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T19:37:31.248706072Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:31.248709171Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:31.248715087Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resolvConf: /run/systemd/resolve/resolv.conf\n"} +{"Time":"2023-05-31T19:37:31.248718749Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T19:37:31.248725934Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T19:37:31.248730372Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.249120832Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T19:37:31.249127354Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T19:37:31.249130526Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:31.249137381Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:31.249140431Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:31.249143516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:31.249146641Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.249152123Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" creationTimestamp: \"2023-05-31T19:36:16Z\"\n"} +{"Time":"2023-05-31T19:37:31.249160901Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T19:37:31.249164392Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:31.249167466Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"201\"\n"} +{"Time":"2023-05-31T19:37:31.249170518Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid: d66be7de-0e61-411d-a79a-f8195cb0bca5\n"} +{"Time":"2023-05-31T19:37:31.249174281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: List\n"} +{"Time":"2023-05-31T19:37:31.249177511Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:31.249184311Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T19:37:31.249187317Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.249190508Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.24919396Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:37:31.249197276Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ● docker.service\r\n"} +{"Time":"2023-05-31T19:37:31.249201468Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: masked (Reason: Unit docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:37:31.249205032Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T19:37:31.249207885Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:37:31.249210777Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.249213342Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.249216108Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:37:31.249219346Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;35m# Unit docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:37:31.249226995Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.249666292Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.249678874Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:37:31.249685724Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:31.249688929Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"exec-opts\": [\r\n"} +{"Time":"2023-05-31T19:37:31.249695977Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"native.cgroupdriver=systemd\"\r\n"} +{"Time":"2023-05-31T19:37:31.249699346Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ],\r\n"} +{"Time":"2023-05-31T19:37:31.249702468Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T19:37:31.249705524Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T19:37:31.24971192Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T19:37:31.24971511Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:31.2497181Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T19:37:31.249721124Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:31.24972433Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.24973095Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.249734072Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:37:31.249737173Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Client:\r\n"} +{"Time":"2023-05-31T19:37:31.249740176Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T19:37:31.249743001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Context: default\r\n"} +{"Time":"2023-05-31T19:37:31.24974582Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T19:37:31.249748874Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.249751629Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Server:\r\n"} +{"Time":"2023-05-31T19:37:31.24975497Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ERROR: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?\r\n"} +{"Time":"2023-05-31T19:37:31.249758198Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" errors pretty printing info\r\n"} +{"Time":"2023-05-31T19:37:31.249761325Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:37:31.249764152Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.249766941Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.249778293Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:37:31.249782012Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;31m●\u001b[0m cri-docker.service\r\n"} +{"Time":"2023-05-31T19:37:31.250131684Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: masked (Reason: Unit cri-docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:37:31.250144399Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: \u001b[0;1;31mfailed\u001b[0m (Result: exit-code) since Wed 2023-05-31 19:35:48 UTC; 1min 38s ago\r\n"} +{"Time":"2023-05-31T19:37:31.250148522Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TriggeredBy: \u001b[0;1;31m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:37:31.250151881Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Main PID: 455 (code=exited, status=1/FAILURE)\r\n"} +{"Time":"2023-05-31T19:37:31.250162667Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.250165978Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:35:48 minikube systemd[1]: cri-docker.service: Scheduled restart job, restart counter is at 3.\r\n"} +{"Time":"2023-05-31T19:37:31.250169303Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:35:48 minikube systemd[1]: Stopped CRI Interface for Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T19:37:31.250172968Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:35:48 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Start request repeated too quickly.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.250176783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:35:48 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.25018036Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:35:48 minikube systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.250183663Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:37:31.250186649Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.250189625Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.250192529Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:37:31.250199638Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;35m# Unit cri-docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:37:31.250202756Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.250205623Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.250208458Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:37:31.250211772Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cat: /etc/systemd/system/cri-docker.service.d/10-cni.conf: No such file or directory\r\n"} +{"Time":"2023-05-31T19:37:31.250215058Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:37:31.250218146Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.25022735Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.250600159Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:37:31.250611222Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:31.250614961Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T19:37:31.250618247Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T19:37:31.250622672Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T19:37:31.250625907Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:37:31.250632348Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:37:31.250635612Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.250640502Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:31.250647103Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:37:31.25065574Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T19:37:31.250659427Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:37:31.250663514Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T19:37:31.250666581Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T19:37:31.250669581Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:37:31.250674217Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.250684137Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T19:37:31.250692645Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T19:37:31.250696417Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:37:31.250702765Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T19:37:31.250705951Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.250712366Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T19:37:31.250716107Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T19:37:31.250722399Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:37:31.250725679Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T19:37:31.251115985Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.251121997Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:37:31.251125357Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:37:31.251128762Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.251131688Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.251134957Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.2511377Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.251140618Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T19:37:31.251143746Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T19:37:31.251146552Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.251149326Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:37:31.251152322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:37:31.251155004Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.251158112Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:31.251161552Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:31.251168048Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.251175105Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.25117804Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:37:31.25118157Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cri-dockerd 0.3.2 (23513f4)\r\n"} +{"Time":"2023-05-31T19:37:31.251184322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.251187452Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.251190255Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:37:31.251193525Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T19:37:31.251197438Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: loaded (\u001b]8;;file://auto-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: disabled)\r\n"} +{"Time":"2023-05-31T19:37:31.251201318Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:36:03 UTC; 1min 24s ago\r\n"} +{"Time":"2023-05-31T19:37:31.251618995Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:37:31.251627306Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Main PID: 669 (containerd)\r\n"} +{"Time":"2023-05-31T19:37:31.251632541Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Tasks: 104 (limit: 8192)\r\n"} +{"Time":"2023-05-31T19:37:31.251636675Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Memory: 200.4M\r\n"} +{"Time":"2023-05-31T19:37:31.251641899Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T19:37:31.251647037Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─ 669 /usr/bin/containerd --root /mnt/vda1/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:37:31.251652672Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─ 909 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id d65823b7cc81d086ebf2783d2553b919e29ebe556b3d48c84e17096c885e8e70 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:31.251657914Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─ 936 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 7ecc091e5f332c76ce8862215b2b02964047f5683c56b8bcf01f75f69e8b08a2 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:31.251663632Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─ 956 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fd764e08f601861fb4128761298d751856682c1b71c235a3f3d095941504c3cd -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:31.251669372Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─ 965 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 504fca68531ac75f874bde3fdf97e8730f42dd9856c7379d60f8a94fda92b761 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:31.251683986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─1464 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 274d7be7ca83eea60bb6ad940d5cf93b22064b632d26a381641223248d7ca941 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:31.251689769Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─1555 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6b07b913b48703bc7399163d87ec3435b8e7d64f9570b9eed09bf852aa5e73b5 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:31.251695385Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ├─1858 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ffb3db4821dcc0524684b112817baea1feee7a5f3fb98e11bcda5ef3d6df9d48 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:31.251701067Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" └─2097 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3fcf25ba51e6819ddcae3d1bd10166ad457877d1bc8f0503bc24a04960a7e569 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:31.251706351Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.251711586Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:06 auto-509041 containerd[669]: time=\"2023-05-31T19:37:06.801083303Z\" level=info msg=\"StartContainer for \\\"99672e3f21915ec77ebc573f4dfc26dade3fc3b02d1f9a19a7125e0d52c86305\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.252052319Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:06 auto-509041 containerd[669]: time=\"2023-05-31T19:37:06.890886085Z\" level=info msg=\"StartContainer for \\\"99672e3f21915ec77ebc573f4dfc26dade3fc3b02d1f9a19a7125e0d52c86305\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:37:31.252066078Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 containerd[669]: time=\"2023-05-31T19:37:18.465974120Z\" level=info msg=\"StopPodSandbox for \\\"a82025177fdb4777a22d873c770f3d1e9bc6c969ed0f78df5453262649acf5d9\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.252070276Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 containerd[669]: time=\"2023-05-31T19:37:18.516331367Z\" level=info msg=\"TearDown network for sandbox \\\"a82025177fdb4777a22d873c770f3d1e9bc6c969ed0f78df5453262649acf5d9\\\" successfully\"\r\n"} +{"Time":"2023-05-31T19:37:31.252074464Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 containerd[669]: time=\"2023-05-31T19:37:18.516443144Z\" level=info msg=\"StopPodSandbox for \\\"a82025177fdb4777a22d873c770f3d1e9bc6c969ed0f78df5453262649acf5d9\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:37:31.252078291Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 containerd[669]: time=\"2023-05-31T19:37:18.517195863Z\" level=info msg=\"RemovePodSandbox for \\\"a82025177fdb4777a22d873c770f3d1e9bc6c969ed0f78df5453262649acf5d9\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.252082386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 containerd[669]: time=\"2023-05-31T19:37:18.517294788Z\" level=info msg=\"Forcibly stopping sandbox \\\"a82025177fdb4777a22d873c770f3d1e9bc6c969ed0f78df5453262649acf5d9\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:31.252087212Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 containerd[669]: time=\"2023-05-31T19:37:18.554857043Z\" level=info msg=\"TearDown network for sandbox \\\"a82025177fdb4777a22d873c770f3d1e9bc6c969ed0f78df5453262649acf5d9\\\" successfully\"\r\n"} +{"Time":"2023-05-31T19:37:31.252091371Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 containerd[669]: time=\"2023-05-31T19:37:18.561333172Z\" level=warning msg=\"Failed to get podSandbox status for container event for sandboxID \\\"a82025177fdb4777a22d873c770f3d1e9bc6c969ed0f78df5453262649acf5d9\\\": an error occurred when try to find sandbox: not found. Sending the event with nil podSandboxStatus.\"\r\n"} +{"Time":"2023-05-31T19:37:31.252095651Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:37:18 auto-509041 containerd[669]: time=\"2023-05-31T19:37:18.561472450Z\" level=info msg=\"RemovePodSandbox \\\"a82025177fdb4777a22d873c770f3d1e9bc6c969ed0f78df5453262649acf5d9\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:37:31.252099196Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.252102369Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.252105061Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:37:31.252108439Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.25237697Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:31.252382652Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:37:31.252385834Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:37:31.252389064Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:31.252398165Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:31.252400732Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.252406373Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:31.252409636Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:37:31.252412736Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:37:31.252415964Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:37:31.252419219Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:37:31.252422457Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:37:31.252425548Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:37:31.252428686Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:31.252432001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:31.252435334Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:37:31.252438617Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:37:31.252441832Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:37:31.252445145Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:37:31.252448282Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:37:31.252451169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:37:31.252454284Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:37:31.252459962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:37:31.252483886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.252488324Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.252857031Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:37:31.252867666Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:37:31.252871273Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.252878703Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:31.252882864Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:31.252889476Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.252892833Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.252902556Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:37:31.252909556Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:31.252913271Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:37:31.252919553Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:37:31.252922875Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:31.252926235Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:31.252929332Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.252932414Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:31.25293531Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:37:31.252938485Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:37:31.252941301Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:37:31.252944448Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:37:31.252947419Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:37:31.252950033Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:37:31.252953661Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:31.252960162Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:31.252963294Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:37:31.261337972Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:37:31.2616659Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:37:31.261733615Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:37:31.261743025Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:37:31.26174655Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:37:31.26175031Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:37:31.261753934Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:37:31.261757285Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.261760754Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.261764361Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:37:31.261767936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:37:31.261771416Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.261775094Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:31.261778897Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:31.261789722Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.261793292Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.261797328Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:37:31.261802115Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:37:31.261980062Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:31.261989637Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:31.261993896Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:37:31.261997356Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # imports\r\n"} +{"Time":"2023-05-31T19:37:31.262000721Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262004279Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:37:31.262008322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:37:31.262012073Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.262015284Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.26201866Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:31.262022305Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:31.262026281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262029796Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:37:31.262033322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262036799Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.262040072Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.262043384Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262046455Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262049662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:37:31.262052886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262057857Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:37:31.262069803Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262073999Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:37:31.262077506Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262081169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262084373Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:37:31.262088021Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:37:31.26209223Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:37:31.262095798Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:37:31.262099615Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262103365Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:37:31.262107361Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:37:31.262236424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:37:31.262245257Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:37:31.262249073Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:37:31.262253312Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:37:31.262257175Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:37:31.262260816Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.26226472Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:37:31.262270505Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:37:31.262274309Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:37:31.262277766Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.262281241Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:37:31.262285604Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262288936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262292352Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262295826Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:37:31.262306068Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:37:31.262310047Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:37:31.262314022Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:37:31.26231783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:37:31.26232153Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262325592Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:37:31.262329322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:37:31.262333019Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:37:31.262336483Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262340028Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:37:31.262343958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:37:31.262347485Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262350714Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:37:31.262354192Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:37:31.262357662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:37:31.262361306Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:37:31.262364635Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:37:31.26237397Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:37:31.2623776Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:37:31.262381542Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:37:31.262384988Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.262388481Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.262391958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:37:31.262397277Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T19:37:31.262401514Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T19:37:31.262405018Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:37:31.262408703Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262412724Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T19:37:31.262416394Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:31.262420164Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:31.262423681Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262426977Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:37:31.262430397Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262433814Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:37:31.262568738Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.26258536Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262591261Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:37:31.262594847Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262598549Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262602227Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.26260562Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262609132Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.262612498Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262615954Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:37:31.262619864Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:37:31.262623203Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.262626914Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:31.262630516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:31.26263402Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262637794Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262641161Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262644618Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.26264845Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.262651531Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.26276285Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:37:31.262767933Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.262772047Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:37:31.262775358Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.26277933Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:37:31.262782812Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262786437Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:37:31.262790243Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:37:31.262793482Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:37:31.262797174Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:37:31.26280058Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:37:31.262804487Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:37:31.262807807Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.262811507Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:37:31.262815482Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cdi_spec_dirs = [\"/etc/cdi\", \"/var/run/cdi\"]\r\n"} +{"Time":"2023-05-31T19:37:31.262819209Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:37:31.2628227Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T19:37:31.262826381Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T19:37:31.262829699Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:37:31.262833578Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T19:37:31.262837096Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T19:37:31.262840652Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" drain_exec_sync_io_timeout = \"0s\"\r\n"} +{"Time":"2023-05-31T19:37:31.262844716Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_cdi = false\r\n"} +{"Time":"2023-05-31T19:37:31.262853925Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:37:31.262857491Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:37:31.262861129Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T19:37:31.262864873Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T19:37:31.262868275Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T19:37:31.263003182Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" image_pull_progress_timeout = \"1m0s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263011419Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:37:31.263015279Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:37:31.263019076Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T19:37:31.263022828Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:37:31.263035252Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:37:31.263039191Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T19:37:31.263043436Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:37:31.263064564Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263069377Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263073328Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:37:31.263077156Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T19:37:31.263080508Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:37:31.263084486Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263087933Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263112702Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:37:31.263117285Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:37:31.263130297Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:37:31.26313399Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263137877Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263141683Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T19:37:31.263149421Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" setup_serially = false\r\n"} +{"Time":"2023-05-31T19:37:31.263153019Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263156844Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:37:31.263162246Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.263165902Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T19:37:31.263170002Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:37:31.263173635Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ignore_blockio_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:37:31.263177384Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:37:31.263180967Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:37:31.263184712Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:37:31.263188507Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263192039Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T19:37:31.263195912Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263199678Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263203075Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:37:31.263206743Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:31.263210275Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:31.263213437Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:31.263216517Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:37:31.263220055Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263223555Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263226809Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263230126Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263233914Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263237384Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263240788Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263244679Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T19:37:31.263248299Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263253966Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:37:31.263257896Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263261459Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:37:31.263265046Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263268889Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263276356Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:37:31.263280198Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:31.263283708Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:31.263287539Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:31.263291451Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:37:31.263311055Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263322553Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263326731Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263330245Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:37:31.263333623Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263336394Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263339928Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263343367Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:37:31.263346924Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:37:31.263350205Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263354014Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:37:31.263357815Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263361538Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263364905Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:37:31.263368805Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:31.263372339Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:31.263375768Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:31.263379575Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:37:31.263383164Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263386619Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263390284Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263393609Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263397074Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.26340076Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263403904Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.26340749Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T19:37:31.263412239Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263415752Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T19:37:31.263419672Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T19:37:31.263423009Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263426386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:37:31.263433584Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:37:31.263444091Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263447706Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T19:37:31.263451361Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263454651Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T19:37:31.263458183Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263461702Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T19:37:31.263465048Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263468494Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T19:37:31.26347203Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263477338Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T19:37:31.263481301Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263484722Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263501046Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263514778Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263518788Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:31.26352265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263526434Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263530071Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263534204Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263537595Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263541042Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T19:37:31.263544817Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T19:37:31.263552783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263556621Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T19:37:31.26356012Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T19:37:31.263567576Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263571005Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263574732Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:37:31.263578127Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263581449Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.nri.v1.nri\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263585134Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable = true\r\n"} +{"Time":"2023-05-31T19:37:31.263588846Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" disable_connections = false\r\n"} +{"Time":"2023-05-31T19:37:31.263591945Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" plugin_config_path = \"/etc/nri/conf.d\"\r\n"} +{"Time":"2023-05-31T19:37:31.263595502Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" plugin_path = \"/opt/nri/plugins\"\r\n"} +{"Time":"2023-05-31T19:37:31.263599146Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" plugin_registration_timeout = \"5s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263622666Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" plugin_request_timeout = \"2s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263627499Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" socket_path = \"/var/run/nri/nri.sock\"\r\n"} +{"Time":"2023-05-31T19:37:31.263630929Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263634521Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263638293Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T19:37:31.263641714Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.263666393Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263671022Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T19:37:31.263674516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T19:37:31.263684523Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263688488Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T19:37:31.26369211Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263696332Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T19:37:31.263699787Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263703072Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263706386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263710348Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263713835Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263717663Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263721293Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263724497Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263727775Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263731645Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263734888Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263738367Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263742092Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.26374536Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263748992Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263754671Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T19:37:31.263758845Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263762492Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T19:37:31.263765817Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263769352Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263772951Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.26377619Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263779793Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263783292Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263786637Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263789825Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263793119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263797012Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263800355Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T19:37:31.263803643Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263807239Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263810637Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263813901Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263817497Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263820835Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263824409Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T19:37:31.263832446Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263836264Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263839596Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [plugins.\"io.containerd.transfer.v1.local\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263842853Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263846582Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:37:31.263849876Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" max_concurrent_uploaded_layers = 3\r\n"} +{"Time":"2023-05-31T19:37:31.263854177Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263857691Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [[plugins.\"io.containerd.transfer.v1.local\".unpack_config]]\r\n"} +{"Time":"2023-05-31T19:37:31.26386122Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" differ = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.263864669Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" platform = \"linux/amd64\"\r\n"} +{"Time":"2023-05-31T19:37:31.263868446Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:37:31.26387164Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263874661Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T19:37:31.263877956Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263894133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T19:37:31.263897986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263909642Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263914218Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:37:31.26391795Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263922149Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263926275Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:37:31.263930066Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T19:37:31.263933862Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263937037Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263940374Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263943787Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:37:31.263947614Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:37:31.26395153Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:37:31.263955039Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T19:37:31.263958645Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.263962246Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T19:37:31.263965624Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263969977Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.metrics.shimstats\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263973631Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263977359Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263980982Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263984628Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:37:31.263988515Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.264008386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T19:37:31.264012394Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.264016096Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.264021403Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:31.264024844Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.264028489Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.264031795Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:37:31.264035652Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ● crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:37:31.264039993Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Loaded: loaded (\u001b]8;;file://auto-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:37:31.264049241Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Active: inactive (dead) since Wed 2023-05-31 19:36:02 UTC; 1min 26s ago\r\n"} +{"Time":"2023-05-31T19:37:31.264052986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:37:31.264060678Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Main PID: 377 (code=exited, status=0/SUCCESS)\r\n"} +{"Time":"2023-05-31T19:37:31.264064176Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.264081554Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:00 auto-509041 crio[377]: time=\"2023-05-31 19:36:00.469448469Z\" level=debug msg=\"[graphdriver] trying provided driver \\\"overlay\\\"\" file=\"drivers/driver.go:324\"\r\n"} +{"Time":"2023-05-31T19:37:31.264087088Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:00 auto-509041 crio[377]: time=\"2023-05-31 19:36:00.469937126Z\" level=debug msg=\"Cached value indicated that overlay is supported\" file=\"overlay/overlay.go:209\"\r\n"} +{"Time":"2023-05-31T19:37:31.264099525Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:00 auto-509041 crio[377]: time=\"2023-05-31 19:36:00.470209045Z\" level=debug msg=\"Cached value indicated that metacopy is being used\" file=\"overlay/overlay.go:339\"\r\n"} +{"Time":"2023-05-31T19:37:31.264105329Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:00 auto-509041 crio[377]: time=\"2023-05-31 19:36:00.471285849Z\" level=debug msg=\"backingFs=extfs, projectQuotaSupported=false, useNativeDiff=false, usingMetacopy=true\" file=\"overlay/overlay.go:400\"\r\n"} +{"Time":"2023-05-31T19:37:31.264110333Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:02 auto-509041 crio[377]: time=\"2023-05-31 19:36:02.959519213Z\" level=debug msg=\"Closed stream server\" file=\"crio/main.go:383\"\r\n"} +{"Time":"2023-05-31T19:37:31.26411439Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:02 auto-509041 crio[377]: time=\"2023-05-31 19:36:02.960212966Z\" level=debug msg=\"Closed monitors\" file=\"crio/main.go:385\"\r\n"} +{"Time":"2023-05-31T19:37:31.264118588Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:02 auto-509041 crio[377]: time=\"2023-05-31 19:36:02.960349256Z\" level=debug msg=\"Closed hook monitor\" file=\"crio/main.go:388\"\r\n"} +{"Time":"2023-05-31T19:37:31.264122922Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:02 auto-509041 crio[377]: time=\"2023-05-31 19:36:02.960452472Z\" level=debug msg=\"Closed main server\" file=\"crio/main.go:393\"\r\n"} +{"Time":"2023-05-31T19:37:31.26412697Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:02 auto-509041 systemd[1]: crio.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:37:31.264130827Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" May 31 19:36:02 auto-509041 systemd[1]: Stopped Container Runtime Interface for OCI (CRI-O).\r\n"} +{"Time":"2023-05-31T19:37:31.264134328Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:37:31.264137907Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.26414133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.264144595Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:37:31.264148424Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[0;1;34m# \u001b]8;;file://auto-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:31.264152565Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:31.264156298Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:37:31.26415994Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T19:37:31.264163594Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:37:31.264167076Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:31.264174886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:31.264178352Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" After=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:37:31.264184957Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Requires=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:37:31.264188519Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.264192272Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:31.26419588Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:37:31.264199145Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=-/etc/sysconfig/crio\r\n"} +{"Time":"2023-05-31T19:37:31.264213388Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=-/etc/sysconfig/crio.minikube\r\n"} +{"Time":"2023-05-31T19:37:31.264226898Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:37:31.264231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:37:31.264234615Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T19:37:31.264238019Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CRIO_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:31.264241601Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" $CRIO_MINIKUBE_OPTIONS\r\n"} +{"Time":"2023-05-31T19:37:31.264245245Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:37:31.264251583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:37:31.264255318Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:37:31.264261349Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T19:37:31.264268205Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:37:31.26427176Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T19:37:31.26427495Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:37:31.264278332Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:37:31.264282068Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.264285265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:31.264288584Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:31.26429208Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.26429511Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.264298145Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:37:31.264301813Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T19:37:31.264305678Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:37:31.264309575Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:37:31.264315075Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:37:31.264318607Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.264322083Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:37:31.264325902Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.264329224Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:37:31.264335783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:37:31.264339543Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:37:31.264343059Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:37:31.264346517Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.264349783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:37:31.264450086Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:37:31.26445643Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:37:31.264460038Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:37:31.265659759Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:37:31.265665336Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.265669101Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:37:31.265989489Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:37:31.265999249Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:37:31.266086009Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266090307Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:37:31.266094322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:37:31.266098918Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266102385Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:37:31.266106072Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:37:31.266110395Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:37:31.266113923Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266117657Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:37:31.266121649Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:37:31.266125021Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:37:31.266131828Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:37:31.266135567Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.266138938Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266142583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:37:31.266146167Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:37:31.266149717Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:37:31.266153416Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266156889Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:37:31.266160608Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:37:31.266163974Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:37:31.266167389Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:37:31.266170737Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266174268Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:37:31.266177632Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:37:31.266181086Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:37:31.266184351Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:37:31.266187821Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266191345Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:37:31.266200573Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:37:31.266203923Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266209251Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:37:31.266212881Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:37:31.266216075Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266219738Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:37:31.266223376Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:37:31.26622675Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266230651Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:37:31.266234233Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:37:31.266237966Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:37:31.266241568Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266244821Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:37:31.266248928Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:37:31.266252417Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266255799Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:37:31.266259717Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:37:31.266361989Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:37:31.266366594Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.266370216Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266373771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:37:31.266377556Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:37:31.266386252Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.26638971Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.266491764Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:37:31.266500152Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:37:31.266503757Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:37:31.267030157Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.267036141Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.267039879Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:37:31.267044243Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:31.267047629Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.267162167Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:37:31.269850798Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:31.269944486Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.270071931Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:37:31.270149648Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:37:31.270640253Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:37:31.270756984Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27079335Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:37:31.270826752Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:37:31.270892496Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:37:31.270934949Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:37:31.27102824Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:37:31.271120601Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #]\r\n"} +{"Time":"2023-05-31T19:37:31.27115244Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.271175105Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:37:31.271268574Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:37:31.271405384Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.271547219Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:37:31.271708122Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.271912648Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:37:31.272019169Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.272116549Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:37:31.272239275Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:37:31.27233049Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:37:31.272459209Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.272605367Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:37:31.272649711Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:37:31.272688138Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.272715344Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:37:31.272739277Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:37:31.272763902Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:37:31.272788032Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:37:31.272813951Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.272838461Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.272861383Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:37:31.272894723Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:37:31.272919673Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:37:31.272951951Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_env = [\r\n"} +{"Time":"2023-05-31T19:37:31.272976232Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.272999684Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.273022476Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:37:31.273046333Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" selinux = false\r\n"} +{"Time":"2023-05-31T19:37:31.273069158Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.273100249Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:37:31.273127705Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:37:31.2731569Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.273184284Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.273213129Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.273237969Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:37:31.273262058Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:37:31.273286381Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:37:31.273316612Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:37:31.273347442Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:37:31.273376209Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.273400287Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:37:31.273438238Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:37:31.273471863Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:37:31.273502698Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:37:31.273538086Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.273571833Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:37:31.273602422Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.273636487Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:37:31.273670984Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:37:31.27370707Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.273741187Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:37:31.273778138Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.273815851Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.273843481Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:37:31.273879173Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:37:31.273907967Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:37:31.273945756Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:37:31.27397474Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:37:31.274002284Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:37:31.274029746Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:37:31.274054252Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:37:31.274098403Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:37:31.27412162Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:37:31.274144722Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:37:31.274167634Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:37:31.274191491Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:37:31.274214212Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.274253969Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.274278578Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:37:31.274306295Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:37:31.274333197Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:37:31.274355295Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.274377385Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.274400761Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:37:31.274422931Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:37:31.274449475Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:37:31.274471904Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:37:31.27449997Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" additional_devices = [\r\n"} +{"Time":"2023-05-31T19:37:31.27466715Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.274704857Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27473575Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:37:31.274761331Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:37:31.274783627Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:37:31.274805964Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:37:31.274828755Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.274850708Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.274876877Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:37:31.274907047Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:37:31.274929979Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:37:31.274970955Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.274995416Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:37:31.275024322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:37:31.275048226Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:37:31.275095379Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.275120525Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:37:31.275143518Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:37:31.275167318Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:37:31.27519351Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:37:31.275223388Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.275246287Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.275270135Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27530231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:37:31.275326887Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:37:31.275349941Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.275372425Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:37:31.275406958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:37:31.275430922Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:37:31.275453095Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # limit is never exceeded.\r\n"} +{"Time":"2023-05-31T19:37:31.27547649Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:37:31.275499173Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.275532717Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Whether container output should be logged to journald in addition to the kubernetes log file\r\n"} +{"Time":"2023-05-31T19:37:31.275556121Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:37:31.275577958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.275599448Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:37:31.275621718Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:37:31.275643836Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.275665273Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:37:31.275687172Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:37:31.275709068Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.275729234Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:37:31.275752118Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.275773994Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27579533Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:37:31.27581769Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" read_only = false\r\n"} +{"Time":"2023-05-31T19:37:31.275839391Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.275860475Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:37:31.275881904Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:37:31.275903352Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.275924239Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:37:31.275954557Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.275975454Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:37:31.276003336Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.276025042Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.276055454Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276076759Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:37:31.276098312Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:37:31.27612087Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:37:31.276143712Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.276166514Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276194471Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:37:31.276220291Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:37:31.276243315Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:37:31.276263774Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.276284537Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276305161Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:37:31.27632626Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:37:31.276353001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:37:31.276373974Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:37:31.276394299Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276414533Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # manage_ns_lifecycle determines whether we pin and remove namespaces\r\n"} +{"Time":"2023-05-31T19:37:31.276435723Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # and manage their lifecycle.\r\n"} +{"Time":"2023-05-31T19:37:31.276457921Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is being deprecated, and will be unconditionally true in the future.\r\n"} +{"Time":"2023-05-31T19:37:31.276480123Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" manage_ns_lifecycle = true\r\n"} +{"Time":"2023-05-31T19:37:31.276500973Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276527634Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:37:31.276558851Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:37:31.276592049Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:37:31.276615314Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:37:31.276636198Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:37:31.276657091Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276677465Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:37:31.276705734Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:37:31.27672712Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:37:31.276747914Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276768696Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:37:31.276793536Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:37:31.276814523Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276834859Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:37:31.276840009Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:37:31.276846895Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:37:31.276850166Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.276853172Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276856401Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:37:31.276860287Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The runtime to use is picked based on the runtime_handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:37:31.276863524Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If no runtime_handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:37:31.276866785Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:37:31.276869789Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.276872784Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:37:31.276875825Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:37:31.276878883Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:37:31.276881949Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:37:31.276885035Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:31.276888052Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:31.27689098Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:37:31.276894149Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:37:31.276897659Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:37:31.276900829Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:37:31.276903949Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:37:31.276907025Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:37:31.276910119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:37:31.276913471Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:37:31.27692094Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:37:31.276924282Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:37:31.276927233Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:37:31.276930281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:37:31.276933544Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:37:31.276954729Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:37:31.276958063Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:37:31.276961274Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:37:31.276964545Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:37:31.276967764Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:37:31.276970784Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276973619Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276976721Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:37:31.276979763Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.276982814Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:37:31.276986071Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.276988919Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276991776Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276994613Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.276997393Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277000556Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:37:31.27700364Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:37:31.277006795Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:37:31.277009716Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277012751Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:37:31.277016952Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:37:31.277023318Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:37:31.277026553Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277029555Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:37:31.277032682Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:37:31.277035594Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277038435Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:37:31.277041483Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:37:31.277044458Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277047448Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:37:31.27705062Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:37:31.277053544Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27705662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:37:31.27706195Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.277065038Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:37:31.277070614Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:37:31.277074089Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:37:31.277077285Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:37:31.27708042Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:37:31.277083403Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:37:31.277086394Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277089377Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:37:31.277092516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:37:31.277095452Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277100009Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:37:31.277103183Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:37:31.277110821Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277114127Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277117288Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:37:31.277120389Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.277126125Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:37:31.277129108Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277134324Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:37:31.277137709Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:37:31.277140538Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.277144131Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277149601Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277153041Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:37:31.277156276Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:37:31.277159654Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:37:31.277162841Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.277166269Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:37:31.27716925Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277172258Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:37:31.277175584Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:37:31.277178874Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:37:31.277182056Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:37:31.277186606Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:37:31.277196516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.27719947Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277202481Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:37:31.277205877Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:37:31.277209005Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:37:31.277211972Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #insecure_registries = \"[]\"\r\n"} +{"Time":"2023-05-31T19:37:31.277214861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277217803Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:37:31.277220885Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:37:31.277224017Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:37:31.277226892Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277229965Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:37:31.277232986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277235882Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277238974Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:37:31.277241935Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:37:31.277244915Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:37:31.277247708Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277250584Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:37:31.277253889Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:37:31.277256948Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277259811Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277262803Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:37:31.277265875Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:37:31.277270154Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27727311Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:37:31.277276077Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:37:31.2772815Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:37:31.27728463Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.277290313Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277293492Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:37:31.277296477Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:37:31.277299395Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277302369Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:37:31.277305478Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:37:31.277308416Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.2773114Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:37:31.277314434Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:37:31.277317274Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277320241Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:37:31.277323399Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.2773265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T19:37:31.277329551Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:37:31.277332496Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277335427Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277338241Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:37:31.277341195Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277344108Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277347058Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:37:31.277350004Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277352966Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.277355816Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.277363207Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:37:31.277366829Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:37:31.026905386Z] Starting CRI-O, version: 1.24.1, git: a3bbde8a77c323aa6a485da9a9046299155c6016(dirty) \r\n"} +{"Time":"2023-05-31T19:37:31.277370707Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T19:37:31.277374375Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:37:31.277377726Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:37:31.277384036Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:37:31.277387077Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.277390111Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:37:31.27739301Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277396103Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:37:31.277399309Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:37:31.277402521Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:37:31.277405627Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:37:31.277408554Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277411627Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:37:31.277417802Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:37:31.277421148Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:37:31.277424381Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:37:31.277427407Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:37:31.277430755Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27743431Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:37:31.277437497Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:37:31.277442483Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:37:31.277445485Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277448515Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:37:31.277451863Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:37:31.277454886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277457956Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:37:31.277463476Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:37:31.277466771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:37:31.277469737Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277472679Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:37:31.277475809Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:37:31.277478857Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:37:31.277481911Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:37:31.27748497Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.277487969Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277490992Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:37:31.277494155Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:37:31.277497204Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:37:31.277500304Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277503426Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:37:31.277508741Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:37:31.277511797Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:37:31.277514861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:37:31.277517807Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277520765Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:37:31.277525393Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:37:31.277528623Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:37:31.277531703Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:37:31.277534757Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277537886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T19:37:31.277541853Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T19:37:31.277544918Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T19:37:31.277547917Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277554698Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T19:37:31.277557927Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T19:37:31.277561158Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T19:37:31.277564337Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T19:37:31.277567321Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277570426Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:37:31.27757352Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:37:31.277576499Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277579586Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:37:31.277582724Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:37:31.27758581Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277588849Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:37:31.277591871Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:37:31.277594921Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277598012Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:37:31.277601374Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:37:31.277605836Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:37:31.277608813Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277611903Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:37:31.277615046Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:37:31.277618027Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277621093Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T19:37:31.277624248Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277627216Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277633202Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:37:31.277636613Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:37:31.277641847Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:37:31.277644898Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.27764771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277650819Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:37:31.277658453Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:37:31.27766161Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277664805Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277667847Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:37:31.277670964Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:37:31.277674109Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:37:31.277677202Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277680332Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27768351Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:37:31.277687055Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:31.277689952Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277694247Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:37:31.277697376Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:31.277700191Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.27770322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:37:31.277708805Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:37:31.277712456Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:37:31.277715412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277718494Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:37:31.277721594Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:37:31.277725269Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:37:31.277728754Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:37:31.277731861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:37:31.277734856Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.277737717Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277740703Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:37:31.277743716Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T19:37:31.277746579Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277749662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:37:31.277752994Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.277756209Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:37:31.277759364Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277762406Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:37:31.277765653Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:37:31.277768766Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:37:31.277773409Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:37:31.277776376Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277779309Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:37:31.277782459Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T19:37:31.277785892Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:37:31.277788845Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277791816Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:37:31.277795001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:37:31.277798164Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:37:31.277801211Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:37:31.277806566Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:37:31.27780982Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:31.2778128Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277815763Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:37:31.277818923Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:37:31.277822001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:37:31.277825086Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T19:37:31.277827986Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.277830863Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277833846Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:37:31.277837002Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T19:37:31.277839897Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277842965Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:37:31.277846158Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:37:31.277849294Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.277853997Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277856942Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277859919Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:37:31.277863158Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:37:31.27786638Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:37:31.277869403Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:37:31.277875349Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:37:31.277878583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277881704Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:37:31.277884982Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:37:31.277888345Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:37:31.277891557Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:37:31.27789474Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.277900771Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:37:31.277903831Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277906915Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T19:37:31.277910015Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T19:37:31.27791311Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277916042Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277919099Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T19:37:31.277922092Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T19:37:31.277925164Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T19:37:31.277928272Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277931385Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T19:37:31.277941305Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.277949362Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277952359Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277955468Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:37:31.277958479Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:37:31.277961587Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277964674Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:37:31.277967701Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.277970539Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.277975741Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:37:31.277981551Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:37:31.277984882Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:37:31.277991351Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:37:31.277994495Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:37:31.277997687Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:37:31.278002345Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:37:31.278006281Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:37:31.278010558Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:37:31.278013665Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:37:31.278016873Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:37:31.278019959Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:37:31.278023033Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:37:31.278026077Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.278028975Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.278032027Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:37:31.278035442Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:37:31.278040866Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:37:31.278044096Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.278046917Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.278049868Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T19:37:31.278053016Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T19:37:31.2780562Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T19:37:31.278059083Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T19:37:31.278062001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.278064724Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.278067838Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:37:31.278071124Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:37:31.27807518Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:37:31.278078447Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:37:31.278081751Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T19:37:31.278084618Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.278087529Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.278090459Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T19:37:31.278093665Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T19:37:31.278096696Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T19:37:31.27809987Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T19:37:31.278102588Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.278105254Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.278108514Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T19:37:31.278111532Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T19:37:31.278114875Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T19:37:31.278117952Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:37:31.278122725Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.278125756Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:37:31.278128797Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:37:31.278131958Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:37:31.278135143Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:37:31.278138261Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.278140857Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.278144171Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:37:31.278147514Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:37:31.278150899Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:37:31.278153837Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.278160103Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:37:31.278163561Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:37:31.278166681Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:37:31.27816985Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.278173029Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:37:31.278176199Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:37:31.278179391Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:37:31.278182479Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:37:31.278185345Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.278188184Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.278191066Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.278194227Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:37:31.278197536Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T19:37:31.283383946Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:37:31.283396422Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.283400159Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:37:31.283403534Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:37:31.283406845Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:37:31.283410017Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T19:37:31.283413151Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:37:31.283416146Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.283419163Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T19:37:31.283422383Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:37:31.283430116Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.283433073Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:37:31.283436119Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:37:31.283439537Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.283442663Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:37:31.283821347Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:37:31.283831583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.283835603Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:37:31.283838833Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.283841678Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.283844685Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:37:31.283847665Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T19:37:31.283850507Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.283853427Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:37:31.28385653Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:37:31.283865992Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.283871583Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:37:31.283874913Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.283877893Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:37:31.283881173Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.284340468Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.284351861Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.284355506Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:37:31.2844701Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:37:31.284478505Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:37:31.284481902Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.284485449Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.284488674Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:37:31.284494652Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:37:31.284497648Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:37:31.284500848Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.28450401Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.284507098Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T19:37:31.284510519Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:37:31.284513594Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:37:31.284516788Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T19:37:31.284519707Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.284522822Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T19:37:31.284526181Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:37:31.284982883Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:37:31.284988916Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T19:37:31.284992306Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.284995787Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:37:31.284999426Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:37:31.285002267Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:37:31.285005616Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:37:31.285008905Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.285012027Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:37:31.28501529Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:37:31.285018565Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:37:31.28502168Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:37:31.285025297Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:37:31.285028957Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.285452135Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T19:37:31.285458237Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T19:37:31.285462002Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T19:37:31.285465631Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.285468815Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.285471788Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:37:31.285474872Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:37:31.285477922Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:37:31.2854807Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.285483809Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:37:31.285487025Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:37:31.285489841Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.285492757Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:37:31.285495743Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:37:31.2854988Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:37:31.285501971Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.285504824Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.285507641Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T19:37:31.286034205Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T19:37:31.286040832Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T19:37:31.28604459Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T19:37:31.286047856Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T19:37:31.286051259Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T19:37:31.286054529Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T19:37:31.286057367Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.286060386Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.286068182Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:37:31.286071784Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:37:31.286075222Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:37:31.286444319Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:37:31.286454485Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.286458048Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:37:31.286464414Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:37:31.286467595Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:37:31.286470672Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:37:31.286477994Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:31.286712309Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:31.286779433Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:37:31.286787076Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:37:31.286790936Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:37:31.286793964Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:37:31.286797528Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:37:31.28680055Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:37:31.28680409Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:37:31.287019765Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:37:31.287028408Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:37:31.287032243Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:37:31.287035515Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T19:37:31.287041509Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T19:37:31.287045207Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:37:31.287048234Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:37:31.287051459Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:37:31.287054864Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:37:31.287190323Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:37:31.287196035Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:37:31.287199627Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T19:37:31.287203105Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:37:31.287206356Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:37:31.287209695Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T19:37:31.28721327Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T19:37:31.287216314Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T19:37:31.287219737Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T19:37:31.28722344Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T19:37:31.287323756Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287328933Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287332152Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:37:31.287335264Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.287338411Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:37:31.287345998Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:37:31.287349359Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.287352479Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287355286Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287358098Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.287361134Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287364163Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.287367289Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.287370195Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287377599Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287381432Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:37:31.287385098Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:37:31.287388603Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:37:31.28752727Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287531602Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:37:31.287535443Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:37:31.287539548Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:37:31.287542783Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287545878Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:37:31.287549382Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:37:31.287552267Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287555263Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:37:31.287659697Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:37:31.287665579Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287669079Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:37:31.287672162Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:37:31.287675252Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.287678663Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T19:37:31.287681849Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T19:37:31.287685636Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T19:37:31.287692474Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T19:37:31.287696264Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T19:37:31.287700678Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T19:37:31.287705987Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T19:37:31.287715038Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T19:37:31.287719115Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T19:37:31.28772268Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T19:37:31.287874889Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Example:\r\n"} +{"Time":"2023-05-31T19:37:31.287879786Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T19:37:31.28788346Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T19:37:31.287886774Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T19:37:31.287955508Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T19:37:31.287959152Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T19:37:31.287962515Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T19:37:31.287965832Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:37:31.287969144Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T19:37:31.287972517Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T19:37:31.28797616Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T19:37:31.287979215Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T19:37:31.287986712Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T19:37:31.288071361Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T19:37:31.288074827Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \r\n"} +{"Time":"2023-05-31T19:37:31.288077676Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288080489Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:37:31.288083655Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:31.288086879Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:37:31.288090031Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:37:31.288093451Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:37:31.288096875Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:37:31.288100063Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:37:31.288107871Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:37:31.288111097Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288114551Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:37:31.288117737Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:37:31.288121463Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288124909Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:37:31.288242282Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:37:31.288246864Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.288249826Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288252785Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:37:31.288256247Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.288259101Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:37:31.288262282Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288265124Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:37:31.288268175Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:37:31.288271348Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.288274425Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.288277304Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288280334Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:37:31.288286111Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:37:31.288289415Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:37:31.288292445Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:31.288302928Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:37:31.288306073Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288309148Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:37:31.288312076Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:37:31.288314963Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:37:31.288318151Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:37:31.288321248Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:37:31.288324733Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.288327516Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288330606Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:37:31.288333808Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:37:31.288336726Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:37:31.288339469Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T19:37:31.288342382Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.288344959Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288581912Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:37:31.288587906Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:37:31.288590912Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:37:31.288594111Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288600465Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:37:31.288603778Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.288608425Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.28861146Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:37:31.28861434Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:37:31.288617322Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:37:31.28862005Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288623301Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:37:31.288632289Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:37:31.28863525Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.28863962Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288642732Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:37:31.288646133Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:37:31.28864918Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288652262Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:37:31.288655001Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:37:31.288657669Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:37:31.288660804Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.288663509Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288666953Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:37:31.288669897Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:37:31.288672779Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288675473Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:37:31.288678179Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:37:31.288680864Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.288683573Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T19:37:31.288687124Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T19:37:31.288694506Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T19:37:31.288700662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T19:37:31.288704175Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T19:37:31.288707639Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T19:37:31.288710635Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T19:37:31.288713884Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.288718603Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T19:37:31.288721886Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T19:37:31.288725Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T19:37:31.288969746Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T19:37:31.288976412Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T19:37:31.288980187Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T19:37:31.288983787Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T19:37:31.288986984Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T19:37:31.288989977Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T19:37:31.288993077Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.288996067Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T19:37:31.28899932Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T19:37:31.289002335Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.289005662Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T19:37:31.289009447Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.289014264Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.289017554Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.289021435Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.289024987Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.28902787Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.289032265Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.289035329Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T19:37:31.289038331Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:31.289041238Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:37:31.289044205Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:37:31.289047173Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289050231Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:37:31.289053313Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.289056471Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289059482Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:37:31.289062871Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T19:37:31.28906604Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T19:37:31.289069183Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T19:37:31.289072348Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.289075323Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289078334Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:37:31.289081681Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T19:37:31.289085038Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T19:37:31.289088196Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289091493Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T19:37:31.289095028Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T19:37:31.289098033Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289101031Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T19:37:31.28910408Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T19:37:31.289106974Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289110138Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T19:37:31.289114531Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T19:37:31.289117606Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289120655Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T19:37:31.289123839Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T19:37:31.289127175Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289130123Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T19:37:31.289133544Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T19:37:31.289136756Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289140003Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T19:37:31.289143228Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T19:37:31.289146208Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T19:37:31.289149158Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \r\n"} +{"Time":"2023-05-31T19:37:31.289152025Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T19:37:31.289155185Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ----------------------- debugLogs end: auto-509041 [took: 16.14926145s] --------------------------------\n"} +{"Time":"2023-05-31T19:37:31.289158885Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:175: Cleaning up \"auto-509041\" profile ...\n"} +{"Time":"2023-05-31T19:37:31.289162948Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p auto-509041\n"} +{"Time":"2023-05-31T19:37:32.438434977Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p auto-509041: (1.19098921s)\n"} +{"Time":"2023-05-31T19:37:32.438466953Z","Action":"cont","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T19:37:32.438471629Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== CONT TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T19:37:32.438478243Z","Action":"run","Test":"TestNetworkPlugins/group/bridge/Start"} +{"Time":"2023-05-31T19:37:32.438481461Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":"=== RUN TestNetworkPlugins/group/bridge/Start\n"} +{"Time":"2023-05-31T19:37:32.438485374Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-linux-amd64 start -p bridge-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=bridge --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:37:37.397297879Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T19:37:37.397324222Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ----------------------- debugLogs start: kindnet-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:37:37.397329616Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:37:37.397334018Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T19:37:37.397337932Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T19:37:37.397341937Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397345713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:37:37.397349576Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T19:37:37.397353209Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397356389Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397364674Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.39736799Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:37:37.397374439Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T19:37:37.397378104Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397381139Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397384586Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:37:37.397388083Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T19:37:37.397391225Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397394181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.39739715Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:37:37.397400716Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:37:37.397404198Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T19:37:37.397407149Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397410012Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397413267Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:37:37.397416423Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T19:37:37.397419683Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T19:37:37.397422929Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T19:37:37.397426663Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T19:37:37.397429933Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T19:37:37.397433252Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T19:37:37.397436605Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T19:37:37.397439895Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 10.244.0.3\tnetcat-7458db8b8-9ggwz\n"} +{"Time":"2023-05-31T19:37:37.397443001Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397446009Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397451272Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:37:37.39745483Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T19:37:37.397458729Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T19:37:37.397464209Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" options ndots:5\n"} +{"Time":"2023-05-31T19:37:37.397469158Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397472192Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397475245Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:37:37.397478865Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T19:37:37.397482166Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.39748566Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" passwd: files mymachines systemd\r\n"} +{"Time":"2023-05-31T19:37:37.39748903Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" group: files [SUCCESS=merge] mymachines [SUCCESS=merge] systemd\r\n"} +{"Time":"2023-05-31T19:37:37.397492577Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T19:37:37.397495564Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.397499252Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname\r\n"} +{"Time":"2023-05-31T19:37:37.397502762Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" networks: files dns\r\n"} +{"Time":"2023-05-31T19:37:37.39750613Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.397514835Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" protocols: files\r\n"} +{"Time":"2023-05-31T19:37:37.397518137Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" services: files\r\n"} +{"Time":"2023-05-31T19:37:37.397521534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ethers: files\r\n"} +{"Time":"2023-05-31T19:37:37.397524859Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rpc: files\r\n"} +{"Time":"2023-05-31T19:37:37.397528064Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397531244Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.39753447Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:37:37.397537783Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T19:37:37.397540916Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 127.0.1.1 kindnet-509041\r\n"} +{"Time":"2023-05-31T19:37:37.397544069Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.61.1\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T19:37:37.397547894Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.61.57\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T19:37:37.397551145Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397555083Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397558241Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:37:37.397561853Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This is /run/systemd/resolve/resolv.conf managed by man:systemd-resolved(8).\r\n"} +{"Time":"2023-05-31T19:37:37.397565167Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Do not edit.\r\n"} +{"Time":"2023-05-31T19:37:37.397568534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.397571919Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This file might be symlinked as /etc/resolv.conf. If you're looking at\r\n"} +{"Time":"2023-05-31T19:37:37.397574997Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # /etc/resolv.conf and seeing this text, you have followed the symlink.\r\n"} +{"Time":"2023-05-31T19:37:37.397578476Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.397581671Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This is a dynamic resolv.conf file for connecting local clients directly to\r\n"} +{"Time":"2023-05-31T19:37:37.397585099Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # all known uplink DNS servers. This file lists all configured search domains.\r\n"} +{"Time":"2023-05-31T19:37:37.397588289Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.397592119Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Third party programs should typically not access this file directly, but only\r\n"} +{"Time":"2023-05-31T19:37:37.397595445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # through the symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a\r\n"} +{"Time":"2023-05-31T19:37:37.397598669Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # different way, replace this symlink by a static file or a different symlink.\r\n"} +{"Time":"2023-05-31T19:37:37.397601506Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.397604628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # See man:systemd-resolved.service(8) for details about the supported modes of\r\n"} +{"Time":"2023-05-31T19:37:37.397607763Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # operation for /etc/resolv.conf.\r\n"} +{"Time":"2023-05-31T19:37:37.397610581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.397613578Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nameserver 192.168.122.1\r\n"} +{"Time":"2023-05-31T19:37:37.397616506Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" search .\r\n"} +{"Time":"2023-05-31T19:37:37.397619488Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397622648Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397625365Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:37:37.397629101Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T19:37:37.397632517Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node/kindnet-509041 Ready control-plane 48s v1.27.2 192.168.61.57 \u003cnone\u003e Buildroot 2021.02.12 5.10.57 containerd://1.7.1\n"} +{"Time":"2023-05-31T19:37:37.397635951Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397640125Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T19:37:37.397644052Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 46s \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397647756Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default service/netcat ClusterIP 10.108.89.157 \u003cnone\u003e 8080/TCP 18s app=netcat\n"} +{"Time":"2023-05-31T19:37:37.39765158Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 45s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:37.397655389Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397658675Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T19:37:37.397662745Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default endpoints/kubernetes 192.168.61.57:8443 46s\n"} +{"Time":"2023-05-31T19:37:37.397666315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default endpoints/netcat 10.244.0.3:8080 18s\n"} +{"Time":"2023-05-31T19:37:37.397669488Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 31s\n"} +{"Time":"2023-05-31T19:37:37.397673114Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 33s\n"} +{"Time":"2023-05-31T19:37:37.397676231Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.39768082Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:37:37.397684532Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system daemonset.apps/kindnet 1 1 1 1 1 \u003cnone\u003e 43s kindnet-cni docker.io/kindest/kindnetd:v20230511-dc714da8 app=kindnet\n"} +{"Time":"2023-05-31T19:37:37.397688732Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 45s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.397710217Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397715596Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:37:37.397719167Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default deployment.apps/netcat 1/1 1 1 18s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T19:37:37.397723664Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system deployment.apps/coredns 1/1 1 1 45s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:37.397726788Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397729844Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T19:37:37.397733091Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default pod/netcat-7458db8b8-9ggwz 1/1 Running 0 18s 10.244.0.3 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397737249Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/coredns-5d78c9869d-sxb9t 1/1 Running 0 32s 10.244.0.2 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397740735Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/etcd-kindnet-509041 1/1 Running 0 44s 192.168.61.57 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397745398Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kindnet-hmx2r 1/1 Running 0 32s 192.168.61.57 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397749355Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kube-apiserver-kindnet-509041 1/1 Running 0 44s 192.168.61.57 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397752989Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kube-controller-manager-kindnet-509041 1/1 Running 0 44s 192.168.61.57 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397756442Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kube-proxy-pmg7z 1/1 Running 0 32s 192.168.61.57 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397759864Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/kube-scheduler-kindnet-509041 1/1 Running 0 44s 192.168.61.57 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397763294Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-system pod/storage-provisioner 1/1 Running 0 31s 192.168.61.57 kindnet-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397766531Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397769329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397773766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:37:37.397777551Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T19:37:37.397781264Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fc8a5cca8c716 17 seconds ago Ready netcat-7458db8b8-9ggwz default 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.397788476Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3977179dc55ed 27 seconds ago Ready coredns-5d78c9869d-sxb9t kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.397792146Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" e700d9c00ced9 27 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.397795741Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ef5cce559ea00 32 seconds ago Ready kube-proxy-pmg7z kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.397799672Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" b1a0365461e51 32 seconds ago Ready kindnet-hmx2r kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.397803004Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3c02b17991413 53 seconds ago Ready kube-scheduler-kindnet-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.397806418Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 35c803018bc59 53 seconds ago Ready etcd-kindnet-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.397809776Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" e82036ee166af 53 seconds ago Ready kube-apiserver-kindnet-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.397813151Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" e3c103d05cd97 53 seconds ago Ready kube-controller-manager-kindnet-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:37:37.39781609Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397818563Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397821483Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:37:37.397824808Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\r\n"} +{"Time":"2023-05-31T19:37:37.397828074Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 4b760a8a9cae3 28081458d86cc 15 seconds ago Running dnsutils 0 fc8a5cca8c716\r\n"} +{"Time":"2023-05-31T19:37:37.397831205Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 4e9beaa19b137 6e38f40d628db 26 seconds ago Running storage-provisioner 0 e700d9c00ced9\r\n"} +{"Time":"2023-05-31T19:37:37.39783445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 67eaa6660b03d ead0a4a53df89 26 seconds ago Running coredns 0 3977179dc55ed\r\n"} +{"Time":"2023-05-31T19:37:37.397838257Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3151472df4fc3 b0b1fa0f58c6e 28 seconds ago Running kindnet-cni 0 b1a0365461e51\r\n"} +{"Time":"2023-05-31T19:37:37.397841414Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ee1df56520a43 b8aa50768fd67 32 seconds ago Running kube-proxy 0 ef5cce559ea00\r\n"} +{"Time":"2023-05-31T19:37:37.397846243Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bdbf7ba0e13a8 89e70da428d29 52 seconds ago Running kube-scheduler 0 3c02b17991413\r\n"} +{"Time":"2023-05-31T19:37:37.397849555Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 360d804df2165 86b6af7dd652c 52 seconds ago Running etcd 0 35c803018bc59\r\n"} +{"Time":"2023-05-31T19:37:37.397852968Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 57eab36847cd6 c5b13e4f7806d 52 seconds ago Running kube-apiserver 0 e82036ee166af\r\n"} +{"Time":"2023-05-31T19:37:37.39785636Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3f0a4b65be213 ac2b7465ebba9 52 seconds ago Running kube-controller-manager 0 e3c103d05cd97\r\n"} +{"Time":"2023-05-31T19:37:37.397859672Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397862513Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397865271Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:37:37.397868387Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: netcat\n"} +{"Time":"2023-05-31T19:37:37.397871404Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:37:37.397874674Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CreationTimestamp: Wed, 31 May 2023 19:37:09 +0000\n"} +{"Time":"2023-05-31T19:37:37.3978778Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:37:37.39788117Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:37:37.397884514Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T19:37:37.397887907Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:37:37.397895349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:37:37.397898717Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:37:37.397902339Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:37:37.397905513Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:37:37.397909257Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:37:37.397912464Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.397915452Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:37:37.397918529Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:37:37.397921792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397925109Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397928401Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:37.397931827Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:37:37.397935042Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -c\n"} +{"Time":"2023-05-31T19:37:37.397938691Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:37:37.397942451Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.3979456Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397950071Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397952969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:37.397956105Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:37:37.397959518Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:37:37.397962878Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:37:37.397966646Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:37:37.397970139Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.397973607Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:37:37.397976939Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:37.397980426Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:37.397983927Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:37.397987461Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal ScalingReplicaSet 18s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T19:37:37.397991496Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397994627Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.397997899Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:37:37.39800129Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: netcat-7458db8b8-9ggwz\n"} +{"Time":"2023-05-31T19:37:37.398005004Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:37:37.398008203Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 0\n"} +{"Time":"2023-05-31T19:37:37.398011288Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: default\n"} +{"Time":"2023-05-31T19:37:37.398014505Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-509041/192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.398017791Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 19:37:09 +0000\n"} +{"Time":"2023-05-31T19:37:37.398021247Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:37:37.398024957Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T19:37:37.398028317Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398031105Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:37.398034054Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T19:37:37.398037079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:37.398040343Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T19:37:37.398043673Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T19:37:37.398046965Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.398050315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:37:37.398053595Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: containerd://4b760a8a9cae32da97e44b9777d91bb417a94229c1e8e89ace281867f013704a\n"} +{"Time":"2023-05-31T19:37:37.398056688Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:37:37.398059904Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T19:37:37.398064227Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398068001Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398071463Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:37.398074772Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:37:37.398077686Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -c\n"} +{"Time":"2023-05-31T19:37:37.398081905Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:37:37.398085417Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:37.398088694Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 19:37:12 +0000\n"} +{"Time":"2023-05-31T19:37:37.398091687Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:37.398094652Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:37.39809954Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398102933Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:37.398106383Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-jc4xw (ro)\n"} +{"Time":"2023-05-31T19:37:37.398109237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:37.398112057Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:37.398115361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:37.398118609Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:37.398121969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:37.398124797Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:37.39812777Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:37.398130987Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-api-access-jc4xw:\n"} +{"Time":"2023-05-31T19:37:37.398134143Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:37:37.398137526Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:37:37.398140785Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.398144141Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:37:37.398147749Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:37:37.398151069Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:37:37.398154089Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398157798Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:37:37.398161115Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:37:37.398165245Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:37.398168226Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:37.398172189Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:37.398175871Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Scheduled 19s default-scheduler Successfully assigned default/netcat-7458db8b8-9ggwz to kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.398179909Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulling 18s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T19:37:37.398183902Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulled 16s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 2.237698108s (2.237716814s including waiting)\n"} +{"Time":"2023-05-31T19:37:37.39819674Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Created 16s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T19:37:37.398200199Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Started 16s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T19:37:37.398203195Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398206286Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398209583Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:37:37.398212837Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398215942Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398219179Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:37:37.398222679Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:37:37.398225568Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.398228718Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CreationTimestamp: Wed, 31 May 2023 19:36:42 +0000\n"} +{"Time":"2023-05-31T19:37:37.398233766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:37.398238511Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:37:37.398241988Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:37.398245141Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:37:37.398248153Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:37:37.398251483Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:37:37.398255588Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:37:37.398258695Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:37:37.398261818Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:37.398264835Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:37:37.398268058Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.398270926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" coredns:\n"} +{"Time":"2023-05-31T19:37:37.398274005Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:37:37.398277119Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:37:37.398280285Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:37:37.398283414Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Args:\n"} +{"Time":"2023-05-31T19:37:37.398286316Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -conf\n"} +{"Time":"2023-05-31T19:37:37.398289362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:37:37.398292359Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Limits:\n"} +{"Time":"2023-05-31T19:37:37.398299624Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:37:37.398302491Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T19:37:37.398305553Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:37:37.398308507Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:37:37.398311926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:37:37.398315169Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:37:37.398318202Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398321432Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:37.398324515Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:37:37.398327439Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:37.398330391Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:37:37.398333344Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:37:37.398336695Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:37:37.398339969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:37:37.398343202Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:37:37.398346399Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:37.398349681Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:37:37.398352902Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:37:37.398356129Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:37:37.398359419Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:37:37.39836269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398367287Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:37:37.398370954Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:37.398374557Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:37.398378115Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:37.398381745Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal ScalingReplicaSet 34s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T19:37:37.398385473Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal ScalingReplicaSet 33s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T19:37:37.398391476Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.39839464Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398397812Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:37:37.398401276Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: coredns-5d78c9869d-sxb9t\n"} +{"Time":"2023-05-31T19:37:37.398404186Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.398406912Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T19:37:37.398410136Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:37:37.39841309Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:37:37.398415174Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-509041/192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.398417225Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 19:37:00 +0000\n"} +{"Time":"2023-05-31T19:37:37.398421965Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:37:37.398425348Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T19:37:37.398428662Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398431766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:37.398435163Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:37:37.398438236Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:37.398441114Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:37:37.3984442Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T19:37:37.398447432Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.398452151Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" coredns:\n"} +{"Time":"2023-05-31T19:37:37.398455841Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: containerd://67eaa6660b03d69cfbe34989caebcdb157158aace415f9ce381fca3487c1ab10\n"} +{"Time":"2023-05-31T19:37:37.39845956Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:37:37.398463311Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T19:37:37.398467037Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:37:37.398470351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:37:37.398473742Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Args:\n"} +{"Time":"2023-05-31T19:37:37.39847691Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -conf\n"} +{"Time":"2023-05-31T19:37:37.398480168Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:37:37.398483522Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:37.398486792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 19:37:01 +0000\n"} +{"Time":"2023-05-31T19:37:37.398490121Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:37.398493376Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:37.398496797Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Limits:\n"} +{"Time":"2023-05-31T19:37:37.398500122Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:37:37.398503259Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T19:37:37.398507409Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:37:37.398520042Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:37:37.398523357Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:37:37.398543866Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:37:37.398549291Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398552714Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:37.398555995Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:37:37.398559503Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-scbzb (ro)\n"} +{"Time":"2023-05-31T19:37:37.398562882Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:37.39856594Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:37.398569271Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:37.39857267Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:37.3985759Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:37.398579056Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:37.398582132Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:37.398585441Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:37:37.398588776Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:37:37.398592199Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:37:37.398595531Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:37:37.398598828Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-api-access-scbzb:\n"} +{"Time":"2023-05-31T19:37:37.398601575Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:37:37.398603774Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:37:37.39860581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.398612301Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:37:37.398615768Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:37:37.398619354Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:37:37.398622951Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:37:37.39862976Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:37:37.398634Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T19:37:37.398637613Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:37:37.39864142Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:37:37.39864467Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:37.398648003Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:37.398651397Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:37.398655021Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Warning FailedScheduling 33s default-scheduler 0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..\n"} +{"Time":"2023-05-31T19:37:37.398659292Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Scheduled 28s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-sxb9t to kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.398663286Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulled 28s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T19:37:37.398667305Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Created 28s kubelet Created container coredns\n"} +{"Time":"2023-05-31T19:37:37.398670682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Started 27s kubelet Started container coredns\n"} +{"Time":"2023-05-31T19:37:37.398674262Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Warning Unhealthy 27s kubelet Readiness probe failed: Get \"http://10.244.0.2:8181/ready\": dial tcp 10.244.0.2:8181: connect: connection refused\n"} +{"Time":"2023-05-31T19:37:37.398678266Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398681623Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398684779Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:37:37.398687874Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" .:53\n"} +{"Time":"2023-05-31T19:37:37.398690164Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] plugin/reload: Running configuration SHA512 = 7996ca7cabdb2fd3e37b0463c78d5a492f8d30690ee66a90ae7ff24c50d9d936a24d239b3a5946771521ff70c09a796ffaf6ef8abe5753fd1ad5af38b6cdbb7f\n"} +{"Time":"2023-05-31T19:37:37.398693484Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T19:37:37.398695664Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T19:37:37.398699546Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 127.0.0.1:36683 - 27690 \"HINFO IN 3572299473291843485.8184203191977924696. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.040965272s\n"} +{"Time":"2023-05-31T19:37:37.398703545Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:43795 - 25550 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000240874s\n"} +{"Time":"2023-05-31T19:37:37.398707547Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:36513 - 17495 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000191804s\n"} +{"Time":"2023-05-31T19:37:37.398711377Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:55389 - 9054 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000149308s\n"} +{"Time":"2023-05-31T19:37:37.398715564Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:47529 - 22717 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000206537s\n"} +{"Time":"2023-05-31T19:37:37.398719387Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:47529 - 22984 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000159199s\n"} +{"Time":"2023-05-31T19:37:37.398723147Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:44972 - 46232 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.00017718s\n"} +{"Time":"2023-05-31T19:37:37.398726904Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:57510 - 4542 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000399749s\n"} +{"Time":"2023-05-31T19:37:37.39873068Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [INFO] 10.244.0.3:50471 - 39273 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000071318s\n"} +{"Time":"2023-05-31T19:37:37.398734171Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398737267Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.398740351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:37:37.398743767Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-apiserver-kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.398747089Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.398750292Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:37:37.398753482Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:37:37.398756807Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-509041/192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.398760302Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 19:36:43 +0000\n"} +{"Time":"2023-05-31T19:37:37.398763914Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T19:37:37.398767328Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T19:37:37.398770738Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.61.57:8443\n"} +{"Time":"2023-05-31T19:37:37.39877461Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/config.hash: 89b768a1544bf1724f7ebe2561793608\n"} +{"Time":"2023-05-31T19:37:37.398776841Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/config.mirror: 89b768a1544bf1724f7ebe2561793608\n"} +{"Time":"2023-05-31T19:37:37.398778951Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/config.seen: 2023-05-31T19:36:42.953830419Z\n"} +{"Time":"2023-05-31T19:37:37.398780951Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T19:37:37.398783051Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:37.398785612Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" SeccompProfile: RuntimeDefault\n"} +{"Time":"2023-05-31T19:37:37.398788796Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.398791815Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:37.398795208Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.398798575Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: Node/kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.398801831Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.398805302Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T19:37:37.39880925Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: containerd://57eab36847cd633a59bd554782b46ffcb351c91020343720a36fde37c2096a39\n"} +{"Time":"2023-05-31T19:37:37.398812786Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T19:37:37.398816314Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T19:37:37.398819628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398823077Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398826211Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:37.398830303Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T19:37:37.39883512Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --advertise-address=192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.398838477Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T19:37:37.398841694Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T19:37:37.398844948Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:37:37.398848755Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:37:37.398852349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T19:37:37.398855493Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T19:37:37.398858727Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T19:37:37.398861298Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T19:37:37.398863327Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T19:37:37.398865341Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T19:37:37.398867485Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T19:37:37.3988697Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T19:37:37.398872997Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T19:37:37.398876287Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T19:37:37.398879702Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T19:37:37.398883039Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.398886518Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T19:37:37.398890096Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T19:37:37.398893272Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T19:37:37.398896435Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T19:37:37.398901129Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:37:37.398904715Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T19:37:37.398907999Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T19:37:37.398911331Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T19:37:37.398914636Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T19:37:37.398918069Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T19:37:37.398921624Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:37.398925026Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 19:36:35 +0000\n"} +{"Time":"2023-05-31T19:37:37.398928266Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:37.398931596Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:37.398936404Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T19:37:37.398939907Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:37:37.398943347Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Liveness: http-get https://192.168.61.57:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T19:37:37.398946761Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Readiness: http-get https://192.168.61.57:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:37:37.398950115Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Startup: http-get https://192.168.61.57:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T19:37:37.39895338Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.398956636Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:37.398959739Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T19:37:37.398962844Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T19:37:37.398966067Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T19:37:37.398969875Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:37.398974028Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:37.39897754Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:37.398980803Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:37.398985752Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:37.398989032Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:37.39899227Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:37.398995392Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca-certs:\n"} +{"Time":"2023-05-31T19:37:37.398998755Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.399002255Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:37:37.399005613Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:37:37.399008863Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T19:37:37.39901215Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.399015465Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:37:37.399018657Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:37:37.399022165Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T19:37:37.399025496Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.399028903Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T19:37:37.399032126Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:37:37.399035038Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:37:37.399038496Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.399040695Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:37:37.399042875Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.399044744Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.39904719Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.399050225Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:37:37.399053562Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:36.083457 1 server.go:551] external host was not specified, using 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.399057205Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:36.084774 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T19:37:37.399060988Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:36.084855 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:37:37.399066708Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:36.514814 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T19:37:37.399070988Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:36.565293 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T19:37:37.399076745Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:36.565582 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T19:37:37.399081292Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:36.570028 1 logging.go:59] [core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T19:37:37.399084781Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T19:37:37.399088466Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T19:37:37.399091879Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"Attributes\": null,\n"} +{"Time":"2023-05-31T19:37:37.399095384Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T19:37:37.399098706Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"Type\": 0,\n"} +{"Time":"2023-05-31T19:37:37.399102032Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"Metadata\": null\n"} +{"Time":"2023-05-31T19:37:37.399105391Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T19:37:37.399109239Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:37.621682 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399112829Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:37.622174 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399116237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:37.624057 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T19:37:37.399121194Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:37.858172 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399123986Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:37.858660 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:37:37.399126184Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.216755 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:37:37.399128467Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.230024 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399130623Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.230313 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399133023Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.230510 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399136729Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.233814 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399140163Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.234025 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399143581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.237632 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399147414Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.238968 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399151007Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.239256 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399154701Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.239469 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399158086Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.243090 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.39916165Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.243311 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399165223Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.245931 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399168734Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.246210 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399172221Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.246381 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399176903Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.248598 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399180366Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.248938 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399206029Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.250981 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399305984Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.251787 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399319944Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.255149 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399341429Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.255362 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399346892Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.255562 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399350826Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.257825 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399354682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.258027 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.39935825Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.258300 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399361838Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.260736 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399365465Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.260986 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399369246Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.266658 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399372882Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.266965 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399376548Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.267128 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399380146Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.270051 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399383734Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.270375 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399387332Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.270684 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399390816Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.274824 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399394287Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.275063 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399588381Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.275228 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399595181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.278241 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399599145Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.279569 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399603094Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.279698 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399607071Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.279962 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399611137Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.287701 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399615192Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.287829 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399618682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.287953 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399622243Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.291028 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399625893Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.291137 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399629811Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.291238 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399633503Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.293639 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.399637475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.293768 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.399641161Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:38.311985 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:37:37.39964542Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:38.312102 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:37:37.39964912Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.162990 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:37:37.399740317Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.163136 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:37:37.399743966Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.163965 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T19:37:37.399746852Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.165825 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T19:37:37.399749866Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.166102 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T19:37:37.399753537Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.169454 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T19:37:37.399757211Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.169970 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T19:37:37.399760986Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.170456 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T19:37:37.399764973Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.172260 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:37:37.399768688Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.173669 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:37:37.39977213Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.173851 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T19:37:37.399775833Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.174007 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T19:37:37.399779981Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.174446 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T19:37:37.399783583Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.174722 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T19:37:37.39978717Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.174780 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:37:37.39979079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.174770 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T19:37:37.399794237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.174989 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T19:37:37.399797973Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.175329 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T19:37:37.399981033Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.175407 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:37:37.399985256Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.175439 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T19:37:37.399987607Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.175531 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T19:37:37.399989788Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.175578 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:37:37.399991955Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.175767 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T19:37:37.399995216Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.176165 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T19:37:37.399998856Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.176733 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T19:37:37.400002399Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.176805 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T19:37:37.400006162Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.176824 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T19:37:37.400009811Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.177088 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T19:37:37.400013773Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.177135 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T19:37:37.400017425Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.177147 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T19:37:37.40002093Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.177161 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T19:37:37.400024425Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.213689 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T19:37:37.400028034Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.216110 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T19:37:37.400032269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.217353 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:37:37.40004532Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.218226 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:37:37.400049255Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.319250 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T19:37:37.400245437Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.327732 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T19:37:37.400250598Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.371005 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T19:37:37.400254355Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.374967 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:37:37.400258544Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.375637 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:37:37.400262149Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.375569 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:37:37.400265607Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.376321 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T19:37:37.400271825Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.376448 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T19:37:37.400275178Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.375136 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T19:37:37.400278614Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.377968 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T19:37:37.400282249Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" E0531 19:36:39.381271 1 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"namespaces \\\"kube-system\\\" not found\" interval=\"200ms\"\n"} +{"Time":"2023-05-31T19:37:37.400286373Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.588551 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T19:37:37.400290082Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:39.850862 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T19:37:37.400293944Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:40.180228 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T19:37:37.400297628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:40.189124 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T19:37:37.400301181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:40.189169 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T19:37:37.400304809Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:40.867148 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:37:37.400308499Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:40.936391 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:37:37.400484138Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:41.025713 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T19:37:37.400487844Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" W0531 19:36:41.035021 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.61.57]\n"} +{"Time":"2023-05-31T19:37:37.400491596Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:41.036290 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T19:37:37.400493801Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:41.041285 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T19:37:37.400496987Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:41.289394 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T19:37:37.400500554Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:42.804764 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T19:37:37.400504186Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:42.827633 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T19:37:37.400508179Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:42.839029 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T19:37:37.400512351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:54.230091 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T19:37:37.400516064Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:55.084848 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T19:37:37.400519784Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:37:09.808728 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.108.89.157]\n"} +{"Time":"2023-05-31T19:37:37.400523698Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" E0531 19:37:19.998790 1 upgradeaware.go:426] Error proxying data from client to backend: write tcp 192.168.61.57:48872-\u003e192.168.61.57:10250: write: broken pipe\n"} +{"Time":"2023-05-31T19:37:37.400528581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" E0531 19:37:25.859393 1 upgradeaware.go:426] Error proxying data from client to backend: write tcp 192.168.61.57:48932-\u003e192.168.61.57:10250: write: broken pipe\n"} +{"Time":"2023-05-31T19:37:37.40053248Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.40053747Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.400541304Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:37:37.400545163Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d/10-kindnet.conflist\r\n"} +{"Time":"2023-05-31T19:37:37.400564215Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.40075274Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:37.400757181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T19:37:37.400760876Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"name\": \"kindnet\",\r\n"} +{"Time":"2023-05-31T19:37:37.400764503Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"plugins\": [\r\n"} +{"Time":"2023-05-31T19:37:37.400768164Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t{\r\n"} +{"Time":"2023-05-31T19:37:37.400771645Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"type\": \"ptp\",\r\n"} +{"Time":"2023-05-31T19:37:37.400777778Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"ipMasq\": false,\r\n"} +{"Time":"2023-05-31T19:37:37.40078068Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"ipam\": {\r\n"} +{"Time":"2023-05-31T19:37:37.400782691Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:37:37.400784985Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"dataDir\": \"/run/cni-ipam-state\",\r\n"} +{"Time":"2023-05-31T19:37:37.40078738Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"routes\": [\r\n"} +{"Time":"2023-05-31T19:37:37.40078993Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t\r\n"} +{"Time":"2023-05-31T19:37:37.400793132Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t\r\n"} +{"Time":"2023-05-31T19:37:37.400796344Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t{ \"dst\": \"0.0.0.0/0\" }\r\n"} +{"Time":"2023-05-31T19:37:37.400799917Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t],\r\n"} +{"Time":"2023-05-31T19:37:37.400803143Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"ranges\": [\r\n"} +{"Time":"2023-05-31T19:37:37.400806811Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t\r\n"} +{"Time":"2023-05-31T19:37:37.400810316Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t\r\n"} +{"Time":"2023-05-31T19:37:37.400813445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\t[ { \"subnet\": \"10.244.0.0/24\" } ]\r\n"} +{"Time":"2023-05-31T19:37:37.400818374Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t]\r\n"} +{"Time":"2023-05-31T19:37:37.40082152Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t}\r\n"} +{"Time":"2023-05-31T19:37:37.400824757Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t,\r\n"} +{"Time":"2023-05-31T19:37:37.40082792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"mtu\": 1500\r\n"} +{"Time":"2023-05-31T19:37:37.400831094Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\r\n"} +{"Time":"2023-05-31T19:37:37.40083416Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t},\r\n"} +{"Time":"2023-05-31T19:37:37.400837492Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t{\r\n"} +{"Time":"2023-05-31T19:37:37.400840824Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:37:37.400844242Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:37:37.400985766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t\t\"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:37:37.400990512Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\t}\r\n"} +{"Time":"2023-05-31T19:37:37.400993736Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t}\r\n"} +{"Time":"2023-05-31T19:37:37.400996984Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t]\r\n"} +{"Time":"2023-05-31T19:37:37.401000392Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:37.401003937Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T19:37:37.401007441Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:37.401010793Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T19:37:37.40101425Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T19:37:37.401017808Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:37:37.401020948Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:37.401023963Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:37:37.40102651Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T19:37:37.401028607Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T19:37:37.401030829Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:37:37.401032857Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:37:37.401035866Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:37:37.401039186Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:37:37.401042626Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T19:37:37.401046643Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T19:37:37.401050089Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [\r\n"} +{"Time":"2023-05-31T19:37:37.401053899Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:37.401057415Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T19:37:37.401060839Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T19:37:37.401064168Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:37.401067334Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.401070416Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.401211211Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:37.401215527Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:37.401218607Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:37.401221897Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:37:37.401225352Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:37:37.401228722Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:37:37.401231943Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:37.401234987Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:37.401237973Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:37.401241205Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T19:37:37.401244548Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:37.401247625Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:37.401250653Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T19:37:37.40125381Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:37.401257091Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.40126021Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:37.401263307Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d/.keep\r\n"} +{"Time":"2023-05-31T19:37:37.401266514Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.401269469Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.401271917Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:37:37.401274108Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:37.401276368Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T19:37:37.401278465Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T19:37:37.401281698Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:37:37.401285004Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 2: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:37.401288684Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ether 52:54:00:87:8c:55 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:37:37.40129219Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 192.168.61.57/24 brd 192.168.61.255 scope global dynamic eth0\r\n"} +{"Time":"2023-05-31T19:37:37.401413821Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft 3518sec preferred_lft 3518sec\r\n"} +{"Time":"2023-05-31T19:37:37.4014181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3: eth1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:37.401421815Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ether 52:54:00:e9:fb:7e brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:37:37.401425445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 192.168.122.160/24 brd 192.168.122.255 scope global dynamic eth1\r\n"} +{"Time":"2023-05-31T19:37:37.401429207Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft 3518sec preferred_lft 3518sec\r\n"} +{"Time":"2023-05-31T19:37:37.401432486Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 4: sit0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:37:37.401435101Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/sit 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T19:37:37.401437165Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 5: veth65f11d0c@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T19:37:37.401439556Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ether 5a:f9:21:e7:a9:61 brd ff:ff:ff:ff:ff:ff link-netns cni-7b5455fc-eb7e-3d0a-b2cf-4c6464146f9a\r\n"} +{"Time":"2023-05-31T19:37:37.401441792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 10.244.0.1/32 brd 10.244.0.1 scope global veth65f11d0c\r\n"} +{"Time":"2023-05-31T19:37:37.401444202Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:37:37.401447572Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 6: veth736977c0@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T19:37:37.401451228Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" link/ether 1e:1a:b0:63:15:a4 brd ff:ff:ff:ff:ff:ff link-netns cni-eeddec3e-10ff-11b0-e790-d589cce54562\r\n"} +{"Time":"2023-05-31T19:37:37.40145719Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" inet 10.244.0.1/32 brd 10.244.0.1 scope global veth736977c0\r\n"} +{"Time":"2023-05-31T19:37:37.401461212Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:37:37.401464534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.401468498Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.401471722Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:37:37.401475324Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default via 192.168.122.1 dev eth1 proto dhcp src 192.168.122.160 metric 1024 \r\n"} +{"Time":"2023-05-31T19:37:37.401478877Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 10.244.0.2 dev veth65f11d0c scope host \r\n"} +{"Time":"2023-05-31T19:37:37.401482174Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 10.244.0.3 dev veth736977c0 scope host \r\n"} +{"Time":"2023-05-31T19:37:37.4016379Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.61.0/24 dev eth0 proto kernel scope link src 192.168.61.57 \r\n"} +{"Time":"2023-05-31T19:37:37.401642369Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.122.0/24 dev eth1 proto kernel scope link src 192.168.122.160 \r\n"} +{"Time":"2023-05-31T19:37:37.401645847Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.122.1 dev eth1 proto dhcp scope link src 192.168.122.160 metric 1024 \r\n"} +{"Time":"2023-05-31T19:37:37.401649101Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.401652148Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.401656813Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:37:37.401660497Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:37:30 2023\r\n"} +{"Time":"2023-05-31T19:37:37.401663807Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" *nat\r\n"} +{"Time":"2023-05-31T19:37:37.401667076Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:37:37.401670284Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:37:37.401673498Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :OUTPUT ACCEPT [42:2520]\r\n"} +{"Time":"2023-05-31T19:37:37.401676543Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :POSTROUTING ACCEPT [51:3195]\r\n"} +{"Time":"2023-05-31T19:37:37.401679073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KIND-MASQ-AGENT - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401681073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401683021Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401685009Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401687112Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401690189Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401693334Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-DJKAQPKR554AIVHG - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401696601Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401699894Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401703264Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-UTWFOSUDHOCXYA2F - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401706743Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401710288Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401713569Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401857262Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401860227Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401862209Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401864084Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.401866142Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:37.401868501Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:37.401870839Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:37:37.401873213Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A POSTROUTING -m addrtype ! --dst-type LOCAL -m comment --comment \"kind-masq-agent: ensure nat POSTROUTING directs all non-LOCAL destination traffic to our custom KIND-MASQ-AGENT chain\" -j KIND-MASQ-AGENT\r\n"} +{"Time":"2023-05-31T19:37:37.401876734Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KIND-MASQ-AGENT -d 10.244.0.0/16 -m comment --comment \"kind-masq-agent: local traffic is not subject to MASQUERADE\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:37:37.401880328Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KIND-MASQ-AGENT -m comment --comment \"kind-masq-agent: outbound traffic is subject to MASQUERADE (must be last in chain)\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T19:37:37.401883909Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:37:37.401887499Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:37:37.401890929Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T19:37:37.401894856Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:37:37.40189881Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-DJKAQPKR554AIVHG -s 192.168.61.57/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.401902678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-DJKAQPKR554AIVHG -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.61.57:8443\r\n"} +{"Time":"2023-05-31T19:37:37.401906526Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.401912085Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:37:37.401915849Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.402061041Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:37:37.402070142Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -s 10.244.0.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.402073516Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T19:37:37.402076064Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.402078555Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:37:37.402081305Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T19:37:37.402083962Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T19:37:37.402089393Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T19:37:37.40209389Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T19:37:37.402096474Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -d 10.108.89.157/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T19:37:37.402098987Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:37:37.402101695Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.402104178Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T19:37:37.402106739Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.40210923Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T19:37:37.402295263Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.402298722Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.61.57:8443\" -j KUBE-SEP-DJKAQPKR554AIVHG\r\n"} +{"Time":"2023-05-31T19:37:37.402301228Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.402303951Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T19:37:37.402306521Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.108.89.157/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:37:37.402310302Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.3:8080\" -j KUBE-SEP-UTWFOSUDHOCXYA2F\r\n"} +{"Time":"2023-05-31T19:37:37.402312687Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:37:37.40231497Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Completed on Wed May 31 19:37:30 2023\r\n"} +{"Time":"2023-05-31T19:37:37.402317219Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:37:30 2023\r\n"} +{"Time":"2023-05-31T19:37:37.402319746Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" *mangle\r\n"} +{"Time":"2023-05-31T19:37:37.402321704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :PREROUTING ACCEPT [15079:55680504]\r\n"} +{"Time":"2023-05-31T19:37:37.402324076Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :INPUT ACCEPT [15040:55677456]\r\n"} +{"Time":"2023-05-31T19:37:37.402326451Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :FORWARD ACCEPT [37:2968]\r\n"} +{"Time":"2023-05-31T19:37:37.402328663Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :OUTPUT ACCEPT [12540:4936722]\r\n"} +{"Time":"2023-05-31T19:37:37.402331371Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :POSTROUTING ACCEPT [12580:4939842]\r\n"} +{"Time":"2023-05-31T19:37:37.402334989Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402337129Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.40233947Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402341895Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:37:37.402344048Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Completed on Wed May 31 19:37:30 2023\r\n"} +{"Time":"2023-05-31T19:37:37.402346213Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:37:30 2023\r\n"} +{"Time":"2023-05-31T19:37:37.402533847Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" *filter\r\n"} +{"Time":"2023-05-31T19:37:37.402536269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :INPUT ACCEPT [6101:1381449]\r\n"} +{"Time":"2023-05-31T19:37:37.402538395Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :FORWARD ACCEPT [15:849]\r\n"} +{"Time":"2023-05-31T19:37:37.40254117Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :OUTPUT ACCEPT [6010:1682494]\r\n"} +{"Time":"2023-05-31T19:37:37.40254444Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402547903Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402551048Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402554285Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402557617Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402561252Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.40256455Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402568042Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:37:37.402571539Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:37.402575115Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:37:37.402577829Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:37.402580217Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:37.402582396Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:37.402586012Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T19:37:37.402588663Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:37.40259116Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:37.402593675Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:37.402596372Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:37:37.402720711Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:37:37.40272328Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T19:37:37.402725683Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:37:37.402727933Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:37:37.402730353Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:37:37.402732533Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:37:37.402734557Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Completed on Wed May 31 19:37:30 2023\r\n"} +{"Time":"2023-05-31T19:37:37.402736838Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.402739053Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.40274121Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:37:37.402743501Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:37:37.402745606Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.402747918Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 57 3780 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:37:37.40275926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.402761573Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:37:37.402763922Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.402765952Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.40276792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain OUTPUT (policy ACCEPT 44 packets, 2640 bytes)\r\n"} +{"Time":"2023-05-31T19:37:37.402769932Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.402779037Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 88 5302 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:37:37.402781393Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.4029092Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain POSTROUTING (policy ACCEPT 53 packets, 3315 bytes)\r\n"} +{"Time":"2023-05-31T19:37:37.402912579Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.402915031Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 99 6122 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T19:37:37.402917602Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 29 1922 KIND-MASQ-AGENT all -- * * 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type !LOCAL /* kind-masq-agent: ensure nat POSTROUTING directs all non-LOCAL destination traffic to our custom KIND-MASQ-AGENT chain */\r\n"} +{"Time":"2023-05-31T19:37:37.402920272Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.402922308Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KIND-MASQ-AGENT (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.402924638Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.402926889Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 14 975 RETURN all -- * * 0.0.0.0/0 10.244.0.0/16 /* kind-masq-agent: local traffic is not subject to MASQUERADE */\r\n"} +{"Time":"2023-05-31T19:37:37.402929413Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 15 947 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kind-masq-agent: outbound traffic is subject to MASQUERADE (must be last in chain) */\r\n"} +{"Time":"2023-05-31T19:37:37.402931618Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.402933643Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:37:37.402935739Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.402937815Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.402940107Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T19:37:37.402942213Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.402944378Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T19:37:37.402946489Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.402948457Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.40295078Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.402952779Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403083871Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403086677Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403088948Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 53 3315 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:37:37.403091468Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T19:37:37.403093917Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T19:37:37.403096165Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403098268Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403100442Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403102788Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403104875Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-DJKAQPKR554AIVHG (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403107058Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403109851Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 192.168.61.57 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T19:37:37.403112131Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.61.57:8443\r\n"} +{"Time":"2023-05-31T19:37:37.403114316Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403116338Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403118474Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403120611Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T19:37:37.403123041Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:37:37.403125118Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403127207Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403204064Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403206604Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T19:37:37.403208927Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:37:37.403211071Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403212971Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-UTWFOSUDHOCXYA2F (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403215014Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403217162Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T19:37:37.403219387Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T19:37:37.403221715Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403223667Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403225713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403227823Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T19:37:37.403234835Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:37:37.403236964Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403238861Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403240963Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403243155Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:37:37.403245523Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:37:37.403247851Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:37:37.403388782Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:37:37.4033928Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.108.89.157 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:37:37.403395252Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 79 4740 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T19:37:37.403397574Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403399574Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403401647Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.40340383Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:37:37.403406054Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:37:37.403408249Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.40341014Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403412199Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.403414509Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:37:37.403416864Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T19:37:37.403419293Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403421329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403423398Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.40344063Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 2 120 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:37:37.403545653Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 3 180 KUBE-SEP-DJKAQPKR554AIVHG all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.61.57:8443 */\r\n"} +{"Time":"2023-05-31T19:37:37.403548364Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403550547Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403552674Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.40355493Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:37:37.403557307Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:37:37.403560323Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.403562303Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T19:37:37.403564408Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:37:37.40356676Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.108.89.157 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:37:37.403569067Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 1 60 KUBE-SEP-UTWFOSUDHOCXYA2F all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.3:8080 */\r\n"} +{"Time":"2023-05-31T19:37:37.403571303Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.403573233Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.403575237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kindnet daemon set:\n"} +{"Time":"2023-05-31T19:37:37.403577325Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kindnet\n"} +{"Time":"2023-05-31T19:37:37.403579435Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Selector: app=kindnet\n"} +{"Time":"2023-05-31T19:37:37.403581432Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selector: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.403583507Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=kindnet\n"} +{"Time":"2023-05-31T19:37:37.403585559Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-app=kindnet\n"} +{"Time":"2023-05-31T19:37:37.403587507Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tier=node\n"} +{"Time":"2023-05-31T19:37:37.403589435Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:37:37.403663022Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:37:37.40366682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:37:37.403669016Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:37:37.403671048Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:37:37.403673011Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:37:37.403675041Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:37:37.403678118Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:37:37.40368025Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=kindnet\n"} +{"Time":"2023-05-31T19:37:37.403682276Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-app=kindnet\n"} +{"Time":"2023-05-31T19:37:37.403684294Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tier=node\n"} +{"Time":"2023-05-31T19:37:37.40368622Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: kindnet\n"} +{"Time":"2023-05-31T19:37:37.403688198Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.403690168Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kindnet-cni:\n"} +{"Time":"2023-05-31T19:37:37.40369222Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: docker.io/kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T19:37:37.403694326Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.403696314Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.403698321Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Limits:\n"} +{"Time":"2023-05-31T19:37:37.403700239Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:37:37.403702201Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:37:37.40370413Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T19:37:37.403706113Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:37:37.403708054Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:37:37.403710113Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment:\n"} +{"Time":"2023-05-31T19:37:37.403713625Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HOST_IP: (v1:status.hostIP)\n"} +{"Time":"2023-05-31T19:37:37.403716175Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD_IP: (v1:status.podIP)\n"} +{"Time":"2023-05-31T19:37:37.403718604Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD_SUBNET: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:37:37.403789966Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:37.403792429Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d from cni-cfg (rw)\n"} +{"Time":"2023-05-31T19:37:37.403794556Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:37:37.403796617Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:37:37.403798997Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:37.403801019Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni-cfg:\n"} +{"Time":"2023-05-31T19:37:37.403803102Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.403805228Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:37:37.403807289Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:37:37.4038093Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:37:37.403811359Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.403813319Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:37:37.403815233Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:37:37.403817102Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:37:37.403819093Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.403821289Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:37:37.403823295Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:37:37.403825307Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:37.403827349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:37.403829582Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:37.40383162Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal SuccessfulCreate 36s daemonset-controller Created pod: kindnet-hmx2r\n"} +{"Time":"2023-05-31T19:37:37.403833977Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.403835782Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.403837788Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kindnet pod(s):\n"} +{"Time":"2023-05-31T19:37:37.403839918Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kindnet-hmx2r\n"} +{"Time":"2023-05-31T19:37:37.403841959Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.403978848Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 0\n"} +{"Time":"2023-05-31T19:37:37.403982237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: kindnet\n"} +{"Time":"2023-05-31T19:37:37.403984326Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-509041/192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.403986502Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 19:36:55 +0000\n"} +{"Time":"2023-05-31T19:37:37.403988611Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: app=kindnet\n"} +{"Time":"2023-05-31T19:37:37.403990782Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" controller-revision-hash=575d9d6996\n"} +{"Time":"2023-05-31T19:37:37.403993067Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-app=kindnet\n"} +{"Time":"2023-05-31T19:37:37.403995349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:37:37.403998522Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tier=node\n"} +{"Time":"2023-05-31T19:37:37.40400085Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.404002958Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:37.404004937Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.404007143Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:37.40400926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.404011444Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: DaemonSet/kindnet\n"} +{"Time":"2023-05-31T19:37:37.404014315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.404016453Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kindnet-cni:\n"} +{"Time":"2023-05-31T19:37:37.404018603Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: containerd://3151472df4fc3db4ee5bb0951327053bbb33fdcd0de97a52244ba5c21c6bc343\n"} +{"Time":"2023-05-31T19:37:37.404020728Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: docker.io/kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T19:37:37.404022801Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: docker.io/kindest/kindnetd@sha256:6c00e28db008c2afa67d9ee085c86184ec9ae5281d5ae1bd15006746fb9a1974\n"} +{"Time":"2023-05-31T19:37:37.404024949Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.404027091Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.404029228Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:37.404031236Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 19:36:59 +0000\n"} +{"Time":"2023-05-31T19:37:37.404033351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:37.40415011Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:37.404152222Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Limits:\n"} +{"Time":"2023-05-31T19:37:37.404154202Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:37:37.404156135Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:37:37.404158917Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requests:\n"} +{"Time":"2023-05-31T19:37:37.404160939Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:37:37.404163004Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:37:37.404164845Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment:\n"} +{"Time":"2023-05-31T19:37:37.404166824Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HOST_IP: (v1:status.hostIP)\n"} +{"Time":"2023-05-31T19:37:37.404169075Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD_IP: (v1:status.podIP)\n"} +{"Time":"2023-05-31T19:37:37.40417126Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" POD_SUBNET: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:37:37.404173167Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:37.404175151Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/cni/net.d from cni-cfg (rw)\n"} +{"Time":"2023-05-31T19:37:37.40417711Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:37:37.404179075Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:37:37.404181244Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-pzptv (ro)\n"} +{"Time":"2023-05-31T19:37:37.404183324Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:37.404185214Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:37.404187164Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:37.404189146Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:37.404191131Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:37.404193037Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:37.404195019Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:37.404196947Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni-cfg:\n"} +{"Time":"2023-05-31T19:37:37.404198949Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.404200856Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:37:37.404203286Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:37:37.404313607Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:37:37.404315948Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.404318073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:37:37.4043201Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:37:37.40432207Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:37:37.404324395Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.404326434Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:37:37.404328694Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:37:37.40433066Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-api-access-pzptv:\n"} +{"Time":"2023-05-31T19:37:37.404332765Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:37:37.40433481Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:37:37.40433682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.404338847Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:37:37.404340917Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:37:37.404342896Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: Guaranteed\n"} +{"Time":"2023-05-31T19:37:37.404344927Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.404347052Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: :NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.40434915Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.40435138Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.404353554Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.404355694Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:37:37.404357837Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.404360015Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:37:37.404453714Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.404456171Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:37.404458169Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:37.404460337Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:37.404462368Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Scheduled 36s default-scheduler Successfully assigned kube-system/kindnet-hmx2r to kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.40446472Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulled 32s kubelet Container image \"docker.io/kindest/kindnetd:v20230511-dc714da8\" already present on machine\n"} +{"Time":"2023-05-31T19:37:37.404467356Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Created 32s kubelet Created container kindnet-cni\n"} +{"Time":"2023-05-31T19:37:37.4044694Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Started 32s kubelet Started container kindnet-cni\n"} +{"Time":"2023-05-31T19:37:37.404471298Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.404473223Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.404475096Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kindnet container(s) logs (current):\n"} +{"Time":"2023-05-31T19:37:37.404477238Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:36:59.552751 1 main.go:146] kindnetd IP family: \"ipv4\"\n"} +{"Time":"2023-05-31T19:37:37.404479396Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:36:59.552957 1 main.go:150] noMask IPv4 subnets: [10.244.0.0/16]\n"} +{"Time":"2023-05-31T19:37:37.404481778Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:36:59.953262 1 main.go:223] Handling node with IPs: map[192.168.61.57:{}]\n"} +{"Time":"2023-05-31T19:37:37.40448408Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:36:59.953586 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T19:37:37.404486266Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:37:09.959569 1 main.go:223] Handling node with IPs: map[192.168.61.57:{}]\n"} +{"Time":"2023-05-31T19:37:37.404488438Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:37:09.959722 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T19:37:37.404490605Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:37:19.974061 1 main.go:223] Handling node with IPs: map[192.168.61.57:{}]\n"} +{"Time":"2023-05-31T19:37:37.404492758Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:37:19.974128 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T19:37:37.404494902Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:37:29.979704 1 main.go:223] Handling node with IPs: map[192.168.61.57:{}]\n"} +{"Time":"2023-05-31T19:37:37.404667628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [pod/kindnet-hmx2r/kindnet-cni] I0531 19:37:29.979760 1 main.go:227] handling current node\n"} +{"Time":"2023-05-31T19:37:37.404682217Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.404685958Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.404689293Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kindnet container(s) logs (previous):\n"} +{"Time":"2023-05-31T19:37:37.404693218Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: previous terminated container \"kindnet-cni\" in pod \"kindnet-hmx2r\" not found\n"} +{"Time":"2023-05-31T19:37:37.404696728Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.404700038Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.404703273Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:37:37.404706653Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.404709986Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.404713245Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:37:37.404716656Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.404719907Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:37:37.404723141Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:37:37.404726586Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:37:37.404729786Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:37:37.404732925Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:37:37.404736184Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:37:37.404739685Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:37:37.4047431Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:37:37.404746517Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.404749977Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.404753263Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.404756721Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:37:37.40476239Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:37:37.404925852Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.404930008Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.404933282Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:37.404936467Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.40493982Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:37:37.404943172Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:37:37.404946233Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment:\n"} +{"Time":"2023-05-31T19:37:37.404949424Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:37:37.404953372Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:37.404956704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:37:37.404960018Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:37:37.404964623Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:37:37.404968052Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:37.404971268Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:37:37.404974504Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:37:37.404977882Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.40498116Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:37:37.404984482Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:37:37.404987799Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.404990992Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:37:37.404994228Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:37:37.404997388Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:37:37.405001698Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.405005108Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:37:37.40500833Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:37:37.405011714Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:37:37.405188403Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:37.405192906Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:37.405196409Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:37.405199946Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal SuccessfulCreate 36s daemonset-controller Created pod: kube-proxy-pmg7z\n"} +{"Time":"2023-05-31T19:37:37.405203774Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.405206864Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.405209949Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:37:37.405213481Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-proxy-pmg7z\n"} +{"Time":"2023-05-31T19:37:37.405216696Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.40521988Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:37:37.405223117Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:37:37.405226362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.405229472Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node: kindnet-509041/192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.405232771Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Start Time: Wed, 31 May 2023 19:36:55 +0000\n"} +{"Time":"2023-05-31T19:37:37.405236468Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T19:37:37.405239961Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.405243178Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:37:37.405246293Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.405249514Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:37:37.405252752Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.405255809Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IPs:\n"} +{"Time":"2023-05-31T19:37:37.405259037Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP: 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.40526219Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.405265253Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Containers:\n"} +{"Time":"2023-05-31T19:37:37.405268405Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:37:37.405530363Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Container ID: containerd://ee1df56520a430b13751adf769d917610e7c2765c3cdc586d558cfb2a712aa63\n"} +{"Time":"2023-05-31T19:37:37.405535126Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:37:37.405538953Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Image ID: registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T19:37:37.405543017Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.405546291Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:37:37.405549575Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Command:\n"} +{"Time":"2023-05-31T19:37:37.405552842Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.405556129Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:37:37.405559362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:37:37.405562526Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" State: Running\n"} +{"Time":"2023-05-31T19:37:37.405565866Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Started: Wed, 31 May 2023 19:36:56 +0000\n"} +{"Time":"2023-05-31T19:37:37.405569278Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:37:37.405572439Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:37:37.405576184Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment:\n"} +{"Time":"2023-05-31T19:37:37.405579642Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:37:37.405583079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:37:37.40558624Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:37:37.405589737Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:37:37.405593181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:37:37.405596579Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-jzcp6 (ro)\n"} +{"Time":"2023-05-31T19:37:37.405599914Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:37:37.405603128Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Status\n"} +{"Time":"2023-05-31T19:37:37.405606228Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:37:37.405609376Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Ready True \n"} +{"Time":"2023-05-31T19:37:37.405614156Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:37:37.405879503Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:37:37.405883261Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:37:37.405886367Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:37:37.40588963Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:37:37.405892995Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.405896214Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:37:37.405899335Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:37:37.40590265Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.405906283Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:37:37.405909633Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:37:37.405912918Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:37:37.405916202Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:37:37.405919445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:37:37.405922549Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:37:37.405925591Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-api-access-jzcp6:\n"} +{"Time":"2023-05-31T19:37:37.405928928Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:37:37.405932475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:37:37.405935724Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.4059391Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:37:37.405942494Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:37:37.405945628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:37:37.405948762Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:37:37.405952294Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T19:37:37.405955757Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.405959418Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.406244904Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.406249393Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:37:37.406253153Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.406256666Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:37:37.406260228Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:37:37.406263384Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Events:\n"} +{"Time":"2023-05-31T19:37:37.406266893Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:37:37.406270438Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:37:37.406274193Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Scheduled 36s default-scheduler Successfully assigned kube-system/kube-proxy-pmg7z to kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.406278027Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Pulled 36s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:37:37.406281792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Created 36s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.406285122Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Normal Started 35s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.406290155Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.406293242Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.406296598Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:37:37.406301304Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.241776 1 node.go:141] Successfully retrieved node IP: 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.406304943Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.241842 1 server_others.go:110] \"Detected node IP\" address=\"192.168.61.57\"\n"} +{"Time":"2023-05-31T19:37:37.406308607Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.241861 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T19:37:37.406312233Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.319316 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T19:37:37.406316024Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.319334 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T19:37:37.406584896Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.319359 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T19:37:37.406590054Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.319738 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T19:37:37.406593832Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.319749 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:37:37.406597916Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.320429 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T19:37:37.406601632Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.320446 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T19:37:37.406605322Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.320464 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T19:37:37.406608898Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.320467 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T19:37:37.406612503Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.322775 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T19:37:37.406616028Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.322852 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T19:37:37.406619704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.421412 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T19:37:37.4066233Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.421440 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T19:37:37.406626771Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" I0531 19:36:56.423512 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T19:37:37.406630471Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.406633547Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.406636696Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:37:37.40664012Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:37:37.406644673Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: loaded (\u001b]8;;file://kindnet-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:37:37.406648807Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T19:37:37.4066524Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─\u001b]8;;file://kindnet-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:37:37.406918256Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:36:42 UTC; 49s ago\r\n"} +{"Time":"2023-05-31T19:37:37.406924498Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:37:37.406928324Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Main PID: 1233 (kubelet)\r\n"} +{"Time":"2023-05-31T19:37:37.406931637Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tasks: 12 (limit: 3251)\r\n"} +{"Time":"2023-05-31T19:37:37.406935002Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Memory: 32.2M\r\n"} +{"Time":"2023-05-31T19:37:37.406938479Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T19:37:37.406942724Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─1233 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=kindnet-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.61.57\r\n"} +{"Time":"2023-05-31T19:37:37.406947026Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.406950654Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.112817 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-fmg2k\\\" (UniqueName: \\\"kubernetes.io/projected/3b79e9be-7391-4d2d-9751-ef3541657148-kube-api-access-fmg2k\\\") pod \\\"storage-provisioner\\\" (UID: \\\"3b79e9be-7391-4d2d-9751-ef3541657148\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:37:37.406959685Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.162754 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kindnet-hmx2r\" podStartSLOduration=5.162725698 podCreationTimestamp=\"2023-05-31 19:36:55 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:00.141855857 +0000 UTC m=+17.382304652\" watchObservedRunningTime=\"2023-05-31 19:37:00.162725698 +0000 UTC m=+17.403174483\"\r\n"} +{"Time":"2023-05-31T19:37:37.406967327Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.213152 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/b88def0a-4ea1-4eb5-a485-6a057e4a094a-config-volume\\\") pod \\\"coredns-5d78c9869d-sxb9t\\\" (UID: \\\"b88def0a-4ea1-4eb5-a485-6a057e4a094a\\\") \" pod=\"kube-system/coredns-5d78c9869d-sxb9t\"\r\n"} +{"Time":"2023-05-31T19:37:37.406973972Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.213202 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-scbzb\\\" (UniqueName: \\\"kubernetes.io/projected/b88def0a-4ea1-4eb5-a485-6a057e4a094a-kube-api-access-scbzb\\\") pod \\\"coredns-5d78c9869d-sxb9t\\\" (UID: \\\"b88def0a-4ea1-4eb5-a485-6a057e4a094a\\\") \" pod=\"kube-system/coredns-5d78c9869d-sxb9t\"\r\n"} +{"Time":"2023-05-31T19:37:37.40724684Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:01 kindnet-509041 kubelet[1233]: I0531 19:37:01.141081 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-sxb9t\" podStartSLOduration=6.140978403 podCreationTimestamp=\"2023-05-31 19:36:55 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:01.140246651 +0000 UTC m=+18.380695446\" watchObservedRunningTime=\"2023-05-31 19:37:01.140978403 +0000 UTC m=+18.381427196\"\r\n"} +{"Time":"2023-05-31T19:37:37.407254472Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:02 kindnet-509041 kubelet[1233]: I0531 19:37:02.160525 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=6.160484023 podCreationTimestamp=\"2023-05-31 19:36:56 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:02.143814207 +0000 UTC m=+19.384263015\" watchObservedRunningTime=\"2023-05-31 19:37:02.160484023 +0000 UTC m=+19.400932844\"\r\n"} +{"Time":"2023-05-31T19:37:37.407259643Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:09 kindnet-509041 kubelet[1233]: I0531 19:37:09.769424 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.407264386Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:09 kindnet-509041 kubelet[1233]: I0531 19:37:09.789772 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-jc4xw\\\" (UniqueName: \\\"kubernetes.io/projected/b9f49332-4a09-462c-84fb-70fb102722c9-kube-api-access-jc4xw\\\") pod \\\"netcat-7458db8b8-9ggwz\\\" (UID: \\\"b9f49332-4a09-462c-84fb-70fb102722c9\\\") \" pod=\"default/netcat-7458db8b8-9ggwz\"\r\n"} +{"Time":"2023-05-31T19:37:37.4072704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:13 kindnet-509041 kubelet[1233]: I0531 19:37:13.179635 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-9ggwz\" podStartSLOduration=1.9417955359999999 podCreationTimestamp=\"2023-05-31 19:37:09 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:37:10.54921699 +0000 UTC m=+27.789665763\" lastFinishedPulling=\"2023-05-31 19:37:12.786941188 +0000 UTC m=+30.027389962\" observedRunningTime=\"2023-05-31 19:37:13.179414905 +0000 UTC m=+30.419863698\" watchObservedRunningTime=\"2023-05-31 19:37:13.179519735 +0000 UTC m=+30.419968520\"\r\n"} +{"Time":"2023-05-31T19:37:37.407277031Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:26 kindnet-509041 kubelet[1233]: E0531 19:37:26.219030 1233 upgradeaware.go:440] Error proxying data from backend to client: read tcp 192.168.122.160:38936-\u003e192.168.122.160:10010: read: connection reset by peer\r\n"} +{"Time":"2023-05-31T19:37:37.407280935Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.407284165Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.40728745Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:37:37.407555929Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407565955Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:37.407569778Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:37:37.407573349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T19:37:37.407576817Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T19:37:37.407580371Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.407583745Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:37.407586894Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T19:37:37.407599212Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:37:37.407604341Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T19:37:37.407607893Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T19:37:37.407611061Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.407614198Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:37.407617388Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:37.407620673Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.40762424Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407628182Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:37.407631364Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Wants=containerd.service\r\n"} +{"Time":"2023-05-31T19:37:37.407634466Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.407637483Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:37.407640526Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T19:37:37.407645145Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=kindnet-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.61.57\r\n"} +{"Time":"2023-05-31T19:37:37.40765415Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.407878358Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:37.407881667Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.407884727Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.407887851Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:37:37.407892636Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -- Journal begins at Wed 2023-05-31 19:36:03 UTC, ends at Wed 2023-05-31 19:37:32 UTC. --\r\n"} +{"Time":"2023-05-31T19:37:37.407896874Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:37:37.407900767Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407905299Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407910191Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407915129Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407918894Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407922744Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407925994Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 548.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.407930354Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:37:37.407934734Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.785094 861 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:37:37.407939Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.785317 861 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:37:37.407943473Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.788341 861 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:37:37.407947658Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.794997 861 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.408298754Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.795067 861 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:37:37.40830671Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.798300 861 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:37:37.408311534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.798851 861 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:37:37.408317819Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.799023 861 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:37:37.408328079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.799082 861 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:37:37.408333108Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.799122 861 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:37:37.408337179Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.799214 861 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:37.408341085Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.804240 861 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:37:37.408345057Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.804419 861 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:37:37.408349205Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.804477 861 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:37:37.408749481Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.804518 861 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:37:37.408757966Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: W0531 19:36:33.804863 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkindnet-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.408763766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.805124 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkindnet-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.408770744Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.805228 861 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:37:37.408775364Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: W0531 19:36:33.805431 861 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T19:37:37.408780683Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.805717 861 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:37:37.408785019Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.807307 861 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:37:37.408789378Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: W0531 19:36:33.810438 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.408794333Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.810517 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.408808376Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.810579 861 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kindnet-509041.176451855ec24fb1\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"kindnet-509041\", UID:\"kindnet-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"kindnet-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 36, 33, 805701041, time.Local), LastTimestamp:time."} +{"Time":"2023-05-31T19:37:37.409125483Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"Date(2023, time.May, 31, 19, 36, 33, 805701041, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.61.57:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:37:37.409131442Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.812609 861 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:37:37.409135749Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.813441 861 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:37:37.409154601Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.814458 861 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:37:37.409158926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.816779 861 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:37:37.409162821Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.816962 861 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:37:37.409167326Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: W0531 19:36:33.817305 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.409172328Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.817380 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.409526006Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.817619 861 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kindnet-509041?timeout=10s\\\": dial tcp 192.168.61.57:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T19:37:37.409538462Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.847225 861 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:37:37.409543529Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.847307 861 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:37:37.409547526Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.847347 861 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:37.409551797Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.853118 861 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:37:37.409555772Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.854117 861 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:37:37.409560188Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.854202 861 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:37.409564529Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.864138 861 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:37:37.409568628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.865536 861 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:37:37.40957309Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.865795 861 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:37:37.409577558Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.866188 861 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:37:37.409584904Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.866234 861 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:37:37.409589163Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.866252 861 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:37:37.409899189Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.866283 861 kubelet.go:2281] \"Skipping pod synchronization\" err=\"PLEG is not healthy: pleg has yet to be successful\"\r\n"} +{"Time":"2023-05-31T19:37:37.40990497Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.876568 861 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:37:37.409909534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:37:37.409914002Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:37:37.409918974Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:37:37.409923903Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: W0531 19:36:33.877513 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.409929216Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.877637 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.409934074Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.878335 861 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"kindnet-509041\\\" not found\"\r\n"} +{"Time":"2023-05-31T19:37:37.409938737Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.918078 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.409943275Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: E0531 19:36:33.918703 861 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.61.57:8443: connect: connection refused\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.409947993Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.967199 861 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.40995266Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.968598 861 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.41022765Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.970024 861 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.410235201Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:33 kindnet-509041 kubelet[861]: I0531 19:36:33.971924 861 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.410239699Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018455 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/be7a883a999e8cf4372905b111a3f7b0-etcd-data\\\") pod \\\"etcd-kindnet-509041\\\" (UID: \\\"be7a883a999e8cf4372905b111a3f7b0\\\") \" pod=\"kube-system/etcd-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410245731Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018516 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/89b768a1544bf1724f7ebe2561793608-ca-certs\\\") pod \\\"kube-apiserver-kindnet-509041\\\" (UID: \\\"89b768a1544bf1724f7ebe2561793608\\\") \" pod=\"kube-system/kube-apiserver-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410251753Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018536 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/89b768a1544bf1724f7ebe2561793608-k8s-certs\\\") pod \\\"kube-apiserver-kindnet-509041\\\" (UID: \\\"89b768a1544bf1724f7ebe2561793608\\\") \" pod=\"kube-system/kube-apiserver-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410257329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018554 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-ca-certs\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410270205Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018573 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-flexvolume-dir\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410276313Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018600 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410637609Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018619 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/89b768a1544bf1724f7ebe2561793608-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-kindnet-509041\\\" (UID: \\\"89b768a1544bf1724f7ebe2561793608\\\") \" pod=\"kube-system/kube-apiserver-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410644381Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018636 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-k8s-certs\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410650252Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018653 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-kubeconfig\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410656075Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018680 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/007172f0fa98dc2cb25da23584de732e-kubeconfig\\\") pod \\\"kube-scheduler-kindnet-509041\\\" (UID: \\\"007172f0fa98dc2cb25da23584de732e\\\") \" pod=\"kube-system/kube-scheduler-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410661814Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.018698 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/be7a883a999e8cf4372905b111a3f7b0-etcd-certs\\\") pod \\\"etcd-kindnet-509041\\\" (UID: \\\"be7a883a999e8cf4372905b111a3f7b0\\\") \" pod=\"kube-system/etcd-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.410667275Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: E0531 19:36:34.019229 861 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kindnet-509041?timeout=10s\\\": dial tcp 192.168.61.57:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T19:37:37.410671957Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.121024 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411044662Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: E0531 19:36:34.121809 861 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.61.57:8443: connect: connection refused\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411051466Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: E0531 19:36:34.420578 861 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kindnet-509041?timeout=10s\\\": dial tcp 192.168.61.57:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T19:37:37.411056088Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: I0531 19:36:34.524172 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411060531Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: E0531 19:36:34.524621 861 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.61.57:8443: connect: connection refused\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411065518Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: W0531 19:36:34.730972 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.41107058Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: E0531 19:36:34.731054 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.411075886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: W0531 19:36:34.793785 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.411080887Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:34 kindnet-509041 kubelet[861]: E0531 19:36:34.793958 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.411087823Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: E0531 19:36:35.077543 861 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kindnet-509041.176451855ec24fb1\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"kindnet-509041\", UID:\"kindnet-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"kindnet-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 36, 33, 805701041, time.Local), LastTimestamp:time."} +{"Time":"2023-05-31T19:37:37.411450232Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"Date(2023, time.May, 31, 19, 36, 33, 805701041, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.61.57:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:37:37.411457881Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: W0531 19:36:35.144693 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkindnet-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.411463323Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: E0531 19:36:35.144776 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dkindnet-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.41146902Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: W0531 19:36:35.204317 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.411474285Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: E0531 19:36:35.204404 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.411479321Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: E0531 19:36:35.221640 861 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/kindnet-509041?timeout=10s\\\": dial tcp 192.168.61.57:8443: connect: connection refused\" interval=\"1.6s\"\r\n"} +{"Time":"2023-05-31T19:37:37.411849629Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: I0531 19:36:35.326151 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411860204Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: E0531 19:36:35.326563 861 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.61.57:8443: connect: connection refused\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411866183Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:35 kindnet-509041 kubelet[861]: E0531 19:36:35.915483 861 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.61.57:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:37:37.411871215Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:36 kindnet-509041 kubelet[861]: I0531 19:36:36.928038 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411875582Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:39 kindnet-509041 kubelet[861]: E0531 19:36:39.323945 861 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"kindnet-509041\\\" not found\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411880278Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:39 kindnet-509041 kubelet[861]: I0531 19:36:39.405150 861 kubelet_node_status.go:73] \"Successfully registered node\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411884356Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:39 kindnet-509041 kubelet[861]: I0531 19:36:39.813595 861 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:37:37.411888593Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:39 kindnet-509041 kubelet[861]: I0531 19:36:39.817978 861 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:37:37.411892833Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:39 kindnet-509041 kubelet[861]: I0531 19:36:39.859960 861 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:37:37.411897199Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:40 kindnet-509041 kubelet[861]: E0531 19:36:40.073473 861 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-kindnet-509041\\\" is forbidden: no PriorityClass with name system-node-critical was found\" pod=\"kube-system/etcd-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.411902762Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:40 kindnet-509041 kubelet[861]: E0531 19:36:40.161443 861 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-kindnet-509041\\\" is forbidden: no PriorityClass with name system-node-critical was found\" pod=\"kube-system/kube-apiserver-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.412224964Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T19:37:37.412229632Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412233901Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412237976Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412241641Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412245846Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412249572Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412253163Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 602.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412257081Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[861]: I0531 19:36:42.733198 861 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:37:37.412260963Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 systemd[1]: kubelet.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:37:37.4122643Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412267874Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412271628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412275298Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412279128Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412283056Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:37:37.412286548Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412573537Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412579882Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412583704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.41258751Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412593873Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412597987Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 602 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412601887Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:37:37.412605529Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412609546Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412613409Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412626881Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412631227Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412635007Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412638531Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 602.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.412642701Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:37:37.412646781Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.897768 1233 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:37:37.412650792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.898005 1233 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:37:37.412910333Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.898650 1233 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:37:37.41291584Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.901232 1233 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T19:37:37.412920075Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.903412 1233 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:37:37.412924603Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.908498 1233 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:37:37.412928623Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.909400 1233 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:37:37.412934536Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.909479 1233 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:37:37.412940545Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.909499 1233 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:37:37.412945103Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.909516 1233 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:37:37.41295836Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.909555 1233 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:37.412967079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.913808 1233 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:37:37.412971033Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.913850 1233 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:37:37.413146412Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.913939 1233 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:37:37.413150834Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.913955 1233 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:37:37.413154885Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.917457 1233 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:37:37.413159252Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.918973 1233 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:37:37.413163204Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.939141 1233 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:37:37.413167084Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.945791 1233 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:37:37.413170992Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.950595 1233 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:37:37.4131748Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.956581 1233 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:37:37.413178844Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.962549 1233 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:37:37.413182598Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:42 kindnet-509041 kubelet[1233]: I0531 19:36:42.962560 1233 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:37:37.413186409Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.005314 1233 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:37:37.413190385Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.007930 1233 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:37:37.413194559Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.008063 1233 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:37:37.413198217Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.008192 1233 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:37:37.413202204Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: E0531 19:36:43.008351 1233 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:37:37.41335693Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.072060 1233 kubelet_node_status.go:70] \"Attempting to register node\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.413367008Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.089543 1233 kubelet_node_status.go:108] \"Node was previously registered\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.413371977Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.089823 1233 kubelet_node_status.go:73] \"Successfully registered node\" node=\"kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.413376129Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: E0531 19:36:43.111267 1233 kubelet.go:2281] \"Skipping pod synchronization\" err=\"container runtime status check may not have completed yet\"\r\n"} +{"Time":"2023-05-31T19:37:37.413380484Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: E0531 19:36:43.175006 1233 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:37:37.413387364Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:37:37.413391776Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:37:37.413397157Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:37:37.413401639Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.183780 1233 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:37:37.413405874Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.184063 1233 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:37:37.413421348Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.184166 1233 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:37.413426334Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.184411 1233 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T19:37:37.413431234Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.184477 1233 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T19:37:37.413435138Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.184489 1233 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:37:37.41373711Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.185697 1233 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:37:37.413743187Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.185773 1233 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:37:37.41374727Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.186090 1233 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T19:37:37.413751467Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.188287 1233 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:37:37.413756165Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.192092 1233 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:37:37.413760359Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.312287 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.413764665Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.312443 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.413778432Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.312490 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.413783161Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.312551 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.413788071Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379212 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-flexvolume-dir\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.413794566Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379279 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/007172f0fa98dc2cb25da23584de732e-kubeconfig\\\") pod \\\"kube-scheduler-kindnet-509041\\\" (UID: \\\"007172f0fa98dc2cb25da23584de732e\\\") \" pod=\"kube-system/kube-scheduler-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.413800238Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379302 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/be7a883a999e8cf4372905b111a3f7b0-etcd-data\\\") pod \\\"etcd-kindnet-509041\\\" (UID: \\\"be7a883a999e8cf4372905b111a3f7b0\\\") \" pod=\"kube-system/etcd-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414074022Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379324 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/89b768a1544bf1724f7ebe2561793608-k8s-certs\\\") pod \\\"kube-apiserver-kindnet-509041\\\" (UID: \\\"89b768a1544bf1724f7ebe2561793608\\\") \" pod=\"kube-system/kube-apiserver-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414081355Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379351 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/89b768a1544bf1724f7ebe2561793608-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-kindnet-509041\\\" (UID: \\\"89b768a1544bf1724f7ebe2561793608\\\") \" pod=\"kube-system/kube-apiserver-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414087436Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379367 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/89b768a1544bf1724f7ebe2561793608-ca-certs\\\") pod \\\"kube-apiserver-kindnet-509041\\\" (UID: \\\"89b768a1544bf1724f7ebe2561793608\\\") \" pod=\"kube-system/kube-apiserver-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414094983Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379386 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-ca-certs\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414101024Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379409 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-k8s-certs\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414106507Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379435 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-kubeconfig\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.41411204Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379456 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/5d0e74ba6b8c1ba875c3c2006e57cf25-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-kindnet-509041\\\" (UID: \\\"5d0e74ba6b8c1ba875c3c2006e57cf25\\\") \" pod=\"kube-system/kube-controller-manager-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414243269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.379476 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/be7a883a999e8cf4372905b111a3f7b0-etcd-certs\\\") pod \\\"etcd-kindnet-509041\\\" (UID: \\\"be7a883a999e8cf4372905b111a3f7b0\\\") \" pod=\"kube-system/etcd-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414249208Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.936447 1233 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:37:37.414253781Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.976329 1233 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:37:37.414257348Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:43 kindnet-509041 kubelet[1233]: I0531 19:36:43.984475 1233 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:37:37.414261782Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:44 kindnet-509041 kubelet[1233]: E0531 19:36:44.094472 1233 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-kindnet-509041\\\" already exists\" pod=\"kube-system/kube-apiserver-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.4142673Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:44 kindnet-509041 kubelet[1233]: E0531 19:36:44.094853 1233 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-kindnet-509041\\\" already exists\" pod=\"kube-system/etcd-kindnet-509041\"\r\n"} +{"Time":"2023-05-31T19:37:37.414272781Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:44 kindnet-509041 kubelet[1233]: I0531 19:36:44.124519 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-kindnet-509041\" podStartSLOduration=1.124471562 podCreationTimestamp=\"2023-05-31 19:36:43 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:44.108022169 +0000 UTC m=+1.348470962\" watchObservedRunningTime=\"2023-05-31 19:36:44.124471562 +0000 UTC m=+1.364920394\"\r\n"} +{"Time":"2023-05-31T19:37:37.414279123Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:44 kindnet-509041 kubelet[1233]: I0531 19:36:44.140207 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-kindnet-509041\" podStartSLOduration=1.14017762 podCreationTimestamp=\"2023-05-31 19:36:43 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:44.126046485 +0000 UTC m=+1.366495282\" watchObservedRunningTime=\"2023-05-31 19:36:44.14017762 +0000 UTC m=+1.380626406\"\r\n"} +{"Time":"2023-05-31T19:37:37.414285581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:44 kindnet-509041 kubelet[1233]: I0531 19:36:44.153739 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-kindnet-509041\" podStartSLOduration=1.153671285 podCreationTimestamp=\"2023-05-31 19:36:43 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:44.140547912 +0000 UTC m=+1.380996705\" watchObservedRunningTime=\"2023-05-31 19:36:44.153671285 +0000 UTC m=+1.394120079\"\r\n"} +{"Time":"2023-05-31T19:37:37.414420329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:44 kindnet-509041 kubelet[1233]: I0531 19:36:44.167145 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-kindnet-509041\" podStartSLOduration=1.167114994 podCreationTimestamp=\"2023-05-31 19:36:43 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:44.154118869 +0000 UTC m=+1.394567663\" watchObservedRunningTime=\"2023-05-31 19:36:44.167114994 +0000 UTC m=+1.407563779\"\r\n"} +{"Time":"2023-05-31T19:37:37.414426601Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:54 kindnet-509041 kubelet[1233]: I0531 19:36:54.182692 1233 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:37:37.414430779Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:54 kindnet-509041 kubelet[1233]: I0531 19:36:54.183531 1233 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:37:37.414434888Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.154207 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.414438955Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.188662 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.414443577Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.277851 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-jzcp6\\\" (UniqueName: \\\"kubernetes.io/projected/377501a1-74cb-483d-ac68-869bba08784a-kube-api-access-jzcp6\\\") pod \\\"kube-proxy-pmg7z\\\" (UID: \\\"377501a1-74cb-483d-ac68-869bba08784a\\\") \" pod=\"kube-system/kube-proxy-pmg7z\"\r\n"} +{"Time":"2023-05-31T19:37:37.414448963Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.278026 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/377501a1-74cb-483d-ac68-869bba08784a-kube-proxy\\\") pod \\\"kube-proxy-pmg7z\\\" (UID: \\\"377501a1-74cb-483d-ac68-869bba08784a\\\") \" pod=\"kube-system/kube-proxy-pmg7z\"\r\n"} +{"Time":"2023-05-31T19:37:37.414455066Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.278064 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/377501a1-74cb-483d-ac68-869bba08784a-xtables-lock\\\") pod \\\"kube-proxy-pmg7z\\\" (UID: \\\"377501a1-74cb-483d-ac68-869bba08784a\\\") \" pod=\"kube-system/kube-proxy-pmg7z\"\r\n"} +{"Time":"2023-05-31T19:37:37.414460268Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.278152 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/bac87e7f-68fe-40b7-8296-00f05c742cea-xtables-lock\\\") pod \\\"kindnet-hmx2r\\\" (UID: \\\"bac87e7f-68fe-40b7-8296-00f05c742cea\\\") \" pod=\"kube-system/kindnet-hmx2r\"\r\n"} +{"Time":"2023-05-31T19:37:37.414854488Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.278177 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/bac87e7f-68fe-40b7-8296-00f05c742cea-lib-modules\\\") pod \\\"kindnet-hmx2r\\\" (UID: \\\"bac87e7f-68fe-40b7-8296-00f05c742cea\\\") \" pod=\"kube-system/kindnet-hmx2r\"\r\n"} +{"Time":"2023-05-31T19:37:37.414863999Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.278198 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/377501a1-74cb-483d-ac68-869bba08784a-lib-modules\\\") pod \\\"kube-proxy-pmg7z\\\" (UID: \\\"377501a1-74cb-483d-ac68-869bba08784a\\\") \" pod=\"kube-system/kube-proxy-pmg7z\"\r\n"} +{"Time":"2023-05-31T19:37:37.414869631Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.278223 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-cfg\\\" (UniqueName: \\\"kubernetes.io/host-path/bac87e7f-68fe-40b7-8296-00f05c742cea-cni-cfg\\\") pod \\\"kindnet-hmx2r\\\" (UID: \\\"bac87e7f-68fe-40b7-8296-00f05c742cea\\\") \" pod=\"kube-system/kindnet-hmx2r\"\r\n"} +{"Time":"2023-05-31T19:37:37.414877442Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:55 kindnet-509041 kubelet[1233]: I0531 19:36:55.278244 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-pzptv\\\" (UniqueName: \\\"kubernetes.io/projected/bac87e7f-68fe-40b7-8296-00f05c742cea-kube-api-access-pzptv\\\") pod \\\"kindnet-hmx2r\\\" (UID: \\\"bac87e7f-68fe-40b7-8296-00f05c742cea\\\") \" pod=\"kube-system/kindnet-hmx2r\"\r\n"} +{"Time":"2023-05-31T19:37:37.41488188Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.052630 1233 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T19:37:37.414886739Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.089106 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-pmg7z\" podStartSLOduration=5.08906872 podCreationTimestamp=\"2023-05-31 19:36:55 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:36:56.120209147 +0000 UTC m=+13.360657940\" watchObservedRunningTime=\"2023-05-31 19:37:00.08906872 +0000 UTC m=+17.329517517\"\r\n"} +{"Time":"2023-05-31T19:37:37.414892Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.089372 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.414898032Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.103622 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.415226696Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.112651 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/3b79e9be-7391-4d2d-9751-ef3541657148-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"3b79e9be-7391-4d2d-9751-ef3541657148\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:37:37.415259181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.112817 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-fmg2k\\\" (UniqueName: \\\"kubernetes.io/projected/3b79e9be-7391-4d2d-9751-ef3541657148-kube-api-access-fmg2k\\\") pod \\\"storage-provisioner\\\" (UID: \\\"3b79e9be-7391-4d2d-9751-ef3541657148\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:37:37.415276417Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.162754 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kindnet-hmx2r\" podStartSLOduration=5.162725698 podCreationTimestamp=\"2023-05-31 19:36:55 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:00.141855857 +0000 UTC m=+17.382304652\" watchObservedRunningTime=\"2023-05-31 19:37:00.162725698 +0000 UTC m=+17.403174483\"\r\n"} +{"Time":"2023-05-31T19:37:37.41528537Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.213152 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/b88def0a-4ea1-4eb5-a485-6a057e4a094a-config-volume\\\") pod \\\"coredns-5d78c9869d-sxb9t\\\" (UID: \\\"b88def0a-4ea1-4eb5-a485-6a057e4a094a\\\") \" pod=\"kube-system/coredns-5d78c9869d-sxb9t\"\r\n"} +{"Time":"2023-05-31T19:37:37.415297285Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:00 kindnet-509041 kubelet[1233]: I0531 19:37:00.213202 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-scbzb\\\" (UniqueName: \\\"kubernetes.io/projected/b88def0a-4ea1-4eb5-a485-6a057e4a094a-kube-api-access-scbzb\\\") pod \\\"coredns-5d78c9869d-sxb9t\\\" (UID: \\\"b88def0a-4ea1-4eb5-a485-6a057e4a094a\\\") \" pod=\"kube-system/coredns-5d78c9869d-sxb9t\"\r\n"} +{"Time":"2023-05-31T19:37:37.415304649Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:01 kindnet-509041 kubelet[1233]: I0531 19:37:01.141081 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-sxb9t\" podStartSLOduration=6.140978403 podCreationTimestamp=\"2023-05-31 19:36:55 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:01.140246651 +0000 UTC m=+18.380695446\" watchObservedRunningTime=\"2023-05-31 19:37:01.140978403 +0000 UTC m=+18.381427196\"\r\n"} +{"Time":"2023-05-31T19:37:37.415315657Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:02 kindnet-509041 kubelet[1233]: I0531 19:37:02.160525 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=6.160484023 podCreationTimestamp=\"2023-05-31 19:36:56 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:02.143814207 +0000 UTC m=+19.384263015\" watchObservedRunningTime=\"2023-05-31 19:37:02.160484023 +0000 UTC m=+19.400932844\"\r\n"} +{"Time":"2023-05-31T19:37:37.415374358Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:09 kindnet-509041 kubelet[1233]: I0531 19:37:09.769424 1233 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:37:37.415385328Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:09 kindnet-509041 kubelet[1233]: I0531 19:37:09.789772 1233 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-jc4xw\\\" (UniqueName: \\\"kubernetes.io/projected/b9f49332-4a09-462c-84fb-70fb102722c9-kube-api-access-jc4xw\\\") pod \\\"netcat-7458db8b8-9ggwz\\\" (UID: \\\"b9f49332-4a09-462c-84fb-70fb102722c9\\\") \" pod=\"default/netcat-7458db8b8-9ggwz\"\r\n"} +{"Time":"2023-05-31T19:37:37.415396437Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:13 kindnet-509041 kubelet[1233]: I0531 19:37:13.179635 1233 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-9ggwz\" podStartSLOduration=1.9417955359999999 podCreationTimestamp=\"2023-05-31 19:37:09 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:37:10.54921699 +0000 UTC m=+27.789665763\" lastFinishedPulling=\"2023-05-31 19:37:12.786941188 +0000 UTC m=+30.027389962\" observedRunningTime=\"2023-05-31 19:37:13.179414905 +0000 UTC m=+30.419863698\" watchObservedRunningTime=\"2023-05-31 19:37:13.179519735 +0000 UTC m=+30.419968520\"\r\n"} +{"Time":"2023-05-31T19:37:37.415407027Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:26 kindnet-509041 kubelet[1233]: E0531 19:37:26.219030 1233 upgradeaware.go:440] Error proxying data from backend to client: read tcp 192.168.122.160:38936-\u003e192.168.122.160:10010: read: connection reset by peer\r\n"} +{"Time":"2023-05-31T19:37:37.415416491Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.415431524Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.415440372Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:37:37.415451055Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T19:37:37.415460015Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters:\r\n"} +{"Time":"2023-05-31T19:37:37.415465208Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T19:37:37.415476271Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:37:37.415530834Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"UjY3QwpBNXcxQzg2MWNYMVV6MlN5WlNjT05GeG9mNmRSWTB6T2ZrQ0gzNDJPS1pEQnhOcmZmOGNkL3kwMUE4RmZYQXlHCmNkeDFJM3lQREJ1OHIzOW82eSt4c0FpRGNSSnMyUmY3UU5BTWV2MEszbm8zQlpoc1loeDdNNXllZ2hNemdxTW4KUU50bnY3T2lYTllMVFpRZDd6dSs5Y3NNbXRnNDBLUU9DWUQyTG1jMkpOWHRSNjcyT013eGpkRG5hNVpGZlZSMgpEcXR6SFRlTFZrSXhIUi9UT0hoQ09xSm0yMHF6dEVjRVd2d3hXcm1rdk5QNkFURnVHck1UVlVRRjBybFQrMDNwCnluUHdmdFRZbXJjOEVwWDUzUmVaUlVHWHZEM1N4QnlKWFdySGEzNFJhQURGaGEvdnJMZTN3ZEppNVlLRFZrVWIKN0NnQkFieU9VWXM1cmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T19:37:37.415541784Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T19:37:37.415550747Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: mk\r\n"} +{"Time":"2023-05-31T19:37:37.415556002Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts:\r\n"} +{"Time":"2023-05-31T19:37:37.415564183Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - context:\r\n"} +{"Time":"2023-05-31T19:37:37.415569276Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T19:37:37.415577624Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user: system:node:kindnet-509041\r\n"} +{"Time":"2023-05-31T19:37:37.415585991Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: system:node:kindnet-509041@mk\r\n"} +{"Time":"2023-05-31T19:37:37.415590441Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: system:node:kindnet-509041@mk\r\n"} +{"Time":"2023-05-31T19:37:37.415598736Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T19:37:37.415607495Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T19:37:37.415612062Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users:\r\n"} +{"Time":"2023-05-31T19:37:37.415620816Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - name: system:node:kindnet-509041\r\n"} +{"Time":"2023-05-31T19:37:37.415629586Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user:\r\n"} +{"Time":"2023-05-31T19:37:37.415637286Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:37:37.415646166Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:37:37.415655699Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.415665324Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.41567309Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:37:37.415681362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T19:37:37.41568872Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authentication:\r\n"} +{"Time":"2023-05-31T19:37:37.415696522Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T19:37:37.41570523Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T19:37:37.415710591Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:37:37.415719277Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.415727361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T19:37:37.415735282Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" x509:\r\n"} +{"Time":"2023-05-31T19:37:37.415743823Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T19:37:37.415751831Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authorization:\r\n"} +{"Time":"2023-05-31T19:37:37.415760217Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T19:37:37.415768641Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:37:37.415777144Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.415785713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.415790766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T19:37:37.415799979Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T19:37:37.415809215Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T19:37:37.415813506Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T19:37:37.415821616Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.415830493Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.415835153Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T19:37:37.415843152Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:37:37.415847893Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:37:37.415855954Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T19:37:37.41586495Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.415870405Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T19:37:37.415878172Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.41588689Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T19:37:37.41589203Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T19:37:37.415900162Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T19:37:37.415909072Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.415917667Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T19:37:37.415925286Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.415932682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T19:37:37.415940102Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" logging:\r\n"} +{"Time":"2023-05-31T19:37:37.415947759Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T19:37:37.415956678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" options:\r\n"} +{"Time":"2023-05-31T19:37:37.415965261Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" json:\r\n"} +{"Time":"2023-05-31T19:37:37.415973736Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T19:37:37.415982631Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T19:37:37.415990801Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T19:37:37.415999149Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.416007329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.416027776Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resolvConf: /run/systemd/resolve/resolv.conf\r\n"} +{"Time":"2023-05-31T19:37:37.416032797Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T19:37:37.416048571Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T19:37:37.416057409Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.416062052Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.416070402Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T19:37:37.416075896Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.416080376Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.416088335Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:37:37.416097389Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.416106513Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.416116364Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:37:37.416124809Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.416129022Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters:\n"} +{"Time":"2023-05-31T19:37:37.416139887Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:37:37.416148276Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:37:37.416153174Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extensions:\n"} +{"Time":"2023-05-31T19:37:37.416161148Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - extension:\n"} +{"Time":"2023-05-31T19:37:37.416165544Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" last-update: Wed, 31 May 2023 19:36:55 UTC\n"} +{"Time":"2023-05-31T19:37:37.416173651Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:37:37.416179493Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:37:37.416187864Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:37:37.416196207Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://192.168.61.57:8443\n"} +{"Time":"2023-05-31T19:37:37.41620085Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.416208488Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts:\n"} +{"Time":"2023-05-31T19:37:37.416213645Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - context:\n"} +{"Time":"2023-05-31T19:37:37.416224162Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cluster: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.416233898Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extensions:\n"} +{"Time":"2023-05-31T19:37:37.416242448Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - extension:\n"} +{"Time":"2023-05-31T19:37:37.416249678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" last-update: Wed, 31 May 2023 19:36:55 UTC\n"} +{"Time":"2023-05-31T19:37:37.416257835Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:37:37.416266718Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:37:37.416275642Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:37:37.416284114Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:37:37.416292327Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.416296437Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.416304382Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.416314464Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:37:37.416322715Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:37:37.416329442Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users:\n"} +{"Time":"2023-05-31T19:37:37.416338221Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - name: kindnet-509041\n"} +{"Time":"2023-05-31T19:37:37.416344042Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user:\n"} +{"Time":"2023-05-31T19:37:37.416350726Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt\n"} +{"Time":"2023-05-31T19:37:37.416357166Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.key\n"} +{"Time":"2023-05-31T19:37:37.416365654Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.416369759Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.416374754Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:37:37.416382642Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.416387276Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" items:\n"} +{"Time":"2023-05-31T19:37:37.416395571Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.416405238Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.416414111Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:37:37.416423847Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.416439327Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:37.416448859Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:37.41645762Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:37.41646345Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:37.416472082Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:37.416480661Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:37.416489692Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:37.416498353Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:37.41650716Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:37.416511914Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:37.416516319Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:37.416523793Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:37.416528539Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:37.416536546Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:37.416545049Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:37.416580298Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:37.416584453Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:37.416591674Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.41659568Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.416602763Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.416606556Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" annotations:\n"} +{"Time":"2023-05-31T19:37:37.416611413Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:37:37.416620123Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:37:37.416629953Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:37:37.416639044Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:37:37.41664697Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:54Z\"\n"} +{"Time":"2023-05-31T19:37:37.416651614Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.416655161Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:37:37.416658721Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"322\"\n"} +{"Time":"2023-05-31T19:37:37.416662615Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: e3ba45ec-eacb-4b84-82cd-b7812b5fc227\n"} +{"Time":"2023-05-31T19:37:37.416666309Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.416779071Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.416792402Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:37:37.4168026Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.416806681Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:37.416813568Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:37.416818Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:37.41682582Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:37.416837154Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:37.416842188Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:37.416849316Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:37.416853489Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:37.416858122Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:37.416861475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:37.416868559Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:37.416871817Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:37.41687942Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:37.416882937Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:37.416886352Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:37.416892591Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:37.416895999Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:37.416901042Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.416904289Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.416931094Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.416934759Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" annotations:\n"} +{"Time":"2023-05-31T19:37:37.416937866Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:37:37.416943354Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:37:37.416947562Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:37:37.416955045Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:37:37.416958789Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:54Z\"\n"} +{"Time":"2023-05-31T19:37:37.416963851Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.416966973Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T19:37:37.416970974Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"323\"\n"} +{"Time":"2023-05-31T19:37:37.416975136Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: ccbe3a7c-b5d0-4f72-a5b3-d8017f4817e2\n"} +{"Time":"2023-05-31T19:37:37.416982051Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.416985708Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.416992428Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" jws-kubeconfig-6afchl: eyJhbGciOiJIUzI1NiIsImtpZCI6IjZhZmNobCJ9..tk9bst8ERxhM36Vd5cIMqrjvOtW9-WNOYOStnqKoaGU\n"} +{"Time":"2023-05-31T19:37:37.416996423Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T19:37:37.416999988Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.417003786Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters:\n"} +{"Time":"2023-05-31T19:37:37.417006923Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:37:37.417014581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:37:37.417199144Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"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\n"} +{"Time":"2023-05-31T19:37:37.417215783Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:37:37.417225088Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: \"\"\n"} +{"Time":"2023-05-31T19:37:37.417235422Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts: null\n"} +{"Time":"2023-05-31T19:37:37.41724354Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:37:37.417248396Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:37:37.417255953Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:37:37.417260846Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users: null\n"} +{"Time":"2023-05-31T19:37:37.41726849Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.41727329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.417283625Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:42Z\"\n"} +{"Time":"2023-05-31T19:37:37.4172884Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T19:37:37.417295888Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:37:37.417300169Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"320\"\n"} +{"Time":"2023-05-31T19:37:37.417307491Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: f7b04963-4789-488e-a093-ed15c4cff2f3\n"} +{"Time":"2023-05-31T19:37:37.417312022Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.417319476Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.417419205Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:37:37.417430479Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.41743509Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:37.417440382Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:37.417444958Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:37.417457675Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:37.417462215Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:37.41746946Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:37.417474042Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:37.417481864Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:37.417486554Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:37.417494114Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:37.417498047Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:37.417503025Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:37.417507401Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:37.417517327Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:37.417521822Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:37.417529386Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:37.417533596Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:37.417540859Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.417544906Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.417552268Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.41759747Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" annotations:\n"} +{"Time":"2023-05-31T19:37:37.417609622Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:37:37.417614915Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:37:37.417619868Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:37:37.417625829Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:37:37.417634227Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:54Z\"\n"} +{"Time":"2023-05-31T19:37:37.417639532Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.417644075Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:37:37.417650315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"324\"\n"} +{"Time":"2023-05-31T19:37:37.417658243Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 0e1aea8b-48ea-407f-a29f-305d130a0a30\n"} +{"Time":"2023-05-31T19:37:37.417663076Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.417671002Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.417679611Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Corefile: |\n"} +{"Time":"2023-05-31T19:37:37.417684284Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" .:53 {\n"} +{"Time":"2023-05-31T19:37:37.417691652Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" log\n"} +{"Time":"2023-05-31T19:37:37.417696923Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" errors\n"} +{"Time":"2023-05-31T19:37:37.417701372Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" health {\n"} +{"Time":"2023-05-31T19:37:37.417707127Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T19:37:37.417714815Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T19:37:37.417719065Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ready\n"} +{"Time":"2023-05-31T19:37:37.417726736Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T19:37:37.417730894Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pods insecure\n"} +{"Time":"2023-05-31T19:37:37.417735434Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T19:37:37.417751251Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ttl 30\n"} +{"Time":"2023-05-31T19:37:37.417763115Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T19:37:37.417776312Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T19:37:37.417795528Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hosts {\n"} +{"Time":"2023-05-31T19:37:37.417807465Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 192.168.61.1 host.minikube.internal\n"} +{"Time":"2023-05-31T19:37:37.417819613Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fallthrough\n"} +{"Time":"2023-05-31T19:37:37.417831918Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T19:37:37.417844485Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T19:37:37.417856682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T19:37:37.417868802Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T19:37:37.417880309Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cache 30\n"} +{"Time":"2023-05-31T19:37:37.417892938Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" loop\n"} +{"Time":"2023-05-31T19:37:37.417905116Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" reload\n"} +{"Time":"2023-05-31T19:37:37.417917794Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" loadbalance\n"} +{"Time":"2023-05-31T19:37:37.417930248Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\n"} +{"Time":"2023-05-31T19:37:37.417942413Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.417954261Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.417966448Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:42Z\"\n"} +{"Time":"2023-05-31T19:37:37.417979053Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: coredns\n"} +{"Time":"2023-05-31T19:37:37.417991215Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.418003083Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"367\"\n"} +{"Time":"2023-05-31T19:37:37.418014402Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 22ff07d6-60dd-4e15-9cce-e153a5ab7ea3\n"} +{"Time":"2023-05-31T19:37:37.418028014Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.418039697Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.418053172Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T19:37:37.418059822Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.418064429Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:37.418083148Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:37.418105674Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:37.418118349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:37.418130431Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:37.418143515Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:37.418150332Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:37.41815459Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:37.418159202Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:37.418163523Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:37.418171843Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:37.418176818Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:37.418181655Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:37.418189985Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:37.418195171Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:37.418202648Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:37.41820729Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:37.418217882Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.418225865Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T19:37:37.41823385Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T19:37:37.418238527Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.418245803Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T19:37:37.41825084Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM2MzBaFw0zMzA1MjgxOTM2MzBaMBkxFzAV\n"} +{"Time":"2023-05-31T19:37:37.418265877Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T19:37:37.41827101Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CgKCAQEA8NG5VI4Tc4cWwxSi9poW1Nafi+seCVvSBuJS9rt9iVLr4tXfoNa9BNKn\n"} +{"Time":"2023-05-31T19:37:37.418278621Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kTSW44Dpcj5yDABIx7gEG+HCh6dkjVWcdWz+OU5gGTIJVa5ZAsBeZXjGIcbxZiFj\n"} +{"Time":"2023-05-31T19:37:37.41828361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" vCxAuglKid5GJtkKPoB8wqEAS7uTMdV8VGMAg8kSe6gjTqbIvUW0rknxN5cNvQxI\n"} +{"Time":"2023-05-31T19:37:37.418306631Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" if8Mfc+0WYxfbIfTFpYMtxkPksUDDVeUIIYREcvQhp1upz+3rp2FGI3ODOEbh+xy\n"} +{"Time":"2023-05-31T19:37:37.41832248Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mrdLdn20FAxxOmoq+DlGOUOKGingOUgZ5obp1whsAMvIIAQjhUOPWa9oZpwmnjDi\n"} +{"Time":"2023-05-31T19:37:37.418335362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 6vYI64fzWkmRhbNJVtLZ9IMBKTxyDwIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T19:37:37.41834472Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUlJgr+bw1uwWDtrVBfdRsw4sWhi4w\n"} +{"Time":"2023-05-31T19:37:37.418350543Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAOpR\n"} +{"Time":"2023-05-31T19:37:37.4183556Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OD1LHVUAAPuqr4xLopgvBaRL2WxVdPQPcc34fFYTB7+ScQP9YyTDdOkHifacQUsI\n"} +{"Time":"2023-05-31T19:37:37.418363559Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" u5Jj/9V9gVAKB4VdUVQvRAi1Evb8CmvHmtmuAv4DpS43kW6yL+lE4WOEfKeeK8tT\n"} +{"Time":"2023-05-31T19:37:37.418373358Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" npnptD4THic0Wigpt9N7rp+PVN2dIsrSVJfnZZGxhxTkrhT1D+8GNfRmJICIqzRF\n"} +{"Time":"2023-05-31T19:37:37.418378193Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Cz7a4bRR2XPhjboMwgbyqydtoEmg+WZ0RDpxb3fbcUmbC6+zIYXcwbzLbtcrcsVz\n"} +{"Time":"2023-05-31T19:37:37.418386006Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" xcb7TOPWbPVXK2KdgHI6E2qE7YQ/my+rq9r6LcqPPMINH/glbPMcgExR595iNn7k\n"} +{"Time":"2023-05-31T19:37:37.418390952Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" e5nCKG1m/E0NqO+pO48=\n"} +{"Time":"2023-05-31T19:37:37.418395516Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.418401334Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T19:37:37.418406685Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T19:37:37.418415083Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T19:37:37.418420163Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.418431445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.41843628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:39Z\"\n"} +{"Time":"2023-05-31T19:37:37.418441063Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T19:37:37.418446841Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.418454746Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"36\"\n"} +{"Time":"2023-05-31T19:37:37.418459514Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 3e64d93f-2661-4c24-9e7e-17bec33aee5f\n"} +{"Time":"2023-05-31T19:37:37.418466552Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.418471326Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.418475825Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T19:37:37.418479926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.418483871Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.41848773Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:39Z\"\n"} +{"Time":"2023-05-31T19:37:37.418491818Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T19:37:37.418496317Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.418500448Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"30\"\n"} +{"Time":"2023-05-31T19:37:37.418504769Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 23bdf455-6917-4a5b-b04d-9eb348429f9d\n"} +{"Time":"2023-05-31T19:37:37.418508755Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.418512913Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.418516474Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T19:37:37.418520227Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T19:37:37.418524076Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T19:37:37.418527969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T19:37:37.418547713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clientConnection:\n"} +{"Time":"2023-05-31T19:37:37.418552029Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418555809Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" burst: 0\n"} +{"Time":"2023-05-31T19:37:37.418559587Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418563599Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T19:37:37.418567366Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" qps: 0\n"} +{"Time":"2023-05-31T19:37:37.418571164Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:37:37.418575223Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.418581543Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conntrack:\n"} +{"Time":"2023-05-31T19:37:37.41858531Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T19:37:37.418588841Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" min: null\n"} +{"Time":"2023-05-31T19:37:37.418592972Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:37.418597635Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:37.418605983Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" detectLocal:\n"} +{"Time":"2023-05-31T19:37:37.41861039Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418618095Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418623245Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418630671Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T19:37:37.418635648Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418642935Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418647692Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" iptables:\n"} +{"Time":"2023-05-31T19:37:37.418655269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T19:37:37.418660247Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T19:37:37.418667382Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T19:37:37.418672185Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.418679223Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.418684112Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ipvs:\n"} +{"Time":"2023-05-31T19:37:37.418691847Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T19:37:37.418700367Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.418704354Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418707759Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" strictARP: false\n"} +{"Time":"2023-05-31T19:37:37.418711386Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.418714725Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:37.418718477Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:37.418724495Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:37.418734095Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T19:37:37.418738888Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T19:37:37.418743608Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418749146Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T19:37:37.418753616Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T19:37:37.418770102Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418783528Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418796352Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" winkernel:\n"} +{"Time":"2023-05-31T19:37:37.418808517Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T19:37:37.418820568Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T19:37:37.418832157Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T19:37:37.41884318Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418890474Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T19:37:37.418900537Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T19:37:37.418904886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.418908356Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:37:37.418911898Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters:\n"} +{"Time":"2023-05-31T19:37:37.418915931Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:37:37.418921273Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T19:37:37.418937017Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:37:37.418954966Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: default\n"} +{"Time":"2023-05-31T19:37:37.418960865Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts:\n"} +{"Time":"2023-05-31T19:37:37.418972115Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - context:\n"} +{"Time":"2023-05-31T19:37:37.418977491Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cluster: default\n"} +{"Time":"2023-05-31T19:37:37.418982554Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:37:37.418991703Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user: default\n"} +{"Time":"2023-05-31T19:37:37.418997367Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: default\n"} +{"Time":"2023-05-31T19:37:37.419006922Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: default\n"} +{"Time":"2023-05-31T19:37:37.41901258Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users:\n"} +{"Time":"2023-05-31T19:37:37.419021351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - name: default\n"} +{"Time":"2023-05-31T19:37:37.419026869Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" user:\n"} +{"Time":"2023-05-31T19:37:37.4190361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T19:37:37.419045893Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.419051313Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.419055986Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:42Z\"\n"} +{"Time":"2023-05-31T19:37:37.419061081Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" labels:\n"} +{"Time":"2023-05-31T19:37:37.419066164Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.419075424Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T19:37:37.419080575Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.419089946Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"239\"\n"} +{"Time":"2023-05-31T19:37:37.419095168Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 6543d770-c45c-413a-beeb-ac5243514aee\n"} +{"Time":"2023-05-31T19:37:37.419107336Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.419112492Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.419118379Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:37:37.419123853Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.419132621Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:37:37.419137858Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:37:37.419142911Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:37:37.419148178Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:37:37.419158315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:37:37.419168686Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:37:37.41917412Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:37:37.419227494Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:37:37.419237692Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:37:37.419246782Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:37:37.419251797Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:37:37.419260089Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:37:37.419268382Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:37:37.419273328Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:37:37.419281821Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:37:37.419291441Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:37:37.419296874Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:37:37.419302104Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:37:37.419312457Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.419317662Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.419327052Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" annotations:\n"} +{"Time":"2023-05-31T19:37:37.419332499Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:37:37.419344232Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:37:37.419349633Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:37:37.419354815Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:37:37.419360062Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:55Z\"\n"} +{"Time":"2023-05-31T19:37:37.419365111Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:37:37.41936997Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.41937414Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"325\"\n"} +{"Time":"2023-05-31T19:37:37.419378703Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: e91dc459-37bc-4e71-9368-e29c0b159c89\n"} +{"Time":"2023-05-31T19:37:37.422130509Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.422145717Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.422149919Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T19:37:37.422157182Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiServer:\n"} +{"Time":"2023-05-31T19:37:37.422160837Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certSANs:\n"} +{"Time":"2023-05-31T19:37:37.422167104Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T19:37:37.422170461Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - localhost\n"} +{"Time":"2023-05-31T19:37:37.422174236Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - 192.168.61.57\n"} +{"Time":"2023-05-31T19:37:37.422180687Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:37:37.422183847Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T19:37:37.422193967Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:37:37.422198222Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T19:37:37.422204749Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:37:37.422208467Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:37:37.422214714Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T19:37:37.422219368Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:37:37.42222664Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" controllerManager:\n"} +{"Time":"2023-05-31T19:37:37.422230536Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:37:37.422236962Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T19:37:37.422240649Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:37:37.422246796Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dns: {}\n"} +{"Time":"2023-05-31T19:37:37.422250565Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" etcd:\n"} +{"Time":"2023-05-31T19:37:37.422255775Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" local:\n"} +{"Time":"2023-05-31T19:37:37.422259437Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:37:37.422264519Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:37:37.422274061Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T19:37:37.422278111Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T19:37:37.422284766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T19:37:37.422288287Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T19:37:37.422292889Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" networking:\n"} +{"Time":"2023-05-31T19:37:37.422296074Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T19:37:37.422305106Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:37:37.422308899Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T19:37:37.422315273Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" scheduler:\n"} +{"Time":"2023-05-31T19:37:37.422319191Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:37:37.422326926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:37:37.422331935Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.422338149Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.422342399Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:41Z\"\n"} +{"Time":"2023-05-31T19:37:37.422349132Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T19:37:37.422352757Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.42235945Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"207\"\n"} +{"Time":"2023-05-31T19:37:37.42236318Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: 5da1b17d-1f1e-4a74-b818-5b3fd934715b\n"} +{"Time":"2023-05-31T19:37:37.422366966Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:37:37.422373332Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" data:\n"} +{"Time":"2023-05-31T19:37:37.422376799Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kubelet: |\n"} +{"Time":"2023-05-31T19:37:37.422385119Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T19:37:37.422388762Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authentication:\n"} +{"Time":"2023-05-31T19:37:37.422395969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" anonymous:\n"} +{"Time":"2023-05-31T19:37:37.42239948Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enabled: false\n"} +{"Time":"2023-05-31T19:37:37.422406055Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" webhook:\n"} +{"Time":"2023-05-31T19:37:37.422410459Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T19:37:37.422418314Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enabled: true\n"} +{"Time":"2023-05-31T19:37:37.42242208Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" x509:\n"} +{"Time":"2023-05-31T19:37:37.42242829Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:37:37.422432545Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" authorization:\n"} +{"Time":"2023-05-31T19:37:37.422439081Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T19:37:37.422442921Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" webhook:\n"} +{"Time":"2023-05-31T19:37:37.422449649Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:37:37.422453298Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:37:37.422459759Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T19:37:37.422463142Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T19:37:37.422470012Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T19:37:37.422473971Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T19:37:37.422485703Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T19:37:37.422489484Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.422497175Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" evictionHard:\n"} +{"Time":"2023-05-31T19:37:37.422502251Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T19:37:37.422509517Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T19:37:37.422513319Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T19:37:37.422519773Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.422524208Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T19:37:37.422530905Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:37.422534327Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T19:37:37.422540565Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T19:37:37.422543775Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T19:37:37.422549089Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:37.422553227Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T19:37:37.422560982Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T19:37:37.422565263Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T19:37:37.422572183Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" logging:\n"} +{"Time":"2023-05-31T19:37:37.422575879Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T19:37:37.422579521Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" options:\n"} +{"Time":"2023-05-31T19:37:37.422585824Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" json:\n"} +{"Time":"2023-05-31T19:37:37.422589338Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T19:37:37.422595957Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T19:37:37.422599534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T19:37:37.422606104Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:37.422609959Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:37.422616768Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resolvConf: /run/systemd/resolve/resolv.conf\n"} +{"Time":"2023-05-31T19:37:37.422620238Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T19:37:37.422630366Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T19:37:37.422651372Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.422655761Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T19:37:37.422662556Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T19:37:37.422666508Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T19:37:37.422672507Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T19:37:37.422675816Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T19:37:37.422682441Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:37:37.422685999Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.422693445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" creationTimestamp: \"2023-05-31T19:36:41Z\"\n"} +{"Time":"2023-05-31T19:37:37.42269805Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T19:37:37.42270445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:37:37.42270816Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"210\"\n"} +{"Time":"2023-05-31T19:37:37.422716445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid: bb847b26-f656-4093-a25c-d45b43b5a455\n"} +{"Time":"2023-05-31T19:37:37.422720281Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: List\n"} +{"Time":"2023-05-31T19:37:37.422726855Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metadata:\n"} +{"Time":"2023-05-31T19:37:37.4227302Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T19:37:37.422737633Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.42274159Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.42274827Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:37:37.422752379Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ● docker.service\r\n"} +{"Time":"2023-05-31T19:37:37.422759147Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: masked (Reason: Unit docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:37:37.422763545Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T19:37:37.422769927Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:37:37.422773099Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.422776422Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.422779549Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:37:37.422783022Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;35m# Unit docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:37:37.422795927Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.422799771Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.422809261Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:37:37.422813193Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" {\r\n"} +{"Time":"2023-05-31T19:37:37.4228197Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"exec-opts\": [\r\n"} +{"Time":"2023-05-31T19:37:37.422823904Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"native.cgroupdriver=systemd\"\r\n"} +{"Time":"2023-05-31T19:37:37.42283073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ],\r\n"} +{"Time":"2023-05-31T19:37:37.422834667Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T19:37:37.422841308Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T19:37:37.422845293Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T19:37:37.42285162Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" },\r\n"} +{"Time":"2023-05-31T19:37:37.422855623Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T19:37:37.422863169Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" }\r\n"} +{"Time":"2023-05-31T19:37:37.422866947Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.422873473Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.422877081Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:37:37.42288446Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Client:\r\n"} +{"Time":"2023-05-31T19:37:37.422893686Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T19:37:37.422898053Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Context: default\r\n"} +{"Time":"2023-05-31T19:37:37.422902267Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T19:37:37.422905838Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.422913027Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Server:\r\n"} +{"Time":"2023-05-31T19:37:37.422916702Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ERROR: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?\r\n"} +{"Time":"2023-05-31T19:37:37.422924187Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" errors pretty printing info\r\n"} +{"Time":"2023-05-31T19:37:37.422927957Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:37:37.422934658Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.42293812Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.42294436Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:37:37.422948762Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;31m●\u001b[0m cri-docker.service\r\n"} +{"Time":"2023-05-31T19:37:37.422954589Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: masked (Reason: Unit cri-docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:37:37.422961958Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: \u001b[0;1;31mfailed\u001b[0m (Result: exit-code) since Wed 2023-05-31 19:36:13 UTC; 1min 20s ago\r\n"} +{"Time":"2023-05-31T19:37:37.422966139Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TriggeredBy: \u001b[0;1;31m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:37:37.422972602Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Main PID: 454 (code=exited, status=1/FAILURE)\r\n"} +{"Time":"2023-05-31T19:37:37.42297635Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.422981036Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:11 minikube systemd[1]: \u001b[0;1;39m\u001b[0;1;31m\u001b[0;1;39mcri-docker.service: Main process exited, code=exited, status=1/FAILURE\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.422988471Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:11 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.422994189Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:11 minikube systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.423001566Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:13 kindnet-509041 systemd[1]: cri-docker.service: Scheduled restart job, restart counter is at 3.\r\n"} +{"Time":"2023-05-31T19:37:37.423011474Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:13 kindnet-509041 systemd[1]: Stopped CRI Interface for Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T19:37:37.423015602Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:13 kindnet-509041 systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Start request repeated too quickly.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.42302444Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:13 kindnet-509041 systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.423032999Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:13 kindnet-509041 systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.423037251Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:37:37.423044394Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423050713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423054356Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:37:37.423061442Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;35m# Unit cri-docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:37:37.423064996Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.42307463Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423083678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:37:37.423091694Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cat: /etc/systemd/system/cri-docker.service.d/10-cni.conf: No such file or directory\r\n"} +{"Time":"2023-05-31T19:37:37.423098874Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:37:37.42310243Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423108615Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423112258Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:37:37.423118886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:37.42312269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T19:37:37.423130722Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T19:37:37.423134692Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T19:37:37.423138722Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:37:37.423145293Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:37:37.423154098Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.423158056Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:37.423164432Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:37:37.423168365Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T19:37:37.42317473Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:37:37.423178495Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T19:37:37.423186006Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T19:37:37.423190039Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:37:37.423196444Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.423200399Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T19:37:37.423207439Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T19:37:37.423211723Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:37:37.423218106Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T19:37:37.423221953Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.423228796Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T19:37:37.423237252Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T19:37:37.423245019Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:37:37.423248761Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T19:37:37.423255023Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.423258976Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:37:37.42326727Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:37:37.423271289Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.423278226Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.423281875Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.423288494Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.423292618Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T19:37:37.42329704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T19:37:37.423300599Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.42330662Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:37:37.423310175Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:37:37.423314306Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.423317998Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:37.423324978Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:37.423328775Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423335453Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423339337Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:37:37.423345788Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cri-dockerd 0.3.2 (23513f4)\r\n"} +{"Time":"2023-05-31T19:37:37.423349388Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423355669Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.423359279Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:37:37.423366372Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T19:37:37.423371164Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: loaded (\u001b]8;;file://kindnet-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: disabled)\r\n"} +{"Time":"2023-05-31T19:37:37.42337875Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:36:27 UTC; 1min 8s ago\r\n"} +{"Time":"2023-05-31T19:37:37.423383096Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:37:37.423573547Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Main PID: 665 (containerd)\r\n"} +{"Time":"2023-05-31T19:37:37.423585499Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Tasks: 119 (limit: 8192)\r\n"} +{"Time":"2023-05-31T19:37:37.423589898Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Memory: 207.9M\r\n"} +{"Time":"2023-05-31T19:37:37.423594168Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T19:37:37.423599021Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─ 665 /usr/bin/containerd --root /mnt/vda1/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:37:37.423607179Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─ 911 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e3c103d05cd9723b2974edc80d78717f306795ca0173cf67d58204869e382e8c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423612407Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─ 925 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e82036ee166af5f879ef11e0bc447c8f8797d490dc706aef049d34f4f14c9089 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423620001Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─ 951 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3c02b1799141327fdd8891c9dadc142832243dfd0de8eac8adc69e71061ba039 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423630321Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─ 952 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 35c803018bc59e051310cae1464ec45f6055eb733ded51bdd4f36e1f03484990 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423653046Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─1461 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ef5cce559ea00c331d919a749486a35c06579b0e6d44b6fefb9a19f5d5144622 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423657817Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─1466 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b1a0365461e51093c82d7c13e4b9177a0dc05ec07f8f1ff026b841d23061d0bd -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423672765Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─1727 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e700d9c00ced9f1f7fc5656dc2a49e0325e226b323bf97aa6ad999d867a1e06b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423680757Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ├─1777 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3977179dc55ed3fb2befc783ed896cc51c27e201f15e269cc99c632cc30817fd -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423685818Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" └─1951 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id fc8a5cca8c7169ddace7bb842d650d6f17de92aab97da0aef33fb2b60c34a921 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:37:37.423690125Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.423696497Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.774859012Z\" level=info msg=\"stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: active requests=0, bytes read=51164237\"\r\n"} +{"Time":"2023-05-31T19:37:37.429049153Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.777521704Z\" level=info msg=\"ImageCreate event name:\\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:37:37.429061482Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.781779631Z\" level=info msg=\"ImageUpdate event name:\\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:37:37.429067121Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.785143896Z\" level=info msg=\"ImageCreate event name:\\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:37:37.429073017Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.786322168Z\" level=info msg=\"Pulled image \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" with image id \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\", repo tag \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\", repo digest \\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\", size \\\"51155161\\\" in 2.23533494s\"\r\n"} +{"Time":"2023-05-31T19:37:37.42907886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.786411494Z\" level=info msg=\"PullImage \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" returns image reference \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429083474Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.792390635Z\" level=info msg=\"CreateContainer within sandbox \\\"fc8a5cca8c7169ddace7bb842d650d6f17de92aab97da0aef33fb2b60c34a921\\\" for container \u0026ContainerMetadata{Name:dnsutils,Attempt:0,}\"\r\n"} +{"Time":"2023-05-31T19:37:37.429088706Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.812022456Z\" level=info msg=\"CreateContainer within sandbox \\\"fc8a5cca8c7169ddace7bb842d650d6f17de92aab97da0aef33fb2b60c34a921\\\" for \u0026ContainerMetadata{Name:dnsutils,Attempt:0,} returns container id \\\"4b760a8a9cae32da97e44b9777d91bb417a94229c1e8e89ace281867f013704a\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429093905Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.813061787Z\" level=info msg=\"StartContainer for \\\"4b760a8a9cae32da97e44b9777d91bb417a94229c1e8e89ace281867f013704a\\\"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429098534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:37:12 kindnet-509041 containerd[665]: time=\"2023-05-31T19:37:12.908386303Z\" level=info msg=\"StartContainer for \\\"4b760a8a9cae32da97e44b9777d91bb417a94229c1e8e89ace281867f013704a\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:37:37.429102501Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.429108511Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.429111771Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:37:37.429115481Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.429119499Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:37.429122913Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:37:37.429126412Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:37:37.429130555Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:37.429133966Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:37.429137484Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429140533Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:37.429143942Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:37:37.429147164Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:37:37.429151298Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:37:37.429155297Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:37:37.429158521Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:37:37.429161822Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:37:37.429165249Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:37.429168606Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:37.429171888Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:37:37.42917527Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:37:37.429178484Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:37:37.42918352Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:37:37.429187102Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:37:37.429191099Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:37:37.429194984Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:37:37.429198509Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:37:37.42920187Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.429206995Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.429210582Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:37:37.429214127Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:37:37.429217619Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429220928Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:37.429224194Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:37.42922748Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.42923083Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.429234045Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:37:37.429238774Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:37.4292434Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:37:37.429246723Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:37:37.42924986Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:37.429253947Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:37.429258742Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429262087Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:37.429265155Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:37:37.429268244Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:37:37.429271667Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:37:37.429274982Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:37:37.429278705Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:37:37.429282635Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:37:37.42928596Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:37.42928945Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:37.429293095Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:37:37.42929838Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:37:37.429301934Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:37:37.429305534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:37:37.429308986Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:37:37.429315258Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:37:37.429319105Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:37:37.429322873Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:37:37.429326824Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.429330475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.429333973Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:37:37.429337109Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:37:37.429340269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429343459Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:37.42934669Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:37.429349621Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.429352403Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.429355621Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:37:37.42935938Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:37:37.429363056Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:37.429366701Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:37.429370276Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:37:37.42937492Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # imports\r\n"} +{"Time":"2023-05-31T19:37:37.429378453Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429381848Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:37:37.429385293Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:37:37.429388991Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429392444Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429395943Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:37.429399435Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:37.42940264Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429405618Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:37:37.429409905Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429413898Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429417178Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429420616Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.42942373Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.42942708Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:37:37.42943062Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429433957Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:37:37.429437516Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429440873Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:37:37.429444191Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429447216Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429450852Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:37:37.429454338Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:37:37.429457714Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:37:37.429460997Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:37:37.429464687Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429468256Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:37:37.429472628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:37:37.429483578Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:37:37.429488476Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:37:37.429492237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:37:37.429495704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:37:37.429499246Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:37:37.429502736Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429506553Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:37:37.429510306Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:37:37.429513299Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:37:37.429516329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.429519504Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:37:37.429523369Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429526781Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429530376Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429533969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:37:37.429537836Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:37:37.429541669Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:37:37.429545351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:37:37.429548998Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:37:37.429552381Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429555518Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:37:37.429559206Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:37:37.429563057Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:37:37.42956787Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429571396Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:37:37.429574853Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:37:37.429578221Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429580973Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:37:37.429584214Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:37:37.42958728Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:37:37.429590329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:37:37.42959315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:37:37.42959611Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:37:37.42959918Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:37:37.429602547Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:37:37.429605786Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.429608958Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.429611823Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:37:37.42961528Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T19:37:37.429618873Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T19:37:37.429621973Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:37:37.42962546Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429628779Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T19:37:37.429632124Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:37.429635709Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:37.429641231Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429644852Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:37:37.429648074Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429651352Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:37:37.429654804Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429658667Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429662392Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:37:37.429665351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429669023Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429672818Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429676332Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429679358Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429682688Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429685876Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:37:37.429688942Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:37:37.429692137Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429695246Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:37.429698739Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:37.429702632Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429706412Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429709942Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.42971388Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429717096Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429719944Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429723069Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:37:37.429726181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429729315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:37:37.429732352Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429735405Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:37:37.429738584Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429742077Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:37:37.429745733Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429749573Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:37:37.429754512Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:37:37.429757959Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:37:37.429761386Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:37:37.429765092Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429768546Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:37:37.429772244Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cdi_spec_dirs = [\"/etc/cdi\", \"/var/run/cdi\"]\r\n"} +{"Time":"2023-05-31T19:37:37.429775806Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:37:37.429779512Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T19:37:37.429782949Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T19:37:37.429786238Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:37:37.429788963Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T19:37:37.429791765Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T19:37:37.429794823Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" drain_exec_sync_io_timeout = \"0s\"\r\n"} +{"Time":"2023-05-31T19:37:37.429798255Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_cdi = false\r\n"} +{"Time":"2023-05-31T19:37:37.429801561Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:37:37.429804395Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:37:37.429808058Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T19:37:37.429811163Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T19:37:37.4298142Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T19:37:37.429817607Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" image_pull_progress_timeout = \"1m0s\"\r\n"} +{"Time":"2023-05-31T19:37:37.429820718Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:37:37.429824429Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:37:37.42982741Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T19:37:37.429830968Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:37:37.4298362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:37:37.429841155Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T19:37:37.429844692Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:37:37.429848245Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T19:37:37.429851838Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429855077Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:37:37.429858143Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T19:37:37.42986153Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:37:37.429864641Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429868361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429871547Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:37:37.429874868Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:37:37.429878265Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:37:37.429881822Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429884858Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429887997Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T19:37:37.429891116Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" setup_serially = false\r\n"} +{"Time":"2023-05-31T19:37:37.429894361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429897772Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:37:37.429901391Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.429905209Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T19:37:37.429909014Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:37:37.429913736Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ignore_blockio_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:37:37.429917391Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:37:37.429920649Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:37:37.429923543Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:37:37.429926852Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429930066Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T19:37:37.429933673Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429937102Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429940529Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:37:37.429943758Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:37.429947475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:37.429951321Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:37.429954481Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:37:37.429958051Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429961461Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429965111Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429968807Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429972705Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429976916Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.429979953Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429983351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T19:37:37.429987822Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429990982Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:37:37.429995343Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.429998925Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:37:37.430002474Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430006068Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430010766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:37:37.430014221Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:37.430018711Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:37.43002201Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:37.430025404Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:37:37.430028658Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430031844Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430034858Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430039445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:37:37.430042707Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430045958Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430048848Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430051974Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:37:37.430055237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:37:37.430058097Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430061633Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:37:37.430066355Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430069547Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430073265Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:37:37.430076792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:37.430080164Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:37.430083735Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:37.430087202Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:37:37.430090927Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430094399Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430097762Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430101104Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430105597Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43010898Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430112156Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430115504Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T19:37:37.430119074Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430130027Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T19:37:37.43013344Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T19:37:37.430136406Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430139511Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:37:37.430142374Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:37:37.430144522Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430146966Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T19:37:37.430149104Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430151315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T19:37:37.43015383Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430155902Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T19:37:37.430157987Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430160073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T19:37:37.430162047Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430164223Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T19:37:37.430166531Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430168501Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430170392Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430172298Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430174403Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T19:37:37.430176312Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430179107Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T19:37:37.43018132Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T19:37:37.43018395Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430186926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430190113Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T19:37:37.430194157Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T19:37:37.430197596Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.4302008Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430203993Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T19:37:37.430221358Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43022481Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430228041Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:37:37.430231466Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43023464Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.nri.v1.nri\"]\r\n"} +{"Time":"2023-05-31T19:37:37.43023829Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable = true\r\n"} +{"Time":"2023-05-31T19:37:37.430241999Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" disable_connections = false\r\n"} +{"Time":"2023-05-31T19:37:37.43024553Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" plugin_config_path = \"/etc/nri/conf.d\"\r\n"} +{"Time":"2023-05-31T19:37:37.430249054Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" plugin_path = \"/opt/nri/plugins\"\r\n"} +{"Time":"2023-05-31T19:37:37.430252477Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" plugin_registration_timeout = \"5s\"\r\n"} +{"Time":"2023-05-31T19:37:37.43025578Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" plugin_request_timeout = \"2s\"\r\n"} +{"Time":"2023-05-31T19:37:37.430259021Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" socket_path = \"/var/run/nri/nri.sock\"\r\n"} +{"Time":"2023-05-31T19:37:37.430261847Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430264886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430268863Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T19:37:37.430272625Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.430275988Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430279813Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T19:37:37.430283783Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T19:37:37.43028695Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430290222Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430293374Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T19:37:37.43029678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T19:37:37.430300147Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430303439Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430307029Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430310754Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430313888Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T19:37:37.43031738Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430321373Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43032489Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430328259Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430331666Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430334928Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430338256Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430341719Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430344995Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430348209Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430351276Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T19:37:37.430354391Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430357418Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T19:37:37.430360426Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430363761Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430366925Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430371001Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430374189Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430377256Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430387151Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430389907Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430393306Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430396361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43039936Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T19:37:37.430402235Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430405212Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430408598Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430411581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430414556Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430418485Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43042173Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T19:37:37.430427102Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430430314Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43043379Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [plugins.\"io.containerd.transfer.v1.local\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430437103Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430439998Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:37:37.430471337Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" max_concurrent_uploaded_layers = 3\r\n"} +{"Time":"2023-05-31T19:37:37.430475417Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430484695Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [[plugins.\"io.containerd.transfer.v1.local\".unpack_config]]\r\n"} +{"Time":"2023-05-31T19:37:37.430488475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" differ = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43049193Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" platform = \"linux/amd64\"\r\n"} +{"Time":"2023-05-31T19:37:37.430495032Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:37:37.430497962Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430501077Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T19:37:37.430504135Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430507543Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T19:37:37.430510713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430513697Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430517252Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430520801Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430524546Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430528119Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:37:37.430531482Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T19:37:37.430551466Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430555766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430559136Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430562814Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430566273Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:37:37.430571243Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:37:37.430575882Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T19:37:37.430578933Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430581926Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T19:37:37.43058545Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T19:37:37.43058916Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.metrics.shimstats\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:37:37.430592516Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:37:37.430597079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:37:37.43060048Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T19:37:37.430605349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:37:37.430608576Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430611645Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T19:37:37.430614827Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.430626831Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.43063064Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:37:37.430633875Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.430637332Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.430640405Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:37:37.430643988Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ● crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:37:37.430648166Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Loaded: loaded (\u001b]8;;file://kindnet-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:37:37.430652482Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Active: inactive (dead) since Wed 2023-05-31 19:36:26 UTC; 1min 9s ago\r\n"} +{"Time":"2023-05-31T19:37:37.43065596Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:37:37.430660414Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Main PID: 376 (code=exited, status=0/SUCCESS)\r\n"} +{"Time":"2023-05-31T19:37:37.43066475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430668329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:23 kindnet-509041 crio[376]: time=\"2023-05-31 19:36:23.602328050Z\" level=debug msg=\"[graphdriver] trying provided driver \\\"overlay\\\"\" file=\"drivers/driver.go:324\"\r\n"} +{"Time":"2023-05-31T19:37:37.430672635Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:23 kindnet-509041 crio[376]: time=\"2023-05-31 19:36:23.602721219Z\" level=debug msg=\"Cached value indicated that overlay is supported\" file=\"overlay/overlay.go:209\"\r\n"} +{"Time":"2023-05-31T19:37:37.430676642Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:23 kindnet-509041 crio[376]: time=\"2023-05-31 19:36:23.602856575Z\" level=debug msg=\"Cached value indicated that metacopy is being used\" file=\"overlay/overlay.go:339\"\r\n"} +{"Time":"2023-05-31T19:37:37.430680575Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:23 kindnet-509041 crio[376]: time=\"2023-05-31 19:36:23.603578053Z\" level=debug msg=\"backingFs=extfs, projectQuotaSupported=false, useNativeDiff=false, usingMetacopy=true\" file=\"overlay/overlay.go:400\"\r\n"} +{"Time":"2023-05-31T19:37:37.430684755Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:26 kindnet-509041 crio[376]: time=\"2023-05-31 19:36:26.692641461Z\" level=debug msg=\"Closed stream server\" file=\"crio/main.go:383\"\r\n"} +{"Time":"2023-05-31T19:37:37.430689014Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:26 kindnet-509041 crio[376]: time=\"2023-05-31 19:36:26.692772952Z\" level=debug msg=\"Closed monitors\" file=\"crio/main.go:385\"\r\n"} +{"Time":"2023-05-31T19:37:37.430693207Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:26 kindnet-509041 crio[376]: time=\"2023-05-31 19:36:26.692818635Z\" level=debug msg=\"Closed hook monitor\" file=\"crio/main.go:388\"\r\n"} +{"Time":"2023-05-31T19:37:37.430697469Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:26 kindnet-509041 crio[376]: time=\"2023-05-31 19:36:26.692856938Z\" level=debug msg=\"Closed main server\" file=\"crio/main.go:393\"\r\n"} +{"Time":"2023-05-31T19:37:37.430701292Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:26 kindnet-509041 systemd[1]: crio.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:37:37.430705352Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" May 31 19:36:26 kindnet-509041 systemd[1]: Stopped Container Runtime Interface for OCI (CRI-O).\r\n"} +{"Time":"2023-05-31T19:37:37.430708688Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:37:37.430712155Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.430715231Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.430718312Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:37:37.430721728Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[0;1;34m# \u001b]8;;file://kindnet-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:37:37.430725491Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:37:37.430728685Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:37:37.430732242Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T19:37:37.430735634Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:37:37.430738811Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:37.430741774Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:37:37.430745069Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" After=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:37:37.430748619Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Requires=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:37:37.430752005Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430755136Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:37:37.430758185Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:37:37.430761316Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=-/etc/sysconfig/crio\r\n"} +{"Time":"2023-05-31T19:37:37.4307659Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=-/etc/sysconfig/crio.minikube\r\n"} +{"Time":"2023-05-31T19:37:37.430768971Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:37:37.430772081Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:37:37.430775682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T19:37:37.430779961Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CRIO_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:37:37.430783221Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" $CRIO_MINIKUBE_OPTIONS\r\n"} +{"Time":"2023-05-31T19:37:37.430786248Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:37:37.43078997Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:37:37.430793305Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:37:37.430796513Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T19:37:37.430799663Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:37:37.430802929Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T19:37:37.430806606Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:37:37.4308099Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:37:37.430813222Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430816331Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:37:37.430819455Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:37:37.430822498Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.430825601Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.430828718Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:37:37.430832213Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T19:37:37.430835641Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:37:37.430839508Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:37:37.430842615Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:37:37.430845747Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.43084881Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:37:37.430853345Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430856918Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:37:37.430860398Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:37:37.43086406Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:37:37.43086725Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:37:37.430870165Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430874023Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:37:37.430877672Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:37:37.430881635Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:37:37.430885132Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:37:37.4308886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:37:37.43089171Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430894842Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:37:37.430898297Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:37:37.430901919Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:37:37.430904756Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430907847Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:37:37.430911037Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:37:37.430914016Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430917397Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:37:37.430920713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:37:37.430924678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:37:37.430928992Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430931901Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:37:37.430935327Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:37:37.430938494Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:37:37.430941972Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:37:37.430945792Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.430948864Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430952111Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:37:37.430955318Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:37:37.430958673Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:37:37.430963514Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430967174Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:37:37.430970401Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:37:37.430973901Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:37:37.430977539Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:37:37.430980548Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.430983711Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:37:37.430987135Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:37:37.430990711Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:37:37.430994015Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:37:37.430997421Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431000326Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:37:37.431003424Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:37:37.431006648Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431009735Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:37:37.431013266Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:37:37.431017746Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431021038Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:37:37.431024224Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:37:37.431027473Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431030712Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:37:37.431034118Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:37:37.431037297Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:37:37.431040628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431043558Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:37:37.431046843Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:37:37.431050218Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43105371Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:37:37.431057258Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:37:37.431060624Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:37:37.431063832Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.431066756Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.4310699Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:37:37.431073416Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:37:37.431076339Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43107927Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431082185Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:37:37.43108591Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:37:37.43108872Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:37:37.431091647Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43109459Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431097839Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:37:37.431101832Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:37.431104857Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431108182Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:37:37.431111533Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:37.431114302Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431117354Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:37:37.431120559Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:37:37.431124069Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:37:37.431127682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431131224Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:37:37.431134873Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:37:37.431138891Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:37:37.431142114Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:37:37.431145438Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:37:37.431150754Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #]\r\n"} +{"Time":"2023-05-31T19:37:37.431155637Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431159429Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:37:37.43116273Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:37:37.431166654Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431170116Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:37:37.43117431Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.431179207Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:37:37.431182752Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431187621Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:37:37.43119119Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:37:37.431194674Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:37:37.431198333Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431201648Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:37:37.431204993Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:37:37.431208503Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431211786Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:37:37.431215281Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:37:37.431218458Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:37:37.431221919Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:37:37.431225456Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.431228475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431231614Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:37:37.431234944Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:37:37.431237915Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:37:37.431240963Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_env = [\r\n"} +{"Time":"2023-05-31T19:37:37.431244288Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.431247091Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431251283Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:37:37.431254575Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" selinux = false\r\n"} +{"Time":"2023-05-31T19:37:37.431257647Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431260823Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:37:37.431264233Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:37:37.43126811Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.431271362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43127453Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431277856Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:37:37.431281435Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:37:37.431285172Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:37:37.431288337Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:37:37.431291361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:37:37.431294277Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43129713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:37:37.431300427Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:37:37.431304236Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:37:37.431307578Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:37:37.431312535Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.431316172Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:37:37.431319907Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431323115Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:37:37.431327969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:37:37.431331237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431334133Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:37:37.431337517Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.431340465Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431344016Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:37:37.431347439Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:37:37.431447022Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:37:37.431453073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:37:37.431457247Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:37:37.43146077Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:37:37.431464576Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:37:37.431467937Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:37:37.431471286Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:37:37.431474696Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:37:37.431484197Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:37:37.431488226Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:37:37.431491687Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:37:37.431494916Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.431498253Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431501566Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:37:37.431505217Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:37:37.431508619Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:37:37.431512218Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.431515334Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431518585Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:37:37.431521947Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:37:37.43152844Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:37:37.431531671Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:37:37.431534944Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" additional_devices = [\r\n"} +{"Time":"2023-05-31T19:37:37.431538007Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.431541004Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431543933Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:37:37.431659507Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:37:37.431664248Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:37:37.431667983Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:37:37.431673513Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.431676882Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431680727Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:37:37.431684138Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:37:37.4316886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:37:37.431691977Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.431695421Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:37:37.43169931Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:37:37.431702957Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:37:37.431706685Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.431709923Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:37:37.431713332Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:37:37.431716759Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:37:37.431720268Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:37:37.431723477Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.431726861Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.431730073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431732928Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:37:37.431736515Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:37:37.431739761Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431742898Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:37:37.431930182Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:37:37.431935207Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:37:37.431938734Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # limit is never exceeded.\r\n"} +{"Time":"2023-05-31T19:37:37.431942174Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:37:37.431945212Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431947921Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Whether container output should be logged to journald in addition to the kubernetes log file\r\n"} +{"Time":"2023-05-31T19:37:37.431952027Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:37:37.431954873Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431958201Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:37:37.431961613Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:37:37.431964684Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431967998Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:37:37.431971188Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:37:37.431974706Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431978235Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:37:37.431981496Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.431985081Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431988293Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:37:37.431992181Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" read_only = false\r\n"} +{"Time":"2023-05-31T19:37:37.431995601Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.431999102Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:37:37.432002651Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:37:37.432005891Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.432009308Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:37:37.432212881Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432220551Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:37:37.432225577Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.432228744Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.432231866Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432256308Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:37:37.432260454Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:37:37.432263806Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:37:37.432267103Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43227079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432274093Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:37:37.432277523Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:37:37.43228092Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:37:37.432284268Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.432287683Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43229104Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:37:37.432294564Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:37:37.432300953Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:37:37.432304413Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:37:37.4323075Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432310787Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # manage_ns_lifecycle determines whether we pin and remove namespaces\r\n"} +{"Time":"2023-05-31T19:37:37.432314231Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # and manage their lifecycle.\r\n"} +{"Time":"2023-05-31T19:37:37.432317615Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is being deprecated, and will be unconditionally true in the future.\r\n"} +{"Time":"2023-05-31T19:37:37.432321026Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" manage_ns_lifecycle = true\r\n"} +{"Time":"2023-05-31T19:37:37.432493549Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432504817Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:37:37.432510272Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:37:37.432518559Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:37:37.432523125Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:37:37.432527298Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:37:37.432531438Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432535399Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:37:37.432540109Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:37:37.432544124Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:37:37.432562934Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432567323Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:37:37.432572324Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:37:37.432576389Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432580349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:37:37.432586196Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:37:37.432590465Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:37:37.432594766Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.432598815Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.432603031Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:37:37.432607861Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The runtime to use is picked based on the runtime_handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:37:37.432612016Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If no runtime_handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:37:37.432616013Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:37:37.432812981Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.432820623Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:37:37.432824896Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:37:37.43285093Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:37:37.432856378Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:37:37.432860534Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:37.43286467Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:37.432868815Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:37:37.432873044Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:37:37.432877456Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:37:37.432882034Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:37:37.4328863Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:37:37.43289033Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:37:37.432894508Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:37:37.432898787Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:37:37.432902993Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:37:37.432906908Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:37:37.432911347Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:37:37.432915582Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:37:37.432919975Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:37:37.43292405Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:37:37.432936964Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:37:37.432941888Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:37:37.433187558Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:37:37.433199365Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:37:37.433203784Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433207754Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433212136Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:37:37.433222307Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.43322645Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:37:37.433231006Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.433235157Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433239096Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433261881Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433267191Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433271507Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:37:37.43327589Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:37:37.433281173Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:37:37.433285399Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433289192Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:37:37.433293384Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:37:37.433297363Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:37:37.433301811Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433306412Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:37:37.433310515Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:37:37.433314857Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433319536Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:37:37.433324664Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:37:37.433503678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43352018Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:37:37.433524428Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:37:37.433528417Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433532634Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:37:37.433537004Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.433541172Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:37:37.433545488Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:37:37.433549657Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:37:37.433553889Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:37:37.433557671Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:37:37.433561595Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:37:37.433565278Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433569127Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:37:37.433573322Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:37:37.433576785Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433580306Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:37:37.433584561Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:37:37.433588461Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.433592389Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433596299Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:37:37.433600909Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.433605243Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:37:37.433609349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433795577Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:37:37.433803443Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:37:37.433807307Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.433811726Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.433814865Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433818652Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:37:37.433822382Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:37:37.433826163Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:37:37.433829818Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.433833386Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:37:37.433836842Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433849145Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:37:37.4338542Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:37:37.433858294Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:37:37.433862039Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:37:37.433865866Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:37:37.433869283Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.433872757Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.433878028Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:37:37.433881587Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:37:37.43388485Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:37:37.43388811Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #insecure_registries = \"[]\"\r\n"} +{"Time":"2023-05-31T19:37:37.43389151Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434079444Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:37:37.434087392Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:37:37.434090712Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:37:37.434093732Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434097487Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:37:37.434100629Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.434104023Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434107397Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:37:37.434110802Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:37:37.434114352Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:37:37.434120169Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434123641Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:37:37.434128751Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:37:37.434132337Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43413581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43413921Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:37:37.434142784Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:37:37.434146245Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43414938Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:37:37.434152753Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:37:37.434155948Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:37:37.434159317Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.434162306Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434165139Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:37:37.434167289Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:37:37.434169173Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434366394Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:37:37.434374237Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:37:37.434378033Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434381576Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:37:37.434385588Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:37:37.434389344Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43439263Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:37:37.434396411Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.434400095Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T19:37:37.434403348Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:37:37.434414956Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.434418606Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.4344219Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:37:37.434425018Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.434428615Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.4344319Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:37:37.434435188Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.434438692Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.434441988Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.434445195Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:37:37.434449578Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:37:37.364742413Z] Starting CRI-O, version: 1.24.1, git: a3bbde8a77c323aa6a485da9a9046299155c6016(dirty) \r\n"} +{"Time":"2023-05-31T19:37:37.434453886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T19:37:37.434457969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:37:37.434462054Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:37:37.434465744Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:37:37.434604939Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.43460928Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:37:37.434611621Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434613741Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:37:37.43461597Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:37:37.434618278Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:37:37.434620353Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:37:37.434622313Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434624402Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:37:37.434626535Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:37:37.434628798Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:37:37.43463182Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:37:37.434634925Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:37:37.434638031Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434641819Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:37:37.434645356Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:37:37.434651665Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:37:37.434655042Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434658295Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:37:37.434661915Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:37:37.43466547Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434669457Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:37:37.434673356Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:37:37.434833354Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:37:37.434840029Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434843641Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:37:37.434847157Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:37:37.434850642Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:37:37.434856018Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:37:37.434859777Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.43486303Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434866445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:37:37.434870162Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:37:37.434873664Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:37:37.434877083Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434880334Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:37:37.434884105Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:37:37.434887594Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:37:37.43489092Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:37:37.434893982Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434897057Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:37:37.434899742Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:37:37.434902409Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:37:37.434905749Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:37:37.434908938Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.434913214Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T19:37:37.43491703Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T19:37:37.435089144Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T19:37:37.435093758Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435097094Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T19:37:37.435100643Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T19:37:37.435104077Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T19:37:37.435107537Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T19:37:37.435110793Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435113621Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:37:37.435116073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:37:37.435118073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435120073Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:37:37.435122218Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:37:37.435124266Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435126212Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:37:37.435128195Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:37:37.435130096Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435132604Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:37:37.435134999Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:37:37.435137328Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:37:37.435140322Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435143824Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:37:37.4351469Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:37:37.435150038Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43515299Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T19:37:37.43516652Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43527433Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435277262Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:37:37.43527958Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:37:37.435281915Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:37:37.435283969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.435286024Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435288057Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:37:37.435290713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:37:37.435292845Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.435294903Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435297017Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:37:37.435299115Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:37:37.435301194Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:37:37.435303314Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.435305326Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435307272Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:37:37.435309582Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:37.435311864Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435313814Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:37:37.435315992Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:37:37.435318064Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435319956Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:37:37.435321915Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:37:37.435324069Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:37:37.435493134Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435498084Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:37:37.435501342Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:37:37.435505034Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:37:37.435508322Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:37:37.435511999Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:37:37.435515129Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.435518461Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435533458Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:37:37.435536842Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T19:37:37.435540093Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435543251Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:37:37.435546754Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.435550411Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:37:37.435553757Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435557006Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:37:37.435560301Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:37:37.435563604Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:37:37.435566886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:37:37.435570286Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435573381Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:37:37.435576835Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T19:37:37.435580357Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:37:37.435583715Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435724184Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:37:37.435728606Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:37:37.435732149Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:37:37.435735795Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:37:37.435739216Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:37:37.435742622Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ]\r\n"} +{"Time":"2023-05-31T19:37:37.43574565Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435748644Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:37:37.43575212Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:37:37.435755375Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:37:37.435761256Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T19:37:37.435764561Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.435767684Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435770886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:37:37.435774019Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T19:37:37.435777236Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435780615Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:37:37.435784011Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:37:37.435787907Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.43579138Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.435794558Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435797682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:37:37.435801311Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:37:37.435804855Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:37:37.435895939Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:37:37.435900108Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:37:37.435903453Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435906688Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:37:37.435910042Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:37:37.435913553Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:37:37.435918886Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:37:37.435922276Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.435925624Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:37:37.435928704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435931953Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T19:37:37.435935157Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T19:37:37.435938397Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.435941486Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435944599Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T19:37:37.435948191Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T19:37:37.435951807Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T19:37:37.435955111Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435958417Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T19:37:37.435962125Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.435965443Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.435968655Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.435972063Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:37:37.435976306Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:37:37.436053324Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436057297Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:37:37.436060906Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.436065269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436068561Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:37:37.436072236Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:37:37.436075509Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:37:37.436078589Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:37:37.436081804Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:37:37.436085142Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:37:37.436088532Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:37:37.43609182Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:37:37.436094746Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:37:37.436097939Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:37:37.436101199Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:37:37.43610424Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:37:37.436107351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:37:37.436110391Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.436115539Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436118593Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:37:37.436121682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:37:37.436125274Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:37:37.436129006Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.436133906Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436138383Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T19:37:37.43614357Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T19:37:37.436222992Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T19:37:37.436227408Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T19:37:37.436230682Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.436234112Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.4362377Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:37:37.436240949Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:37:37.436245715Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:37:37.436249226Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:37:37.436253053Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T19:37:37.43625594Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.436258985Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436262319Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T19:37:37.436265373Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T19:37:37.436268652Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T19:37:37.436271972Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T19:37:37.436275367Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.436278742Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436282385Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T19:37:37.436286137Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T19:37:37.436289362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T19:37:37.436292427Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:37:37.436295669Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436300929Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:37:37.436304791Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:37:37.436308723Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:37:37.436392425Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:37:37.436397463Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.436401238Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436404693Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:37:37.436408365Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:37:37.436412116Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:37:37.436415525Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.436419049Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:37:37.436422595Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:37:37.436425968Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:37:37.436429484Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.436432787Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:37:37.436436475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:37:37.436441437Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:37:37.436444848Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:37:37.436448169Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.436451362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.436454655Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436457904Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:37:37.436461435Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T19:37:37.436464707Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:37:37.436467698Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.436470555Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:37:37.436473751Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:37:37.438051709Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:37:37.438063503Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T19:37:37.438067464Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:37:37.438072279Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438080475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T19:37:37.438084343Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:37:37.438087979Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438091349Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:37:37.438095331Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:37:37.438098749Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438102356Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:37:37.438105985Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:37:37.438109317Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438112746Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:37:37.438116243Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438119436Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438122445Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:37:37.438126188Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T19:37:37.438129865Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438133265Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:37:37.438136855Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:37:37.438140711Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.438144096Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:37:37.43814733Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438153245Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:37:37.438156675Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.438160083Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.43816433Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438168229Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:37:37.438171881Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:37:37.438175425Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:37:37.438178862Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438182125Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438185932Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:37:37.438189522Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:37:37.438193144Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:37:37.438196604Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438199873Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438203107Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T19:37:37.438206865Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:37:37.438210737Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:37:37.438213905Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T19:37:37.43821718Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438220578Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T19:37:37.438224039Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:37:37.438228328Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:37:37.438231498Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T19:37:37.438234944Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438240342Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:37:37.438243154Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:37:37.43824931Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:37:37.438252869Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:37:37.438256299Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438259928Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:37:37.438264058Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:37:37.438267784Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:37:37.438270731Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:37:37.438273901Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:37:37.438277704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438281119Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T19:37:37.438285061Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T19:37:37.438288998Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T19:37:37.438292838Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438296144Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438299704Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:37:37.438302927Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:37:37.438306573Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:37:37.438310366Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438313712Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:37:37.438317961Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:37:37.438321269Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438324825Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:37:37.438328521Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:37:37.438332146Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:37:37.438335581Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.438339184Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43834264Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T19:37:37.438346381Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T19:37:37.438350378Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T19:37:37.438353888Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T19:37:37.438357254Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T19:37:37.438360942Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T19:37:37.438364083Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T19:37:37.438367515Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.438371449Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438374569Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:37:37.438378137Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:37:37.43838142Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:37:37.438384877Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:37:37.438388199Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.438391524Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:37:37.438396344Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:37:37.438399677Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:37:37.43840311Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:37:37.438408785Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:37:37.438412193Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:37:37.43841553Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:37:37.438418868Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:37:37.438422441Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:37:37.438426136Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:37:37.438429674Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:37:37.438433205Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:37:37.438437034Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:37:37.438440724Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:37:37.438444413Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:37:37.438447624Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:37:37.438451117Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T19:37:37.438454537Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T19:37:37.438457939Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:37:37.438461196Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:37:37.438464356Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:37:37.438467676Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:37:37.438471002Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:37:37.438475724Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:37:37.438486226Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T19:37:37.438490221Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:37:37.438495151Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:37:37.438498711Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T19:37:37.438503221Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T19:37:37.438507133Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T19:37:37.438510693Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T19:37:37.438515399Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T19:37:37.438519113Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438522947Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438526421Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:37:37.438529924Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.438533462Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:37:37.438536416Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:37:37.438539347Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438542301Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438545306Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438548748Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438552207Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438555554Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438558979Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438562286Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438565222Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438568748Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:37:37.438572487Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:37:37.43857587Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:37:37.438579178Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43858447Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:37:37.438588355Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:37:37.43859394Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:37:37.438597239Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438606028Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:37:37.438609993Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:37:37.43861345Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43861721Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:37:37.438620784Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:37:37.438624227Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438627627Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:37:37.438631053Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:37:37.438634317Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438637742Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T19:37:37.438642351Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T19:37:37.438646263Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T19:37:37.43865004Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T19:37:37.438654476Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T19:37:37.438658427Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T19:37:37.438662289Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T19:37:37.438666241Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T19:37:37.438670533Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T19:37:37.438675084Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T19:37:37.438679166Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Example:\r\n"} +{"Time":"2023-05-31T19:37:37.438682546Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T19:37:37.438685961Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T19:37:37.438689551Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T19:37:37.438692903Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T19:37:37.43869715Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T19:37:37.438700196Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T19:37:37.438703184Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:37:37.438706854Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T19:37:37.438710079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T19:37:37.438713751Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T19:37:37.438717293Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T19:37:37.438721135Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T19:37:37.438724483Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T19:37:37.438728188Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \r\n"} +{"Time":"2023-05-31T19:37:37.438731703Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43873531Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:37:37.438739743Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" #\r\n"} +{"Time":"2023-05-31T19:37:37.438743251Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:37:37.438747264Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:37:37.438750635Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:37:37.438753624Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:37:37.438759673Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:37:37.43876347Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:37:37.438767112Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438770523Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:37:37.438774079Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:37:37.438777628Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438781475Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:37:37.438786452Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:37:37.438790456Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438793983Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438797605Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:37:37.43880119Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.43880565Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:37:37.438808996Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438812807Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:37:37.438816342Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:37:37.438819679Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.438823072Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.438826987Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.438830726Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:37:37.438834622Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:37:37.438838304Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:37:37.438841379Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:37:37.439012719Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:37:37.439018294Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.43902186Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:37:37.439025842Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:37:37.439029262Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:37:37.439032576Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:37:37.439036085Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:37:37.439040009Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.439043126Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.439047168Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:37:37.439050791Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:37:37.439054531Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:37:37.439057998Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T19:37:37.439230388Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.439237376Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.439240846Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:37:37.439244745Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:37:37.439253564Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:37:37.439256856Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.439260336Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:37:37.439263769Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.439267494Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.439270791Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:37:37.43927425Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:37:37.440506846Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:37:37.440516355Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.440521034Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:37:37.440525559Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:37:37.440530242Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.440534332Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.440538741Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:37:37.440543134Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:37:37.44056764Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.440573308Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:37:37.440577419Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:37:37.440581698Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:37:37.440585566Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.440589267Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.440593177Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:37:37.440596409Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:37:37.44059986Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.440603684Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:37:37.440608067Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:37:37.440611501Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.440615348Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T19:37:37.440619064Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T19:37:37.440622772Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T19:37:37.44062678Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T19:37:37.440630879Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T19:37:37.440817431Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T19:37:37.440825229Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T19:37:37.440829301Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.440835123Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T19:37:37.440840329Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T19:37:37.440844166Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T19:37:37.440847713Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T19:37:37.440850974Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T19:37:37.440854712Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T19:37:37.440858563Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T19:37:37.440862521Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T19:37:37.440866123Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T19:37:37.440870259Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.440873856Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T19:37:37.440877683Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T19:37:37.440881929Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.440886459Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T19:37:37.44089246Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.440899307Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.44090362Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.440907585Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.44091145Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.440915485Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.440919569Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.440923158Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T19:37:37.444747168Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:37:37.444765297Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:37:37.444771887Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:37:37.444777046Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.444781936Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:37:37.444792643Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.444798018Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.444819818Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:37:37.44482966Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T19:37:37.444836756Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T19:37:37.44485983Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T19:37:37.444869762Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.444877913Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.44488315Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:37:37.444891441Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T19:37:37.444901454Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T19:37:37.444907222Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.444913045Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T19:37:37.444921814Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T19:37:37.444926872Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.444931491Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T19:37:37.444936498Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T19:37:37.444940991Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.444950231Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T19:37:37.44495574Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T19:37:37.444965313Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.444974459Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T19:37:37.44497969Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T19:37:37.444984597Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.444989508Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T19:37:37.444994478Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T19:37:37.44500543Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.445014789Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T19:37:37.445024361Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T19:37:37.445033517Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T19:37:37.445039592Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \r\n"} +{"Time":"2023-05-31T19:37:37.445048254Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T19:37:37.445053821Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ----------------------- debugLogs end: kindnet-509041 [took: 17.09458225s] --------------------------------\n"} +{"Time":"2023-05-31T19:37:37.445059388Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:175: Cleaning up \"kindnet-509041\" profile ...\n"} +{"Time":"2023-05-31T19:37:37.445064862Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p kindnet-509041\n"} +{"Time":"2023-05-31T19:37:38.422337864Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p kindnet-509041: (1.003789489s)\n"} +{"Time":"2023-05-31T19:37:38.422365763Z","Action":"cont","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T19:37:38.42237113Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== CONT TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T19:37:38.422375297Z","Action":"run","Test":"TestNetworkPlugins/group/flannel/Start"} +{"Time":"2023-05-31T19:37:38.422378556Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"=== RUN TestNetworkPlugins/group/flannel/Start\n"} +{"Time":"2023-05-31T19:37:38.422415732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-linux-amd64 start -p flannel-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=flannel --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:38:28.541712562Z","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-linux-amd64 start -p calico-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=calico --driver=kvm2 --container-runtime=containerd: (1m34.592607988s)\n"} +{"Time":"2023-05-31T19:38:28.541746564Z","Action":"run","Test":"TestNetworkPlugins/group/calico/ControllerPod"} +{"Time":"2023-05-31T19:38:28.54175156Z","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":"=== RUN TestNetworkPlugins/group/calico/ControllerPod\n"} +{"Time":"2023-05-31T19:38:28.543624049Z","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/calico/ControllerPod: waiting 10m0s for pods matching \"k8s-app=calico-node\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T19:38:28.56060687Z","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":" helpers_test.go:344: \"calico-node-pxmfk\" [c41b2a76-e554-49b9-a5d5-be8fcfb647dd] Running\n"} +{"Time":"2023-05-31T19:38:33.566035353Z","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/calico/ControllerPod: k8s-app=calico-node healthy within 5.022422533s\n"} +{"Time":"2023-05-31T19:38:33.566069554Z","Action":"run","Test":"TestNetworkPlugins/group/calico/KubeletFlags"} +{"Time":"2023-05-31T19:38:33.566073045Z","Action":"output","Test":"TestNetworkPlugins/group/calico/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/calico/KubeletFlags\n"} +{"Time":"2023-05-31T19:38:33.566077756Z","Action":"output","Test":"TestNetworkPlugins/group/calico/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-linux-amd64 ssh -p calico-509041 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T19:38:33.78121438Z","Action":"run","Test":"TestNetworkPlugins/group/calico/NetCatPod"} +{"Time":"2023-05-31T19:38:33.781237056Z","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/calico/NetCatPod\n"} +{"Time":"2023-05-31T19:38:33.781244668Z","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context calico-509041 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T19:38:34.282723063Z","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/calico/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:38:34.2857571Z","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-8ml56\" [2c291b26-31d2-40ec-af8d-14b0fa56e948] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T19:38:39.28961765Z","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-8ml56\" [2c291b26-31d2-40ec-af8d-14b0fa56e948] Running\n"} +{"Time":"2023-05-31T19:38:44.295727994Z","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/calico/NetCatPod: app=netcat healthy within 10.013011568s\n"} +{"Time":"2023-05-31T19:38:44.295761754Z","Action":"run","Test":"TestNetworkPlugins/group/calico/DNS"} +{"Time":"2023-05-31T19:38:44.295766189Z","Action":"output","Test":"TestNetworkPlugins/group/calico/DNS","Output":"=== RUN TestNetworkPlugins/group/calico/DNS\n"} +{"Time":"2023-05-31T19:38:44.295777918Z","Action":"output","Test":"TestNetworkPlugins/group/calico/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context calico-509041 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:38:44.50210027Z","Action":"run","Test":"TestNetworkPlugins/group/calico/Localhost"} +{"Time":"2023-05-31T19:38:44.502129477Z","Action":"output","Test":"TestNetworkPlugins/group/calico/Localhost","Output":"=== RUN TestNetworkPlugins/group/calico/Localhost\n"} +{"Time":"2023-05-31T19:38:44.502168589Z","Action":"output","Test":"TestNetworkPlugins/group/calico/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context calico-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T19:38:44.67289818Z","Action":"run","Test":"TestNetworkPlugins/group/calico/HairPin"} +{"Time":"2023-05-31T19:38:44.672925857Z","Action":"output","Test":"TestNetworkPlugins/group/calico/HairPin","Output":"=== RUN TestNetworkPlugins/group/calico/HairPin\n"} +{"Time":"2023-05-31T19:38:44.672982672Z","Action":"output","Test":"TestNetworkPlugins/group/calico/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context calico-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T19:38:44.853775361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" net_test.go:209: \"calico\" test finished in 3m52.950333791s, failed=false\n"} +{"Time":"2023-05-31T19:38:44.938882769Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-linux-amd64 start -p custom-flannel-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=testdata/kube-flannel.yaml --driver=kvm2 --container-runtime=containerd: (1m49.939662462s)\n"} +{"Time":"2023-05-31T19:38:44.938916616Z","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags"} +{"Time":"2023-05-31T19:38:44.938921629Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/KubeletFlags\n"} +{"Time":"2023-05-31T19:38:44.938928189Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-linux-amd64 ssh -p custom-flannel-509041 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T19:38:45.174760051Z","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod"} +{"Time":"2023-05-31T19:38:45.174786797Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/NetCatPod\n"} +{"Time":"2023-05-31T19:38:45.174817813Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context custom-flannel-509041 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T19:38:45.679776826Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/custom-flannel/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:38:45.683802303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-vnx52\" [e985e195-b135-4ea4-9fad-c3f9303fc8d1] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T19:38:51.691062636Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-vnx52\" [e985e195-b135-4ea4-9fad-c3f9303fc8d1] Running\n"} +{"Time":"2023-05-31T19:38:57.689074324Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/custom-flannel/NetCatPod: app=netcat healthy within 12.009283687s\n"} +{"Time":"2023-05-31T19:38:57.689113856Z","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/DNS"} +{"Time":"2023-05-31T19:38:57.689118973Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/DNS","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/DNS\n"} +{"Time":"2023-05-31T19:38:57.689126881Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context custom-flannel-509041 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:38:57.884067392Z","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/Localhost"} +{"Time":"2023-05-31T19:38:57.884088743Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Localhost","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/Localhost\n"} +{"Time":"2023-05-31T19:38:57.884126743Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context custom-flannel-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T19:38:58.042727274Z","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/HairPin"} +{"Time":"2023-05-31T19:38:58.042754756Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/HairPin","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/HairPin\n"} +{"Time":"2023-05-31T19:38:58.04279861Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context custom-flannel-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T19:38:58.224622033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net_test.go:209: \"custom-flannel\" test finished in 4m6.321363968s, failed=false\n"} +{"Time":"2023-05-31T19:39:00.145160965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T19:39:00.145188291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ----------------------- debugLogs start: calico-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:39:00.14519408Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:39:00.145199668Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T19:39:00.14520341Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T19:39:00.145207863Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145211658Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:39:00.145215316Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T19:39:00.145218988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145222045Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145225125Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145228385Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:39:00.145232044Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T19:39:00.145235444Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145238357Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.14524158Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:39:00.145252898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T19:39:00.145256103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145258859Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145261965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:39:00.145265493Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:39:00.145269274Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T19:39:00.145272678Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145275592Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145278502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:39:00.145282633Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T19:39:00.145286152Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T19:39:00.145289782Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T19:39:00.145293542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T19:39:00.145297451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T19:39:00.145300709Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T19:39:00.145303801Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T19:39:00.145307896Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.244.4.195\tnetcat-7458db8b8-8ml56\n"} +{"Time":"2023-05-31T19:39:00.145310851Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145313632Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145317036Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:39:00.145322489Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T19:39:00.145325874Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T19:39:00.145329059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" options ndots:5\n"} +{"Time":"2023-05-31T19:39:00.145334601Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145337784Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145340821Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:39:00.145344056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T19:39:00.145347368Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.145350486Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" passwd: files mymachines systemd\r\n"} +{"Time":"2023-05-31T19:39:00.145353812Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" group: files [SUCCESS=merge] mymachines [SUCCESS=merge] systemd\r\n"} +{"Time":"2023-05-31T19:39:00.145358387Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T19:39:00.145361475Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.14536463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname\r\n"} +{"Time":"2023-05-31T19:39:00.145367889Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" networks: files dns\r\n"} +{"Time":"2023-05-31T19:39:00.145371341Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.145374516Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" protocols: files\r\n"} +{"Time":"2023-05-31T19:39:00.145377754Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" services: files\r\n"} +{"Time":"2023-05-31T19:39:00.145380761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ethers: files\r\n"} +{"Time":"2023-05-31T19:39:00.145383808Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rpc: files\r\n"} +{"Time":"2023-05-31T19:39:00.145386848Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.14538984Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.14539291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:39:00.145396023Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T19:39:00.145399771Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 127.0.1.1 calico-509041\r\n"} +{"Time":"2023-05-31T19:39:00.145402908Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.39.1\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T19:39:00.145406545Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.39.162\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T19:39:00.145409422Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.14541234Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145417517Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:39:00.14542096Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This is /run/systemd/resolve/resolv.conf managed by man:systemd-resolved(8).\r\n"} +{"Time":"2023-05-31T19:39:00.145424525Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Do not edit.\r\n"} +{"Time":"2023-05-31T19:39:00.145428202Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.145431608Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This file might be symlinked as /etc/resolv.conf. If you're looking at\r\n"} +{"Time":"2023-05-31T19:39:00.14543489Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # /etc/resolv.conf and seeing this text, you have followed the symlink.\r\n"} +{"Time":"2023-05-31T19:39:00.145438015Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.145440975Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This is a dynamic resolv.conf file for connecting local clients directly to\r\n"} +{"Time":"2023-05-31T19:39:00.145444167Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # all known uplink DNS servers. This file lists all configured search domains.\r\n"} +{"Time":"2023-05-31T19:39:00.145447037Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.145450198Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Third party programs should typically not access this file directly, but only\r\n"} +{"Time":"2023-05-31T19:39:00.145453604Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # through the symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a\r\n"} +{"Time":"2023-05-31T19:39:00.145456991Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # different way, replace this symlink by a static file or a different symlink.\r\n"} +{"Time":"2023-05-31T19:39:00.145459967Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.145463227Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # See man:systemd-resolved.service(8) for details about the supported modes of\r\n"} +{"Time":"2023-05-31T19:39:00.145466339Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # operation for /etc/resolv.conf.\r\n"} +{"Time":"2023-05-31T19:39:00.145469212Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.14547216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nameserver 192.168.122.1\r\n"} +{"Time":"2023-05-31T19:39:00.145474926Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" search .\r\n"} +{"Time":"2023-05-31T19:39:00.145478049Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.14548078Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145483925Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:39:00.145487554Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T19:39:00.145492749Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node/calico-509041 Ready control-plane 69s v1.27.2 192.168.39.162 \u003cnone\u003e Buildroot 2021.02.12 5.10.57 containerd://1.7.1\n"} +{"Time":"2023-05-31T19:39:00.145496051Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145499381Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T19:39:00.145503147Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 67s \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145507228Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default service/netcat ClusterIP 10.104.238.174 \u003cnone\u003e 8080/TCP 17s app=netcat\n"} +{"Time":"2023-05-31T19:39:00.145511603Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 66s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:00.145514952Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145518243Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T19:39:00.14552253Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default endpoints/kubernetes 192.168.39.162:8443 67s\n"} +{"Time":"2023-05-31T19:39:00.145526007Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default endpoints/netcat 10.244.4.195:8080 17s\n"} +{"Time":"2023-05-31T19:39:00.145529395Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 51s\n"} +{"Time":"2023-05-31T19:39:00.14553283Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system endpoints/kube-dns 10.244.4.194:53,10.244.4.194:53,10.244.4.194:9153 53s\n"} +{"Time":"2023-05-31T19:39:00.145535928Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145539566Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:39:00.145543456Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system daemonset.apps/calico-node 1 1 1 1 1 kubernetes.io/os=linux 64s calico-node docker.io/calico/node:v3.25.1 k8s-app=calico-node\n"} +{"Time":"2023-05-31T19:39:00.145546965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 66s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.145550155Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145554035Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:39:00.145557542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default deployment.apps/netcat 1/1 1 1 17s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T19:39:00.145560988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system deployment.apps/calico-kube-controllers 1/1 1 1 64s calico-kube-controllers docker.io/calico/kube-controllers:v3.25.1 k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.145564811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system deployment.apps/coredns 1/1 1 1 66s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:00.145568281Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145571436Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T19:39:00.145575033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default pod/netcat-7458db8b8-8ml56 1/1 Running 0 17s 10.244.4.195 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.14557955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/calico-kube-controllers-674fff74c8-q5hvv 1/1 Running 0 53s 10.244.4.193 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145583258Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/calico-node-pxmfk 1/1 Running 0 53s 192.168.39.162 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145587107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/coredns-5d78c9869d-n2w2j 1/1 Running 0 53s 10.244.4.194 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.14559104Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/etcd-calico-509041 1/1 Running 0 65s 192.168.39.162 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145596445Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/kube-apiserver-calico-509041 1/1 Running 0 68s 192.168.39.162 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145600339Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/kube-controller-manager-calico-509041 1/1 Running 0 65s 192.168.39.162 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145604088Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/kube-proxy-55wvc 1/1 Running 0 53s 192.168.39.162 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145609343Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/kube-scheduler-calico-509041 1/1 Running 0 65s 192.168.39.162 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145613735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-system pod/storage-provisioner 1/1 Running 0 51s 192.168.39.162 calico-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145617256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145620097Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145622977Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:39:00.145626687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T19:39:00.14563083Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 32ba7aafc4708 17 seconds ago Ready netcat-7458db8b8-8ml56 default 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145637615Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" e85421578c158 30 seconds ago Ready coredns-5d78c9869d-n2w2j kube-system 1 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145641218Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 81f715d37c79c 30 seconds ago Ready calico-kube-controllers-674fff74c8-q5hvv kube-system 1 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145644866Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 121f3f1288aee 45 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145649185Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 3d1cabfc40881 51 seconds ago Ready kube-proxy-55wvc kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145652554Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8dfaaf3238a5f 53 seconds ago Ready calico-node-pxmfk kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145655996Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 743d6eefe804c About a minute ago Ready kube-apiserver-calico-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145659747Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" e545f3a87023f About a minute ago Ready kube-scheduler-calico-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145663049Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" db2af4a2298b9 About a minute ago Ready kube-controller-manager-calico-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145666702Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 2bfdef4e5bf4e About a minute ago Ready etcd-calico-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:00.145669994Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145673203Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145676619Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:39:00.145679815Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\r\n"} +{"Time":"2023-05-31T19:39:00.1456825Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" d5cf5ebfea258 28081458d86cc 13 seconds ago Running dnsutils 0 32ba7aafc4708\r\n"} +{"Time":"2023-05-31T19:39:00.145685823Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 4fa4ddfb09c3c 212faac284a2e 27 seconds ago Running calico-kube-controllers 0 81f715d37c79c\r\n"} +{"Time":"2023-05-31T19:39:00.145689119Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1eb824f2fc170 ead0a4a53df89 29 seconds ago Running coredns 0 e85421578c158\r\n"} +{"Time":"2023-05-31T19:39:00.145692369Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 364dda37b2372 cae61b85e9b45 39 seconds ago Running calico-node 0 8dfaaf3238a5f\r\n"} +{"Time":"2023-05-31T19:39:00.145695591Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 77a270f043e8d cae61b85e9b45 40 seconds ago Exited mount-bpffs 0 8dfaaf3238a5f\r\n"} +{"Time":"2023-05-31T19:39:00.145698774Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 2fa143f049348 6e38f40d628db 45 seconds ago Running storage-provisioner 0 121f3f1288aee\r\n"} +{"Time":"2023-05-31T19:39:00.145701924Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 23bc0bdc96c55 a0138614e6094 47 seconds ago Exited install-cni 0 8dfaaf3238a5f\r\n"} +{"Time":"2023-05-31T19:39:00.145704937Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 87210b3744a58 a0138614e6094 48 seconds ago Exited upgrade-ipam 0 8dfaaf3238a5f\r\n"} +{"Time":"2023-05-31T19:39:00.145708098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bb3683e651982 b8aa50768fd67 51 seconds ago Running kube-proxy 0 3d1cabfc40881\r\n"} +{"Time":"2023-05-31T19:39:00.145711429Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 048da87379559 89e70da428d29 About a minute ago Running kube-scheduler 0 e545f3a87023f\r\n"} +{"Time":"2023-05-31T19:39:00.145715022Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" c6f0d86743aad ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 db2af4a2298b9\r\n"} +{"Time":"2023-05-31T19:39:00.145718857Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ac7573ea39b4f 86b6af7dd652c About a minute ago Running etcd 0 2bfdef4e5bf4e\r\n"} +{"Time":"2023-05-31T19:39:00.145723033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" c2aa5a256dc5d c5b13e4f7806d About a minute ago Running kube-apiserver 0 743d6eefe804c\r\n"} +{"Time":"2023-05-31T19:39:00.14572626Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145729219Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145732249Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:39:00.145735291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: netcat\n"} +{"Time":"2023-05-31T19:39:00.145738726Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:39:00.145742008Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CreationTimestamp: Wed, 31 May 2023 19:38:34 +0000\n"} +{"Time":"2023-05-31T19:39:00.145745416Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:39:00.145748979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:39:00.145752492Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T19:39:00.145755971Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:39:00.145759783Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:39:00.145764508Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:39:00.145767617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:39:00.145770883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:00.145773853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:39:00.145776803Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.145779951Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:39:00.145782953Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:39:00.145789089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145792386Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145795819Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.145798716Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:39:00.145801462Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -c\n"} +{"Time":"2023-05-31T19:39:00.145804506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:39:00.145808885Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145812406Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145815139Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145817987Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.145821038Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:39:00.145824472Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:39:00.145827397Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:39:00.145830634Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:39:00.145833749Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145837006Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:39:00.145840051Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.145842899Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.145846158Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.145849109Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal ScalingReplicaSet 18s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T19:39:00.145852043Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145854635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.145857674Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:39:00.14586081Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: netcat-7458db8b8-8ml56\n"} +{"Time":"2023-05-31T19:39:00.145863861Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:39:00.145867165Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 0\n"} +{"Time":"2023-05-31T19:39:00.145870272Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: default\n"} +{"Time":"2023-05-31T19:39:00.145873247Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-509041/192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.14587645Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 19:38:34 +0000\n"} +{"Time":"2023-05-31T19:39:00.145879694Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:39:00.145883091Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T19:39:00.145887583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: cni.projectcalico.org/containerID: 32ba7aafc47083874d7c12ee55402fc690383bd073f011c0195d7af95d9a219b\n"} +{"Time":"2023-05-31T19:39:00.145891194Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIP: 10.244.4.195/32\n"} +{"Time":"2023-05-31T19:39:00.145894449Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIPs: 10.244.4.195/32\n"} +{"Time":"2023-05-31T19:39:00.145897739Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:00.145901041Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.4.195\n"} +{"Time":"2023-05-31T19:39:00.145904016Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:00.14590705Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.4.195\n"} +{"Time":"2023-05-31T19:39:00.14591023Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T19:39:00.145913429Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.145916608Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:39:00.145919801Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://d5cf5ebfea258e77826cde81d5f6d2eb88fd356547a712092f2a782e773513bb\n"} +{"Time":"2023-05-31T19:39:00.145923378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:39:00.145926864Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T19:39:00.145930708Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145934032Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145937296Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.14594056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:39:00.145943549Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -c\n"} +{"Time":"2023-05-31T19:39:00.145946547Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:39:00.145949888Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:00.145954718Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:38:38 +0000\n"} +{"Time":"2023-05-31T19:39:00.145958167Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.145961248Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.145964453Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.145967806Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.145971175Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-rgkzc (ro)\n"} +{"Time":"2023-05-31T19:39:00.145974372Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.145985451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:00.145988665Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:00.145991726Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:00.145994658Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:00.145997388Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:00.14600069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.146003571Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-rgkzc:\n"} +{"Time":"2023-05-31T19:39:00.146015715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:00.146019123Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:00.146022278Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.146025476Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:00.146028682Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:00.146031915Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:39:00.146035073Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.146038446Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:00.146050643Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:00.146054311Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.146057419Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.146062895Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.146066504Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 18s default-scheduler Successfully assigned default/netcat-7458db8b8-8ml56 to calico-509041\n"} +{"Time":"2023-05-31T19:39:00.146070143Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulling 17s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T19:39:00.146075762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 14s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 2.96064124s (2.96064889s including waiting)\n"} +{"Time":"2023-05-31T19:39:00.146079625Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 14s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T19:39:00.146083266Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 14s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T19:39:00.146086382Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146089628Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146094906Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:39:00.146097988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146101181Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146104263Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:39:00.146107921Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:39:00.146111009Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.146114285Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CreationTimestamp: Wed, 31 May 2023 19:37:45 +0000\n"} +{"Time":"2023-05-31T19:39:00.146117764Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:00.146121297Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:39:00.146124079Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:00.146127305Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:39:00.146130275Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:39:00.146133578Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:39:00.146136728Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:39:00.146139835Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:00.146142981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:00.146145861Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:39:00.146148516Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.146151903Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" coredns:\n"} +{"Time":"2023-05-31T19:39:00.146156441Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:39:00.146160128Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:39:00.146163495Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:39:00.146166435Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:00.146170508Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -conf\n"} +{"Time":"2023-05-31T19:39:00.146173788Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:39:00.146176905Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Limits:\n"} +{"Time":"2023-05-31T19:39:00.146180103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:39:00.14618316Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:00.146186318Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:39:00.146189742Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:39:00.14619321Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:39:00.146196618Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:00.14620195Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.146205061Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.146208542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:39:00.146211597Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.146214991Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:39:00.146218074Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:00.14622126Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:39:00.146224594Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:00.146227595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:39:00.146230627Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.146233707Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:39:00.146236725Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:39:00.146240414Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:39:00.146243884Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:39:00.146246884Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.146250121Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:39:00.146252888Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.146255837Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.146259056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.146262345Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal ScalingReplicaSet 54s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T19:39:00.146265309Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal ScalingReplicaSet 54s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T19:39:00.146268102Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146270881Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146273452Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:39:00.146276374Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: coredns-5d78c9869d-n2w2j\n"} +{"Time":"2023-05-31T19:39:00.146279364Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.146282466Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T19:39:00.146285769Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:39:00.146288883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:39:00.146292003Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-509041/192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.146295329Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 19:38:05 +0000\n"} +{"Time":"2023-05-31T19:39:00.146298361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:00.146301811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T19:39:00.146305286Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: cni.projectcalico.org/containerID: e85421578c158884ac4dcd35ad191f357a3fd51be86b35d40cb9102a519d8dac\n"} +{"Time":"2023-05-31T19:39:00.146309916Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIP: 10.244.4.194/32\n"} +{"Time":"2023-05-31T19:39:00.146313688Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIPs: 10.244.4.194/32\n"} +{"Time":"2023-05-31T19:39:00.146318578Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:00.146322851Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.4.194\n"} +{"Time":"2023-05-31T19:39:00.146326114Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:00.146329451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.4.194\n"} +{"Time":"2023-05-31T19:39:00.146332661Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T19:39:00.146335485Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.146338558Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" coredns:\n"} +{"Time":"2023-05-31T19:39:00.146341721Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://1eb824f2fc1708b49cad9cfe484b4a0ff26ae7f0d93b10f6cca179e687f57256\n"} +{"Time":"2023-05-31T19:39:00.146349946Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:39:00.146354351Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T19:39:00.146357823Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:39:00.146360859Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:39:00.146365657Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:00.146368883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -conf\n"} +{"Time":"2023-05-31T19:39:00.146371949Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:39:00.146375373Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:00.146378795Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:38:22 +0000\n"} +{"Time":"2023-05-31T19:39:00.146382054Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.146385402Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.146388942Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Limits:\n"} +{"Time":"2023-05-31T19:39:00.146392145Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:39:00.14639554Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:00.146398829Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:39:00.146402301Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:39:00.14640557Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:39:00.146409351Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:00.146412411Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.146415902Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.146419144Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:39:00.146422563Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-ck9ct (ro)\n"} +{"Time":"2023-05-31T19:39:00.146425978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.146429096Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:00.14643226Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:00.146435595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:00.146438472Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:00.146441454Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:00.146444788Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.146447742Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:39:00.146451273Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:00.146454537Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:39:00.146459969Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:00.146463144Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-ck9ct:\n"} +{"Time":"2023-05-31T19:39:00.146466379Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:00.14646956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:00.146472756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.146476111Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:00.146479243Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:00.14648234Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:39:00.146485669Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:00.146489454Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:39:00.146495251Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T19:39:00.146499034Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:00.14650363Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:00.146506811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.146511792Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.146517094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.146520943Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedScheduling 54s default-scheduler 0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..\n"} +{"Time":"2023-05-31T19:39:00.146527069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 47s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-n2w2j to calico-509041\n"} +{"Time":"2023-05-31T19:39:00.146531206Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 46s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to setup network for sandbox \"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T19:39:00.146535956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal SandboxChanged 31s (x2 over 46s) kubelet Pod sandbox changed, it will be killed and re-created.\n"} +{"Time":"2023-05-31T19:39:00.146539526Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 30s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T19:39:00.146543175Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 30s kubelet Created container coredns\n"} +{"Time":"2023-05-31T19:39:00.146546823Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 30s kubelet Started container coredns\n"} +{"Time":"2023-05-31T19:39:00.146550376Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning Unhealthy 30s kubelet Readiness probe failed: HTTP probe failed with statuscode: 503\n"} +{"Time":"2023-05-31T19:39:00.146554074Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146557387Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146560265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:39:00.146563757Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:39:00.146567463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" .:53\n"} +{"Time":"2023-05-31T19:39:00.146571265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] plugin/reload: Running configuration SHA512 = 6c8bd46af3d98e03c4ae8e438c65dd0c69a5f817565481bcf1725dd66ff794963b7938c81e3a23d4c2ad9e52f818076e819219c79e8007dd90564767ed68ba4c\n"} +{"Time":"2023-05-31T19:39:00.146576365Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T19:39:00.146579733Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T19:39:00.146583432Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 127.0.0.1:43667 - 62081 \"HINFO IN 5179176652540040874.187563756985946796. udp 56 false 512\" NXDOMAIN qr,rd,ra 56 0.02752839s\n"} +{"Time":"2023-05-31T19:39:00.146587463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.4.195:50850 - 48310 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000411635s\n"} +{"Time":"2023-05-31T19:39:00.146591006Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.4.195:52165 - 4501 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000179913s\n"} +{"Time":"2023-05-31T19:39:00.146595108Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.4.195:56005 - 59571 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000102493s\n"} +{"Time":"2023-05-31T19:39:00.146599319Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.4.195:48294 - 7985 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000178517s\n"} +{"Time":"2023-05-31T19:39:00.146603179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.4.195:48294 - 7358 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000130477s\n"} +{"Time":"2023-05-31T19:39:00.146606844Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.4.195:53946 - 53070 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000197751s\n"} +{"Time":"2023-05-31T19:39:00.146610493Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.4.195:36890 - 19235 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000125037s\n"} +{"Time":"2023-05-31T19:39:00.14661437Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [INFO] 10.244.4.195:56654 - 28523 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000080359s\n"} +{"Time":"2023-05-31T19:39:00.146618065Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146621029Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146625715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:39:00.146629392Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-apiserver-calico-509041\n"} +{"Time":"2023-05-31T19:39:00.14663261Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.146637094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:39:00.146640483Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:00.146643722Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-509041/192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.14664692Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 19:37:46 +0000\n"} +{"Time":"2023-05-31T19:39:00.146649976Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T19:39:00.14665352Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T19:39:00.146656813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.39.162:8443\n"} +{"Time":"2023-05-31T19:39:00.146660486Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/config.hash: 9178776881b95e8226c611372f50adb2\n"} +{"Time":"2023-05-31T19:39:00.146663876Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/config.mirror: 9178776881b95e8226c611372f50adb2\n"} +{"Time":"2023-05-31T19:39:00.14666736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/config.seen: 2023-05-31T19:37:37.736270122Z\n"} +{"Time":"2023-05-31T19:39:00.146670597Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T19:39:00.146673803Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:00.146676809Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SeccompProfile: RuntimeDefault\n"} +{"Time":"2023-05-31T19:39:00.146679904Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.14668277Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:00.146685703Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.146688624Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: Node/calico-509041\n"} +{"Time":"2023-05-31T19:39:00.146692698Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.146695941Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T19:39:00.14669917Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://c2aa5a256dc5da5a2474ef07ee77e8555c5e1ce2b320fd07e6495fe9bd6e9f49\n"} +{"Time":"2023-05-31T19:39:00.146702904Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T19:39:00.146706619Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T19:39:00.146711271Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.146715336Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.14671841Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.146721462Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T19:39:00.146724673Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --advertise-address=192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.146727936Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T19:39:00.146731422Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T19:39:00.146734599Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:39:00.146738046Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:39:00.14674122Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T19:39:00.14674348Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T19:39:00.146745886Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T19:39:00.146748246Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T19:39:00.146750633Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T19:39:00.146752799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T19:39:00.146754975Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T19:39:00.146757497Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T19:39:00.146759879Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T19:39:00.146761958Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T19:39:00.146764037Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T19:39:00.146766233Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.146768363Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T19:39:00.146770683Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T19:39:00.146773799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T19:39:00.146775758Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T19:39:00.146777746Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:39:00.146779741Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T19:39:00.146782763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T19:39:00.146784964Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T19:39:00.146786954Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T19:39:00.146788995Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T19:39:00.146791195Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:00.146794234Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:37:39 +0000\n"} +{"Time":"2023-05-31T19:39:00.146797278Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.146800333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.146803333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:00.146806616Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:39:00.146809899Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: http-get https://192.168.39.162:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T19:39:00.146813325Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: http-get https://192.168.39.162:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:00.146819083Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Startup: http-get https://192.168.39.162:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T19:39:00.146821995Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.146825482Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.146828925Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T19:39:00.146832355Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T19:39:00.14683577Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T19:39:00.146839085Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.146843857Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:00.146846411Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:00.146848388Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:00.146850377Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:00.146852389Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:00.14685451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.146856634Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca-certs:\n"} +{"Time":"2023-05-31T19:39:00.146858617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.146860569Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:39:00.146862565Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:00.146864736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T19:39:00.146866619Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.146868689Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:39:00.146870724Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:00.146872991Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T19:39:00.146874994Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.146876926Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T19:39:00.146878857Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:00.146880783Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:39:00.146882703Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.146885186Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:00.146888299Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.146891421Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.1468968Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.146900162Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 74s kubelet Container image \"registry.k8s.io/kube-apiserver:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:39:00.146904123Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 73s kubelet Created container kube-apiserver\n"} +{"Time":"2023-05-31T19:39:00.146907242Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 73s kubelet Started container kube-apiserver\n"} +{"Time":"2023-05-31T19:39:00.146910543Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146913771Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.146917053Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:39:00.146920427Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:39.908052 1 server.go:551] external host was not specified, using 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.146923805Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:39.909519 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T19:39:00.146927129Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:39.909632 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:39:00.146930938Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:40.329453 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T19:39:00.146934715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:40.339575 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T19:39:00.146939303Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:40.340058 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T19:39:00.146941959Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:40.377739 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.146957983Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:40.378140 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.14696076Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:40.387055 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T19:39:00.146962954Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:40.742803 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.146965213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:40.751349 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:39:00.146968468Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.359265 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:39:00.146973248Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.379492 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.146982085Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.379534 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.146987282Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.379541 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.146991378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.383889 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.146995212Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.383941 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.146999089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.388440 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147002798Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.389446 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147006361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.389493 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147009989Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.389500 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147014723Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.397052 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147018423Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.397092 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147022031Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.399451 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147025639Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.399497 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147029479Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.399504 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147033165Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.401689 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147036777Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.401739 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147040404Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.426456 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147157039Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.446109 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147161851Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.467537 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147165638Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.470897 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147169317Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.471097 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147172894Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.476661 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147176378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.476767 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147180395Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.476789 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147184257Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.483253 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147188137Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.483469 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147191761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.490585 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147195728Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.490809 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.14719979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.490927 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147203559Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.492931 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147207114Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.497017 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147210775Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.497237 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147214265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.500571 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147218172Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.503014 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147316257Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.503129 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147320749Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.507709 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147324571Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.509051 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147328274Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.511018 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147331991Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.511237 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147336091Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.519235 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147339912Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.519277 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147343509Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.519283 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147347072Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.521778 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147350605Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.521828 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147354215Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.521836 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147358073Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.526067 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.14736154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.526104 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147365092Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:41.543077 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.147368896Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:41.543120 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:00.147372597Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.324617 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:39:00.147472291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.324946 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:39:00.147476879Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.325719 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T19:39:00.147480799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.327233 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T19:39:00.147484075Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.327393 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T19:39:00.147487529Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.344212 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:39:00.147490956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.344577 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T19:39:00.147494462Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.344664 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T19:39:00.147499763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.345200 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T19:39:00.147503946Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.345820 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T19:39:00.147508009Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.345893 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:39:00.147511967Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.345926 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T19:39:00.147515466Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.346139 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T19:39:00.147536364Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.346340 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T19:39:00.147543058Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.346766 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T19:39:00.147546853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.346856 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:39:00.147550642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.347057 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T19:39:00.147554306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.347128 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T19:39:00.147661599Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.347157 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T19:39:00.147666014Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.347409 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:39:00.147669786Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.347740 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T19:39:00.147674002Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.347821 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:39:00.147677778Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.348331 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T19:39:00.147681972Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.348445 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T19:39:00.147685565Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.352634 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T19:39:00.147689016Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.352749 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T19:39:00.147692729Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.352834 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T19:39:00.147696248Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.352892 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T19:39:00.147699878Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.352918 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T19:39:00.147703602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.353071 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T19:39:00.147707146Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.353095 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T19:39:00.147710647Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.353171 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T19:39:00.147714224Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.353216 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T19:39:00.147723927Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.353512 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:39:00.147727912Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.353704 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:39:00.147731659Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.449246 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:39:00.147900288Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.453791 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T19:39:00.147904108Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" E0531 19:37:42.512615 1 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"namespaces \\\"kube-system\\\" not found\" interval=\"200ms\"\n"} +{"Time":"2023-05-31T19:39:00.147906843Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.530496 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T19:39:00.14790913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.545303 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T19:39:00.147911517Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.546042 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:39:00.147915045Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.546228 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T19:39:00.147918641Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.546361 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T19:39:00.147922498Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.547185 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T19:39:00.147926137Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.547921 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:39:00.147930012Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.549277 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T19:39:00.147934119Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:42.723938 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.147937914Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:43.062843 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T19:39:00.147941775Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:43.350364 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T19:39:00.147945481Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:43.355859 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T19:39:00.147949135Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:43.355897 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T19:39:00.147952811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:43.971485 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.147957807Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:44.018522 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.148152115Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:44.172227 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T19:39:00.14815554Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" W0531 19:37:44.180139 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.39.162]\n"} +{"Time":"2023-05-31T19:39:00.148158126Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:44.181529 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T19:39:00.148161685Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:44.187076 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.148165219Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:44.430185 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T19:39:00.148168726Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:45.628840 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T19:39:00.14817245Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:45.642328 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T19:39:00.148180069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:45.655664 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T19:39:00.148183653Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.058099 1 controller.go:624] quota admission added evaluator for: poddisruptionbudgets.policy\n"} +{"Time":"2023-05-31T19:39:00.148188314Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.168259 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148192134Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.170770 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148195777Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.182291 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148199529Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.189563 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148203027Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.193559 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148206467Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.211520 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148209972Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.222497 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148213476Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.231765 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148382511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.240154 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148387124Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.300593 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148390855Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.322330 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148393999Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.351135 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148396177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.360857 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148398254Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.390632 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.14840069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.407923 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148402917Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.439102 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148406277Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.453020 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148410141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.468074 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148413715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.477645 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148417194Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.485704 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148420756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.497277 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148424654Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.498633 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148428124Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.502713 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148431532Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.510081 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.14843511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.512571 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148657357Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.517599 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148663315Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.524163 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148667199Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.530512 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148670256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.547769 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148673718Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.550338 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148676831Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.561481 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148682415Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.570235 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148686094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.574046 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148689928Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.580168 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148693403Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.582440 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148696552Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.583480 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148700151Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.596252 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148703464Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.600719 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148707265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.611043 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148710805Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.615620 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.14871463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.631779 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.14871817Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.660175 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148907978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.694531 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.14892757Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.732696 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148931708Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.733220 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148935275Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.748767 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.148938992Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.784860 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.14894265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:47.801204 1 handler.go:232] Adding GroupVersion crd.projectcalico.org v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:00.14894779Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:56.530074 1 trace.go:219] Trace[1702151295]: \"Patch\" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:04ec7c83-3527-4b05-8d82-45283f973476,client:192.168.39.162,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/kube-system/pods/kube-apiserver-calico-509041/status,user-agent:kubelet/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:PATCH (31-May-2023 19:37:55.911) (total time: 618ms):\n"} +{"Time":"2023-05-31T19:39:00.148952765Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[1702151295]: [\"GuaranteedUpdate etcd3\" audit-id:04ec7c83-3527-4b05-8d82-45283f973476,key:/pods/kube-system/kube-apiserver-calico-509041,type:*core.Pod,resource:pods 618ms (19:37:55.911)\n"} +{"Time":"2023-05-31T19:39:00.148957337Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[1702151295]: ---\"Txn call completed\" 614ms (19:37:56.528)]\n"} +{"Time":"2023-05-31T19:39:00.148961433Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[1702151295]: ---\"Object stored in database\" 614ms (19:37:56.528)\n"} +{"Time":"2023-05-31T19:39:00.14896519Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[1702151295]: [618.27466ms] [618.27466ms] END\n"} +{"Time":"2023-05-31T19:39:00.148969531Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:56.896430 1 trace.go:219] Trace[944393283]: \"Patch\" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:5860f004-4908-47be-b107-d9dc438ccecd,client:192.168.39.162,protocol:HTTP/2.0,resource:nodes,scope:resource,url:/api/v1/nodes/calico-509041/status,user-agent:kubelet/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:PATCH (31-May-2023 19:37:56.080) (total time: 815ms):\n"} +{"Time":"2023-05-31T19:39:00.148974077Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[944393283]: [\"GuaranteedUpdate etcd3\" audit-id:5860f004-4908-47be-b107-d9dc438ccecd,key:/minions/calico-509041,type:*core.Node,resource:nodes 815ms (19:37:56.081)\n"} +{"Time":"2023-05-31T19:39:00.148983037Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[944393283]: ---\"Txn call completed\" 808ms (19:37:56.894)]\n"} +{"Time":"2023-05-31T19:39:00.148986685Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[944393283]: ---\"Object stored in database\" 809ms (19:37:56.894)\n"} +{"Time":"2023-05-31T19:39:00.149067441Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[944393283]: [815.735725ms] [815.735725ms] END\n"} +{"Time":"2023-05-31T19:39:00.149072427Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:56.897828 1 trace.go:219] Trace[1663090234]: \"Get\" accept:application/json;as=Table;v=v1;g=meta.k8s.io,application/json;as=Table;v=v1beta1;g=meta.k8s.io,application/json,audit-id:82615edb-37e3-4f92-a1f6-7701dd56f665,client:127.0.0.1,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/default/serviceaccounts/default,user-agent:kubectl/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:GET (31-May-2023 19:37:56.168) (total time: 729ms):\n"} +{"Time":"2023-05-31T19:39:00.149077103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[1663090234]: [729.124318ms] [729.124318ms] END\n"} +{"Time":"2023-05-31T19:39:00.149081344Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:56.898732 1 trace.go:219] Trace[714757605]: \"Update\" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:c6773e0e-90ce-4eba-9ca4-1334f8b164cb,client:192.168.39.162,protocol:HTTP/2.0,resource:leases,scope:resource,url:/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/calico-509041,user-agent:kubelet/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:PUT (31-May-2023 19:37:56.191) (total time: 707ms):\n"} +{"Time":"2023-05-31T19:39:00.149086445Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[714757605]: [\"GuaranteedUpdate etcd3\" audit-id:c6773e0e-90ce-4eba-9ca4-1334f8b164cb,key:/leases/kube-node-lease/calico-509041,type:*coordination.Lease,resource:leases.coordination.k8s.io 707ms (19:37:56.191)\n"} +{"Time":"2023-05-31T19:39:00.149090561Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[714757605]: ---\"Txn call completed\" 706ms (19:37:56.898)]\n"} +{"Time":"2023-05-31T19:39:00.149094307Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Trace[714757605]: [707.175242ms] [707.175242ms] END\n"} +{"Time":"2023-05-31T19:39:00.149097173Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:58.149549 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T19:39:00.149099587Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:37:58.277457 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T19:39:00.149102553Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:34.261586 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.104.238.174]\n"} +{"Time":"2023-05-31T19:39:00.149106823Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" E0531 19:38:44.849330 1 upgradeaware.go:426] Error proxying data from client to backend: read tcp 192.168.39.162:8443-\u003e192.168.39.1:46900: read: connection reset by peer\n"} +{"Time":"2023-05-31T19:39:00.149110675Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.149114021Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.14911754Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:39:00.149121611Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/cni/net.d/10-calico.conflist\r\n"} +{"Time":"2023-05-31T19:39:00.149125476Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.149216691Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"name\": \"k8s-pod-network\",\r\n"} +{"Time":"2023-05-31T19:39:00.149221613Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T19:39:00.149225394Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:39:00.149229018Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.1492323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"calico\",\r\n"} +{"Time":"2023-05-31T19:39:00.149235818Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log_level\": \"info\",\r\n"} +{"Time":"2023-05-31T19:39:00.149239372Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log_file_path\": \"/var/log/calico/cni/cni.log\",\r\n"} +{"Time":"2023-05-31T19:39:00.1492428Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"datastore_type\": \"kubernetes\",\r\n"} +{"Time":"2023-05-31T19:39:00.149246272Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"nodename\": \"calico-509041\",\r\n"} +{"Time":"2023-05-31T19:39:00.149249707Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"mtu\": 0,\r\n"} +{"Time":"2023-05-31T19:39:00.149253136Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:39:00.149256345Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"calico-ipam\"\r\n"} +{"Time":"2023-05-31T19:39:00.149260096Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:00.149262794Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"policy\": {\r\n"} +{"Time":"2023-05-31T19:39:00.149264886Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"k8s\"\r\n"} +{"Time":"2023-05-31T19:39:00.149266926Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:00.149268835Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"kubernetes\": {\r\n"} +{"Time":"2023-05-31T19:39:00.149273813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"kubeconfig\": \"/etc/cni/net.d/calico-kubeconfig\"\r\n"} +{"Time":"2023-05-31T19:39:00.149277288Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:00.149280306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:00.149283428Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.14928686Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:39:00.149290196Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"snat\": true,\r\n"} +{"Time":"2023-05-31T19:39:00.149293506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\"portMappings\": true}\r\n"} +{"Time":"2023-05-31T19:39:00.149296853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:00.149299983Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.149303075Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"bandwidth\",\r\n"} +{"Time":"2023-05-31T19:39:00.149429654Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\"bandwidth\": true}\r\n"} +{"Time":"2023-05-31T19:39:00.149432856Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:00.149436096Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.149438321Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }/etc/cni/net.d/calico-kubeconfig\r\n"} +{"Time":"2023-05-31T19:39:00.149441243Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kubeconfig file for Calico CNI plugin. Installed by calico/node.\r\n"} +{"Time":"2023-05-31T19:39:00.149444676Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T19:39:00.149448283Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T19:39:00.149451703Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\r\n"} +{"Time":"2023-05-31T19:39:00.149455116Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: local\r\n"} +{"Time":"2023-05-31T19:39:00.149458489Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster:\r\n"} +{"Time":"2023-05-31T19:39:00.149461912Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://10.96.0.1:443\r\n"} +{"Time":"2023-05-31T19:39:00.149468033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority-data: \"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"} +{"Time":"2023-05-31T19:39:00.149473801Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"pUjY3QwpBNXcxQzg2MWNYMVV6MlN5WlNjT05GeG9mNmRSWTB6T2ZrQ0gzNDJPS1pEQnhOcmZmOGNkL3kwMUE4RmZYQXlHCmNkeDFJM3lQREJ1OHIzOW82eSt4c0FpRGNSSnMyUmY3UU5BTWV2MEszbm8zQlpoc1loeDdNNXllZ2hNemdxTW4KUU50bnY3T2lYTllMVFpRZDd6dSs5Y3NNbXRnNDBLUU9DWUQyTG1jMkpOWHRSNjcyT013eGpkRG5hNVpGZlZSMgpEcXR6SFRlTFZrSXhIUi9UT0hoQ09xSm0yMHF6dEVjRVd2d3hXcm1rdk5QNkFURnVHck1UVlVRRjBybFQrMDNwCnluUHdmdFRZbXJjOEVwWDUzUmVaUlVHWHZEM1N4QnlKWFdySGEzNFJhQURGaGEvdnJMZTN3ZEppNVlLRFZrVWIKN0NnQkFieU9VWXM1cmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\"\r\n"} +{"Time":"2023-05-31T19:39:00.149478069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users:\r\n"} +{"Time":"2023-05-31T19:39:00.149481403Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: calico\r\n"} +{"Time":"2023-05-31T19:39:00.149484619Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\r\n"} +{"Time":"2023-05-31T19:39:00.149491188Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" token: eyJhbGciOiJSUzI1NiIsImtpZCI6InNlY2ZIODZ6Yjl5enJDazlCUVdZY1FvX0lCU19pUGJEWl9jZVVqR2RCbkkifQ.eyJhdWQiOlsiaHR0cHM6Ly9rdWJlcm5ldGVzLmRlZmF1bHQuc3ZjLmNsdXN0ZXIubG9jYWwiXSwiZXhwIjoxNjg1NjQ4Mjk1LCJpYXQiOjE2ODU1NjE4OTUsImlzcyI6Imh0dHBzOi8va3ViZXJuZXRlcy5kZWZhdWx0LnN2Yy5jbHVzdGVyLmxvY2FsIiwia3ViZXJuZXRlcy5pbyI6eyJuYW1lc3BhY2UiOiJrdWJlLXN5c3RlbSIsInNlcnZpY2VhY2NvdW50Ijp7Im5hbWUiOiJjYWxpY28tbm9kZSIsInVpZCI6ImQyZDM2YjgyLTE3ZGUtNDAyNC1iM2EzLWI4OWY5MzA4ZDk4YyJ9fSwibmJmIjoxNjg1NTYxODk1LCJzdWIiOiJzeXN0ZW06c2VydmljZWFjY291bnQ6a3ViZS1zeXN0ZW06Y2FsaWNvLW5vZGUifQ.qEirTClnIW6JSQ-K3pWAq71Df8znLlzx78DvM1UnK7xYj-h0q6YNXpy7vpzEhw46D8yiEcP0pcpg38X1jlrgLb1-e7RwpOvS98oWbcGQ4IPGEsAC8yvdj8Dx2Oj7WtEfLSJy_N_6KYdn3Cic-ywigyek9bX0QjO97RJjhuY7C5l1uEjF6NzCUoOngTEHSEX0wMmwrg-RzBHfi5f3kDQ6OnnEUdy_89uJkKFAlpXylAg6HJ9KHszMEwNLEKLTRkoOVB-vup7M0f1d2vATKx3NxqSp--xVeN6nQNKAk7tCIz_vGP7dLfYK3bkZQWUN2kdzs2Skp_m_k2fkVbFwbHQvYA\r\n"} +{"Time":"2023-05-31T19:39:00.149650028Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts:\r\n"} +{"Time":"2023-05-31T19:39:00.149654253Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: calico-context\r\n"} +{"Time":"2023-05-31T19:39:00.149657576Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" context:\r\n"} +{"Time":"2023-05-31T19:39:00.149660845Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: local\r\n"} +{"Time":"2023-05-31T19:39:00.149664068Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: calico\r\n"} +{"Time":"2023-05-31T19:39:00.149667531Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: calico-context/etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T19:39:00.149670737Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.14967394Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T19:39:00.149677045Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T19:39:00.149679562Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:39:00.149681687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.149683741Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:39:00.149685891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T19:39:00.149688079Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T19:39:00.149690103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:39:00.149692251Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:39:00.149694235Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:39:00.149696451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:39:00.149698743Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T19:39:00.149700985Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T19:39:00.149703083Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [\r\n"} +{"Time":"2023-05-31T19:39:00.149805756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.14980892Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T19:39:00.149811236Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T19:39:00.149813449Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:00.149815704Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.149817719Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.149819678Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:00.14982159Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:00.149823519Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.149825545Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:39:00.149827601Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:39:00.149829574Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:39:00.149831635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:00.149833893Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:00.14983581Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.149837937Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T19:39:00.149840129Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:00.149842098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.149844065Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T19:39:00.149846059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:00.149848324Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.149850349Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:00.149852313Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/cni/net.d/.keep\r\n"} +{"Time":"2023-05-31T19:39:00.149855733Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.149858728Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.149861713Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:39:00.149865025Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:00.149868502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T19:39:00.149961467Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T19:39:00.149964872Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:39:00.14996711Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 2: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:00.149970104Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether 52:54:00:83:bb:0e brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:39:00.149972362Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" inet 192.168.39.162/24 brd 192.168.39.255 scope global dynamic eth0\r\n"} +{"Time":"2023-05-31T19:39:00.149974422Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" valid_lft 3497sec preferred_lft 3497sec\r\n"} +{"Time":"2023-05-31T19:39:00.149980052Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 3: eth1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:00.149982502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether 52:54:00:d4:bc:52 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:39:00.149984642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" inet 192.168.122.243/24 brd 192.168.122.255 scope global dynamic eth1\r\n"} +{"Time":"2023-05-31T19:39:00.14998682Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" valid_lft 3497sec preferred_lft 3497sec\r\n"} +{"Time":"2023-05-31T19:39:00.149988968Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 4: sit0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:00.149991223Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/sit 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T19:39:00.149993392Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 5: tunl0@NONE: \u003cNOARP,UP,LOWER_UP\u003e mtu 1480 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:00.149995773Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ipip 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T19:39:00.149997778Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" inet 10.244.4.192/32 scope global tunl0\r\n"} +{"Time":"2023-05-31T19:39:00.149999916Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:39:00.150002084Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8: calide818fac7cd@if5: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1480 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T19:39:00.150004315Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether ee:ee:ee:ee:ee:ee brd ff:ff:ff:ff:ff:ff link-netns cni-647fc391-87be-928c-2b0b-ebe1ad612303\r\n"} +{"Time":"2023-05-31T19:39:00.150006484Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 9: cali58684b1dc6d@if5: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1480 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T19:39:00.150008729Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether ee:ee:ee:ee:ee:ee brd ff:ff:ff:ff:ff:ff link-netns cni-61608fe1-3bf7-ea55-b0de-9aa225d66cc1\r\n"} +{"Time":"2023-05-31T19:39:00.150112343Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10: cali8c2aea08bab@if5: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1480 qdisc noqueue state UP group default \r\n"} +{"Time":"2023-05-31T19:39:00.150115793Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" link/ether ee:ee:ee:ee:ee:ee brd ff:ff:ff:ff:ff:ff link-netns cni-4953c6d3-9d9d-5a59-dff1-d033ccfcda2a\r\n"} +{"Time":"2023-05-31T19:39:00.150118175Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.150120137Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.150122095Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:39:00.150124495Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default via 192.168.122.1 dev eth1 proto dhcp src 192.168.122.243 metric 1024 \r\n"} +{"Time":"2023-05-31T19:39:00.150126546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" blackhole 10.244.4.192/26 proto bird \r\n"} +{"Time":"2023-05-31T19:39:00.150128534Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.244.4.193 dev calide818fac7cd scope link \r\n"} +{"Time":"2023-05-31T19:39:00.150130546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.244.4.194 dev cali58684b1dc6d scope link \r\n"} +{"Time":"2023-05-31T19:39:00.150132549Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 10.244.4.195 dev cali8c2aea08bab scope link \r\n"} +{"Time":"2023-05-31T19:39:00.150134607Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.39.0/24 dev eth0 proto kernel scope link src 192.168.39.162 \r\n"} +{"Time":"2023-05-31T19:39:00.150137474Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.122.0/24 dev eth1 proto kernel scope link src 192.168.122.243 \r\n"} +{"Time":"2023-05-31T19:39:00.150139614Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.122.1 dev eth1 proto dhcp scope link src 192.168.122.243 metric 1024 \r\n"} +{"Time":"2023-05-31T19:39:00.150141533Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.150143409Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.15014595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:39:00.150148189Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:38:53 2023\r\n"} +{"Time":"2023-05-31T19:39:00.150150244Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" *raw\r\n"} +{"Time":"2023-05-31T19:39:00.150153565Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :PREROUTING ACCEPT [20668:88915971]\r\n"} +{"Time":"2023-05-31T19:39:00.150155595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :OUTPUT ACCEPT [17273:8248495]\r\n"} +{"Time":"2023-05-31T19:39:00.150157576Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150160059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-PREROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150161999Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150163919Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-rpf-skip - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150229546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.15023213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m comment --comment \"cali:6gwbT8clXdHdC1b1\" -j cali-PREROUTING\r\n"} +{"Time":"2023-05-31T19:39:00.150234382Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m comment --comment \"cali:tVnHkvAo15HuiPy0\" -j cali-OUTPUT\r\n"} +{"Time":"2023-05-31T19:39:00.150236597Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:njdnLwYeGqBJyMxW\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T19:39:00.15023883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:rz86uTUcEZAfFsh7\" -j cali-to-host-endpoint\r\n"} +{"Time":"2023-05-31T19:39:00.150241102Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:pN0F5zD0b8yf9W1Z\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.15024333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:XFX5xbM8B9qR10JG\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T19:39:00.150245776Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -i cali+ -m comment --comment \"cali:EWMPb0zVROM-woQp\" -j MARK --set-xmark 0x40000/0x40000\r\n"} +{"Time":"2023-05-31T19:39:00.150248021Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:PWuxTAIaFCtsg5Qa\" -m mark --mark 0x40000/0x40000 -j cali-rpf-skip\r\n"} +{"Time":"2023-05-31T19:39:00.150250491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:fSSbGND7dgyemWU7\" -m mark --mark 0x40000/0x40000 -m rpfilter --validmark --invert -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.150252811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:ImU0-4Rl2WoOI9Ou\" -m mark --mark 0x0/0x40000 -j cali-from-host-endpoint\r\n"} +{"Time":"2023-05-31T19:39:00.150255153Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:lV4V2MPoMBf0hl9T\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.150257341Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:39:00.150259376Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Completed on Wed May 31 19:38:53 2023\r\n"} +{"Time":"2023-05-31T19:39:00.150261946Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:38:53 2023\r\n"} +{"Time":"2023-05-31T19:39:00.150264011Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" *nat\r\n"} +{"Time":"2023-05-31T19:39:00.150266097Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:39:00.150268176Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:39:00.150270231Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :OUTPUT ACCEPT [46:2776]\r\n"} +{"Time":"2023-05-31T19:39:00.15027229Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :POSTROUTING ACCEPT [55:3451]\r\n"} +{"Time":"2023-05-31T19:39:00.150274266Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150357136Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150360608Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150362979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150365114Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150367239Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-7ICYWLLXVA5FXAQB - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150369322Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-GTCX2CB6WZSLDEO5 - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150371265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-HHKIGJ6M3ODGDXFL - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150373249Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-HS322NY6YDY2BNJC - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150375234Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SEP-IVTHLWZRSGOW44WB - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150377296Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150379452Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150381462Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150383509Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150385449Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150388781Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.15039087Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150392762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150394722Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-PREROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150396826Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fip-dnat - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150398824Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fip-snat - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150400716Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-nat-outgoing - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150402782Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m comment --comment \"cali:6gwbT8clXdHdC1b1\" -j cali-PREROUTING\r\n"} +{"Time":"2023-05-31T19:39:00.150404929Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:00.150407414Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m comment --comment \"cali:tVnHkvAo15HuiPy0\" -j cali-OUTPUT\r\n"} +{"Time":"2023-05-31T19:39:00.150409899Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:00.150527026Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A POSTROUTING -m comment --comment \"cali:O3lYWMrLQYEMJtB5\" -j cali-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:39:00.15054358Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:39:00.150548139Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:39:00.150552074Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.150555652Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T19:39:00.150559276Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:39:00.150563196Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-7ICYWLLXVA5FXAQB -s 10.244.4.194/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150567139Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-7ICYWLLXVA5FXAQB -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.4.194:53\r\n"} +{"Time":"2023-05-31T19:39:00.150571135Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-GTCX2CB6WZSLDEO5 -s 10.244.4.194/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150575121Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-GTCX2CB6WZSLDEO5 -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.4.194:9153\r\n"} +{"Time":"2023-05-31T19:39:00.150578867Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-HHKIGJ6M3ODGDXFL -s 10.244.4.194/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150587274Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-HHKIGJ6M3ODGDXFL -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.4.194:53\r\n"} +{"Time":"2023-05-31T19:39:00.150591323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-HS322NY6YDY2BNJC -s 192.168.39.162/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150595039Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-HS322NY6YDY2BNJC -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.39.162:8443\r\n"} +{"Time":"2023-05-31T19:39:00.150599256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-IVTHLWZRSGOW44WB -s 10.244.4.195/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150602801Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SEP-IVTHLWZRSGOW44WB -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.4.195:8080\r\n"} +{"Time":"2023-05-31T19:39:00.150606452Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T19:39:00.150654265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T19:39:00.150659371Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.104.238.174/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T19:39:00.150663338Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T19:39:00.150667254Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T19:39:00.150671123Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:39:00.150676488Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150680144Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.4.194:53\" -j KUBE-SEP-7ICYWLLXVA5FXAQB\r\n"} +{"Time":"2023-05-31T19:39:00.150684237Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150688148Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.4.194:9153\" -j KUBE-SEP-GTCX2CB6WZSLDEO5\r\n"} +{"Time":"2023-05-31T19:39:00.150692692Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.15069653Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.39.162:8443\" -j KUBE-SEP-HS322NY6YDY2BNJC\r\n"} +{"Time":"2023-05-31T19:39:00.150700443Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150704625Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.4.194:53\" -j KUBE-SEP-HHKIGJ6M3ODGDXFL\r\n"} +{"Time":"2023-05-31T19:39:00.150710771Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.104.238.174/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:00.150778441Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.4.195:8080\" -j KUBE-SEP-IVTHLWZRSGOW44WB\r\n"} +{"Time":"2023-05-31T19:39:00.150783661Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:GBTAv2p5CwevEyJm\" -j cali-fip-dnat\r\n"} +{"Time":"2023-05-31T19:39:00.150787801Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:Z-c7XtVd2Bq7s_hA\" -j cali-fip-snat\r\n"} +{"Time":"2023-05-31T19:39:00.150791238Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:nYKhEzDlr11Jccal\" -j cali-nat-outgoing\r\n"} +{"Time":"2023-05-31T19:39:00.15079478Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -o tunl0 -m comment --comment \"cali:SXWvdsbh4Mw7wOln\" -m addrtype ! --src-type LOCAL --limit-iface-out -m addrtype --src-type LOCAL -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:39:00.150799541Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:r6XmIziWUJsdOK6Z\" -j cali-fip-dnat\r\n"} +{"Time":"2023-05-31T19:39:00.150803155Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-nat-outgoing -m comment --comment \"cali:flqWnvo8yq4ULQLa\" -m set --match-set cali40masq-ipam-pools src -m set ! --match-set cali40all-ipam-pools dst -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:39:00.150806848Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:39:00.15081011Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Completed on Wed May 31 19:38:53 2023\r\n"} +{"Time":"2023-05-31T19:39:00.150813516Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:38:53 2023\r\n"} +{"Time":"2023-05-31T19:39:00.150817111Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" *mangle\r\n"} +{"Time":"2023-05-31T19:39:00.150820481Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :PREROUTING ACCEPT [172:11249]\r\n"} +{"Time":"2023-05-31T19:39:00.150824049Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :INPUT ACCEPT [20643:88914049]\r\n"} +{"Time":"2023-05-31T19:39:00.150827194Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :FORWARD ACCEPT [37:2966]\r\n"} +{"Time":"2023-05-31T19:39:00.150830324Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :OUTPUT ACCEPT [17289:8257127]\r\n"} +{"Time":"2023-05-31T19:39:00.150833536Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :POSTROUTING ACCEPT [17325:8260005]\r\n"} +{"Time":"2023-05-31T19:39:00.150836563Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150839438Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150842561Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150847133Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150850888Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-PREROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150887018Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150890903Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.15089469Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A PREROUTING -m comment --comment \"cali:6gwbT8clXdHdC1b1\" -j cali-PREROUTING\r\n"} +{"Time":"2023-05-31T19:39:00.150898285Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A POSTROUTING -m comment --comment \"cali:O3lYWMrLQYEMJtB5\" -j cali-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:39:00.150901837Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:NX-7roTexQ3fGRfU\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.15090594Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:nnqPh8lh2VOogSzX\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T19:39:00.150909645Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:nquN8Jw8Tz72pcBW\" -m conntrack --ctstate DNAT -j cali-to-host-endpoint\r\n"} +{"Time":"2023-05-31T19:39:00.150913302Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-POSTROUTING -m comment --comment \"cali:jWrgvDQ0xEZHmta3\" -m comment --comment \"Host endpoint policy accepted packet.\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.150916907Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:6BJqBjBC7crtA-7-\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.150920428Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:KX7AGNd6rMcDUai6\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.150923844Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:wNH7KsA3ILKJBsY9\" -j cali-from-host-endpoint\r\n"} +{"Time":"2023-05-31T19:39:00.150927925Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-PREROUTING -m comment --comment \"cali:Cg96MgVuoPm7UMRo\" -m comment --comment \"Host endpoint policy accepted packet.\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.150931436Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:39:00.150934983Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Completed on Wed May 31 19:38:53 2023\r\n"} +{"Time":"2023-05-31T19:39:00.150938109Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:38:53 2023\r\n"} +{"Time":"2023-05-31T19:39:00.150941249Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" *filter\r\n"} +{"Time":"2023-05-31T19:39:00.150944512Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :INPUT ACCEPT [7076:1676992]\r\n"} +{"Time":"2023-05-31T19:39:00.150947467Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :FORWARD ACCEPT [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150950458Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :OUTPUT ACCEPT [6988:2049263]\r\n"} +{"Time":"2023-05-31T19:39:00.150953615Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.150956692Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.15100255Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151007243Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151010339Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151013741Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151017029Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151020131Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151023498Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151026762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-INPUT - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151030197Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-OUTPUT - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151033491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-cidr-block - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151037956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-hep-forward - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151041177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151044148Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-from-wl-dispatch - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151047239Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fw-cali58684b1dc6d - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151050233Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fw-cali8c2aea08bab - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151053313Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-fw-calide818fac7cd - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151056799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-_PTRGc0U-L5Kz7V6ERW - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151059956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-_u2Tn2rSoAPffvE7JO6 - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.15106319Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-kns.default - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151066093Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-kns.kube-system - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151069225Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pri-ksa.default.default - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151072443Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-_PTRGc0U-L5Kz7V6ERW - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151075643Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-_u2Tn2rSoAPffvE7JO6 - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151078583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-kns.default - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151082235Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-kns.kube-system - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.15108525Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-pro-ksa.default.default - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151115544Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-hep-forward - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.15111932Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-host-endpoint - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151122674Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-to-wl-dispatch - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151125782Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-tw-cali58684b1dc6d - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151128848Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-tw-cali8c2aea08bab - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151131984Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-tw-calide818fac7cd - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151134938Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :cali-wl-to-host - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:00.151138057Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -m comment --comment \"cali:Cz_u1IQiXIMmKD4c\" -j cali-INPUT\r\n"} +{"Time":"2023-05-31T19:39:00.151141617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:00.151145283Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:39:00.15114852Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:00.151151878Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:00.151154953Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m comment --comment \"cali:wUHhoiAYhphO9Mso\" -j cali-FORWARD\r\n"} +{"Time":"2023-05-31T19:39:00.151159563Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:00.151163662Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T19:39:00.151167017Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:00.151170943Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:00.151174402Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m comment --comment \"cali:S93hcgKJrXEqnTfs\" -m comment --comment \"Policy explicitly accepted packet.\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151177941Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A FORWARD -m comment --comment \"cali:mp77cMpurHhyjLrM\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.151181335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m comment --comment \"cali:tVnHkvAo15HuiPy0\" -j cali-OUTPUT\r\n"} +{"Time":"2023-05-31T19:39:00.15129229Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:00.151298273Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:00.151301985Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:00.151305405Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151308933Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151312176Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151315685Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151319384Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -m comment --comment \"cali:vjrMJCRpqwy5oRoX\" -j MARK --set-xmark 0x0/0xe0000\r\n"} +{"Time":"2023-05-31T19:39:00.151323604Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -m comment --comment \"cali:A_sPAO0mcxbT9mOV\" -m mark --mark 0x0/0x10000 -j cali-from-hep-forward\r\n"} +{"Time":"2023-05-31T19:39:00.151327165Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -i cali+ -m comment --comment \"cali:8ZoYfO5HKXWbB3pk\" -j cali-from-wl-dispatch\r\n"} +{"Time":"2023-05-31T19:39:00.15133088Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -o cali+ -m comment --comment \"cali:jdEuaPBe14V2hutn\" -j cali-to-wl-dispatch\r\n"} +{"Time":"2023-05-31T19:39:00.151334504Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -m comment --comment \"cali:12bc6HljsMKsmfr-\" -j cali-to-hep-forward\r\n"} +{"Time":"2023-05-31T19:39:00.15133791Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-FORWARD -m comment --comment \"cali:NOSxoaGx8OIstr1z\" -j cali-cidr-block\r\n"} +{"Time":"2023-05-31T19:39:00.151341477Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -p ipencap -m comment --comment \"cali:PajejrV4aFdkZojI\" -m comment --comment \"Allow IPIP packets from Calico hosts\" -m set --match-set cali40all-hosts-net src -m addrtype --dst-type LOCAL -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151345669Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -p ipencap -m comment --comment \"cali:_wjq-Yrma8Ly1Svo\" -m comment --comment \"Drop IPIP packets from non-Calico hosts\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151349264Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -i cali+ -m comment --comment \"cali:8TZGxLWh_Eiz66wc\" -g cali-wl-to-host\r\n"} +{"Time":"2023-05-31T19:39:00.151353112Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -m comment --comment \"cali:6McIeIDvPdL6PE1T\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151401506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -m comment --comment \"cali:YGPbrUms7NId8xVa\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T19:39:00.151405516Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -m comment --comment \"cali:2gmY7Bg2i0i84Wk_\" -j cali-from-host-endpoint\r\n"} +{"Time":"2023-05-31T19:39:00.151409211Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-INPUT -m comment --comment \"cali:q-Vz2ZT9iGE331LL\" -m comment --comment \"Host endpoint policy accepted packet.\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151413595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:Mq1_rAdXXH3YkrzW\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151417469Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -o cali+ -m comment --comment \"cali:69FkRTJDvD5Vu6Vl\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151420753Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -p ipencap -m comment --comment \"cali:AnEsmO6bDZbQntWW\" -m comment --comment \"Allow IPIP packets to other Calico hosts\" -m set --match-set cali40all-hosts-net dst -m addrtype --src-type LOCAL -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151424911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:9e9Uf3GU5tX--Lxy\" -j MARK --set-xmark 0x0/0xf0000\r\n"} +{"Time":"2023-05-31T19:39:00.151429056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:0f3LDz_VKuHFaA2K\" -m conntrack ! --ctstate DNAT -j cali-to-host-endpoint\r\n"} +{"Time":"2023-05-31T19:39:00.151447941Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-OUTPUT -m comment --comment \"cali:OgU2f8BVEAZ_fwkq\" -m comment --comment \"Host endpoint policy accepted packet.\" -m mark --mark 0x10000/0x10000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151452215Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-from-wl-dispatch -i cali58684b1dc6d -m comment --comment \"cali:Dnb2tbr7YiAugJVc\" -g cali-fw-cali58684b1dc6d\r\n"} +{"Time":"2023-05-31T19:39:00.151456306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-from-wl-dispatch -i cali8c2aea08bab -m comment --comment \"cali:v8W7V3TQRHBaZDDZ\" -g cali-fw-cali8c2aea08bab\r\n"} +{"Time":"2023-05-31T19:39:00.151460407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-from-wl-dispatch -i calide818fac7cd -m comment --comment \"cali:qpbWjCVWajacv-uB\" -g cali-fw-calide818fac7cd\r\n"} +{"Time":"2023-05-31T19:39:00.151464385Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-from-wl-dispatch -m comment --comment \"cali:Tl7N32Cv3NhB4QAu\" -m comment --comment \"Unknown interface\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151467898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -m comment --comment \"cali:ixKXyMgnvoBrzMji\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151471533Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -m comment --comment \"cali:2GMRhg3mRdSP6WDb\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151474864Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -m comment --comment \"cali:e3ilwj-r60ZYxurw\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.151581895Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -p udp -m comment --comment \"cali:ylS_PKsWwM6N1mA3\" -m comment --comment \"Drop VXLAN encapped packets originating in workloads\" -m multiport --dports 4789 -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151596171Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -p ipencap -m comment --comment \"cali:L5OXYSN0SYtD4-3P\" -m comment --comment \"Drop IPinIP encapped packets originating in workloads\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151602016Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -m comment --comment \"cali:jMCloqatG8wS97Ya\" -j cali-pro-kns.kube-system\r\n"} +{"Time":"2023-05-31T19:39:00.151606435Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -m comment --comment \"cali:qKvj4SzgVv9ZLF8w\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151610623Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -m comment --comment \"cali:pJQquiY6mVa6wZid\" -j cali-pro-_u2Tn2rSoAPffvE7JO6\r\n"} +{"Time":"2023-05-31T19:39:00.151614069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -m comment --comment \"cali:ROqbSzDR9Nbee-Aa\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151617918Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali58684b1dc6d -m comment --comment \"cali:EQvcX2oPCYduLh41\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151621555Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -m comment --comment \"cali:ICFgrx0A_s3ORdm0\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151625396Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -m comment --comment \"cali:o1GKUgus4ieLDZJY\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151628527Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -m comment --comment \"cali:X_HMHRSO_Zt4XiPd\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.151631628Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -p udp -m comment --comment \"cali:qaG8CqkUWl1S4vqy\" -m comment --comment \"Drop VXLAN encapped packets originating in workloads\" -m multiport --dports 4789 -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151635107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -p ipencap -m comment --comment \"cali:JZx4dAEKNcMXz_nL\" -m comment --comment \"Drop IPinIP encapped packets originating in workloads\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151638544Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -m comment --comment \"cali:kj6gyZQTu4nBjabr\" -j cali-pro-kns.default\r\n"} +{"Time":"2023-05-31T19:39:00.151642526Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -m comment --comment \"cali:ulPAWJKgMLkTWqiK\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151647735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -m comment --comment \"cali:5QB-f3hVPTof4QG1\" -j cali-pro-ksa.default.default\r\n"} +{"Time":"2023-05-31T19:39:00.151810524Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -m comment --comment \"cali:k5PGkPB7vrKsk7Yj\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151818077Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-cali8c2aea08bab -m comment --comment \"cali:eiZNCASpZgFwaOxM\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151822198Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -m comment --comment \"cali:RiUJH_q7jtD0nQ95\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.151825988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -m comment --comment \"cali:al2U9Rb91bNR0krs\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151829861Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -m comment --comment \"cali:ioIfyp3dQKBfQPwd\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.151833643Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -p udp -m comment --comment \"cali:HEMX1l647sAMvmEi\" -m comment --comment \"Drop VXLAN encapped packets originating in workloads\" -m multiport --dports 4789 -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151837628Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -p ipencap -m comment --comment \"cali:3YCdfI_dfUJwGq0Q\" -m comment --comment \"Drop IPinIP encapped packets originating in workloads\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151841495Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -m comment --comment \"cali:jE_VTdqTuCCgDjz8\" -j cali-pro-kns.kube-system\r\n"} +{"Time":"2023-05-31T19:39:00.151845458Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -m comment --comment \"cali:E1KgrX-PHrrJhRNg\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151849125Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -m comment --comment \"cali:3-tXcOMagJOXaWOV\" -j cali-pro-_PTRGc0U-L5Kz7V6ERW\r\n"} +{"Time":"2023-05-31T19:39:00.151852731Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -m comment --comment \"cali:52HEsXpWiOhf-XSc\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151856357Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-fw-calide818fac7cd -m comment --comment \"cali:j6sc9ipT7mdi-a1T\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.151860225Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-_PTRGc0U-L5Kz7V6ERW -m comment --comment \"cali:g4z4yZxg6IEqYbOs\" -m comment --comment \"Profile ksa.kube-system.calico-kube-controllers ingress\"\r\n"} +{"Time":"2023-05-31T19:39:00.151864028Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-_u2Tn2rSoAPffvE7JO6 -m comment --comment \"cali:WqgznqAQ-uYV0oBx\" -m comment --comment \"Profile ksa.kube-system.coredns ingress\"\r\n"} +{"Time":"2023-05-31T19:39:00.15186765Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-kns.default -m comment --comment \"cali:WMSw8BmYOknRHfsz\" -m comment --comment \"Profile kns.default ingress\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.151974321Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-kns.default -m comment --comment \"cali:z015TBt2tO4F28NC\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151980331Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-kns.kube-system -m comment --comment \"cali:J1TyxtHWd0qaBGK-\" -m comment --comment \"Profile kns.kube-system ingress\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.151984099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-kns.kube-system -m comment --comment \"cali:QIB6k7eEKdIg73Jp\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.151987806Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pri-ksa.default.default -m comment --comment \"cali:PrckJA84jX_kGp99\" -m comment --comment \"Profile ksa.default.default ingress\"\r\n"} +{"Time":"2023-05-31T19:39:00.151992218Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-_PTRGc0U-L5Kz7V6ERW -m comment --comment \"cali:DR9-t6YJRvFY-IdZ\" -m comment --comment \"Profile ksa.kube-system.calico-kube-controllers egress\"\r\n"} +{"Time":"2023-05-31T19:39:00.15199649Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-_u2Tn2rSoAPffvE7JO6 -m comment --comment \"cali:0-_UPh39dt5XfhmJ\" -m comment --comment \"Profile ksa.kube-system.coredns egress\"\r\n"} +{"Time":"2023-05-31T19:39:00.152000356Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-kns.default -m comment --comment \"cali:Vr81boRqq4V77Sg8\" -m comment --comment \"Profile kns.default egress\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.152004123Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-kns.default -m comment --comment \"cali:2CkTlvGj1F9ZRYXl\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.152008101Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-kns.kube-system -m comment --comment \"cali:tgOR2S8DVHZW3F1M\" -m comment --comment \"Profile kns.kube-system egress\" -j MARK --set-xmark 0x10000/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.152012088Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-kns.kube-system -m comment --comment \"cali:HVEEtYPJsiGRXCIt\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.152015967Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-pro-ksa.default.default -m comment --comment \"cali:bUZzZcietq9v5Ybq\" -m comment --comment \"Profile ksa.default.default egress\"\r\n"} +{"Time":"2023-05-31T19:39:00.152020096Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-to-wl-dispatch -o cali58684b1dc6d -m comment --comment \"cali:UI8cftapJgWmaU3z\" -g cali-tw-cali58684b1dc6d\r\n"} +{"Time":"2023-05-31T19:39:00.15202399Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-to-wl-dispatch -o cali8c2aea08bab -m comment --comment \"cali:Yx4hjJaXDST13Esz\" -g cali-tw-cali8c2aea08bab\r\n"} +{"Time":"2023-05-31T19:39:00.152027821Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-to-wl-dispatch -o calide818fac7cd -m comment --comment \"cali:WTMnFzUhe_MTeoe4\" -g cali-tw-calide818fac7cd\r\n"} +{"Time":"2023-05-31T19:39:00.152031919Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-to-wl-dispatch -m comment --comment \"cali:2YwiPu2Yr6jQ10Pg\" -m comment --comment \"Unknown interface\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.152168406Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali58684b1dc6d -m comment --comment \"cali:aUJd-hX75GejFaPv\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.152173528Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali58684b1dc6d -m comment --comment \"cali:sZ7NkL1OSaNS6bME\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.152177276Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali58684b1dc6d -m comment --comment \"cali:xvmgvgWSsk4CKpQU\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.152183797Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali58684b1dc6d -m comment --comment \"cali:edq94GTz3wgmymNM\" -j cali-pri-kns.kube-system\r\n"} +{"Time":"2023-05-31T19:39:00.152187635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali58684b1dc6d -m comment --comment \"cali:mEpj4BZauWx-hx32\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.152191644Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali58684b1dc6d -m comment --comment \"cali:eeyaK-kPw6hyMzOB\" -j cali-pri-_u2Tn2rSoAPffvE7JO6\r\n"} +{"Time":"2023-05-31T19:39:00.15219571Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali58684b1dc6d -m comment --comment \"cali:2fxJm-1tRH4rWG7x\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.152199672Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali58684b1dc6d -m comment --comment \"cali:ERwGgvDsJKnEFZ2j\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.152203592Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali8c2aea08bab -m comment --comment \"cali:BKWEcqwW0Mpo8aV8\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.152207361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali8c2aea08bab -m comment --comment \"cali:9kCPcukS2eIlhKaN\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.15221092Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali8c2aea08bab -m comment --comment \"cali:VH91pzvMCaJLRlAO\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.152216534Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali8c2aea08bab -m comment --comment \"cali:LFEIa3nGGS_jKZVU\" -j cali-pri-kns.default\r\n"} +{"Time":"2023-05-31T19:39:00.152220306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali8c2aea08bab -m comment --comment \"cali:xqoLHnZP7gpuqGvs\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.152224022Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali8c2aea08bab -m comment --comment \"cali:dHyGUMnbOA61uDsT\" -j cali-pri-ksa.default.default\r\n"} +{"Time":"2023-05-31T19:39:00.152228131Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali8c2aea08bab -m comment --comment \"cali:mpwKAAODZkKxg9ae\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.152232245Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-cali8c2aea08bab -m comment --comment \"cali:y6BX0VkVHWXK_0QU\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.152391728Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-calide818fac7cd -m comment --comment \"cali:fqOMbgjYRWw0tTPv\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.152397536Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-calide818fac7cd -m comment --comment \"cali:RwDnEDyVZvJq9yAl\" -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.152401368Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-calide818fac7cd -m comment --comment \"cali:_kolf2MEaGWdIBO2\" -j MARK --set-xmark 0x0/0x10000\r\n"} +{"Time":"2023-05-31T19:39:00.152405411Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-calide818fac7cd -m comment --comment \"cali:3LHefXq36tzQ6GXe\" -j cali-pri-kns.kube-system\r\n"} +{"Time":"2023-05-31T19:39:00.152409025Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-calide818fac7cd -m comment --comment \"cali:x_w30yKBX0IHJpOg\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.152413073Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-calide818fac7cd -m comment --comment \"cali:n_UlkbvE8s8UPbj0\" -j cali-pri-_PTRGc0U-L5Kz7V6ERW\r\n"} +{"Time":"2023-05-31T19:39:00.152416956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-calide818fac7cd -m comment --comment \"cali:GTaSl9qk6P8Kwzh_\" -m comment --comment \"Return if profile accepted\" -m mark --mark 0x10000/0x10000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:00.152420542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-tw-calide818fac7cd -m comment --comment \"cali:uVh27okM4rBmyEje\" -m comment --comment \"Drop if no profiles matched\" -j DROP\r\n"} +{"Time":"2023-05-31T19:39:00.152424196Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-wl-to-host -m comment --comment \"cali:Ee9Sbo10IpVujdIY\" -j cali-from-wl-dispatch\r\n"} +{"Time":"2023-05-31T19:39:00.152427589Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -A cali-wl-to-host -m comment --comment \"cali:nSZbcOoG1xPONxb8\" -m comment --comment \"Configured DefaultEndpointToHostAction\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:00.152431277Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:39:00.152439725Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Completed on Wed May 31 19:38:53 2023\r\n"} +{"Time":"2023-05-31T19:39:00.152443425Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.152446682Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.152449883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:39:00.152453395Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:39:00.152456727Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152460018Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 57 3533 cali-PREROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:6gwbT8clXdHdC1b1 */\r\n"} +{"Time":"2023-05-31T19:39:00.152601794Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 60 3667 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:39:00.152608258Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152611801Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:39:00.152615331Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.15261871Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152622236Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain OUTPUT (policy ACCEPT 46 packets, 2776 bytes)\r\n"} +{"Time":"2023-05-31T19:39:00.15262552Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152629196Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 133 8178 cali-OUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:tVnHkvAo15HuiPy0 */\r\n"} +{"Time":"2023-05-31T19:39:00.152635006Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 195 11988 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:39:00.152638654Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152641741Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain POSTROUTING (policy ACCEPT 55 packets, 3451 bytes)\r\n"} +{"Time":"2023-05-31T19:39:00.152645653Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152649368Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 144 8997 cali-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:O3lYWMrLQYEMJtB5 */\r\n"} +{"Time":"2023-05-31T19:39:00.152652978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 205 12723 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T19:39:00.152655923Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152659004Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:39:00.152662302Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152666851Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152669921Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T19:39:00.152683738Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152687743Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 9 540 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T19:39:00.152829036Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152833744Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.152839677Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152843163Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152846247Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.152849695Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152853028Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 55 3451 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:39:00.152856844Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 9 540 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T19:39:00.152860393Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 9 540 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T19:39:00.152863762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152866731Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:39:00.15287007Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152873513Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152876803Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-7ICYWLLXVA5FXAQB (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.152880151Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152884385Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.4.194 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T19:39:00.152887973Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.4.194:53\r\n"} +{"Time":"2023-05-31T19:39:00.152891321Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.152894561Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-GTCX2CB6WZSLDEO5 (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.152898047Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.152901477Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.4.194 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T19:39:00.153172695Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.4.194:9153\r\n"} +{"Time":"2023-05-31T19:39:00.153184571Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.153188622Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-HHKIGJ6M3ODGDXFL (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.153192823Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.153196992Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.4.194 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T19:39:00.153201012Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.4.194:53\r\n"} +{"Time":"2023-05-31T19:39:00.153204712Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.153208097Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-HS322NY6YDY2BNJC (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.153212518Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.153216117Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ all -- * * 192.168.39.162 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T19:39:00.153219559Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 31 1860 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.39.162:8443\r\n"} +{"Time":"2023-05-31T19:39:00.153223199Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.153227346Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SEP-IVTHLWZRSGOW44WB (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.153231045Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.153235Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.4.195 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T19:39:00.153239065Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.4.195:8080\r\n"} +{"Time":"2023-05-31T19:39:00.153242918Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.153246365Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T19:39:00.153250458Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.15325431Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:39:00.15658154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:39:00.156593831Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.104.238.174 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:39:00.156598195Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8 480 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:39:00.15660275Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:39:00.156607023Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 81 4860 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T19:39:00.156611198Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156614807Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156618653Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156622883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:39:00.156627234Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-SEP-7ICYWLLXVA5FXAQB all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.4.194:53 */\r\n"} +{"Time":"2023-05-31T19:39:00.156631003Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156634319Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156642037Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156646463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:39:00.156650679Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-SEP-GTCX2CB6WZSLDEO5 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.4.194:9153 */\r\n"} +{"Time":"2023-05-31T19:39:00.156654587Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156657807Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156661481Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156665508Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 29 1740 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:39:00.15668537Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 31 1860 KUBE-SEP-HS322NY6YDY2BNJC all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.39.162:8443 */\r\n"} +{"Time":"2023-05-31T19:39:00.156690036Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156693568Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156697361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156701107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:39:00.156706379Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 8 615 KUBE-SEP-HHKIGJ6M3ODGDXFL all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.4.194:53 */\r\n"} +{"Time":"2023-05-31T19:39:00.156709968Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156713267Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156716787Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156720594Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.104.238.174 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:39:00.156724653Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 60 KUBE-SEP-IVTHLWZRSGOW44WB all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.4.195:8080 */\r\n"} +{"Time":"2023-05-31T19:39:00.156728489Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156731439Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-OUTPUT (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156735338Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156739613Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 133 8178 cali-fip-dnat all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:GBTAv2p5CwevEyJm */\r\n"} +{"Time":"2023-05-31T19:39:00.156743492Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156746843Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.15675013Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156754031Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 144 8997 cali-fip-snat all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:Z-c7XtVd2Bq7s_hA */\r\n"} +{"Time":"2023-05-31T19:39:00.156758026Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 144 8997 cali-nat-outgoing all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:nYKhEzDlr11Jccal */\r\n"} +{"Time":"2023-05-31T19:39:00.156762003Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0 0 MASQUERADE all -- * tunl0 0.0.0.0/0 0.0.0.0/0 /* cali:SXWvdsbh4Mw7wOln */ ADDRTYPE match src-type !LOCAL limit-out ADDRTYPE match src-type LOCAL random-fully\r\n"} +{"Time":"2023-05-31T19:39:00.15676546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.15676906Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-PREROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156772616Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156776996Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 57 3533 cali-fip-dnat all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:r6XmIziWUJsdOK6Z */\r\n"} +{"Time":"2023-05-31T19:39:00.156780343Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156783825Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-fip-dnat (2 references)\r\n"} +{"Time":"2023-05-31T19:39:00.15678778Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156791506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156794861Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-fip-snat (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156798668Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.15680242Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.156805931Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Chain cali-nat-outgoing (1 references)\r\n"} +{"Time":"2023-05-31T19:39:00.156809592Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:00.156813413Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1 84 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* cali:flqWnvo8yq4ULQLa */ match-set cali40masq-ipam-pools src ! match-set cali40all-ipam-pools dst random-fully\r\n"} +{"Time":"2023-05-31T19:39:00.156817422Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.156820464Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.156823714Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico daemon set:\n"} +{"Time":"2023-05-31T19:39:00.156827443Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-node\n"} +{"Time":"2023-05-31T19:39:00.156830868Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: k8s-app=calico-node\n"} +{"Time":"2023-05-31T19:39:00.156834002Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:00.156837342Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-node\n"} +{"Time":"2023-05-31T19:39:00.156840472Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:39:00.156844509Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:39:00.156849514Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:39:00.156853011Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:39:00.156856256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:39:00.156860546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:39:00.156863918Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:39:00.156867171Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:00.156870429Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-node\n"} +{"Time":"2023-05-31T19:39:00.156874026Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: calico-node\n"} +{"Time":"2023-05-31T19:39:00.156877916Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Init Containers:\n"} +{"Time":"2023-05-31T19:39:00.156881523Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" upgrade-ipam:\n"} +{"Time":"2023-05-31T19:39:00.156885033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/cni:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.156888519Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.156892507Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.156896017Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.156901419Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /opt/cni/bin/calico-ipam\n"} +{"Time":"2023-05-31T19:39:00.156905054Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -upgrade\n"} +{"Time":"2023-05-31T19:39:00.156908493Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T19:39:00.156911864Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T19:39:00.156915721Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.156919142Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KUBERNETES_NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:00.156922885Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_NETWORKING_BACKEND: \u003cset to the key 'calico_backend' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.156926426Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.156929702Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/opt/cni/bin from cni-bin-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.156933354Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/cni/networks from host-local-net-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.156936816Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" install-cni:\n"} +{"Time":"2023-05-31T19:39:00.156940577Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/cni:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.156943891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.156947499Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.156951455Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.156954792Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /opt/cni/bin/install\n"} +{"Time":"2023-05-31T19:39:00.15695857Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T19:39:00.15696209Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T19:39:00.156965878Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.156969033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_CONF_NAME: 10-calico.conflist\n"} +{"Time":"2023-05-31T19:39:00.156972608Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_NETWORK_CONFIG: \u003cset to the key 'cni_network_config' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.156976393Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KUBERNETES_NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:00.156979768Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_MTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.156983779Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SLEEP: false\n"} +{"Time":"2023-05-31T19:39:00.156987342Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.156991093Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/etc/cni/net.d from cni-net-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.156994465Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/opt/cni/bin from cni-bin-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.156997729Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mount-bpffs:\n"} +{"Time":"2023-05-31T19:39:00.157001135Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/node:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.15700465Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157008605Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157012Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.157015177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-node\n"} +{"Time":"2023-05-31T19:39:00.157019164Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -init\n"} +{"Time":"2023-05-31T19:39:00.157022622Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -best-effort\n"} +{"Time":"2023-05-31T19:39:00.157025993Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157029415Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.157033357Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /nodeproc from nodeproc (ro)\n"} +{"Time":"2023-05-31T19:39:00.157037005Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /sys/fs from sys-fs (rw)\n"} +{"Time":"2023-05-31T19:39:00.157041136Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/calico from var-run-calico (rw)\n"} +{"Time":"2023-05-31T19:39:00.157044718Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.157048577Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-node:\n"} +{"Time":"2023-05-31T19:39:00.157052102Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/node:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.157055572Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157059105Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157062412Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:00.157065913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:39:00.157069219Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: exec [/bin/calico-node -felix-live -bird-live] delay=10s timeout=10s period=10s #success=1 #failure=6\n"} +{"Time":"2023-05-31T19:39:00.157072826Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: exec [/bin/calico-node -felix-ready -bird-ready] delay=0s timeout=10s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:00.157077636Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T19:39:00.157081222Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T19:39:00.157084401Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.157088106Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DATASTORE_TYPE: kubernetes\n"} +{"Time":"2023-05-31T19:39:00.157091566Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WAIT_FOR_DATASTORE: true\n"} +{"Time":"2023-05-31T19:39:00.157096008Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NODENAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:00.157099788Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_NETWORKING_BACKEND: \u003cset to the key 'calico_backend' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157103304Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CLUSTER_TYPE: k8s,bgp\n"} +{"Time":"2023-05-31T19:39:00.157107244Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: autodetect\n"} +{"Time":"2023-05-31T19:39:00.157110923Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_IPIP: Always\n"} +{"Time":"2023-05-31T19:39:00.157114423Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_VXLAN: Never\n"} +{"Time":"2023-05-31T19:39:00.157118128Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV6POOL_VXLAN: Never\n"} +{"Time":"2023-05-31T19:39:00.157121918Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_IPINIPMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157126537Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_VXLANMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157131003Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_WIREGUARDMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157134866Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:39:00.157138263Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_DISABLE_FILE_LOGGING: true\n"} +{"Time":"2023-05-31T19:39:00.157141527Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_DEFAULTENDPOINTTOHOSTACTION: ACCEPT\n"} +{"Time":"2023-05-31T19:39:00.157144646Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_IPV6SUPPORT: false\n"} +{"Time":"2023-05-31T19:39:00.157148121Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_HEALTHENABLED: true\n"} +{"Time":"2023-05-31T19:39:00.157151154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.157154464Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/etc/cni/net.d from cni-net-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.157158168Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:39:00.157161791Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:39:00.157165172Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /sys/fs/bpf from bpffs (rw)\n"} +{"Time":"2023-05-31T19:39:00.157168569Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/calico from var-lib-calico (rw)\n"} +{"Time":"2023-05-31T19:39:00.157172052Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/log/calico/cni from cni-log-dir (ro)\n"} +{"Time":"2023-05-31T19:39:00.157175298Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/calico from var-run-calico (rw)\n"} +{"Time":"2023-05-31T19:39:00.157178756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/nodeagent from policysync (rw)\n"} +{"Time":"2023-05-31T19:39:00.157182297Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.157185448Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:39:00.157188776Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157192205Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:39:00.157195975Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157199428Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" var-run-calico:\n"} +{"Time":"2023-05-31T19:39:00.15720263Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157206877Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/run/calico\n"} +{"Time":"2023-05-31T19:39:00.15721023Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157213662Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" var-lib-calico:\n"} +{"Time":"2023-05-31T19:39:00.15721805Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157221685Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/calico\n"} +{"Time":"2023-05-31T19:39:00.157225191Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157228647Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:39:00.157232055Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157235505Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:39:00.157239314Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:39:00.157242522Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sys-fs:\n"} +{"Time":"2023-05-31T19:39:00.157245897Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157249373Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /sys/fs/\n"} +{"Time":"2023-05-31T19:39:00.157252729Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:00.157256048Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bpffs:\n"} +{"Time":"2023-05-31T19:39:00.15725936Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157262721Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /sys/fs/bpf\n"} +{"Time":"2023-05-31T19:39:00.157266124Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: Directory\n"} +{"Time":"2023-05-31T19:39:00.157269127Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeproc:\n"} +{"Time":"2023-05-31T19:39:00.157272564Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157275932Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /proc\n"} +{"Time":"2023-05-31T19:39:00.157279243Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157282506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-bin-dir:\n"} +{"Time":"2023-05-31T19:39:00.157285927Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157289246Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T19:39:00.157292866Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157296674Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-net-dir:\n"} +{"Time":"2023-05-31T19:39:00.15730014Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157303726Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:39:00.157307112Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157310393Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-log-dir:\n"} +{"Time":"2023-05-31T19:39:00.157313711Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157317313Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/log/calico/cni\n"} +{"Time":"2023-05-31T19:39:00.157321205Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157324511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" host-local-net-dir:\n"} +{"Time":"2023-05-31T19:39:00.15732807Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157331615Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/cni/networks\n"} +{"Time":"2023-05-31T19:39:00.157334981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.15733824Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" policysync:\n"} +{"Time":"2023-05-31T19:39:00.157341501Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157344803Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/run/nodeagent\n"} +{"Time":"2023-05-31T19:39:00.157348032Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:00.157351541Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:00.157355206Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.157360256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.15736409Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.15736778Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal SuccessfulCreate 56s daemonset-controller Created pod: calico-node-pxmfk\n"} +{"Time":"2023-05-31T19:39:00.15737141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.157374796Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.157378177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico daemon set pod(s):\n"} +{"Time":"2023-05-31T19:39:00.15738144Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-node-pxmfk\n"} +{"Time":"2023-05-31T19:39:00.157385824Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.157389333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:39:00.157392762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:00.157396848Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: calico-node\n"} +{"Time":"2023-05-31T19:39:00.15740042Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-509041/192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.157403834Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 19:37:58 +0000\n"} +{"Time":"2023-05-31T19:39:00.157407222Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: controller-revision-hash=785457b4dc\n"} +{"Time":"2023-05-31T19:39:00.157410818Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" k8s-app=calico-node\n"} +{"Time":"2023-05-31T19:39:00.157415253Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:39:00.1574191Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.15742206Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:00.157426597Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.157429851Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:00.157433521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.15743651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: DaemonSet/calico-node\n"} +{"Time":"2023-05-31T19:39:00.15743979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Init Containers:\n"} +{"Time":"2023-05-31T19:39:00.157442989Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" upgrade-ipam:\n"} +{"Time":"2023-05-31T19:39:00.157446399Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://87210b3744a58dc02d9df8bd524aaaa5b85fd9b600b6a6057dd3d66cca14ceac\n"} +{"Time":"2023-05-31T19:39:00.157450011Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/cni:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.157453549Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker.io/calico/cni@sha256:9a2c99f0314053aa11e971bd5d72e17951767bf5c6ff1fd9c38c4582d7cb8a0a\n"} +{"Time":"2023-05-31T19:39:00.15745718Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.15746041Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157463482Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.157467022Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /opt/cni/bin/calico-ipam\n"} +{"Time":"2023-05-31T19:39:00.157469937Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -upgrade\n"} +{"Time":"2023-05-31T19:39:00.157474617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Terminated\n"} +{"Time":"2023-05-31T19:39:00.157485929Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T19:39:00.157489449Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T19:39:00.157493101Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:38:03 +0000\n"} +{"Time":"2023-05-31T19:39:00.157496315Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Finished: Wed, 31 May 2023 19:38:03 +0000\n"} +{"Time":"2023-05-31T19:39:00.157499919Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.157503286Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.157506763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T19:39:00.157510102Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T19:39:00.157515303Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.157518991Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KUBERNETES_NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:00.157522764Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_NETWORKING_BACKEND: \u003cset to the key 'calico_backend' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157526223Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.157530103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/opt/cni/bin from cni-bin-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.157533571Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/cni/networks from host-local-net-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.157537376Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-lrxm6 (ro)\n"} +{"Time":"2023-05-31T19:39:00.15754077Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" install-cni:\n"} +{"Time":"2023-05-31T19:39:00.157544192Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://23bc0bdc96c55bc12cae27385792ff2474e68393a0e99d43da94d244a742b2fa\n"} +{"Time":"2023-05-31T19:39:00.157547819Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/cni:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.157551566Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker.io/calico/cni@sha256:9a2c99f0314053aa11e971bd5d72e17951767bf5c6ff1fd9c38c4582d7cb8a0a\n"} +{"Time":"2023-05-31T19:39:00.157555158Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157558512Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157561732Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.157565118Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /opt/cni/bin/install\n"} +{"Time":"2023-05-31T19:39:00.15756841Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Terminated\n"} +{"Time":"2023-05-31T19:39:00.157571946Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T19:39:00.157575283Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T19:39:00.157579194Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:38:05 +0000\n"} +{"Time":"2023-05-31T19:39:00.157582833Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Finished: Wed, 31 May 2023 19:38:05 +0000\n"} +{"Time":"2023-05-31T19:39:00.157587396Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.15759099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.157594538Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T19:39:00.157597714Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T19:39:00.157601258Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.157604795Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_CONF_NAME: 10-calico.conflist\n"} +{"Time":"2023-05-31T19:39:00.157608599Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_NETWORK_CONFIG: \u003cset to the key 'cni_network_config' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.15761235Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KUBERNETES_NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:00.157615898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CNI_MTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157619598Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SLEEP: false\n"} +{"Time":"2023-05-31T19:39:00.157622841Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.157626412Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/etc/cni/net.d from cni-net-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.157630082Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/opt/cni/bin from cni-bin-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.15763348Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-lrxm6 (ro)\n"} +{"Time":"2023-05-31T19:39:00.157636865Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mount-bpffs:\n"} +{"Time":"2023-05-31T19:39:00.157640517Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://77a270f043e8dec543bd79d2fa23e73728a74c19fd9b9c70cfff5db1aa6b0243\n"} +{"Time":"2023-05-31T19:39:00.157644034Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/node:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.157647669Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker.io/calico/node@sha256:0cd00e83d06b3af8cd712ad2c310be07b240235ad7ca1397e04eb14d20dcc20f\n"} +{"Time":"2023-05-31T19:39:00.157651817Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157657813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157661386Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.157665099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-node\n"} +{"Time":"2023-05-31T19:39:00.157668393Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -init\n"} +{"Time":"2023-05-31T19:39:00.157671856Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -best-effort\n"} +{"Time":"2023-05-31T19:39:00.157675489Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Terminated\n"} +{"Time":"2023-05-31T19:39:00.157679069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T19:39:00.157682447Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T19:39:00.157685737Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:38:12 +0000\n"} +{"Time":"2023-05-31T19:39:00.157689415Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Finished: Wed, 31 May 2023 19:38:12 +0000\n"} +{"Time":"2023-05-31T19:39:00.157692798Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.157696098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.157699511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.15770297Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.157706091Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /nodeproc from nodeproc (ro)\n"} +{"Time":"2023-05-31T19:39:00.157709394Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /sys/fs from sys-fs (rw)\n"} +{"Time":"2023-05-31T19:39:00.157714144Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/calico from var-run-calico (rw)\n"} +{"Time":"2023-05-31T19:39:00.157718016Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-lrxm6 (ro)\n"} +{"Time":"2023-05-31T19:39:00.157733939Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.157737598Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-node:\n"} +{"Time":"2023-05-31T19:39:00.157741676Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://364dda37b23721bcd270ca657f920bfdd2df06459dbfff6dc9d5a7bfff093a8e\n"} +{"Time":"2023-05-31T19:39:00.157745431Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/node:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.15774921Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker.io/calico/node@sha256:0cd00e83d06b3af8cd712ad2c310be07b240235ad7ca1397e04eb14d20dcc20f\n"} +{"Time":"2023-05-31T19:39:00.157752988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157757653Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.157761792Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:00.157765384Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:38:13 +0000\n"} +{"Time":"2023-05-31T19:39:00.157768726Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.157772065Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.157775965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:00.157779345Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:39:00.157782898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: exec [/bin/calico-node -felix-live -bird-live] delay=10s timeout=10s period=10s #success=1 #failure=6\n"} +{"Time":"2023-05-31T19:39:00.157786755Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: exec [/bin/calico-node -felix-ready -bird-ready] delay=0s timeout=10s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:00.157791179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment Variables from:\n"} +{"Time":"2023-05-31T19:39:00.157794645Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes-services-endpoint ConfigMap Optional: true\n"} +{"Time":"2023-05-31T19:39:00.157798018Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.157801843Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DATASTORE_TYPE: kubernetes\n"} +{"Time":"2023-05-31T19:39:00.157805527Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WAIT_FOR_DATASTORE: true\n"} +{"Time":"2023-05-31T19:39:00.157809405Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NODENAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:00.157813078Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_NETWORKING_BACKEND: \u003cset to the key 'calico_backend' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.15781717Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CLUSTER_TYPE: k8s,bgp\n"} +{"Time":"2023-05-31T19:39:00.15782099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: autodetect\n"} +{"Time":"2023-05-31T19:39:00.157824747Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_IPIP: Always\n"} +{"Time":"2023-05-31T19:39:00.157828041Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_VXLAN: Never\n"} +{"Time":"2023-05-31T19:39:00.157831505Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV6POOL_VXLAN: Never\n"} +{"Time":"2023-05-31T19:39:00.157835011Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_IPINIPMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157839605Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_VXLANMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157844381Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_WIREGUARDMTU: \u003cset to the key 'veth_mtu' of config map 'calico-config'\u003e Optional: false\n"} +{"Time":"2023-05-31T19:39:00.157848285Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_IPV4POOL_CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:39:00.157851882Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CALICO_DISABLE_FILE_LOGGING: true\n"} +{"Time":"2023-05-31T19:39:00.157855602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_DEFAULTENDPOINTTOHOSTACTION: ACCEPT\n"} +{"Time":"2023-05-31T19:39:00.157859112Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_IPV6SUPPORT: false\n"} +{"Time":"2023-05-31T19:39:00.157862395Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" FELIX_HEALTHENABLED: true\n"} +{"Time":"2023-05-31T19:39:00.157865685Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.15786883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /host/etc/cni/net.d from cni-net-dir (rw)\n"} +{"Time":"2023-05-31T19:39:00.157872502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:39:00.157875736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:39:00.157879157Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /sys/fs/bpf from bpffs (rw)\n"} +{"Time":"2023-05-31T19:39:00.157882447Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/calico from var-lib-calico (rw)\n"} +{"Time":"2023-05-31T19:39:00.157886071Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/log/calico/cni from cni-log-dir (ro)\n"} +{"Time":"2023-05-31T19:39:00.15788941Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/calico from var-run-calico (rw)\n"} +{"Time":"2023-05-31T19:39:00.157892793Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/nodeagent from policysync (rw)\n"} +{"Time":"2023-05-31T19:39:00.157896183Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-lrxm6 (ro)\n"} +{"Time":"2023-05-31T19:39:00.157900155Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.157903371Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:00.157906609Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:00.157909866Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:00.157913094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:00.157916471Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:00.157919724Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.157922909Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:39:00.157926635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157937392Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:39:00.157940632Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157943855Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" var-run-calico:\n"} +{"Time":"2023-05-31T19:39:00.15794713Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157950638Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/run/calico\n"} +{"Time":"2023-05-31T19:39:00.157953961Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157957463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" var-lib-calico:\n"} +{"Time":"2023-05-31T19:39:00.157961202Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157964978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/calico\n"} +{"Time":"2023-05-31T19:39:00.157968207Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.157971521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:39:00.157975518Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157978718Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:39:00.157982112Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:39:00.15798524Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sys-fs:\n"} +{"Time":"2023-05-31T19:39:00.157988606Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.157991988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /sys/fs/\n"} +{"Time":"2023-05-31T19:39:00.15799532Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:00.157998809Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bpffs:\n"} +{"Time":"2023-05-31T19:39:00.158002052Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.158005654Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /sys/fs/bpf\n"} +{"Time":"2023-05-31T19:39:00.158009216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: Directory\n"} +{"Time":"2023-05-31T19:39:00.158012597Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeproc:\n"} +{"Time":"2023-05-31T19:39:00.158015726Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.158019792Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /proc\n"} +{"Time":"2023-05-31T19:39:00.158024152Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.158027457Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-bin-dir:\n"} +{"Time":"2023-05-31T19:39:00.158030658Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.158034342Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T19:39:00.158037577Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.158040912Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-net-dir:\n"} +{"Time":"2023-05-31T19:39:00.158044246Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.158047598Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:39:00.158050875Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.158054407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni-log-dir:\n"} +{"Time":"2023-05-31T19:39:00.158057652Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.158061228Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/log/calico/cni\n"} +{"Time":"2023-05-31T19:39:00.158064647Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.158068264Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" host-local-net-dir:\n"} +{"Time":"2023-05-31T19:39:00.158071769Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.158075177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/lib/cni/networks\n"} +{"Time":"2023-05-31T19:39:00.158078701Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.158081626Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" policysync:\n"} +{"Time":"2023-05-31T19:39:00.158084974Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.158088512Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /var/run/nodeagent\n"} +{"Time":"2023-05-31T19:39:00.158093439Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:00.158097079Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-lrxm6:\n"} +{"Time":"2023-05-31T19:39:00.158100557Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:00.158104346Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:00.158109059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.158112636Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:00.158117562Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:00.158120891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:39:00.158135361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:00.158139696Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: :NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158143708Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" :NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158147324Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158151203Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158155043Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158160358Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158164193Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158167936Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158171762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158175341Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.158179013Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.158182455Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.158186213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.15818981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 56s default-scheduler Successfully assigned kube-system/calico-node-pxmfk to calico-509041\n"} +{"Time":"2023-05-31T19:39:00.158193648Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulling 56s kubelet Pulling image \"docker.io/calico/cni:v3.25.1\"\n"} +{"Time":"2023-05-31T19:39:00.158197404Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 51s kubelet Successfully pulled image \"docker.io/calico/cni:v3.25.1\" in 4.942579173s (4.942585048s including waiting)\n"} +{"Time":"2023-05-31T19:39:00.158201378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 51s kubelet Created container upgrade-ipam\n"} +{"Time":"2023-05-31T19:39:00.158205097Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 51s kubelet Started container upgrade-ipam\n"} +{"Time":"2023-05-31T19:39:00.158209524Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 50s kubelet Container image \"docker.io/calico/cni:v3.25.1\" already present on machine\n"} +{"Time":"2023-05-31T19:39:00.158213313Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 50s kubelet Created container install-cni\n"} +{"Time":"2023-05-31T19:39:00.158216673Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 49s kubelet Started container install-cni\n"} +{"Time":"2023-05-31T19:39:00.158221031Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulling 48s kubelet Pulling image \"docker.io/calico/node:v3.25.1\"\n"} +{"Time":"2023-05-31T19:39:00.158241637Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 42s kubelet Successfully pulled image \"docker.io/calico/node:v3.25.1\" in 5.192894592s (5.192902757s including waiting)\n"} +{"Time":"2023-05-31T19:39:00.15824584Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 42s kubelet Created container mount-bpffs\n"} +{"Time":"2023-05-31T19:39:00.158249284Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 42s kubelet Started container mount-bpffs\n"} +{"Time":"2023-05-31T19:39:00.158252768Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 42s kubelet Container image \"docker.io/calico/node:v3.25.1\" already present on machine\n"} +{"Time":"2023-05-31T19:39:00.158256474Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 42s kubelet Created container calico-node\n"} +{"Time":"2023-05-31T19:39:00.15825986Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 41s kubelet Started container calico-node\n"} +{"Time":"2023-05-31T19:39:00.158263698Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning Unhealthy 40s kubelet Readiness probe failed: calico/node is not ready: BIRD is not ready: Error querying BIRD: unable to connect to BIRDv4 socket: dial unix /var/run/bird/bird.ctl: connect: no such file or directory\n"} +{"Time":"2023-05-31T19:39:00.158267869Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning Unhealthy 39s kubelet Readiness probe failed: calico/node is not ready: BIRD is not ready: Error querying BIRD: unable to connect to BIRDv4 socket: dial unix /var/run/calico/bird.ctl: connect: connection refused\n"} +{"Time":"2023-05-31T19:39:00.158271304Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.15827464Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.158278004Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico daemon set container(s) logs (current):\n"} +{"Time":"2023-05-31T19:39:00.158282129Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/upgrade-ipam] 2023-05-31 19:38:03.835 [INFO][1] ipam_plugin.go 80: migrating from host-local to calico-ipam...\n"} +{"Time":"2023-05-31T19:39:00.158286291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/upgrade-ipam] 2023-05-31 19:38:03.836 [INFO][1] migrate.go 66: checking host-local IPAM data dir dir existence...\n"} +{"Time":"2023-05-31T19:39:00.158290257Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/upgrade-ipam] 2023-05-31 19:38:03.836 [INFO][1] migrate.go 68: host-local IPAM data dir dir not found; no migration necessary, successfully exiting...\n"} +{"Time":"2023-05-31T19:39:00.158294067Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/upgrade-ipam] 2023-05-31 19:38:03.836 [INFO][1] ipam_plugin.go 110: migration from host-local to calico-ipam complete node=\"calico-509041\"\n"} +{"Time":"2023-05-31T19:39:00.158298187Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] \"snat\": true,\n"} +{"Time":"2023-05-31T19:39:00.158302043Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] \"capabilities\": {\"portMappings\": true}\n"} +{"Time":"2023-05-31T19:39:00.158306221Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] },\n"} +{"Time":"2023-05-31T19:39:00.158310821Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] {\n"} +{"Time":"2023-05-31T19:39:00.158314538Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] \"type\": \"bandwidth\",\n"} +{"Time":"2023-05-31T19:39:00.158319099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] \"capabilities\": {\"bandwidth\": true}\n"} +{"Time":"2023-05-31T19:39:00.158322781Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] }\n"} +{"Time":"2023-05-31T19:39:00.158326536Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] ]\n"} +{"Time":"2023-05-31T19:39:00.158329897Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] }\n"} +{"Time":"2023-05-31T19:39:00.158333526Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/install-cni] 2023-05-31 19:38:05.792 [INFO][1] cni-installer/\u003cnil\u003e \u003cnil\u003e: Done configuring CNI. Sleep= false\n"} +{"Time":"2023-05-31T19:39:00.158337794Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/mount-bpffs] 2023-05-31 19:38:12.275 [INFO][1] init-best-effort/startup.go 427: Early log level set to info\n"} +{"Time":"2023-05-31T19:39:00.158341625Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/mount-bpffs] 2023-05-31 19:38:12.275 [INFO][1] init-best-effort/calico-init_linux.go 57: Checking if BPF filesystem is mounted.\n"} +{"Time":"2023-05-31T19:39:00.158345711Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/mount-bpffs] 2023-05-31 19:38:12.276 [INFO][1] init-best-effort/calico-init_linux.go 69: BPF filesystem is mounted.\n"} +{"Time":"2023-05-31T19:39:00.158349673Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/mount-bpffs] 2023-05-31 19:38:12.276 [INFO][1] init-best-effort/calico-init_linux.go 92: Checking if cgroup2 filesystem is mounted.\n"} +{"Time":"2023-05-31T19:39:00.158357453Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/mount-bpffs] 2023-05-31 19:38:12.276 [INFO][1] init-best-effort/calico-init_linux.go 120: Cgroup2 filesystem is not mounted. Trying to mount it...\n"} +{"Time":"2023-05-31T19:39:00.158361143Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/mount-bpffs] 2023-05-31 19:38:12.277 [INFO][1] init-best-effort/calico-init_linux.go 126: Mount point /run/calico/cgroup is ready for mounting root cgroup2 fs.\n"} +{"Time":"2023-05-31T19:39:00.158366433Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/mount-bpffs] 2023-05-31 19:38:12.284 [INFO][1] init-best-effort/calico-init_linux.go 135: Mounted root cgroup2 filesystem.\n"} +{"Time":"2023-05-31T19:39:00.158370837Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.054 [INFO][66] felix/endpoint_mgr.go 602: Updating per-endpoint chains. id=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-8ml56\", EndpointId:\"eth0\"}\n"} +{"Time":"2023-05-31T19:39:00.158375515Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.054 [INFO][66] felix/table.go 508: Queueing update of chain. chainName=\"cali-tw-cali8c2aea08bab\" ipVersion=0x4 table=\"filter\"\n"} +{"Time":"2023-05-31T19:39:00.158379753Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.054 [INFO][66] felix/table.go 508: Queueing update of chain. chainName=\"cali-fw-cali8c2aea08bab\" ipVersion=0x4 table=\"filter\"\n"} +{"Time":"2023-05-31T19:39:00.158385708Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.054 [INFO][66] felix/endpoint_mgr.go 648: Updating endpoint routes. id=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-8ml56\", EndpointId:\"eth0\"}\n"} +{"Time":"2023-05-31T19:39:00.158390118Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.054 [INFO][66] felix/endpoint_mgr.go 1215: Applying /proc/sys configuration to interface. ifaceName=\"cali8c2aea08bab\"\n"} +{"Time":"2023-05-31T19:39:00.158401858Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.054 [INFO][66] felix/endpoint_mgr.go 490: Re-evaluated workload endpoint status adminUp=true failed=false known=true operUp=true status=\"up\" workloadEndpointID=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-8ml56\", EndpointId:\"eth0\"}\n"} +{"Time":"2023-05-31T19:39:00.158407425Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.054 [INFO][66] felix/status_combiner.go 58: Storing endpoint status update ipVersion=0x4 status=\"up\" workload=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-8ml56\", EndpointId:\"eth0\"}\n"} +{"Time":"2023-05-31T19:39:00.158412535Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.063 [INFO][66] felix/status_combiner.go 81: Endpoint up for at least one IP version id=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-8ml56\", EndpointId:\"eth0\"} ipVersion=0x4 status=\"up\"\n"} +{"Time":"2023-05-31T19:39:00.15841718Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:39.064 [INFO][66] felix/status_combiner.go 98: Reporting combined status. id=proto.WorkloadEndpointID{OrchestratorId:\"k8s\", WorkloadId:\"default/netcat-7458db8b8-8ml56\", EndpointId:\"eth0\"} status=\"up\"\n"} +{"Time":"2023-05-31T19:39:00.158424338Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-node-pxmfk/calico-node] 2023-05-31 19:38:47.917 [INFO][66] felix/int_dataplane.go 1693: Received *proto.HostMetadataV4V6Update update from calculation graph msg=hostname:\"calico-509041\" ipv4_addr:\"192.168.122.243/24\" labels:\u003ckey:\"beta.kubernetes.io/arch\" value:\"amd64\" \u003e labels:\u003ckey:\"beta.kubernetes.io/os\" value:\"linux\" \u003e labels:\u003ckey:\"kubernetes.io/arch\" value:\"amd64\" \u003e labels:\u003ckey:\"kubernetes.io/hostname\" value:\"calico-509041\" \u003e labels:\u003ckey:\"kubernetes.io/os\" value:\"linux\" \u003e labels:\u003ckey:\"minikube.k8s.io/commit\" value:\"7022875d4a054c2d518e5e5a7b9d500799d50140\" \u003e labels:\u003ckey:\"minikube.k8s.io/name\" value:\"calico-509041\" \u003e labels:\u003ckey:\"minikube.k8s.io/primary\" value:\"true\" \u003e labels:\u003ckey:\"minikube.k8s.io/updated_at\" value:\"2023_05_31T19_37_47_0700\" \u003e labels:\u003ckey:\"minikube.k8s.io/version\" value:\"v1.30.1\" \u003e labels:\u003ckey:\"node-role.kubernetes.io/control-plane\" value:\"\" \u003e labels:\u003ckey:\"node.kubernetes.io/exclude-from-external-load-balancers\" value:\"\" \u003e \n"} +{"Time":"2023-05-31T19:39:00.15858071Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.158592723Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.158596161Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico daemon set container(s) logs (previous):\n"} +{"Time":"2023-05-31T19:39:00.158599905Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"mount-bpffs\" in pod \"calico-node-pxmfk\" not found\n"} +{"Time":"2023-05-31T19:39:00.158604415Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"calico-node\" in pod \"calico-node-pxmfk\" not found\n"} +{"Time":"2023-05-31T19:39:00.158608307Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"upgrade-ipam\" in pod \"calico-node-pxmfk\" not found\n"} +{"Time":"2023-05-31T19:39:00.158611703Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"install-cni\" in pod \"calico-node-pxmfk\" not found\n"} +{"Time":"2023-05-31T19:39:00.158614923Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.15861781Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.158621048Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico deployment:\n"} +{"Time":"2023-05-31T19:39:00.158624237Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.15862758Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.158631241Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CreationTimestamp: Wed, 31 May 2023 19:37:47 +0000\n"} +{"Time":"2023-05-31T19:39:00.158634422Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.158637537Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:39:00.158641397Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.15864453Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:39:00.159022502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StrategyType: Recreate\n"} +{"Time":"2023-05-31T19:39:00.159036006Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:39:00.159041543Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:00.159045146Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.159049506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.159053877Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.159067837Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-kube-controllers:\n"} +{"Time":"2023-05-31T19:39:00.159072365Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/kube-controllers:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.159077172Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.15908157Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.159086224Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: exec [/usr/bin/check-status -l] delay=10s timeout=10s period=10s #success=1 #failure=6\n"} +{"Time":"2023-05-31T19:39:00.159091058Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: exec [/usr/bin/check-status -r] delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:00.159094785Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.159101953Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ENABLED_CONTROLLERS: node\n"} +{"Time":"2023-05-31T19:39:00.159106291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DATASTORE_TYPE: kubernetes\n"} +{"Time":"2023-05-31T19:39:00.159110184Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.159113849Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.159117227Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:39:00.159120674Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.159124374Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:39:00.159128091Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:39:00.159131411Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:39:00.159135491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:39:00.159139179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.159509084Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NewReplicaSet: calico-kube-controllers-674fff74c8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:39:00.1595217Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.159525504Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.159529312Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.159533179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal ScalingReplicaSet 56s deployment-controller Scaled up replica set calico-kube-controllers-674fff74c8 to 1\n"} +{"Time":"2023-05-31T19:39:00.159536841Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.159539978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.159543492Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico deployment pod(s):\n"} +{"Time":"2023-05-31T19:39:00.159547274Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: calico-kube-controllers-674fff74c8-q5hvv\n"} +{"Time":"2023-05-31T19:39:00.159550907Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.159554087Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T19:39:00.159557356Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:39:00.159560689Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.159563761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-509041/192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.159567372Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 19:38:05 +0000\n"} +{"Time":"2023-05-31T19:39:00.159570585Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.159574136Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-hash=674fff74c8\n"} +{"Time":"2023-05-31T19:39:00.15957799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: cni.projectcalico.org/containerID: 81f715d37c79c869e620e4771c8fd06509d0ab6387e0ab3c95c03116dbc75b2c\n"} +{"Time":"2023-05-31T19:39:00.15958153Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIP: 10.244.4.193/32\n"} +{"Time":"2023-05-31T19:39:00.159585049Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni.projectcalico.org/podIPs: 10.244.4.193/32\n"} +{"Time":"2023-05-31T19:39:00.159588588Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:00.159591783Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.4.193\n"} +{"Time":"2023-05-31T19:39:00.159595024Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:00.15984588Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 10.244.4.193\n"} +{"Time":"2023-05-31T19:39:00.159856937Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: ReplicaSet/calico-kube-controllers-674fff74c8\n"} +{"Time":"2023-05-31T19:39:00.159861648Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.159865425Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico-kube-controllers:\n"} +{"Time":"2023-05-31T19:39:00.159869305Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://4fa4ddfb09c3c077fe4f061107f0ed9c7727e804800648d925f592a8187ce61c\n"} +{"Time":"2023-05-31T19:39:00.159901802Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: docker.io/calico/kube-controllers:v3.25.1\n"} +{"Time":"2023-05-31T19:39:00.159906978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: docker.io/calico/kube-controllers@sha256:02c1232ee4b8c5a145c401ac1adb34a63ee7fc46b70b6ad0a4e068a774f25f8a\n"} +{"Time":"2023-05-31T19:39:00.159911574Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.159915521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.159918573Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:00.159922231Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:38:25 +0000\n"} +{"Time":"2023-05-31T19:39:00.159925791Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.159929314Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.159933802Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Liveness: exec [/usr/bin/check-status -l] delay=10s timeout=10s period=10s #success=1 #failure=6\n"} +{"Time":"2023-05-31T19:39:00.159937851Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Readiness: exec [/usr/bin/check-status -r] delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:00.159941988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.159945541Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ENABLED_CONTROLLERS: node\n"} +{"Time":"2023-05-31T19:39:00.159949271Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DATASTORE_TYPE: kubernetes\n"} +{"Time":"2023-05-31T19:39:00.159953362Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.159957282Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-qsl7g (ro)\n"} +{"Time":"2023-05-31T19:39:00.159961635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.159965121Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:00.159968531Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:00.159972306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:00.160258611Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:00.160271315Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:00.160275916Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.160280441Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-qsl7g:\n"} +{"Time":"2023-05-31T19:39:00.160285397Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:00.16029068Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:00.160295285Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.160299779Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:00.160305016Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:00.160312613Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:39:00.160317606Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:00.160322549Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:39:00.160327537Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T19:39:00.160332337Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node-role.kubernetes.io/master:NoSchedule\n"} +{"Time":"2023-05-31T19:39:00.160336807Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:00.16034113Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:00.160344663Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.160348107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.160352424Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.160357452Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedScheduling 56s default-scheduler 0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..\n"} +{"Time":"2023-05-31T19:39:00.160362886Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 49s default-scheduler Successfully assigned kube-system/calico-kube-controllers-674fff74c8-q5hvv to calico-509041\n"} +{"Time":"2023-05-31T19:39:00.160653465Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedCreatePodSandBox 48s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to setup network for sandbox \"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\n"} +{"Time":"2023-05-31T19:39:00.160675038Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal SandboxChanged 36s (x2 over 48s) kubelet Pod sandbox changed, it will be killed and re-created.\n"} +{"Time":"2023-05-31T19:39:00.160682267Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulling 33s kubelet Pulling image \"docker.io/calico/kube-controllers:v3.25.1\"\n"} +{"Time":"2023-05-31T19:39:00.160687835Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 29s kubelet Successfully pulled image \"docker.io/calico/kube-controllers:v3.25.1\" in 3.111273802s (3.111287673s including waiting)\n"} +{"Time":"2023-05-31T19:39:00.160691977Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 29s kubelet Created container calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.160696188Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 29s kubelet Started container calico-kube-controllers\n"} +{"Time":"2023-05-31T19:39:00.160699797Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.160703568Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.160707244Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico deployment container(s) logs (current):\n"} +{"Time":"2023-05-31T19:39:00.160711797Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] 2023-05-31 19:38:25.431 [INFO][1] watchersyncer.go 209: Received InSync event from one of the watcher caches\n"} +{"Time":"2023-05-31T19:39:00.160716702Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] 2023-05-31 19:38:25.431 [INFO][1] watchersyncer.go 221: All watchers have sync'd data - sending data and final sync\n"} +{"Time":"2023-05-31T19:39:00.160720687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] 2023-05-31 19:38:25.431 [INFO][1] watchersyncer.go 130: Sending status update Status=in-sync\n"} +{"Time":"2023-05-31T19:39:00.160724935Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] 2023-05-31 19:38:25.431 [INFO][1] syncer.go 86: Node controller syncer status updated: in-sync\n"} +{"Time":"2023-05-31T19:39:00.160728648Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] 2023-05-31 19:38:25.439 [INFO][1] hostendpoints.go 173: successfully synced all hostendpoints\n"} +{"Time":"2023-05-31T19:39:00.160732498Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] I0531 19:38:25.506258 1 shared_informer.go:262] Caches are synced for nodes\n"} +{"Time":"2023-05-31T19:39:00.161004711Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] I0531 19:38:25.506309 1 shared_informer.go:255] Waiting for caches to sync for pods\n"} +{"Time":"2023-05-31T19:39:00.161014404Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] I0531 19:38:25.506332 1 shared_informer.go:262] Caches are synced for pods\n"} +{"Time":"2023-05-31T19:39:00.161018761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] 2023-05-31 19:38:25.506 [INFO][1] ipam.go 253: Will run periodic IPAM sync every 7m30s\n"} +{"Time":"2023-05-31T19:39:00.161022548Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [pod/calico-kube-controllers-674fff74c8-q5hvv/calico-kube-controllers] 2023-05-31 19:38:25.506 [INFO][1] ipam.go 331: Syncer is InSync, kicking sync channel status=in-sync\n"} +{"Time":"2023-05-31T19:39:00.161026501Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.161029778Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.161033218Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico deployment container(s) logs (previous):\n"} +{"Time":"2023-05-31T19:39:00.161037379Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: previous terminated container \"calico-kube-controllers\" in pod \"calico-kube-controllers-674fff74c8-q5hvv\" not found\n"} +{"Time":"2023-05-31T19:39:00.16104101Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.16104463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.161048205Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:39:00.16105248Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161056213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161059631Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:00.161063412Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161066919Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:39:00.16107102Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:39:00.161074544Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:39:00.161078Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:39:00.161081681Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:39:00.161085421Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:39:00.161367546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:39:00.161373299Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:00.161376681Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161380341Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161383827Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.161386948Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:39:00.161390312Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:39:00.161394019Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.161397486Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.161400871Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.161404062Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161407465Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:39:00.161410694Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:39:00.161414086Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.161417238Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:00.161420431Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.161423413Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:39:00.161426256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:39:00.161428282Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:39:00.161430552Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.161432468Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:39:00.161434428Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:00.161438383Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161441312Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:00.161443232Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:39:00.161445193Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.161840999Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:39:00.161849903Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:39:00.161853708Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:39:00.161857808Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.161861659Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:39:00.161865333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.161868742Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:00.161872245Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.161875788Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.161879639Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.161883651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal SuccessfulCreate 56s daemonset-controller Created pod: kube-proxy-55wvc\n"} +{"Time":"2023-05-31T19:39:00.161887207Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.161890547Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.161894132Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:39:00.161909161Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-proxy-55wvc\n"} +{"Time":"2023-05-31T19:39:00.161913458Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.161917331Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:39:00.161921404Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:00.161924864Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161928229Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node: calico-509041/192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.161931951Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Start Time: Wed, 31 May 2023 19:37:58 +0000\n"} +{"Time":"2023-05-31T19:39:00.161935481Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T19:39:00.161939093Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.161942873Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:39:00.161946417Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.162150606Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:00.162157716Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.162161188Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:00.162166953Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP: 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.162169981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.16217335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:00.162176268Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:39:00.162179354Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Container ID: containerd://bb3683e651982f3f5c68ff338549781f4ecbbcd526bf1fd4d75a259aae2e4f92\n"} +{"Time":"2023-05-31T19:39:00.162182906Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:39:00.162186287Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Image ID: registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T19:39:00.162189547Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.162192979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:00.162196126Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:00.162199116Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.162202354Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:39:00.162205216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:39:00.162208454Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:00.162211813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Started: Wed, 31 May 2023 19:38:00 +0000\n"} +{"Time":"2023-05-31T19:39:00.16221497Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:00.16221796Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:00.162220903Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:00.162223901Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:00.162226927Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:00.162229856Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:39:00.16223282Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:39:00.162641775Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:39:00.162653501Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-sbcm4 (ro)\n"} +{"Time":"2023-05-31T19:39:00.162657298Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:00.1626604Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:00.162663616Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:00.16266665Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:00.162669956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:00.162673199Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:00.162676099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:00.162679591Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:39:00.16268316Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:00.162686528Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.162689642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:00.162692525Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:39:00.16269564Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.162698772Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:39:00.162702122Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:39:00.162705338Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:39:00.162708564Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:00.162711972Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:39:00.162715443Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:00.162718391Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-api-access-sbcm4:\n"} +{"Time":"2023-05-31T19:39:00.16272145Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:00.162724731Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:00.162727901Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.162731058Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:00.163126981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:00.163135588Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:39:00.163139994Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:00.163143927Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T19:39:00.16314802Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.163151899Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.163155908Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.163160082Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:00.163166578Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.163170794Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:00.163174596Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:00.163178186Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:00.163181577Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:00.163185155Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:00.163189642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Scheduled 56s default-scheduler Successfully assigned kube-system/kube-proxy-55wvc to calico-509041\n"} +{"Time":"2023-05-31T19:39:00.16319358Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Warning FailedMount 55s kubelet MountVolume.SetUp failed for volume \"kube-proxy\" : failed to sync configmap cache: timed out waiting for the condition\n"} +{"Time":"2023-05-31T19:39:00.163197733Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Pulled 54s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:39:00.163202243Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Created 54s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.163206216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Normal Started 54s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.163209881Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.16321335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.16346745Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:39:00.163473352Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.655706 1 node.go:141] Successfully retrieved node IP: 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.16347686Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.656032 1 server_others.go:110] \"Detected node IP\" address=\"192.168.39.162\"\n"} +{"Time":"2023-05-31T19:39:00.163480582Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.656083 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T19:39:00.163484359Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.749486 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T19:39:00.163488294Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.749550 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T19:39:00.163492325Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.749584 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T19:39:00.163496369Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.749927 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T19:39:00.163500077Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.750043 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:39:00.163504046Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.751154 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T19:39:00.163507682Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.751190 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T19:39:00.163511166Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.751213 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T19:39:00.163514824Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.751216 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T19:39:00.163519907Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.751577 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T19:39:00.163523303Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.751635 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T19:39:00.163526607Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.851860 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T19:39:00.163529245Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.851926 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T19:39:00.163531261Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" I0531 19:38:00.852102 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T19:39:00.163805168Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.163817407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.163822609Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:39:00.1638276Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:39:00.163832919Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: loaded (\u001b]8;;file://calico-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:39:00.16383881Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T19:39:00.163843021Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─\u001b]8;;file://calico-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:39:00.163848562Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:45 UTC; 1min 9s ago\r\n"} +{"Time":"2023-05-31T19:39:00.163853672Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:39:00.163857964Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Main PID: 1228 (kubelet)\r\n"} +{"Time":"2023-05-31T19:39:00.163862334Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tasks: 11 (limit: 3251)\r\n"} +{"Time":"2023-05-31T19:39:00.163867029Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Memory: 35.4M\r\n"} +{"Time":"2023-05-31T19:39:00.163871414Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T19:39:00.163876602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─1228 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=calico-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.39.162\r\n"} +{"Time":"2023-05-31T19:39:00.163881829Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.16389288Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:24 calico-509041 kubelet[1228]: I0531 19:38:24.000408 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-n2w2j\" podStartSLOduration=26.000318344 podCreationTimestamp=\"2023-05-31 19:37:58 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:22.98879789 +0000 UTC m=+37.402011740\" watchObservedRunningTime=\"2023-05-31 19:38:24.000318344 +0000 UTC m=+38.413532193\"\r\n"} +{"Time":"2023-05-31T19:39:00.163901774Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:26 calico-509041 kubelet[1228]: I0531 19:38:26.082588 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/calico-kube-controllers-674fff74c8-q5hvv\" podStartSLOduration=24.971254683 podCreationTimestamp=\"2023-05-31 19:37:58 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:38:21.992295872 +0000 UTC m=+36.405509717\" lastFinishedPulling=\"2023-05-31 19:38:25.103595998 +0000 UTC m=+39.516809844\" observedRunningTime=\"2023-05-31 19:38:26.006367822 +0000 UTC m=+40.419581674\" watchObservedRunningTime=\"2023-05-31 19:38:26.08255481 +0000 UTC m=+40.495768666\"\r\n"} +{"Time":"2023-05-31T19:39:00.164193987Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:34 calico-509041 kubelet[1228]: I0531 19:38:34.192751 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.164205353Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:34 calico-509041 kubelet[1228]: I0531 19:38:34.393604 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-rgkzc\\\" (UniqueName: \\\"kubernetes.io/projected/2c291b26-31d2-40ec-af8d-14b0fa56e948-kube-api-access-rgkzc\\\") pod \\\"netcat-7458db8b8-8ml56\\\" (UID: \\\"2c291b26-31d2-40ec-af8d-14b0fa56e948\\\") \" pod=\"default/netcat-7458db8b8-8ml56\"\r\n"} +{"Time":"2023-05-31T19:39:00.164211957Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:45 calico-509041 kubelet[1228]: E0531 19:38:45.823484 1228 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:39:00.164217264Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:45 calico-509041 kubelet[1228]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:39:00.164222364Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:45 calico-509041 kubelet[1228]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:39:00.164226699Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:45 calico-509041 kubelet[1228]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:39:00.1642313Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:50 calico-509041 kubelet[1228]: E0531 19:38:50.378840 1228 upgradeaware.go:440] Error proxying data from backend to client: read tcp 192.168.122.243:48024-\u003e192.168.122.243:10010: read: connection reset by peer\r\n"} +{"Time":"2023-05-31T19:39:00.164236615Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:50 calico-509041 kubelet[1228]: E0531 19:38:50.730116 1228 upgradeaware.go:440] Error proxying data from backend to client: read tcp 192.168.122.243:48034-\u003e192.168.122.243:10010: read: connection reset by peer\r\n"} +{"Time":"2023-05-31T19:39:00.164241008Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.164244485Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.164248709Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:39:00.164253717Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.164258739Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:00.164356825Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:39:00.164367804Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T19:39:00.164372468Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T19:39:00.164376535Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.164380616Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:00.16438461Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T19:39:00.164388397Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:39:00.164392281Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T19:39:00.164396446Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T19:39:00.164400168Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.164404137Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:00.164408006Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:00.164411734Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.164415787Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.164420436Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:00.164424105Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Wants=containerd.service\r\n"} +{"Time":"2023-05-31T19:39:00.16442754Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.164431361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:00.164433773Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T19:39:00.164436575Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=calico-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.39.162\r\n"} +{"Time":"2023-05-31T19:39:00.164439499Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.164443846Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:00.164446162Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.16444837Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.164450632Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:39:00.164751765Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -- Journal begins at Wed 2023-05-31 19:37:06 UTC, ends at Wed 2023-05-31 19:38:55 UTC. --\r\n"} +{"Time":"2023-05-31T19:39:00.164761915Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:39:00.164766339Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.164772063Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.164776898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.164781445Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.164787002Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.164791957Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.164796905Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 539.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.16480188Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:39:00.164807261Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.700302 861 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:39:00.164812293Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.700384 861 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:39:00.164817526Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.700600 861 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:39:00.164822535Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.705883 861 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:39:00.164828069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.706207 861 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.16517955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.711194 861 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:39:00.16518703Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.711798 861 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:39:00.165192375Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.711892 861 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:39:00.165198543Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.712029 861 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:39:00.165202731Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.712132 861 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:39:00.165206703Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.712233 861 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:00.165210785Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.718761 861 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:39:00.165214576Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.718843 861 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:39:00.165218358Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.718918 861 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:39:00.165221583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.719056 861 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:39:00.165571631Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: W0531 19:37:37.719354 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcalico-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.165580595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.719466 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcalico-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.165585482Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: W0531 19:37:37.720282 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.165590225Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.720407 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.16559451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.720559 861 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:39:00.165599068Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: W0531 19:37:37.721238 861 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T19:39:00.165602903Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.722072 861 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:39:00.16560694Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.723702 861 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:39:00.165610927Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.727245 861 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:39:00.165616044Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.731387 861 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"calico-509041.1764519440784958\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"calico-509041\", UID:\"calico-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"calico-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 37, 37, 722042712, time.Local), LastTimestamp:time.Date("} +{"Time":"2023-05-31T19:39:00.166000913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"2023, time.May, 31, 19, 37, 37, 722042712, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.39.162:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:39:00.166012551Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.732497 861 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:39:00.166016784Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.738311 861 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:39:00.166021669Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.739655 861 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:39:00.166026049Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.740380 861 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:39:00.166030524Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: W0531 19:37:37.742052 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.166035747Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.742164 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.166040714Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.742302 861 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/calico-509041?timeout=10s\\\": dial tcp 192.168.39.162:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T19:39:00.16639323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.762399 861 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:39:00.166399198Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.764684 861 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:39:00.166403216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.764738 861 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:39:00.166407004Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.764757 861 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:39:00.166411129Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.764808 861 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:39:00.166415835Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: W0531 19:37:37.777269 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.166420977Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.777360 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.166427652Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.786569 861 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:39:00.166431832Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:39:00.166435931Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:39:00.166439941Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:39:00.166443657Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.801085 861 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:39:00.167029569Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.801151 861 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:39:00.167041202Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.801192 861 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:00.167046512Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.807038 861 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:39:00.167050141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.807757 861 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:39:00.167053284Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.807816 861 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:00.167057144Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.823682 861 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:39:00.167081108Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.823938 861 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:39:00.167087956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.825492 861 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"calico-509041\\\" not found\"\r\n"} +{"Time":"2023-05-31T19:39:00.167092541Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.840888 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.167096772Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.841366 861 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.39.162:8443: connect: connection refused\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.167101353Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.865859 861 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.167104543Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.867481 861 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.16710829Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.869289 861 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.167112131Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: I0531 19:37:37.870545 861 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.168605051Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:37 calico-509041 kubelet[861]: E0531 19:37:37.944133 861 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/calico-509041?timeout=10s\\\": dial tcp 192.168.39.162:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T19:39:00.168615833Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.040853 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/9178776881b95e8226c611372f50adb2-k8s-certs\\\") pod \\\"kube-apiserver-calico-509041\\\" (UID: \\\"9178776881b95e8226c611372f50adb2\\\") \" pod=\"kube-system/kube-apiserver-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.168621378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.040924 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-ca-certs\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.168636137Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041015 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-kubeconfig\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.168641627Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041045 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/7c7fbf1a7d607306c9b85fde01332df4-etcd-data\\\") pod \\\"etcd-calico-509041\\\" (UID: \\\"7c7fbf1a7d607306c9b85fde01332df4\\\") \" pod=\"kube-system/etcd-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.168646483Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041071 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/9178776881b95e8226c611372f50adb2-ca-certs\\\") pod \\\"kube-apiserver-calico-509041\\\" (UID: \\\"9178776881b95e8226c611372f50adb2\\\") \" pod=\"kube-system/kube-apiserver-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.168651811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041096 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/9178776881b95e8226c611372f50adb2-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-calico-509041\\\" (UID: \\\"9178776881b95e8226c611372f50adb2\\\") \" pod=\"kube-system/kube-apiserver-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171576517Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041125 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-flexvolume-dir\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171586133Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041150 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-k8s-certs\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171591736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041215 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171597431Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041239 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/e0c2ff77c8b4ad6cd1c1a3f888c8074d-kubeconfig\\\") pod \\\"kube-scheduler-calico-509041\\\" (UID: \\\"e0c2ff77c8b4ad6cd1c1a3f888c8074d\\\") \" pod=\"kube-system/kube-scheduler-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171602607Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.041257 861 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/7c7fbf1a7d607306c9b85fde01332df4-etcd-certs\\\") pod \\\"etcd-calico-509041\\\" (UID: \\\"7c7fbf1a7d607306c9b85fde01332df4\\\") \" pod=\"kube-system/etcd-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171607479Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.043154 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171611783Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: E0531 19:37:38.043555 861 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.39.162:8443: connect: connection refused\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.17161665Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: E0531 19:37:38.346351 861 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/calico-509041?timeout=10s\\\": dial tcp 192.168.39.162:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T19:39:00.17162252Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: I0531 19:37:38.445336 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171630014Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: E0531 19:37:38.445723 861 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.39.162:8443: connect: connection refused\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171635535Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: W0531 19:37:38.858932 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.171640404Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: E0531 19:37:38.859222 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.171644602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: W0531 19:37:38.925331 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.171648945Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:38 calico-509041 kubelet[861]: E0531 19:37:38.925377 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.171654077Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:39 calico-509041 kubelet[861]: W0531 19:37:39.072402 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcalico-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.17165848Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:39 calico-509041 kubelet[861]: E0531 19:37:39.072450 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcalico-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.171663952Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:39 calico-509041 kubelet[861]: E0531 19:37:39.148483 861 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/calico-509041?timeout=10s\\\": dial tcp 192.168.39.162:8443: connect: connection refused\" interval=\"1.6s\"\r\n"} +{"Time":"2023-05-31T19:39:00.171668401Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:39 calico-509041 kubelet[861]: I0531 19:37:39.246929 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171672706Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:39 calico-509041 kubelet[861]: E0531 19:37:39.247326 861 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.39.162:8443: connect: connection refused\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171677554Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:39 calico-509041 kubelet[861]: W0531 19:37:39.282432 861 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.171681894Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:39 calico-509041 kubelet[861]: E0531 19:37:39.282565 861 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.171686827Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:39 calico-509041 kubelet[861]: E0531 19:37:39.787096 861 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.39.162:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:00.171690908Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:40 calico-509041 kubelet[861]: I0531 19:37:40.848328 861 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.1716946Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:42 calico-509041 kubelet[861]: E0531 19:37:42.457184 861 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"calico-509041\\\" not found\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171698637Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:42 calico-509041 kubelet[861]: I0531 19:37:42.484608 861 kubelet_node_status.go:73] \"Successfully registered node\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171705469Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:42 calico-509041 kubelet[861]: E0531 19:37:42.535559 861 event.go:280] Server rejected event '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"calico-509041.1764519440784958\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"calico-509041\", UID:\"calico-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"calico-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 37, 37, 722042712, time.Local), LastTimestamp:time.Date(2"} +{"Time":"2023-05-31T19:39:00.171712797Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"023, time.May, 31, 19, 37, 37, 722042712, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'namespaces \"default\" not found' (will not retry!)\r\n"} +{"Time":"2023-05-31T19:39:00.171719278Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:42 calico-509041 kubelet[861]: E0531 19:37:42.597618 861 event.go:280] Server rejected event '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"calico-509041.17645194451b9bf0\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"calico-509041\", UID:\"calico-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"NodeHasSufficientMemory\", Message:\"Node calico-509041 status is now: NodeHasSufficientMemory\", Source:v1.EventSource{Component:\"kubelet\", Host:\"calico-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 37"} +{"Time":"2023-05-31T19:39:00.171725751Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":", 37, 799855088, time.Local), LastTimestamp:time.Date(2023, time.May, 31, 19, 37, 37, 799855088, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'namespaces \"default\" not found' (will not retry!)\r\n"} +{"Time":"2023-05-31T19:39:00.17173002Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:42 calico-509041 kubelet[861]: I0531 19:37:42.721132 861 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:39:00.171733871Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:42 calico-509041 kubelet[861]: I0531 19:37:42.740174 861 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:39:00.171738829Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:42 calico-509041 kubelet[861]: I0531 19:37:42.770461 861 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:39:00.171742959Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:42 calico-509041 kubelet[861]: E0531 19:37:42.830792 861 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-calico-509041\\\" is forbidden: no PriorityClass with name system-node-critical was found\" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.171746947Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T19:39:00.171751891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171755991Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171760225Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171763778Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171767166Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171770644Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171774223Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 593.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.17177756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 systemd[1]: kubelet.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:39:00.171781162Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171784983Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171788768Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171792211Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171795638Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171799301Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:39:00.171803511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171808565Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171811999Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171815498Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.17181898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171822591Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171826016Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 593 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.17182963Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:39:00.171833868Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171837542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171841212Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.17184496Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171848346Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171852017Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171855388Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 593.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.171859266Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:39:00.171863397Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.705932 1228 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:39:00.171868213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.706055 1228 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:39:00.171872053Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.706209 1228 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:39:00.17187595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.707746 1228 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T19:39:00.171880093Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.709118 1228 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:39:00.171884664Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.712112 1228 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:39:00.171889688Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.712514 1228 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:39:00.171894525Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.712552 1228 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:39:00.171914424Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.712565 1228 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:39:00.171919514Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.712574 1228 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:39:00.171923164Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.712594 1228 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:00.171926659Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.718822 1228 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:39:00.171931917Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.718929 1228 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:39:00.171936054Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.719101 1228 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:39:00.171939624Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.719198 1228 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:39:00.171943504Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.720400 1228 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:39:00.171947361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.721104 1228 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:39:00.171950698Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.724654 1228 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:39:00.171954116Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.733536 1228 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:39:00.171957726Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.735204 1228 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:39:00.171961105Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.743801 1228 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:39:00.171965323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.744177 1228 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:39:00.171968881Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.763276 1228 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:39:00.17197269Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.769575 1228 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:39:00.171977231Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.780645 1228 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:39:00.171981378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.780696 1228 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:39:00.171984988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.780718 1228 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:39:00.171990648Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: E0531 19:37:45.780754 1228 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:39:00.171994974Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: E0531 19:37:45.802036 1228 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:39:00.171998886Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:39:00.172002536Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:39:00.172005973Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:39:00.172009786Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.858746 1228 kubelet_node_status.go:70] \"Attempting to register node\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172013584Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.881081 1228 kubelet_node_status.go:108] \"Node was previously registered\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172017143Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.884650 1228 kubelet_node_status.go:73] \"Successfully registered node\" node=\"calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172021043Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: E0531 19:37:45.885184 1228 kubelet.go:2281] \"Skipping pod synchronization\" err=\"container runtime status check may not have completed yet\"\r\n"} +{"Time":"2023-05-31T19:39:00.172024792Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.989464 1228 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:39:00.172028783Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.989512 1228 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:39:00.17203237Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.989531 1228 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:00.172036376Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.989662 1228 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T19:39:00.172040097Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.989704 1228 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T19:39:00.172044369Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.989713 1228 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:39:00.172048094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.990868 1228 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:39:00.172051677Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.991185 1228 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:00.172056241Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.991698 1228 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T19:39:00.172060067Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.993181 1228 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:39:00.172063974Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:45 calico-509041 kubelet[1228]: I0531 19:37:45.994584 1228 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:39:00.172067325Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.086025 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172072262Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.086235 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172075592Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.086314 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172078814Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.086383 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172083089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: E0531 19:37:46.121597 1228 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-calico-509041\\\" already exists\" pod=\"kube-system/kube-apiserver-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172087734Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.172683 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-ca-certs\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172092932Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.172755 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172098738Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.172778 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/9178776881b95e8226c611372f50adb2-ca-certs\\\") pod \\\"kube-apiserver-calico-509041\\\" (UID: \\\"9178776881b95e8226c611372f50adb2\\\") \" pod=\"kube-system/kube-apiserver-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172105337Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.172806 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/9178776881b95e8226c611372f50adb2-k8s-certs\\\") pod \\\"kube-apiserver-calico-509041\\\" (UID: \\\"9178776881b95e8226c611372f50adb2\\\") \" pod=\"kube-system/kube-apiserver-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172110164Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.172829 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/7c7fbf1a7d607306c9b85fde01332df4-etcd-certs\\\") pod \\\"etcd-calico-509041\\\" (UID: \\\"7c7fbf1a7d607306c9b85fde01332df4\\\") \" pod=\"kube-system/etcd-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.17211503Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.172906 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/7c7fbf1a7d607306c9b85fde01332df4-etcd-data\\\") pod \\\"etcd-calico-509041\\\" (UID: \\\"7c7fbf1a7d607306c9b85fde01332df4\\\") \" pod=\"kube-system/etcd-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172120411Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.172932 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/9178776881b95e8226c611372f50adb2-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-calico-509041\\\" (UID: \\\"9178776881b95e8226c611372f50adb2\\\") \" pod=\"kube-system/kube-apiserver-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172125334Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.173009 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-flexvolume-dir\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172130214Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.173034 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-k8s-certs\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172136799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.173051 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/595fc52e878772f8e2a9516e1cd55ac6-kubeconfig\\\") pod \\\"kube-controller-manager-calico-509041\\\" (UID: \\\"595fc52e878772f8e2a9516e1cd55ac6\\\") \" pod=\"kube-system/kube-controller-manager-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172142163Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.173070 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/e0c2ff77c8b4ad6cd1c1a3f888c8074d-kubeconfig\\\") pod \\\"kube-scheduler-calico-509041\\\" (UID: \\\"e0c2ff77c8b4ad6cd1c1a3f888c8074d\\\") \" pod=\"kube-system/kube-scheduler-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172146499Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.731215 1228 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:39:00.172150204Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.764281 1228 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:39:00.172153894Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.779670 1228 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:39:00.172218963Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: E0531 19:37:46.840634 1228 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-calico-509041\\\" already exists\" pod=\"kube-system/kube-apiserver-calico-509041\"\r\n"} +{"Time":"2023-05-31T19:39:00.172225527Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.893229 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-calico-509041\" podStartSLOduration=0.893193352 podCreationTimestamp=\"2023-05-31 19:37:46 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:46.875446616 +0000 UTC m=+1.288660451\" watchObservedRunningTime=\"2023-05-31 19:37:46.893193352 +0000 UTC m=+1.306407203\"\r\n"} +{"Time":"2023-05-31T19:39:00.172231862Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.906687 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-calico-509041\" podStartSLOduration=3.906661546 podCreationTimestamp=\"2023-05-31 19:37:43 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:46.893770849 +0000 UTC m=+1.306984699\" watchObservedRunningTime=\"2023-05-31 19:37:46.906661546 +0000 UTC m=+1.319875390\"\r\n"} +{"Time":"2023-05-31T19:39:00.17223762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:46 calico-509041 kubelet[1228]: I0531 19:37:46.906781 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-calico-509041\" podStartSLOduration=0.906759611 podCreationTimestamp=\"2023-05-31 19:37:46 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:46.905554411 +0000 UTC m=+1.318768261\" watchObservedRunningTime=\"2023-05-31 19:37:46.906759611 +0000 UTC m=+1.319973490\"\r\n"} +{"Time":"2023-05-31T19:39:00.172243245Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:50 calico-509041 kubelet[1228]: I0531 19:37:50.504267 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-calico-509041\" podStartSLOduration=4.504234872 podCreationTimestamp=\"2023-05-31 19:37:46 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:37:46.918485584 +0000 UTC m=+1.331699434\" watchObservedRunningTime=\"2023-05-31 19:37:50.504234872 +0000 UTC m=+4.917448725\"\r\n"} +{"Time":"2023-05-31T19:39:00.17224806Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:57 calico-509041 kubelet[1228]: I0531 19:37:57.413621 1228 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:39:00.172252003Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:57 calico-509041 kubelet[1228]: I0531 19:37:57.415310 1228 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:39:00.172255985Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.219555 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172259597Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.223520 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172263613Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: W0531 19:37:58.229520 1228 reflector.go:533] object-\"kube-system\"/\"kube-proxy\": failed to list *v1.ConfigMap: configmaps \"kube-proxy\" is forbidden: User \"system:node:calico-509041\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'calico-509041' and this object\r\n"} +{"Time":"2023-05-31T19:39:00.172268939Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: E0531 19:37:58.229613 1228 reflector.go:148] object-\"kube-system\"/\"kube-proxy\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-proxy\" is forbidden: User \"system:node:calico-509041\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'calico-509041' and this object\r\n"} +{"Time":"2023-05-31T19:39:00.172275477Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257082 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/828c9126-93b6-46ef-8644-cffbc5c9b7d4-lib-modules\\\") pod \\\"kube-proxy-55wvc\\\" (UID: \\\"828c9126-93b6-46ef-8644-cffbc5c9b7d4\\\") \" pod=\"kube-system/kube-proxy-55wvc\"\r\n"} +{"Time":"2023-05-31T19:39:00.172280384Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257138 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/828c9126-93b6-46ef-8644-cffbc5c9b7d4-xtables-lock\\\") pod \\\"kube-proxy-55wvc\\\" (UID: \\\"828c9126-93b6-46ef-8644-cffbc5c9b7d4\\\") \" pod=\"kube-system/kube-proxy-55wvc\"\r\n"} +{"Time":"2023-05-31T19:39:00.172285105Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257159 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-net-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-cni-net-dir\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172289756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257240 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"var-run-calico\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-var-run-calico\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.17229629Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257288 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-lrxm6\\\" (UniqueName: \\\"kubernetes.io/projected/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-kube-api-access-lrxm6\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172301508Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257314 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-sbcm4\\\" (UniqueName: \\\"kubernetes.io/projected/828c9126-93b6-46ef-8644-cffbc5c9b7d4-kube-api-access-sbcm4\\\") pod \\\"kube-proxy-55wvc\\\" (UID: \\\"828c9126-93b6-46ef-8644-cffbc5c9b7d4\\\") \" pod=\"kube-system/kube-proxy-55wvc\"\r\n"} +{"Time":"2023-05-31T19:39:00.17230648Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257338 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"var-lib-calico\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-var-lib-calico\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172312056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257421 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-lib-modules\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172316989Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257439 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"bpffs\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-bpffs\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172321771Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257457 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-bin-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-cni-bin-dir\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.17232728Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257474 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"policysync\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-policysync\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172332466Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257495 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-xtables-lock\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172337241Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257520 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"sys-fs\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-sys-fs\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172342106Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257541 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"host-local-net-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-host-local-net-dir\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172347543Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257558 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/828c9126-93b6-46ef-8644-cffbc5c9b7d4-kube-proxy\\\") pod \\\"kube-proxy-55wvc\\\" (UID: \\\"828c9126-93b6-46ef-8644-cffbc5c9b7d4\\\") \" pod=\"kube-system/kube-proxy-55wvc\"\r\n"} +{"Time":"2023-05-31T19:39:00.172352531Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257583 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-log-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-cni-log-dir\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172357052Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:58 calico-509041 kubelet[1228]: I0531 19:37:58.257602 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"nodeproc\\\" (UniqueName: \\\"kubernetes.io/host-path/c41b2a76-e554-49b9-a5d5-be8fcfb647dd-nodeproc\\\") pod \\\"calico-node-pxmfk\\\" (UID: \\\"c41b2a76-e554-49b9-a5d5-be8fcfb647dd\\\") \" pod=\"kube-system/calico-node-pxmfk\"\r\n"} +{"Time":"2023-05-31T19:39:00.172361335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:59 calico-509041 kubelet[1228]: E0531 19:37:59.359729 1228 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition\r\n"} +{"Time":"2023-05-31T19:39:00.172365753Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:59 calico-509041 kubelet[1228]: E0531 19:37:59.360207 1228 nestedpendingoperations.go:348] Operation for \"{volumeName:kubernetes.io/configmap/828c9126-93b6-46ef-8644-cffbc5c9b7d4-kube-proxy podName:828c9126-93b6-46ef-8644-cffbc5c9b7d4 nodeName:}\" failed. No retries permitted until 2023-05-31 19:37:59.860186723 +0000 UTC m=+14.273400565 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/828c9126-93b6-46ef-8644-cffbc5c9b7d4-kube-proxy\") pod \"kube-proxy-55wvc\" (UID: \"828c9126-93b6-46ef-8644-cffbc5c9b7d4\") : failed to sync configmap cache: timed out waiting for the condition\r\n"} +{"Time":"2023-05-31T19:39:00.172372457Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:00 calico-509041 kubelet[1228]: I0531 19:38:00.891664 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-55wvc\" podStartSLOduration=2.891444477 podCreationTimestamp=\"2023-05-31 19:37:58 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:00.89079173 +0000 UTC m=+15.304005583\" watchObservedRunningTime=\"2023-05-31 19:38:00.891444477 +0000 UTC m=+15.304658328\"\r\n"} +{"Time":"2023-05-31T19:39:00.172377353Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.847560 1228 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T19:39:00.172382223Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.899806 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172385588Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.899908 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172389503Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.901605 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.172393357Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.929204 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/0946f008-98fc-4489-8c71-19f92b1aefc0-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"0946f008-98fc-4489-8c71-19f92b1aefc0\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:39:00.172399282Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.929275 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-ck9ct\\\" (UniqueName: \\\"kubernetes.io/projected/def6bc3f-c827-499d-89ca-f53f4d84ff64-kube-api-access-ck9ct\\\") pod \\\"coredns-5d78c9869d-n2w2j\\\" (UID: \\\"def6bc3f-c827-499d-89ca-f53f4d84ff64\\\") \" pod=\"kube-system/coredns-5d78c9869d-n2w2j\"\r\n"} +{"Time":"2023-05-31T19:39:00.172404378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.929301 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-zgtlt\\\" (UniqueName: \\\"kubernetes.io/projected/0946f008-98fc-4489-8c71-19f92b1aefc0-kube-api-access-zgtlt\\\") pod \\\"storage-provisioner\\\" (UID: \\\"0946f008-98fc-4489-8c71-19f92b1aefc0\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:39:00.172409201Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.929323 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/def6bc3f-c827-499d-89ca-f53f4d84ff64-config-volume\\\") pod \\\"coredns-5d78c9869d-n2w2j\\\" (UID: \\\"def6bc3f-c827-499d-89ca-f53f4d84ff64\\\") \" pod=\"kube-system/coredns-5d78c9869d-n2w2j\"\r\n"} +{"Time":"2023-05-31T19:39:00.172414165Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:05 calico-509041 kubelet[1228]: I0531 19:38:05.929346 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-qsl7g\\\" (UniqueName: \\\"kubernetes.io/projected/619222b6-92b6-448f-84ef-0e217b5462e6-kube-api-access-qsl7g\\\") pod \\\"calico-kube-controllers-674fff74c8-q5hvv\\\" (UID: \\\"619222b6-92b6-448f-84ef-0e217b5462e6\\\") \" pod=\"kube-system/calico-kube-controllers-674fff74c8-q5hvv\"\r\n"} +{"Time":"2023-05-31T19:39:00.17242483Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: E0531 19:38:06.463334 1228 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T19:39:00.172934867Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: E0531 19:38:06.463416 1228 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-n2w2j\"\r\n"} +{"Time":"2023-05-31T19:39:00.172947675Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: E0531 19:38:06.463437 1228 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/coredns-5d78c9869d-n2w2j\"\r\n"} +{"Time":"2023-05-31T19:39:00.172954197Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: E0531 19:38:06.463486 1228 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-n2w2j_kube-system(def6bc3f-c827-499d-89ca-f53f4d84ff64)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-n2w2j_kube-system(def6bc3f-c827-499d-89ca-f53f4d84ff64)\\\\\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\\\\\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\\\\\\\": plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-n2w2j\" podUID=def6bc3f-c827-499d-89ca-f53f4d84ff64\r\n"} +{"Time":"2023-05-31T19:39:00.172961618Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: E0531 19:38:06.480493 1228 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"\r\n"} +{"Time":"2023-05-31T19:39:00.172966506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: E0531 19:38:06.480542 1228 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-q5hvv\"\r\n"} +{"Time":"2023-05-31T19:39:00.172974651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: E0531 19:38:06.480562 1228 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" pod=\"kube-system/calico-kube-controllers-674fff74c8-q5hvv\"\r\n"} +{"Time":"2023-05-31T19:39:00.172981007Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: E0531 19:38:06.480604 1228 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"calico-kube-controllers-674fff74c8-q5hvv_kube-system(619222b6-92b6-448f-84ef-0e217b5462e6)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"calico-kube-controllers-674fff74c8-q5hvv_kube-system(619222b6-92b6-448f-84ef-0e217b5462e6)\\\\\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\\\\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\\\\\": plugin type=\\\\\\\"calico\\\\\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-q5hvv\" podUID=619222b6-92b6-448f-84ef-0e217b5462e6\r\n"} +{"Time":"2023-05-31T19:39:00.172987265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: I0531 19:38:06.897889 1228 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\"\r\n"} +{"Time":"2023-05-31T19:39:00.17299196Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: I0531 19:38:06.900230 1228 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\"\r\n"} +{"Time":"2023-05-31T19:39:00.172996644Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:06 calico-509041 kubelet[1228]: I0531 19:38:06.944584 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=6.944540326 podCreationTimestamp=\"2023-05-31 19:38:00 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:06.944118033 +0000 UTC m=+21.357331884\" watchObservedRunningTime=\"2023-05-31 19:38:06.944540326 +0000 UTC m=+21.357754175\"\r\n"} +{"Time":"2023-05-31T19:39:00.17300251Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:07 calico-509041 kubelet[1228]: E0531 19:38:07.054260 1228 remote_runtime.go:205] \"StopPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" podSandboxID=\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\"\r\n"} +{"Time":"2023-05-31T19:39:00.173007568Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:07 calico-509041 kubelet[1228]: E0531 19:38:07.054348 1228 kuberuntime_manager.go:1312] \"Failed to stop sandbox\" podSandboxID={Type:containerd ID:444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d}\r\n"} +{"Time":"2023-05-31T19:39:00.173012842Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:07 calico-509041 kubelet[1228]: E0531 19:38:07.054385 1228 kuberuntime_manager.go:1038] \"killPodWithSyncResult failed\" err=\"failed to \\\"KillPodSandbox\\\" for \\\"619222b6-92b6-448f-84ef-0e217b5462e6\\\" with KillPodSandboxError: \\\"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\\\\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\\\\\": plugin type=\\\\\\\"calico\\\\\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\"\r\n"} +{"Time":"2023-05-31T19:39:00.173019244Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:07 calico-509041 kubelet[1228]: E0531 19:38:07.054412 1228 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"KillPodSandbox\\\" for \\\"619222b6-92b6-448f-84ef-0e217b5462e6\\\" with KillPodSandboxError: \\\"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\\\\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\\\\\": plugin type=\\\\\\\"calico\\\\\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/calico-kube-controllers-674fff74c8-q5hvv\" podUID=619222b6-92b6-448f-84ef-0e217b5462e6\r\n"} +{"Time":"2023-05-31T19:39:00.173025626Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:07 calico-509041 kubelet[1228]: E0531 19:38:07.069665 1228 remote_runtime.go:205] \"StopPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\" podSandboxID=\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\"\r\n"} +{"Time":"2023-05-31T19:39:00.17303366Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:07 calico-509041 kubelet[1228]: E0531 19:38:07.069700 1228 kuberuntime_manager.go:1312] \"Failed to stop sandbox\" podSandboxID={Type:containerd ID:4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae}\r\n"} +{"Time":"2023-05-31T19:39:00.173043817Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:07 calico-509041 kubelet[1228]: E0531 19:38:07.069730 1228 kuberuntime_manager.go:1038] \"killPodWithSyncResult failed\" err=\"failed to \\\"KillPodSandbox\\\" for \\\"def6bc3f-c827-499d-89ca-f53f4d84ff64\\\" with KillPodSandboxError: \\\"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\\\\\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\\\\\\\": plugin type=\\\\\\\"calico\\\\\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\"\r\n"} +{"Time":"2023-05-31T19:39:00.173050822Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:07 calico-509041 kubelet[1228]: E0531 19:38:07.069756 1228 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"KillPodSandbox\\\" for \\\"def6bc3f-c827-499d-89ca-f53f4d84ff64\\\" with KillPodSandboxError: \\\"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\\\\\"4f2a2297d95326d09a7b745f24ac2cde2cfd536f0641b4ea7a956dd7c50808ae\\\\\\\": plugin type=\\\\\\\"calico\\\\\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\\\"\" pod=\"kube-system/coredns-5d78c9869d-n2w2j\" podUID=def6bc3f-c827-499d-89ca-f53f4d84ff64\r\n"} +{"Time":"2023-05-31T19:39:00.173056867Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:18 calico-509041 kubelet[1228]: I0531 19:38:18.960797 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/calico-node-pxmfk\" podStartSLOduration=7.593842785 podCreationTimestamp=\"2023-05-31 19:37:58 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:37:58.722632449 +0000 UTC m=+13.135846279\" lastFinishedPulling=\"2023-05-31 19:38:12.088576586 +0000 UTC m=+26.501790428\" observedRunningTime=\"2023-05-31 19:38:13.968318962 +0000 UTC m=+28.381532813\" watchObservedRunningTime=\"2023-05-31 19:38:18.959786934 +0000 UTC m=+33.373000786\"\r\n"} +{"Time":"2023-05-31T19:39:00.173063448Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:24 calico-509041 kubelet[1228]: I0531 19:38:24.000408 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-n2w2j\" podStartSLOduration=26.000318344 podCreationTimestamp=\"2023-05-31 19:37:58 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:22.98879789 +0000 UTC m=+37.402011740\" watchObservedRunningTime=\"2023-05-31 19:38:24.000318344 +0000 UTC m=+38.413532193\"\r\n"} +{"Time":"2023-05-31T19:39:00.173069087Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:26 calico-509041 kubelet[1228]: I0531 19:38:26.082588 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/calico-kube-controllers-674fff74c8-q5hvv\" podStartSLOduration=24.971254683 podCreationTimestamp=\"2023-05-31 19:37:58 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:38:21.992295872 +0000 UTC m=+36.405509717\" lastFinishedPulling=\"2023-05-31 19:38:25.103595998 +0000 UTC m=+39.516809844\" observedRunningTime=\"2023-05-31 19:38:26.006367822 +0000 UTC m=+40.419581674\" watchObservedRunningTime=\"2023-05-31 19:38:26.08255481 +0000 UTC m=+40.495768666\"\r\n"} +{"Time":"2023-05-31T19:39:00.173073867Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:34 calico-509041 kubelet[1228]: I0531 19:38:34.192751 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:00.173079274Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:34 calico-509041 kubelet[1228]: I0531 19:38:34.393604 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-rgkzc\\\" (UniqueName: \\\"kubernetes.io/projected/2c291b26-31d2-40ec-af8d-14b0fa56e948-kube-api-access-rgkzc\\\") pod \\\"netcat-7458db8b8-8ml56\\\" (UID: \\\"2c291b26-31d2-40ec-af8d-14b0fa56e948\\\") \" pod=\"default/netcat-7458db8b8-8ml56\"\r\n"} +{"Time":"2023-05-31T19:39:00.173264837Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:45 calico-509041 kubelet[1228]: E0531 19:38:45.823484 1228 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:39:00.17327267Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:45 calico-509041 kubelet[1228]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:39:00.173277295Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:45 calico-509041 kubelet[1228]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:39:00.173281471Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:45 calico-509041 kubelet[1228]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:39:00.173285697Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:50 calico-509041 kubelet[1228]: E0531 19:38:50.378840 1228 upgradeaware.go:440] Error proxying data from backend to client: read tcp 192.168.122.243:48024-\u003e192.168.122.243:10010: read: connection reset by peer\r\n"} +{"Time":"2023-05-31T19:39:00.17329051Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:50 calico-509041 kubelet[1228]: E0531 19:38:50.730116 1228 upgradeaware.go:440] Error proxying data from backend to client: read tcp 192.168.122.243:48034-\u003e192.168.122.243:10010: read: connection reset by peer\r\n"} +{"Time":"2023-05-31T19:39:00.173296709Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.173300083Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.173304179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:39:00.173308134Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T19:39:00.173313314Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\r\n"} +{"Time":"2023-05-31T19:39:00.173316729Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T19:39:00.17332272Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:39:00.173474316Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"UjY3QwpBNXcxQzg2MWNYMVV6MlN5WlNjT05GeG9mNmRSWTB6T2ZrQ0gzNDJPS1pEQnhOcmZmOGNkL3kwMUE4RmZYQXlHCmNkeDFJM3lQREJ1OHIzOW82eSt4c0FpRGNSSnMyUmY3UU5BTWV2MEszbm8zQlpoc1loeDdNNXllZ2hNemdxTW4KUU50bnY3T2lYTllMVFpRZDd6dSs5Y3NNbXRnNDBLUU9DWUQyTG1jMkpOWHRSNjcyT013eGpkRG5hNVpGZlZSMgpEcXR6SFRlTFZrSXhIUi9UT0hoQ09xSm0yMHF6dEVjRVd2d3hXcm1rdk5QNkFURnVHck1UVlVRRjBybFQrMDNwCnluUHdmdFRZbXJjOEVwWDUzUmVaUlVHWHZEM1N4QnlKWFdySGEzNFJhQURGaGEvdnJMZTN3ZEppNVlLRFZrVWIKN0NnQkFieU9VWXM1cmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T19:39:00.173479598Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T19:39:00.173483576Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: mk\r\n"} +{"Time":"2023-05-31T19:39:00.173487321Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts:\r\n"} +{"Time":"2023-05-31T19:39:00.173491036Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\r\n"} +{"Time":"2023-05-31T19:39:00.173494516Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T19:39:00.173497849Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: system:node:calico-509041\r\n"} +{"Time":"2023-05-31T19:39:00.17350145Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: system:node:calico-509041@mk\r\n"} +{"Time":"2023-05-31T19:39:00.173504952Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: system:node:calico-509041@mk\r\n"} +{"Time":"2023-05-31T19:39:00.173508651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T19:39:00.173512129Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T19:39:00.173515483Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users:\r\n"} +{"Time":"2023-05-31T19:39:00.173519085Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: system:node:calico-509041\r\n"} +{"Time":"2023-05-31T19:39:00.173522687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\r\n"} +{"Time":"2023-05-31T19:39:00.173526215Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:39:00.173529648Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:39:00.173533033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.173636915Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.173641175Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:39:00.173645038Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T19:39:00.173648412Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authentication:\r\n"} +{"Time":"2023-05-31T19:39:00.17365315Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T19:39:00.173656428Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T19:39:00.173659562Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:39:00.173663195Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173666635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T19:39:00.173669914Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" x509:\r\n"} +{"Time":"2023-05-31T19:39:00.173673346Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T19:39:00.173677027Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authorization:\r\n"} +{"Time":"2023-05-31T19:39:00.173680442Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T19:39:00.173683873Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:39:00.173687119Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173690681Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173694499Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T19:39:00.17369822Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T19:39:00.173701379Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T19:39:00.173704888Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T19:39:00.173708146Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.173711709Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173714955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T19:39:00.173718551Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:39:00.173721995Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:39:00.173725478Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T19:39:00.173730048Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173733889Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T19:39:00.173855824Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173862417Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T19:39:00.173865797Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T19:39:00.173868997Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T19:39:00.173872141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173875104Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T19:39:00.173878429Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173881546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T19:39:00.173884542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" logging:\r\n"} +{"Time":"2023-05-31T19:39:00.173889548Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T19:39:00.173892881Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" options:\r\n"} +{"Time":"2023-05-31T19:39:00.173896173Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" json:\r\n"} +{"Time":"2023-05-31T19:39:00.173899364Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T19:39:00.173902401Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T19:39:00.173905659Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T19:39:00.173908907Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173912152Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173915713Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resolvConf: /run/systemd/resolve/resolv.conf\r\n"} +{"Time":"2023-05-31T19:39:00.173919176Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T19:39:00.173922185Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T19:39:00.173925079Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173928563Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.17393213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T19:39:00.173935491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173938637Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173941811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:39:00.173944936Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.174036337Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.174041213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:39:00.17404429Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.174047457Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\n"} +{"Time":"2023-05-31T19:39:00.174050404Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:00.174053715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:39:00.174056805Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:00.174060094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:00.174062937Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 19:38:51 UTC\n"} +{"Time":"2023-05-31T19:39:00.174066158Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.174069972Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:00.174073225Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:39:00.17407692Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://192.168.50.84:8443\n"} +{"Time":"2023-05-31T19:39:00.174082609Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: bridge-509041\n"} +{"Time":"2023-05-31T19:39:00.174091463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:00.174095606Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:39:00.174098831Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:00.174102066Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:00.1741047Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 19:37:58 UTC\n"} +{"Time":"2023-05-31T19:39:00.174108216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.174111117Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:00.174114025Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:39:00.174116739Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://192.168.39.162:8443\n"} +{"Time":"2023-05-31T19:39:00.174119535Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: calico-509041\n"} +{"Time":"2023-05-31T19:39:00.174122203Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:00.174125294Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:39:00.174288076Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:00.174292871Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:00.174296098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 19:38:25 UTC\n"} +{"Time":"2023-05-31T19:39:00.174299385Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.174302966Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:00.174306324Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:39:00.174309684Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://192.168.72.243:8443\n"} +{"Time":"2023-05-31T19:39:00.174313013Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:00.17431631Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts:\n"} +{"Time":"2023-05-31T19:39:00.174319429Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\n"} +{"Time":"2023-05-31T19:39:00.174322503Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: bridge-509041\n"} +{"Time":"2023-05-31T19:39:00.17432563Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:00.174328804Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:00.174332413Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 19:38:51 UTC\n"} +{"Time":"2023-05-31T19:39:00.174336063Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.17433955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:00.174342969Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:39:00.174346143Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:00.174350011Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: bridge-509041\n"} +{"Time":"2023-05-31T19:39:00.17435332Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: bridge-509041\n"} +{"Time":"2023-05-31T19:39:00.174356389Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\n"} +{"Time":"2023-05-31T19:39:00.174359059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: calico-509041\n"} +{"Time":"2023-05-31T19:39:00.174362354Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:00.174365893Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:00.174368986Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 19:37:58 UTC\n"} +{"Time":"2023-05-31T19:39:00.174372499Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.174376093Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:00.174607698Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:39:00.1746193Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:00.17462361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: calico-509041\n"} +{"Time":"2023-05-31T19:39:00.174626599Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: calico-509041\n"} +{"Time":"2023-05-31T19:39:00.174629044Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\n"} +{"Time":"2023-05-31T19:39:00.174631594Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:00.174634118Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:00.174636693Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:00.174639096Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" last-update: Wed, 31 May 2023 19:38:25 UTC\n"} +{"Time":"2023-05-31T19:39:00.174641689Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.174644307Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:00.174646749Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:39:00.174649087Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:00.174651613Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:00.174654194Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:00.174656567Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: bridge-509041\n"} +{"Time":"2023-05-31T19:39:00.174659086Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:39:00.174661499Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:39:00.174663861Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users:\n"} +{"Time":"2023-05-31T19:39:00.174666906Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: bridge-509041\n"} +{"Time":"2023-05-31T19:39:00.174669173Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\n"} +{"Time":"2023-05-31T19:39:00.174681621Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt\n"} +{"Time":"2023-05-31T19:39:00.174684791Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.key\n"} +{"Time":"2023-05-31T19:39:00.17468757Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: calico-509041\n"} +{"Time":"2023-05-31T19:39:00.174696698Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\n"} +{"Time":"2023-05-31T19:39:00.174702363Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt\n"} +{"Time":"2023-05-31T19:39:00.174867674Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.key\n"} +{"Time":"2023-05-31T19:39:00.174875435Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:00.174879165Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\n"} +{"Time":"2023-05-31T19:39:00.174883301Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt\n"} +{"Time":"2023-05-31T19:39:00.174888306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.key\n"} +{"Time":"2023-05-31T19:39:00.174892235Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.174895951Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.174899956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:39:00.174904023Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.174907805Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" items:\n"} +{"Time":"2023-05-31T19:39:00.174911713Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.174916146Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.174920814Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:00.174924549Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.174928448Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:00.174933342Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:00.17494127Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:00.174945454Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:00.174949911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:00.174954127Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:00.174958393Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:00.17496228Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:00.174966158Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:00.175150955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:00.175159761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:00.175171192Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:00.175176735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:00.175181371Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:00.175189417Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:00.17519381Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:00.17519803Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:00.175202635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.175206762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.175210645Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.17521451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:00.175219204Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:00.175226074Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:00.175230228Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:00.175233692Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:00.175236182Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:57Z\"\n"} +{"Time":"2023-05-31T19:39:00.175239083Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.175241348Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:00.175244275Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"395\"\n"} +{"Time":"2023-05-31T19:39:00.175247707Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: b0ee50b4-30c5-4064-b876-692e620383f9\n"} +{"Time":"2023-05-31T19:39:00.175250211Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.175252611Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.175254942Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:00.175439369Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.175447539Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:00.175452008Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:00.175456193Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:00.175460871Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:00.175464949Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:00.175468859Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:00.175472891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:00.17547717Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:00.175481192Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:00.175487521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:00.175491601Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:00.175495553Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:00.175499424Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:00.175503321Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:00.175508657Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:00.175512848Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:00.175525639Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:00.175528407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.175530468Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.175532553Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.17553508Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:00.17553827Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:00.175700858Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:00.175708152Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:00.17571203Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:00.175715528Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:57Z\"\n"} +{"Time":"2023-05-31T19:39:00.175721328Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.175724583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T19:39:00.175728043Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"396\"\n"} +{"Time":"2023-05-31T19:39:00.17573102Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: c6b3113b-a37e-4597-98eb-22f9ef48401d\n"} +{"Time":"2023-05-31T19:39:00.175734016Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.175737735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.175740973Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" jws-kubeconfig-it51wg: eyJhbGciOiJIUzI1NiIsImtpZCI6Iml0NTF3ZyJ9..3-Pl5Qvg9KC-ITK1c0bB64sU7vr7qlDr5q3QUVYsb6c\n"} +{"Time":"2023-05-31T19:39:00.17574435Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T19:39:00.175747385Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.17575062Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\n"} +{"Time":"2023-05-31T19:39:00.175753523Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:00.175761023Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:39:00.175766267Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"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\n"} +{"Time":"2023-05-31T19:39:00.175911921Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:39:00.175918129Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: \"\"\n"} +{"Time":"2023-05-31T19:39:00.175921494Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts: null\n"} +{"Time":"2023-05-31T19:39:00.175924814Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:39:00.175928405Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:39:00.175932005Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:39:00.17593491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users: null\n"} +{"Time":"2023-05-31T19:39:00.17593803Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.175941197Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.175944169Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:45Z\"\n"} +{"Time":"2023-05-31T19:39:00.175947685Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T19:39:00.175951393Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:39:00.175954926Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"399\"\n"} +{"Time":"2023-05-31T19:39:00.175958272Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 5a23b6d8-f9b8-42d4-83b3-019ea9b5a90d\n"} +{"Time":"2023-05-31T19:39:00.175961742Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.175964776Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.175967636Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:00.175970447Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.175973665Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:00.175977142Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:00.175980872Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:00.175984504Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:00.175987944Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:00.176155162Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:00.176161626Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:00.176171239Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:00.176174798Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:00.176178042Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:00.176182009Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:00.176185692Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:00.1761894Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:00.176192689Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:00.176196179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:00.176202252Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:00.176205762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:00.176210229Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.176214162Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.176217651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.176221183Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:00.176224561Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:00.176229107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:00.176232536Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:00.176236022Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:00.176239564Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:57Z\"\n"} +{"Time":"2023-05-31T19:39:00.176242652Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.176391734Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:39:00.17640412Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"397\"\n"} +{"Time":"2023-05-31T19:39:00.176418251Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: f9c198c1-e05a-488e-87eb-68f592b81eb2\n"} +{"Time":"2023-05-31T19:39:00.17642207Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.176425965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.176429291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" calico_backend: bird\n"} +{"Time":"2023-05-31T19:39:00.176436199Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_network_config: |-\n"} +{"Time":"2023-05-31T19:39:00.176440179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\n"} +{"Time":"2023-05-31T19:39:00.17644296Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"name\": \"k8s-pod-network\",\n"} +{"Time":"2023-05-31T19:39:00.176446508Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"cniVersion\": \"0.3.1\",\n"} +{"Time":"2023-05-31T19:39:00.176450074Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"plugins\": [\n"} +{"Time":"2023-05-31T19:39:00.176453875Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\n"} +{"Time":"2023-05-31T19:39:00.176457521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"calico\",\n"} +{"Time":"2023-05-31T19:39:00.17646131Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log_level\": \"info\",\n"} +{"Time":"2023-05-31T19:39:00.176464918Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n"} +{"Time":"2023-05-31T19:39:00.176468595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"datastore_type\": \"kubernetes\",\n"} +{"Time":"2023-05-31T19:39:00.176471902Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n"} +{"Time":"2023-05-31T19:39:00.176475332Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"mtu\": __CNI_MTU__,\n"} +{"Time":"2023-05-31T19:39:00.176486255Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"ipam\": {\n"} +{"Time":"2023-05-31T19:39:00.176489955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"calico-ipam\"\n"} +{"Time":"2023-05-31T19:39:00.176493534Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\n"} +{"Time":"2023-05-31T19:39:00.176496648Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"policy\": {\n"} +{"Time":"2023-05-31T19:39:00.176500033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"k8s\"\n"} +{"Time":"2023-05-31T19:39:00.176503184Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\n"} +{"Time":"2023-05-31T19:39:00.176506978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"kubernetes\": {\n"} +{"Time":"2023-05-31T19:39:00.176510576Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n"} +{"Time":"2023-05-31T19:39:00.176514844Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T19:39:00.176519108Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\n"} +{"Time":"2023-05-31T19:39:00.176522836Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\n"} +{"Time":"2023-05-31T19:39:00.17652587Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"portmap\",\n"} +{"Time":"2023-05-31T19:39:00.176529398Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"snat\": true,\n"} +{"Time":"2023-05-31T19:39:00.176533022Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\"portMappings\": true}\n"} +{"Time":"2023-05-31T19:39:00.176537056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\n"} +{"Time":"2023-05-31T19:39:00.176540545Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\n"} +{"Time":"2023-05-31T19:39:00.176544314Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"type\": \"bandwidth\",\n"} +{"Time":"2023-05-31T19:39:00.176571871Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"capabilities\": {\"bandwidth\": true}\n"} +{"Time":"2023-05-31T19:39:00.176576173Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T19:39:00.176579849Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\n"} +{"Time":"2023-05-31T19:39:00.176583208Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T19:39:00.176586639Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" typha_service_name: none\n"} +{"Time":"2023-05-31T19:39:00.176590279Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" veth_mtu: \"0\"\n"} +{"Time":"2023-05-31T19:39:00.176593819Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.176597204Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.176602036Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:00.176604872Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubectl.kubernetes.io/last-applied-configuration: |\n"} +{"Time":"2023-05-31T19:39:00.176609719Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\"apiVersion\":\"v1\",\"data\":{\"calico_backend\":\"bird\",\"cni_network_config\":\"{\\n \\\"name\\\": \\\"k8s-pod-network\\\",\\n \\\"cniVersion\\\": \\\"0.3.1\\\",\\n \\\"plugins\\\": [\\n {\\n \\\"type\\\": \\\"calico\\\",\\n \\\"log_level\\\": \\\"info\\\",\\n \\\"log_file_path\\\": \\\"/var/log/calico/cni/cni.log\\\",\\n \\\"datastore_type\\\": \\\"kubernetes\\\",\\n \\\"nodename\\\": \\\"__KUBERNETES_NODE_NAME__\\\",\\n \\\"mtu\\\": __CNI_MTU__,\\n \\\"ipam\\\": {\\n \\\"type\\\": \\\"calico-ipam\\\"\\n },\\n \\\"policy\\\": {\\n \\\"type\\\": \\\"k8s\\\"\\n },\\n \\\"kubernetes\\\": {\\n \\\"kubeconfig\\\": \\\"__KUBECONFIG_FILEPATH__\\\"\\n }\\n },\\n {\\n \\\"type\\\": \\\"portmap\\\",\\n \\\"snat\\\": true,\\n \\\"capabilities\\\": {\\\"portMappings\\\": true}\\n },\\n {\\n \\\"type\\\": \\\"bandwidth\\\",\\n \\\"capabilities\\\": {\\\"bandwidth\\\": true}\\n }\\n ]\\n}\",\"typha_service_name\":\"none\",\"veth_mtu\":\"0\"},\"kind\":\"ConfigMap\",\"metadata\":{\"annotations\":{},\"name\":\"calico-config\",\"namespace\":\"kube-system\"}}\n"} +{"Time":"2023-05-31T19:39:00.176660904Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:47Z\"\n"} +{"Time":"2023-05-31T19:39:00.176670831Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: calico-config\n"} +{"Time":"2023-05-31T19:39:00.176674481Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.176678471Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"304\"\n"} +{"Time":"2023-05-31T19:39:00.176681601Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: a41be12d-6a51-4562-a62d-a50258d38887\n"} +{"Time":"2023-05-31T19:39:00.17668475Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.176687721Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.176690933Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Corefile: |\n"} +{"Time":"2023-05-31T19:39:00.176698453Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" .:53 {\n"} +{"Time":"2023-05-31T19:39:00.176702593Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" log\n"} +{"Time":"2023-05-31T19:39:00.176706035Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" errors\n"} +{"Time":"2023-05-31T19:39:00.176709455Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" health {\n"} +{"Time":"2023-05-31T19:39:00.17671292Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T19:39:00.176716013Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T19:39:00.176719345Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ready\n"} +{"Time":"2023-05-31T19:39:00.176722634Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T19:39:00.176726234Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pods insecure\n"} +{"Time":"2023-05-31T19:39:00.176729748Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T19:39:00.17673311Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ttl 30\n"} +{"Time":"2023-05-31T19:39:00.176915076Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T19:39:00.176925245Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T19:39:00.176929357Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hosts {\n"} +{"Time":"2023-05-31T19:39:00.176933115Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 192.168.39.1 host.minikube.internal\n"} +{"Time":"2023-05-31T19:39:00.176937001Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fallthrough\n"} +{"Time":"2023-05-31T19:39:00.176940825Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T19:39:00.176944702Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T19:39:00.176948836Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T19:39:00.17695271Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T19:39:00.176956444Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cache 30\n"} +{"Time":"2023-05-31T19:39:00.176959993Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" loop\n"} +{"Time":"2023-05-31T19:39:00.176963942Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" reload\n"} +{"Time":"2023-05-31T19:39:00.176967675Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" loadbalance\n"} +{"Time":"2023-05-31T19:39:00.176971391Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\n"} +{"Time":"2023-05-31T19:39:00.176975192Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.176978722Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.176982447Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:45Z\"\n"} +{"Time":"2023-05-31T19:39:00.176986563Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: coredns\n"} +{"Time":"2023-05-31T19:39:00.176990789Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.176994524Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"469\"\n"} +{"Time":"2023-05-31T19:39:00.176998109Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 3c6e5228-7ac1-44f2-9c71-88e77f16dcfe\n"} +{"Time":"2023-05-31T19:39:00.177005161Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.177008769Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.177012367Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T19:39:00.177016008Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.177020652Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:00.177025915Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:00.17712398Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:00.17713532Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:00.177139583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:00.177144435Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:00.177148993Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:00.177153088Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:00.177157015Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:00.177161476Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:00.177172636Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:00.177177588Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:00.177181853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:00.177186153Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:00.177190352Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:00.177194334Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:00.177198154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:00.177202583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.177209691Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T19:39:00.177213804Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T19:39:00.177217682Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.177221559Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T19:39:00.177236502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM3MzVaFw0zMzA1MjgxOTM3MzVaMBkxFzAV\n"} +{"Time":"2023-05-31T19:39:00.177239328Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T19:39:00.177549336Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CgKCAQEAqmIdEW1Tl+6fQnH7HN308KRPyWSFbFnGS4c7UAqfyCsLynhX3JHxMYVE\n"} +{"Time":"2023-05-31T19:39:00.177557526Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" lh3cxniGAM9N+0mpoKqsT/USDESTY4gQM5xjyrWYHm/wRW+gPfSsY+caDlm75z0l\n"} +{"Time":"2023-05-31T19:39:00.177562272Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 0TbjqUVnb7CnqfHx9T0GeIVtnXr+rf63ANEFKKJZmW7XDoWjy/+uzZAajbRumhGs\n"} +{"Time":"2023-05-31T19:39:00.177568688Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ToJizfJA2MsC2HCZzVmgSjmWcOw4jmwZTWtaBNwbzlU5sZAqL6FTzvVaFvpRaLXv\n"} +{"Time":"2023-05-31T19:39:00.177573053Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sHIJ0xYT5kHPlcVYe5cg9ecEtMqAfZcygiFgADtT05U6AY1U8MVNGQaesd/ozGJa\n"} +{"Time":"2023-05-31T19:39:00.177577412Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" i+wJ23gTsms0KopktUe6ac6xP2RJ2wIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T19:39:00.177581791Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUdxut+p4DE7nuEgg/giTAKsI6kZsw\n"} +{"Time":"2023-05-31T19:39:00.177585909Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAJg0\n"} +{"Time":"2023-05-31T19:39:00.177589853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Is0jUFj5ADHVr+48+GsdanWGAik3L3fwXkFsUpxdFuVxjLIq+utMdp8b+LP0vjAb\n"} +{"Time":"2023-05-31T19:39:00.177593883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1BaUvyl5I2VmFHDrbLYKJQsdDFikt1fPbXOgzsnel1EBAlei4HNabdmr/+WhPCb0\n"} +{"Time":"2023-05-31T19:39:00.177597786Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" YqpNTos7ayzTDHzhSc994VmOl4zTbryQDKhft4ANR1jIKTLCxkkMPkYIgMvu0y+l\n"} +{"Time":"2023-05-31T19:39:00.177601757Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 2PHzb+FDGVDVlFiel83muOwri3T46vJhXkeGXGYjD41c7ypOfBUhHETAJ5jGcDo6\n"} +{"Time":"2023-05-31T19:39:00.177605763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BQq75CNPxx4KXbZIiJzMi/NjSsIz4oVFiH267/zlAkgOsGj+mQhZbwdrVRGTGJ7e\n"} +{"Time":"2023-05-31T19:39:00.177609877Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 1divP+hOpsGeq7aU9jo=\n"} +{"Time":"2023-05-31T19:39:00.177613811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.177617622Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T19:39:00.177621472Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T19:39:00.177624894Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T19:39:00.177627244Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.17762969Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.177631965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:42Z\"\n"} +{"Time":"2023-05-31T19:39:00.177634542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T19:39:00.178090676Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.178098526Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"28\"\n"} +{"Time":"2023-05-31T19:39:00.178102013Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 632167f1-ebf2-4ae0-9203-36238e53fda7\n"} +{"Time":"2023-05-31T19:39:00.178105626Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.178108915Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.178112435Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T19:39:00.178116054Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.178119213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.178122947Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:42Z\"\n"} +{"Time":"2023-05-31T19:39:00.178126804Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T19:39:00.178130093Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.178136328Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"30\"\n"} +{"Time":"2023-05-31T19:39:00.178140159Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 7b8ee6e6-8f7b-4b93-bdb1-02dfd3cc0199\n"} +{"Time":"2023-05-31T19:39:00.178143833Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.178147176Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.178150605Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T19:39:00.178154333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T19:39:00.178157459Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T19:39:00.178166284Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T19:39:00.178169353Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clientConnection:\n"} +{"Time":"2023-05-31T19:39:00.178172885Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178176572Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" burst: 0\n"} +{"Time":"2023-05-31T19:39:00.178179995Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178183543Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T19:39:00.178186942Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" qps: 0\n"} +{"Time":"2023-05-31T19:39:00.178190311Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:39:00.178193676Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.178563817Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conntrack:\n"} +{"Time":"2023-05-31T19:39:00.178573598Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T19:39:00.178577687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" min: null\n"} +{"Time":"2023-05-31T19:39:00.17858082Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:00.178584803Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:00.178588843Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" detectLocal:\n"} +{"Time":"2023-05-31T19:39:00.1785924Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178595952Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178599479Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178602959Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T19:39:00.178606142Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178609312Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178612655Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" iptables:\n"} +{"Time":"2023-05-31T19:39:00.178616193Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T19:39:00.178619397Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T19:39:00.178622564Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T19:39:00.178625884Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.178629286Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.17863324Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ipvs:\n"} +{"Time":"2023-05-31T19:39:00.178636996Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T19:39:00.178640581Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.178643632Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178646957Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" strictARP: false\n"} +{"Time":"2023-05-31T19:39:00.178650454Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.178654449Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:00.178657771Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:00.178661422Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:00.178924014Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T19:39:00.178929444Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T19:39:00.178933173Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178936889Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T19:39:00.178940131Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T19:39:00.178943727Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178947527Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178951494Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" winkernel:\n"} +{"Time":"2023-05-31T19:39:00.17895513Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T19:39:00.178958816Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T19:39:00.17896254Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T19:39:00.17896574Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178968958Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T19:39:00.178972448Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T19:39:00.17897602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.178979638Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:39:00.178983789Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters:\n"} +{"Time":"2023-05-31T19:39:00.178987514Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:00.178991805Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T19:39:00.178995941Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:39:00.179002605Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: default\n"} +{"Time":"2023-05-31T19:39:00.179012342Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts:\n"} +{"Time":"2023-05-31T19:39:00.179016247Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - context:\n"} +{"Time":"2023-05-31T19:39:00.179019552Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cluster: default\n"} +{"Time":"2023-05-31T19:39:00.179023096Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:00.179026662Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user: default\n"} +{"Time":"2023-05-31T19:39:00.179030092Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: default\n"} +{"Time":"2023-05-31T19:39:00.179240989Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: default\n"} +{"Time":"2023-05-31T19:39:00.17924579Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users:\n"} +{"Time":"2023-05-31T19:39:00.179249177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - name: default\n"} +{"Time":"2023-05-31T19:39:00.179252903Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" user:\n"} +{"Time":"2023-05-31T19:39:00.179256179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T19:39:00.179259809Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.179263368Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.179268642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:45Z\"\n"} +{"Time":"2023-05-31T19:39:00.179271978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" labels:\n"} +{"Time":"2023-05-31T19:39:00.179275307Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.179278487Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T19:39:00.179281887Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.179284964Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"273\"\n"} +{"Time":"2023-05-31T19:39:00.179289031Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: c68d074e-9a41-488f-9409-ff45d7a3c233\n"} +{"Time":"2023-05-31T19:39:00.179292184Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.179295628Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.179299043Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:00.179302506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.179306366Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:00.179310342Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:00.179314021Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:00.179318224Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:00.179321981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:00.179325761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:00.179329766Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:00.179569434Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:00.179574873Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:00.179578838Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:00.179582512Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:00.179587639Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:00.179591098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:00.179594738Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:00.179598623Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:00.179601913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:00.179605755Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:00.179609237Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:00.17961268Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.179616074Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.179619607Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:00.179622745Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:00.179626487Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:00.179629723Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:00.179632863Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:00.179635811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:57Z\"\n"} +{"Time":"2023-05-31T19:39:00.179639727Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:00.179643064Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.179647068Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"398\"\n"} +{"Time":"2023-05-31T19:39:00.179650569Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: b70cf7b1-15c1-4287-96a6-63042a02fc24\n"} +{"Time":"2023-05-31T19:39:00.179866414Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.179871459Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.179874918Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T19:39:00.1798782Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiServer:\n"} +{"Time":"2023-05-31T19:39:00.179881886Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certSANs:\n"} +{"Time":"2023-05-31T19:39:00.179885149Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T19:39:00.179888655Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - localhost\n"} +{"Time":"2023-05-31T19:39:00.179892163Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - 192.168.39.162\n"} +{"Time":"2023-05-31T19:39:00.179896137Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:39:00.179899487Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T19:39:00.1799034Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:39:00.179907864Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T19:39:00.179911546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:39:00.179914962Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:39:00.179918488Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T19:39:00.179921496Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:39:00.179924913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" controllerManager:\n"} +{"Time":"2023-05-31T19:39:00.179928129Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:39:00.179935048Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T19:39:00.179938679Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:39:00.179943503Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dns: {}\n"} +{"Time":"2023-05-31T19:39:00.179946843Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" etcd:\n"} +{"Time":"2023-05-31T19:39:00.179950168Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" local:\n"} +{"Time":"2023-05-31T19:39:00.179953583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:39:00.179957119Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:39:00.179960679Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T19:39:00.180797705Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T19:39:00.180809084Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T19:39:00.180813565Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T19:39:00.180817556Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" networking:\n"} +{"Time":"2023-05-31T19:39:00.18082188Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T19:39:00.18082567Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:39:00.180829451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T19:39:00.180833141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" scheduler:\n"} +{"Time":"2023-05-31T19:39:00.180836817Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:39:00.18084062Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:39:00.180844405Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.18084827Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.180852089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:44Z\"\n"} +{"Time":"2023-05-31T19:39:00.180856328Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T19:39:00.180859989Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.180863147Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"234\"\n"} +{"Time":"2023-05-31T19:39:00.18086558Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 76478315-2aff-4323-ab63-6d99bd9a9ae8\n"} +{"Time":"2023-05-31T19:39:00.180867887Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:00.180870425Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" data:\n"} +{"Time":"2023-05-31T19:39:00.180873282Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kubelet: |\n"} +{"Time":"2023-05-31T19:39:00.180875779Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T19:39:00.180880562Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authentication:\n"} +{"Time":"2023-05-31T19:39:00.180882986Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" anonymous:\n"} +{"Time":"2023-05-31T19:39:00.180885465Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enabled: false\n"} +{"Time":"2023-05-31T19:39:00.180887874Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" webhook:\n"} +{"Time":"2023-05-31T19:39:00.180890188Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T19:39:00.180892757Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enabled: true\n"} +{"Time":"2023-05-31T19:39:00.180896287Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" x509:\n"} +{"Time":"2023-05-31T19:39:00.180898745Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:39:00.1809014Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" authorization:\n"} +{"Time":"2023-05-31T19:39:00.180903659Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T19:39:00.180905901Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" webhook:\n"} +{"Time":"2023-05-31T19:39:00.180908225Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:39:00.180910642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:39:00.180912919Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T19:39:00.180915223Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T19:39:00.180917536Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T19:39:00.180919796Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T19:39:00.180922063Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T19:39:00.180924416Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.180926634Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" evictionHard:\n"} +{"Time":"2023-05-31T19:39:00.180928853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T19:39:00.180931088Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T19:39:00.180933407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T19:39:00.180935709Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.180938139Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T19:39:00.180940409Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:00.18094262Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T19:39:00.180944836Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T19:39:00.180947132Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T19:39:00.180949419Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:00.180951908Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T19:39:00.180954546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T19:39:00.180956838Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T19:39:00.180959703Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" logging:\n"} +{"Time":"2023-05-31T19:39:00.180962106Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T19:39:00.180964293Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" options:\n"} +{"Time":"2023-05-31T19:39:00.180966447Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" json:\n"} +{"Time":"2023-05-31T19:39:00.180968636Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T19:39:00.180971068Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T19:39:00.180973443Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T19:39:00.180975653Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:00.180977952Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:00.180980261Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resolvConf: /run/systemd/resolve/resolv.conf\n"} +{"Time":"2023-05-31T19:39:00.180982602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T19:39:00.180984869Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T19:39:00.180987116Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.180989485Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T19:39:00.180991909Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T19:39:00.180994215Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:00.180996465Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:00.180998652Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:00.18100102Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:00.181014272Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.18101632Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" creationTimestamp: \"2023-05-31T19:37:44Z\"\n"} +{"Time":"2023-05-31T19:39:00.181018407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T19:39:00.181020331Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:00.181022872Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"237\"\n"} +{"Time":"2023-05-31T19:39:00.181024911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid: 1c25fc9d-220e-439e-bff0-11fb1155f3ee\n"} +{"Time":"2023-05-31T19:39:00.181026753Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: List\n"} +{"Time":"2023-05-31T19:39:00.181028642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:00.181250794Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T19:39:00.181258831Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181262673Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181266332Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:39:00.181270218Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ● docker.service\r\n"} +{"Time":"2023-05-31T19:39:00.181274239Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: masked (Reason: Unit docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:39:00.181278014Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T19:39:00.181281629Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:39:00.18128518Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181288234Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181291656Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:39:00.181295763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;35m# Unit docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:39:00.181299292Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181302958Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181306276Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:39:00.181309774Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:00.181313114Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"exec-opts\": [\r\n"} +{"Time":"2023-05-31T19:39:00.181317146Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"native.cgroupdriver=systemd\"\r\n"} +{"Time":"2023-05-31T19:39:00.181320766Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ],\r\n"} +{"Time":"2023-05-31T19:39:00.181324654Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T19:39:00.181328434Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T19:39:00.18133148Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T19:39:00.181337338Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:00.181340964Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T19:39:00.181344534Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:00.181347885Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181351435Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181354973Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:39:00.181553159Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Client:\r\n"} +{"Time":"2023-05-31T19:39:00.181560548Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T19:39:00.181563828Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Context: default\r\n"} +{"Time":"2023-05-31T19:39:00.181567998Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T19:39:00.181571071Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.18157438Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Server:\r\n"} +{"Time":"2023-05-31T19:39:00.181577804Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ERROR: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?\r\n"} +{"Time":"2023-05-31T19:39:00.181581525Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" errors pretty printing info\r\n"} +{"Time":"2023-05-31T19:39:00.181585053Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:39:00.181590561Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181593494Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.18159717Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:39:00.181600842Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;31m●\u001b[0m cri-docker.service\r\n"} +{"Time":"2023-05-31T19:39:00.181604612Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: masked (Reason: Unit cri-docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:39:00.181609308Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: \u001b[0;1;31mfailed\u001b[0m (Result: exit-code) since Wed 2023-05-31 19:37:17 UTC; 1min 39s ago\r\n"} +{"Time":"2023-05-31T19:39:00.18161326Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TriggeredBy: \u001b[0;1;31m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:39:00.181618436Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Main PID: 453 (code=exited, status=1/FAILURE)\r\n"} +{"Time":"2023-05-31T19:39:00.181622087Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.181625341Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:17 minikube systemd[1]: cri-docker.service: Scheduled restart job, restart counter is at 3.\r\n"} +{"Time":"2023-05-31T19:39:00.181629197Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:17 minikube systemd[1]: Stopped CRI Interface for Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T19:39:00.181632934Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:17 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Start request repeated too quickly.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.181637066Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:17 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.181641073Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:17 minikube systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.181931873Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:39:00.181940058Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181943871Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181947533Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:39:00.181951652Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;35m# Unit cri-docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:39:00.181955297Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181958816Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181962236Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:39:00.181966369Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cat: /etc/systemd/system/cri-docker.service.d/10-cni.conf: No such file or directory\r\n"} +{"Time":"2023-05-31T19:39:00.181970816Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:39:00.181974013Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181977188Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.181980826Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:39:00.181984335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:00.181988049Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T19:39:00.181991829Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T19:39:00.181995393Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T19:39:00.18199945Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:39:00.182002798Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:39:00.18200615Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.182010156Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:00.182013485Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:39:00.1820169Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T19:39:00.182020605Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:39:00.18202455Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T19:39:00.182187625Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T19:39:00.182194546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:39:00.182197812Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.182203861Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T19:39:00.182207917Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T19:39:00.182212542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:39:00.182216407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T19:39:00.182219507Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.182222849Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T19:39:00.182226945Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T19:39:00.182231617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:39:00.182234957Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T19:39:00.182238337Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.182241912Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:39:00.182245799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:39:00.182249235Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.182253324Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.182256651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.182259864Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.182263099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T19:39:00.182266701Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T19:39:00.182270141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.182273443Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:39:00.182276789Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:39:00.182279905Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.182545351Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:00.182552742Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:00.182555958Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.182558824Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.182562228Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:39:00.182566535Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cri-dockerd 0.3.2 (23513f4)\r\n"} +{"Time":"2023-05-31T19:39:00.182569958Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.182573021Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.18257624Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:39:00.18257988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T19:39:00.182583933Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: loaded (\u001b]8;;file://calico-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: disabled)\r\n"} +{"Time":"2023-05-31T19:39:00.182588216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:32 UTC; 1min 26s ago\r\n"} +{"Time":"2023-05-31T19:39:00.182592513Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:39:00.182596383Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Main PID: 665 (containerd)\r\n"} +{"Time":"2023-05-31T19:39:00.182599716Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Tasks: 127 (limit: 8192)\r\n"} +{"Time":"2023-05-31T19:39:00.182603736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Memory: 512.5M\r\n"} +{"Time":"2023-05-31T19:39:00.182607296Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T19:39:00.18261145Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─ 665 /usr/bin/containerd --root /mnt/vda1/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:39:00.182621218Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─ 905 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2bfdef4e5bf4e347ce99c5697ae21b2c0be3d9f170e30f971e230aca39d8913b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.182640777Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─ 952 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id db2af4a2298b9f1143402565bb53d979bb45b4d1fccbc0b663bbc9eaa29f9343 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.182645747Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─ 962 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e545f3a87023f72868acc813e3900e1ddd8bdb5f94920266d4d90d3ebdb4ceea -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.182963738Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─ 963 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 743d6eefe804c15a4383a0941d67d7e8e0b8dc63d01c05ab9d8d0a0f8b6e0c07 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.18297153Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─1406 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 8dfaaf3238a5fb8c24330e4d345335475005bf81bf8ffbca58af18d1837cc0ea -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.18297557Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─1477 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3d1cabfc40881f1deccdd0bdfa44af2b6274ee07a7a1fadd3aa3f695e1425b6b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.182979368Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─1774 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 121f3f1288aeeaed1c237b699ef887d47ad31ff225887cca9055e0405c6ee9c4 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.182985525Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2386 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 81f715d37c79c869e620e4771c8fd06509d0ab6387e0ab3c95c03116dbc75b2c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.182989283Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ├─2490 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e85421578c158884ac4dcd35ad191f357a3fd51be86b35d40cb9102a519d8dac -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.182993052Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" └─2795 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 32ba7aafc47083874d7c12ee55402fc690383bd073f011c0195d7af95d9a219b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:00.182996539Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.183000327Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: 2023-05-31 19:38:46.474 [INFO][3208] ipam_plugin.go 416: Releasing address using handleID ContainerID=\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\" HandleID=\"k8s-pod-network.444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\" Workload=\"calico--509041-k8s-calico--kube--controllers--674fff74c8--q5hvv-eth0\"\r\n"} +{"Time":"2023-05-31T19:39:00.183004913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: time=\"2023-05-31T19:38:46Z\" level=info msg=\"About to acquire host-wide IPAM lock.\" source=\"ipam_plugin.go:357\"\r\n"} +{"Time":"2023-05-31T19:39:00.183009037Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: time=\"2023-05-31T19:38:46Z\" level=info msg=\"Acquired host-wide IPAM lock.\" source=\"ipam_plugin.go:372\"\r\n"} +{"Time":"2023-05-31T19:39:00.183013647Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: 2023-05-31 19:38:46.487 [WARNING][3208] ipam_plugin.go 433: Asked to release address but it doesn't exist. Ignoring ContainerID=\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\" HandleID=\"k8s-pod-network.444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\" Workload=\"calico--509041-k8s-calico--kube--controllers--674fff74c8--q5hvv-eth0\"\r\n"} +{"Time":"2023-05-31T19:39:00.183311368Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: 2023-05-31 19:38:46.487 [INFO][3208] ipam_plugin.go 444: Releasing address using workloadID ContainerID=\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\" HandleID=\"k8s-pod-network.444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\" Workload=\"calico--509041-k8s-calico--kube--controllers--674fff74c8--q5hvv-eth0\"\r\n"} +{"Time":"2023-05-31T19:39:00.183319373Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: time=\"2023-05-31T19:38:46Z\" level=info msg=\"Released host-wide IPAM lock.\" source=\"ipam_plugin.go:378\"\r\n"} +{"Time":"2023-05-31T19:39:00.183324129Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: 2023-05-31 19:38:46.493 [INFO][3197] k8s.go 589: Teardown processing complete. ContainerID=\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\"\r\n"} +{"Time":"2023-05-31T19:39:00.183328136Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: time=\"2023-05-31T19:38:46.495808596Z\" level=info msg=\"TearDown network for sandbox \\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\" successfully\"\r\n"} +{"Time":"2023-05-31T19:39:00.183333693Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: time=\"2023-05-31T19:38:46.502923665Z\" level=warning msg=\"Failed to get podSandbox status for container event for sandboxID \\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\": an error occurred when try to find sandbox: not found. Sending the event with nil podSandboxStatus.\"\r\n"} +{"Time":"2023-05-31T19:39:00.183338162Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:38:46 calico-509041 containerd[665]: time=\"2023-05-31T19:38:46.503731310Z\" level=info msg=\"RemovePodSandbox \\\"444eccdd8d5c78c22cc5533124b1541c76ab821cbc088145f27c81d3b3b4ed4d\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:39:00.183342027Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.183345113Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.183348617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:39:00.183352333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.183358687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:00.183362216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:39:00.183366647Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:39:00.183370148Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:00.183635692Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:00.183644292Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.183648219Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:00.183652081Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:39:00.18365603Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:39:00.183659379Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:39:00.183662809Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:39:00.183672296Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:39:00.183676175Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:39:00.183679749Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:00.183683337Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:00.183686739Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:39:00.183690174Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:39:00.183693921Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:39:00.183697972Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:39:00.183701525Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:39:00.18370555Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:39:00.18370906Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:39:00.183712764Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:39:00.183716152Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.183719246Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.183722253Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:39:00.183725436Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:39:00.183729031Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.183732569Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:00.183736092Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:00.183894276Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.183898743Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.183902311Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:39:00.183906106Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:00.183909714Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:39:00.183913365Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:39:00.183927125Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:00.183931159Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:00.183934813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.183938068Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:00.1839419Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:39:00.183945716Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:39:00.183949257Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:39:00.183952735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:39:00.183956538Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:39:00.183960063Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:39:00.1839639Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:00.183966988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:00.183973922Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:39:00.18397836Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:39:00.183981987Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:39:00.183985463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:39:00.183989258Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:39:00.183993006Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:39:00.183996845Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:39:00.184000226Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:39:00.184470889Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.184482189Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.184486521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:39:00.184490489Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:39:00.184494733Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.184499378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:00.184503668Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:00.184508046Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.184511599Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.184515893Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:39:00.184520808Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:39:00.184525158Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:00.184529594Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:00.184533551Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:39:00.184537675Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # imports\r\n"} +{"Time":"2023-05-31T19:39:00.184541696Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.184545744Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:39:00.184566911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:39:00.184571557Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.184575284Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.184579363Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:00.184583639Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:00.184587377Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.184591008Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:39:00.18459511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.184602481Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.184607077Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.184610919Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.185029913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.185040734Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:39:00.185045314Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.185049539Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:39:00.185053589Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.185056959Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:39:00.185060932Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.185064656Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.185068335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:39:00.185072131Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:39:00.185076197Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:39:00.185080533Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:39:00.185084541Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.185088793Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:39:00.185092813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:39:00.185096552Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:39:00.185100378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:39:00.185104095Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:39:00.185110883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:39:00.185114585Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:39:00.185118492Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.185121841Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:39:00.185125636Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:39:00.185129603Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:39:00.185134256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.185136946Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:39:00.185653898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18566323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.185667288Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18567169Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:39:00.185676601Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:39:00.185681363Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:39:00.185685617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:39:00.185689599Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:39:00.18569328Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.18569716Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:39:00.185701124Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:39:00.185704979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:39:00.185708846Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18571271Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:39:00.185716455Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:39:00.185720339Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.185724113Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:39:00.185728018Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:39:00.185731848Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:39:00.185736099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:39:00.185739815Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:39:00.18574354Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:39:00.185747055Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:39:00.185750747Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:39:00.185755827Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.186192373Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.186199387Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:39:00.186203523Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T19:39:00.186206852Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T19:39:00.186210965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:39:00.186214712Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.186218251Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T19:39:00.186221891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:00.1862254Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:00.186228736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.186232179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:39:00.186235482Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.186238731Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:39:00.186241861Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18624506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.186248261Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:39:00.186251513Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.186254789Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.186258326Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.186261591Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.186264883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.186268112Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.186271398Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:39:00.186274671Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:39:00.186278195Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.186281073Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:00.186284035Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:00.186287318Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.186771494Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.186779687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.186784483Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18678891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.186792902Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.186796509Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:39:00.186801084Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18680509Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:39:00.186808893Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.18681252Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:39:00.186816291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.186819994Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:39:00.186824131Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:39:00.186828094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:39:00.186831928Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:39:00.186835961Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:39:00.186839731Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:39:00.18684352Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.186847372Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:39:00.186851343Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cdi_spec_dirs = [\"/etc/cdi\", \"/var/run/cdi\"]\r\n"} +{"Time":"2023-05-31T19:39:00.186856244Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:39:00.186860109Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T19:39:00.186863698Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T19:39:00.186867609Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:39:00.186870995Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T19:39:00.186873455Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T19:39:00.186875955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" drain_exec_sync_io_timeout = \"0s\"\r\n"} +{"Time":"2023-05-31T19:39:00.187424119Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_cdi = false\r\n"} +{"Time":"2023-05-31T19:39:00.187432223Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:39:00.18743642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:39:00.187441005Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T19:39:00.187445311Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T19:39:00.187449103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T19:39:00.187453172Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" image_pull_progress_timeout = \"1m0s\"\r\n"} +{"Time":"2023-05-31T19:39:00.187457143Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:39:00.187461247Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:39:00.18746512Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T19:39:00.187469145Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:39:00.187473167Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:39:00.187477089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T19:39:00.187481067Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:39:00.187487376Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T19:39:00.187492268Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.187496337Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:39:00.187500212Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T19:39:00.187503471Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:39:00.187506943Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.187510817Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.18751407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:39:00.187517352Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:39:00.187520822Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:39:00.187524415Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.187932913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18794204Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T19:39:00.187945954Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" setup_serially = false\r\n"} +{"Time":"2023-05-31T19:39:00.187952414Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.187956099Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:39:00.187959904Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.18796309Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T19:39:00.187966256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:39:00.187969844Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ignore_blockio_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:39:00.187973399Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:39:00.187976772Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:39:00.187980081Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:39:00.187983504Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.187986934Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T19:39:00.187990784Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.187994259Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.187997583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:39:00.188000904Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:00.188004126Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:00.188007566Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:00.188011118Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:39:00.188014576Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188017961Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188021262Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188024391Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188422828Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188432294Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188436409Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.188440451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T19:39:00.188444699Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.188449403Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:39:00.188453625Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.188457717Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:39:00.188462395Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188466154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188483259Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:39:00.188487763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:00.188491638Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:00.188495603Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:00.188500945Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:39:00.188506106Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188510284Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18851464Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188519409Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:39:00.188523457Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188527833Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.188531979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.188536062Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:39:00.188540665Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:39:00.188545262Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189350551Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:39:00.189360978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189365419Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189369551Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:39:00.189373437Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:00.189376878Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:00.189380402Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:00.189384719Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:39:00.189388812Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189392874Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189396216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189399801Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189403423Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189410102Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18941382Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189417625Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T19:39:00.189422004Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189426176Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T19:39:00.189430033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T19:39:00.189433281Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189436747Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:39:00.189441078Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:39:00.189444918Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189448394Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T19:39:00.189451907Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189455382Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T19:39:00.189459086Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189462582Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T19:39:00.189466368Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189469747Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T19:39:00.189473248Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189476658Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T19:39:00.189480402Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189484082Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189487569Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189490481Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189493981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:00.189497281Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189509293Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189513005Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T19:39:00.189516738Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189521834Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189526121Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T19:39:00.189529552Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T19:39:00.189532945Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189536441Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189540268Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T19:39:00.189544082Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189547434Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189550913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:39:00.189554372Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189557901Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.nri.v1.nri\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189570325Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable = true\r\n"} +{"Time":"2023-05-31T19:39:00.189574541Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" disable_connections = false\r\n"} +{"Time":"2023-05-31T19:39:00.189578161Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" plugin_config_path = \"/etc/nri/conf.d\"\r\n"} +{"Time":"2023-05-31T19:39:00.189582Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" plugin_path = \"/opt/nri/plugins\"\r\n"} +{"Time":"2023-05-31T19:39:00.189585394Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" plugin_registration_timeout = \"5s\"\r\n"} +{"Time":"2023-05-31T19:39:00.189588756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" plugin_request_timeout = \"2s\"\r\n"} +{"Time":"2023-05-31T19:39:00.189592593Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" socket_path = \"/var/run/nri/nri.sock\"\r\n"} +{"Time":"2023-05-31T19:39:00.189596291Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189599638Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189603034Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T19:39:00.189606293Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.189610256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18961405Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T19:39:00.189617528Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T19:39:00.189620698Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189623864Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189627649Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189631462Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T19:39:00.189635025Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189638665Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189642006Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189645432Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189649035Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T19:39:00.18965235Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189656094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18965946Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.1898024Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189808142Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189811923Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189817551Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T19:39:00.18982121Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189824788Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189828063Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189831635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T19:39:00.18983513Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189838457Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T19:39:00.189841853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189845174Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.18985695Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189861307Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189865058Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189868622Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189872419Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189876094Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189879612Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189883404Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189890822Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T19:39:00.189894502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189897487Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189900932Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.189904384Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.189907781Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T19:39:00.189911339Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.190099396Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T19:39:00.1901113Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.190115987Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190119928Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [plugins.\"io.containerd.transfer.v1.local\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190130314Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.190133931Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:39:00.190137423Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" max_concurrent_uploaded_layers = 3\r\n"} +{"Time":"2023-05-31T19:39:00.190140603Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190143998Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [[plugins.\"io.containerd.transfer.v1.local\".unpack_config]]\r\n"} +{"Time":"2023-05-31T19:39:00.190148001Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" differ = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.190151395Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" platform = \"linux/amd64\"\r\n"} +{"Time":"2023-05-31T19:39:00.190154855Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:39:00.190158256Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190161531Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T19:39:00.190165037Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190168408Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T19:39:00.19017191Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190175618Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190182973Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190187189Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190191306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190195561Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:39:00.190199233Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T19:39:00.19020299Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190206413Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190210672Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190381323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190389467Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:39:00.190393552Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:39:00.190400081Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T19:39:00.190403667Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190407246Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T19:39:00.190411093Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T19:39:00.190415328Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.metrics.shimstats\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:39:00.190419353Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:39:00.190423105Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:39:00.19043634Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T19:39:00.19043967Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:39:00.190444026Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190447537Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T19:39:00.190450744Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.190453795Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.190457035Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:00.190460025Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.190463252Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.1904664Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:39:00.190469739Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ● crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:39:00.190473934Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Loaded: loaded (\u001b]8;;file://calico-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:39:00.190477859Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Active: inactive (dead) since Wed 2023-05-31 19:37:31 UTC; 1min 28s ago\r\n"} +{"Time":"2023-05-31T19:39:00.190481444Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:39:00.190674611Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Main PID: 376 (code=exited, status=0/SUCCESS)\r\n"} +{"Time":"2023-05-31T19:39:00.190681878Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.190685207Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:28 calico-509041 crio[376]: time=\"2023-05-31 19:37:28.933665981Z\" level=debug msg=\"Cached value indicated that overlay is supported\" file=\"overlay/overlay.go:209\"\r\n"} +{"Time":"2023-05-31T19:39:00.190689331Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:28 calico-509041 crio[376]: time=\"2023-05-31 19:37:28.933929841Z\" level=debug msg=\"Cached value indicated that metacopy is being used\" file=\"overlay/overlay.go:339\"\r\n"} +{"Time":"2023-05-31T19:39:00.190693259Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:28 calico-509041 crio[376]: time=\"2023-05-31 19:37:28.934213491Z\" level=debug msg=\"backingFs=extfs, projectQuotaSupported=false, useNativeDiff=false, usingMetacopy=true\" file=\"overlay/overlay.go:400\"\r\n"} +{"Time":"2023-05-31T19:39:00.190697166Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:28 calico-509041 crio[376]: time=\"2023-05-31 19:37:28.924459109Z\" level=debug msg=\"hook monitoring canceled: context canceled\" file=\"hooks/monitor.go:60\"\r\n"} +{"Time":"2023-05-31T19:39:00.190701284Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:31 calico-509041 crio[376]: time=\"2023-05-31 19:37:31.229738399Z\" level=debug msg=\"Closed stream server\" file=\"crio/main.go:383\"\r\n"} +{"Time":"2023-05-31T19:39:00.190705302Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:31 calico-509041 crio[376]: time=\"2023-05-31 19:37:31.230447905Z\" level=debug msg=\"Closed monitors\" file=\"crio/main.go:385\"\r\n"} +{"Time":"2023-05-31T19:39:00.190709715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:31 calico-509041 crio[376]: time=\"2023-05-31 19:37:31.230534481Z\" level=debug msg=\"Closed hook monitor\" file=\"crio/main.go:388\"\r\n"} +{"Time":"2023-05-31T19:39:00.190713301Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:31 calico-509041 crio[376]: time=\"2023-05-31 19:37:31.230597878Z\" level=debug msg=\"Closed main server\" file=\"crio/main.go:393\"\r\n"} +{"Time":"2023-05-31T19:39:00.190716656Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:31 calico-509041 systemd[1]: crio.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:39:00.190719934Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" May 31 19:37:31 calico-509041 systemd[1]: Stopped Container Runtime Interface for OCI (CRI-O).\r\n"} +{"Time":"2023-05-31T19:39:00.190723044Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:39:00.190726166Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.190729063Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.190732005Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:39:00.190735458Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[0;1;34m# \u001b]8;;file://calico-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:00.191129042Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:00.191162278Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:39:00.191166418Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T19:39:00.191170146Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:39:00.191173708Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:00.191176865Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:00.191180262Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" After=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:39:00.191183902Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Requires=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:39:00.191187618Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.191190775Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:00.191193761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:39:00.191196578Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=-/etc/sysconfig/crio\r\n"} +{"Time":"2023-05-31T19:39:00.191203255Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=-/etc/sysconfig/crio.minikube\r\n"} +{"Time":"2023-05-31T19:39:00.191206508Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:39:00.191209813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:39:00.191212935Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T19:39:00.191216177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CRIO_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:00.191219708Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" $CRIO_MINIKUBE_OPTIONS\r\n"} +{"Time":"2023-05-31T19:39:00.191222932Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:39:00.191226595Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:39:00.191230633Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:39:00.191233799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T19:39:00.191236795Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:39:00.191239782Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T19:39:00.191243Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:39:00.191246286Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:39:00.191555058Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.191564637Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:00.191569158Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:00.1915731Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.191577237Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.191580573Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:39:00.191584645Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T19:39:00.191588168Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:39:00.191592237Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:39:00.191595983Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:39:00.191599891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.19160335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:39:00.191606755Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.191610317Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:39:00.191613773Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:39:00.191617192Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:39:00.19162089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:39:00.191624107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.191627372Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:39:00.191630685Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:39:00.191634255Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:39:00.191637651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:39:00.191641097Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:39:00.191644233Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.191647625Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:39:00.192176503Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:39:00.19218691Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:39:00.192191495Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192194975Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:39:00.19219871Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:39:00.192202034Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192205412Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:39:00.192208718Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:39:00.192212095Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:39:00.192215707Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.19221902Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:39:00.192222468Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:39:00.19222574Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:39:00.192229182Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:39:00.192232506Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.192235642Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192239084Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:39:00.192242687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:39:00.192246105Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:39:00.192249336Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.19225264Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:39:00.192259391Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:39:00.192263916Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:39:00.192267432Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:39:00.192783067Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192791619Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:39:00.192795633Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:39:00.192799267Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:39:00.192802756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:39:00.192806159Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192809649Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:39:00.192813575Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:39:00.192816879Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192820776Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:39:00.192824227Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:39:00.19282798Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.19283098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:39:00.192834032Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:39:00.192837326Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192850742Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:39:00.192855279Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:39:00.19285847Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:39:00.192861651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192864591Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:39:00.192868083Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:39:00.192870777Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.192873828Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:39:00.192879784Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:39:00.192883323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:39:00.193360754Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.193371232Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193376098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:39:00.193380376Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:39:00.193384983Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.193388795Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193392511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:39:00.193397629Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:39:00.193401628Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:39:00.193405432Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.193410212Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193413707Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:39:00.193417098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:00.193420253Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193423841Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:39:00.193427536Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:00.19343103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193434466Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:39:00.193439143Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:39:00.193442533Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:39:00.193446019Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193452532Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:39:00.193457287Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:39:00.193462154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:39:00.193932035Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:39:00.193938733Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:39:00.193942911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #]\r\n"} +{"Time":"2023-05-31T19:39:00.193946828Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193950204Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:39:00.193953713Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:39:00.193957009Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193960245Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:39:00.193964188Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.193967613Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:39:00.193971088Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193974277Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:39:00.19397795Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:39:00.193981125Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:39:00.193984197Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193987145Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:39:00.193990225Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:39:00.193992932Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.193994928Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:39:00.193997015Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:39:00.194001033Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:39:00.194003319Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:39:00.194005553Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.19400767Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.194009712Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:39:00.194539646Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:39:00.194550634Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:39:00.194555218Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_env = [\r\n"} +{"Time":"2023-05-31T19:39:00.194560244Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.194564312Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.194568591Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:39:00.194573061Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" selinux = false\r\n"} +{"Time":"2023-05-31T19:39:00.194576781Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.194580413Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:39:00.194584532Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:39:00.194588706Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.194593383Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.194597604Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.194602139Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:39:00.194606177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:39:00.194610364Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:39:00.194614202Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:39:00.194618366Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:39:00.194622605Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.194626229Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:39:00.19463059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:39:00.19463516Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:39:00.194639387Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:39:00.194643677Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.195237658Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:39:00.195247268Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.195259262Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:39:00.19526268Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:39:00.195266747Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.195270007Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:39:00.19527354Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.195277177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.19528031Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:39:00.195285758Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:39:00.19528964Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:39:00.195293064Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:39:00.195296507Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:39:00.195300064Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:39:00.195303503Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:39:00.195306623Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:39:00.195309977Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:39:00.195313634Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:39:00.195317089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:39:00.195320403Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:39:00.195323833Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:39:00.195327137Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.195330599Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.195333707Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:39:00.195337241Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:39:00.195341521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:39:00.195846473Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.195859425Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.195864739Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:39:00.195869491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:39:00.195874667Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:39:00.19587895Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:39:00.195883107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" additional_devices = [\r\n"} +{"Time":"2023-05-31T19:39:00.195891827Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.195895764Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.195899627Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:39:00.195903748Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:39:00.195908107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:39:00.19591162Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:39:00.195915407Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.195919098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.195923203Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:39:00.195927482Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:39:00.195931442Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:39:00.195935442Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.195939736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:39:00.195943889Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:39:00.195948059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:39:00.195952617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.195957027Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:39:00.196340492Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:39:00.196347887Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:39:00.196351546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:39:00.196355097Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.196358671Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.196362181Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.196365361Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:39:00.196368998Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:39:00.196372498Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.196375886Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:39:00.196379474Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:39:00.196382939Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:39:00.196386916Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # limit is never exceeded.\r\n"} +{"Time":"2023-05-31T19:39:00.19639054Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:39:00.196393451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.196396994Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Whether container output should be logged to journald in addition to the kubernetes log file\r\n"} +{"Time":"2023-05-31T19:39:00.196400777Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:39:00.196404306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.196407585Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:39:00.196411004Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:39:00.196414491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.1964179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:39:00.196421338Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:39:00.196424668Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.197113949Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:39:00.197125304Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.197129635Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.197133859Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:39:00.197138101Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" read_only = false\r\n"} +{"Time":"2023-05-31T19:39:00.197142254Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.197146427Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:39:00.197150849Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:39:00.197155232Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.197158983Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:39:00.197163712Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.197183574Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:39:00.19718696Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.197190288Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.19719406Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.197197518Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:39:00.197200813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:39:00.197204197Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:39:00.197207377Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.197211518Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.197215177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:39:00.197222483Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:39:00.197225903Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:39:00.197229458Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.197232877Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.198179716Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:39:00.198190342Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:39:00.198194511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:39:00.198198458Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:39:00.198202209Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.19820832Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # manage_ns_lifecycle determines whether we pin and remove namespaces\r\n"} +{"Time":"2023-05-31T19:39:00.198212634Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # and manage their lifecycle.\r\n"} +{"Time":"2023-05-31T19:39:00.19821667Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is being deprecated, and will be unconditionally true in the future.\r\n"} +{"Time":"2023-05-31T19:39:00.198219978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" manage_ns_lifecycle = true\r\n"} +{"Time":"2023-05-31T19:39:00.198223353Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.198227103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:39:00.198230675Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:39:00.198234451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:39:00.198238755Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:39:00.198242432Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:39:00.198245687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.198249089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:39:00.1982526Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:39:00.198256295Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:39:00.198261759Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.198265617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:39:00.198269232Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:39:00.198272631Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.198276207Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:39:00.198911362Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:39:00.198922944Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:39:00.198927714Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.198941052Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.198945908Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:39:00.198950322Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The runtime to use is picked based on the runtime_handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:39:00.198954328Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If no runtime_handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:39:00.198958011Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:39:00.198962032Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.198966136Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:39:00.19897042Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:39:00.198974756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:39:00.198978479Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:39:00.198982593Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:00.198986711Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:00.198990101Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:39:00.198993855Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:39:00.198997732Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:39:00.199001418Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:39:00.199005373Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:39:00.199008895Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:39:00.199012875Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:39:00.19901705Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:39:00.199463517Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:39:00.199475978Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:39:00.199481192Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:39:00.199485522Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:39:00.199490339Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:39:00.199501582Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:39:00.199506059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:39:00.199510724Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:39:00.199515172Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:39:00.199519529Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:39:00.199523731Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.199527788Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.199531694Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:39:00.199535899Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.199543628Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:39:00.199548059Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.199552067Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.199555843Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.199559665Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.199563537Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.199567395Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:39:00.199571505Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:39:00.199575735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:39:00.199579789Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.19958389Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:39:00.199957346Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:39:00.199968331Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:39:00.199973398Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.199977899Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:39:00.199982085Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:39:00.199986451Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.199990523Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:39:00.19999494Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:39:00.199998502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.2000048Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:39:00.200008469Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:39:00.200011636Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200014822Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:39:00.200018518Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.20002164Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:39:00.200025513Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:39:00.20003136Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:39:00.200034873Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:39:00.200038517Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:39:00.200041796Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:39:00.200044925Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.20004851Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:39:00.200052305Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:39:00.200055813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200448463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:39:00.200456818Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:39:00.200460522Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.200464869Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200468184Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:39:00.200472389Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.200475825Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:39:00.200479301Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200487139Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:39:00.200491511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:39:00.200495751Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.200501529Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.200504957Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200508663Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:39:00.200512542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:39:00.200517251Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:39:00.200521266Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.200524811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:39:00.200528413Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200531946Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:39:00.200535808Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:39:00.200539336Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:39:00.200542581Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:39:00.200906152Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:39:00.200913633Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.20091765Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200921379Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:39:00.200925247Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:39:00.200931353Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:39:00.200935323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #insecure_registries = \"[]\"\r\n"} +{"Time":"2023-05-31T19:39:00.200938996Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200942768Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:39:00.200946869Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:39:00.200950923Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:39:00.20095444Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200957915Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:39:00.200960657Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.200964045Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200967599Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:39:00.200971322Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:39:00.200975133Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:39:00.200978735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200982299Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:39:00.200986268Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:39:00.200990189Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.20099348Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.200996856Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:39:00.201000154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:39:00.201982686Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.20199409Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:39:00.201998785Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:39:00.202002544Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:39:00.202006602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.202010134Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.202013636Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:39:00.202017354Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:39:00.202021054Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.20202511Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:39:00.202029246Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:39:00.202033017Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.202036915Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:39:00.202040904Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:39:00.202044967Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.202048794Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:39:00.202052881Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.202056907Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T19:39:00.202060816Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:39:00.202065071Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.202068954Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.202072898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:39:00.202076804Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.202080555Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.202084237Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:39:00.202087752Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.202091178Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.202094813Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.203236409Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:39:00.203247341Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:39:00.110497327Z] Starting CRI-O, version: 1.24.1, git: a3bbde8a77c323aa6a485da9a9046299155c6016(dirty) \r\n"} +{"Time":"2023-05-31T19:39:00.203252562Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T19:39:00.203256961Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:39:00.203261491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:39:00.203265909Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:39:00.203269784Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.203274774Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:39:00.203279356Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.203283818Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:39:00.203288336Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:39:00.20329341Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:39:00.20329715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:39:00.203301021Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.203307968Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:39:00.203312703Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:39:00.203316664Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:39:00.20332258Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:39:00.203326713Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:39:00.20333192Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.203335798Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:39:00.20333999Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:39:00.204478783Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:39:00.204490101Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.204494491Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:39:00.204499312Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:39:00.204502911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.204506722Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:39:00.204510863Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:39:00.204514759Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:39:00.204518421Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.204522625Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:39:00.204529985Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:39:00.204534497Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:39:00.204539067Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:39:00.204543722Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.204558469Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.204564176Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:39:00.204568849Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:39:00.204578686Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:39:00.204582521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.204586715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:39:00.204590414Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:39:00.204594136Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:39:00.20459786Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:39:00.204602134Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.204605955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:39:00.205749621Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:39:00.205760567Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:39:00.205765171Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:39:00.205768861Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.205772981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T19:39:00.205777176Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T19:39:00.205781694Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T19:39:00.205785371Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.205789142Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T19:39:00.205792968Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T19:39:00.205796689Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T19:39:00.205800981Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T19:39:00.205804959Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.205808669Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:39:00.205812446Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:39:00.205816446Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.205820219Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:39:00.205823786Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:39:00.20582739Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.205830709Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:39:00.205838191Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:39:00.205841988Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.205845688Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:39:00.205850318Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:39:00.206945437Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:39:00.206953902Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.206956786Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:39:00.206959602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:39:00.206962005Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.206964426Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T19:39:00.206966961Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.206969484Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.206974546Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:39:00.206977376Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:39:00.20697989Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:39:00.206982485Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.206984865Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.206987158Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:39:00.206989696Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:39:00.206992056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.206994469Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.20699964Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:39:00.207002178Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:39:00.207004622Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:39:00.207007003Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.207009219Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.207011956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:39:00.207014853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:00.207017154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.208018017Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:39:00.208028825Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:00.208032869Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.208036965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:39:00.20804159Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:39:00.208045677Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:39:00.208049789Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.20805389Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:39:00.208057834Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:39:00.208062213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:39:00.208066945Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:39:00.208071012Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:39:00.208074886Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.208078666Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.208082576Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:39:00.208086662Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T19:39:00.208090284Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.208093868Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:39:00.208098348Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.208101979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:39:00.208105803Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.208109754Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:39:00.208113844Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:39:00.208118089Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:39:00.209273385Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:39:00.209290913Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.209295719Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:39:00.209300037Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T19:39:00.209304032Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:39:00.20930796Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.209312101Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:39:00.209316312Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:39:00.209320528Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:39:00.209324651Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:39:00.20932868Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:39:00.209332902Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:00.209336531Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.209340461Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:39:00.209344565Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:39:00.209348733Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:39:00.209352763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T19:39:00.209356891Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.209360723Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.209371967Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:39:00.209376043Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T19:39:00.209379606Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.209383021Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:39:00.209387428Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:39:00.210534545Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.210545718Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.210550618Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.21055496Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:39:00.2105591Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:39:00.210563103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:39:00.210567223Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:39:00.210571092Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:39:00.210574903Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.210578761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:39:00.210586307Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:39:00.210590497Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:39:00.21059452Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:39:00.210598449Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.210602217Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:39:00.210606069Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.210609734Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T19:39:00.210613449Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T19:39:00.21061735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.210620917Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.210624889Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T19:39:00.210628528Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T19:39:00.210632819Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T19:39:00.211665017Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.211676574Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T19:39:00.211690026Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.211695242Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.211700568Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.211708271Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:39:00.211716287Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:39:00.211723938Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.211728691Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:39:00.211736378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.211740955Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.211745753Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:39:00.211750333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:39:00.211758935Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:39:00.21176329Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:39:00.211771035Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:39:00.211775521Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:39:00.211783328Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:39:00.211787707Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:39:00.211797275Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:39:00.211809828Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:39:00.211814163Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:39:00.211819207Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:39:00.211823609Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:39:00.21183122Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.21183538Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.212936565Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:39:00.21294438Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:39:00.212946855Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:39:00.213073591Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.213079956Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.213082726Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T19:39:00.213085547Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T19:39:00.213088072Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T19:39:00.213090213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T19:39:00.213092853Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.213095023Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.213097356Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:39:00.213099865Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:39:00.213103056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:39:00.213105559Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:39:00.213113343Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T19:39:00.213116023Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.213118303Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.213120911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T19:39:00.213123216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T19:39:00.213127973Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T19:39:00.213130425Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T19:39:00.213132763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.213135122Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.213137345Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T19:39:00.213139863Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T19:39:00.214125714Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T19:39:00.214133247Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:39:00.214136243Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.214139046Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:39:00.214141796Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:39:00.214144141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:39:00.214146665Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:39:00.21414905Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.214151414Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.214153825Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:39:00.214156405Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:39:00.214162958Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:39:00.214173475Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.214176117Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:39:00.214178615Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:39:00.21418112Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:39:00.21418374Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.214186153Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:39:00.214188735Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:39:00.214193814Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:39:00.214196373Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:39:00.214198799Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.214214692Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.214220702Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.215005003Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:39:00.215014297Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T19:39:00.215018352Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:39:00.215022118Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.215030776Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:39:00.215034377Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:39:00.215044131Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:39:00.215050472Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T19:39:00.215057829Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:39:00.215061979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.215068849Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T19:39:00.215072879Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:39:00.215081658Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.215086669Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:39:00.215093877Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:39:00.215097882Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.215104179Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:39:00.215108782Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:39:00.215112602Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.215118227Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:39:00.215129826Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.215136832Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.215140734Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:39:00.215144216Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T19:39:00.216256771Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.216267272Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:39:00.21627191Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:39:00.216275937Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.216280054Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:39:00.216287502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.216291628Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:39:00.216299148Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.216303294Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.216310128Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.216314898Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:39:00.216321763Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:39:00.216325387Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:39:00.216328856Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.216338756Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.216342548Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:39:00.216346386Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:39:00.21635045Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:39:00.216354811Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.216358316Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.216362269Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T19:39:00.216365911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:39:00.216369757Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:39:00.216373151Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T19:39:00.216376998Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.21759958Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T19:39:00.21761132Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:39:00.21761615Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:39:00.217620992Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T19:39:00.217626327Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.217631207Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:39:00.217635733Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:39:00.21763962Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:39:00.217644507Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:39:00.217648333Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.217652427Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:39:00.217657103Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:39:00.217662849Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:39:00.217666812Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:39:00.217669957Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:39:00.217673909Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.217677705Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T19:39:00.217681573Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T19:39:00.217684943Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T19:39:00.217692462Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.217696603Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.217700112Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:39:00.217703259Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:39:00.218915306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:39:00.21892414Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.218927664Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:39:00.218931628Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:39:00.218934107Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.218936466Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:39:00.218939028Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:39:00.218941751Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:39:00.218944717Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.218948584Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.218952335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T19:39:00.218956359Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T19:39:00.218960874Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T19:39:00.218965736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T19:39:00.218969609Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T19:39:00.218974475Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T19:39:00.218977798Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T19:39:00.218982325Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.218985792Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.21898979Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:39:00.218995141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:39:00.219000204Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:39:00.220240394Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:39:00.220249653Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.220253787Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:39:00.220257263Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:39:00.220260852Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:39:00.220264337Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:39:00.220270128Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:00.220273666Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:00.220277124Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:39:00.220281259Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:39:00.220285045Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:39:00.220302122Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:39:00.220306543Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:39:00.220310301Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:39:00.220313826Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:39:00.220317652Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:39:00.22032153Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:39:00.220325005Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:39:00.220328355Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T19:39:00.220331687Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T19:39:00.22033577Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:39:00.220339463Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:39:00.220342984Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:39:00.221587159Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:39:00.221598053Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:39:00.221602839Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:39:00.221607252Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T19:39:00.221611787Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:39:00.221616266Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:39:00.221621019Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T19:39:00.221638154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T19:39:00.221642714Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T19:39:00.221646631Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T19:39:00.221650771Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T19:39:00.221654423Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.221658183Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.221662548Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:39:00.221666481Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.221670678Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:39:00.221674933Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:39:00.221679406Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.221683583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.221687734Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.221691485Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.221695575Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.221699719Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.223004008Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.223015542Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.223019821Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.223023866Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:39:00.223028366Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:39:00.223034276Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:39:00.223037904Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.223041552Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:39:00.223045527Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:39:00.223049705Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:39:00.223053444Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.223057741Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:39:00.223062323Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:39:00.223066133Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.223069996Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:39:00.223074217Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:39:00.223078052Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.223081764Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:39:00.223085522Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:39:00.223089091Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.223093349Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T19:39:00.223097762Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T19:39:00.223101965Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T19:39:00.223106437Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T19:39:00.223111525Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T19:39:00.224173554Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T19:39:00.224184554Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T19:39:00.224189964Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T19:39:00.224195148Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T19:39:00.224199387Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T19:39:00.224203723Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Example:\r\n"} +{"Time":"2023-05-31T19:39:00.224207736Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T19:39:00.224211808Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T19:39:00.224216177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T19:39:00.224219883Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T19:39:00.224223503Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T19:39:00.224227127Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T19:39:00.224240378Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:39:00.224246335Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T19:39:00.224259265Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T19:39:00.22426358Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T19:39:00.224267773Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T19:39:00.224271914Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T19:39:00.224276905Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T19:39:00.224281776Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \r\n"} +{"Time":"2023-05-31T19:39:00.22428555Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.224289559Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:39:00.225524349Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:00.225535146Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:39:00.22554044Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:39:00.225545054Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:39:00.225553191Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:39:00.225556895Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:39:00.225561141Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:39:00.225565049Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.225569134Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:39:00.225573066Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:39:00.225577213Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.225581066Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:39:00.225592838Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:39:00.225599641Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.22561388Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.225617892Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:39:00.225622493Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.225629876Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:39:00.22563773Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.225645638Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:39:00.225653629Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:39:00.225661578Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.22566928Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.226785575Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.22679627Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:39:00.226803349Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:39:00.226815448Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:39:00.226819931Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:00.226824452Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:39:00.226832795Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.226840206Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:39:00.226847821Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:39:00.226855091Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:39:00.226859395Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:39:00.226863512Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:39:00.226867699Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.226871847Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.226876076Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:39:00.226880275Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:39:00.226884219Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:39:00.226887921Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T19:39:00.226891894Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.226895416Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.226899398Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:39:00.226903309Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:39:00.226907915Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:39:00.226912139Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.228091304Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:39:00.228101145Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.228105489Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.228109656Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:39:00.228114154Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:39:00.228118086Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:39:00.22812241Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.228126394Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:39:00.228130705Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:39:00.228134519Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.228138517Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.228142655Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:39:00.228146727Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:39:00.228150752Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.228154902Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:39:00.228159421Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:39:00.228163295Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:39:00.228176824Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.228180563Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.228184518Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:39:00.228188142Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:39:00.22819176Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.228195808Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:39:00.228199715Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:39:00.228203505Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.228208528Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T19:39:00.229292517Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T19:39:00.229304418Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T19:39:00.229309563Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T19:39:00.229314052Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T19:39:00.229325766Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T19:39:00.229337056Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T19:39:00.229341108Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.229350117Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T19:39:00.229354351Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T19:39:00.22936617Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T19:39:00.229370539Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T19:39:00.229396347Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T19:39:00.229401997Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T19:39:00.229411363Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T19:39:00.229415751Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T19:39:00.229428912Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T19:39:00.229440792Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.229451616Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T19:39:00.229462279Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T19:39:00.229466911Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.229475878Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T19:39:00.229491306Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.229503398Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.229507761Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.229511476Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.230021817Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.230035468Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.230039182Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.230048791Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T19:39:00.230052566Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:00.230063728Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:39:00.230074816Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:39:00.230079098Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230088608Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:39:00.230110034Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.230113885Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230123852Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:39:00.230127711Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T19:39:00.230138475Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T19:39:00.23014271Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T19:39:00.230153016Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.230157674Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230161436Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:39:00.230166321Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T19:39:00.230169562Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T19:39:00.230174177Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230178004Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T19:39:00.230185017Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T19:39:00.230188569Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230198769Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T19:39:00.230202894Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T19:39:00.230718583Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230732305Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T19:39:00.230736489Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T19:39:00.23074575Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230749137Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T19:39:00.230758502Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T19:39:00.230762021Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230765442Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T19:39:00.230774415Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T19:39:00.230777826Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.230786619Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T19:39:00.230790247Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T19:39:00.23079908Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T19:39:00.230802679Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \r\n"} +{"Time":"2023-05-31T19:39:00.23081173Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T19:39:00.230815536Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ----------------------- debugLogs end: calico-509041 [took: 15.290191904s] --------------------------------\n"} +{"Time":"2023-05-31T19:39:00.230825074Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:175: Cleaning up \"calico-509041\" profile ...\n"} +{"Time":"2023-05-31T19:39:00.230836461Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p calico-509041\n"} +{"Time":"2023-05-31T19:39:01.34234108Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p calico-509041: (1.15950964s)\n"} +{"Time":"2023-05-31T19:39:01.342368612Z","Action":"cont","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T19:39:01.342373025Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== CONT TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T19:39:01.342377501Z","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/Start"} +{"Time":"2023-05-31T19:39:01.342379969Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/Start\n"} +{"Time":"2023-05-31T19:39:01.342413133Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-linux-amd64 start -p enable-default-cni-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --enable-default-cni=true --driver=kvm2 --container-runtime=containerd\n"} +{"Time":"2023-05-31T19:39:13.718872898Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T19:39:13.718901514Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ----------------------- debugLogs start: custom-flannel-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:39:13.718907187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:39:13.718911481Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T19:39:13.71891452Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T19:39:13.718916872Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718919476Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:39:13.718921927Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T19:39:13.718923947Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718925861Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718927862Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718934429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:39:13.718938403Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T19:39:13.718941604Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718945238Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718948395Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:39:13.718951764Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T19:39:13.718954874Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718958037Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718961322Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:39:13.718965387Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:39:13.718969099Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T19:39:13.718972744Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718976364Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.718979807Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:39:13.718983217Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T19:39:13.718986392Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T19:39:13.718989064Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T19:39:13.718991235Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T19:39:13.718993347Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T19:39:13.718995506Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T19:39:13.718997515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T19:39:13.718999556Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 10.244.0.3\tnetcat-7458db8b8-vnx52\n"} +{"Time":"2023-05-31T19:39:13.719001408Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719003236Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.71900518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:39:13.7190073Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T19:39:13.719010852Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T19:39:13.719012817Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" options ndots:5\n"} +{"Time":"2023-05-31T19:39:13.719014625Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719016504Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719018341Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:39:13.719020393Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T19:39:13.719022379Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.719024423Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" passwd: files mymachines systemd\r\n"} +{"Time":"2023-05-31T19:39:13.719027866Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" group: files [SUCCESS=merge] mymachines [SUCCESS=merge] systemd\r\n"} +{"Time":"2023-05-31T19:39:13.719031259Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T19:39:13.719034449Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.719037375Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname\r\n"} +{"Time":"2023-05-31T19:39:13.719040799Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" networks: files dns\r\n"} +{"Time":"2023-05-31T19:39:13.719043806Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.71904659Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" protocols: files\r\n"} +{"Time":"2023-05-31T19:39:13.719049487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" services: files\r\n"} +{"Time":"2023-05-31T19:39:13.719052551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ethers: files\r\n"} +{"Time":"2023-05-31T19:39:13.71905599Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rpc: files\r\n"} +{"Time":"2023-05-31T19:39:13.719058926Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.71906175Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719065268Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:39:13.71906841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T19:39:13.71907155Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 127.0.1.1 custom-flannel-509041\r\n"} +{"Time":"2023-05-31T19:39:13.719074948Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.72.1\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T19:39:13.719078408Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.72.243\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T19:39:13.719082002Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719085847Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719089507Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:39:13.719092546Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This is /run/systemd/resolve/resolv.conf managed by man:systemd-resolved(8).\r\n"} +{"Time":"2023-05-31T19:39:13.719098115Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Do not edit.\r\n"} +{"Time":"2023-05-31T19:39:13.719101253Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.719104964Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This file might be symlinked as /etc/resolv.conf. If you're looking at\r\n"} +{"Time":"2023-05-31T19:39:13.719108633Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # /etc/resolv.conf and seeing this text, you have followed the symlink.\r\n"} +{"Time":"2023-05-31T19:39:13.71911226Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.719115573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This is a dynamic resolv.conf file for connecting local clients directly to\r\n"} +{"Time":"2023-05-31T19:39:13.71911944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # all known uplink DNS servers. This file lists all configured search domains.\r\n"} +{"Time":"2023-05-31T19:39:13.719122855Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.719126168Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Third party programs should typically not access this file directly, but only\r\n"} +{"Time":"2023-05-31T19:39:13.719130285Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # through the symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a\r\n"} +{"Time":"2023-05-31T19:39:13.719133635Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # different way, replace this symlink by a static file or a different symlink.\r\n"} +{"Time":"2023-05-31T19:39:13.719136519Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.719139477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # See man:systemd-resolved.service(8) for details about the supported modes of\r\n"} +{"Time":"2023-05-31T19:39:13.719142876Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # operation for /etc/resolv.conf.\r\n"} +{"Time":"2023-05-31T19:39:13.719146096Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.719149217Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nameserver 192.168.122.1\r\n"} +{"Time":"2023-05-31T19:39:13.719151937Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" search .\r\n"} +{"Time":"2023-05-31T19:39:13.719154443Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719157009Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719207883Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:39:13.719215923Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T19:39:13.719224663Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node/custom-flannel-509041 Ready control-plane 55s v1.27.2 192.168.72.243 \u003cnone\u003e Buildroot 2021.02.12 5.10.57 containerd://1.7.1\n"} +{"Time":"2023-05-31T19:39:13.719230117Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719234862Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T19:39:13.719240148Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 53s \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719245602Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default service/netcat ClusterIP 10.102.7.210 \u003cnone\u003e 8080/TCP 19s app=netcat\n"} +{"Time":"2023-05-31T19:39:13.719250668Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 52s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:13.719255066Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719259425Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T19:39:13.71926434Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default endpoints/kubernetes 192.168.72.243:8443 53s\n"} +{"Time":"2023-05-31T19:39:13.71926912Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default endpoints/netcat 10.244.0.3:8080 19s\n"} +{"Time":"2023-05-31T19:39:13.719273484Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 37s\n"} +{"Time":"2023-05-31T19:39:13.719309982Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 39s\n"} +{"Time":"2023-05-31T19:39:13.71931385Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719317795Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:39:13.719321889Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-flannel daemonset.apps/kube-flannel-ds 1 1 1 1 1 \u003cnone\u003e 50s kube-flannel docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2 app=flannel\n"} +{"Time":"2023-05-31T19:39:13.71932529Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 52s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.719329195Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719331816Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:39:13.719335765Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default deployment.apps/netcat 1/1 1 1 19s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T19:39:13.719340084Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system deployment.apps/coredns 1/1 1 1 52s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:13.719344094Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719350787Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T19:39:13.719355794Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default pod/netcat-7458db8b8-vnx52 1/1 Running 0 19s 10.244.0.3 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719361098Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-flannel pod/kube-flannel-ds-qbsw2 1/1 Running 0 39s 192.168.72.243 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719366219Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/coredns-5d78c9869d-s5czw 1/1 Running 0 39s 10.244.0.2 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719370918Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/etcd-custom-flannel-509041 1/1 Running 0 51s 192.168.72.243 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719375547Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/kube-apiserver-custom-flannel-509041 1/1 Running 0 51s 192.168.72.243 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719380211Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/kube-controller-manager-custom-flannel-509041 1/1 Running 0 51s 192.168.72.243 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719385121Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/kube-proxy-ghwsj 1/1 Running 0 39s 192.168.72.243 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.71938982Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/kube-scheduler-custom-flannel-509041 1/1 Running 0 51s 192.168.72.243 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719395383Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-system pod/storage-provisioner 1/1 Running 0 37s 192.168.72.243 custom-flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719399895Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719403601Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719407427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:39:13.719411975Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T19:39:13.719416984Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 42fbec551601e 19 seconds ago Ready netcat-7458db8b8-vnx52 default 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719420589Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 6689c9810edab 22 seconds ago Ready coredns-5d78c9869d-s5czw kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719423394Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 4fea164a86a46 33 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719426741Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 4790ddfa4aae5 39 seconds ago Ready kube-flannel-ds-qbsw2 kube-flannel 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719431428Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 4470f9b8850ad 39 seconds ago Ready kube-proxy-ghwsj kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719435771Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 23cb1978ebc17 About a minute ago Ready kube-controller-manager-custom-flannel-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719440185Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" eb4511f61b22c About a minute ago Ready kube-scheduler-custom-flannel-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719444996Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 94e11c9bfe6dd About a minute ago Ready kube-apiserver-custom-flannel-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719449608Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 19d7ab3d7f86f About a minute ago Ready etcd-custom-flannel-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:39:13.719453618Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.71945736Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719461131Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:39:13.719465544Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\r\n"} +{"Time":"2023-05-31T19:39:13.719476155Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" f260da254a82d 28081458d86cc 14 seconds ago Running dnsutils 0 42fbec551601e\r\n"} +{"Time":"2023-05-31T19:39:13.719480647Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" d840b080c378d ead0a4a53df89 22 seconds ago Running coredns 0 6689c9810edab\r\n"} +{"Time":"2023-05-31T19:39:13.719485053Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 860b6d9a1dce2 6e38f40d628db 33 seconds ago Running storage-provisioner 0 4fea164a86a46\r\n"} +{"Time":"2023-05-31T19:39:13.719489928Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1878861622719 b5c6c9203f83e 33 seconds ago Running kube-flannel 0 4790ddfa4aae5\r\n"} +{"Time":"2023-05-31T19:39:13.719494595Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 9f7af622fc900 b5c6c9203f83e 34 seconds ago Exited install-cni 0 4790ddfa4aae5\r\n"} +{"Time":"2023-05-31T19:39:13.71949914Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bcd8290e6456d fcecffc7ad4af 37 seconds ago Exited install-cni-plugin 0 4790ddfa4aae5\r\n"} +{"Time":"2023-05-31T19:39:13.719503568Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1280237fdd1f3 b8aa50768fd67 39 seconds ago Running kube-proxy 0 4470f9b8850ad\r\n"} +{"Time":"2023-05-31T19:39:13.719508226Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 11d82e266c23b 89e70da428d29 59 seconds ago Running kube-scheduler 0 eb4511f61b22c\r\n"} +{"Time":"2023-05-31T19:39:13.719511072Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 4eb52c0d343df 86b6af7dd652c 59 seconds ago Running etcd 0 19d7ab3d7f86f\r\n"} +{"Time":"2023-05-31T19:39:13.719513737Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bc1050af9d575 ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 23cb1978ebc17\r\n"} +{"Time":"2023-05-31T19:39:13.719517187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" aa5d55308c245 c5b13e4f7806d About a minute ago Running kube-apiserver 0 94e11c9bfe6dd\r\n"} +{"Time":"2023-05-31T19:39:13.719521014Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719524462Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719528412Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:39:13.719547876Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: netcat\n"} +{"Time":"2023-05-31T19:39:13.719553447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:39:13.71955747Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CreationTimestamp: Wed, 31 May 2023 19:38:45 +0000\n"} +{"Time":"2023-05-31T19:39:13.719561497Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:39:13.719565617Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:39:13.719569659Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T19:39:13.719573696Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:39:13.719577779Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:39:13.719581517Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:39:13.719585671Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:39:13.719589358Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:13.719593196Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:39:13.719596752Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.719599236Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:39:13.71961515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:39:13.719629841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719635586Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719639551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.719643726Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:39:13.719647415Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -c\n"} +{"Time":"2023-05-31T19:39:13.719651489Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:39:13.719655296Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.71965929Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719663063Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719668083Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:13.719671936Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:39:13.71967585Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:39:13.719679668Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:39:13.719683817Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:39:13.719687673Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719690261Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:39:13.719692667Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:13.719697664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:13.719702007Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:13.719706152Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal ScalingReplicaSet 20s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T19:39:13.719710035Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719713638Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719717457Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:39:13.719721496Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: netcat-7458db8b8-vnx52\n"} +{"Time":"2023-05-31T19:39:13.719725331Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:39:13.719729066Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 0\n"} +{"Time":"2023-05-31T19:39:13.719732857Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: default\n"} +{"Time":"2023-05-31T19:39:13.719736927Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-509041/192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.719740997Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 19:38:45 +0000\n"} +{"Time":"2023-05-31T19:39:13.719745039Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:39:13.719749079Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T19:39:13.719752752Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719756597Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:13.719760805Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T19:39:13.719766291Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:13.719770505Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T19:39:13.719774071Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T19:39:13.719777318Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.71977969Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:39:13.719782034Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: containerd://f260da254a82dad759451a4bcf26563f54e86b257fa2265aaec649057d3829dc\n"} +{"Time":"2023-05-31T19:39:13.719785066Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:39:13.719789111Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T19:39:13.719793044Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719796979Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719800853Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.719805274Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:39:13.719809443Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -c\n"} +{"Time":"2023-05-31T19:39:13.71981334Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:39:13.719817296Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:13.719821058Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 19:38:51 +0000\n"} +{"Time":"2023-05-31T19:39:13.719825093Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:13.719829023Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:13.719832786Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719836784Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.719840703Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-gw678 (ro)\n"} +{"Time":"2023-05-31T19:39:13.719844602Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:13.719848288Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:13.719862197Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:13.71986689Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:13.719869515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:13.719871549Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:13.719873613Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:13.719876605Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-api-access-gw678:\n"} +{"Time":"2023-05-31T19:39:13.719879917Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:13.719883434Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:13.719887047Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.719890766Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:13.719894524Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:13.719899247Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:39:13.719902551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.719906338Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:13.719910194Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:13.719913537Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:13.719916802Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:13.719920187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:13.719923935Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Scheduled 20s default-scheduler Successfully assigned default/netcat-7458db8b8-vnx52 to custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.719927873Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulling 19s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T19:39:13.719931908Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 14s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 4.680533759s (4.68054344s including waiting)\n"} +{"Time":"2023-05-31T19:39:13.719944384Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 14s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T19:39:13.719948946Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 14s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T19:39:13.719952295Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719955573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719958892Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:39:13.719962151Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719964902Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.719967857Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:39:13.71997153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:39:13.719974834Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.719978304Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CreationTimestamp: Wed, 31 May 2023 19:38:12 +0000\n"} +{"Time":"2023-05-31T19:39:13.719982344Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:13.719986208Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:39:13.719989728Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:13.719993071Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:39:13.719996413Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:39:13.719999931Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:39:13.720003948Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:39:13.72000722Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:13.720010671Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:13.720014143Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:39:13.720017424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.720020591Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" coredns:\n"} +{"Time":"2023-05-31T19:39:13.720024281Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:39:13.720027853Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:39:13.720032619Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:39:13.720035986Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:13.720039258Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -conf\n"} +{"Time":"2023-05-31T19:39:13.720043037Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:39:13.720046195Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T19:39:13.720049308Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:39:13.720052518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:13.720055678Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:39:13.72005883Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:39:13.720062186Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:39:13.72006576Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:13.720070784Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720074103Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.72007734Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:39:13.72008055Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:13.72008368Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:39:13.720086642Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:13.720089986Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:39:13.720093578Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:13.720096889Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:39:13.720100233Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:13.720103458Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:39:13.720106609Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:39:13.720109854Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:39:13.720113106Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:39:13.720117899Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720121445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:39:13.720124794Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:13.720128033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:13.720131557Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:13.720135022Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal ScalingReplicaSet 40s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T19:39:13.720138592Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal ScalingReplicaSet 40s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T19:39:13.720141962Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.720144612Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.720147634Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:39:13.720151225Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: coredns-5d78c9869d-s5czw\n"} +{"Time":"2023-05-31T19:39:13.720154815Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.720158102Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T19:39:13.720161429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:39:13.720164679Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:39:13.720168109Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-509041/192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.720171567Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 19:38:30 +0000\n"} +{"Time":"2023-05-31T19:39:13.720174932Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:39:13.720178102Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T19:39:13.720181326Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720184923Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:13.720188132Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:39:13.72019133Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:13.720194726Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:39:13.720198016Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T19:39:13.720201541Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.720204841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" coredns:\n"} +{"Time":"2023-05-31T19:39:13.720208173Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: containerd://d840b080c378d404015cf686ac1a0f9c1a3554ad21627c6612d1b27a6e0ff07f\n"} +{"Time":"2023-05-31T19:39:13.720211633Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:39:13.720215176Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T19:39:13.720218786Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:39:13.720222034Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:39:13.720225985Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:13.720229355Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -conf\n"} +{"Time":"2023-05-31T19:39:13.720232759Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:39:13.720236Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:13.720239176Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 19:38:42 +0000\n"} +{"Time":"2023-05-31T19:39:13.720242258Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:13.720245481Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:13.720248595Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T19:39:13.720252982Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:39:13.720256319Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:13.720259716Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:39:13.720263093Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:39:13.7202665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:39:13.72027019Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:13.720273855Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720278407Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.720281787Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:39:13.720285338Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-f24dx (ro)\n"} +{"Time":"2023-05-31T19:39:13.720288757Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:13.720291965Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:13.720295202Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:13.720298389Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:13.720301569Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:13.720304689Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:13.720307832Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:13.720311045Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:39:13.720314741Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:13.720318811Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:39:13.720322027Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:13.720325169Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-api-access-f24dx:\n"} +{"Time":"2023-05-31T19:39:13.720328465Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:13.720331622Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:13.720334792Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.720338341Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:13.720341964Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:13.720345031Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:39:13.720348317Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:13.720351669Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:39:13.720355222Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T19:39:13.720358884Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:13.72036223Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:39:13.720365784Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:13.720369151Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:13.72037257Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:13.720376311Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Warning FailedScheduling 40s default-scheduler 0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..\n"} +{"Time":"2023-05-31T19:39:13.72038056Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Scheduled 35s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-s5czw to custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.720384749Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Warning FailedCreatePodSandBox 34s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to setup network for sandbox \"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\": plugin type=\"flannel\" failed (add): open /run/flannel/subnet.env: no such file or directory\n"} +{"Time":"2023-05-31T19:39:13.720389154Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 23s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T19:39:13.720401717Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 23s kubelet Created container coredns\n"} +{"Time":"2023-05-31T19:39:13.720405591Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 23s kubelet Started container coredns\n"} +{"Time":"2023-05-31T19:39:13.720408753Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.720411809Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.720414991Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:39:13.720418052Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" .:53\n"} +{"Time":"2023-05-31T19:39:13.720421258Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] plugin/reload: Running configuration SHA512 = efc9280483fcc4efbcb768f0bb0eae8d655d9a6698f75ec2e812845ddebe357ede76757b8e27e6a6ace121d67e74d46126ca7de2feaa2fdd891a0e8e676dd4cb\n"} +{"Time":"2023-05-31T19:39:13.720424875Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T19:39:13.720428162Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T19:39:13.720433029Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 127.0.0.1:55986 - 10043 \"HINFO IN 4382712463333303795.6706830086297233150. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.027162181s\n"} +{"Time":"2023-05-31T19:39:13.720437053Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:40905 - 32131 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000253939s\n"} +{"Time":"2023-05-31T19:39:13.720441052Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:34955 - 12985 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.00017891s\n"} +{"Time":"2023-05-31T19:39:13.720444983Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:33972 - 32937 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000139333s\n"} +{"Time":"2023-05-31T19:39:13.720448663Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:38789 - 7515 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000145524s\n"} +{"Time":"2023-05-31T19:39:13.720452518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:38789 - 7845 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000189496s\n"} +{"Time":"2023-05-31T19:39:13.720456475Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:51667 - 25478 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000073086s\n"} +{"Time":"2023-05-31T19:39:13.72046016Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:60520 - 60913 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000084805s\n"} +{"Time":"2023-05-31T19:39:13.720463804Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [INFO] 10.244.0.3:46523 - 20231 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000177327s\n"} +{"Time":"2023-05-31T19:39:13.720471887Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.720475038Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.720478311Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:39:13.720481835Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-apiserver-custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.720485336Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.720488619Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:39:13.720492061Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:13.72049551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-509041/192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.720499031Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 19:38:13 +0000\n"} +{"Time":"2023-05-31T19:39:13.720502667Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T19:39:13.720506493Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T19:39:13.7205099Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.72.243:8443\n"} +{"Time":"2023-05-31T19:39:13.720513584Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/config.hash: 061b7d14d51de89644b72c2c3cb7d559\n"} +{"Time":"2023-05-31T19:39:13.720517445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/config.mirror: 061b7d14d51de89644b72c2c3cb7d559\n"} +{"Time":"2023-05-31T19:39:13.720520958Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/config.seen: 2023-05-31T19:38:13.228068838Z\n"} +{"Time":"2023-05-31T19:39:13.720524369Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T19:39:13.720527804Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:13.720531109Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" SeccompProfile: RuntimeDefault\n"} +{"Time":"2023-05-31T19:39:13.720534496Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.7205375Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:13.720540584Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.720544234Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: Node/custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.720564933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.720568262Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T19:39:13.720571276Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: containerd://aa5d55308c245e5f4f929fad6d6b7a190dd7e5ba2b13b6b77d601ef068fff784\n"} +{"Time":"2023-05-31T19:39:13.72057463Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T19:39:13.720577615Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T19:39:13.720580864Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720584144Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720587731Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.720591194Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T19:39:13.72059458Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --advertise-address=192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.72060091Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T19:39:13.72060461Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T19:39:13.720607613Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:39:13.720611426Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:39:13.720615982Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T19:39:13.720619408Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T19:39:13.720622888Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T19:39:13.720626251Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T19:39:13.720629898Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T19:39:13.720633377Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T19:39:13.720637267Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T19:39:13.720640604Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T19:39:13.720644139Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T19:39:13.720647581Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T19:39:13.72065103Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T19:39:13.72065479Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.720659081Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T19:39:13.720663879Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T19:39:13.72066744Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T19:39:13.720670507Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T19:39:13.720674093Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:39:13.720677919Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T19:39:13.720680941Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T19:39:13.720684232Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T19:39:13.720687703Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T19:39:13.72069087Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T19:39:13.720695518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:13.720699051Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 19:38:05 +0000\n"} +{"Time":"2023-05-31T19:39:13.720702037Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:13.720705114Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:13.720708503Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:13.720711445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:39:13.720715195Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Liveness: http-get https://192.168.72.243:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T19:39:13.720718805Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Readiness: http-get https://192.168.72.243:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:39:13.72072242Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Startup: http-get https://192.168.72.243:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T19:39:13.720725792Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720729032Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.720732124Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T19:39:13.720735789Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T19:39:13.720739271Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T19:39:13.720742552Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:13.720745818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:13.720749634Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:13.720756368Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:13.720759848Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:13.720763264Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:13.72076653Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:13.720769621Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca-certs:\n"} +{"Time":"2023-05-31T19:39:13.720773063Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.720776071Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:39:13.720779274Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:13.720782269Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T19:39:13.720785457Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.72078854Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:39:13.720791539Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:13.720794659Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T19:39:13.720798096Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.720801343Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T19:39:13.720804653Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:39:13.72080753Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:39:13.720810791Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720813771Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:13.720816898Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.720820033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.720823136Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.720825915Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:39:13.720829152Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:05.984337 1 server.go:551] external host was not specified, using 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.720834716Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:05.990521 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T19:39:13.720837988Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:05.990703 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:39:13.720842Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:06.538560 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T19:39:13.720845999Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:06.539307 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T19:39:13.720851739Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:06.539544 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T19:39:13.720856Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:07.481891 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.72085947Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:07.492795 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720862773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:07.495920 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T19:39:13.720866155Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:07.835372 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720869658Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:07.836587 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:39:13.720873329Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.300112 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:39:13.720877143Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.314151 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720880867Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.314207 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720884851Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.314215 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720888295Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.316424 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720893255Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.316560 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.72089695Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.322522 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720919429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.325075 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720925233Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.325222 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720929059Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.325262 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720932745Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.333762 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720936362Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.333907 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720940306Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.348969 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720959205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.349010 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720963211Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.349018 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720967122Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.352272 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720970624Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.352328 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720974175Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.354325 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720977429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.355091 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720980777Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.358673 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720984079Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.358722 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720988851Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.358730 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720992336Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.361132 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.720995712Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.361187 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.720999476Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.361194 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721002829Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.363572 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721008566Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.363619 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721012092Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.367332 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721015896Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.367397 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721020873Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.367408 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721025238Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.369911 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.72102862Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.369966 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721032447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.369973 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721047325Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.373724 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721053608Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.373779 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721057005Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.373787 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721060452Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.376871 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721149411Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.378811 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721153759Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.378865 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721157136Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.378880 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721159616Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.384398 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721162186Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.384562 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721164605Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.384571 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721166899Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.388076 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721169167Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.388145 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721171863Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.388156 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721174185Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.390613 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721176427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.390660 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721179271Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:08.417393 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:39:13.721183018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:08.417433 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:39:13.721186798Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.205063 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T19:39:13.721201352Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.205393 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:39:13.721206253Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.205786 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T19:39:13.721319659Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.206029 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T19:39:13.721324555Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.215134 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:39:13.721328214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.215357 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T19:39:13.721331577Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.221673 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T19:39:13.721335431Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.221933 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:39:13.7213392Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.222202 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T19:39:13.721342548Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.222802 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T19:39:13.721346394Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.222810 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:39:13.721350175Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.222835 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T19:39:13.721354288Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.222838 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T19:39:13.721357984Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.223061 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T19:39:13.721361124Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.223067 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T19:39:13.721364924Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.231988 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T19:39:13.721369106Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.234369 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T19:39:13.721373583Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.234600 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T19:39:13.721377455Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.234608 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:39:13.721542287Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.234626 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T19:39:13.721547465Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.235356 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T19:39:13.72155143Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.235363 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:39:13.721555481Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.235381 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T19:39:13.721559119Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.235417 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:39:13.721563146Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.236719 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T19:39:13.721566751Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.236748 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T19:39:13.721570935Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.236761 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T19:39:13.72157459Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.236776 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T19:39:13.721578724Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.236804 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T19:39:13.721582935Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.236814 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T19:39:13.721586801Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.236824 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T19:39:13.721590396Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.237100 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T19:39:13.721594005Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.237106 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T19:39:13.721597752Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.259729 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:39:13.721601706Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.259889 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:39:13.721605501Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.339196 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T19:39:13.721739496Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.339419 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T19:39:13.721745599Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.340508 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T19:39:13.72174932Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.340804 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T19:39:13.721753006Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.341282 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:39:13.721756572Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.341517 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T19:39:13.721760464Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.341828 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:39:13.721764374Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.342507 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:39:13.721768082Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.350299 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T19:39:13.721771796Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.423332 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.721775377Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.427715 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T19:39:13.721779213Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:09.864707 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T19:39:13.721783054Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:10.233798 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T19:39:13.721786806Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:10.240000 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T19:39:13.721790565Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:10.240495 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T19:39:13.721794778Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:10.991721 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.721798808Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:11.047842 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.721963448Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:11.401808 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T19:39:13.721967833Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:11.408073 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T19:39:13.721971929Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" W0531 19:38:11.422178 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.72.243]\n"} +{"Time":"2023-05-31T19:39:13.721975528Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:11.423661 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T19:39:13.721979486Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:11.431000 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.721983088Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:12.964166 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T19:39:13.721986732Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:12.980699 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T19:39:13.721990579Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:12.993732 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T19:39:13.721994196Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:25.114355 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T19:39:13.721997606Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:25.332712 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T19:39:13.72200205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:45.649943 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.102.7.210]\n"} +{"Time":"2023-05-31T19:39:13.722005728Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.722009473Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.722012555Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:39:13.722016081Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/10-flannel.conflist\r\n"} +{"Time":"2023-05-31T19:39:13.722018683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.722020715Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"name\": \"cbr0\",\r\n"} +{"Time":"2023-05-31T19:39:13.722025792Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T19:39:13.722029491Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:39:13.722185247Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.722188633Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"flannel\",\r\n"} +{"Time":"2023-05-31T19:39:13.722191383Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"delegate\": {\r\n"} +{"Time":"2023-05-31T19:39:13.722194886Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:39:13.722198215Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"isDefaultGateway\": true\r\n"} +{"Time":"2023-05-31T19:39:13.722201528Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.722204841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:13.722208466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.722211913Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:39:13.722215523Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:39:13.722220062Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:39:13.722223499Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.722226732Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.722230174Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.722233299Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.72223657Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T19:39:13.722240184Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.722244365Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T19:39:13.722248038Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T19:39:13.722251462Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:39:13.722254716Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.722257944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:39:13.722261506Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T19:39:13.722264955Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T19:39:13.722268102Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:39:13.722270846Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:39:13.72241539Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:39:13.722419905Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:39:13.722423683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T19:39:13.72242732Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T19:39:13.722430466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [\r\n"} +{"Time":"2023-05-31T19:39:13.722433417Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.72243555Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T19:39:13.722437957Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T19:39:13.722439968Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.72244194Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.722444857Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.722447949Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.722450957Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:13.722454081Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.722457182Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:39:13.722460868Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:39:13.722464445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:39:13.722472294Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.722475452Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:13.722478617Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.722481734Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T19:39:13.722485168Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:13.722488302Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.722491472Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T19:39:13.722494644Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.722497727Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.722500739Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.722650437Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/.keep\r\n"} +{"Time":"2023-05-31T19:39:13.722654573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.722657551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.722660662Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:39:13.722664327Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:13.722669244Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T19:39:13.72267268Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T19:39:13.722675939Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:39:13.722679407Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 2: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:13.722681772Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 52:54:00:c0:ff:a6 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:39:13.722683855Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 192.168.72.243/24 brd 192.168.72.255 scope global dynamic eth0\r\n"} +{"Time":"2023-05-31T19:39:13.722686011Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft 3509sec preferred_lft 3509sec\r\n"} +{"Time":"2023-05-31T19:39:13.7226886Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 3: eth1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:13.722691672Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 52:54:00:a3:94:ce brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:39:13.722695036Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 192.168.122.187/24 brd 192.168.122.255 scope global dynamic eth1\r\n"} +{"Time":"2023-05-31T19:39:13.722698387Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft 3509sec preferred_lft 3509sec\r\n"} +{"Time":"2023-05-31T19:39:13.722701826Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 4: sit0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:13.722705806Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/sit 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T19:39:13.722709423Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 5: flannel.1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1450 qdisc noqueue state UNKNOWN group default \r\n"} +{"Time":"2023-05-31T19:39:13.722713162Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 06:dc:86:53:2a:65 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:39:13.722716731Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 10.244.0.0/32 scope global flannel.1\r\n"} +{"Time":"2023-05-31T19:39:13.722841075Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:39:13.722846212Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 6: cni0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1450 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:39:13.722850178Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 2e:80:43:ca:55:23 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:39:13.722853902Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" inet 10.244.0.1/24 brd 10.244.0.255 scope global cni0\r\n"} +{"Time":"2023-05-31T19:39:13.722857503Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:39:13.722861002Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7: veth88693c0c@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1450 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T19:39:13.722865052Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether 86:f2:8d:55:22:6e brd ff:ff:ff:ff:ff:ff link-netns cni-31c6189d-a2bc-ed50-e9bf-f5f45d515afc\r\n"} +{"Time":"2023-05-31T19:39:13.722868746Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 8: vethb7c09f8e@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1450 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T19:39:13.722872439Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" link/ether ee:1c:33:5e:b4:ec brd ff:ff:ff:ff:ff:ff link-netns cni-ea7d1219-b4e7-ff38-1876-87e0f5f9016f\r\n"} +{"Time":"2023-05-31T19:39:13.722876089Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.722879344Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.722882439Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:39:13.722886329Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default via 192.168.122.1 dev eth1 proto dhcp src 192.168.122.187 metric 1024 \r\n"} +{"Time":"2023-05-31T19:39:13.722889819Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 10.244.0.0/24 dev cni0 proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T19:39:13.722893647Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.72.0/24 dev eth0 proto kernel scope link src 192.168.72.243 \r\n"} +{"Time":"2023-05-31T19:39:13.722898401Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.122.0/24 dev eth1 proto kernel scope link src 192.168.122.187 \r\n"} +{"Time":"2023-05-31T19:39:13.722901796Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.122.1 dev eth1 proto dhcp scope link src 192.168.122.187 metric 1024 \r\n"} +{"Time":"2023-05-31T19:39:13.722905219Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.72290829Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.722911551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:39:13.722915006Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:39:07 2023\r\n"} +{"Time":"2023-05-31T19:39:13.723045086Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" *nat\r\n"} +{"Time":"2023-05-31T19:39:13.723050911Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:39:13.723054451Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:39:13.723057859Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :OUTPUT ACCEPT [42:2520]\r\n"} +{"Time":"2023-05-31T19:39:13.723061174Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :POSTROUTING ACCEPT [51:3195]\r\n"} +{"Time":"2023-05-31T19:39:13.723064357Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :FLANNEL-POSTRTG - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723067463Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723070319Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723072322Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723074532Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723076438Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723078922Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-A7TRVW6PJKTOH7ZD - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723082205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723085399Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723089032Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-UTWFOSUDHOCXYA2F - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723092362Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723095613Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723099739Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723103014Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723106267Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723109476Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.72311263Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.72311595Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:13.723119631Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:13.723185566Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A POSTROUTING -m comment --comment \"flanneld masq\" -j FLANNEL-POSTRTG\r\n"} +{"Time":"2023-05-31T19:39:13.723189475Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:39:13.723193089Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG -m mark --mark 0x4000/0x4000 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:13.723196941Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/16 -d 10.244.0.0/16 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:13.723200755Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/16 ! -d 224.0.0.0/4 -m comment --comment \"flanneld masq\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:39:13.723204513Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG ! -s 10.244.0.0/16 -d 10.244.0.0/24 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:13.723208153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-POSTRTG ! -s 10.244.0.0/16 -d 10.244.0.0/16 -m comment --comment \"flanneld masq\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:39:13.723211658Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:39:13.723214987Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:39:13.723218849Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T19:39:13.723222447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:39:13.723226035Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-A7TRVW6PJKTOH7ZD -s 192.168.72.243/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.723229862Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-A7TRVW6PJKTOH7ZD -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.72.243:8443\r\n"} +{"Time":"2023-05-31T19:39:13.723233652Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.723237594Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:39:13.723242239Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.723245902Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:39:13.723347198Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -s 10.244.0.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.723352176Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T19:39:13.723357153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.723360958Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:39:13.723364764Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T19:39:13.72336862Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T19:39:13.723372695Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.102.7.210/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T19:39:13.723376429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T19:39:13.723380055Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T19:39:13.723383943Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:39:13.723387488Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.72339117Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T19:39:13.723395073Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.723398573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T19:39:13.723523813Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.72352981Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.72.243:8443\" -j KUBE-SEP-A7TRVW6PJKTOH7ZD\r\n"} +{"Time":"2023-05-31T19:39:13.723534073Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.72353816Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T19:39:13.723542289Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.102.7.210/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:39:13.723546091Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.3:8080\" -j KUBE-SEP-UTWFOSUDHOCXYA2F\r\n"} +{"Time":"2023-05-31T19:39:13.723549781Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:39:13.723552936Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Completed on Wed May 31 19:39:07 2023\r\n"} +{"Time":"2023-05-31T19:39:13.723556593Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:39:07 2023\r\n"} +{"Time":"2023-05-31T19:39:13.723559867Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" *mangle\r\n"} +{"Time":"2023-05-31T19:39:13.723562961Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :PREROUTING ACCEPT [17789:81099365]\r\n"} +{"Time":"2023-05-31T19:39:13.723566605Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :INPUT ACCEPT [17747:81096173]\r\n"} +{"Time":"2023-05-31T19:39:13.723570013Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :FORWARD ACCEPT [40:3112]\r\n"} +{"Time":"2023-05-31T19:39:13.723573373Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :OUTPUT ACCEPT [15541:7999849]\r\n"} +{"Time":"2023-05-31T19:39:13.72357886Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :POSTROUTING ACCEPT [15587:8003363]\r\n"} +{"Time":"2023-05-31T19:39:13.723582333Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.72358553Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723589268Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723593755Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:39:13.723597633Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Completed on Wed May 31 19:39:07 2023\r\n"} +{"Time":"2023-05-31T19:39:13.723696431Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:39:07 2023\r\n"} +{"Time":"2023-05-31T19:39:13.723699582Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" *filter\r\n"} +{"Time":"2023-05-31T19:39:13.723701823Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :INPUT ACCEPT [5853:1278448]\r\n"} +{"Time":"2023-05-31T19:39:13.723704021Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :FORWARD ACCEPT [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723706209Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :OUTPUT ACCEPT [5819:1586438]\r\n"} +{"Time":"2023-05-31T19:39:13.723708328Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :FLANNEL-FWD - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723710404Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723712433Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723714446Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723716451Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723718548Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723720589Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723722651Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723725701Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:39:13.723727903Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:13.723730254Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:39:13.723732968Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:13.723735733Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:13.723737808Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m comment --comment \"flanneld forward\" -j FLANNEL-FWD\r\n"} +{"Time":"2023-05-31T19:39:13.723740122Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:13.723742553Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T19:39:13.723744802Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:13.723836612Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:13.723839187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:13.723841554Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:39:13.723844069Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:39:13.723846182Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-FWD -s 10.244.0.0/16 -m comment --comment \"flanneld forward\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:13.723848422Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A FLANNEL-FWD -d 10.244.0.0/16 -m comment --comment \"flanneld forward\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:13.723850828Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T19:39:13.723853119Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:39:13.723855428Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:13.723857803Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:39:13.723860008Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:39:13.723862017Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Completed on Wed May 31 19:39:07 2023\r\n"} +{"Time":"2023-05-31T19:39:13.723864046Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.723865907Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.723867908Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:39:13.723870116Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:39:13.723872326Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.72387466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 56 3474 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:39:13.723877017Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.723982065Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:39:13.723987312Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.723990685Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.723995128Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain OUTPUT (policy ACCEPT 42 packets, 2520 bytes)\r\n"} +{"Time":"2023-05-31T19:39:13.723998558Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724002122Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 122 7538 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:39:13.724005081Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724007857Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain POSTROUTING (policy ACCEPT 51 packets, 3195 bytes)\r\n"} +{"Time":"2023-05-31T19:39:13.724010708Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724013802Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 92 5701 FLANNEL-POSTRTG all -- * * 0.0.0.0/0 0.0.0.0/0 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:39:13.724017005Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 132 8273 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T19:39:13.724019912Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724022838Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain FLANNEL-POSTRTG (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724026212Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724029715Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0x4000/0x4000 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:39:13.724033905Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 12 855 RETURN all -- * * 10.244.0.0/16 10.244.0.0/16 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:39:13.724037753Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 85 MASQUERADE all -- * * 10.244.0.0/16 !224.0.0.0/4 /* flanneld masq */ random-fully\r\n"} +{"Time":"2023-05-31T19:39:13.724041872Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 RETURN all -- * * !10.244.0.0/16 10.244.0.0/24 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:39:13.724045695Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 MASQUERADE all -- * * !10.244.0.0/16 10.244.0.0/16 /* flanneld masq */ random-fully\r\n"} +{"Time":"2023-05-31T19:39:13.72416092Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724165317Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724167623Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724169974Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724172007Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724174178Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724176565Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T19:39:13.724178618Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724180748Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724182854Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724184822Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724186891Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724188954Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724191115Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 51 3195 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:39:13.724193881Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T19:39:13.724196147Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T19:39:13.72419819Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724200046Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724202021Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724204049Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724205972Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-A7TRVW6PJKTOH7ZD (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724341641Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724346708Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 192.168.72.243 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T19:39:13.724351554Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.72.243:8443\r\n"} +{"Time":"2023-05-31T19:39:13.72435525Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724358343Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724361769Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.72436735Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T19:39:13.72437124Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:39:13.72437455Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724377697Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.72438112Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.72438464Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T19:39:13.724388281Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:39:13.724391967Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724395527Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-UTWFOSUDHOCXYA2F (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.72439874Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724402234Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T19:39:13.724405853Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T19:39:13.724508951Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724511833Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724514223Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724516806Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T19:39:13.72451942Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:39:13.724521606Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724523545Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724525961Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724528181Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:39:13.72453213Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:39:13.724534556Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.102.7.210 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:39:13.724537041Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:39:13.724539631Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:39:13.724542088Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 78 4680 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T19:39:13.724544866Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.72456183Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724565688Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724726807Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:39:13.724731789Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:39:13.724735631Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724738941Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724742458Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724762426Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:39:13.724768663Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T19:39:13.72477215Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724775907Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724780042Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724784741Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 2 120 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:39:13.724788659Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 3 180 KUBE-SEP-A7TRVW6PJKTOH7ZD all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.72.243:8443 */\r\n"} +{"Time":"2023-05-31T19:39:13.724792432Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724795903Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724799509Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724803228Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:39:13.724807179Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:39:13.724896433Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.724899355Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T19:39:13.724901629Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:39:13.724904057Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.102.7.210 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:39:13.724906441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 1 60 KUBE-SEP-UTWFOSUDHOCXYA2F all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.3:8080 */\r\n"} +{"Time":"2023-05-31T19:39:13.724908666Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.724910632Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.724912646Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe flannel daemon set:\n"} +{"Time":"2023-05-31T19:39:13.724916042Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-flannel-ds\n"} +{"Time":"2023-05-31T19:39:13.724918174Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Selector: app=flannel\n"} +{"Time":"2023-05-31T19:39:13.724920269Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selector: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.724922461Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T19:39:13.724924614Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T19:39:13.724927243Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:39:13.724929572Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:39:13.724931586Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:39:13.724933586Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:39:13.724935639Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:39:13.724937923Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:39:13.724941276Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:39:13.724944549Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:13.7249479Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T19:39:13.725104601Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T19:39:13.725110656Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: flannel\n"} +{"Time":"2023-05-31T19:39:13.725113779Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Init Containers:\n"} +{"Time":"2023-05-31T19:39:13.725117312Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" install-cni-plugin:\n"} +{"Time":"2023-05-31T19:39:13.725120588Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\n"} +{"Time":"2023-05-31T19:39:13.725123936Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725127714Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725131018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.725134271Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cp\n"} +{"Time":"2023-05-31T19:39:13.725137636Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:13.725140827Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -f\n"} +{"Time":"2023-05-31T19:39:13.725144319Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /flannel\n"} +{"Time":"2023-05-31T19:39:13.725148033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/cni/bin/flannel\n"} +{"Time":"2023-05-31T19:39:13.725153093Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725156848Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.725160108Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/cni/bin from cni-plugin (rw)\n"} +{"Time":"2023-05-31T19:39:13.725163356Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" install-cni:\n"} +{"Time":"2023-05-31T19:39:13.725166854Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\n"} +{"Time":"2023-05-31T19:39:13.725170494Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725174083Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725177315Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.725180761Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cp\n"} +{"Time":"2023-05-31T19:39:13.725183567Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:13.725186658Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -f\n"} +{"Time":"2023-05-31T19:39:13.725189911Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/cni-conf.json\n"} +{"Time":"2023-05-31T19:39:13.725193263Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/10-flannel.conflist\n"} +{"Time":"2023-05-31T19:39:13.725362773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725369958Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.725373019Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d from cni (rw)\n"} +{"Time":"2023-05-31T19:39:13.725376417Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T19:39:13.725379977Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.725383169Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-flannel:\n"} +{"Time":"2023-05-31T19:39:13.725386484Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\n"} +{"Time":"2023-05-31T19:39:13.72539172Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725395143Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725398816Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.725402181Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/bin/flanneld\n"} +{"Time":"2023-05-31T19:39:13.72540568Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:13.725409027Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --ip-masq\n"} +{"Time":"2023-05-31T19:39:13.72541242Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kube-subnet-mgr\n"} +{"Time":"2023-05-31T19:39:13.72541573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T19:39:13.725419034Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:39:13.725422223Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:39:13.725425717Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:13.72542881Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:39:13.725431997Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:39:13.725435397Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:13.725438683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD_NAME: (v1:metadata.name)\n"} +{"Time":"2023-05-31T19:39:13.725442202Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD_NAMESPACE: (v1:metadata.namespace)\n"} +{"Time":"2023-05-31T19:39:13.725445487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EVENT_QUEUE_DEPTH: 5000\n"} +{"Time":"2023-05-31T19:39:13.72544968Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.725452861Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T19:39:13.725640222Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/flannel from run (rw)\n"} +{"Time":"2023-05-31T19:39:13.725650488Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:39:13.725655069Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:13.725658819Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" run:\n"} +{"Time":"2023-05-31T19:39:13.725661932Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.725665302Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/flannel\n"} +{"Time":"2023-05-31T19:39:13.725668667Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:13.725671876Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni-plugin:\n"} +{"Time":"2023-05-31T19:39:13.725675329Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.725678629Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T19:39:13.725681692Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:13.725684896Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni:\n"} +{"Time":"2023-05-31T19:39:13.725688337Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.725691582Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:39:13.725694962Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:13.725698019Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" flannel-cfg:\n"} +{"Time":"2023-05-31T19:39:13.725701052Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:13.725704189Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T19:39:13.725707169Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:13.725710194Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:39:13.725713223Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.725716829Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:39:13.725719859Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:39:13.725723521Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:13.725726783Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:13.725856497Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:13.72586219Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:13.725866682Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal SuccessfulCreate 42s daemonset-controller Created pod: kube-flannel-ds-qbsw2\n"} +{"Time":"2023-05-31T19:39:13.725870272Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.725873432Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.725876751Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe flannel pod(s):\n"} +{"Time":"2023-05-31T19:39:13.725880712Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-flannel-ds-qbsw2\n"} +{"Time":"2023-05-31T19:39:13.72588418Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-flannel\n"} +{"Time":"2023-05-31T19:39:13.725887441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:39:13.725890896Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:13.725899261Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: flannel\n"} +{"Time":"2023-05-31T19:39:13.725902705Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-509041/192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.725906208Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 19:38:25 +0000\n"} +{"Time":"2023-05-31T19:39:13.725909397Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T19:39:13.725912191Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" controller-revision-hash=68dd6df44b\n"} +{"Time":"2023-05-31T19:39:13.725914486Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:39:13.725917627Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T19:39:13.725919731Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725921816Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:13.725923889Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.725925821Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:13.725927988Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.725930571Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: DaemonSet/kube-flannel-ds\n"} +{"Time":"2023-05-31T19:39:13.725932554Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Init Containers:\n"} +{"Time":"2023-05-31T19:39:13.725982818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" install-cni-plugin:\n"} +{"Time":"2023-05-31T19:39:13.725985357Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: containerd://bcd8290e6456d0d329e4681ff7ed2a79806b18f2d1fe02bf96ab8ca0aba27651\n"} +{"Time":"2023-05-31T19:39:13.725987603Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\n"} +{"Time":"2023-05-31T19:39:13.725989954Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin@sha256:28d3a6be9f450282bf42e4dad143d41da23e3d91f66f19c01ee7fd21fd17cb2b\n"} +{"Time":"2023-05-31T19:39:13.725992356Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725994411Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.725996444Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.725999765Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cp\n"} +{"Time":"2023-05-31T19:39:13.726002111Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:13.726004018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -f\n"} +{"Time":"2023-05-31T19:39:13.726006014Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /flannel\n"} +{"Time":"2023-05-31T19:39:13.726008101Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/cni/bin/flannel\n"} +{"Time":"2023-05-31T19:39:13.726010278Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Terminated\n"} +{"Time":"2023-05-31T19:39:13.726012523Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T19:39:13.726014495Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T19:39:13.72601646Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 19:38:28 +0000\n"} +{"Time":"2023-05-31T19:39:13.726018429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Finished: Wed, 31 May 2023 19:38:28 +0000\n"} +{"Time":"2023-05-31T19:39:13.7260204Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:13.726022332Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:13.726033977Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.726036363Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.726038442Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/cni/bin from cni-plugin (rw)\n"} +{"Time":"2023-05-31T19:39:13.726040503Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-2rkxm (ro)\n"} +{"Time":"2023-05-31T19:39:13.726042647Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" install-cni:\n"} +{"Time":"2023-05-31T19:39:13.726135021Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: containerd://9f7af622fc900c9d567f7b2a53bb40fb7167e686c07b8bb8a5a3c03b899b6d35\n"} +{"Time":"2023-05-31T19:39:13.726137853Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\n"} +{"Time":"2023-05-31T19:39:13.726140221Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker.io/rancher/mirrored-flannelcni-flannel@sha256:ec0f0b7430c8370c9f33fe76eb0392c1ad2ddf4ccaf2b9f43995cca6c94d3832\n"} +{"Time":"2023-05-31T19:39:13.726142635Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.726145034Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.726147061Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.726149053Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cp\n"} +{"Time":"2023-05-31T19:39:13.726151066Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:13.726152968Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -f\n"} +{"Time":"2023-05-31T19:39:13.726155051Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/cni-conf.json\n"} +{"Time":"2023-05-31T19:39:13.726157204Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d/10-flannel.conflist\n"} +{"Time":"2023-05-31T19:39:13.726159303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Terminated\n"} +{"Time":"2023-05-31T19:39:13.726161411Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T19:39:13.726163374Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T19:39:13.726165335Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 19:38:30 +0000\n"} +{"Time":"2023-05-31T19:39:13.726167418Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Finished: Wed, 31 May 2023 19:38:30 +0000\n"} +{"Time":"2023-05-31T19:39:13.726169408Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:13.72617166Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:13.726173831Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.726176085Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.726178281Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/cni/net.d from cni (rw)\n"} +{"Time":"2023-05-31T19:39:13.726180403Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T19:39:13.726182769Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-2rkxm (ro)\n"} +{"Time":"2023-05-31T19:39:13.726185198Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.726250134Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-flannel:\n"} +{"Time":"2023-05-31T19:39:13.72625265Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: containerd://18788616227198b25cedb4f1f1e5c952c8101d8b29b6838b37af2b5aa26c6ab5\n"} +{"Time":"2023-05-31T19:39:13.726254857Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\n"} +{"Time":"2023-05-31T19:39:13.726257052Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: docker.io/rancher/mirrored-flannelcni-flannel@sha256:ec0f0b7430c8370c9f33fe76eb0392c1ad2ddf4ccaf2b9f43995cca6c94d3832\n"} +{"Time":"2023-05-31T19:39:13.726259174Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.72626111Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.726263135Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.726265072Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /opt/bin/flanneld\n"} +{"Time":"2023-05-31T19:39:13.726266944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:39:13.726269074Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --ip-masq\n"} +{"Time":"2023-05-31T19:39:13.726271044Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --kube-subnet-mgr\n"} +{"Time":"2023-05-31T19:39:13.726273055Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:13.726275047Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 19:38:31 +0000\n"} +{"Time":"2023-05-31T19:39:13.726277184Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:13.726280184Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:13.726282079Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T19:39:13.726283946Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:39:13.726285943Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:39:13.72628814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:39:13.726290047Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:39:13.72629194Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:39:13.726293818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:13.726295804Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD_NAME: kube-flannel-ds-qbsw2 (v1:metadata.name)\n"} +{"Time":"2023-05-31T19:39:13.726297863Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" POD_NAMESPACE: kube-flannel (v1:metadata.namespace)\n"} +{"Time":"2023-05-31T19:39:13.726347625Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EVENT_QUEUE_DEPTH: 5000\n"} +{"Time":"2023-05-31T19:39:13.726349989Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.726352015Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T19:39:13.726354209Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/flannel from run (rw)\n"} +{"Time":"2023-05-31T19:39:13.72635619Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:39:13.726358269Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-2rkxm (ro)\n"} +{"Time":"2023-05-31T19:39:13.726360328Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:13.726362233Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:13.726364299Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:13.726366315Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:13.726369203Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:13.726371297Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:13.726373252Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:13.726375249Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" run:\n"} +{"Time":"2023-05-31T19:39:13.726377338Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.726379343Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/flannel\n"} +{"Time":"2023-05-31T19:39:13.726381458Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:13.726383443Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni-plugin:\n"} +{"Time":"2023-05-31T19:39:13.72638548Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.726387527Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T19:39:13.72638976Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:13.726391664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni:\n"} +{"Time":"2023-05-31T19:39:13.726394131Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.726396511Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:39:13.726398643Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:13.726487529Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" flannel-cfg:\n"} +{"Time":"2023-05-31T19:39:13.726491127Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:13.726493259Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T19:39:13.726495422Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:13.726497377Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:39:13.726500172Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.726502343Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:39:13.726504461Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:39:13.726506466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-api-access-2rkxm:\n"} +{"Time":"2023-05-31T19:39:13.726508524Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:13.726510579Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:13.726512863Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.726514915Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:13.72651696Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:13.726519066Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:39:13.726521109Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.726523279Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: :NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.726525479Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.726527629Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.726529796Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.726532009Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:13.726534146Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.727351134Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:13.727365314Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.727369694Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:13.727373309Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:13.727377097Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:13.727380988Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Scheduled 42s default-scheduler Successfully assigned kube-flannel/kube-flannel-ds-qbsw2 to custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.727385431Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulling 41s kubelet Pulling image \"docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\"\n"} +{"Time":"2023-05-31T19:39:13.727389884Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 40s kubelet Successfully pulled image \"docker.io/rancher/mirrored-flannelcni-flannel-cni-plugin:v1.1.0\" in 1.351331609s (1.352115906s including waiting)\n"} +{"Time":"2023-05-31T19:39:13.72739385Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 40s kubelet Created container install-cni-plugin\n"} +{"Time":"2023-05-31T19:39:13.727397558Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 39s kubelet Started container install-cni-plugin\n"} +{"Time":"2023-05-31T19:39:13.727401536Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulling 39s kubelet Pulling image \"docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\"\n"} +{"Time":"2023-05-31T19:39:13.727406145Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 37s kubelet Successfully pulled image \"docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\" in 2.249880194s (2.249914614s including waiting)\n"} +{"Time":"2023-05-31T19:39:13.72742446Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 37s kubelet Created container install-cni\n"} +{"Time":"2023-05-31T19:39:13.72743619Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 37s kubelet Started container install-cni\n"} +{"Time":"2023-05-31T19:39:13.727445297Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 36s kubelet Container image \"docker.io/rancher/mirrored-flannelcni-flannel:v0.20.2\" already present on machine\n"} +{"Time":"2023-05-31T19:39:13.727449894Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 36s kubelet Created container kube-flannel\n"} +{"Time":"2023-05-31T19:39:13.727454187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 36s kubelet Started container kube-flannel\n"} +{"Time":"2023-05-31T19:39:13.727458051Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.727771062Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.727783448Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (current):\n"} +{"Time":"2023-05-31T19:39:13.727793918Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:32.961549 1 kube.go:452] Creating the node lease for IPv4. This is the n.Spec.PodCIDRs: [10.244.0.0/24]\n"} +{"Time":"2023-05-31T19:39:13.727802756Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:32.963265 1 main.go:416] Current network or subnet (10.244.0.0/16, 10.244.0.0/24) is not equal to previous one (0.0.0.0/0, 0.0.0.0/0), trying to recycle old iptables rules\n"} +{"Time":"2023-05-31T19:39:13.72781086Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:33.342420 1 main.go:342] Setting up masking rules\n"} +{"Time":"2023-05-31T19:39:13.72781958Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:33.345293 1 main.go:364] Changing default FORWARD chain policy to ACCEPT\n"} +{"Time":"2023-05-31T19:39:13.727824726Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:33.440135 1 main.go:379] Wrote subnet file to /run/flannel/subnet.env\n"} +{"Time":"2023-05-31T19:39:13.727833953Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:33.440192 1 main.go:383] Running backend.\n"} +{"Time":"2023-05-31T19:39:13.727839861Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:33.443234 1 vxlan_network.go:61] watching for new subnet leases\n"} +{"Time":"2023-05-31T19:39:13.727849958Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:33.539040 1 main.go:404] Waiting for all goroutines to exit\n"} +{"Time":"2023-05-31T19:39:13.727861071Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:33.739755 1 iptables.go:270] bootstrap done\n"} +{"Time":"2023-05-31T19:39:13.727869789Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [pod/kube-flannel-ds-qbsw2/kube-flannel] I0531 19:38:34.040044 1 iptables.go:270] bootstrap done\n"} +{"Time":"2023-05-31T19:39:13.727877597Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.727881429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.727888493Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (previous):\n"} +{"Time":"2023-05-31T19:39:13.727893463Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: previous terminated container \"kube-flannel\" in pod \"kube-flannel-ds-qbsw2\" not found\n"} +{"Time":"2023-05-31T19:39:13.727901933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: previous terminated container \"install-cni-plugin\" in pod \"kube-flannel-ds-qbsw2\" not found\n"} +{"Time":"2023-05-31T19:39:13.727906665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: previous terminated container \"install-cni\" in pod \"kube-flannel-ds-qbsw2\" not found\n"} +{"Time":"2023-05-31T19:39:13.728033988Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.728038165Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.728040768Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /run/flannel/subnet.env:\n"} +{"Time":"2023-05-31T19:39:13.728043528Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" FLANNEL_NETWORK=10.244.0.0/16\r\n"} +{"Time":"2023-05-31T19:39:13.728046309Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" FLANNEL_SUBNET=10.244.0.1/24\r\n"} +{"Time":"2023-05-31T19:39:13.728052187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" FLANNEL_MTU=1450\r\n"} +{"Time":"2023-05-31T19:39:13.728055003Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" FLANNEL_IPMASQ=true\r\n"} +{"Time":"2023-05-31T19:39:13.728060055Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.728062712Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.72806755Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/kube-flannel/cni-conf.json:\n"} +{"Time":"2023-05-31T19:39:13.728070514Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cat: /etc/kube-flannel/cni-conf.json: No such file or directory\r\n"} +{"Time":"2023-05-31T19:39:13.728075814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:39:13.728078627Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.728083828Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.728086667Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:39:13.728091967Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728094649Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728101016Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:13.728107536Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728110287Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:39:13.728115966Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:39:13.72811864Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:39:13.728123815Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:39:13.72812644Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:39:13.728131363Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:39:13.728213821Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:39:13.728217471Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:39:13.728219737Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728222071Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.72822439Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.728229218Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:39:13.728231429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:39:13.728236031Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.728238117Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.728242556Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.728244658Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728246958Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:39:13.728254574Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:39:13.728256936Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:13.728261215Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:13.72826349Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.728268467Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:39:13.728270903Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:39:13.728275912Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:39:13.728278535Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:13.728283144Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:39:13.72828565Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:13.728290031Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728292573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:13.72829475Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:39:13.728333473Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.728340252Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:39:13.728342773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:39:13.72834721Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:39:13.728349607Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.728352142Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:39:13.728356487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:13.728358883Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:13.728363638Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:13.728365943Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:13.728369104Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:13.728371705Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal SuccessfulCreate 43s daemonset-controller Created pod: kube-proxy-ghwsj\n"} +{"Time":"2023-05-31T19:39:13.728376345Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.728378619Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.728382943Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:39:13.728385356Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-proxy-ghwsj\n"} +{"Time":"2023-05-31T19:39:13.72838773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.728392523Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:39:13.728395084Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:39:13.728399363Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728401427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node: custom-flannel-509041/192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.728405955Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Start Time: Wed, 31 May 2023 19:38:25 +0000\n"} +{"Time":"2023-05-31T19:39:13.728407976Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T19:39:13.728410187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.72844919Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:39:13.728451793Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.728456383Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:39:13.72845842Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.728460534Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:39:13.728464907Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP: 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.728475873Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728481838Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:39:13.72848424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:39:13.728486539Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Container ID: containerd://1280237fdd1f3fd45abd91e490d8a32ed3f7e423ed38b73731d10b246089f189\n"} +{"Time":"2023-05-31T19:39:13.728491028Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:39:13.728493432Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Image ID: registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T19:39:13.728497953Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.728500076Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:39:13.728504656Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:39:13.728507009Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.728511587Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:39:13.728533786Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:39:13.728539955Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:39:13.728542399Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Started: Wed, 31 May 2023 19:38:26 +0000\n"} +{"Time":"2023-05-31T19:39:13.728562629Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:39:13.728567471Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:39:13.728570626Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T19:39:13.72857862Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:39:13.728595806Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:39:13.728598573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:39:13.728603179Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:39:13.728605761Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:39:13.72861194Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-cd24j (ro)\n"} +{"Time":"2023-05-31T19:39:13.728620018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:39:13.728627998Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:39:13.728634514Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:39:13.728641711Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:39:13.728648555Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:39:13.728655386Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:39:13.728661583Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:39:13.728665184Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:39:13.728672267Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:39:13.728690341Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.72869435Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:39:13.728699323Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:39:13.728707941Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.728716001Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:39:13.728723921Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:39:13.728733804Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:39:13.728743364Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:39:13.728752199Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:39:13.728760359Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:39:13.728770675Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-api-access-cd24j:\n"} +{"Time":"2023-05-31T19:39:13.728953291Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:39:13.728980766Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:39:13.728994161Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.729005473Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:39:13.729017696Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:39:13.729028013Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:39:13.729038818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:39:13.729053763Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T19:39:13.729064966Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.729076325Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.729087273Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.729098523Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:13.729109587Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.729120962Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:39:13.729131786Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:39:13.729142549Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:39:13.729153427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:39:13.729164034Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:39:13.729175445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Scheduled 43s default-scheduler Successfully assigned kube-system/kube-proxy-ghwsj to custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.729311466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Pulled 42s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:39:13.729323818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Created 42s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.729332385Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Normal Started 42s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.729336309Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.729342054Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.729345757Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:39:13.729350001Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.615558 1 node.go:141] Successfully retrieved node IP: 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.729354092Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.615723 1 server_others.go:110] \"Detected node IP\" address=\"192.168.72.243\"\n"} +{"Time":"2023-05-31T19:39:13.729364744Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.615767 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T19:39:13.729369484Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.717244 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T19:39:13.729374122Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.717269 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T19:39:13.729380321Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.717303 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T19:39:13.729385459Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.718611 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T19:39:13.729390682Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.718741 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:39:13.729395378Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.720071 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T19:39:13.729400153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.720207 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T19:39:13.729404529Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.720571 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T19:39:13.729414072Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.720675 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T19:39:13.729419375Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.721338 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T19:39:13.729425132Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.721570 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T19:39:13.729812795Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.827580 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T19:39:13.729819358Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.827607 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T19:39:13.729823238Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" I0531 19:38:26.827627 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T19:39:13.729827688Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.729831355Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.729834953Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:39:13.729839283Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:39:13.729844033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: loaded (\u001b]8;;file://custom-flannel-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:39:13.729851172Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T19:39:13.729856163Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─\u001b]8;;file://custom-flannel-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:39:13.729865267Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:38:12 UTC; 55s ago\r\n"} +{"Time":"2023-05-31T19:39:13.729872295Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:39:13.729880637Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Main PID: 1239 (kubelet)\r\n"} +{"Time":"2023-05-31T19:39:13.72988518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tasks: 10 (limit: 3251)\r\n"} +{"Time":"2023-05-31T19:39:13.729889272Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Memory: 33.8M\r\n"} +{"Time":"2023-05-31T19:39:13.729893647Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T19:39:13.729897797Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─1239 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=custom-flannel-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.72.243\r\n"} +{"Time":"2023-05-31T19:39:13.729902128Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.729906889Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:30 custom-flannel-509041 kubelet[1239]: I0531 19:38:30.967636 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-cj54p\\\" (UniqueName: \\\"kubernetes.io/projected/fa7a0857-0e91-4722-8f0f-5b6299218b16-kube-api-access-cj54p\\\") pod \\\"storage-provisioner\\\" (UID: \\\"fa7a0857-0e91-4722-8f0f-5b6299218b16\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:39:13.730241193Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:31 custom-flannel-509041 kubelet[1239]: E0531 19:38:31.320083 1239 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\\\": plugin type=\\\"flannel\\\" failed (add): open /run/flannel/subnet.env: no such file or directory\"\r\n"} +{"Time":"2023-05-31T19:39:13.730255748Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:31 custom-flannel-509041 kubelet[1239]: E0531 19:38:31.320240 1239 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\\\": plugin type=\\\"flannel\\\" failed (add): open /run/flannel/subnet.env: no such file or directory\" pod=\"kube-system/coredns-5d78c9869d-s5czw\"\r\n"} +{"Time":"2023-05-31T19:39:13.730264492Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:31 custom-flannel-509041 kubelet[1239]: E0531 19:38:31.320317 1239 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\\\": plugin type=\\\"flannel\\\" failed (add): open /run/flannel/subnet.env: no such file or directory\" pod=\"kube-system/coredns-5d78c9869d-s5czw\"\r\n"} +{"Time":"2023-05-31T19:39:13.730274262Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:31 custom-flannel-509041 kubelet[1239]: E0531 19:38:31.320418 1239 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-s5czw_kube-system(118aa9dc-67b3-4767-be5d-988614355a0a)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-s5czw_kube-system(118aa9dc-67b3-4767-be5d-988614355a0a)\\\\\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\\\\\"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\\\\\\\": plugin type=\\\\\\\"flannel\\\\\\\" failed (add): open /run/flannel/subnet.env: no such file or directory\\\"\" pod=\"kube-system/coredns-5d78c9869d-s5czw\" podUID=118aa9dc-67b3-4767-be5d-988614355a0a\r\n"} +{"Time":"2023-05-31T19:39:13.730284763Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:32 custom-flannel-509041 kubelet[1239]: I0531 19:38:32.493229 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-flannel/kube-flannel-ds-qbsw2\" podStartSLOduration=3.320986946 podCreationTimestamp=\"2023-05-31 19:38:25 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:38:26.525933264 +0000 UTC m=+13.614572252\" lastFinishedPulling=\"2023-05-31 19:38:30.698076459 +0000 UTC m=+17.786715436\" observedRunningTime=\"2023-05-31 19:38:32.489879424 +0000 UTC m=+19.578518401\" watchObservedRunningTime=\"2023-05-31 19:38:32.49313013 +0000 UTC m=+19.581769117\"\r\n"} +{"Time":"2023-05-31T19:39:13.730298006Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:33 custom-flannel-509041 kubelet[1239]: I0531 19:38:33.240724 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=6.240405282 podCreationTimestamp=\"2023-05-31 19:38:27 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:32.509211959 +0000 UTC m=+19.597850955\" watchObservedRunningTime=\"2023-05-31 19:38:33.240405282 +0000 UTC m=+20.329044282\"\r\n"} +{"Time":"2023-05-31T19:39:13.730630799Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:43 custom-flannel-509041 kubelet[1239]: I0531 19:38:43.555675 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-s5czw\" podStartSLOduration=18.555623876 podCreationTimestamp=\"2023-05-31 19:38:25 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:43.528103265 +0000 UTC m=+30.616742264\" watchObservedRunningTime=\"2023-05-31 19:38:43.555623876 +0000 UTC m=+30.644262911\"\r\n"} +{"Time":"2023-05-31T19:39:13.730642582Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:45 custom-flannel-509041 kubelet[1239]: I0531 19:38:45.602305 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.730651859Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:45 custom-flannel-509041 kubelet[1239]: I0531 19:38:45.784120 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-gw678\\\" (UniqueName: \\\"kubernetes.io/projected/e985e195-b135-4ea4-9fad-c3f9303fc8d1-kube-api-access-gw678\\\") pod \\\"netcat-7458db8b8-vnx52\\\" (UID: \\\"e985e195-b135-4ea4-9fad-c3f9303fc8d1\\\") \" pod=\"default/netcat-7458db8b8-vnx52\"\r\n"} +{"Time":"2023-05-31T19:39:13.730659972Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.730663812Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.730667435Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:39:13.73067487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.73067959Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:13.73068718Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:39:13.730691108Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T19:39:13.730728049Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T19:39:13.730732971Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.730740044Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:13.730743837Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T19:39:13.730750808Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:39:13.731003822Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T19:39:13.73101268Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T19:39:13.731016576Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.731020205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:13.731029218Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:13.731036203Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.731043892Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.731048733Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:13.731052753Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Wants=containerd.service\r\n"} +{"Time":"2023-05-31T19:39:13.731073551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.731077332Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:13.731081022Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T19:39:13.731091354Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=custom-flannel-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.72.243\r\n"} +{"Time":"2023-05-31T19:39:13.731096033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.731099298Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:13.731102597Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.731106029Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.731109831Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:39:13.731114983Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -- Journal begins at Wed 2023-05-31 19:37:31 UTC, ends at Wed 2023-05-31 19:39:08 UTC. --\r\n"} +{"Time":"2023-05-31T19:39:13.731132795Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:39:13.731145589Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.731150568Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.731374116Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.731380466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.731385129Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.731392585Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.731396953Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 530.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.731402891Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:39:13.731410811Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.711952 863 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:39:13.731415443Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.712345 863 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:39:13.731438942Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.712822 863 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:39:13.731449722Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.720630 863 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.731462195Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.720788 863 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:39:13.731466856Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.722803 863 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:39:13.731470944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.723242 863 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:39:13.731755324Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.723316 863 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:39:13.731775835Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.723333 863 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:39:13.731780845Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.723346 863 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:39:13.731788936Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.723407 863 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:13.731793708Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.728846 863 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:39:13.731800733Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.729265 863 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:39:13.73180897Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.729323 863 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:39:13.731813983Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: W0531 19:38:03.732141 863 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcustom-flannel-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.731823567Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.732326 863 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcustom-flannel-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.732126022Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.733773 863 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:39:13.732133109Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: W0531 19:38:03.736328 863 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.732138699Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.736399 863 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.732147156Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.736580 863 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:39:13.732155486Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: W0531 19:38:03.736894 863 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T19:39:13.732160128Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.738517 863 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:39:13.732167473Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.739288 863 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:39:13.732172222Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.740046 863 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:39:13.732179708Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.741239 863 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:39:13.732184322Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.742128 863 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:39:13.732211477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.742823 863 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"custom-flannel-509041.1764519a4f2be722\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"custom-flannel-509041\", UID:\"custom-flannel-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"custom-flannel-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 38, 3, 738498850"} +{"Time":"2023-05-31T19:39:13.732472014Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":", time.Local), LastTimestamp:time.Date(2023, time.May, 31, 19, 38, 3, 738498850, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.72.243:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:39:13.732480151Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.745141 863 kubelet_node_status.go:458] \"Error getting the current node from lister\" err=\"node \\\"custom-flannel-509041\\\" not found\"\r\n"} +{"Time":"2023-05-31T19:39:13.732485169Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.745578 863 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:39:13.732490741Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.745727 863 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:39:13.732500403Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: W0531 19:38:03.746038 863 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.732509449Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.746124 863 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.732514944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.747317 863 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/custom-flannel-509041?timeout=10s\\\": dial tcp 192.168.72.243:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T19:39:13.732803103Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.770508 863 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:39:13.732819592Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.771736 863 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:39:13.732825245Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.771791 863 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:39:13.732836017Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.771809 863 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:39:13.732840684Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.771846 863 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:39:13.732848557Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.781274 863 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:39:13.732853455Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:39:13.732861202Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:39:13.732869837Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:39:13.732874488Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: W0531 19:38:03.782811 863 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.732883034Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.782904 863 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.733001668Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.793314 863 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:39:13.733012683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.793375 863 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:39:13.73301993Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.793417 863 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:13.733027873Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.799285 863 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:39:13.733033149Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.801216 863 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:39:13.733040919Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.801302 863 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:13.733045566Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.815511 863 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:39:13.733054658Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.815716 863 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:39:13.73306363Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.817685 863 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"custom-flannel-509041\\\" not found\"\r\n"} +{"Time":"2023-05-31T19:39:13.733071962Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.847293 863 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733080948Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.847946 863 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.72.243:8443: connect: connection refused\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733089303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.872326 863 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.733268581Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.874174 863 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.733286131Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.875130 863 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.733293679Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.876555 863 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.73330209Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.947388 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/221099baf369ebe5bbff32bb1656d385-kubeconfig\\\") pod \\\"kube-scheduler-custom-flannel-509041\\\" (UID: \\\"221099baf369ebe5bbff32bb1656d385\\\") \" pod=\"kube-system/kube-scheduler-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733311468Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.948344 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-ca-certs\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733320711Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.948900 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-flexvolume-dir\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733329436Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.949062 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.73333657Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.949372 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-kubeconfig\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733344905Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.949628 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/eb9ed8c9b66604cc971870ddc2abc09b-etcd-certs\\\") pod \\\"etcd-custom-flannel-509041\\\" (UID: \\\"eb9ed8c9b66604cc971870ddc2abc09b\\\") \" pod=\"kube-system/etcd-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733455573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.949901 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/eb9ed8c9b66604cc971870ddc2abc09b-etcd-data\\\") pod \\\"etcd-custom-flannel-509041\\\" (UID: \\\"eb9ed8c9b66604cc971870ddc2abc09b\\\") \" pod=\"kube-system/etcd-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733462419Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.950047 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/061b7d14d51de89644b72c2c3cb7d559-ca-certs\\\") pod \\\"kube-apiserver-custom-flannel-509041\\\" (UID: \\\"061b7d14d51de89644b72c2c3cb7d559\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733467921Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: E0531 19:38:03.949945 863 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/custom-flannel-509041?timeout=10s\\\": dial tcp 192.168.72.243:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T19:39:13.733473752Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.950401 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/061b7d14d51de89644b72c2c3cb7d559-k8s-certs\\\") pod \\\"kube-apiserver-custom-flannel-509041\\\" (UID: \\\"061b7d14d51de89644b72c2c3cb7d559\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733482403Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.950682 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/061b7d14d51de89644b72c2c3cb7d559-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-custom-flannel-509041\\\" (UID: \\\"061b7d14d51de89644b72c2c3cb7d559\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733490929Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:03 custom-flannel-509041 kubelet[863]: I0531 19:38:03.950841 863 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-k8s-certs\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733497173Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: I0531 19:38:04.049678 863 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733617808Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: E0531 19:38:04.050186 863 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.72.243:8443: connect: connection refused\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733626749Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: E0531 19:38:04.206273 863 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"custom-flannel-509041.1764519a4f2be722\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"custom-flannel-509041\", UID:\"custom-flannel-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"custom-flannel-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 38, 3, 738498850"} +{"Time":"2023-05-31T19:39:13.733638132Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":", time.Local), LastTimestamp:time.Date(2023, time.May, 31, 19, 38, 3, 738498850, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.72.243:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:39:13.733644597Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: E0531 19:38:04.350783 863 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/custom-flannel-509041?timeout=10s\\\": dial tcp 192.168.72.243:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T19:39:13.733652844Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: I0531 19:38:04.452038 863 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733659152Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: E0531 19:38:04.452536 863 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.72.243:8443: connect: connection refused\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733667356Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: W0531 19:38:04.577566 863 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcustom-flannel-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.733782761Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: E0531 19:38:04.577643 863 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dcustom-flannel-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.733789347Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: W0531 19:38:04.630149 863 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.73379498Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:04 custom-flannel-509041 kubelet[863]: E0531 19:38:04.630250 863 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.733812042Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:05 custom-flannel-509041 kubelet[863]: W0531 19:38:05.051725 863 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.733820497Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:05 custom-flannel-509041 kubelet[863]: E0531 19:38:05.051777 863 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.733826787Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:05 custom-flannel-509041 kubelet[863]: E0531 19:38:05.151322 863 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/custom-flannel-509041?timeout=10s\\\": dial tcp 192.168.72.243:8443: connect: connection refused\" interval=\"1.6s\"\r\n"} +{"Time":"2023-05-31T19:39:13.733834881Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:05 custom-flannel-509041 kubelet[863]: I0531 19:38:05.254314 863 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.733842804Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:05 custom-flannel-509041 kubelet[863]: E0531 19:38:05.254995 863 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.72.243:8443: connect: connection refused\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.734019869Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:05 custom-flannel-509041 kubelet[863]: W0531 19:38:05.319593 863 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.734026637Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:05 custom-flannel-509041 kubelet[863]: E0531 19:38:05.319800 863 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.73403231Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:05 custom-flannel-509041 kubelet[863]: E0531 19:38:05.881072 863 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.72.243:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:39:13.73403981Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:06 custom-flannel-509041 kubelet[863]: I0531 19:38:06.856699 863 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.734044412Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:09 custom-flannel-509041 kubelet[863]: E0531 19:38:09.368398 863 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"custom-flannel-509041\\\" not found\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.734051819Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:09 custom-flannel-509041 kubelet[863]: I0531 19:38:09.373925 863 kubelet_node_status.go:73] \"Successfully registered node\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.734057682Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:09 custom-flannel-509041 kubelet[863]: I0531 19:38:09.739004 863 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:39:13.734062664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:09 custom-flannel-509041 kubelet[863]: I0531 19:38:09.746699 863 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:39:13.734069836Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:09 custom-flannel-509041 kubelet[863]: I0531 19:38:09.789317 863 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:39:13.734075598Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:09 custom-flannel-509041 kubelet[863]: E0531 19:38:09.927622 863 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-custom-flannel-509041\\\" is forbidden: no PriorityClass with name system-node-critical was found\" pod=\"kube-system/kube-apiserver-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.734174614Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:12 custom-flannel-509041 kubelet[863]: I0531 19:38:12.879956 863 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:39:13.734180797Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:12 custom-flannel-509041 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T19:39:13.734185139Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.73419237Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734197614Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734204427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734209442Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734215964Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734220566Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 584.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734225156Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:12 custom-flannel-509041 systemd[1]: kubelet.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:39:13.734232467Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734236807Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734241154Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.73424819Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734252657Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734257243Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:12 custom-flannel-509041 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:39:13.734319182Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.73432787Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734336175Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734354563Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734362509Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734366813Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734370176Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 584 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734374625Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:12 custom-flannel-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:39:13.734401988Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734405917Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734409643Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734413399Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734416577Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734421618Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734425304Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 584.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.734429946Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:39:13.734433831Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.149395 1239 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:39:13.73449559Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.150961 1239 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:39:13.734504742Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.151222 1239 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:39:13.734513841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.152868 1239 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T19:39:13.73452259Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.160779 1239 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:39:13.734529781Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.161034 1239 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:39:13.734537642Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.161814 1239 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:39:13.734562856Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.161961 1239 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:39:13.734572154Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.162988 1239 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:39:13.734578468Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.163537 1239 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:39:13.734585987Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.163983 1239 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:13.734612829Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.185318 1239 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:39:13.734621627Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.187349 1239 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:39:13.73462683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.187561 1239 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:39:13.73463148Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.187590 1239 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:39:13.73463878Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.190527 1239 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:39:13.73464643Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.192160 1239 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:39:13.734662132Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.194606 1239 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:39:13.734679175Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.201889 1239 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:39:13.734684761Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.202666 1239 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:39:13.73468878Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.204327 1239 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:39:13.734692715Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.207331 1239 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:39:13.734701301Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.210683 1239 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:39:13.734705606Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.213339 1239 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:39:13.734712249Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.214690 1239 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:39:13.73476544Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.214753 1239 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:39:13.734770887Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.214794 1239 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:39:13.7347754Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: E0531 19:38:13.214881 1239 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:39:13.734783101Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: E0531 19:38:13.227054 1239 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:39:13.734790204Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:39:13.734797155Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:39:13.734801497Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:39:13.734808879Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: E0531 19:38:13.312167 1239 container_manager_linux.go:900] \"Unable to get rootfs data from cAdvisor interface\" err=\"unable to find data in memory cache\"\r\n"} +{"Time":"2023-05-31T19:39:13.734816331Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: E0531 19:38:13.319741 1239 kubelet.go:2281] \"Skipping pod synchronization\" err=\"container runtime status check may not have completed yet\"\r\n"} +{"Time":"2023-05-31T19:39:13.734824994Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.325034 1239 kubelet_node_status.go:70] \"Attempting to register node\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.734832562Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.362889 1239 kubelet_node_status.go:108] \"Node was previously registered\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.734835593Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.366775 1239 kubelet_node_status.go:73] \"Successfully registered node\" node=\"custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.734840517Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.511737 1239 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:39:13.734909647Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.511825 1239 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:39:13.734912703Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.511849 1239 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:13.734915258Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.511999 1239 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T19:39:13.734918079Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.512012 1239 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T19:39:13.734921339Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.512018 1239 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:39:13.734924142Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.516313 1239 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:39:13.734929096Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.516514 1239 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:39:13.734932018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.517566 1239 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T19:39:13.73493715Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: E0531 19:38:13.524527 1239 kubelet.go:2281] \"Skipping pod synchronization\" err=\"container runtime status check may not have completed yet\"\r\n"} +{"Time":"2023-05-31T19:39:13.734939975Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.527244 1239 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:39:13.734942774Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.529047 1239 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:39:13.734961079Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.925562 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.734982693Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.925773 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.734992243Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.925877 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.735015796Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:13 custom-flannel-509041 kubelet[1239]: I0531 19:38:13.925959 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.735024244Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.023928 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-kubeconfig\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735033179Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.024531 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/eb9ed8c9b66604cc971870ddc2abc09b-etcd-certs\\\") pod \\\"etcd-custom-flannel-509041\\\" (UID: \\\"eb9ed8c9b66604cc971870ddc2abc09b\\\") \" pod=\"kube-system/etcd-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735054791Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.024712 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/eb9ed8c9b66604cc971870ddc2abc09b-etcd-data\\\") pod \\\"etcd-custom-flannel-509041\\\" (UID: \\\"eb9ed8c9b66604cc971870ddc2abc09b\\\") \" pod=\"kube-system/etcd-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735074311Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.024747 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/061b7d14d51de89644b72c2c3cb7d559-ca-certs\\\") pod \\\"kube-apiserver-custom-flannel-509041\\\" (UID: \\\"061b7d14d51de89644b72c2c3cb7d559\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.73508393Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.024941 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/061b7d14d51de89644b72c2c3cb7d559-k8s-certs\\\") pod \\\"kube-apiserver-custom-flannel-509041\\\" (UID: \\\"061b7d14d51de89644b72c2c3cb7d559\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735093608Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.024987 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/061b7d14d51de89644b72c2c3cb7d559-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-custom-flannel-509041\\\" (UID: \\\"061b7d14d51de89644b72c2c3cb7d559\\\") \" pod=\"kube-system/kube-apiserver-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735103422Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.025033 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-flexvolume-dir\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735133643Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.025518 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-k8s-certs\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735155033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.025595 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735161006Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.025635 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/221099baf369ebe5bbff32bb1656d385-kubeconfig\\\") pod \\\"kube-scheduler-custom-flannel-509041\\\" (UID: \\\"221099baf369ebe5bbff32bb1656d385\\\") \" pod=\"kube-system/kube-scheduler-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735165187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.025679 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/6a208360713ff69e2e5b516ed4d84981-ca-certs\\\") pod \\\"kube-controller-manager-custom-flannel-509041\\\" (UID: \\\"6a208360713ff69e2e5b516ed4d84981\\\") \" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:39:13.735168205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.191302 1239 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:39:13.735171012Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.211230 1239 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:39:13.735173735Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.227856 1239 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:39:13.735176862Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.367717 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-custom-flannel-509041\" podStartSLOduration=1.367659386 podCreationTimestamp=\"2023-05-31 19:38:13 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:14.367222988 +0000 UTC m=+1.455861985\" watchObservedRunningTime=\"2023-05-31 19:38:14.367659386 +0000 UTC m=+1.456298383\"\r\n"} +{"Time":"2023-05-31T19:39:13.735238666Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.390811 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-custom-flannel-509041\" podStartSLOduration=1.390764254 podCreationTimestamp=\"2023-05-31 19:38:13 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:14.390182439 +0000 UTC m=+1.478821436\" watchObservedRunningTime=\"2023-05-31 19:38:14.390764254 +0000 UTC m=+1.479403258\"\r\n"} +{"Time":"2023-05-31T19:39:13.735246518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.440145 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-custom-flannel-509041\" podStartSLOduration=1.440104618 podCreationTimestamp=\"2023-05-31 19:38:13 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:14.419071062 +0000 UTC m=+1.507710057\" watchObservedRunningTime=\"2023-05-31 19:38:14.440104618 +0000 UTC m=+1.528743613\"\r\n"} +{"Time":"2023-05-31T19:39:13.735252591Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:14 custom-flannel-509041 kubelet[1239]: I0531 19:38:14.472375 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-custom-flannel-509041\" podStartSLOduration=1.472336796 podCreationTimestamp=\"2023-05-31 19:38:13 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:14.44140058 +0000 UTC m=+1.530039577\" watchObservedRunningTime=\"2023-05-31 19:38:14.472336796 +0000 UTC m=+1.560975791\"\r\n"} +{"Time":"2023-05-31T19:39:13.73525848Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.224825 1239 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:39:13.735262915Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.231287 1239 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:39:13.735271227Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.416123 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.735275362Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.423902 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.735284999Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515283 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-2rkxm\\\" (UniqueName: \\\"kubernetes.io/projected/3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9-kube-api-access-2rkxm\\\") pod \\\"kube-flannel-ds-qbsw2\\\" (UID: \\\"3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9\\\") \" pod=\"kube-flannel/kube-flannel-ds-qbsw2\"\r\n"} +{"Time":"2023-05-31T19:39:13.735354455Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515363 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/867eb9ed-c480-4b02-9abd-954a99a7c16e-kube-proxy\\\") pod \\\"kube-proxy-ghwsj\\\" (UID: \\\"867eb9ed-c480-4b02-9abd-954a99a7c16e\\\") \" pod=\"kube-system/kube-proxy-ghwsj\"\r\n"} +{"Time":"2023-05-31T19:39:13.735366631Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515400 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-cd24j\\\" (UniqueName: \\\"kubernetes.io/projected/867eb9ed-c480-4b02-9abd-954a99a7c16e-kube-api-access-cd24j\\\") pod \\\"kube-proxy-ghwsj\\\" (UID: \\\"867eb9ed-c480-4b02-9abd-954a99a7c16e\\\") \" pod=\"kube-system/kube-proxy-ghwsj\"\r\n"} +{"Time":"2023-05-31T19:39:13.735375477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515431 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flannel-cfg\\\" (UniqueName: \\\"kubernetes.io/configmap/3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9-flannel-cfg\\\") pod \\\"kube-flannel-ds-qbsw2\\\" (UID: \\\"3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9\\\") \" pod=\"kube-flannel/kube-flannel-ds-qbsw2\"\r\n"} +{"Time":"2023-05-31T19:39:13.735384174Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515545 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/867eb9ed-c480-4b02-9abd-954a99a7c16e-xtables-lock\\\") pod \\\"kube-proxy-ghwsj\\\" (UID: \\\"867eb9ed-c480-4b02-9abd-954a99a7c16e\\\") \" pod=\"kube-system/kube-proxy-ghwsj\"\r\n"} +{"Time":"2023-05-31T19:39:13.735392773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515580 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-plugin\\\" (UniqueName: \\\"kubernetes.io/host-path/3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9-cni-plugin\\\") pod \\\"kube-flannel-ds-qbsw2\\\" (UID: \\\"3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9\\\") \" pod=\"kube-flannel/kube-flannel-ds-qbsw2\"\r\n"} +{"Time":"2023-05-31T19:39:13.73540125Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515610 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni\\\" (UniqueName: \\\"kubernetes.io/host-path/3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9-cni\\\") pod \\\"kube-flannel-ds-qbsw2\\\" (UID: \\\"3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9\\\") \" pod=\"kube-flannel/kube-flannel-ds-qbsw2\"\r\n"} +{"Time":"2023-05-31T19:39:13.735409608Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515640 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9-xtables-lock\\\") pod \\\"kube-flannel-ds-qbsw2\\\" (UID: \\\"3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9\\\") \" pod=\"kube-flannel/kube-flannel-ds-qbsw2\"\r\n"} +{"Time":"2023-05-31T19:39:13.735458876Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515667 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/867eb9ed-c480-4b02-9abd-954a99a7c16e-lib-modules\\\") pod \\\"kube-proxy-ghwsj\\\" (UID: \\\"867eb9ed-c480-4b02-9abd-954a99a7c16e\\\") \" pod=\"kube-system/kube-proxy-ghwsj\"\r\n"} +{"Time":"2023-05-31T19:39:13.735464954Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:25 custom-flannel-509041 kubelet[1239]: I0531 19:38:25.515697 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"run\\\" (UniqueName: \\\"kubernetes.io/host-path/3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9-run\\\") pod \\\"kube-flannel-ds-qbsw2\\\" (UID: \\\"3ce8ee1e-8ae6-47a0-b52b-2a041976dbf9\\\") \" pod=\"kube-flannel/kube-flannel-ds-qbsw2\"\r\n"} +{"Time":"2023-05-31T19:39:13.735468548Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:28 custom-flannel-509041 kubelet[1239]: I0531 19:38:28.477134 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-ghwsj\" podStartSLOduration=3.477078604 podCreationTimestamp=\"2023-05-31 19:38:25 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:26.464874023 +0000 UTC m=+13.553513018\" watchObservedRunningTime=\"2023-05-31 19:38:28.477078604 +0000 UTC m=+15.565717602\"\r\n"} +{"Time":"2023-05-31T19:39:13.73548492Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:30 custom-flannel-509041 kubelet[1239]: I0531 19:38:30.842819 1239 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T19:39:13.735499218Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:30 custom-flannel-509041 kubelet[1239]: I0531 19:38:30.900624 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.735507832Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:30 custom-flannel-509041 kubelet[1239]: I0531 19:38:30.924839 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.735518928Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:30 custom-flannel-509041 kubelet[1239]: I0531 19:38:30.967234 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-f24dx\\\" (UniqueName: \\\"kubernetes.io/projected/118aa9dc-67b3-4767-be5d-988614355a0a-kube-api-access-f24dx\\\") pod \\\"coredns-5d78c9869d-s5czw\\\" (UID: \\\"118aa9dc-67b3-4767-be5d-988614355a0a\\\") \" pod=\"kube-system/coredns-5d78c9869d-s5czw\"\r\n"} +{"Time":"2023-05-31T19:39:13.735529172Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:30 custom-flannel-509041 kubelet[1239]: I0531 19:38:30.967416 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/fa7a0857-0e91-4722-8f0f-5b6299218b16-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"fa7a0857-0e91-4722-8f0f-5b6299218b16\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:39:13.735604721Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:30 custom-flannel-509041 kubelet[1239]: I0531 19:38:30.967576 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/118aa9dc-67b3-4767-be5d-988614355a0a-config-volume\\\") pod \\\"coredns-5d78c9869d-s5czw\\\" (UID: \\\"118aa9dc-67b3-4767-be5d-988614355a0a\\\") \" pod=\"kube-system/coredns-5d78c9869d-s5czw\"\r\n"} +{"Time":"2023-05-31T19:39:13.735610961Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:30 custom-flannel-509041 kubelet[1239]: I0531 19:38:30.967636 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-cj54p\\\" (UniqueName: \\\"kubernetes.io/projected/fa7a0857-0e91-4722-8f0f-5b6299218b16-kube-api-access-cj54p\\\") pod \\\"storage-provisioner\\\" (UID: \\\"fa7a0857-0e91-4722-8f0f-5b6299218b16\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:39:13.735616164Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:31 custom-flannel-509041 kubelet[1239]: E0531 19:38:31.320083 1239 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\\\": plugin type=\\\"flannel\\\" failed (add): open /run/flannel/subnet.env: no such file or directory\"\r\n"} +{"Time":"2023-05-31T19:39:13.735621884Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:31 custom-flannel-509041 kubelet[1239]: E0531 19:38:31.320240 1239 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\\\": plugin type=\\\"flannel\\\" failed (add): open /run/flannel/subnet.env: no such file or directory\" pod=\"kube-system/coredns-5d78c9869d-s5czw\"\r\n"} +{"Time":"2023-05-31T19:39:13.735630304Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:31 custom-flannel-509041 kubelet[1239]: E0531 19:38:31.320317 1239 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\\\": plugin type=\\\"flannel\\\" failed (add): open /run/flannel/subnet.env: no such file or directory\" pod=\"kube-system/coredns-5d78c9869d-s5czw\"\r\n"} +{"Time":"2023-05-31T19:39:13.735640047Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:31 custom-flannel-509041 kubelet[1239]: E0531 19:38:31.320418 1239 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-s5czw_kube-system(118aa9dc-67b3-4767-be5d-988614355a0a)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-s5czw_kube-system(118aa9dc-67b3-4767-be5d-988614355a0a)\\\\\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\\\\\"74d0382a577a9fcc38ad80433f2c0c13068d56a8905b85efa0103609b6ce9fd0\\\\\\\": plugin type=\\\\\\\"flannel\\\\\\\" failed (add): open /run/flannel/subnet.env: no such file or directory\\\"\" pod=\"kube-system/coredns-5d78c9869d-s5czw\" podUID=118aa9dc-67b3-4767-be5d-988614355a0a\r\n"} +{"Time":"2023-05-31T19:39:13.73569871Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:32 custom-flannel-509041 kubelet[1239]: I0531 19:38:32.493229 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-flannel/kube-flannel-ds-qbsw2\" podStartSLOduration=3.320986946 podCreationTimestamp=\"2023-05-31 19:38:25 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:38:26.525933264 +0000 UTC m=+13.614572252\" lastFinishedPulling=\"2023-05-31 19:38:30.698076459 +0000 UTC m=+17.786715436\" observedRunningTime=\"2023-05-31 19:38:32.489879424 +0000 UTC m=+19.578518401\" watchObservedRunningTime=\"2023-05-31 19:38:32.49313013 +0000 UTC m=+19.581769117\"\r\n"} +{"Time":"2023-05-31T19:39:13.73570627Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:33 custom-flannel-509041 kubelet[1239]: I0531 19:38:33.240724 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=6.240405282 podCreationTimestamp=\"2023-05-31 19:38:27 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:32.509211959 +0000 UTC m=+19.597850955\" watchObservedRunningTime=\"2023-05-31 19:38:33.240405282 +0000 UTC m=+20.329044282\"\r\n"} +{"Time":"2023-05-31T19:39:13.735717181Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:43 custom-flannel-509041 kubelet[1239]: I0531 19:38:43.555675 1239 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-s5czw\" podStartSLOduration=18.555623876 podCreationTimestamp=\"2023-05-31 19:38:25 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:43.528103265 +0000 UTC m=+30.616742264\" watchObservedRunningTime=\"2023-05-31 19:38:43.555623876 +0000 UTC m=+30.644262911\"\r\n"} +{"Time":"2023-05-31T19:39:13.73572553Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:45 custom-flannel-509041 kubelet[1239]: I0531 19:38:45.602305 1239 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:39:13.735732946Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:45 custom-flannel-509041 kubelet[1239]: I0531 19:38:45.784120 1239 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-gw678\\\" (UniqueName: \\\"kubernetes.io/projected/e985e195-b135-4ea4-9fad-c3f9303fc8d1-kube-api-access-gw678\\\") pod \\\"netcat-7458db8b8-vnx52\\\" (UID: \\\"e985e195-b135-4ea4-9fad-c3f9303fc8d1\\\") \" pod=\"default/netcat-7458db8b8-vnx52\"\r\n"} +{"Time":"2023-05-31T19:39:13.735740462Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.735747121Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.735809494Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:39:13.735818651Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T19:39:13.735825975Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters:\r\n"} +{"Time":"2023-05-31T19:39:13.735833183Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T19:39:13.735842713Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:39:13.735851586Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"UjY3QwpBNXcxQzg2MWNYMVV6MlN5WlNjT05GeG9mNmRSWTB6T2ZrQ0gzNDJPS1pEQnhOcmZmOGNkL3kwMUE4RmZYQXlHCmNkeDFJM3lQREJ1OHIzOW82eSt4c0FpRGNSSnMyUmY3UU5BTWV2MEszbm8zQlpoc1loeDdNNXllZ2hNemdxTW4KUU50bnY3T2lYTllMVFpRZDd6dSs5Y3NNbXRnNDBLUU9DWUQyTG1jMkpOWHRSNjcyT013eGpkRG5hNVpGZlZSMgpEcXR6SFRlTFZrSXhIUi9UT0hoQ09xSm0yMHF6dEVjRVd2d3hXcm1rdk5QNkFURnVHck1UVlVRRjBybFQrMDNwCnluUHdmdFRZbXJjOEVwWDUzUmVaUlVHWHZEM1N4QnlKWFdySGEzNFJhQURGaGEvdnJMZTN3ZEppNVlLRFZrVWIKN0NnQkFieU9VWXM1cmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T19:39:13.735869502Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T19:39:13.735876469Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: mk\r\n"} +{"Time":"2023-05-31T19:39:13.735883596Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts:\r\n"} +{"Time":"2023-05-31T19:39:13.735887559Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - context:\r\n"} +{"Time":"2023-05-31T19:39:13.735904118Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T19:39:13.735918949Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user: system:node:custom-flannel-509041\r\n"} +{"Time":"2023-05-31T19:39:13.73592649Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: system:node:custom-flannel-509041@mk\r\n"} +{"Time":"2023-05-31T19:39:13.735933989Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: system:node:custom-flannel-509041@mk\r\n"} +{"Time":"2023-05-31T19:39:13.735941052Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T19:39:13.735944856Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T19:39:13.735952287Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users:\r\n"} +{"Time":"2023-05-31T19:39:13.735959616Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - name: system:node:custom-flannel-509041\r\n"} +{"Time":"2023-05-31T19:39:13.735970452Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user:\r\n"} +{"Time":"2023-05-31T19:39:13.735977259Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:39:13.735984287Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:39:13.735990689Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.735996352Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.736014559Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:39:13.736024098Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T19:39:13.736031201Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authentication:\r\n"} +{"Time":"2023-05-31T19:39:13.736038176Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T19:39:13.736045036Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T19:39:13.736048888Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:39:13.736055173Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736059025Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T19:39:13.736065025Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" x509:\r\n"} +{"Time":"2023-05-31T19:39:13.7360696Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T19:39:13.736076559Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authorization:\r\n"} +{"Time":"2023-05-31T19:39:13.736080755Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T19:39:13.736087879Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:39:13.736095099Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736101759Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736104821Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T19:39:13.736107628Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T19:39:13.736109799Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T19:39:13.736114758Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T19:39:13.736117333Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.736123368Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736125922Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T19:39:13.736130187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:39:13.736132598Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:39:13.736137417Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T19:39:13.73614022Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736145092Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T19:39:13.736147623Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.73615205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T19:39:13.736154261Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T19:39:13.736158759Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T19:39:13.736160767Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736165518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T19:39:13.736167574Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736172151Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T19:39:13.736174684Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" logging:\r\n"} +{"Time":"2023-05-31T19:39:13.736179372Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T19:39:13.736181348Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" options:\r\n"} +{"Time":"2023-05-31T19:39:13.736193057Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" json:\r\n"} +{"Time":"2023-05-31T19:39:13.736199779Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T19:39:13.736214233Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T19:39:13.736222009Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T19:39:13.736226614Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736234831Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736242388Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resolvConf: /run/systemd/resolve/resolv.conf\r\n"} +{"Time":"2023-05-31T19:39:13.736249157Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T19:39:13.736252728Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T19:39:13.736260878Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736267417Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736271056Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T19:39:13.736277365Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736283628Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736287165Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:39:13.736293116Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.736296031Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.736310354Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:39:13.736325217Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.736332029Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T19:39:13.736338871Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:13.73634542Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:39:13.736350134Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:13.736356954Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:13.736360701Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" last-update: Wed, 31 May 2023 19:38:51 UTC\n"} +{"Time":"2023-05-31T19:39:13.736367166Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.736375684Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:13.736383002Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:39:13.736389295Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://192.168.50.84:8443\n"} +{"Time":"2023-05-31T19:39:13.736392844Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: bridge-509041\n"} +{"Time":"2023-05-31T19:39:13.73639927Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:13.736403006Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:39:13.736409394Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:13.736411779Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:13.736414091Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" last-update: Wed, 31 May 2023 19:38:25 UTC\n"} +{"Time":"2023-05-31T19:39:13.736418841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.736420935Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:13.736425515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:39:13.736427694Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://192.168.72.243:8443\n"} +{"Time":"2023-05-31T19:39:13.736432545Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.736434741Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts:\n"} +{"Time":"2023-05-31T19:39:13.736437172Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - context:\n"} +{"Time":"2023-05-31T19:39:13.736439167Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cluster: bridge-509041\n"} +{"Time":"2023-05-31T19:39:13.736441181Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:13.736443271Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:13.736447958Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" last-update: Wed, 31 May 2023 19:38:51 UTC\n"} +{"Time":"2023-05-31T19:39:13.736450638Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.736453622Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:13.736455833Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:39:13.736460358Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:13.736462363Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user: bridge-509041\n"} +{"Time":"2023-05-31T19:39:13.736467751Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: bridge-509041\n"} +{"Time":"2023-05-31T19:39:13.736470248Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - context:\n"} +{"Time":"2023-05-31T19:39:13.736473183Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cluster: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.736475338Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T19:39:13.736477425Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T19:39:13.736481918Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" last-update: Wed, 31 May 2023 19:38:25 UTC\n"} +{"Time":"2023-05-31T19:39:13.736484974Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.736489463Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:39:13.736491475Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:39:13.736493659Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:13.736498125Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.736500355Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.736502522Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: bridge-509041\n"} +{"Time":"2023-05-31T19:39:13.736507318Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:39:13.736509313Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:39:13.73651383Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users:\n"} +{"Time":"2023-05-31T19:39:13.736515849Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - name: bridge-509041\n"} +{"Time":"2023-05-31T19:39:13.7365182Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user:\n"} +{"Time":"2023-05-31T19:39:13.736557349Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt\n"} +{"Time":"2023-05-31T19:39:13.736610107Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.key\n"} +{"Time":"2023-05-31T19:39:13.736616107Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - name: custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:13.736623024Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user:\n"} +{"Time":"2023-05-31T19:39:13.736627113Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt\n"} +{"Time":"2023-05-31T19:39:13.736644283Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.key\n"} +{"Time":"2023-05-31T19:39:13.736656571Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.736663832Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.736673229Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:39:13.736677443Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.736684377Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" items:\n"} +{"Time":"2023-05-31T19:39:13.736687997Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.736694103Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.736699455Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:13.736705755Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.736709313Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:13.73671287Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:13.736716567Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:13.736720582Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:13.736724052Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:13.73672762Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:13.736731926Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:13.736749295Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:13.736757033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:13.736770952Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:13.736779539Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:13.736783566Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:13.736790434Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:13.736794762Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:13.736801466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:13.7368053Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:13.736811584Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:13.736815179Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.73682179Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.736825416Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.736832515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:13.736838938Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:13.736842809Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:13.73684925Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:13.736853049Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:13.736858726Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:25Z\"\n"} +{"Time":"2023-05-31T19:39:13.736861452Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.736863689Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:13.736865812Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"301\"\n"} +{"Time":"2023-05-31T19:39:13.736868462Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 77993b2e-ac2f-4284-9e2d-478e9b8620a7\n"} +{"Time":"2023-05-31T19:39:13.73687235Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.73687461Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.736876912Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni-conf.json: |\n"} +{"Time":"2023-05-31T19:39:13.736879029Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\n"} +{"Time":"2023-05-31T19:39:13.736881276Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"name\": \"cbr0\",\n"} +{"Time":"2023-05-31T19:39:13.736883735Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"cniVersion\": \"0.3.1\",\n"} +{"Time":"2023-05-31T19:39:13.736888473Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"plugins\": [\n"} +{"Time":"2023-05-31T19:39:13.736890575Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\n"} +{"Time":"2023-05-31T19:39:13.736904759Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"flannel\",\n"} +{"Time":"2023-05-31T19:39:13.736908912Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"delegate\": {\n"} +{"Time":"2023-05-31T19:39:13.736923819Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"hairpinMode\": true,\n"} +{"Time":"2023-05-31T19:39:13.736928803Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"isDefaultGateway\": true\n"} +{"Time":"2023-05-31T19:39:13.736933669Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.736941643Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\n"} +{"Time":"2023-05-31T19:39:13.736946325Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\n"} +{"Time":"2023-05-31T19:39:13.736952057Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"type\": \"portmap\",\n"} +{"Time":"2023-05-31T19:39:13.736955725Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"capabilities\": {\n"} +{"Time":"2023-05-31T19:39:13.736958965Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"portMappings\": true\n"} +{"Time":"2023-05-31T19:39:13.736965615Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.736977062Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.736980577Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\n"} +{"Time":"2023-05-31T19:39:13.736986255Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.736989671Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net-conf.json: |\n"} +{"Time":"2023-05-31T19:39:13.736995805Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\n"} +{"Time":"2023-05-31T19:39:13.736999351Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"Network\": \"10.244.0.0/16\",\n"} +{"Time":"2023-05-31T19:39:13.737006529Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"Backend\": {\n"} +{"Time":"2023-05-31T19:39:13.737010488Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"Type\": \"vxlan\"\n"} +{"Time":"2023-05-31T19:39:13.73701683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.737020109Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.737026415Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.737030055Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.737036303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:13.737039881Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubectl.kubernetes.io/last-applied-configuration: |\n"} +{"Time":"2023-05-31T19:39:13.737048878Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\"apiVersion\":\"v1\",\"data\":{\"cni-conf.json\":\"{\\n \\\"name\\\": \\\"cbr0\\\",\\n \\\"cniVersion\\\": \\\"0.3.1\\\",\\n \\\"plugins\\\": [\\n {\\n \\\"type\\\": \\\"flannel\\\",\\n \\\"delegate\\\": {\\n \\\"hairpinMode\\\": true,\\n \\\"isDefaultGateway\\\": true\\n }\\n },\\n {\\n \\\"type\\\": \\\"portmap\\\",\\n \\\"capabilities\\\": {\\n \\\"portMappings\\\": true\\n }\\n }\\n ]\\n}\\n\",\"net-conf.json\":\"{\\n \\\"Network\\\": \\\"10.244.0.0/16\\\",\\n \\\"Backend\\\": {\\n \\\"Type\\\": \\\"vxlan\\\"\\n }\\n}\\n\"},\"kind\":\"ConfigMap\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"flannel\",\"tier\":\"node\"},\"name\":\"kube-flannel-cfg\",\"namespace\":\"kube-flannel\"}}\n"} +{"Time":"2023-05-31T19:39:13.737061335Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:14Z\"\n"} +{"Time":"2023-05-31T19:39:13.737064607Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" labels:\n"} +{"Time":"2023-05-31T19:39:13.737066785Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" app: flannel\n"} +{"Time":"2023-05-31T19:39:13.73706894Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tier: node\n"} +{"Time":"2023-05-31T19:39:13.73707107Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T19:39:13.737073253Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-flannel\n"} +{"Time":"2023-05-31T19:39:13.737075621Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"280\"\n"} +{"Time":"2023-05-31T19:39:13.737079795Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: e1ff4295-33de-4d4b-a08e-90791f0ceef0\n"} +{"Time":"2023-05-31T19:39:13.737082107Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.73708674Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.737088898Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:13.737091038Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.737094675Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:13.737097147Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:13.737101917Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:13.737104235Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:13.737106425Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:13.737124779Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:13.737132417Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:13.737136277Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:13.737140871Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:13.737152144Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:13.737161761Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:13.737165422Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:13.73716933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:13.737172814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:13.73717674Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:13.737180753Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:13.737188142Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:13.737191716Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.737195216Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.737201441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.737205032Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:13.737211161Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:13.73721529Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:13.737221548Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:13.737225474Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:13.737231716Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:25Z\"\n"} +{"Time":"2023-05-31T19:39:13.737235375Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.737238744Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-flannel\n"} +{"Time":"2023-05-31T19:39:13.737244451Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"305\"\n"} +{"Time":"2023-05-31T19:39:13.737259918Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: cb5d5285-00fa-49d0-920a-334fced7af49\n"} +{"Time":"2023-05-31T19:39:13.737274572Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.737278458Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.73728521Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:13.73728892Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.737295975Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:13.737753079Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:13.737761726Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:13.737765626Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:13.737772619Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:13.737775987Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:13.737782361Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:13.737786284Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:13.737790872Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:13.737819382Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:13.737828269Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:13.737831746Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:13.737838515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:13.737842625Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:13.73785167Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:13.737855784Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:13.737860285Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:13.737864461Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.737871962Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.73788942Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.737897807Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:13.737903065Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:13.738044257Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:13.738056296Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:13.738060078Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:13.73806617Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:25Z\"\n"} +{"Time":"2023-05-31T19:39:13.738070698Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.738078172Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T19:39:13.738083264Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"308\"\n"} +{"Time":"2023-05-31T19:39:13.738090185Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 9e882072-d018-4ec2-9c8c-1d3726735af2\n"} +{"Time":"2023-05-31T19:39:13.738095447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.738100665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.738105205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" jws-kubeconfig-ivihho: eyJhbGciOiJIUzI1NiIsImtpZCI6Iml2aWhobyJ9..LhxM9hhI_2osk6Iq8yIMPhFYHvonDA5Il6uQd65No20\n"} +{"Time":"2023-05-31T19:39:13.738112365Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T19:39:13.738116359Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.738125981Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T19:39:13.738131372Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:13.738141344Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:39:13.738150435Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"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\n"} +{"Time":"2023-05-31T19:39:13.738158617Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:39:13.738166331Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: \"\"\n"} +{"Time":"2023-05-31T19:39:13.738170358Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts: null\n"} +{"Time":"2023-05-31T19:39:13.73817655Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:39:13.738180655Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:39:13.738186769Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:39:13.738190829Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users: null\n"} +{"Time":"2023-05-31T19:39:13.738197631Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.738201608Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.738208059Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:12Z\"\n"} +{"Time":"2023-05-31T19:39:13.738215114Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T19:39:13.738219333Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:39:13.738226003Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"309\"\n"} +{"Time":"2023-05-31T19:39:13.738229346Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: c951175a-65a9-45cb-acfd-4d5e484944be\n"} +{"Time":"2023-05-31T19:39:13.738234447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.738239327Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.738246151Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:13.73825005Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.738257547Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:13.738267913Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:13.73827115Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:13.738274009Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:13.73830814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:13.738312073Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:13.738315252Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:13.738318427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:13.73832221Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:13.738325174Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:13.738328214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:13.738331994Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:13.738335499Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:13.738339067Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:13.738342844Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:13.738347058Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:13.738351157Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:13.738357976Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.73836182Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.7383689Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.738375119Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:13.738381732Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:13.738386141Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:13.738392665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:13.738398988Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:13.7384441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:25Z\"\n"} +{"Time":"2023-05-31T19:39:13.738449354Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.738452765Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:39:13.738455966Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"314\"\n"} +{"Time":"2023-05-31T19:39:13.738459383Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 5c0d989c-2c9c-4198-b723-df0e03c3fb1f\n"} +{"Time":"2023-05-31T19:39:13.738463294Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.738467013Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.738471913Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Corefile: |\n"} +{"Time":"2023-05-31T19:39:13.738479135Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" .:53 {\n"} +{"Time":"2023-05-31T19:39:13.738483272Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" log\n"} +{"Time":"2023-05-31T19:39:13.738494873Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" errors\n"} +{"Time":"2023-05-31T19:39:13.73849897Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" health {\n"} +{"Time":"2023-05-31T19:39:13.738505188Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T19:39:13.738508923Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.738515292Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ready\n"} +{"Time":"2023-05-31T19:39:13.738519314Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T19:39:13.738525448Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pods insecure\n"} +{"Time":"2023-05-31T19:39:13.738529592Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T19:39:13.738537604Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ttl 30\n"} +{"Time":"2023-05-31T19:39:13.738541173Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.738548922Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T19:39:13.738552198Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hosts {\n"} +{"Time":"2023-05-31T19:39:13.738555209Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 192.168.72.1 host.minikube.internal\n"} +{"Time":"2023-05-31T19:39:13.738558051Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fallthrough\n"} +{"Time":"2023-05-31T19:39:13.738561134Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.73856407Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T19:39:13.738609883Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T19:39:13.738614129Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.738617868Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cache 30\n"} +{"Time":"2023-05-31T19:39:13.738620726Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" loop\n"} +{"Time":"2023-05-31T19:39:13.738624163Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" reload\n"} +{"Time":"2023-05-31T19:39:13.738627498Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" loadbalance\n"} +{"Time":"2023-05-31T19:39:13.738631341Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\n"} +{"Time":"2023-05-31T19:39:13.738634447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.738637695Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.738640823Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:12Z\"\n"} +{"Time":"2023-05-31T19:39:13.738644222Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: coredns\n"} +{"Time":"2023-05-31T19:39:13.738647153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.738650444Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"379\"\n"} +{"Time":"2023-05-31T19:39:13.738654345Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: c94c2a29-f9e2-483e-878f-847f8d892ff1\n"} +{"Time":"2023-05-31T19:39:13.738657683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.738660789Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.738663952Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T19:39:13.738667205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.738670855Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:13.738675607Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:13.738679186Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:13.738682925Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:13.738686575Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:13.738690624Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:13.738834024Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:13.738842248Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:13.738850312Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:13.738854463Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:13.738858401Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:13.738863579Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:13.738869687Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:13.738874123Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:13.738877801Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:13.738880664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:13.738883733Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:13.738891102Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.738898974Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T19:39:13.738903201Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T19:39:13.738910058Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.738913862Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T19:39:13.738917758Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM4MDBaFw0zMzA1MjgxOTM4MDBaMBkxFzAV\n"} +{"Time":"2023-05-31T19:39:13.73892127Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T19:39:13.738924929Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CgKCAQEAmlOiyjuIQlg0Qpjjffvjy7KotqIIpR2ZGX41XreCGoeRgnExZDcKXFBC\n"} +{"Time":"2023-05-31T19:39:13.738928303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 2+fYaztunRZkp5nGW028KiwNdEcS0SGr9IKu5i8cytTXjZGwAWRfhqKXyk0O0UBn\n"} +{"Time":"2023-05-31T19:39:13.738933114Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7+sdRUFiaY0yyOTmLaotSVzHka8AxxvUSJnvjEqGp6rpXQD6uqL1ZyZoYHLVa5lI\n"} +{"Time":"2023-05-31T19:39:13.73923078Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" SNFpTg1TBHObMwFzNS3lOKzNUhRV3WOheH1tKebFn1x0DdsplktP1yLjvvM2ueiv\n"} +{"Time":"2023-05-31T19:39:13.73924378Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 2eDHnotIwax7ydwuvnV06USIeziYaez5d8IByGB95GlDLd1n9AYdjhEWVWXJoiOd\n"} +{"Time":"2023-05-31T19:39:13.739248213Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" GPAlSZndnRY0KNj0ZJlE+SalE0JmewIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T19:39:13.739256288Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUyGDXbPtYzJgAhjdzOaGeY2Ovs5Aw\n"} +{"Time":"2023-05-31T19:39:13.739260337Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAGVn\n"} +{"Time":"2023-05-31T19:39:13.739263908Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CBosPpAHCREXQ1dMoS5WRPyJzdXjPnw3pCKeRYThq1xLnAUH6u3x/LeJvyTYv9Aw\n"} +{"Time":"2023-05-31T19:39:13.739267393Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IwuakMcrBxchEyfKpNEZwCovxXmTdLclwppSp1/g3jRjIq018kPEMpFE8CAfg/9L\n"} +{"Time":"2023-05-31T19:39:13.739270872Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xuYHbOv76LQ5DtM2zQrTUnteVe14peFWLpMVQgjtNM0VhRSuzaJqj2im75gbT7YQ\n"} +{"Time":"2023-05-31T19:39:13.739274552Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fTUtxeHUXjcmgIJgaREkOtt4ELOruQ0b5ExhFbmyxFHE5/ehPu/lG4yH7O4SgGlb\n"} +{"Time":"2023-05-31T19:39:13.739278648Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" wn6SLDoqX6gpU595EBfpVzcoPqJk216tp3jZ9Ia78mqO+gRGyOBdLv98kq7S4kTC\n"} +{"Time":"2023-05-31T19:39:13.739282482Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" xxV2utohOSZRWYoIwTU=\n"} +{"Time":"2023-05-31T19:39:13.739286417Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.739293947Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T19:39:13.739298383Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T19:39:13.739306297Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T19:39:13.739310362Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.73931406Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.739321382Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:09Z\"\n"} +{"Time":"2023-05-31T19:39:13.739325411Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T19:39:13.739329394Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.739336381Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"30\"\n"} +{"Time":"2023-05-31T19:39:13.739340636Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 0a750556-bf20-47e6-b092-27fe6214258c\n"} +{"Time":"2023-05-31T19:39:13.739616195Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.739621661Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.739625642Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T19:39:13.739630436Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.73963416Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.739641518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:09Z\"\n"} +{"Time":"2023-05-31T19:39:13.739645776Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T19:39:13.739653005Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.739657215Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"31\"\n"} +{"Time":"2023-05-31T19:39:13.73966456Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 700e1fc9-5bb8-46ac-8aa5-e7194f795894\n"} +{"Time":"2023-05-31T19:39:13.739668342Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.739672087Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.739677948Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T19:39:13.73968839Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T19:39:13.739697327Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T19:39:13.739701352Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T19:39:13.739708843Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clientConnection:\n"} +{"Time":"2023-05-31T19:39:13.739712894Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T19:39:13.739720218Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" burst: 0\n"} +{"Time":"2023-05-31T19:39:13.739724347Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T19:39:13.739731344Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T19:39:13.739735409Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" qps: 0\n"} +{"Time":"2023-05-31T19:39:13.739742639Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:39:13.739747216Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.739751749Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conntrack:\n"} +{"Time":"2023-05-31T19:39:13.740596433Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T19:39:13.740606908Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" min: null\n"} +{"Time":"2023-05-31T19:39:13.740610982Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:13.740614342Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:13.740617563Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" detectLocal:\n"} +{"Time":"2023-05-31T19:39:13.740620795Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740623939Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740627222Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740631075Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T19:39:13.740634605Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740638757Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740642202Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" iptables:\n"} +{"Time":"2023-05-31T19:39:13.740654637Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T19:39:13.740658392Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T19:39:13.740668217Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T19:39:13.740671719Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.740680658Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.740684653Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ipvs:\n"} +{"Time":"2023-05-31T19:39:13.740693773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T19:39:13.740703272Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.740712426Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740716115Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" strictARP: false\n"} +{"Time":"2023-05-31T19:39:13.740726265Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.740729808Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:13.740741241Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:13.740744791Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:13.740749699Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T19:39:13.740753258Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T19:39:13.740764049Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740767754Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T19:39:13.740771369Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T19:39:13.740774873Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740778441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740785121Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" winkernel:\n"} +{"Time":"2023-05-31T19:39:13.740788633Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T19:39:13.740792188Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T19:39:13.740795999Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740799718Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740803122Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T19:39:13.740810435Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T19:39:13.740815385Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.740818726Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:39:13.740821823Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T19:39:13.740825077Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:39:13.740828941Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T19:39:13.740836196Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:39:13.740840122Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: default\n"} +{"Time":"2023-05-31T19:39:13.740845146Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts:\n"} +{"Time":"2023-05-31T19:39:13.740848742Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - context:\n"} +{"Time":"2023-05-31T19:39:13.74085514Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cluster: default\n"} +{"Time":"2023-05-31T19:39:13.740858748Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:39:13.741032017Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user: default\n"} +{"Time":"2023-05-31T19:39:13.741046477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: default\n"} +{"Time":"2023-05-31T19:39:13.741051087Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: default\n"} +{"Time":"2023-05-31T19:39:13.74105477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users:\n"} +{"Time":"2023-05-31T19:39:13.741058435Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - name: default\n"} +{"Time":"2023-05-31T19:39:13.741063604Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" user:\n"} +{"Time":"2023-05-31T19:39:13.741067451Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T19:39:13.741071767Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.741075267Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.74107884Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:12Z\"\n"} +{"Time":"2023-05-31T19:39:13.741083564Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" labels:\n"} +{"Time":"2023-05-31T19:39:13.741087267Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.741096465Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T19:39:13.741100949Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.741107716Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"240\"\n"} +{"Time":"2023-05-31T19:39:13.741111026Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: e4242e30-aec9-41df-a9f2-6c6bdac39830\n"} +{"Time":"2023-05-31T19:39:13.741114391Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.741117409Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.741120686Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:39:13.741124133Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.741127179Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:39:13.741130463Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:39:13.741137898Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:39:13.741141252Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:39:13.741144881Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:39:13.742490281Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:39:13.742500299Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:39:13.742504022Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:39:13.742515153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:39:13.742526265Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:39:13.742536088Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:39:13.742545985Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:39:13.742549731Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:39:13.742553153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:39:13.742562108Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:39:13.742565745Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:39:13.742569305Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:39:13.74258175Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:39:13.742593129Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.742603917Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.742608392Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:39:13.742611817Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:39:13.742622177Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:39:13.74262603Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:39:13.74262974Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:39:13.742633558Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:25Z\"\n"} +{"Time":"2023-05-31T19:39:13.742644434Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:39:13.74265387Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.742663708Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"318\"\n"} +{"Time":"2023-05-31T19:39:13.742674277Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: de628bf2-0810-4c2a-bd06-2d2b34ff7f25\n"} +{"Time":"2023-05-31T19:39:13.742678085Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.742681274Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.742692289Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T19:39:13.742695438Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiServer:\n"} +{"Time":"2023-05-31T19:39:13.742704321Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certSANs:\n"} +{"Time":"2023-05-31T19:39:13.742707636Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T19:39:13.742716323Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - localhost\n"} +{"Time":"2023-05-31T19:39:13.742726555Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - 192.168.72.243\n"} +{"Time":"2023-05-31T19:39:13.742736426Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:39:13.742746379Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T19:39:13.742750307Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:39:13.742754562Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T19:39:13.742757845Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:39:13.742761558Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:39:13.742765322Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T19:39:13.742768551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:39:13.742778404Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" controllerManager:\n"} +{"Time":"2023-05-31T19:39:13.742781955Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:39:13.742791031Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T19:39:13.742795378Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:39:13.742804327Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dns: {}\n"} +{"Time":"2023-05-31T19:39:13.742807999Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" etcd:\n"} +{"Time":"2023-05-31T19:39:13.74281127Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" local:\n"} +{"Time":"2023-05-31T19:39:13.742814904Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:39:13.74281825Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:39:13.742821489Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T19:39:13.742825028Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T19:39:13.742828793Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T19:39:13.742832601Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T19:39:13.742835727Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" networking:\n"} +{"Time":"2023-05-31T19:39:13.742839427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T19:39:13.742842869Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:39:13.742845904Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T19:39:13.742849313Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" scheduler:\n"} +{"Time":"2023-05-31T19:39:13.742852278Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:39:13.742855519Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:39:13.742858397Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.742861194Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.742864157Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:11Z\"\n"} +{"Time":"2023-05-31T19:39:13.742867504Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T19:39:13.742870312Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.742875551Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"193\"\n"} +{"Time":"2023-05-31T19:39:13.742878857Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 80bb2e19-6590-4915-b43a-c5d3cd906bbc\n"} +{"Time":"2023-05-31T19:39:13.742882036Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:39:13.742885166Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:39:13.742888612Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kubelet: |\n"} +{"Time":"2023-05-31T19:39:13.742893264Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T19:39:13.742896654Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authentication:\n"} +{"Time":"2023-05-31T19:39:13.74289974Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" anonymous:\n"} +{"Time":"2023-05-31T19:39:13.742902441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enabled: false\n"} +{"Time":"2023-05-31T19:39:13.742905424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" webhook:\n"} +{"Time":"2023-05-31T19:39:13.742908576Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T19:39:13.74291167Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enabled: true\n"} +{"Time":"2023-05-31T19:39:13.742914417Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" x509:\n"} +{"Time":"2023-05-31T19:39:13.742917321Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:39:13.742920423Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" authorization:\n"} +{"Time":"2023-05-31T19:39:13.742923379Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T19:39:13.742926546Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" webhook:\n"} +{"Time":"2023-05-31T19:39:13.742929993Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:39:13.74293506Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:39:13.742938336Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T19:39:13.742941703Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T19:39:13.74294506Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T19:39:13.74294802Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T19:39:13.742951798Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T19:39:13.742955285Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.742958561Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" evictionHard:\n"} +{"Time":"2023-05-31T19:39:13.742961453Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T19:39:13.742964538Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T19:39:13.742967783Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T19:39:13.742970877Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.74297397Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T19:39:13.742977962Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:13.74298128Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T19:39:13.74298604Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T19:39:13.742988959Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T19:39:13.742992457Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:13.742996377Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T19:39:13.743000242Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T19:39:13.743003519Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T19:39:13.743006749Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" logging:\n"} +{"Time":"2023-05-31T19:39:13.743010046Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T19:39:13.743013103Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" options:\n"} +{"Time":"2023-05-31T19:39:13.743016232Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" json:\n"} +{"Time":"2023-05-31T19:39:13.743019333Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T19:39:13.743022707Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T19:39:13.743025966Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T19:39:13.743029131Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:13.743032599Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:13.743035912Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resolvConf: /run/systemd/resolve/resolv.conf\n"} +{"Time":"2023-05-31T19:39:13.743039067Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T19:39:13.743042283Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T19:39:13.743045365Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.743048518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T19:39:13.743051786Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T19:39:13.743055627Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T19:39:13.743058869Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T19:39:13.743065044Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T19:39:13.743068274Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:39:13.74307123Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.743074274Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" creationTimestamp: \"2023-05-31T19:38:11Z\"\n"} +{"Time":"2023-05-31T19:39:13.743077583Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T19:39:13.743081089Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:39:13.74308412Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"196\"\n"} +{"Time":"2023-05-31T19:39:13.743087299Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid: 48343570-6eb9-4aa3-9cee-36ce42d9c839\n"} +{"Time":"2023-05-31T19:39:13.743090335Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: List\n"} +{"Time":"2023-05-31T19:39:13.743093196Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:39:13.743096156Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T19:39:13.743099316Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743102387Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743105429Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:39:13.743109325Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ● docker.service\r\n"} +{"Time":"2023-05-31T19:39:13.743112973Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: masked (Reason: Unit docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:39:13.743116966Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T19:39:13.743120191Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:39:13.743123296Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743126303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743129609Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:39:13.743133306Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;35m# Unit docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:39:13.743136844Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743139716Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743146725Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:39:13.743150165Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:39:13.743480119Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"exec-opts\": [\r\n"} +{"Time":"2023-05-31T19:39:13.743495976Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"native.cgroupdriver=systemd\"\r\n"} +{"Time":"2023-05-31T19:39:13.743506298Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ],\r\n"} +{"Time":"2023-05-31T19:39:13.743516963Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T19:39:13.743526419Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T19:39:13.743541299Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T19:39:13.743545338Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:39:13.743548515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T19:39:13.743552185Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:39:13.743555475Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.74355879Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743562498Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:39:13.743566231Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Client:\r\n"} +{"Time":"2023-05-31T19:39:13.743569615Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T19:39:13.743595943Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Context: default\r\n"} +{"Time":"2023-05-31T19:39:13.743608027Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T19:39:13.743618981Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.743622903Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Server:\r\n"} +{"Time":"2023-05-31T19:39:13.743626898Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ERROR: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?\r\n"} +{"Time":"2023-05-31T19:39:13.743631125Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" errors pretty printing info\r\n"} +{"Time":"2023-05-31T19:39:13.74364525Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:39:13.743654808Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743664934Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743676567Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:39:13.743687972Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;31m●\u001b[0m cri-docker.service\r\n"} +{"Time":"2023-05-31T19:39:13.743699176Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: masked (Reason: Unit cri-docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:39:13.743856615Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: \u001b[0;1;31mfailed\u001b[0m (Result: exit-code) since Wed 2023-05-31 19:37:42 UTC; 1min 28s ago\r\n"} +{"Time":"2023-05-31T19:39:13.743874214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TriggeredBy: \u001b[0;1;31m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:39:13.743880113Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Main PID: 454 (code=exited, status=1/FAILURE)\r\n"} +{"Time":"2023-05-31T19:39:13.743888178Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.743893476Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:42 minikube systemd[1]: cri-docker.service: Scheduled restart job, restart counter is at 3.\r\n"} +{"Time":"2023-05-31T19:39:13.743901392Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:42 minikube systemd[1]: Stopped CRI Interface for Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T19:39:13.743906799Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:42 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Start request repeated too quickly.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.743914872Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:42 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.74392029Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:42 minikube systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.743925061Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:39:13.743929681Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.74393925Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743946935Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:39:13.743951453Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;35m# Unit cri-docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:39:13.743955638Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743959779Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.743988897Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:39:13.744038493Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cat: /etc/systemd/system/cri-docker.service.d/10-cni.conf: No such file or directory\r\n"} +{"Time":"2023-05-31T19:39:13.744060814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:39:13.744075186Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.744089766Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.744244231Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:39:13.744259286Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:13.744269689Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T19:39:13.744278713Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T19:39:13.744287664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T19:39:13.744311729Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:39:13.74432602Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:39:13.74433044Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.744335435Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:13.744363793Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:39:13.744375214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T19:39:13.744385055Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:39:13.744394637Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T19:39:13.744409659Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T19:39:13.744420467Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:39:13.744427928Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.744432325Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T19:39:13.744438401Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T19:39:13.74445568Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:39:13.744459885Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T19:39:13.744463034Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.744466523Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T19:39:13.74447338Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T19:39:13.744477491Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:39:13.744781213Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T19:39:13.744806992Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.744814935Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:39:13.744819149Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:39:13.744825514Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.744829272Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.744832843Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.744836766Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.744840393Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T19:39:13.744845464Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T19:39:13.74485027Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.744854906Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:39:13.744861966Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:39:13.744865567Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.744871487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:13.744891247Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:13.744895026Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.744903161Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.744906339Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:39:13.744910102Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cri-dockerd 0.3.2 (23513f4)\r\n"} +{"Time":"2023-05-31T19:39:13.744912684Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.744915461Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.744921891Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:39:13.744931225Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T19:39:13.74493603Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: loaded (\u001b]8;;file://custom-flannel-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: disabled)\r\n"} +{"Time":"2023-05-31T19:39:13.745687399Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:37:57 UTC; 1min 13s ago\r\n"} +{"Time":"2023-05-31T19:39:13.745698991Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:39:13.745703609Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Main PID: 666 (containerd)\r\n"} +{"Time":"2023-05-31T19:39:13.745707976Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Tasks: 119 (limit: 8192)\r\n"} +{"Time":"2023-05-31T19:39:13.745711493Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Memory: 280.9M\r\n"} +{"Time":"2023-05-31T19:39:13.745715431Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T19:39:13.745719168Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─ 666 /usr/bin/containerd --root /mnt/vda1/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:39:13.74572394Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─ 923 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 19d7ab3d7f86f5f672e16fc6c6c3f7f0931af97224decef835c415ca910b6b6a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.745736413Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─ 927 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 94e11c9bfe6dd5fea7a8744f7057955bda805f75c3c1219b2fe792f738a78c17 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.745741176Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─ 959 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 23cb1978ebc172182719b2d26a0ba04ef017ffbc939760e11a81963da46d6b7b -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.745745469Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─ 966 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id eb4511f61b22c876b2e1e9d083367920bb502859420ebb632481c97ee5c7f496 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.745775988Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─1442 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4470f9b8850ad86a1d758c23d7d859dd1b777c4f27b3a66ed342bc259057f060 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.745780855Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─1443 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4790ddfa4aae5d49b5ae5a8316684bf4d6eb98a8981cec412226422317c18726 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.745785167Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─1775 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 4fea164a86a4602940062a850a06b27cb0a63b681aa2a2836da0649c0cb99adc -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.74578947Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ├─2045 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 6689c9810edabd60420930d309014a8c8fa3c64ba33eccc28b3cb0ec3a7de3d4 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.745794903Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" └─2188 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 42fbec551601e78c964178809eec09c86a67a6c2ce0ce59774973075e11bcbb5 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:39:13.745799494Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.745803445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.157069917Z\" level=info msg=\"stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: active requests=0, bytes read=51164237\"\r\n"} +{"Time":"2023-05-31T19:39:13.745808499Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.164946300Z\" level=info msg=\"ImageCreate event name:\\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:39:13.745813621Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.177959025Z\" level=info msg=\"ImageUpdate event name:\\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:39:13.745818314Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.190579202Z\" level=info msg=\"ImageCreate event name:\\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:39:13.745828849Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.192867241Z\" level=info msg=\"Pulled image \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" with image id \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\", repo tag \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\", repo digest \\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\", size \\\"51155161\\\" in 4.677437956s\"\r\n"} +{"Time":"2023-05-31T19:39:13.745846237Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.193053573Z\" level=info msg=\"PullImage \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" returns image reference \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\"\"\r\n"} +{"Time":"2023-05-31T19:39:13.745851852Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.198691744Z\" level=info msg=\"CreateContainer within sandbox \\\"42fbec551601e78c964178809eec09c86a67a6c2ce0ce59774973075e11bcbb5\\\" for container \u0026ContainerMetadata{Name:dnsutils,Attempt:0,}\"\r\n"} +{"Time":"2023-05-31T19:39:13.745857571Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.240790614Z\" level=info msg=\"CreateContainer within sandbox \\\"42fbec551601e78c964178809eec09c86a67a6c2ce0ce59774973075e11bcbb5\\\" for \u0026ContainerMetadata{Name:dnsutils,Attempt:0,} returns container id \\\"f260da254a82dad759451a4bcf26563f54e86b257fa2265aaec649057d3829dc\\\"\"\r\n"} +{"Time":"2023-05-31T19:39:13.746277413Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.243012721Z\" level=info msg=\"StartContainer for \\\"f260da254a82dad759451a4bcf26563f54e86b257fa2265aaec649057d3829dc\\\"\"\r\n"} +{"Time":"2023-05-31T19:39:13.746286805Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:38:51 custom-flannel-509041 containerd[666]: time=\"2023-05-31T19:38:51.360145194Z\" level=info msg=\"StartContainer for \\\"f260da254a82dad759451a4bcf26563f54e86b257fa2265aaec649057d3829dc\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:39:13.746291405Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.746295221Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.746298642Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:39:13.746303668Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.746312798Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:13.746320736Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:39:13.746325466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:39:13.746330065Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:13.746338647Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:13.746343486Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.746347711Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:13.746353464Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:39:13.74636177Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:39:13.746366126Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:39:13.746371991Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:39:13.746377516Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:39:13.746381837Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:39:13.746385374Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:13.74702389Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:13.747036263Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:39:13.747040704Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:39:13.747053814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:39:13.747058063Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:39:13.747062115Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:39:13.747065709Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:39:13.747069001Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:39:13.747072702Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:39:13.747076291Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.747079919Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.747083667Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:39:13.747087029Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:39:13.747090644Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.747094008Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:13.747097747Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:13.747101522Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.747108212Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.747111773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:39:13.747116628Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:13.74712013Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:39:13.747123971Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:39:13.747127731Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:13.747131378Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:13.747143312Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.747668071Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:13.747675479Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:39:13.74767965Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:39:13.747683247Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:39:13.747686786Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:39:13.747689977Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:39:13.7476931Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:39:13.747696573Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:13.747700757Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:13.747710336Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:39:13.747713984Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:39:13.747717214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:39:13.747720711Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:39:13.74772398Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:39:13.747727826Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:39:13.747733186Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:39:13.747736527Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:39:13.747739559Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.747742554Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.747745406Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:39:13.747748517Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:39:13.74775166Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.747754558Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:13.747757598Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:13.747760491Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.748278905Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.748291037Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:39:13.748295518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:39:13.748300256Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:13.748307814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:13.748311719Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:39:13.748315175Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # imports\r\n"} +{"Time":"2023-05-31T19:39:13.748318411Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.748326459Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:39:13.748330016Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:39:13.748333676Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.748338041Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.748341798Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:13.748348339Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:13.748352118Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.748355535Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:39:13.748360424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.748367401Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.748371078Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.748377093Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.748380896Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.74840378Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:39:13.748417008Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.748420534Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:39:13.748423498Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.748426672Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:39:13.748429963Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.749322512Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.749335091Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:39:13.749339824Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:39:13.749346664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:39:13.74935072Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:39:13.749354851Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.749359906Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:39:13.749367447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:39:13.749371276Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:39:13.749377927Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:39:13.749381167Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:39:13.749385081Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:39:13.749388703Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:39:13.749392821Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.749399119Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:39:13.749403477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:39:13.749407117Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:39:13.749411946Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.749419423Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:39:13.749423975Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.74943019Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.749442137Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.74944669Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:39:13.749454362Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:39:13.749463525Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:39:13.749468111Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:39:13.749474997Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:39:13.749479284Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.749488694Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:39:13.749495294Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:39:13.749499446Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:39:13.749505741Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.749517905Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:39:13.749522396Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:39:13.749530895Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.74954122Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:39:13.749545689Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:39:13.749549431Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:39:13.749556347Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:39:13.749560251Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:39:13.749566313Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:39:13.749570324Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:39:13.749576858Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:39:13.749580844Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.749586868Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.749590039Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:39:13.7495944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T19:39:13.749598093Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T19:39:13.751186023Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:39:13.751201017Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751216171Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T19:39:13.751220452Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:13.751227752Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:13.751231523Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.75123826Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:39:13.75124222Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751248542Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:39:13.751251606Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751255279Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751258314Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:39:13.751261372Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751265086Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751271716Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.751274752Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.75127819Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.751281444Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751287629Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:39:13.751290984Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:39:13.751297613Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.751300944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:13.751307143Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:13.751310416Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751316487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751319825Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.75132506Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751333349Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.7513365Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751339442Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:39:13.751353517Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751366556Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:39:13.751376027Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751379495Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:39:13.751385794Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751389104Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:39:13.751395187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:39:13.75139856Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:39:13.751404927Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:39:13.751407915Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:39:13.751414805Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:39:13.7514184Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.75142194Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:39:13.751434419Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cdi_spec_dirs = [\"/etc/cdi\", \"/var/run/cdi\"]\r\n"} +{"Time":"2023-05-31T19:39:13.75143876Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:39:13.751441987Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T19:39:13.751448831Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T19:39:13.751452367Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:39:13.751459275Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T19:39:13.751463201Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T19:39:13.751469728Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" drain_exec_sync_io_timeout = \"0s\"\r\n"} +{"Time":"2023-05-31T19:39:13.751473164Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_cdi = false\r\n"} +{"Time":"2023-05-31T19:39:13.751479466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:39:13.751484601Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:39:13.751490913Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T19:39:13.751494649Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T19:39:13.751501911Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T19:39:13.751505656Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" image_pull_progress_timeout = \"1m0s\"\r\n"} +{"Time":"2023-05-31T19:39:13.751519472Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:39:13.751523036Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:39:13.751529556Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T19:39:13.751532926Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:39:13.751536726Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:39:13.751544493Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T19:39:13.751548948Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:39:13.751555562Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T19:39:13.751558981Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751567069Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:39:13.751570613Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T19:39:13.751577025Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:39:13.751580577Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751586913Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751590137Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:39:13.751596375Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:39:13.751599321Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:39:13.751602015Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751604939Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751612456Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T19:39:13.751615928Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" setup_serially = false\r\n"} +{"Time":"2023-05-31T19:39:13.751626043Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751629621Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:39:13.751635592Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.751643867Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T19:39:13.751654169Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:39:13.751658109Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ignore_blockio_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:39:13.751664835Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:39:13.751668192Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:39:13.751674879Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:39:13.751678456Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.751685156Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T19:39:13.751689224Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751695869Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751699432Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:39:13.751706436Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:13.751709977Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:13.751716578Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:13.751720095Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:39:13.751735446Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751739495Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751747559Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.751755502Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752086799Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752094632Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752098235Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.75210186Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T19:39:13.752106445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.752109926Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:39:13.752121546Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.752124839Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:39:13.75213357Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752143584Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752146798Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:39:13.75215613Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:13.752159885Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:13.752168055Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:13.752171447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:39:13.75217486Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752195046Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752200195Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752203416Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:39:13.752210468Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752214265Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752220834Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.752224581Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:39:13.752231026Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:39:13.752657083Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.752671298Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:39:13.752689488Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752693396Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752705885Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:39:13.752713427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:13.752717352Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:13.752721062Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:13.752727792Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:39:13.752731792Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752739303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752742802Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752746115Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752749708Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752753234Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.752756798Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.752760188Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T19:39:13.752767963Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.752771611Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T19:39:13.752778845Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T19:39:13.752782822Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.752786127Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:39:13.752792707Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:39:13.752796094Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753089053Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T19:39:13.753100434Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753103933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T19:39:13.753107651Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753111253Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T19:39:13.753114331Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753117625Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T19:39:13.753120757Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753124158Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T19:39:13.753131367Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.7531353Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.753138187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753141243Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753152018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T19:39:13.753156402Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.75315961Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753162822Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T19:39:13.753166293Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753169369Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753176333Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T19:39:13.753179602Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T19:39:13.753186107Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.75318967Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753196Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T19:39:13.753200292Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753720828Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753729061Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:39:13.753731998Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753734629Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.nri.v1.nri\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753744657Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable = true\r\n"} +{"Time":"2023-05-31T19:39:13.753747957Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" disable_connections = false\r\n"} +{"Time":"2023-05-31T19:39:13.75375211Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" plugin_config_path = \"/etc/nri/conf.d\"\r\n"} +{"Time":"2023-05-31T19:39:13.75375549Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" plugin_path = \"/opt/nri/plugins\"\r\n"} +{"Time":"2023-05-31T19:39:13.753758647Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" plugin_registration_timeout = \"5s\"\r\n"} +{"Time":"2023-05-31T19:39:13.753762127Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" plugin_request_timeout = \"2s\"\r\n"} +{"Time":"2023-05-31T19:39:13.753770732Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" socket_path = \"/var/run/nri/nri.sock\"\r\n"} +{"Time":"2023-05-31T19:39:13.753773815Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753776691Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753779518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T19:39:13.753786101Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.753789274Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.753792214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T19:39:13.753795121Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T19:39:13.753797897Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.75380069Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753803782Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753810707Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T19:39:13.753813714Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.753816589Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:39:13.753822478Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:39:13.754343969Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.75435859Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T19:39:13.754367636Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754384229Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.7543926Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.754400997Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T19:39:13.754409801Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754418661Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.754426656Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T19:39:13.754434882Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754444679Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.754452867Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T19:39:13.754461474Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T19:39:13.754469874Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754478327Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T19:39:13.754486933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754495673Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754504494Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.75451948Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754528905Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.754537266Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T19:39:13.754545708Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754554692Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.754563801Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T19:39:13.754572116Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.754580546Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T19:39:13.754973171Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.754988571Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T19:39:13.754998483Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.755007996Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.755016916Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T19:39:13.75502666Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.755035838Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T19:39:13.755045735Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.755055075Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.755063875Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [plugins.\"io.containerd.transfer.v1.local\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755077617Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.755087452Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:39:13.755096769Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" max_concurrent_uploaded_layers = 3\r\n"} +{"Time":"2023-05-31T19:39:13.755105783Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.755114675Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [[plugins.\"io.containerd.transfer.v1.local\".unpack_config]]\r\n"} +{"Time":"2023-05-31T19:39:13.755127682Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" differ = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.75513694Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" platform = \"linux/amd64\"\r\n"} +{"Time":"2023-05-31T19:39:13.755146292Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:39:13.755155118Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.755170278Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T19:39:13.755182282Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.755192079Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T19:39:13.755201293Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.755210703Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755220004Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755525424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755540658Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755550477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:39:13.755559899Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T19:39:13.755569192Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.755578339Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755587537Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755596255Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755605092Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:39:13.755614038Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:39:13.755623581Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T19:39:13.755632528Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.75564172Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T19:39:13.755650834Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T19:39:13.755660424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.metrics.shimstats\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:39:13.755670255Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:39:13.755679408Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:39:13.755689081Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T19:39:13.755703786Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:39:13.755713255Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.755722571Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T19:39:13.755732569Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.756207183Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.756222491Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:39:13.756231854Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.756240451Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.756250164Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:39:13.756260153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ● crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:39:13.756270213Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Loaded: loaded (\u001b]8;;file://custom-flannel-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:39:13.756280477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Active: inactive (dead) since Wed 2023-05-31 19:37:57 UTC; 1min 15s ago\r\n"} +{"Time":"2023-05-31T19:39:13.75629057Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:39:13.756300752Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Main PID: 375 (code=exited, status=0/SUCCESS)\r\n"} +{"Time":"2023-05-31T19:39:13.756310572Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.756319849Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:54 custom-flannel-509041 crio[375]: time=\"2023-05-31 19:37:54.647267997Z\" level=debug msg=\"backingFs=extfs, projectQuotaSupported=false, useNativeDiff=false, usingMetacopy=true\" file=\"overlay/overlay.go:400\"\r\n"} +{"Time":"2023-05-31T19:39:13.756329783Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:54 custom-flannel-509041 crio[375]: time=\"2023-05-31 19:37:54.654551357Z\" level=debug msg=\"Closed http server\" file=\"crio/main.go:353\"\r\n"} +{"Time":"2023-05-31T19:39:13.756339709Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:54 custom-flannel-509041 crio[375]: time=\"2023-05-31 19:37:54.655797088Z\" level=debug msg=\"Closing exit monitor...\" file=\"server/server.go:693\"\r\n"} +{"Time":"2023-05-31T19:39:13.756357514Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:54 custom-flannel-509041 crio[375]: time=\"2023-05-31 19:37:54.658908018Z\" level=debug msg=\"hook monitoring canceled: context canceled\" file=\"hooks/monitor.go:60\"\r\n"} +{"Time":"2023-05-31T19:39:13.756380614Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:57 custom-flannel-509041 crio[375]: time=\"2023-05-31 19:37:57.138739780Z\" level=debug msg=\"Closed stream server\" file=\"crio/main.go:383\"\r\n"} +{"Time":"2023-05-31T19:39:13.756390811Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:57 custom-flannel-509041 crio[375]: time=\"2023-05-31 19:37:57.138862232Z\" level=debug msg=\"Closed monitors\" file=\"crio/main.go:385\"\r\n"} +{"Time":"2023-05-31T19:39:13.756400723Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:57 custom-flannel-509041 crio[375]: time=\"2023-05-31 19:37:57.138931802Z\" level=debug msg=\"Closed hook monitor\" file=\"crio/main.go:388\"\r\n"} +{"Time":"2023-05-31T19:39:13.757022541Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:57 custom-flannel-509041 crio[375]: time=\"2023-05-31 19:37:57.138993268Z\" level=debug msg=\"Closed main server\" file=\"crio/main.go:393\"\r\n"} +{"Time":"2023-05-31T19:39:13.757039641Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:57 custom-flannel-509041 systemd[1]: crio.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:39:13.757049925Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" May 31 19:37:57 custom-flannel-509041 systemd[1]: Stopped Container Runtime Interface for OCI (CRI-O).\r\n"} +{"Time":"2023-05-31T19:39:13.757059924Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:39:13.757069411Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.757078669Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.757087856Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:39:13.757097652Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://custom-flannel-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:39:13.757107832Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:39:13.757117447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:39:13.757126816Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T19:39:13.757136797Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:39:13.757146534Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:13.757155951Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:39:13.757165359Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" After=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:39:13.75717477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Requires=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:39:13.757183774Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.757192512Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:39:13.75720186Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:39:13.757210876Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=-/etc/sysconfig/crio\r\n"} +{"Time":"2023-05-31T19:39:13.757220058Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=-/etc/sysconfig/crio.minikube\r\n"} +{"Time":"2023-05-31T19:39:13.757229207Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:39:13.757822206Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:39:13.757837787Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T19:39:13.757847556Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CRIO_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:39:13.757856583Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" $CRIO_MINIKUBE_OPTIONS\r\n"} +{"Time":"2023-05-31T19:39:13.75786577Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:39:13.757879992Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:39:13.757889343Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:39:13.757898876Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T19:39:13.757908356Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:39:13.757917414Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T19:39:13.757926487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:39:13.757935464Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:39:13.757945099Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.757954214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:39:13.757963261Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:39:13.757972796Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.757982304Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.757991008Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:39:13.758000343Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T19:39:13.758009335Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:39:13.758018383Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:39:13.758081929Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:39:13.758094086Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.758103652Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:39:13.75811295Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.759515783Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:39:13.759535014Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:39:13.759547186Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:39:13.759558149Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:39:13.759569265Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.759580316Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:39:13.759591548Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:39:13.759603746Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:39:13.759614827Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:39:13.759625675Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:39:13.759636157Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.759650559Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:39:13.759662042Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:39:13.759674139Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:39:13.759685289Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.759696362Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:39:13.759707509Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:39:13.759718427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.759729216Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:39:13.759739652Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:39:13.759756031Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:39:13.759771342Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.759782012Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:39:13.761117888Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:39:13.761136224Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:39:13.761147524Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:39:13.761158628Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.761169253Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.761179869Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:39:13.761190637Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:39:13.761200963Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:39:13.761211369Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.761222259Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:39:13.761232887Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:39:13.76124322Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:39:13.761261464Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:39:13.761272737Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.761283178Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:39:13.761301517Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:39:13.761310651Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:39:13.761319807Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:39:13.761328641Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.761337385Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:39:13.761346262Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:39:13.76135489Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.761363818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:39:13.762658601Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:39:13.762677141Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.762688529Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:39:13.762699328Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:39:13.762709984Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.762730921Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:39:13.762743317Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:39:13.762753992Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:39:13.762764842Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.762775269Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:39:13.762785302Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:39:13.762795477Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.762805762Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:39:13.762821232Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:39:13.762832241Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:39:13.762842564Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.762853121Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.76286378Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:39:13.762874399Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:39:13.762884896Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.762895336Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.762905973Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:39:13.76291705Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:39:13.762927945Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:39:13.764163585Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.764185421Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.76419557Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:39:13.764205438Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:13.764214621Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.764224009Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:39:13.764233732Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:13.764242998Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.764252353Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:39:13.764261748Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:39:13.764270925Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:39:13.764279519Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.764288437Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:39:13.764297765Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:39:13.764307646Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:39:13.764316611Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:39:13.764325852Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:39:13.764334938Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #]\r\n"} +{"Time":"2023-05-31T19:39:13.76434368Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.764352641Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:39:13.764361819Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:39:13.764370795Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.76437982Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:39:13.765599812Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.765615524Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:39:13.765625495Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.765634991Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:39:13.765644344Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:39:13.765654028Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:39:13.765663895Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.765673284Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:39:13.765682635Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:39:13.765697Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.765706471Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:39:13.765715728Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:39:13.765724741Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:39:13.765733925Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:39:13.76574325Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.765758351Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.765767494Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:39:13.765776777Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:39:13.765785494Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:39:13.765796992Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_env = [\r\n"} +{"Time":"2023-05-31T19:39:13.765806067Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.765814641Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.765828664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:39:13.765837575Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" selinux = false\r\n"} +{"Time":"2023-05-31T19:39:13.767031749Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.767050425Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:39:13.767062651Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:39:13.767084298Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.767099746Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.767111902Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.767122568Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:39:13.76713365Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:39:13.767144608Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:39:13.767155571Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:39:13.76716651Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:39:13.767177207Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.76718803Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:39:13.767198935Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:39:13.767209942Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:39:13.767220894Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:39:13.767233592Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.767244454Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:39:13.767255071Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.767265594Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:39:13.767276324Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:39:13.767287362Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.767298118Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:39:13.768452817Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.768470365Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.768485641Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:39:13.768504545Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:39:13.768524915Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:39:13.768536044Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:39:13.768559181Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:39:13.768571264Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:39:13.76858228Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:39:13.768593014Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:39:13.768607003Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:39:13.768617251Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:39:13.768628019Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:39:13.768643634Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:39:13.768654432Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:39:13.768664893Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.768675409Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.76868585Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:39:13.768697565Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:39:13.768710487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:39:13.768720918Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.768731391Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.768741761Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:39:13.768752373Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:39:13.768763958Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:39:13.770551903Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:39:13.770569787Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" additional_devices = [\r\n"} +{"Time":"2023-05-31T19:39:13.770581023Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.77059175Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.770602513Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:39:13.770613664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:39:13.770624279Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:39:13.770634964Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:39:13.770645626Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.770655898Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.770666706Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:39:13.770677451Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:39:13.770687996Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:39:13.77070824Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.77071743Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:39:13.770726745Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:39:13.770735878Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:39:13.770752408Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.770761684Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:39:13.770770907Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:39:13.770780195Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:39:13.770789642Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:39:13.772050553Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.772067078Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.772077438Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.772086789Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:39:13.772096271Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:39:13.772105421Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.772114675Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:39:13.772123783Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:39:13.772148018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:39:13.772157527Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # limit is never exceeded.\r\n"} +{"Time":"2023-05-31T19:39:13.772170124Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:39:13.772179955Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.772188864Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Whether container output should be logged to journald in addition to the kubernetes log file\r\n"} +{"Time":"2023-05-31T19:39:13.77219824Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:39:13.772206977Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.772216262Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:39:13.772225414Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:39:13.772237083Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.772253575Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:39:13.772265308Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:39:13.772274743Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.772283838Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:39:13.772292933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.772301933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.773335754Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:39:13.773352205Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" read_only = false\r\n"} +{"Time":"2023-05-31T19:39:13.773361988Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.773371317Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:39:13.773380891Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:39:13.773390515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.773399794Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:39:13.77340867Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.773417633Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:39:13.773426527Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.773435313Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.773444311Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.773453548Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:39:13.773462596Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:39:13.773477864Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:39:13.773486931Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.773496017Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.77350489Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:39:13.773523787Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:39:13.773534344Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:39:13.773543345Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.773567793Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.773576765Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:39:13.773585522Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:39:13.774759869Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:39:13.774769229Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:39:13.774773008Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.774776453Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # manage_ns_lifecycle determines whether we pin and remove namespaces\r\n"} +{"Time":"2023-05-31T19:39:13.774779427Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # and manage their lifecycle.\r\n"} +{"Time":"2023-05-31T19:39:13.774789021Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is being deprecated, and will be unconditionally true in the future.\r\n"} +{"Time":"2023-05-31T19:39:13.774792707Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" manage_ns_lifecycle = true\r\n"} +{"Time":"2023-05-31T19:39:13.774795938Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.774799317Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:39:13.774802722Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:39:13.77480595Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:39:13.774809421Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:39:13.774812858Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:39:13.774815933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.774819325Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:39:13.774822729Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:39:13.774826125Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:39:13.774829552Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.774833033Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:39:13.774836583Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:39:13.774840869Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.774844257Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:39:13.774847902Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:39:13.775888706Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:39:13.775898872Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.775903268Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.775907281Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:39:13.775911444Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The runtime to use is picked based on the runtime_handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:39:13.775915367Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If no runtime_handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:39:13.775919366Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:39:13.775923047Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.775926762Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:39:13.775930954Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:39:13.775934713Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:39:13.775938612Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:39:13.7759424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:13.775946119Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:13.775949714Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:39:13.775953441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:39:13.775957317Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:39:13.775961495Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:39:13.775969644Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:39:13.775974009Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:39:13.775977784Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:39:13.775981789Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:39:13.777047587Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:39:13.777057766Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:39:13.777062085Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:39:13.777066674Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:39:13.777071141Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:39:13.777075187Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:39:13.777079079Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:39:13.777083135Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:39:13.777087341Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:39:13.777091522Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:39:13.777098224Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.777102834Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.777106962Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:39:13.777111056Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.777115209Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:39:13.777119247Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.777123291Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.777126896Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.777130501Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.777134204Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.777138094Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:39:13.777141918Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:39:13.777145841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:39:13.778354959Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.778379549Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:39:13.778384454Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:39:13.778389349Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:39:13.778393413Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.778397637Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:39:13.778401549Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:39:13.778405657Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.778409582Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:39:13.778413415Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:39:13.778417075Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.778420901Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:39:13.778424715Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:39:13.778428439Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.778432323Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:39:13.778436367Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.778443271Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:39:13.778447357Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:39:13.778451217Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:39:13.778455369Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:39:13.778459479Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:39:13.778463523Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:39:13.778467666Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.7797957Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:39:13.779805027Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:39:13.779808859Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.779812494Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:39:13.779816598Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:39:13.77982009Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.77982363Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.779827006Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:39:13.779830499Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.779833999Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:39:13.779837467Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.779840843Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:39:13.779844763Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:39:13.779848415Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.779852097Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.77985578Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.779859309Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:39:13.779862771Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:39:13.779866374Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:39:13.779873284Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.779876924Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:39:13.779880396Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.779883845Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:39:13.781734673Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:39:13.7817476Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:39:13.78175141Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:39:13.781755405Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:39:13.781759165Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.781764445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.781768073Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:39:13.781771753Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:39:13.781776555Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:39:13.781780152Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #insecure_registries = \"[]\"\r\n"} +{"Time":"2023-05-31T19:39:13.781783838Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.781787326Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:39:13.781790822Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:39:13.781794245Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:39:13.781797507Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.781800912Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:39:13.781804295Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.781807801Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.78181141Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:39:13.781814472Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:39:13.781817715Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:39:13.781820889Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.781823874Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:39:13.783729371Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:39:13.783742949Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.783748012Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.78375247Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:39:13.783756636Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:39:13.783760565Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.783764665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:39:13.783768719Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:39:13.783772665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:39:13.783776664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.783780602Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.783784531Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:39:13.783788332Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:39:13.783792002Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.783795963Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:39:13.783800491Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:39:13.783804242Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.783808111Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:39:13.783811841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:39:13.783815518Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.783819252Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:39:13.783823062Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.78382694Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T19:39:13.783830805Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:39:13.783837735Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.785551643Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.785562013Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:39:13.785566496Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.785570576Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.785574303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:39:13.785578387Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.785582166Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.785586053Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.785589836Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:39:13.785594517Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:39:13.674110726Z] Starting CRI-O, version: 1.24.1, git: a3bbde8a77c323aa6a485da9a9046299155c6016(dirty) \r\n"} +{"Time":"2023-05-31T19:39:13.785599317Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T19:39:13.785603978Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:39:13.785608155Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:39:13.785612535Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:39:13.785616505Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.785620409Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:39:13.785624133Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.78562821Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:39:13.78563232Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:39:13.785636444Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:39:13.785640666Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:39:13.785644463Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.785648707Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:39:13.786630612Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:39:13.786640402Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:39:13.786644697Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:39:13.786648989Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:39:13.786653282Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.786657531Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:39:13.786667501Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:39:13.786672012Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:39:13.786680767Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.786685374Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:39:13.786689713Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:39:13.786693536Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.786697738Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:39:13.786702589Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:39:13.786706821Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:39:13.786711177Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.786715103Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:39:13.786722324Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:39:13.786726336Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:39:13.786730267Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:39:13.786734203Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.786737883Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.786742544Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:39:13.787915012Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:39:13.787925372Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:39:13.787929962Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.787934198Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:39:13.787938745Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:39:13.787942473Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:39:13.787946345Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:39:13.787950325Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.787954373Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:39:13.787958566Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:39:13.787962561Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:39:13.78796666Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:39:13.787970554Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.787974534Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T19:39:13.78797891Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T19:39:13.787983393Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T19:39:13.787998676Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.788004553Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T19:39:13.788008515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T19:39:13.788013182Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T19:39:13.788017417Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T19:39:13.788021297Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.789070137Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:39:13.789079833Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:39:13.789083614Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.78908727Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:39:13.789090683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:39:13.789094018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.789097421Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:39:13.789100615Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:39:13.789103893Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.789107608Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:39:13.789111671Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:39:13.789114997Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:39:13.789118216Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.789121611Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:39:13.789124938Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:39:13.789128168Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.789131497Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T19:39:13.789135037Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.789138818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.789142258Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:39:13.789146063Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:39:13.78914946Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:39:13.789152922Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.789156047Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.7891593Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:39:13.790189708Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:39:13.790199313Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.790202993Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.790206839Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:39:13.790210538Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:39:13.790214323Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:39:13.790217815Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.790221565Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.790225134Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:39:13.790229016Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:13.790232449Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.790235955Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:39:13.790239693Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:39:13.790243263Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.790246671Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:39:13.790250316Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:39:13.790253756Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:39:13.790257261Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.790260928Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:39:13.790264366Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:39:13.790268493Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:39:13.790272118Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:39:13.791261882Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:39:13.791271353Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.791275732Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.791283234Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:39:13.791287811Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T19:39:13.791291766Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.791295854Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:39:13.791300047Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.79130424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:39:13.791308195Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.79131256Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:39:13.791317494Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:39:13.791322275Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:39:13.791326385Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:39:13.791330535Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.79133445Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:39:13.791338735Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T19:39:13.791343167Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:39:13.791347128Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.791351012Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:39:13.791355197Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:39:13.791359447Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:39:13.791363444Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:39:13.792415091Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:39:13.792425366Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:39:13.792429729Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.792433919Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:39:13.792438171Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:39:13.792442331Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:39:13.792446269Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T19:39:13.792450646Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.792454581Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.792458588Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:39:13.792463008Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T19:39:13.792466892Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.792471174Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:39:13.79247549Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:39:13.792479379Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.792483517Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.79248746Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.792491617Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:39:13.792495804Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:39:13.792499922Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:39:13.792503946Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:39:13.792517015Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:39:13.792521424Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.792525664Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:39:13.793531567Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:39:13.793542243Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:39:13.793549701Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:39:13.793554158Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.793558501Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:39:13.793562632Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.793566782Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T19:39:13.793570926Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T19:39:13.79357466Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.793578455Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.793582231Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T19:39:13.793586197Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T19:39:13.793590133Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T19:39:13.793593441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.793596771Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T19:39:13.79360035Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.793604002Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.793607651Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.793611613Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:39:13.793617727Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:39:13.793621798Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.793625583Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:39:13.793629683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.79464322Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.79465291Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:39:13.794657655Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:39:13.79466233Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:39:13.794666725Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:39:13.794671144Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:39:13.794675362Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:39:13.794679602Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:39:13.794683574Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:39:13.79468742Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:39:13.794691162Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:39:13.794695001Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:39:13.794699126Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:39:13.794703206Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:39:13.794707112Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.794710933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.794715164Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:39:13.794733036Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:39:13.794737996Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:39:13.794741926Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.794745864Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.794749559Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T19:39:13.794753815Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T19:39:13.794758011Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T19:39:13.794761995Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T19:39:13.79580995Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.795820311Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.795825278Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:39:13.795834257Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:39:13.7958408Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:39:13.795845297Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:39:13.795850103Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T19:39:13.795854137Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.795857886Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.795861671Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T19:39:13.795865783Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T19:39:13.795869575Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T19:39:13.795873483Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T19:39:13.79587738Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.795881058Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.795884944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T19:39:13.795889127Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T19:39:13.795893112Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T19:39:13.795897078Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:39:13.795900866Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.795904778Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:39:13.79590902Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:39:13.795912947Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:39:13.795918405Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:39:13.797046464Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.797060859Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.797065627Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:39:13.79707022Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:39:13.797074589Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:39:13.79707859Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.797083151Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:39:13.797087647Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:39:13.797091841Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:39:13.797101315Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.797106328Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:39:13.797110648Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:39:13.797114772Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:39:13.797118791Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:39:13.797122989Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.797126728Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.797131206Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.797135234Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:39:13.797139468Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T19:39:13.797143515Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:39:13.797147384Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.797151371Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:39:13.797155689Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:39:13.798258724Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:39:13.798269147Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T19:39:13.798274004Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:39:13.798278734Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.798283899Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T19:39:13.798288226Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:39:13.798292056Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.798295849Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:39:13.798300069Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:39:13.798306792Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.798310808Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:39:13.798314779Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:39:13.798318944Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.798322889Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:39:13.798326912Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.798330773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.798334597Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:39:13.79833867Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T19:39:13.798342223Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.79834591Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:39:13.79835013Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:39:13.798355632Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.79836364Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:39:13.799640814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.799650886Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:39:13.799655303Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.799659412Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.799663398Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.799667491Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:39:13.799671453Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:39:13.799675844Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:39:13.799679557Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.799683451Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.799687292Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:39:13.799691433Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:39:13.799695326Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:39:13.799699108Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.799702908Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.799706763Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T19:39:13.799711226Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:39:13.799715878Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:39:13.79971984Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T19:39:13.79972352Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.799727347Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T19:39:13.799731416Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:39:13.799735415Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:39:13.80073214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T19:39:13.800741818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.800746392Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:39:13.800750663Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:39:13.800755142Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:39:13.80075897Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:39:13.800762923Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.800766774Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:39:13.800770634Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:39:13.800774699Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:39:13.800778795Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:39:13.800782757Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:39:13.800786534Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.800790469Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T19:39:13.80079486Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T19:39:13.800799073Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T19:39:13.800803358Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.800807399Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.800811292Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:39:13.800815513Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:39:13.80081943Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:39:13.800823214Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.800827248Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:39:13.801802951Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:39:13.801812805Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.801817349Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:39:13.801821876Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:39:13.801826371Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:39:13.8018306Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.801834936Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.801839315Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T19:39:13.801843764Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T19:39:13.80185221Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T19:39:13.801856989Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T19:39:13.801861526Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T19:39:13.801866075Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T19:39:13.801870553Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T19:39:13.801874703Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.801878657Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.801882946Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:39:13.801887439Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:39:13.801891872Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:39:13.801896189Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:39:13.801900289Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.802786925Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:39:13.80279665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:39:13.802801255Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:39:13.802805037Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:39:13.802808724Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:39:13.802812256Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:39:13.802815567Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:39:13.802819212Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:39:13.802822882Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:39:13.802826527Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:39:13.802830164Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:39:13.802834183Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:39:13.802837718Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:39:13.802842259Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:39:13.802845874Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:39:13.802849311Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:39:13.802853115Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T19:39:13.802856856Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T19:39:13.802861773Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:39:13.802865456Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:39:13.802869136Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:39:13.802874621Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:39:13.803904059Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:39:13.803914818Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:39:13.803919871Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T19:39:13.80392457Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:39:13.803929118Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:39:13.803933331Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T19:39:13.803937942Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T19:39:13.803942277Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T19:39:13.803947071Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T19:39:13.803951379Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T19:39:13.803955629Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.803959465Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.803963409Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:39:13.803967651Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.803971883Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:39:13.803975893Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:39:13.803979941Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.803983953Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.80398765Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.803991227Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.803994892Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.803998685Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.805057692Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.805081599Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.805086474Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.805090535Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:39:13.805095105Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:39:13.805099274Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:39:13.805103038Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.805107154Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:39:13.805111529Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:39:13.805115934Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:39:13.805119804Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.805123688Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:39:13.805130733Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:39:13.805134715Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.805138529Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:39:13.805144894Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:39:13.805149233Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.805153066Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:39:13.805156743Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:39:13.805160705Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.805164756Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T19:39:13.805169118Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T19:39:13.805172933Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T19:39:13.805177123Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T19:39:13.806124066Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T19:39:13.806134352Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T19:39:13.806138433Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T19:39:13.806142375Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T19:39:13.806146389Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T19:39:13.806150171Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T19:39:13.806153718Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Example:\r\n"} +{"Time":"2023-05-31T19:39:13.806157301Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T19:39:13.806160859Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T19:39:13.806164333Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T19:39:13.806167863Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T19:39:13.806171153Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T19:39:13.806174719Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T19:39:13.80617874Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:39:13.806182675Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T19:39:13.806186542Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T19:39:13.80619047Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T19:39:13.806194018Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T19:39:13.80619833Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T19:39:13.806202355Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T19:39:13.807198894Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \r\n"} +{"Time":"2023-05-31T19:39:13.807208918Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.807213377Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:39:13.807217139Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:39:13.807229307Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:39:13.807233291Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:39:13.807236906Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:39:13.807240666Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:39:13.807244412Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:39:13.807248279Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:39:13.807251952Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.807255356Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:39:13.807258985Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:39:13.807262805Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.807266114Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:39:13.807269484Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:39:13.807272858Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.807276038Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.807279235Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:39:13.807282388Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.807285811Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:39:13.807289291Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.807292555Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:39:13.808396144Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:39:13.808407366Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.808412022Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.808416507Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.808420625Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:39:13.808424631Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:39:13.80842855Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:39:13.80843233Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:39:13.808436827Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:39:13.808441361Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.808445311Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:39:13.808449625Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:39:13.808465834Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:39:13.808469638Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:39:13.808473361Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:39:13.80847714Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.808480723Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.808484308Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:39:13.808487884Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:39:13.808493156Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:39:13.808496493Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T19:39:13.808499757Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.809471787Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.809491428Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:39:13.809495772Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:39:13.809499973Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:39:13.809503633Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.80950732Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:39:13.809519737Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.809523313Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.809527051Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:39:13.809531073Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:39:13.809534384Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:39:13.809538063Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.809541392Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:39:13.809547699Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:39:13.80955131Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.809554502Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.809558034Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:39:13.809561627Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:39:13.809565044Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.809568337Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:39:13.809571786Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:39:13.809575159Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:39:13.809578829Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.809581979Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.809585324Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:39:13.81041745Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:39:13.810426814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.810430781Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:39:13.810434221Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:39:13.810437163Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.810440208Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T19:39:13.81044403Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T19:39:13.810447487Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T19:39:13.810451359Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T19:39:13.810454982Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T19:39:13.81045872Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T19:39:13.810465039Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T19:39:13.810468665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.810472646Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T19:39:13.810476065Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T19:39:13.810479615Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T19:39:13.810483222Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T19:39:13.810487765Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T19:39:13.810491343Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T19:39:13.810494665Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T19:39:13.810498014Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T19:39:13.810501458Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T19:39:13.810504756Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.810516616Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T19:39:13.811517309Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T19:39:13.811527533Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811531658Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T19:39:13.811535516Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811539027Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811542634Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811546386Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811549389Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811552314Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811556669Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811560346Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T19:39:13.811563686Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:39:13.811570699Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:39:13.811574436Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:39:13.811577845Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.811581152Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:39:13.811584661Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.811588166Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.811591549Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:39:13.811595038Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T19:39:13.811598866Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T19:39:13.811602596Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T19:39:13.811608928Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.811612343Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.812614624Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:39:13.812624394Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T19:39:13.812628288Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T19:39:13.812632068Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.812635492Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T19:39:13.812639Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T19:39:13.812642225Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.812645547Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T19:39:13.812649275Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T19:39:13.812652735Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.81265609Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T19:39:13.812662415Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T19:39:13.812666102Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.812669366Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T19:39:13.812673168Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T19:39:13.812690667Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.812694244Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T19:39:13.812697785Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T19:39:13.81270123Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.812705968Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T19:39:13.81271088Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T19:39:13.812714499Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T19:39:13.812717746Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:39:13.81272169Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T19:39:13.812725345Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ----------------------- debugLogs end: custom-flannel-509041 [took: 15.493490507s] --------------------------------\n"} +{"Time":"2023-05-31T19:39:13.813617415Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:175: Cleaning up \"custom-flannel-509041\" profile ...\n"} +{"Time":"2023-05-31T19:39:13.813627455Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p custom-flannel-509041\n"} +{"Time":"2023-05-31T19:39:14.870710712Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p custom-flannel-509041: (1.12468631s)\n"} +{"Time":"2023-05-31T19:39:14.870747207Z","Action":"cont","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T19:39:14.870755853Z","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== CONT TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T19:39:14.870762226Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial"} +{"Time":"2023-05-31T19:39:14.870765403Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":"=== RUN TestStartStop/group/old-k8s-version/serial\n"} +{"Time":"2023-05-31T19:39:14.870792526Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart"} +{"Time":"2023-05-31T19:39:14.870799017Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/FirstStart\n"} +{"Time":"2023-05-31T19:39:14.87085135Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-linux-amd64 start -p old-k8s-version-709650 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T19:39:32.701629425Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-linux-amd64 start -p bridge-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=bridge --driver=kvm2 --container-runtime=containerd: (2m0.263010701s)\n"} +{"Time":"2023-05-31T19:39:32.701658786Z","Action":"run","Test":"TestNetworkPlugins/group/bridge/KubeletFlags"} +{"Time":"2023-05-31T19:39:32.70166314Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/bridge/KubeletFlags\n"} +{"Time":"2023-05-31T19:39:32.701669121Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-linux-amd64 ssh -p bridge-509041 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T19:39:32.93129466Z","Action":"run","Test":"TestNetworkPlugins/group/bridge/NetCatPod"} +{"Time":"2023-05-31T19:39:32.931325085Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/bridge/NetCatPod\n"} +{"Time":"2023-05-31T19:39:32.931337771Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context bridge-509041 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T19:39:33.350044691Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/bridge/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:39:33.35432964Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-8d2jb\" [7d43d3cb-7470-41d6-9a82-e53d6c3f2802] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T19:39:40.359298811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-8d2jb\" [7d43d3cb-7470-41d6-9a82-e53d6c3f2802] Running\n"} +{"Time":"2023-05-31T19:39:41.457053115Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-linux-amd64 start -p flannel-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=flannel --driver=kvm2 --container-runtime=containerd: (2m3.034498333s)\n"} +{"Time":"2023-05-31T19:39:41.457086686Z","Action":"run","Test":"TestNetworkPlugins/group/flannel/ControllerPod"} +{"Time":"2023-05-31T19:39:41.457092621Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":"=== RUN TestNetworkPlugins/group/flannel/ControllerPod\n"} +{"Time":"2023-05-31T19:39:41.458971194Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/flannel/ControllerPod: waiting 10m0s for pods matching \"app=flannel\" in namespace \"kube-flannel\" ...\n"} +{"Time":"2023-05-31T19:39:41.469545302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":" helpers_test.go:344: \"kube-flannel-ds-dwcpl\" [4ff09468-aaf5-4ac5-8f95-9d667b140b39] Running\n"} +{"Time":"2023-05-31T19:39:45.359788102Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/bridge/NetCatPod: app=netcat healthy within 12.00975995s\n"} +{"Time":"2023-05-31T19:39:45.359814622Z","Action":"run","Test":"TestNetworkPlugins/group/bridge/DNS"} +{"Time":"2023-05-31T19:39:45.359818743Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/DNS","Output":"=== RUN TestNetworkPlugins/group/bridge/DNS\n"} +{"Time":"2023-05-31T19:39:45.359857651Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context bridge-509041 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:39:45.549139033Z","Action":"run","Test":"TestNetworkPlugins/group/bridge/Localhost"} +{"Time":"2023-05-31T19:39:45.549167124Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/Localhost","Output":"=== RUN TestNetworkPlugins/group/bridge/Localhost\n"} +{"Time":"2023-05-31T19:39:45.549177676Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context bridge-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T19:39:45.696232845Z","Action":"run","Test":"TestNetworkPlugins/group/bridge/HairPin"} +{"Time":"2023-05-31T19:39:45.696260178Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/HairPin","Output":"=== RUN TestNetworkPlugins/group/bridge/HairPin\n"} +{"Time":"2023-05-31T19:39:45.696478056Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context bridge-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T19:39:45.84761804Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" net_test.go:209: \"bridge\" test finished in 4m59.329434248s, failed=false\n"} +{"Time":"2023-05-31T19:39:46.474289964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":" net_test.go:119: (dbg) TestNetworkPlugins/group/flannel/ControllerPod: app=flannel healthy within 5.015299107s\n"} +{"Time":"2023-05-31T19:39:46.474319662Z","Action":"run","Test":"TestNetworkPlugins/group/flannel/KubeletFlags"} +{"Time":"2023-05-31T19:39:46.474323845Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/flannel/KubeletFlags\n"} +{"Time":"2023-05-31T19:39:46.474329273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-linux-amd64 ssh -p flannel-509041 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T19:39:46.671026294Z","Action":"run","Test":"TestNetworkPlugins/group/flannel/NetCatPod"} +{"Time":"2023-05-31T19:39:46.671056477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/flannel/NetCatPod\n"} +{"Time":"2023-05-31T19:39:46.671065982Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context flannel-509041 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T19:39:47.061444485Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/flannel/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:39:47.064686435Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-gqs6x\" [392b034e-49c8-452d-b229-d9dcac54ed1e] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T19:39:51.068818242Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-gqs6x\" [392b034e-49c8-452d-b229-d9dcac54ed1e] Running\n"} +{"Time":"2023-05-31T19:39:56.069331141Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/flannel/NetCatPod: app=netcat healthy within 9.007998974s\n"} +{"Time":"2023-05-31T19:39:56.069358278Z","Action":"run","Test":"TestNetworkPlugins/group/flannel/DNS"} +{"Time":"2023-05-31T19:39:56.069362137Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/DNS","Output":"=== RUN TestNetworkPlugins/group/flannel/DNS\n"} +{"Time":"2023-05-31T19:39:56.069376424Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context flannel-509041 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:39:56.224582583Z","Action":"run","Test":"TestNetworkPlugins/group/flannel/Localhost"} +{"Time":"2023-05-31T19:39:56.224614498Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/Localhost","Output":"=== RUN TestNetworkPlugins/group/flannel/Localhost\n"} +{"Time":"2023-05-31T19:39:56.224811513Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context flannel-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T19:39:56.394659039Z","Action":"run","Test":"TestNetworkPlugins/group/flannel/HairPin"} +{"Time":"2023-05-31T19:39:56.394688488Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/HairPin","Output":"=== RUN TestNetworkPlugins/group/flannel/HairPin\n"} +{"Time":"2023-05-31T19:39:56.394709141Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context flannel-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T19:39:56.547967126Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net_test.go:209: \"flannel\" test finished in 5m10.029713178s, failed=false\n"} +{"Time":"2023-05-31T19:40:00.403286721Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T19:40:00.403316991Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ----------------------- debugLogs start: bridge-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:40:00.403322555Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:40:00.403327077Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T19:40:00.403330522Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T19:40:00.403335355Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403338953Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:40:00.40334287Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T19:40:00.403353137Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40335622Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403359507Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403362533Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:40:00.40336738Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T19:40:00.403370567Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40337344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40337653Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:40:00.403379952Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T19:40:00.403382956Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403385794Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403389096Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:40:00.403392791Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:40:00.40339628Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T19:40:00.403399259Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40340221Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403405217Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:40:00.403409344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T19:40:00.403412739Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T19:40:00.403415819Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T19:40:00.403419486Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T19:40:00.403422656Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T19:40:00.403425722Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T19:40:00.403428955Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T19:40:00.403433293Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 10.244.0.3\tnetcat-7458db8b8-8d2jb\n"} +{"Time":"2023-05-31T19:40:00.403436563Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403439327Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403442155Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:40:00.403445714Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T19:40:00.403449336Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T19:40:00.403452493Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" options ndots:5\n"} +{"Time":"2023-05-31T19:40:00.403459366Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403462333Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403465263Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:40:00.403468628Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T19:40:00.403471903Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.403475106Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" passwd: files mymachines systemd\r\n"} +{"Time":"2023-05-31T19:40:00.403478503Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" group: files [SUCCESS=merge] mymachines [SUCCESS=merge] systemd\r\n"} +{"Time":"2023-05-31T19:40:00.403482616Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T19:40:00.403485778Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.40348906Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname\r\n"} +{"Time":"2023-05-31T19:40:00.40349228Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" networks: files dns\r\n"} +{"Time":"2023-05-31T19:40:00.403495121Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.40349802Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" protocols: files\r\n"} +{"Time":"2023-05-31T19:40:00.403501471Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" services: files\r\n"} +{"Time":"2023-05-31T19:40:00.403504383Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ethers: files\r\n"} +{"Time":"2023-05-31T19:40:00.403507242Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rpc: files\r\n"} +{"Time":"2023-05-31T19:40:00.403510687Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40351347Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403516544Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:40:00.403519763Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T19:40:00.403523617Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 127.0.1.1 bridge-509041\r\n"} +{"Time":"2023-05-31T19:40:00.40352676Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.50.1\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T19:40:00.40353004Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.50.84\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T19:40:00.40353304Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403535725Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40353885Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:40:00.403542087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This is /run/systemd/resolve/resolv.conf managed by man:systemd-resolved(8).\r\n"} +{"Time":"2023-05-31T19:40:00.403546209Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Do not edit.\r\n"} +{"Time":"2023-05-31T19:40:00.403549279Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.403552563Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This file might be symlinked as /etc/resolv.conf. If you're looking at\r\n"} +{"Time":"2023-05-31T19:40:00.403555974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # /etc/resolv.conf and seeing this text, you have followed the symlink.\r\n"} +{"Time":"2023-05-31T19:40:00.403559114Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.403562177Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This is a dynamic resolv.conf file for connecting local clients directly to\r\n"} +{"Time":"2023-05-31T19:40:00.403565522Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # all known uplink DNS servers. This file lists all configured search domains.\r\n"} +{"Time":"2023-05-31T19:40:00.40356824Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.403571386Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Third party programs should typically not access this file directly, but only\r\n"} +{"Time":"2023-05-31T19:40:00.403575143Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # through the symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a\r\n"} +{"Time":"2023-05-31T19:40:00.403580064Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # different way, replace this symlink by a static file or a different symlink.\r\n"} +{"Time":"2023-05-31T19:40:00.403583164Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.403586089Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # See man:systemd-resolved.service(8) for details about the supported modes of\r\n"} +{"Time":"2023-05-31T19:40:00.403589422Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # operation for /etc/resolv.conf.\r\n"} +{"Time":"2023-05-31T19:40:00.403592327Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.403595559Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nameserver 192.168.122.1\r\n"} +{"Time":"2023-05-31T19:40:00.403598418Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" search .\r\n"} +{"Time":"2023-05-31T19:40:00.403601309Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403604109Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403607391Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:40:00.403610839Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T19:40:00.403614565Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node/bridge-509041 Ready control-plane 78s v1.27.2 192.168.50.84 \u003cnone\u003e Buildroot 2021.02.12 5.10.57 containerd://1.7.1\n"} +{"Time":"2023-05-31T19:40:00.403617595Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403620719Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T19:40:00.403626257Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 76s \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403630289Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default service/netcat ClusterIP 10.98.19.93 \u003cnone\u003e 8080/TCP 19s app=netcat\n"} +{"Time":"2023-05-31T19:40:00.403634164Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 74s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:00.403643772Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403647158Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T19:40:00.403650969Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default endpoints/kubernetes 192.168.50.84:8443 76s\n"} +{"Time":"2023-05-31T19:40:00.403654522Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default endpoints/netcat 10.244.0.3:8080 19s\n"} +{"Time":"2023-05-31T19:40:00.403657961Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 59s\n"} +{"Time":"2023-05-31T19:40:00.403661399Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 62s\n"} +{"Time":"2023-05-31T19:40:00.403664651Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403667976Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:40:00.403672081Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 74s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.403675323Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403678462Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:40:00.403681762Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default deployment.apps/netcat 1/1 1 1 19s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T19:40:00.403685408Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system deployment.apps/coredns 1/1 1 1 74s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:00.403688733Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40369339Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T19:40:00.403697062Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default pod/netcat-7458db8b8-8d2jb 1/1 Running 0 19s 10.244.0.3 bridge-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403701139Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/coredns-5d78c9869d-vpp5g 1/1 Running 0 62s 10.244.0.2 bridge-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403704834Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/etcd-bridge-509041 1/1 Running 0 74s 192.168.50.84 bridge-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403708585Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/kube-apiserver-bridge-509041 1/1 Running 0 74s 192.168.50.84 bridge-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403712555Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/kube-controller-manager-bridge-509041 1/1 Running 0 75s 192.168.50.84 bridge-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403716202Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/kube-proxy-rfrmj 1/1 Running 0 62s 192.168.50.84 bridge-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403721852Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/kube-scheduler-bridge-509041 1/1 Running 0 74s 192.168.50.84 bridge-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403725738Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-system pod/storage-provisioner 1/1 Running 0 59s 192.168.50.84 bridge-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403729157Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403732139Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403735162Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:40:00.403739762Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T19:40:00.403743387Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 03f87517c7b04 17 seconds ago Ready netcat-7458db8b8-8d2jb default 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:00.403747062Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dda219725cab3 58 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:00.403750382Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 13caf34c4f056 About a minute ago Ready kube-proxy-rfrmj kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:00.403754959Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ed64e893a76dc About a minute ago Ready coredns-5d78c9869d-vpp5g kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:00.403758542Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 3b5a915ce72f3 About a minute ago Ready kube-scheduler-bridge-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:00.403762302Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0d906d76b7e2a About a minute ago Ready etcd-bridge-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:00.403766112Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 91eaad321c9e1 About a minute ago Ready kube-apiserver-bridge-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:00.40376968Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bffe6c2f6b5d8 About a minute ago Ready kube-controller-manager-bridge-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:00.403772886Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403775805Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403778547Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:40:00.403782306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\r\n"} +{"Time":"2023-05-31T19:40:00.403785876Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 284c326637c65 28081458d86cc 13 seconds ago Running dnsutils 0 03f87517c7b04\r\n"} +{"Time":"2023-05-31T19:40:00.40378946Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a09e9b686dd34 6e38f40d628db 58 seconds ago Running storage-provisioner 0 dda219725cab3\r\n"} +{"Time":"2023-05-31T19:40:00.403794265Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 235a295674888 ead0a4a53df89 About a minute ago Running coredns 0 ed64e893a76dc\r\n"} +{"Time":"2023-05-31T19:40:00.403798122Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 47883dd71bdab b8aa50768fd67 About a minute ago Running kube-proxy 0 13caf34c4f056\r\n"} +{"Time":"2023-05-31T19:40:00.403801392Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 4b5be9782a37c 86b6af7dd652c About a minute ago Running etcd 0 0d906d76b7e2a\r\n"} +{"Time":"2023-05-31T19:40:00.403804889Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 4ce3c89d5fe12 89e70da428d29 About a minute ago Running kube-scheduler 0 3b5a915ce72f3\r\n"} +{"Time":"2023-05-31T19:40:00.403808406Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 739d423329670 ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 bffe6c2f6b5d8\r\n"} +{"Time":"2023-05-31T19:40:00.403812511Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 6167f53f4b218 c5b13e4f7806d About a minute ago Running kube-apiserver 0 91eaad321c9e1\r\n"} +{"Time":"2023-05-31T19:40:00.403815761Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403818656Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403821756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:40:00.40382485Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: netcat\n"} +{"Time":"2023-05-31T19:40:00.403827857Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:40:00.403830807Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CreationTimestamp: Wed, 31 May 2023 19:39:33 +0000\n"} +{"Time":"2023-05-31T19:40:00.403834077Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:40:00.40383703Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:40:00.403840195Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T19:40:00.403843456Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:40:00.403846777Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:40:00.403849685Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:40:00.403852606Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:40:00.403855557Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:40:00.403858328Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:40:00.403861223Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:00.403864083Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:40:00.403867075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:40:00.403869872Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403873044Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403876309Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:00.403879178Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:40:00.403882214Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -c\n"} +{"Time":"2023-05-31T19:40:00.403885242Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:40:00.403888628Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403891843Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403894701Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.40389769Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:00.403900758Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:40:00.403903918Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:40:00.403906766Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:40:00.403910268Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:40:00.403913078Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403916441Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:40:00.403919416Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:00.403922881Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:00.403925914Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:00.403929011Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal ScalingReplicaSet 20s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T19:40:00.403931967Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.403934723Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40393756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:40:00.403940602Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: netcat-7458db8b8-8d2jb\n"} +{"Time":"2023-05-31T19:40:00.403943768Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:40:00.403946745Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority: 0\n"} +{"Time":"2023-05-31T19:40:00.403949712Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: default\n"} +{"Time":"2023-05-31T19:40:00.403952771Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node: bridge-509041/192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.403955775Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Start Time: Wed, 31 May 2023 19:39:33 +0000\n"} +{"Time":"2023-05-31T19:40:00.403958904Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:40:00.403961953Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T19:40:00.403965684Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.403968908Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:00.403971727Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T19:40:00.403974832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:00.403984557Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T19:40:00.403989707Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T19:40:00.403992602Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:00.403995521Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:40:00.403998757Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Container ID: containerd://284c326637c6549723b2ac11104235850358e846bbcc8d8cf49ad1a4b95d5909\n"} +{"Time":"2023-05-31T19:40:00.404001765Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:40:00.404006084Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image ID: registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T19:40:00.404009403Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404012196Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404015191Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:00.404018038Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:40:00.404021301Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -c\n"} +{"Time":"2023-05-31T19:40:00.40402427Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:40:00.404027385Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:00.404030699Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Started: Wed, 31 May 2023 19:39:39 +0000\n"} +{"Time":"2023-05-31T19:40:00.404034054Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:00.404037087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:00.404040379Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404043328Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:00.404046493Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-s68sm (ro)\n"} +{"Time":"2023-05-31T19:40:00.404049724Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:00.404053772Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:00.404056738Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:00.404059683Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:00.404062458Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:00.404065496Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:00.404068484Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:00.404071418Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-api-access-s68sm:\n"} +{"Time":"2023-05-31T19:40:00.404074591Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:40:00.404077793Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:40:00.404080811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:00.404083936Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:40:00.40408727Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:40:00.404090023Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:40:00.404093025Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404096744Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:40:00.404101078Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:40:00.404104727Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:00.404107508Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:00.404110944Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:00.404114009Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Scheduled 20s default-scheduler Successfully assigned default/netcat-7458db8b8-8d2jb to bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.404117938Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Warning FailedMount 19s kubelet MountVolume.SetUp failed for volume \"kube-api-access-s68sm\" : failed to sync configmap cache: timed out waiting for the condition\n"} +{"Time":"2023-05-31T19:40:00.404121545Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulling 17s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T19:40:00.40412648Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulled 14s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 2.488320817s (2.488336604s including waiting)\n"} +{"Time":"2023-05-31T19:40:00.404130075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Created 14s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T19:40:00.404133272Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Started 14s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T19:40:00.40413605Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404138802Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40414175Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:40:00.40414467Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404147375Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404150335Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:40:00.4041535Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:40:00.40415666Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.40415989Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CreationTimestamp: Wed, 31 May 2023 19:38:38 +0000\n"} +{"Time":"2023-05-31T19:40:00.404167391Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:00.404170652Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:40:00.404173526Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:00.404176724Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:40:00.404179897Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:40:00.404182812Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:40:00.404185729Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:40:00.404188692Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:40:00.404192033Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:00.404195323Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:40:00.40419841Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:00.404201365Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" coredns:\n"} +{"Time":"2023-05-31T19:40:00.40420571Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:40:00.404208916Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:40:00.404217566Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:40:00.404221109Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:00.404224037Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -conf\n"} +{"Time":"2023-05-31T19:40:00.404227194Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:40:00.40422997Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Limits:\n"} +{"Time":"2023-05-31T19:40:00.404232914Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:40:00.404236057Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requests:\n"} +{"Time":"2023-05-31T19:40:00.404238978Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:40:00.404243921Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:40:00.404249106Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:40:00.40425266Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:40:00.404256027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404259196Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:00.404262543Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:40:00.404265523Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:00.40426857Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:40:00.404272086Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:00.404275099Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:40:00.404278201Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:00.404281876Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:40:00.404287655Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:00.404290691Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:40:00.404293911Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:40:00.404296903Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:40:00.404299917Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:40:00.404303457Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404307898Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:40:00.404311807Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:00.404315054Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:00.404318326Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:00.404321754Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal ScalingReplicaSet 63s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T19:40:00.404326695Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal ScalingReplicaSet 62s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T19:40:00.404329976Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404333075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404336047Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:40:00.404339353Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: coredns-5d78c9869d-vpp5g\n"} +{"Time":"2023-05-31T19:40:00.404342248Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.404345593Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T19:40:00.404349385Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:40:00.404352455Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:40:00.404355434Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node: bridge-509041/192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.404358294Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Start Time: Wed, 31 May 2023 19:38:50 +0000\n"} +{"Time":"2023-05-31T19:40:00.404361332Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:00.404364498Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T19:40:00.404367517Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404370815Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:00.404373723Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:40:00.404376863Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:00.404379847Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:40:00.404382908Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T19:40:00.404386043Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:00.404388922Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" coredns:\n"} +{"Time":"2023-05-31T19:40:00.404392087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Container ID: containerd://235a2956748884c67525f68ff9583dc0eb6c125301a444ab10882fa9d4319a3e\n"} +{"Time":"2023-05-31T19:40:00.404395342Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:40:00.404398628Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image ID: registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T19:40:00.404401797Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:40:00.404404862Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:40:00.404408166Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:00.404411211Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -conf\n"} +{"Time":"2023-05-31T19:40:00.404414466Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:40:00.404417678Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:00.404420809Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Started: Wed, 31 May 2023 19:38:52 +0000\n"} +{"Time":"2023-05-31T19:40:00.404423964Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:00.404427157Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:00.404430209Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Limits:\n"} +{"Time":"2023-05-31T19:40:00.404433134Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:40:00.404436029Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requests:\n"} +{"Time":"2023-05-31T19:40:00.404439096Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:40:00.404442231Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:40:00.404445421Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:40:00.404448614Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:40:00.404451673Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404454748Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:00.40445951Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:40:00.404462908Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-7z6sr (ro)\n"} +{"Time":"2023-05-31T19:40:00.404468066Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:00.404472398Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:00.404475706Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:00.404478796Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:00.404482019Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:00.404485076Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:00.404487937Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:00.404490386Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:40:00.404492734Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:00.404495257Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:40:00.404497933Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:00.404501062Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-api-access-7z6sr:\n"} +{"Time":"2023-05-31T19:40:00.404504583Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:40:00.404507776Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:40:00.404510997Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:00.404514129Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:40:00.4045177Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:40:00.404521248Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:40:00.40452517Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:40:00.404528287Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:40:00.404531942Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T19:40:00.40453542Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:40:00.404539111Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:40:00.404542504Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:00.404563Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:00.404567248Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:00.404571637Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Scheduled 63s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-vpp5g to bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.404575615Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulled 61s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T19:40:00.404579875Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Created 61s kubelet Created container coredns\n"} +{"Time":"2023-05-31T19:40:00.40458378Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Started 61s kubelet Started container coredns\n"} +{"Time":"2023-05-31T19:40:00.404587379Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Warning Unhealthy 32s (x5 over 60s) kubelet Readiness probe failed: HTTP probe failed with statuscode: 503\n"} +{"Time":"2023-05-31T19:40:00.404590979Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404594316Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404597207Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:40:00.40460265Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.404605786Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:40:00.404609182Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.404612777Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.404615906Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:40:00.404619532Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.404622752Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.404626479Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.404632133Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.404635469Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.404638634Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:40:00.40464237Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [WARNING] plugin/kubernetes: starting server with unsynced Kubernetes API\n"} +{"Time":"2023-05-31T19:40:00.404645221Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" .:53\n"} +{"Time":"2023-05-31T19:40:00.404648914Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/reload: Running configuration SHA512 = 591cf328cccc12bc490481273e738df59329c62c0b729d94e8b61db9961c2fa5f046dd37f1cf888b953814040d180f52594972691cd6ff41be96639138a43908\n"} +{"Time":"2023-05-31T19:40:00.40465235Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T19:40:00.404655803Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T19:40:00.404659412Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:40:00.404662979Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:40:00.404666771Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:40:00.404670026Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [WARNING] plugin/kubernetes: Kubernetes API connection failure: Get \"https://10.96.0.1:443/version\": dial tcp 10.96.0.1:443: i/o timeout\n"} +{"Time":"2023-05-31T19:40:00.404673789Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] Reloading\n"} +{"Time":"2023-05-31T19:40:00.404677081Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] plugin/reload: Running configuration SHA512 = b1a455670bb5d7fd89b1330085768be95fff75b4bad96aaa3401a966da5ff6e52d21b0affe6cd8290073027bf8b56132a09c4a2bf21619d1b275a531761a3578\n"} +{"Time":"2023-05-31T19:40:00.404680436Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] Reloading complete\n"} +{"Time":"2023-05-31T19:40:00.404683885Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 127.0.0.1:54556 - 3235 \"HINFO IN 1431053117859145989.2533585646918302135. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.026405093s\n"} +{"Time":"2023-05-31T19:40:00.404687867Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 10.244.0.3:58420 - 55005 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.00041687s\n"} +{"Time":"2023-05-31T19:40:00.404691476Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 10.244.0.3:46688 - 25031 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000244689s\n"} +{"Time":"2023-05-31T19:40:00.404695112Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 10.244.0.3:37714 - 42294 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000104272s\n"} +{"Time":"2023-05-31T19:40:00.404698658Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 10.244.0.3:44189 - 25243 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000321137s\n"} +{"Time":"2023-05-31T19:40:00.404702066Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 10.244.0.3:44189 - 24694 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.00028964s\n"} +{"Time":"2023-05-31T19:40:00.404705858Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 10.244.0.3:41827 - 47744 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000073421s\n"} +{"Time":"2023-05-31T19:40:00.404712215Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 10.244.0.3:58505 - 49225 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000086965s\n"} +{"Time":"2023-05-31T19:40:00.404715812Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [INFO] 10.244.0.3:46882 - 17415 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.00004795s\n"} +{"Time":"2023-05-31T19:40:00.404719049Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404721807Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.404738687Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:40:00.404742618Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-apiserver-bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.40474628Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.404749625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:40:00.40475269Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:40:00.40475615Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node: bridge-509041/192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.40476665Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Start Time: Wed, 31 May 2023 19:38:38 +0000\n"} +{"Time":"2023-05-31T19:40:00.404770482Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T19:40:00.404773982Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T19:40:00.404777375Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.50.84:8443\n"} +{"Time":"2023-05-31T19:40:00.404780882Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/config.hash: 12f3fbffbee24d5bba3b1ee0a55ab306\n"} +{"Time":"2023-05-31T19:40:00.404784212Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/config.mirror: 12f3fbffbee24d5bba3b1ee0a55ab306\n"} +{"Time":"2023-05-31T19:40:00.404787578Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/config.seen: 2023-05-31T19:38:38.258545104Z\n"} +{"Time":"2023-05-31T19:40:00.404790804Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T19:40:00.404793905Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:00.404796948Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" SeccompProfile: RuntimeDefault\n"} +{"Time":"2023-05-31T19:40:00.404800038Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.404803514Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:00.404806598Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.404809714Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Controlled By: Node/bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.404812725Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:00.404815938Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T19:40:00.404819032Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Container ID: containerd://6167f53f4b218341194cbbc8f3f1cb9245d6ed042675df42c3567b05201aa840\n"} +{"Time":"2023-05-31T19:40:00.40482249Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T19:40:00.404826038Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image ID: registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T19:40:00.404830981Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404834307Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404837584Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:00.404840787Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T19:40:00.404843989Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --advertise-address=192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.404847188Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T19:40:00.404850315Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T19:40:00.404853783Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:40:00.404857564Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:40:00.404861218Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T19:40:00.404865154Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T19:40:00.404868496Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T19:40:00.404870741Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T19:40:00.404873065Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T19:40:00.404875168Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T19:40:00.404877404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T19:40:00.404881263Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T19:40:00.40488411Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T19:40:00.404886223Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T19:40:00.404888814Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T19:40:00.404890975Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T19:40:00.404893404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T19:40:00.404895568Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T19:40:00.40489772Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T19:40:00.4048998Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T19:40:00.404902027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:40:00.404904057Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T19:40:00.404906041Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T19:40:00.404908035Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T19:40:00.404909985Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T19:40:00.404918472Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T19:40:00.404920692Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:00.404922652Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Started: Wed, 31 May 2023 19:38:29 +0000\n"} +{"Time":"2023-05-31T19:40:00.40492456Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:00.404926498Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:00.404928527Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requests:\n"} +{"Time":"2023-05-31T19:40:00.404930481Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:40:00.404932604Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Liveness: http-get https://192.168.50.84:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T19:40:00.404934951Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Readiness: http-get https://192.168.50.84:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:40:00.40493743Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Startup: http-get https://192.168.50.84:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T19:40:00.404939821Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.40494189Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:00.404944007Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T19:40:00.404946042Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T19:40:00.404948163Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T19:40:00.404950067Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:00.404951969Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:00.404954336Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:00.404956372Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:00.40495838Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:00.404960292Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:00.404962178Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:00.404964007Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca-certs:\n"} +{"Time":"2023-05-31T19:40:00.40496598Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:00.404967971Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:40:00.404969934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:40:00.40497191Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T19:40:00.404973824Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:00.404975739Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:40:00.404982121Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:40:00.404984121Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T19:40:00.404986781Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:00.404988755Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T19:40:00.404990972Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:40:00.404993958Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:40:00.404996127Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.404998531Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:40:00.405000461Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:00.405002384Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:00.405004593Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:00.405006616Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulled 84s kubelet Container image \"registry.k8s.io/kube-apiserver:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:40:00.405008824Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Created 84s kubelet Created container kube-apiserver\n"} +{"Time":"2023-05-31T19:40:00.405010806Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Started 84s kubelet Started container kube-apiserver\n"} +{"Time":"2023-05-31T19:40:00.405012766Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.405014596Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.405016408Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:40:00.405018424Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:29.836834 1 server.go:551] external host was not specified, using 192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.405020467Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:29.838439 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T19:40:00.405022444Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:29.838634 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:40:00.405024811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:30.109449 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T19:40:00.405027361Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:30.147879 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T19:40:00.405030321Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:30.147931 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T19:40:00.405032874Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:30.158659 1 logging.go:59] [core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T19:40:00.405035951Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T19:40:00.405038047Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T19:40:00.405040519Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Attributes\": null,\n"} +{"Time":"2023-05-31T19:40:00.40504255Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T19:40:00.405044641Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Type\": 0,\n"} +{"Time":"2023-05-31T19:40:00.405046662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Metadata\": null\n"} +{"Time":"2023-05-31T19:40:00.405048762Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T19:40:00.405051037Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:31.111499 1 logging.go:59] [core] [Channel #3 SubChannel #4] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T19:40:00.405053218Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T19:40:00.405055283Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T19:40:00.405057367Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Attributes\": null,\n"} +{"Time":"2023-05-31T19:40:00.405059653Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T19:40:00.405061651Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Type\": 0,\n"} +{"Time":"2023-05-31T19:40:00.405063574Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Metadata\": null\n"} +{"Time":"2023-05-31T19:40:00.405065598Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T19:40:00.405069051Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:31.111568 1 logging.go:59] [core] [Channel #5 SubChannel #6] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T19:40:00.405071288Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T19:40:00.405073311Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T19:40:00.405075287Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Attributes\": null,\n"} +{"Time":"2023-05-31T19:40:00.405077217Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T19:40:00.405079238Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Type\": 0,\n"} +{"Time":"2023-05-31T19:40:00.405081264Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Metadata\": null\n"} +{"Time":"2023-05-31T19:40:00.40508365Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T19:40:00.405133453Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:31.160338 1 logging.go:59] [core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T19:40:00.405135962Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T19:40:00.405138055Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T19:40:00.405140167Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Attributes\": null,\n"} +{"Time":"2023-05-31T19:40:00.40514221Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T19:40:00.405144323Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Type\": 0,\n"} +{"Time":"2023-05-31T19:40:00.40514734Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"Metadata\": null\n"} +{"Time":"2023-05-31T19:40:00.405149514Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T19:40:00.405151885Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:32.880239 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405167574Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:32.880283 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405169946Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:32.883234 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T19:40:00.405172282Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.093817 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.40517454Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.094426 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:40:00.40517717Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.438939 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:40:00.405179513Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.480908 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405181818Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.481112 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405183892Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.481135 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405185949Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.483439 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.40518808Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.483595 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.40529756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.486238 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405301223Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.487094 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.40530366Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.487256 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405305958Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.487505 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405308156Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.490293 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405310344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.490430 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405312475Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.492881 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405314718Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.493077 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405316832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.493308 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405318981Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.495537 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405321156Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.495673 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405323281Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.497502 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405325353Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.498276 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405327372Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.501692 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405329515Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.501852 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405331777Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.501950 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405334026Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.503870 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405535998Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.504066 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405543665Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.504181 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405547973Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.506691 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405554093Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.506829 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405556378Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.510101 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405558717Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.510226 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405561785Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.510486 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405565287Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.512783 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405569019Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.513077 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405572735Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.513177 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405576188Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.517509 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405582273Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.517675 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.4055857Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.517857 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405589915Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.520700 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405593354Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.522147 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.40559681Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.522276 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405600269Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.522327 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405773836Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.529087 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405780074Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.529173 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405783929Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.529199 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405787169Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.532775 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405791492Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.533045 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405795074Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.533148 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405799279Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.536468 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405802943Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.536603 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405807086Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:33.556199 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:00.405811027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:33.556245 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:00.405814527Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.431937 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T19:40:00.405820484Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.432271 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:40:00.405824654Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.432435 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T19:40:00.405828602Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.432599 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T19:40:00.405832208Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.433924 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T19:40:00.405835768Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.435372 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T19:40:00.405839515Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.436176 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T19:40:00.406040667Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.436216 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:40:00.406047611Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.436873 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:40:00.406051328Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.437195 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:40:00.406054671Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.437308 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:40:00.4060595Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.453262 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T19:40:00.406063298Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.453526 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T19:40:00.406067025Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.453943 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T19:40:00.406070663Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.454056 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T19:40:00.406073792Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.454109 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T19:40:00.406078022Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.454523 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T19:40:00.406081748Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.455190 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T19:40:00.406085367Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.455583 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T19:40:00.406088795Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.455631 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:40:00.40609233Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.455665 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T19:40:00.40610936Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.455704 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:40:00.406113258Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.455780 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T19:40:00.40611688Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.455817 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T19:40:00.406276463Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.495287 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T19:40:00.406280625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.495349 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T19:40:00.406282923Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.495401 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T19:40:00.40628525Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.495451 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T19:40:00.406295975Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.495549 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T19:40:00.406298682Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.495567 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T19:40:00.406301057Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.495577 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T19:40:00.40630544Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.495603 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:40:00.40630821Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.500134 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:40:00.40631092Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.501374 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T19:40:00.406313424Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.501419 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T19:40:00.406315656Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.601452 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T19:40:00.40631793Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.609796 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T19:40:00.406320297Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.636276 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:40:00.406324226Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.651406 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T19:40:00.406326376Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.653664 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T19:40:00.406328472Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.654097 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T19:40:00.406330965Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.654115 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T19:40:00.406551479Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.655731 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:40:00.406576103Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.656097 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T19:40:00.406580523Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.656762 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:40:00.40658851Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:34.682510 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.406593236Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:35.077279 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T19:40:00.406596781Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:35.441658 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T19:40:00.406599466Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:35.446616 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T19:40:00.406602084Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:35.446662 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T19:40:00.406604911Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:36.154851 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.406608823Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:36.214458 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.406614487Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:36.315158 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T19:40:00.406618796Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" W0531 19:38:36.330349 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.50.84]\n"} +{"Time":"2023-05-31T19:40:00.406623025Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:36.331815 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T19:40:00.406626927Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:36.338223 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.406630453Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:36.565862 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T19:40:00.406633968Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:38.017127 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T19:40:00.406638286Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:38.034359 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T19:40:00.406800292Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:38.048334 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T19:40:00.406805752Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:49.183502 1 trace.go:219] Trace[1893051385]: \"Get\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:dfe04498-df96-4328-96c4-4b92b3d75fc4,client:192.168.50.84,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/kube-system/serviceaccounts/generic-garbage-collector,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/kube-controller-manager,verb:GET (31-May-2023 19:38:48.510) (total time: 673ms):\n"} +{"Time":"2023-05-31T19:40:00.406810658Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1893051385]: ---\"About to write a response\" 673ms (19:38:49.183)\n"} +{"Time":"2023-05-31T19:40:00.406814592Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1893051385]: [673.423595ms] [673.423595ms] END\n"} +{"Time":"2023-05-31T19:40:00.406819321Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:49.183510 1 trace.go:219] Trace[1335266774]: \"Update\" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:0c61a18d-a65e-4de9-8343-7323b9f3a54d,client:192.168.50.84,protocol:HTTP/2.0,resource:leases,scope:resource,url:/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/bridge-509041,user-agent:kubelet/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:PUT (31-May-2023 19:38:48.407) (total time: 775ms):\n"} +{"Time":"2023-05-31T19:40:00.406825631Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1335266774]: [\"GuaranteedUpdate etcd3\" audit-id:0c61a18d-a65e-4de9-8343-7323b9f3a54d,key:/leases/kube-node-lease/bridge-509041,type:*coordination.Lease,resource:leases.coordination.k8s.io 775ms (19:38:48.408)\n"} +{"Time":"2023-05-31T19:40:00.406829745Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1335266774]: ---\"Txn call completed\" 774ms (19:38:49.183)]\n"} +{"Time":"2023-05-31T19:40:00.406833548Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1335266774]: [775.666731ms] [775.666731ms] END\n"} +{"Time":"2023-05-31T19:40:00.406839199Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:49.185907 1 trace.go:219] Trace[1722627685]: \"Get\" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:7df4296a-02aa-47eb-9b6b-5bbaa43f8109,client:192.168.50.84,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/kube-system/pods/etcd-bridge-509041,user-agent:kubelet/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:GET (31-May-2023 19:38:48.504) (total time: 681ms):\n"} +{"Time":"2023-05-31T19:40:00.406843685Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1722627685]: ---\"About to write a response\" 681ms (19:38:49.185)\n"} +{"Time":"2023-05-31T19:40:00.406847438Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1722627685]: [681.458375ms] [681.458375ms] END\n"} +{"Time":"2023-05-31T19:40:00.40685262Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:50.366881 1 trace.go:219] Trace[1164621538]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:a1a40795-3bf8-486f-ac8c-764ccb9ace3d,client:192.168.50.84,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/kube-system/serviceaccounts,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/kube-controller-manager,verb:POST (31-May-2023 19:38:49.747) (total time: 618ms):\n"} +{"Time":"2023-05-31T19:40:00.407032828Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1164621538]: [\"Create etcd3\" audit-id:a1a40795-3bf8-486f-ac8c-764ccb9ace3d,key:/serviceaccounts/kube-system/bootstrap-signer,type:*core.ServiceAccount,resource:serviceaccounts 618ms (19:38:49.748)\n"} +{"Time":"2023-05-31T19:40:00.407039184Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1164621538]: ---\"Txn call succeeded\" 618ms (19:38:50.366)]\n"} +{"Time":"2023-05-31T19:40:00.407043005Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[1164621538]: [618.907749ms] [618.907749ms] END\n"} +{"Time":"2023-05-31T19:40:00.407047536Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:50.368416 1 trace.go:219] Trace[750434881]: \"Get\" accept:application/json;as=Table;v=v1;g=meta.k8s.io,application/json;as=Table;v=v1beta1;g=meta.k8s.io,application/json,audit-id:38053e4c-0dca-4d5e-af6e-cde18d654d75,client:127.0.0.1,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/default/serviceaccounts/default,user-agent:kubectl/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:GET (31-May-2023 19:38:49.774) (total time: 594ms):\n"} +{"Time":"2023-05-31T19:40:00.407051966Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Trace[750434881]: [594.284904ms] [594.284904ms] END\n"} +{"Time":"2023-05-31T19:40:00.407055586Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:50.631589 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T19:40:00.407068322Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:50.634207 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T19:40:00.407072135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:39:33.323784 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.98.19.93]\n"} +{"Time":"2023-05-31T19:40:00.407074775Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40707731Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40707974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:40:00.407083772Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/cni/net.d/1-k8s.conflist\r\n"} +{"Time":"2023-05-31T19:40:00.407087015Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.407090419Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.407093707Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T19:40:00.40709752Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"name\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:40:00.407101177Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:40:00.407104712Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.407248848Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:40:00.407254989Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"bridge\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:40:00.407258576Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"addIf\": \"true\",\r\n"} +{"Time":"2023-05-31T19:40:00.407265005Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"isDefaultGateway\": true,\r\n"} +{"Time":"2023-05-31T19:40:00.407268707Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"forceAddress\": false,\r\n"} +{"Time":"2023-05-31T19:40:00.40727173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:40:00.407275069Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:40:00.407278498Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:40:00.407281723Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:40:00.407285015Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"subnet\": \"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T19:40:00.407288259Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407291631Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:00.407294979Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.407298214Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:40:00.407310895Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:40:00.407314371Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:40:00.407317677Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407321066Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407324214Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.407344859Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407349609Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T19:40:00.407352072Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.407354101Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T19:40:00.407356344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T19:40:00.407358602Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:40:00.407360679Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.407362657Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:40:00.407364952Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T19:40:00.40745464Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T19:40:00.407456978Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:40:00.407459153Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:40:00.407461348Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:40:00.407463437Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:40:00.407465865Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T19:40:00.407468068Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T19:40:00.407470174Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [\r\n"} +{"Time":"2023-05-31T19:40:00.407472187Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.40747425Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T19:40:00.407476627Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T19:40:00.407478928Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407480955Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.407482884Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.407484765Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407486622Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:00.407488535Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.407490436Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:40:00.407492507Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:40:00.40749452Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:40:00.40749648Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407498367Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:00.407500182Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.407502047Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T19:40:00.407504012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:00.407505834Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.407507812Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T19:40:00.407509727Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407705807Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.407710672Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.407715747Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/cni/net.d/.keep\r\n"} +{"Time":"2023-05-31T19:40:00.407721398Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.407724784Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.407728144Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:40:00.407731895Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:00.407735873Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T19:40:00.407739631Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T19:40:00.407742984Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:40:00.407746132Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 2: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:00.407749236Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether 52:54:00:23:81:90 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:40:00.407753105Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" inet 192.168.50.84/24 brd 192.168.50.255 scope global dynamic eth0\r\n"} +{"Time":"2023-05-31T19:40:00.407756607Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" valid_lft 3488sec preferred_lft 3488sec\r\n"} +{"Time":"2023-05-31T19:40:00.40776014Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 3: eth1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:00.407763426Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether 52:54:00:90:65:b9 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:40:00.407766744Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" inet 192.168.122.13/24 brd 192.168.122.255 scope global dynamic eth1\r\n"} +{"Time":"2023-05-31T19:40:00.407770147Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" valid_lft 3489sec preferred_lft 3489sec\r\n"} +{"Time":"2023-05-31T19:40:00.407773503Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 4: sit0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:00.407777316Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/sit 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T19:40:00.407781049Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 5: bridge: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:00.407784331Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether 62:c6:4e:d3:e1:3b brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:40:00.407787865Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" inet 10.244.0.1/16 brd 10.244.255.255 scope global bridge\r\n"} +{"Time":"2023-05-31T19:40:00.407945313Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:40:00.407948532Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 6: veth61b173e3@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T19:40:00.407950974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether 1a:51:1f:75:68:a2 brd ff:ff:ff:ff:ff:ff link-netns cni-601bad94-a885-eab3-ae87-296d9ffc1b0b\r\n"} +{"Time":"2023-05-31T19:40:00.407961815Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7: veth31d34c1e@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T19:40:00.407964282Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" link/ether c2:41:39:b4:b9:b0 brd ff:ff:ff:ff:ff:ff link-netns cni-62fda4d2-b076-0d46-a204-b7ecaccb5b7e\r\n"} +{"Time":"2023-05-31T19:40:00.407966629Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.407968596Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.407970577Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:40:00.407972806Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default via 192.168.122.1 dev eth1 proto dhcp src 192.168.122.13 metric 1024 \r\n"} +{"Time":"2023-05-31T19:40:00.407974974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 10.244.0.0/16 dev bridge proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T19:40:00.407977393Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.50.0/24 dev eth0 proto kernel scope link src 192.168.50.84 \r\n"} +{"Time":"2023-05-31T19:40:00.407979438Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.122.0/24 dev eth1 proto kernel scope link src 192.168.122.13 \r\n"} +{"Time":"2023-05-31T19:40:00.40798158Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.122.1 dev eth1 proto dhcp scope link src 192.168.122.13 metric 1024 \r\n"} +{"Time":"2023-05-31T19:40:00.407983793Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.40798567Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.407987764Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:40:00.407989861Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:39:54 2023\r\n"} +{"Time":"2023-05-31T19:40:00.407991904Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" *nat\r\n"} +{"Time":"2023-05-31T19:40:00.407993909Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :PREROUTING ACCEPT [39:2294]\r\n"} +{"Time":"2023-05-31T19:40:00.407995941Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :INPUT ACCEPT [37:2214]\r\n"} +{"Time":"2023-05-31T19:40:00.407997836Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :OUTPUT ACCEPT [42:2520]\r\n"} +{"Time":"2023-05-31T19:40:00.408000063Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :POSTROUTING ACCEPT [42:2520]\r\n"} +{"Time":"2023-05-31T19:40:00.408001985Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :CNI-21bb28632b9ce72feadae57a - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408225945Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :CNI-a2fe4bf2a25a465e84431128 - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408230133Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408232329Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408234585Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408237335Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408240598Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408243823Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408247207Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408250312Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-UTWFOSUDHOCXYA2F - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408253625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.40825692Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SEP-YZPXMORSDBZ4IWXT - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408264742Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408267687Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.4082711Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408274057Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408276811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408279497Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.408282306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:00.408285346Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:00.408289098Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:40:00.408293342Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A POSTROUTING -s 10.244.0.2/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"ed64e893a76dc06526bdb86738eb30e5c2f9cd9c9983623a5a6adfe4fb1b4501\\\"\" -j CNI-a2fe4bf2a25a465e84431128\r\n"} +{"Time":"2023-05-31T19:40:00.408298335Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A POSTROUTING -s 10.244.0.3/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2\\\"\" -j CNI-21bb28632b9ce72feadae57a\r\n"} +{"Time":"2023-05-31T19:40:00.408302959Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A CNI-21bb28632b9ce72feadae57a -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:40:00.41258816Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A CNI-21bb28632b9ce72feadae57a ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T19:40:00.412601049Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A CNI-a2fe4bf2a25a465e84431128 -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"ed64e893a76dc06526bdb86738eb30e5c2f9cd9c9983623a5a6adfe4fb1b4501\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:40:00.412604874Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A CNI-a2fe4bf2a25a465e84431128 ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"ed64e893a76dc06526bdb86738eb30e5c2f9cd9c9983623a5a6adfe4fb1b4501\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T19:40:00.412607637Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:40:00.4126103Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:40:00.412612899Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T19:40:00.412615209Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:40:00.41261807Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412621167Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:40:00.412624328Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412626812Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:40:00.412629417Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -s 10.244.0.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412632047Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T19:40:00.412634484Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412636843Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:40:00.412639066Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-YZPXMORSDBZ4IWXT -s 192.168.50.84/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412654555Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SEP-YZPXMORSDBZ4IWXT -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.50.84:8443\r\n"} +{"Time":"2023-05-31T19:40:00.412657079Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T19:40:00.412659559Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T19:40:00.412662092Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T19:40:00.412664809Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T19:40:00.412667326Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -d 10.98.19.93/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T19:40:00.412669764Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:40:00.412672271Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412683127Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T19:40:00.412686033Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412688575Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T19:40:00.412691156Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412693637Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.50.84:8443\" -j KUBE-SEP-YZPXMORSDBZ4IWXT\r\n"} +{"Time":"2023-05-31T19:40:00.412699643Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412703269Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T19:40:00.412706104Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.98.19.93/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:00.412708792Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.3:8080\" -j KUBE-SEP-UTWFOSUDHOCXYA2F\r\n"} +{"Time":"2023-05-31T19:40:00.412711071Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:40:00.412713326Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Completed on Wed May 31 19:39:54 2023\r\n"} +{"Time":"2023-05-31T19:40:00.412716614Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:39:54 2023\r\n"} +{"Time":"2023-05-31T19:40:00.412718963Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" *mangle\r\n"} +{"Time":"2023-05-31T19:40:00.412721119Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :PREROUTING ACCEPT [21005:57960243]\r\n"} +{"Time":"2023-05-31T19:40:00.412723675Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :INPUT ACCEPT [20958:57956693]\r\n"} +{"Time":"2023-05-31T19:40:00.412725796Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :FORWARD ACCEPT [43:3390]\r\n"} +{"Time":"2023-05-31T19:40:00.412727936Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :OUTPUT ACCEPT [19179:8074790]\r\n"} +{"Time":"2023-05-31T19:40:00.41272998Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :POSTROUTING ACCEPT [19222:8078180]\r\n"} +{"Time":"2023-05-31T19:40:00.412733693Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412735743Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412737795Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412739795Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:40:00.412741779Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Completed on Wed May 31 19:39:54 2023\r\n"} +{"Time":"2023-05-31T19:40:00.412743943Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:39:54 2023\r\n"} +{"Time":"2023-05-31T19:40:00.412745968Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" *filter\r\n"} +{"Time":"2023-05-31T19:40:00.41274788Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :INPUT ACCEPT [6147:1276578]\r\n"} +{"Time":"2023-05-31T19:40:00.412749749Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :FORWARD ACCEPT [16:927]\r\n"} +{"Time":"2023-05-31T19:40:00.412751779Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :OUTPUT ACCEPT [6079:1571290]\r\n"} +{"Time":"2023-05-31T19:40:00.412753738Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412756986Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.41275897Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412761043Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412762983Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412764856Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412766752Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.41276872Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:00.412770755Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:00.412773075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:40:00.412775457Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:00.412778017Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:00.412779992Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:00.412782225Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T19:40:00.412784536Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:00.412786812Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:00.412789376Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:00.412791583Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:00.412793678Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:00.412795824Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T19:40:00.412798167Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:40:00.412800604Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:40:00.412803228Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:40:00.412805589Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:40:00.412807559Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Completed on Wed May 31 19:39:54 2023\r\n"} +{"Time":"2023-05-31T19:40:00.412809533Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.412811716Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.412813661Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:40:00.412815847Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain PREROUTING (policy ACCEPT 40 packets, 2354 bytes)\r\n"} +{"Time":"2023-05-31T19:40:00.412817847Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412820272Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 61 3999 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:40:00.412822379Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412824399Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain INPUT (policy ACCEPT 38 packets, 2274 bytes)\r\n"} +{"Time":"2023-05-31T19:40:00.412826404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412828632Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412830604Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain OUTPUT (policy ACCEPT 42 packets, 2520 bytes)\r\n"} +{"Time":"2023-05-31T19:40:00.412832881Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412835089Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 126 7622 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:40:00.412837107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412839073Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain POSTROUTING (policy ACCEPT 42 packets, 2520 bytes)\r\n"} +{"Time":"2023-05-31T19:40:00.412841425Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412845197Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 138 8527 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T19:40:00.412847484Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 3 230 CNI-a2fe4bf2a25a465e84431128 all -- * * 10.244.0.2 0.0.0.0/0 /* name: \"bridge\" id: \"ed64e893a76dc06526bdb86738eb30e5c2f9cd9c9983623a5a6adfe4fb1b4501\" */\r\n"} +{"Time":"2023-05-31T19:40:00.412851601Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 9 675 CNI-21bb28632b9ce72feadae57a all -- * * 10.244.0.3 0.0.0.0/0 /* name: \"bridge\" id: \"03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2\" */\r\n"} +{"Time":"2023-05-31T19:40:00.412854143Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412856006Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain CNI-21bb28632b9ce72feadae57a (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412858136Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412860452Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 9 675 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2\" */\r\n"} +{"Time":"2023-05-31T19:40:00.412880185Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2\" */\r\n"} +{"Time":"2023-05-31T19:40:00.412884135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412887377Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain CNI-a2fe4bf2a25a465e84431128 (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412890681Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412893945Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"ed64e893a76dc06526bdb86738eb30e5c2f9cd9c9983623a5a6adfe4fb1b4501\" */\r\n"} +{"Time":"2023-05-31T19:40:00.412898188Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 3 230 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"ed64e893a76dc06526bdb86738eb30e5c2f9cd9c9983623a5a6adfe4fb1b4501\" */\r\n"} +{"Time":"2023-05-31T19:40:00.412902288Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412905668Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412909205Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412912365Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412915085Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T19:40:00.41291737Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412919508Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T19:40:00.412922273Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412924229Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412926459Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412928597Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412930507Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412932604Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412934677Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 51 3195 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:40:00.412936883Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T19:40:00.412939114Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T19:40:00.412941263Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412943155Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412945198Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412947165Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412949088Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412952855Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412955005Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T19:40:00.412957297Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:40:00.412959353Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412961258Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412963358Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412965435Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T19:40:00.412967994Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:40:00.412970078Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412971967Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-UTWFOSUDHOCXYA2F (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.4129748Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.41297702Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T19:40:00.412979311Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T19:40:00.412981638Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412983608Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412985769Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412987902Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T19:40:00.412990107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:40:00.41299207Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.412994002Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SEP-YZPXMORSDBZ4IWXT (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.412996094Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.412998491Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ all -- * * 192.168.50.84 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T19:40:00.413000689Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 2 120 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.50.84:8443\r\n"} +{"Time":"2023-05-31T19:40:00.413002734Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413004578Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T19:40:00.413006564Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.413008668Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:40:00.413011329Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:40:00.413013632Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:40:00.413015879Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:40:00.413018118Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.98.19.93 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:40:00.413021354Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 77 4620 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T19:40:00.413023482Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413025344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.413027342Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.413029484Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:40:00.413031905Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:40:00.413033995Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413035862Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.413037916Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.413040054Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:40:00.413042221Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T19:40:00.413044265Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413046268Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.413048822Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.413050972Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:40:00.413053245Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 2 120 KUBE-SEP-YZPXMORSDBZ4IWXT all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.50.84:8443 */\r\n"} +{"Time":"2023-05-31T19:40:00.413055359Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413057244Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.413059237Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.413061336Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:40:00.413063539Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:40:00.413065634Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413067524Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T19:40:00.413069576Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:00.413071918Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.98.19.93 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:40:00.413074103Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 1 60 KUBE-SEP-UTWFOSUDHOCXYA2F all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.3:8080 */\r\n"} +{"Time":"2023-05-31T19:40:00.413076135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413077909Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413079866Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:40:00.413082022Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413084051Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.41308624Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:40:00.41308837Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413090692Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:40:00.413092656Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:40:00.413094566Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:40:00.413096568Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:40:00.413098523Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:40:00.413100424Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:40:00.413102736Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:40:00.413104724Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:40:00.413106683Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413108725Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413110634Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:00.413112565Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:40:00.413114538Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:40:00.413116508Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.413118546Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.413120575Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:00.413122743Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.41312469Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:40:00.41312659Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:40:00.413128508Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment:\n"} +{"Time":"2023-05-31T19:40:00.413130477Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:40:00.413133125Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:00.413135072Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:40:00.413137048Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:40:00.413139016Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:40:00.413141006Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:00.41314299Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:40:00.413144952Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:00.413146905Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413148844Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:00.413150742Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:40:00.413152977Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:00.413156125Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:40:00.413159101Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:40:00.41316217Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:40:00.413165431Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:00.41316864Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:40:00.413171696Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:00.413175016Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:40:00.413180135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:00.413183494Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:00.413186687Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:00.413189391Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal SuccessfulCreate 64s daemonset-controller Created pod: kube-proxy-rfrmj\n"} +{"Time":"2023-05-31T19:40:00.413191493Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413193291Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413195199Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:40:00.413197384Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-proxy-rfrmj\n"} +{"Time":"2023-05-31T19:40:00.41319947Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.413202248Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:40:00.413204322Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:40:00.413206377Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413208482Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node: bridge-509041/192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.413211068Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Start Time: Wed, 31 May 2023 19:38:50 +0000\n"} +{"Time":"2023-05-31T19:40:00.413213256Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T19:40:00.413215516Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413217601Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:40:00.413219549Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.41322181Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:00.413223839Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.413225768Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:00.413227826Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP: 192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.413229917Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413231844Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:00.413233871Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:40:00.413235856Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Container ID: containerd://47883dd71bdabdc298923b53c0e3ec804113954d403e46868d362724335b39d3\n"} +{"Time":"2023-05-31T19:40:00.413237816Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:40:00.413239828Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Image ID: registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T19:40:00.413242099Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.413244271Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:00.413246286Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:00.413248227Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413250233Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:40:00.413252197Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:40:00.413254314Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:00.413260551Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Started: Wed, 31 May 2023 19:38:52 +0000\n"} +{"Time":"2023-05-31T19:40:00.413271376Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:00.413273473Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:00.41327585Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment:\n"} +{"Time":"2023-05-31T19:40:00.413277817Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:40:00.413279861Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:00.413281753Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:40:00.413283817Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:40:00.413286023Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:40:00.41328809Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-68kx6 (ro)\n"} +{"Time":"2023-05-31T19:40:00.413290193Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:00.413292071Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:00.413294026Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:00.413295905Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:00.413297747Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:00.413299644Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:00.413301523Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:00.413303378Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:40:00.413305599Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:00.413307534Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413309373Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:00.413311842Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:40:00.413313775Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:00.41331574Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:40:00.413317638Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:40:00.413319723Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:40:00.413321713Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:00.41332372Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:40:00.413325632Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:00.413328828Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-api-access-68kx6:\n"} +{"Time":"2023-05-31T19:40:00.413330867Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:40:00.413333014Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:40:00.413335978Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:00.413337971Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:40:00.413340159Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:40:00.413342182Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:40:00.413344202Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:40:00.413346164Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T19:40:00.413348367Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:00.41335053Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:00.413352625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:00.413354824Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:40:00.413356952Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:00.4133591Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:40:00.41336113Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:00.413363102Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:00.413364994Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:00.413367061Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:00.413369161Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Scheduled 64s default-scheduler Successfully assigned kube-system/kube-proxy-rfrmj to bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.413371372Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Warning FailedMount 64s kubelet MountVolume.SetUp failed for volume \"kube-api-access-68kx6\" : configmap \"kube-root-ca.crt\" not found\n"} +{"Time":"2023-05-31T19:40:00.41337378Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Pulled 62s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:40:00.4133761Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Created 62s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.41337921Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Normal Started 62s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.413381135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413382924Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413384781Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:40:00.413386861Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.710474 1 node.go:141] Successfully retrieved node IP: 192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.413389Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.710541 1 server_others.go:110] \"Detected node IP\" address=\"192.168.50.84\"\n"} +{"Time":"2023-05-31T19:40:00.413391301Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.710561 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T19:40:00.413393509Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.771287 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T19:40:00.413395734Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.771313 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T19:40:00.413398075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.771349 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T19:40:00.413401077Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.771750 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T19:40:00.413403302Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.771765 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:40:00.413406223Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.773909 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T19:40:00.413408432Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.773918 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T19:40:00.413410496Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.773947 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T19:40:00.413412792Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.773951 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T19:40:00.413414942Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.777169 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T19:40:00.413417085Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.777179 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T19:40:00.413420184Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.874592 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T19:40:00.413422759Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.874646 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T19:40:00.413424896Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" I0531 19:38:52.877382 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T19:40:00.413426844Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413428708Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413430646Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:40:00.413433581Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:40:00.413436546Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: loaded (\u001b]8;;file://bridge-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:40:00.413439073Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T19:40:00.413441434Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─\u001b]8;;file://bridge-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:40:00.413444Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:38:37 UTC; 1min 17s ago\r\n"} +{"Time":"2023-05-31T19:40:00.413446275Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:40:00.413448496Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Main PID: 1232 (kubelet)\r\n"} +{"Time":"2023-05-31T19:40:00.413450517Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tasks: 14 (limit: 3251)\r\n"} +{"Time":"2023-05-31T19:40:00.413452433Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Memory: 32.5M\r\n"} +{"Time":"2023-05-31T19:40:00.413454394Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T19:40:00.413456713Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─1232 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=bridge-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.50.84\r\n"} +{"Time":"2023-05-31T19:40:00.413459017Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413461432Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:33 bridge-509041 kubelet[1232]: E0531 19:39:33.285505 1232 reflector.go:148] object-\"default\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:bridge-509041\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"default\": no relationship found between node 'bridge-509041' and this object\r\n"} +{"Time":"2023-05-31T19:40:00.413471188Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:33 bridge-509041 kubelet[1232]: I0531 19:39:33.407846 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-s68sm\\\" (UniqueName: \\\"kubernetes.io/projected/7d43d3cb-7470-41d6-9a82-e53d6c3f2802-kube-api-access-s68sm\\\") pod \\\"netcat-7458db8b8-8d2jb\\\" (UID: \\\"7d43d3cb-7470-41d6-9a82-e53d6c3f2802\\\") \" pod=\"default/netcat-7458db8b8-8d2jb\"\r\n"} +{"Time":"2023-05-31T19:40:00.413474836Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:34 bridge-509041 kubelet[1232]: E0531 19:39:34.522910 1232 projected.go:292] Couldn't get configMap default/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition\r\n"} +{"Time":"2023-05-31T19:40:00.413484991Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:34 bridge-509041 kubelet[1232]: E0531 19:39:34.523084 1232 projected.go:198] Error preparing data for projected volume kube-api-access-s68sm for pod default/netcat-7458db8b8-8d2jb: failed to sync configmap cache: timed out waiting for the condition\r\n"} +{"Time":"2023-05-31T19:40:00.413489714Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:34 bridge-509041 kubelet[1232]: E0531 19:39:34.523210 1232 nestedpendingoperations.go:348] Operation for \"{volumeName:kubernetes.io/projected/7d43d3cb-7470-41d6-9a82-e53d6c3f2802-kube-api-access-s68sm podName:7d43d3cb-7470-41d6-9a82-e53d6c3f2802 nodeName:}\" failed. No retries permitted until 2023-05-31 19:39:35.023186597 +0000 UTC m=+57.045611840 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume \"kube-api-access-s68sm\" (UniqueName: \"kubernetes.io/projected/7d43d3cb-7470-41d6-9a82-e53d6c3f2802-kube-api-access-s68sm\") pod \"netcat-7458db8b8-8d2jb\" (UID: \"7d43d3cb-7470-41d6-9a82-e53d6c3f2802\") : failed to sync configmap cache: timed out waiting for the condition\r\n"} +{"Time":"2023-05-31T19:40:00.413496335Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-509041 kubelet[1232]: E0531 19:39:38.598562 1232 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:40:00.413499875Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-509041 kubelet[1232]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:40:00.413503788Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-509041 kubelet[1232]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:40:00.41350754Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-509041 kubelet[1232]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:40:00.413512158Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:51 bridge-509041 kubelet[1232]: E0531 19:39:51.595429 1232 upgradeaware.go:426] Error proxying data from client to backend: readfrom tcp 192.168.122.13:47572-\u003e192.168.122.13:10010: write tcp 192.168.122.13:47572-\u003e192.168.122.13:10010: write: broken pipe\r\n"} +{"Time":"2023-05-31T19:40:00.413590072Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413596837Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413600396Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:40:00.413604179Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413609756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:00.413613729Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:40:00.413617496Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T19:40:00.413620999Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T19:40:00.413624327Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413627769Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:00.413631326Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T19:40:00.413636377Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:40:00.413640153Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T19:40:00.413643789Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T19:40:00.413647066Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413650564Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:00.413654223Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:00.413657796Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413661441Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413666173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:00.413669658Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Wants=containerd.service\r\n"} +{"Time":"2023-05-31T19:40:00.413673071Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.413676356Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:00.413679811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T19:40:00.413924875Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=bridge-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.50.84\r\n"} +{"Time":"2023-05-31T19:40:00.413930059Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.41393361Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:00.413937487Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413940922Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.413944551Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:40:00.413948092Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -- Journal begins at Wed 2023-05-31 19:37:57 UTC, ends at Wed 2023-05-31 19:39:55 UTC. --\r\n"} +{"Time":"2023-05-31T19:40:00.413951542Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:40:00.413955366Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413959687Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413963532Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413967798Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413971648Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413975479Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413978887Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 543.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.413982989Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:40:00.413987884Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.821740 866 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:40:00.413992507Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.821821 866 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:40:00.414243384Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.822131 866 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:40:00.41425754Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.830322 866 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.414263691Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.830428 866 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:40:00.414268837Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.830894 866 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:40:00.414274973Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.831384 866 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:40:00.41428166Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.831488 866 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:40:00.414298467Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.831510 866 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:40:00.414304011Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.831522 866 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:40:00.414308367Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.831598 866 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:00.414316755Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.837928 866 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:40:00.414537342Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.838062 866 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:40:00.414543076Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.838115 866 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:40:00.414547042Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.838137 866 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:40:00.414551587Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: W0531 19:38:27.839697 866 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.414556612Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.839845 866 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.414560947Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.840069 866 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:40:00.414565374Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: W0531 19:38:27.840315 866 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T19:40:00.414569402Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.840667 866 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:40:00.41457394Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: W0531 19:38:27.840801 866 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dbridge-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.414580027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.840871 866 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dbridge-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.414584379Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.844442 866 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:40:00.414812224Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.848627 866 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:40:00.414820322Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.851131 866 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:40:00.414824486Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.852078 866 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:40:00.414831109Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.852601 866 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"bridge-509041.1764519febc58974\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"bridge-509041\", UID:\"bridge-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"bridge-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 38, 27, 840649588, time.Local), LastTimestamp:time.Date("} +{"Time":"2023-05-31T19:40:00.414841603Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"2023, time.May, 31, 19, 38, 27, 840649588, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.50.84:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:40:00.414847588Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.856896 866 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:40:00.414853696Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.857798 866 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/bridge-509041?timeout=10s\\\": dial tcp 192.168.50.84:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T19:40:00.414857669Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: W0531 19:38:27.863762 866 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.414862121Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.863859 866 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.41510494Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.863909 866 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:40:00.41511113Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.894453 866 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:40:00.415116107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.895770 866 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:40:00.415120381Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.895822 866 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:40:00.415124212Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.895842 866 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:40:00.415128027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.895896 866 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:40:00.415150373Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.909568 866 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:40:00.415155336Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:40:00.415161392Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:40:00.415179045Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:40:00.415184551Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: W0531 19:38:27.920215 866 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.415190089Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.920287 866 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.415362833Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.927347 866 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:40:00.415369841Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.927389 866 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:40:00.415375064Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.927405 866 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:00.41538211Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.934062 866 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:40:00.415386934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.936408 866 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:40:00.415391808Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.936474 866 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:00.415396694Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.956883 866 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:40:00.415402256Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.957272 866 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:40:00.415407736Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.960264 866 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415414149Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.960842 866 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.50.84:8443: connect: connection refused\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415420588Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: E0531 19:38:27.961166 866 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"bridge-509041\\\" not found\"\r\n"} +{"Time":"2023-05-31T19:40:00.415426491Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.996408 866 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.415448578Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:27 bridge-509041 kubelet[866]: I0531 19:38:27.999451 866 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.415625968Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.000512 866 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.415634327Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.003308 866 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.415639428Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: E0531 19:38:28.059074 866 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/bridge-509041?timeout=10s\\\": dial tcp 192.168.50.84:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T19:40:00.415646712Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.065669 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/12f3fbffbee24d5bba3b1ee0a55ab306-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-bridge-509041\\\" (UID: \\\"12f3fbffbee24d5bba3b1ee0a55ab306\\\") \" pod=\"kube-system/kube-apiserver-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415654205Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.065727 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-ca-certs\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415661418Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.065750 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-k8s-certs\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415667917Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.065831 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415678388Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.065874 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/c703a2dc0531d662e968046f4f3fdcc0-kubeconfig\\\") pod \\\"kube-scheduler-bridge-509041\\\" (UID: \\\"c703a2dc0531d662e968046f4f3fdcc0\\\") \" pod=\"kube-system/kube-scheduler-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415684569Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.065893 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/3ac86ad654c98d24706bf58ba0916666-etcd-certs\\\") pod \\\"etcd-bridge-509041\\\" (UID: \\\"3ac86ad654c98d24706bf58ba0916666\\\") \" pod=\"kube-system/etcd-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415891142Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.065910 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/12f3fbffbee24d5bba3b1ee0a55ab306-ca-certs\\\") pod \\\"kube-apiserver-bridge-509041\\\" (UID: \\\"12f3fbffbee24d5bba3b1ee0a55ab306\\\") \" pod=\"kube-system/kube-apiserver-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.41589957Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.065931 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/12f3fbffbee24d5bba3b1ee0a55ab306-k8s-certs\\\") pod \\\"kube-apiserver-bridge-509041\\\" (UID: \\\"12f3fbffbee24d5bba3b1ee0a55ab306\\\") \" pod=\"kube-system/kube-apiserver-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415909296Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.066056 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/3ac86ad654c98d24706bf58ba0916666-etcd-data\\\") pod \\\"etcd-bridge-509041\\\" (UID: \\\"3ac86ad654c98d24706bf58ba0916666\\\") \" pod=\"kube-system/etcd-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415916721Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.066109 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-flexvolume-dir\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.41592398Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.066138 866 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-kubeconfig\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415930525Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.162213 866 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415942244Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: E0531 19:38:28.163084 866 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.50.84:8443: connect: connection refused\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.415948515Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: E0531 19:38:28.460502 866 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/bridge-509041?timeout=10s\\\": dial tcp 192.168.50.84:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T19:40:00.416243257Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: I0531 19:38:28.567274 866 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.416256251Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: E0531 19:38:28.567944 866 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.50.84:8443: connect: connection refused\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.416261578Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: W0531 19:38:28.837647 866 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.416266741Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: E0531 19:38:28.837685 866 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.416271626Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: W0531 19:38:28.888720 866 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dbridge-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.416276403Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:28 bridge-509041 kubelet[866]: E0531 19:38:28.888857 866 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dbridge-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.416281696Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:29 bridge-509041 kubelet[866]: W0531 19:38:29.025070 866 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.416286599Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:29 bridge-509041 kubelet[866]: E0531 19:38:29.025102 866 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.416593694Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:29 bridge-509041 kubelet[866]: W0531 19:38:29.041553 866 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.416603104Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:29 bridge-509041 kubelet[866]: E0531 19:38:29.041629 866 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.50.84:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:00.416608967Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:29 bridge-509041 kubelet[866]: E0531 19:38:29.261671 866 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/bridge-509041?timeout=10s\\\": dial tcp 192.168.50.84:8443: connect: connection refused\" interval=\"1.6s\"\r\n"} +{"Time":"2023-05-31T19:40:00.416615003Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:29 bridge-509041 kubelet[866]: I0531 19:38:29.370528 866 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.416619756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:29 bridge-509041 kubelet[866]: E0531 19:38:29.371080 866 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.50.84:8443: connect: connection refused\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.416625616Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:30 bridge-509041 kubelet[866]: I0531 19:38:30.971944 866 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.416630489Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:34 bridge-509041 kubelet[866]: E0531 19:38:34.580641 866 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"bridge-509041\\\" not found\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.416636452Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:34 bridge-509041 kubelet[866]: I0531 19:38:34.625620 866 kubelet_node_status.go:73] \"Successfully registered node\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.416643856Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:34 bridge-509041 kubelet[866]: E0531 19:38:34.666679 866 event.go:280] Server rejected event '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"bridge-509041.1764519febc58974\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"bridge-509041\", UID:\"bridge-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"bridge-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 38, 27, 840649588, time.Local), LastTimestamp:time.Date(2"} +{"Time":"2023-05-31T19:40:00.416911834Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"023, time.May, 31, 19, 38, 27, 840649588, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'namespaces \"default\" not found' (will not retry!)\r\n"} +{"Time":"2023-05-31T19:40:00.416922391Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:34 bridge-509041 kubelet[866]: E0531 19:38:34.727569 866 event.go:280] Server rejected event '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"bridge-509041.1764519ff0d3e92d\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"bridge-509041\", UID:\"bridge-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"NodeHasSufficientMemory\", Message:\"Node bridge-509041 status is now: NodeHasSufficientMemory\", Source:v1.EventSource{Component:\"kubelet\", Host:\"bridge-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 38"} +{"Time":"2023-05-31T19:40:00.416929942Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":", 27, 925477677, time.Local), LastTimestamp:time.Date(2023, time.May, 31, 19, 38, 27, 925477677, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'namespaces \"default\" not found' (will not retry!)\r\n"} +{"Time":"2023-05-31T19:40:00.416934504Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:34 bridge-509041 kubelet[866]: I0531 19:38:34.843952 866 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:40:00.416942803Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:34 bridge-509041 kubelet[866]: I0531 19:38:34.864645 866 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:40:00.416949619Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:34 bridge-509041 kubelet[866]: I0531 19:38:34.924879 866 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:40:00.417230785Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:37 bridge-509041 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T19:40:00.417241511Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.41724674Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417250522Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417254255Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417261801Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417266067Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.41726947Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 597.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.4172734Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:37 bridge-509041 kubelet[866]: I0531 19:38:37.934341 866 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:40:00.417277227Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:37 bridge-509041 systemd[1]: kubelet.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:40:00.417280813Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.41728412Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417287639Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417291249Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417294765Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.41729848Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:37 bridge-509041 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:40:00.417302252Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417305684Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417624646Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417634541Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417638845Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417643012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417646813Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 597 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417650858Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:37 bridge-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:40:00.417655129Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.41765916Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417664068Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417667977Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417671995Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417675885Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417680047Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 597.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.417684956Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:40:00.417689215Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.146057 1232 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:40:00.417693748Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.146138 1232 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:40:00.417698012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.146363 1232 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:40:00.417866443Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.152222 1232 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T19:40:00.417873553Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.154377 1232 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:40:00.417877417Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.163274 1232 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:40:00.417881547Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.163914 1232 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:40:00.417887054Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.164103 1232 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:40:00.417893157Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.164135 1232 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:40:00.417897627Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.164158 1232 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:40:00.417905289Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.164225 1232 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:00.417908914Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.204481 1232 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:40:00.417912589Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.204534 1232 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:40:00.417917644Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.204614 1232 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:40:00.418176947Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.204634 1232 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:40:00.418186939Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.210114 1232 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:40:00.418191533Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.210737 1232 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:40:00.418195669Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.223315 1232 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:40:00.418199692Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.236198 1232 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:40:00.418203723Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.237376 1232 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:40:00.418207773Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.239289 1232 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:40:00.418211865Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.251224 1232 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:40:00.418215717Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.251690 1232 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:40:00.418219701Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.354459 1232 kubelet_node_status.go:70] \"Attempting to register node\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418223789Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.375627 1232 kubelet_node_status.go:108] \"Node was previously registered\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418227611Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.375835 1232 kubelet_node_status.go:73] \"Successfully registered node\" node=\"bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418231117Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.414544 1232 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:40:00.418235109Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.419645 1232 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:40:00.418337185Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.419757 1232 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:40:00.418348428Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.419808 1232 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:40:00.418353129Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: E0531 19:38:38.419879 1232 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:40:00.418371662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: E0531 19:38:38.520376 1232 kubelet.go:2281] \"Skipping pod synchronization\" err=\"container runtime status check may not have completed yet\"\r\n"} +{"Time":"2023-05-31T19:40:00.418376494Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.562602 1232 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:40:00.418380227Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.562658 1232 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:40:00.418384293Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.562682 1232 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:00.418388388Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.562840 1232 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T19:40:00.418394916Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.562888 1232 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T19:40:00.41839895Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.562897 1232 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:40:00.418414336Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.564140 1232 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:40:00.418418425Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.564197 1232 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:00.418422508Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.564395 1232 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T19:40:00.418427259Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.565950 1232 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:40:00.418652335Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.567882 1232 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:40:00.41865889Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.578916 1232 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T19:40:00.418662975Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: E0531 19:38:38.590925 1232 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:40:00.418667511Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:40:00.418672617Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:40:00.418677233Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:40:00.418682219Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.721030 1232 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.418685791Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.721207 1232 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.418690238Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.721278 1232 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.418694667Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.721327 1232 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.418699307Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: E0531 19:38:38.750121 1232 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-bridge-509041\\\" already exists\" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418707934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755458 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/c703a2dc0531d662e968046f4f3fdcc0-kubeconfig\\\") pod \\\"kube-scheduler-bridge-509041\\\" (UID: \\\"c703a2dc0531d662e968046f4f3fdcc0\\\") \" pod=\"kube-system/kube-scheduler-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418714112Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755530 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/12f3fbffbee24d5bba3b1ee0a55ab306-k8s-certs\\\") pod \\\"kube-apiserver-bridge-509041\\\" (UID: \\\"12f3fbffbee24d5bba3b1ee0a55ab306\\\") \" pod=\"kube-system/kube-apiserver-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418911941Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755569 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/12f3fbffbee24d5bba3b1ee0a55ab306-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-bridge-509041\\\" (UID: \\\"12f3fbffbee24d5bba3b1ee0a55ab306\\\") \" pod=\"kube-system/kube-apiserver-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418927757Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755603 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-ca-certs\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418935126Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755631 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-flexvolume-dir\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418942456Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755684 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/3ac86ad654c98d24706bf58ba0916666-etcd-certs\\\") pod \\\"etcd-bridge-509041\\\" (UID: \\\"3ac86ad654c98d24706bf58ba0916666\\\") \" pod=\"kube-system/etcd-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418948763Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755715 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/3ac86ad654c98d24706bf58ba0916666-etcd-data\\\") pod \\\"etcd-bridge-509041\\\" (UID: \\\"3ac86ad654c98d24706bf58ba0916666\\\") \" pod=\"kube-system/etcd-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418955507Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755739 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/12f3fbffbee24d5bba3b1ee0a55ab306-ca-certs\\\") pod \\\"kube-apiserver-bridge-509041\\\" (UID: \\\"12f3fbffbee24d5bba3b1ee0a55ab306\\\") \" pod=\"kube-system/kube-apiserver-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.418981993Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755767 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-k8s-certs\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.419078268Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755796 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-kubeconfig\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.419094268Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:38 bridge-509041 kubelet[1232]: I0531 19:38:38.755825 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/253467ca3d52fd9b224e835b5b9e7dac-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-bridge-509041\\\" (UID: \\\"253467ca3d52fd9b224e835b5b9e7dac\\\") \" pod=\"kube-system/kube-controller-manager-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.419099772Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:39 bridge-509041 kubelet[1232]: I0531 19:38:39.219690 1232 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:40:00.419104073Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:39 bridge-509041 kubelet[1232]: I0531 19:38:39.252214 1232 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:40:00.419108139Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:39 bridge-509041 kubelet[1232]: I0531 19:38:39.260583 1232 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:40:00.419112486Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:39 bridge-509041 kubelet[1232]: E0531 19:38:39.491851 1232 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-bridge-509041\\\" already exists\" pod=\"kube-system/kube-apiserver-bridge-509041\"\r\n"} +{"Time":"2023-05-31T19:40:00.419117796Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:39 bridge-509041 kubelet[1232]: I0531 19:38:39.511322 1232 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-bridge-509041\" podStartSLOduration=1.511284087 podCreationTimestamp=\"2023-05-31 19:38:38 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:39.499184913 +0000 UTC m=+1.521610136\" watchObservedRunningTime=\"2023-05-31 19:38:39.511284087 +0000 UTC m=+1.533709494\"\r\n"} +{"Time":"2023-05-31T19:40:00.41912447Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:39 bridge-509041 kubelet[1232]: I0531 19:38:39.526524 1232 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-bridge-509041\" podStartSLOduration=1.5264244439999999 podCreationTimestamp=\"2023-05-31 19:38:38 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:39.512507675 +0000 UTC m=+1.534932918\" watchObservedRunningTime=\"2023-05-31 19:38:39.526424444 +0000 UTC m=+1.548849686\"\r\n"} +{"Time":"2023-05-31T19:40:00.419236992Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:39 bridge-509041 kubelet[1232]: I0531 19:38:39.539188 1232 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-bridge-509041\" podStartSLOduration=1.539165347 podCreationTimestamp=\"2023-05-31 19:38:38 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:39.527506773 +0000 UTC m=+1.549932015\" watchObservedRunningTime=\"2023-05-31 19:38:39.539165347 +0000 UTC m=+1.561590589\"\r\n"} +{"Time":"2023-05-31T19:40:00.419243607Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: I0531 19:38:50.706688 1232 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.419249078Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: I0531 19:38:50.755621 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/19503d06-3480-43b0-82bb-d557a7e8549e-kube-proxy\\\") pod \\\"kube-proxy-rfrmj\\\" (UID: \\\"19503d06-3480-43b0-82bb-d557a7e8549e\\\") \" pod=\"kube-system/kube-proxy-rfrmj\"\r\n"} +{"Time":"2023-05-31T19:40:00.419254366Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: I0531 19:38:50.755716 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/19503d06-3480-43b0-82bb-d557a7e8549e-xtables-lock\\\") pod \\\"kube-proxy-rfrmj\\\" (UID: \\\"19503d06-3480-43b0-82bb-d557a7e8549e\\\") \" pod=\"kube-system/kube-proxy-rfrmj\"\r\n"} +{"Time":"2023-05-31T19:40:00.419259769Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: I0531 19:38:50.755852 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-68kx6\\\" (UniqueName: \\\"kubernetes.io/projected/19503d06-3480-43b0-82bb-d557a7e8549e-kube-api-access-68kx6\\\") pod \\\"kube-proxy-rfrmj\\\" (UID: \\\"19503d06-3480-43b0-82bb-d557a7e8549e\\\") \" pod=\"kube-system/kube-proxy-rfrmj\"\r\n"} +{"Time":"2023-05-31T19:40:00.419265309Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: I0531 19:38:50.756121 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/19503d06-3480-43b0-82bb-d557a7e8549e-lib-modules\\\") pod \\\"kube-proxy-rfrmj\\\" (UID: \\\"19503d06-3480-43b0-82bb-d557a7e8549e\\\") \" pod=\"kube-system/kube-proxy-rfrmj\"\r\n"} +{"Time":"2023-05-31T19:40:00.419270439Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: I0531 19:38:50.913871 1232 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.41927442Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: E0531 19:38:50.918313 1232 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap \"kube-root-ca.crt\" not found\r\n"} +{"Time":"2023-05-31T19:40:00.419387625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: E0531 19:38:50.918480 1232 projected.go:198] Error preparing data for projected volume kube-api-access-68kx6 for pod kube-system/kube-proxy-rfrmj: configmap \"kube-root-ca.crt\" not found\r\n"} +{"Time":"2023-05-31T19:40:00.419394111Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: E0531 19:38:50.918797 1232 nestedpendingoperations.go:348] Operation for \"{volumeName:kubernetes.io/projected/19503d06-3480-43b0-82bb-d557a7e8549e-kube-api-access-68kx6 podName:19503d06-3480-43b0-82bb-d557a7e8549e nodeName:}\" failed. No retries permitted until 2023-05-31 19:38:51.418772533 +0000 UTC m=+13.441197754 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume \"kube-api-access-68kx6\" (UniqueName: \"kubernetes.io/projected/19503d06-3480-43b0-82bb-d557a7e8549e-kube-api-access-68kx6\") pod \"kube-proxy-rfrmj\" (UID: \"19503d06-3480-43b0-82bb-d557a7e8549e\") : configmap \"kube-root-ca.crt\" not found\r\n"} +{"Time":"2023-05-31T19:40:00.419400395Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: I0531 19:38:50.959590 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/209a0bbf-8522-4f0b-b34f-b85de7c8f31a-config-volume\\\") pod \\\"coredns-5d78c9869d-vpp5g\\\" (UID: \\\"209a0bbf-8522-4f0b-b34f-b85de7c8f31a\\\") \" pod=\"kube-system/coredns-5d78c9869d-vpp5g\"\r\n"} +{"Time":"2023-05-31T19:40:00.419406015Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:50 bridge-509041 kubelet[1232]: I0531 19:38:50.959780 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-7z6sr\\\" (UniqueName: \\\"kubernetes.io/projected/209a0bbf-8522-4f0b-b34f-b85de7c8f31a-kube-api-access-7z6sr\\\") pod \\\"coredns-5d78c9869d-vpp5g\\\" (UID: \\\"209a0bbf-8522-4f0b-b34f-b85de7c8f31a\\\") \" pod=\"kube-system/coredns-5d78c9869d-vpp5g\"\r\n"} +{"Time":"2023-05-31T19:40:00.419410878Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:53 bridge-509041 kubelet[1232]: I0531 19:38:53.388403 1232 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.419415682Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:53 bridge-509041 kubelet[1232]: I0531 19:38:53.394090 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/a211636f-249e-48d4-ac64-135440cb96fe-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"a211636f-249e-48d4-ac64-135440cb96fe\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:40:00.419421395Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:53 bridge-509041 kubelet[1232]: I0531 19:38:53.394126 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-tjlfj\\\" (UniqueName: \\\"kubernetes.io/projected/a211636f-249e-48d4-ac64-135440cb96fe-kube-api-access-tjlfj\\\") pod \\\"storage-provisioner\\\" (UID: \\\"a211636f-249e-48d4-ac64-135440cb96fe\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:40:00.419426987Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:53 bridge-509041 kubelet[1232]: I0531 19:38:53.580788 1232 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-rfrmj\" podStartSLOduration=3.580727255 podCreationTimestamp=\"2023-05-31 19:38:50 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:53.551229301 +0000 UTC m=+15.573654540\" watchObservedRunningTime=\"2023-05-31 19:38:53.580727255 +0000 UTC m=+15.603152495\"\r\n"} +{"Time":"2023-05-31T19:40:00.419550243Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:54 bridge-509041 kubelet[1232]: I0531 19:38:54.559884 1232 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-vpp5g\" podStartSLOduration=4.559830182 podCreationTimestamp=\"2023-05-31 19:38:50 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:53.581591237 +0000 UTC m=+15.604016481\" watchObservedRunningTime=\"2023-05-31 19:38:54.559830182 +0000 UTC m=+16.582255426\"\r\n"} +{"Time":"2023-05-31T19:40:00.419557546Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:58 bridge-509041 kubelet[1232]: I0531 19:38:58.692821 1232 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:40:00.419561812Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:58 bridge-509041 kubelet[1232]: I0531 19:38:58.700031 1232 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:40:00.419567161Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:31 bridge-509041 kubelet[1232]: I0531 19:39:31.317342 1232 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=38.317302247 podCreationTimestamp=\"2023-05-31 19:38:53 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:38:54.560162764 +0000 UTC m=+16.582588006\" watchObservedRunningTime=\"2023-05-31 19:39:31.317302247 +0000 UTC m=+53.339727489\"\r\n"} +{"Time":"2023-05-31T19:40:00.419572659Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:33 bridge-509041 kubelet[1232]: I0531 19:39:33.280250 1232 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:00.41957695Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:33 bridge-509041 kubelet[1232]: W0531 19:39:33.285352 1232 reflector.go:533] object-\"default\"/\"kube-root-ca.crt\": failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:bridge-509041\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"default\": no relationship found between node 'bridge-509041' and this object\r\n"} +{"Time":"2023-05-31T19:40:00.419582418Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:33 bridge-509041 kubelet[1232]: E0531 19:39:33.285505 1232 reflector.go:148] object-\"default\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:bridge-509041\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"default\": no relationship found between node 'bridge-509041' and this object\r\n"} +{"Time":"2023-05-31T19:40:00.41958872Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:33 bridge-509041 kubelet[1232]: I0531 19:39:33.407846 1232 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-s68sm\\\" (UniqueName: \\\"kubernetes.io/projected/7d43d3cb-7470-41d6-9a82-e53d6c3f2802-kube-api-access-s68sm\\\") pod \\\"netcat-7458db8b8-8d2jb\\\" (UID: \\\"7d43d3cb-7470-41d6-9a82-e53d6c3f2802\\\") \" pod=\"default/netcat-7458db8b8-8d2jb\"\r\n"} +{"Time":"2023-05-31T19:40:00.41972174Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:34 bridge-509041 kubelet[1232]: E0531 19:39:34.522910 1232 projected.go:292] Couldn't get configMap default/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition\r\n"} +{"Time":"2023-05-31T19:40:00.419727973Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:34 bridge-509041 kubelet[1232]: E0531 19:39:34.523084 1232 projected.go:198] Error preparing data for projected volume kube-api-access-s68sm for pod default/netcat-7458db8b8-8d2jb: failed to sync configmap cache: timed out waiting for the condition\r\n"} +{"Time":"2023-05-31T19:40:00.41973387Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:34 bridge-509041 kubelet[1232]: E0531 19:39:34.523210 1232 nestedpendingoperations.go:348] Operation for \"{volumeName:kubernetes.io/projected/7d43d3cb-7470-41d6-9a82-e53d6c3f2802-kube-api-access-s68sm podName:7d43d3cb-7470-41d6-9a82-e53d6c3f2802 nodeName:}\" failed. No retries permitted until 2023-05-31 19:39:35.023186597 +0000 UTC m=+57.045611840 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume \"kube-api-access-s68sm\" (UniqueName: \"kubernetes.io/projected/7d43d3cb-7470-41d6-9a82-e53d6c3f2802-kube-api-access-s68sm\") pod \"netcat-7458db8b8-8d2jb\" (UID: \"7d43d3cb-7470-41d6-9a82-e53d6c3f2802\") : failed to sync configmap cache: timed out waiting for the condition\r\n"} +{"Time":"2023-05-31T19:40:00.419739224Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-509041 kubelet[1232]: E0531 19:39:38.598562 1232 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:40:00.419743722Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-509041 kubelet[1232]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:40:00.419747863Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-509041 kubelet[1232]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:40:00.419751658Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:38 bridge-509041 kubelet[1232]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:40:00.419756365Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:51 bridge-509041 kubelet[1232]: E0531 19:39:51.595429 1232 upgradeaware.go:426] Error proxying data from client to backend: readfrom tcp 192.168.122.13:47572-\u003e192.168.122.13:10010: write tcp 192.168.122.13:47572-\u003e192.168.122.13:10010: write: broken pipe\r\n"} +{"Time":"2023-05-31T19:40:00.41976034Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.419763438Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.419766944Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:40:00.419773673Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T19:40:00.419881012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters:\r\n"} +{"Time":"2023-05-31T19:40:00.419885843Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T19:40:00.419894554Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCakNDQWU2Z0F3SUJBZ0lCQVRBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwdGFXNXAKYTNWaVpVTkJNQjRYRFRJek1EVXpNREU0TkRReU1Wb1hEVE16TURVeU9ERTRORFF5TVZvd0ZURVRNQkVHQTFVRQpBeE1LYldsdWFXdDFZbVZEUVRDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBUEpiCnVsSG1TdWthRHJFeWN1RUJ5RVFaaUl5eFBFcjN2eXVWMjNDUVI2T3JDQzI4ak9KYlRzeHMrRVE0dUhGTm5wTTUKdGdvTER2TStabVlRZXJqczcxM2xDOHdORTdVdVFoTWRsV1pPa3Z4Z3ErQTlNNitVZ1V6dmMyUXFFMVZTWldvWgpoWS9yNTRjS01HK2xsZWt0ajVDK3BnRHdOVW5Eb0NjVjI1UDN3bHhwWndrRUN4dUxDNHJ2THh1SFVZN1hIeGNGCllHVCt4MGF3WlN1a0ZXL2FYVXpZODlJYXdXWkoyY3NzOUdkRGR0R0NnNEZ0YllNM0M3VHBJcUs5YU1QcEdHdzkKYTFwNnRqTEFlKzRJT1ZpVzZsNWtWdkUwTVJJZmhqcjdzOW4za3cxaU50c254U0ZUV2I5UEQxUWxyTWJZNVdVRAp3Q0ErNlprQlI2NHVkOUZya24wQ0F3RUFBYU5oTUY4d0RnWURWUjBQQVFIL0JBUURBZ0trTUIwR0ExVWRKUVFXCk1CUUdDQ3NHQVFVRkJ3TUNCZ2dyQmdFRkJRY0RBVEFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVcKQkJUTy9vK0Zpc1BrVllLVkJERGU0cUFVWDBNWThUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFjTm9p"} +{"Time":"2023-05-31T19:40:00.419900252Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"UjY3QwpBNXcxQzg2MWNYMVV6MlN5WlNjT05GeG9mNmRSWTB6T2ZrQ0gzNDJPS1pEQnhOcmZmOGNkL3kwMUE4RmZYQXlHCmNkeDFJM3lQREJ1OHIzOW82eSt4c0FpRGNSSnMyUmY3UU5BTWV2MEszbm8zQlpoc1loeDdNNXllZ2hNemdxTW4KUU50bnY3T2lYTllMVFpRZDd6dSs5Y3NNbXRnNDBLUU9DWUQyTG1jMkpOWHRSNjcyT013eGpkRG5hNVpGZlZSMgpEcXR6SFRlTFZrSXhIUi9UT0hoQ09xSm0yMHF6dEVjRVd2d3hXcm1rdk5QNkFURnVHck1UVlVRRjBybFQrMDNwCnluUHdmdFRZbXJjOEVwWDUzUmVaUlVHWHZEM1N4QnlKWFdySGEzNFJhQURGaGEvdnJMZTN3ZEppNVlLRFZrVWIKN0NnQkFieU9VWXM1cmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T19:40:00.419904993Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T19:40:00.419908906Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: mk\r\n"} +{"Time":"2023-05-31T19:40:00.419912148Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts:\r\n"} +{"Time":"2023-05-31T19:40:00.419915352Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - context:\r\n"} +{"Time":"2023-05-31T19:40:00.419918491Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T19:40:00.41992312Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user: system:node:bridge-509041\r\n"} +{"Time":"2023-05-31T19:40:00.419927041Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: system:node:bridge-509041@mk\r\n"} +{"Time":"2023-05-31T19:40:00.419930676Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: system:node:bridge-509041@mk\r\n"} +{"Time":"2023-05-31T19:40:00.419934774Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T19:40:00.419938162Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T19:40:00.419941521Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users:\r\n"} +{"Time":"2023-05-31T19:40:00.419944571Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - name: system:node:bridge-509041\r\n"} +{"Time":"2023-05-31T19:40:00.419948154Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user:\r\n"} +{"Time":"2023-05-31T19:40:00.419951858Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:40:00.420036494Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:40:00.420041446Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.420044882Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.420048505Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:40:00.420052406Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T19:40:00.420056029Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authentication:\r\n"} +{"Time":"2023-05-31T19:40:00.420059527Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T19:40:00.420062934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T19:40:00.420068135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:40:00.420071848Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420075384Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T19:40:00.420078675Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" x509:\r\n"} +{"Time":"2023-05-31T19:40:00.420082005Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T19:40:00.420085006Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authorization:\r\n"} +{"Time":"2023-05-31T19:40:00.420089739Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T19:40:00.420093531Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:40:00.420096869Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420100386Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420103531Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T19:40:00.420107179Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T19:40:00.420110612Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T19:40:00.420113995Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T19:40:00.420117669Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.420121042Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420124446Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T19:40:00.420127533Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:40:00.420130934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:40:00.420177788Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T19:40:00.420181612Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420184921Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T19:40:00.420187988Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420191542Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T19:40:00.420194869Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T19:40:00.420198186Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T19:40:00.420201552Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420204719Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T19:40:00.420208221Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420211599Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T19:40:00.420215107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" logging:\r\n"} +{"Time":"2023-05-31T19:40:00.42021833Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T19:40:00.420221404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" options:\r\n"} +{"Time":"2023-05-31T19:40:00.420224425Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" json:\r\n"} +{"Time":"2023-05-31T19:40:00.420227895Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T19:40:00.420231692Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T19:40:00.420235147Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T19:40:00.42023864Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420242051Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420245169Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resolvConf: /run/systemd/resolve/resolv.conf\r\n"} +{"Time":"2023-05-31T19:40:00.420248693Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T19:40:00.420252111Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T19:40:00.420255724Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420259019Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420262203Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T19:40:00.420265873Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.420350668Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.42035472Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:40:00.42035786Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.420361045Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.420364268Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:40:00.4203685Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.42037168Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters:\n"} +{"Time":"2023-05-31T19:40:00.42037472Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:40:00.420378025Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:40:00.420382195Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extensions:\n"} +{"Time":"2023-05-31T19:40:00.420385831Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - extension:\n"} +{"Time":"2023-05-31T19:40:00.420389124Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" last-update: Wed, 31 May 2023 19:38:51 UTC\n"} +{"Time":"2023-05-31T19:40:00.420393007Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.420398102Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:40:00.420401541Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:40:00.420404862Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://192.168.50.84:8443\n"} +{"Time":"2023-05-31T19:40:00.420409277Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.420412793Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:40:00.42041632Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:40:00.420419805Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extensions:\n"} +{"Time":"2023-05-31T19:40:00.42042294Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - extension:\n"} +{"Time":"2023-05-31T19:40:00.420426727Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" last-update: Wed, 31 May 2023 19:39:20 UTC\n"} +{"Time":"2023-05-31T19:40:00.420430135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.420434149Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:40:00.420437544Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:40:00.420441067Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://192.168.61.47:8443\n"} +{"Time":"2023-05-31T19:40:00.4204448Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: flannel-509041\n"} +{"Time":"2023-05-31T19:40:00.42047216Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts:\n"} +{"Time":"2023-05-31T19:40:00.420476004Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - context:\n"} +{"Time":"2023-05-31T19:40:00.420479537Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cluster: bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.420482901Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extensions:\n"} +{"Time":"2023-05-31T19:40:00.420486659Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - extension:\n"} +{"Time":"2023-05-31T19:40:00.420490172Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" last-update: Wed, 31 May 2023 19:38:51 UTC\n"} +{"Time":"2023-05-31T19:40:00.420494031Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.420497813Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:40:00.420501326Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:40:00.420504577Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:40:00.42050809Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user: bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.420511234Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.420515849Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - context:\n"} +{"Time":"2023-05-31T19:40:00.420519218Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cluster: flannel-509041\n"} +{"Time":"2023-05-31T19:40:00.420522835Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extensions:\n"} +{"Time":"2023-05-31T19:40:00.420526088Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - extension:\n"} +{"Time":"2023-05-31T19:40:00.420529151Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" last-update: Wed, 31 May 2023 19:39:20 UTC\n"} +{"Time":"2023-05-31T19:40:00.420532673Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.420536516Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:40:00.420540098Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:40:00.420543448Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:40:00.420565061Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user: flannel-509041\n"} +{"Time":"2023-05-31T19:40:00.420569325Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: flannel-509041\n"} +{"Time":"2023-05-31T19:40:00.420572787Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: flannel-509041\n"} +{"Time":"2023-05-31T19:40:00.42057635Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:40:00.420579731Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:40:00.420583404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users:\n"} +{"Time":"2023-05-31T19:40:00.420587113Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - name: bridge-509041\n"} +{"Time":"2023-05-31T19:40:00.420736457Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user:\n"} +{"Time":"2023-05-31T19:40:00.420741173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt\n"} +{"Time":"2023-05-31T19:40:00.420744806Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.key\n"} +{"Time":"2023-05-31T19:40:00.420748616Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - name: flannel-509041\n"} +{"Time":"2023-05-31T19:40:00.420752112Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user:\n"} +{"Time":"2023-05-31T19:40:00.420755694Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt\n"} +{"Time":"2023-05-31T19:40:00.420759772Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.key\n"} +{"Time":"2023-05-31T19:40:00.420763298Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.420766633Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.42076999Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:40:00.420773543Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.42077721Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" items:\n"} +{"Time":"2023-05-31T19:40:00.420780131Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.420783585Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.420787002Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:00.420790554Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.420794192Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:00.42079813Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:00.420801727Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:00.420805669Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:00.42080929Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:00.420812666Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:00.420816235Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:00.420820126Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:00.420964311Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:00.420969993Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:00.420973878Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:00.420977395Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:00.420980959Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:00.420985138Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:00.42098874Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:00.420991925Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:00.4209958Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:00.420999353Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.421002592Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.421005934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.421014306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:00.421018295Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:00.421021756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:00.421026166Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:00.421029858Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:00.421033124Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:50Z\"\n"} +{"Time":"2023-05-31T19:40:00.42103839Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:00.421041542Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:40:00.421047066Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"352\"\n"} +{"Time":"2023-05-31T19:40:00.421050976Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 4b774899-3ffb-4be3-8e20-c22eb587f314\n"} +{"Time":"2023-05-31T19:40:00.421054359Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.421141194Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.421145884Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:00.421149531Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.421153137Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:00.421156923Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:00.421161331Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:00.421164976Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:00.421168545Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:00.421174847Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:00.421178544Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:00.421182137Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:00.421186133Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:00.421189649Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:00.421193095Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:00.421197238Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:00.421200867Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:00.421204365Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:00.421208431Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:00.421212393Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:00.421215536Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:00.421219244Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.421223035Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.421226352Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.42133068Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:00.421335668Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:00.421339103Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:00.421342686Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:00.421346594Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:00.421351175Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:50Z\"\n"} +{"Time":"2023-05-31T19:40:00.421354958Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:00.421358398Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T19:40:00.421361864Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"359\"\n"} +{"Time":"2023-05-31T19:40:00.421365596Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 74fa29b4-a10b-49ec-adb2-ca18c5724ff3\n"} +{"Time":"2023-05-31T19:40:00.421368929Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.42137189Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.421375405Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" jws-kubeconfig-zdxzqg: eyJhbGciOiJIUzI1NiIsImtpZCI6InpkeHpxZyJ9..mKNS6oJ6aqLSEoTLAGwjV4n3UHF5WsKAuKhXfOtAGPA\n"} +{"Time":"2023-05-31T19:40:00.421379278Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T19:40:00.421382959Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.421386316Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters:\n"} +{"Time":"2023-05-31T19:40:00.42139305Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:40:00.421399651Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:40:00.421405653Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"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\n"} +{"Time":"2023-05-31T19:40:00.421570621Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:40:00.421581933Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: \"\"\n"} +{"Time":"2023-05-31T19:40:00.421587203Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts: null\n"} +{"Time":"2023-05-31T19:40:00.421591206Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:40:00.421595518Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:40:00.421599662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:40:00.42160356Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users: null\n"} +{"Time":"2023-05-31T19:40:00.421607394Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.421611207Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.421615126Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:37Z\"\n"} +{"Time":"2023-05-31T19:40:00.421619349Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T19:40:00.421623791Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:40:00.421627566Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"349\"\n"} +{"Time":"2023-05-31T19:40:00.421631782Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 4a62b2dd-82a5-4e6e-a998-7fc3b8555c50\n"} +{"Time":"2023-05-31T19:40:00.421635995Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.421639687Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.421643592Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:00.421647364Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.421651362Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:00.421659527Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:00.421663756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:00.421667843Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:00.421671844Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:00.421828221Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:00.421836807Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:00.421841157Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:00.421845694Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:00.421849552Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:00.421856752Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:00.421861405Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:00.421865447Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:00.421869967Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:00.421874222Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:00.421878285Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:00.421881956Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:00.421886388Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.421890531Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.421894765Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.421898682Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:00.421902718Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:00.421906498Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:00.421911031Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:00.421915421Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:00.421919102Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:50Z\"\n"} +{"Time":"2023-05-31T19:40:00.421923455Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:00.422007573Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:40:00.422015344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"367\"\n"} +{"Time":"2023-05-31T19:40:00.42201951Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: ab48cf03-43da-4648-b902-b29b62e678a8\n"} +{"Time":"2023-05-31T19:40:00.422023662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.422027609Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.422031832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Corefile: |\n"} +{"Time":"2023-05-31T19:40:00.422035445Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" .:53 {\n"} +{"Time":"2023-05-31T19:40:00.422038857Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" log\n"} +{"Time":"2023-05-31T19:40:00.422042406Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" errors\n"} +{"Time":"2023-05-31T19:40:00.422046062Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" health {\n"} +{"Time":"2023-05-31T19:40:00.422049802Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T19:40:00.422053306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T19:40:00.422057068Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ready\n"} +{"Time":"2023-05-31T19:40:00.42206107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T19:40:00.422065015Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pods insecure\n"} +{"Time":"2023-05-31T19:40:00.422068667Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T19:40:00.42207259Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ttl 30\n"} +{"Time":"2023-05-31T19:40:00.422076227Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T19:40:00.422079641Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T19:40:00.422083346Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hosts {\n"} +{"Time":"2023-05-31T19:40:00.422086999Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 192.168.50.1 host.minikube.internal\n"} +{"Time":"2023-05-31T19:40:00.422094362Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fallthrough\n"} +{"Time":"2023-05-31T19:40:00.422097874Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T19:40:00.422101389Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T19:40:00.422105338Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T19:40:00.422109016Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T19:40:00.422112732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cache 30\n"} +{"Time":"2023-05-31T19:40:00.422153598Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" loop\n"} +{"Time":"2023-05-31T19:40:00.422162506Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" reload\n"} +{"Time":"2023-05-31T19:40:00.422166885Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" loadbalance\n"} +{"Time":"2023-05-31T19:40:00.422170464Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\n"} +{"Time":"2023-05-31T19:40:00.422174152Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.422178032Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.422181536Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:37Z\"\n"} +{"Time":"2023-05-31T19:40:00.422185213Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: coredns\n"} +{"Time":"2023-05-31T19:40:00.422188811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.422192614Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"395\"\n"} +{"Time":"2023-05-31T19:40:00.422196638Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 3a7de385-35a5-4b3e-9026-6d09c522da90\n"} +{"Time":"2023-05-31T19:40:00.422199955Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.42220326Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.422211538Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T19:40:00.422215229Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.422219346Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:00.422223464Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:00.422227509Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:00.422231582Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:00.42223561Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:00.422240017Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:00.422244337Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:00.422248386Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:00.422252432Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:00.422256346Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:00.422462307Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:00.422469591Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:00.422475721Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:00.422480192Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:00.422484702Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:00.422488657Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:00.422494304Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:00.422498259Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.422501889Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T19:40:00.422505942Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T19:40:00.422516723Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.42252071Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T19:40:00.422524683Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM4MjVaFw0zMzA1MjgxOTM4MjVaMBkxFzAV\n"} +{"Time":"2023-05-31T19:40:00.422529184Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T19:40:00.422533169Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CgKCAQEAomWKmKS8KN+1MTkpRoIrVqn6errxVhLmcG9f5GFkbW51iRciZbGnTS4Z\n"} +{"Time":"2023-05-31T19:40:00.422537437Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" lKcaOr9Mvru88Dbxd0e4uekN4q79vdDDX+MYq4RV3tj5ve7CdlgIIvEa61pAE1Hc\n"} +{"Time":"2023-05-31T19:40:00.422541661Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" XwTU8xh8jYl2fqaS6Dqo0jsAaulR7cKo1aMSzusZByMBnsRRn1bn+nrp4EbzodPP\n"} +{"Time":"2023-05-31T19:40:00.422545609Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nXelFNj8sG3Kjw2HnTdtdegiQryBltHtdGPNNDCe9d4EOds9Eyu7Wr8crBJftSQF\n"} +{"Time":"2023-05-31T19:40:00.422549408Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" yzj3dBIdtojOiVoxukM2oQ9wwlCUakNEXvOA6xkeOlCmfR05CCd078pa270mblmu\n"} +{"Time":"2023-05-31T19:40:00.422553115Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nQMVE+AIY1Bzs3S/ffFmra9H8ZGmXwIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T19:40:00.42256347Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU+CDmp/NDGAgk3Xr1y0Z9Y7Mr+Xww\n"} +{"Time":"2023-05-31T19:40:00.422567369Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBADHY\n"} +{"Time":"2023-05-31T19:40:00.422769011Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pRo83jJcA4eHYQbz7k+y5V6T7np6B3xHkxWRBhSTEKjjfmJArOYRm8tYY1G7ICyz\n"} +{"Time":"2023-05-31T19:40:00.422782497Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 2HbCDZQenk2YI9ny/OKScMDyKDFNEp0CHDRFvrJ6h5tCQNpLXA1y2VaWreGT5hjP\n"} +{"Time":"2023-05-31T19:40:00.422786931Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 6FtMeg1Rq2+DRguypvmvi6w1th5VtFxwqtJ88a4npy+NFpw4ICH89AUO8jebL9ez\n"} +{"Time":"2023-05-31T19:40:00.422790773Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Ai/yJ75Q3id8Fjnjkg7njbgtfSSAvonFhAYJFmt3PI4cqNJnk+EwUORr5vn76UYl\n"} +{"Time":"2023-05-31T19:40:00.422798368Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MUya+1vINhNigRszBwok1kNxHmneZybsGglWd3WzxzKiVyvHHdtn/rHz+zjUnhYW\n"} +{"Time":"2023-05-31T19:40:00.42280266Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" GmsHmom+gcltMihs0OI=\n"} +{"Time":"2023-05-31T19:40:00.422808542Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.422812565Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T19:40:00.4231348Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T19:40:00.423145469Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T19:40:00.423149799Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.423153867Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.423157534Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:34Z\"\n"} +{"Time":"2023-05-31T19:40:00.42316161Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T19:40:00.423165896Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.423170059Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"19\"\n"} +{"Time":"2023-05-31T19:40:00.423174212Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 5a8aa0c7-e43d-4770-a213-7d7e24d64338\n"} +{"Time":"2023-05-31T19:40:00.423178156Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.423182307Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.423189494Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T19:40:00.423193973Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.423197458Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.423201274Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:34Z\"\n"} +{"Time":"2023-05-31T19:40:00.423205361Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T19:40:00.42320924Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.423212748Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"39\"\n"} +{"Time":"2023-05-31T19:40:00.423216341Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 7ae2ad50-f225-4d56-ad92-3a2135059527\n"} +{"Time":"2023-05-31T19:40:00.423219786Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.423223405Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.423226705Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T19:40:00.42323065Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T19:40:00.423234152Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T19:40:00.423237728Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T19:40:00.423241378Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clientConnection:\n"} +{"Time":"2023-05-31T19:40:00.423245172Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423248713Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" burst: 0\n"} +{"Time":"2023-05-31T19:40:00.423252619Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423256519Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T19:40:00.423261665Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" qps: 0\n"} +{"Time":"2023-05-31T19:40:00.423265552Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:40:00.423283557Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.42328778Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conntrack:\n"} +{"Time":"2023-05-31T19:40:00.423291685Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T19:40:00.423295816Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" min: null\n"} +{"Time":"2023-05-31T19:40:00.423299335Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:00.423303095Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:00.423306608Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" detectLocal:\n"} +{"Time":"2023-05-31T19:40:00.423310223Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423313625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423324418Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423328484Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T19:40:00.42333426Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423338204Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423341854Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" iptables:\n"} +{"Time":"2023-05-31T19:40:00.423345372Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T19:40:00.423349036Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T19:40:00.423352794Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T19:40:00.423356289Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.423360329Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.423364094Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ipvs:\n"} +{"Time":"2023-05-31T19:40:00.42336783Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T19:40:00.42337134Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.423469951Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423476093Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" strictARP: false\n"} +{"Time":"2023-05-31T19:40:00.423478974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.423482087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:00.423485214Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:00.42350051Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:00.42350474Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T19:40:00.423508504Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T19:40:00.423512257Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423515791Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T19:40:00.423519504Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T19:40:00.423522732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423526904Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T19:40:00.42353022Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" winkernel:\n"} +{"Time":"2023-05-31T19:40:00.423533594Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T19:40:00.423536871Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T19:40:00.42354014Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423550876Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423554067Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T19:40:00.423557854Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T19:40:00.423563387Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.4235667Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:40:00.423570064Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters:\n"} +{"Time":"2023-05-31T19:40:00.423573166Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:40:00.423576456Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T19:40:00.423580109Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:40:00.42358346Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: default\n"} +{"Time":"2023-05-31T19:40:00.423587126Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts:\n"} +{"Time":"2023-05-31T19:40:00.423590503Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - context:\n"} +{"Time":"2023-05-31T19:40:00.423594162Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cluster: default\n"} +{"Time":"2023-05-31T19:40:00.423597658Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:40:00.423600853Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user: default\n"} +{"Time":"2023-05-31T19:40:00.423603903Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: default\n"} +{"Time":"2023-05-31T19:40:00.423607253Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: default\n"} +{"Time":"2023-05-31T19:40:00.423610399Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users:\n"} +{"Time":"2023-05-31T19:40:00.42361344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - name: default\n"} +{"Time":"2023-05-31T19:40:00.42361655Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" user:\n"} +{"Time":"2023-05-31T19:40:00.423619641Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T19:40:00.42362289Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.423626012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.423629454Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:38Z\"\n"} +{"Time":"2023-05-31T19:40:00.423632781Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" labels:\n"} +{"Time":"2023-05-31T19:40:00.423636029Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.423997119Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T19:40:00.424007263Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.424011243Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"269\"\n"} +{"Time":"2023-05-31T19:40:00.424014847Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 6ccc8ca7-3521-4c02-aadb-d9c9db6d4432\n"} +{"Time":"2023-05-31T19:40:00.424018583Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.424021851Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.424025208Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:00.424028613Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.424031798Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:00.424035995Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:00.424039762Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:00.424043466Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:00.424047622Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:00.424051755Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:00.424055995Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:00.424063572Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:00.424067145Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:00.424070663Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:00.424074863Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:00.424078178Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:00.424081805Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:00.424085831Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:00.424089732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:00.424428317Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:00.424437352Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:00.424441651Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:00.424446231Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.424449405Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.424453025Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:00.424457025Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:00.42446076Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:00.424464773Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:00.42446919Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:00.42447284Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:50Z\"\n"} +{"Time":"2023-05-31T19:40:00.424476907Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:00.42448045Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.424484029Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"371\"\n"} +{"Time":"2023-05-31T19:40:00.424489962Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 4a6fcaa7-484c-464e-a416-857eb61ae953\n"} +{"Time":"2023-05-31T19:40:00.424493732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.42449739Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.424501433Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T19:40:00.424505847Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiServer:\n"} +{"Time":"2023-05-31T19:40:00.424509087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certSANs:\n"} +{"Time":"2023-05-31T19:40:00.424512107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T19:40:00.4245156Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - localhost\n"} +{"Time":"2023-05-31T19:40:00.424518827Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - 192.168.50.84\n"} +{"Time":"2023-05-31T19:40:00.424522532Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:40:00.424526179Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T19:40:00.424529877Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:40:00.424789683Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T19:40:00.424797378Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:40:00.424800876Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:40:00.424804171Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T19:40:00.424807456Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:40:00.424811309Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" controllerManager:\n"} +{"Time":"2023-05-31T19:40:00.424814676Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:40:00.42481782Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T19:40:00.424822029Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:40:00.424825671Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dns: {}\n"} +{"Time":"2023-05-31T19:40:00.424829477Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" etcd:\n"} +{"Time":"2023-05-31T19:40:00.424833302Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" local:\n"} +{"Time":"2023-05-31T19:40:00.424836826Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:40:00.424840227Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:40:00.424843693Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T19:40:00.424847559Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T19:40:00.424851369Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T19:40:00.424854645Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T19:40:00.424857903Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" networking:\n"} +{"Time":"2023-05-31T19:40:00.42487055Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T19:40:00.424876349Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:40:00.424879645Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T19:40:00.424882947Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" scheduler:\n"} +{"Time":"2023-05-31T19:40:00.424886176Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:40:00.424890302Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:40:00.425211811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.425220019Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.425223946Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:36Z\"\n"} +{"Time":"2023-05-31T19:40:00.425227666Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T19:40:00.425231193Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.425236683Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"233\"\n"} +{"Time":"2023-05-31T19:40:00.425240531Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: 448ff3f4-1cbf-424b-ad40-7d960e58f8b5\n"} +{"Time":"2023-05-31T19:40:00.425244211Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:00.425247739Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" data:\n"} +{"Time":"2023-05-31T19:40:00.425251171Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kubelet: |\n"} +{"Time":"2023-05-31T19:40:00.425254898Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T19:40:00.425258861Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authentication:\n"} +{"Time":"2023-05-31T19:40:00.42526247Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" anonymous:\n"} +{"Time":"2023-05-31T19:40:00.425266213Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enabled: false\n"} +{"Time":"2023-05-31T19:40:00.425269518Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" webhook:\n"} +{"Time":"2023-05-31T19:40:00.425272588Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T19:40:00.425276933Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enabled: true\n"} +{"Time":"2023-05-31T19:40:00.425280141Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" x509:\n"} +{"Time":"2023-05-31T19:40:00.425283596Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:40:00.425288055Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" authorization:\n"} +{"Time":"2023-05-31T19:40:00.425291381Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T19:40:00.425294687Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" webhook:\n"} +{"Time":"2023-05-31T19:40:00.42529772Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:40:00.425301307Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:40:00.425304757Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T19:40:00.425308144Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T19:40:00.425311694Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T19:40:00.425459759Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T19:40:00.425466058Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T19:40:00.425472333Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.425476005Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" evictionHard:\n"} +{"Time":"2023-05-31T19:40:00.4254793Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T19:40:00.425482626Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T19:40:00.425485781Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T19:40:00.425489094Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.425492341Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T19:40:00.42549568Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:00.425498973Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T19:40:00.425502205Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T19:40:00.42550549Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T19:40:00.425514811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:00.425518147Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T19:40:00.42552172Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T19:40:00.425524839Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T19:40:00.425527978Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" logging:\n"} +{"Time":"2023-05-31T19:40:00.425531104Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T19:40:00.425534406Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" options:\n"} +{"Time":"2023-05-31T19:40:00.42553699Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" json:\n"} +{"Time":"2023-05-31T19:40:00.425538999Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T19:40:00.425541062Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T19:40:00.425543137Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T19:40:00.425545618Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:00.42554758Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:00.425549568Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resolvConf: /run/systemd/resolve/resolv.conf\n"} +{"Time":"2023-05-31T19:40:00.425788135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T19:40:00.425794206Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T19:40:00.425797833Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.425801154Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T19:40:00.425805288Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T19:40:00.42580848Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:00.425812102Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:00.425815558Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:00.425819071Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:00.425822479Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.425825896Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" creationTimestamp: \"2023-05-31T19:38:36Z\"\n"} +{"Time":"2023-05-31T19:40:00.425829419Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T19:40:00.42583288Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:00.425836199Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"236\"\n"} +{"Time":"2023-05-31T19:40:00.425839616Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid: f782b82f-ae08-4c12-b23f-1da0051f7749\n"} +{"Time":"2023-05-31T19:40:00.425842953Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: List\n"} +{"Time":"2023-05-31T19:40:00.425846388Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:00.425849384Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T19:40:00.425852745Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.425856075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.425859548Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:40:00.425863222Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ● docker.service\r\n"} +{"Time":"2023-05-31T19:40:00.425867736Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: masked (Reason: Unit docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:40:00.425871346Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T19:40:00.425875185Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:40:00.425880805Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.425884138Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426148523Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:40:00.42615576Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;35m# Unit docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:40:00.426159751Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426163346Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426166671Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:40:00.426170399Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:00.426173733Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"exec-opts\": [\r\n"} +{"Time":"2023-05-31T19:40:00.426177449Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"native.cgroupdriver=systemd\"\r\n"} +{"Time":"2023-05-31T19:40:00.426181413Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ],\r\n"} +{"Time":"2023-05-31T19:40:00.426185226Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T19:40:00.426188864Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T19:40:00.426192622Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T19:40:00.426196704Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:00.426200493Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T19:40:00.426204131Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:00.426207539Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426210728Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426214376Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:40:00.426217906Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Client:\r\n"} +{"Time":"2023-05-31T19:40:00.42622149Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T19:40:00.426225218Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Context: default\r\n"} +{"Time":"2023-05-31T19:40:00.426228768Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T19:40:00.426239105Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.426242775Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Server:\r\n"} +{"Time":"2023-05-31T19:40:00.426246515Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ERROR: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?\r\n"} +{"Time":"2023-05-31T19:40:00.426250756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" errors pretty printing info\r\n"} +{"Time":"2023-05-31T19:40:00.426256077Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:40:00.426259758Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426358833Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426364811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:40:00.426368577Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;31m●\u001b[0m cri-docker.service\r\n"} +{"Time":"2023-05-31T19:40:00.426372457Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: masked (Reason: Unit cri-docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:40:00.42637612Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: \u001b[0;1;31mfailed\u001b[0m (Result: exit-code) since Wed 2023-05-31 19:38:08 UTC; 1min 48s ago\r\n"} +{"Time":"2023-05-31T19:40:00.426380143Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TriggeredBy: \u001b[0;1;31m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:40:00.42638367Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Main PID: 453 (code=exited, status=1/FAILURE)\r\n"} +{"Time":"2023-05-31T19:40:00.42638702Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.426390613Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:06 minikube systemd[1]: \u001b[0;1;39m\u001b[0;1;31m\u001b[0;1;39mcri-docker.service: Main process exited, code=exited, status=1/FAILURE\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.4263948Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:06 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.426398915Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:06 minikube systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.426403438Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:08 minikube systemd[1]: cri-docker.service: Scheduled restart job, restart counter is at 3.\r\n"} +{"Time":"2023-05-31T19:40:00.426407542Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:08 minikube systemd[1]: Stopped CRI Interface for Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T19:40:00.42641239Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:08 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Start request repeated too quickly.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.426415817Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:08 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.426419849Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:08 minikube systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.426423431Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:40:00.426426307Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426429413Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426432354Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:40:00.426829028Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;35m# Unit cri-docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:40:00.426837592Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.42684072Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426843822Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:40:00.426847425Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cat: /etc/systemd/system/cri-docker.service.d/10-cni.conf: No such file or directory\r\n"} +{"Time":"2023-05-31T19:40:00.426851151Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:40:00.426854239Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426857218Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.426860332Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:40:00.426863503Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:00.426866745Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T19:40:00.42686992Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T19:40:00.426873238Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T19:40:00.42687686Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:40:00.42688006Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:40:00.426883444Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.42688635Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:00.426889421Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:40:00.426892449Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T19:40:00.426895655Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:40:00.426899233Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T19:40:00.426902597Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T19:40:00.42690581Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:40:00.426909094Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.426912199Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T19:40:00.426916445Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T19:40:00.427328739Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:40:00.427336225Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T19:40:00.427340212Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.427343759Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T19:40:00.427347306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T19:40:00.427350957Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:40:00.427354432Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T19:40:00.42735787Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.427361209Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:40:00.427364708Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:40:00.427371063Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.427374741Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.427378026Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.427381121Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.42738438Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T19:40:00.427388253Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T19:40:00.427391842Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.427395006Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:40:00.427397926Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:40:00.427400959Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.427404195Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:00.427407455Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:00.427411159Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.427414469Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.427417729Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:40:00.428124689Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cri-dockerd 0.3.2 (23513f4)\r\n"} +{"Time":"2023-05-31T19:40:00.428134891Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.428138667Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.428142696Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:40:00.428146811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T19:40:00.428151674Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: loaded (\u001b]8;;file://bridge-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: disabled)\r\n"} +{"Time":"2023-05-31T19:40:00.428156713Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:38:22 UTC; 1min 36s ago\r\n"} +{"Time":"2023-05-31T19:40:00.428161388Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:40:00.428165703Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Main PID: 667 (containerd)\r\n"} +{"Time":"2023-05-31T19:40:00.42816966Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Tasks: 107 (limit: 8192)\r\n"} +{"Time":"2023-05-31T19:40:00.428173944Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Memory: 200.2M\r\n"} +{"Time":"2023-05-31T19:40:00.428177748Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T19:40:00.428185554Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─ 667 /usr/bin/containerd --root /mnt/vda1/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:40:00.428189759Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─ 909 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 91eaad321c9e105e0df2578d19c7318f2b67d70dc5c633ffed2769a19b0e7401 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:00.428194083Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─ 943 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id bffe6c2f6b5d8c32e4fc9cc30b0a18a80397b7d52d9db9bf088a62119cee2866 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:00.428198602Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─ 945 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 3b5a915ce72f336601c7c68dc2207feb36435e4d1872ab20287b15a41e949491 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:00.42820336Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─ 964 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0d906d76b7e2a085b94e56472c5e8e8b90c8741566f750082b135ea8e38c1708 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:00.428208768Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─1477 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ed64e893a76dc06526bdb86738eb30e5c2f9cd9c9983623a5a6adfe4fb1b4501 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:00.428213245Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─1518 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 13caf34c4f056aa560bf2bb8831cc31031003cbd6cd4ee4a0e4e2dd35c029fd0 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:00.428658556Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ├─1722 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id dda219725cab3a2f03f074ab29fa6788d1738c4cb35ae34cdc240c7c967811ea -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:00.428671229Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" └─1853 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:00.428676279Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.428680831Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.287777024Z\" level=info msg=\"stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: active requests=0, bytes read=51164237\"\r\n"} +{"Time":"2023-05-31T19:40:00.428686257Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.290085341Z\" level=info msg=\"ImageCreate event name:\\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:40:00.428692194Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.293865316Z\" level=info msg=\"ImageUpdate event name:\\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:40:00.428698136Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.298394188Z\" level=info msg=\"ImageCreate event name:\\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:40:00.428704384Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.300133196Z\" level=info msg=\"Pulled image \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" with image id \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\", repo tag \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\", repo digest \\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\", size \\\"51155161\\\" in 2.485540589s\"\r\n"} +{"Time":"2023-05-31T19:40:00.428711706Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.300223990Z\" level=info msg=\"PullImage \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" returns image reference \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\"\"\r\n"} +{"Time":"2023-05-31T19:40:00.428716989Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.309453307Z\" level=info msg=\"CreateContainer within sandbox \\\"03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2\\\" for container \u0026ContainerMetadata{Name:dnsutils,Attempt:0,}\"\r\n"} +{"Time":"2023-05-31T19:40:00.428725393Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.340188564Z\" level=info msg=\"CreateContainer within sandbox \\\"03f87517c7b043d9517ee04e9e76f3c0a3f838deff33356e1679df3ff7df89d2\\\" for \u0026ContainerMetadata{Name:dnsutils,Attempt:0,} returns container id \\\"284c326637c6549723b2ac11104235850358e846bbcc8d8cf49ad1a4b95d5909\\\"\"\r\n"} +{"Time":"2023-05-31T19:40:00.429120076Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.341241998Z\" level=info msg=\"StartContainer for \\\"284c326637c6549723b2ac11104235850358e846bbcc8d8cf49ad1a4b95d5909\\\"\"\r\n"} +{"Time":"2023-05-31T19:40:00.42912854Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:39:39 bridge-509041 containerd[667]: time=\"2023-05-31T19:39:39.457260104Z\" level=info msg=\"StartContainer for \\\"284c326637c6549723b2ac11104235850358e846bbcc8d8cf49ad1a4b95d5909\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:40:00.429133107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.429146821Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.429150554Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:40:00.429156373Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.429161715Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:00.429165167Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:40:00.429169018Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:40:00.42917266Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:00.429176249Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:00.429179851Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.429183525Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:00.429187593Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:40:00.429191177Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:40:00.429194885Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:40:00.429198506Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:40:00.42920236Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:40:00.42920571Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:40:00.429209447Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:00.429212757Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:00.429507151Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:40:00.429519096Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:40:00.429523806Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:40:00.429528963Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:40:00.429532733Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:40:00.42953662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:40:00.429544126Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:40:00.429548843Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:40:00.429648832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.429653493Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.429657197Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:40:00.429661207Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:40:00.429665231Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.429669317Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:00.429673181Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:00.429677177Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.42968032Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.429684085Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:40:00.429688317Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:00.429692587Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:40:00.429717289Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:40:00.429721541Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:00.42972769Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:00.429731917Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.429735697Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:00.429739517Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:40:00.429908173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:40:00.429916316Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:40:00.429920458Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:40:00.429924741Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:40:00.42992887Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:40:00.429933037Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:00.429937293Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:00.429941403Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:40:00.429945511Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:40:00.429949763Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:40:00.429953933Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:40:00.429957675Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:40:00.429961295Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:40:00.429965187Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:40:00.429978065Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:40:00.429994397Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.429998097Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.430001477Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:40:00.430004682Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:40:00.43000779Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.430011089Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:00.430014786Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:00.430017837Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.430020648Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.430026895Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:40:00.430030672Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:40:00.430282356Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:00.430287793Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:00.430291205Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:40:00.430294608Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # imports\r\n"} +{"Time":"2023-05-31T19:40:00.430297738Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.430301009Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:40:00.430304623Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:40:00.430308011Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.430311236Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.430314543Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:00.430318211Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:00.430321138Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.430324254Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:40:00.430327169Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.430330293Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.430341859Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.430345445Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.430349005Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.430351973Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:40:00.430355585Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.430358775Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:40:00.430362128Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.430364939Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:40:00.430368095Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.430371081Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.430374226Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:40:00.430377229Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:40:00.43038082Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:40:00.430386039Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:40:00.430677644Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.430687421Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:40:00.43069149Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:40:00.430695061Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:40:00.43069859Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:40:00.430701958Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:40:00.430705228Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:40:00.430708433Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:40:00.430711446Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.430715078Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:40:00.430718938Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:40:00.430725057Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:40:00.430728434Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.43073177Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:40:00.430735384Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.430738683Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.430742184Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.430745934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:40:00.430749654Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:40:00.430753255Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:40:00.430757303Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:40:00.43076087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:40:00.43076413Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.430769316Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:40:00.431020001Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:40:00.431025304Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:40:00.431028967Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431034044Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:40:00.431038163Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:40:00.43104177Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.431045242Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:40:00.431048946Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:40:00.431052569Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:40:00.431055949Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:40:00.431059343Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:40:00.431062564Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:40:00.431065736Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:40:00.431069109Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:40:00.431072304Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.431075477Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.431078821Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:40:00.431082306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T19:40:00.431085576Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T19:40:00.431088843Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:40:00.431092173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.43109528Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T19:40:00.43109813Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:00.431100413Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:00.431102406Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431104404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:40:00.431398774Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.431409814Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:40:00.431413502Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431417262Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.431420487Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:40:00.431423974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431427476Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431430685Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.431437038Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431440619Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.431443731Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.431446919Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:40:00.431450348Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:40:00.431453954Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.431457436Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:00.431460883Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:00.431464278Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431467885Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431471148Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431474421Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431477618Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.431480369Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.431483798Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:40:00.431485852Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.431487796Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:40:00.431489605Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.431491375Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:40:00.431493151Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.431495017Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:40:00.431745396Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:40:00.431750075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:40:00.43175243Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:40:00.431754595Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:40:00.431756742Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:40:00.431758759Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.431760852Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:40:00.431763368Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cdi_spec_dirs = [\"/etc/cdi\", \"/var/run/cdi\"]\r\n"} +{"Time":"2023-05-31T19:40:00.431765965Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:40:00.43176828Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T19:40:00.431770507Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T19:40:00.431772582Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:40:00.431774487Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T19:40:00.431776397Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T19:40:00.431778484Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" drain_exec_sync_io_timeout = \"0s\"\r\n"} +{"Time":"2023-05-31T19:40:00.431780519Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_cdi = false\r\n"} +{"Time":"2023-05-31T19:40:00.431782469Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:40:00.431784317Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:40:00.431786644Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T19:40:00.431788939Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T19:40:00.431805016Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T19:40:00.43180845Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" image_pull_progress_timeout = \"1m0s\"\r\n"} +{"Time":"2023-05-31T19:40:00.431820754Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:40:00.431824615Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:40:00.431828144Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T19:40:00.432332482Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:40:00.432342115Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:40:00.432346467Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T19:40:00.432350199Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:40:00.432354587Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T19:40:00.432359207Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432363205Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:40:00.432366839Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T19:40:00.432370434Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:40:00.432374519Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432378752Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.432384182Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:40:00.432388333Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:40:00.432392582Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:40:00.432396956Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432401012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432405272Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T19:40:00.432409709Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" setup_serially = false\r\n"} +{"Time":"2023-05-31T19:40:00.432414011Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.432418283Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:40:00.432423251Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.432427721Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T19:40:00.432431689Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:40:00.432436229Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ignore_blockio_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:40:00.432440782Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:40:00.432788279Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:40:00.432795299Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:40:00.432799412Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.432803385Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T19:40:00.432807568Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432811927Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432816124Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:40:00.432819966Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:00.432823506Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:00.432827118Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:00.432831926Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:40:00.432835743Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432839623Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432843693Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432850543Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432854836Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432858628Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432861902Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.432865686Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T19:40:00.432869739Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.4328734Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:40:00.432877095Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.432881259Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:40:00.432885396Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.432889442Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433215436Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:40:00.433226168Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:00.433230572Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:00.433234202Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:00.433237703Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:40:00.433241486Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433245152Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433248576Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433252722Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:40:00.433256432Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433259921Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433263796Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433267605Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:40:00.433271625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:40:00.43327496Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433278488Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:40:00.433282288Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433285725Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433289201Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:40:00.433292628Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:00.433295608Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:00.433299179Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:00.433302966Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:40:00.433306581Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433310502Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433651439Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433661538Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.43366528Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433669741Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433674175Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433678323Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T19:40:00.433683054Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433687083Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T19:40:00.433690827Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T19:40:00.433694618Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433698582Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:40:00.433702867Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:40:00.433706248Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433709557Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T19:40:00.433716254Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433719864Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T19:40:00.433723797Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433727609Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T19:40:00.4337317Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433734885Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T19:40:00.433737766Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.4337411Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T19:40:00.433745084Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433749071Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.433753417Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.433756812Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434026265Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:00.43403519Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434039287Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434043426Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T19:40:00.434046819Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434051022Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434054891Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T19:40:00.434058768Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T19:40:00.434063106Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434066855Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434070582Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T19:40:00.434073763Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434077392Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434081423Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:40:00.434085184Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434088584Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.nri.v1.nri\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434092097Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable = true\r\n"} +{"Time":"2023-05-31T19:40:00.43409787Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" disable_connections = false\r\n"} +{"Time":"2023-05-31T19:40:00.434101365Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" plugin_config_path = \"/etc/nri/conf.d\"\r\n"} +{"Time":"2023-05-31T19:40:00.434105205Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" plugin_path = \"/opt/nri/plugins\"\r\n"} +{"Time":"2023-05-31T19:40:00.434108699Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" plugin_registration_timeout = \"5s\"\r\n"} +{"Time":"2023-05-31T19:40:00.434112372Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" plugin_request_timeout = \"2s\"\r\n"} +{"Time":"2023-05-31T19:40:00.434115894Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" socket_path = \"/var/run/nri/nri.sock\"\r\n"} +{"Time":"2023-05-31T19:40:00.434119027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434123822Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434127259Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T19:40:00.434451755Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.434460629Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434464877Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T19:40:00.434469794Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T19:40:00.434474655Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434478527Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434482802Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434487666Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T19:40:00.434491562Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434495445Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434500461Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434504412Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434507998Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434512447Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.43451695Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434521082Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434540404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434545112Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434549486Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434553458Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434557992Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434562212Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434566012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434576815Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T19:40:00.434581219Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434585511Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T19:40:00.434589666Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434769276Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434776385Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434784249Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434787941Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434805621Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434811783Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434816138Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434819848Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434824195Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434836625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T19:40:00.43484009Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434844027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434848328Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434852068Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434855672Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434859742Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434863558Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T19:40:00.434867193Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434870646Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434873935Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [plugins.\"io.containerd.transfer.v1.local\"]\r\n"} +{"Time":"2023-05-31T19:40:00.434878058Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434882295Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:40:00.434888105Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" max_concurrent_uploaded_layers = 3\r\n"} +{"Time":"2023-05-31T19:40:00.434891863Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.434896087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [[plugins.\"io.containerd.transfer.v1.local\".unpack_config]]\r\n"} +{"Time":"2023-05-31T19:40:00.434900052Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" differ = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.434903732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" platform = \"linux/amd64\"\r\n"} +{"Time":"2023-05-31T19:40:00.43502819Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:40:00.435041619Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.43504655Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T19:40:00.43505056Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.435060443Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T19:40:00.435064296Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.435068286Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T19:40:00.435073086Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:40:00.435078395Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:40:00.435083019Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:40:00.43508756Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:40:00.435091728Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T19:40:00.435095499Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.435099031Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T19:40:00.435103077Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:40:00.435106389Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:40:00.435110174Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:40:00.435114427Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:40:00.435118524Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T19:40:00.435122961Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.435138357Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T19:40:00.435142548Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T19:40:00.435147354Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.metrics.shimstats\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:40:00.435151399Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:40:00.435614275Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:40:00.435624096Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T19:40:00.4356283Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:40:00.435631763Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.435635174Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T19:40:00.43563895Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.435642403Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.435645783Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:00.435649049Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.435652033Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.435655713Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:40:00.435659106Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ● crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:40:00.435663084Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Loaded: loaded (\u001b]8;;file://bridge-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:40:00.435667187Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Active: inactive (dead) since Wed 2023-05-31 19:38:21 UTC; 1min 38s ago\r\n"} +{"Time":"2023-05-31T19:40:00.43567104Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:40:00.435674751Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Main PID: 376 (code=exited, status=0/SUCCESS)\r\n"} +{"Time":"2023-05-31T19:40:00.435677765Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.43568149Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:19 bridge-509041 crio[376]: time=\"2023-05-31 19:38:19.755077423Z\" level=debug msg=\"Cached value indicated that metacopy is being used\" file=\"overlay/overlay.go:339\"\r\n"} +{"Time":"2023-05-31T19:40:00.435685415Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:19 bridge-509041 crio[376]: time=\"2023-05-31 19:38:19.755709015Z\" level=debug msg=\"hook monitoring canceled: context canceled\" file=\"hooks/monitor.go:60\"\r\n"} +{"Time":"2023-05-31T19:40:00.435689345Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:19 bridge-509041 crio[376]: time=\"2023-05-31 19:38:19.755877091Z\" level=debug msg=\"Closing exit monitor...\" file=\"server/server.go:693\"\r\n"} +{"Time":"2023-05-31T19:40:00.435693702Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:19 bridge-509041 crio[376]: time=\"2023-05-31 19:38:19.756365230Z\" level=debug msg=\"backingFs=extfs, projectQuotaSupported=false, useNativeDiff=false, usingMetacopy=true\" file=\"overlay/overlay.go:400\"\r\n"} +{"Time":"2023-05-31T19:40:00.435702656Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:21 bridge-509041 crio[376]: time=\"2023-05-31 19:38:21.085863369Z\" level=debug msg=\"Closed stream server\" file=\"crio/main.go:383\"\r\n"} +{"Time":"2023-05-31T19:40:00.435706987Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:21 bridge-509041 crio[376]: time=\"2023-05-31 19:38:21.086118389Z\" level=debug msg=\"Closed monitors\" file=\"crio/main.go:385\"\r\n"} +{"Time":"2023-05-31T19:40:00.435710782Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:21 bridge-509041 crio[376]: time=\"2023-05-31 19:38:21.086162715Z\" level=debug msg=\"Closed hook monitor\" file=\"crio/main.go:388\"\r\n"} +{"Time":"2023-05-31T19:40:00.435714968Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:21 bridge-509041 crio[376]: time=\"2023-05-31 19:38:21.086204404Z\" level=debug msg=\"Closed main server\" file=\"crio/main.go:393\"\r\n"} +{"Time":"2023-05-31T19:40:00.435718444Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:21 bridge-509041 systemd[1]: crio.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:40:00.43572162Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" May 31 19:38:21 bridge-509041 systemd[1]: Stopped Container Runtime Interface for OCI (CRI-O).\r\n"} +{"Time":"2023-05-31T19:40:00.435724817Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:40:00.435727942Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.43573086Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.435734173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:40:00.435737959Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[0;1;34m# \u001b]8;;file://bridge-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:00.435741474Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:00.43574466Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:40:00.435748154Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T19:40:00.435751712Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:40:00.435755293Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:00.435758429Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:00.435761706Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" After=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:40:00.435764753Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Requires=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:40:00.435767926Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.435773016Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:00.436236241Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:40:00.436244602Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=-/etc/sysconfig/crio\r\n"} +{"Time":"2023-05-31T19:40:00.436249287Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=-/etc/sysconfig/crio.minikube\r\n"} +{"Time":"2023-05-31T19:40:00.436253133Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:40:00.436256875Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:40:00.436261091Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T19:40:00.436265074Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CRIO_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:00.436269433Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" $CRIO_MINIKUBE_OPTIONS\r\n"} +{"Time":"2023-05-31T19:40:00.436273448Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:40:00.436277016Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:40:00.436280629Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:40:00.436284637Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T19:40:00.436291143Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:40:00.436299984Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T19:40:00.436303912Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:40:00.436312304Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:40:00.436315899Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.436319279Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:00.43632329Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:00.436326951Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.436330341Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.43633385Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:40:00.436338946Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T19:40:00.436342859Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:40:00.436346938Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:40:00.436350606Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:40:00.436355133Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.437206233Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:40:00.437216532Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437221148Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:40:00.437224984Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:40:00.43722892Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:40:00.43723238Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:40:00.437235649Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.43723915Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:40:00.43724279Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:40:00.437246839Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:40:00.437250662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:40:00.437254643Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:40:00.43726818Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437272479Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:40:00.437276254Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:40:00.43728027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:40:00.43728371Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437287333Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:40:00.437290975Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:40:00.437294593Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437298389Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:40:00.43730447Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:40:00.437308374Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:40:00.437312106Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.43743352Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:40:00.437444258Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:40:00.437448215Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:40:00.437451614Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:40:00.43745531Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.437461297Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437464641Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:40:00.437468765Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:40:00.437472064Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:40:00.437512104Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437515389Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:40:00.437518623Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:40:00.43752198Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:40:00.437525259Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:40:00.437528596Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437531887Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:40:00.437535591Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:40:00.43753923Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:40:00.437542705Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:40:00.437545974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437549482Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:40:00.437552726Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:40:00.437555521Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437558803Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:40:00.43756235Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:40:00.437660875Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.43767274Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:40:00.437677344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:40:00.437681318Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437685534Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:40:00.437690394Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:40:00.437695191Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:40:00.437699029Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437702654Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:40:00.437706853Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:40:00.437710333Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437714266Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:40:00.43771811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:40:00.437722421Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:40:00.437726789Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.437730653Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437734251Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:40:00.437737785Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:40:00.437745318Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.43775032Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.437754141Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:40:00.437758599Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:40:00.437763116Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:40:00.437767642Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.437771733Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.438426366Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:40:00.438437494Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:00.438442427Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.438446805Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:40:00.438451125Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:00.438455162Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.438459638Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:40:00.43846415Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:40:00.438468456Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:40:00.438472439Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.438481091Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:40:00.438485944Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:40:00.438491411Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:40:00.438496103Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:40:00.438500099Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:40:00.438505135Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #]\r\n"} +{"Time":"2023-05-31T19:40:00.438516235Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.438520331Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:40:00.438524643Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:40:00.438528728Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.438533048Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:40:00.438540804Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.43854524Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:40:00.43855127Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.439050632Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:40:00.439060196Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:40:00.439063748Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:40:00.439067085Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.439070471Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:40:00.439073698Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:40:00.43907713Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.439080191Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:40:00.439084099Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:40:00.439087479Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:40:00.439090881Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:40:00.439094431Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.439097444Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.439100265Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:40:00.439103783Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:40:00.439106733Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:40:00.43910998Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_env = [\r\n"} +{"Time":"2023-05-31T19:40:00.439151044Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.439155865Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.439159426Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:40:00.439162916Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" selinux = false\r\n"} +{"Time":"2023-05-31T19:40:00.439165918Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.4391692Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:40:00.439172893Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:40:00.439176285Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.439580395Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.439588719Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.43959207Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:40:00.439595775Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:40:00.439599202Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:40:00.439603119Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:40:00.439606699Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:40:00.439610012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.439615422Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:40:00.439619352Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:40:00.439623327Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:40:00.439626876Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:40:00.439630497Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.439633554Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:40:00.439636718Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.43964016Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:40:00.439643325Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:40:00.439646494Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.439649731Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:40:00.439653409Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.439656324Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.439659644Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:40:00.439662799Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:40:00.439666052Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:40:00.440007541Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:40:00.440015231Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:40:00.440019107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:40:00.44002263Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:40:00.440025928Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:40:00.440029416Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:40:00.440032397Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:40:00.440035417Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:40:00.440041328Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:40:00.440044586Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:40:00.440047861Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.44005096Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.440054129Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:40:00.440057537Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:40:00.440061301Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:40:00.440065657Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.440068822Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.440071965Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:40:00.440075551Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:40:00.440080258Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:40:00.440083693Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:40:00.440086988Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" additional_devices = [\r\n"} +{"Time":"2023-05-31T19:40:00.440090079Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.440092998Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.440095962Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:40:00.440099721Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:40:00.440465738Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:40:00.440472326Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:40:00.440476078Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.440479093Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.440482582Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:40:00.440486148Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:40:00.440489393Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:40:00.440492669Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.440495827Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:40:00.440499081Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:40:00.440502538Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:40:00.440505913Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.440515665Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:40:00.440519161Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:40:00.440522428Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:40:00.440525641Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:40:00.440528871Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.440532022Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.440535492Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.440540713Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:40:00.440544112Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:40:00.440555893Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.440559112Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:40:00.440562302Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:40:00.440975227Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:40:00.440984358Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # limit is never exceeded.\r\n"} +{"Time":"2023-05-31T19:40:00.440988521Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:40:00.440992252Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.440995915Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Whether container output should be logged to journald in addition to the kubernetes log file\r\n"} +{"Time":"2023-05-31T19:40:00.440999874Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:40:00.441003215Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441006629Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:40:00.441016627Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:40:00.441020846Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44102401Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:40:00.441027673Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:40:00.441031222Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441034472Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:40:00.441037928Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.441041627Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441044751Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:40:00.441048221Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" read_only = false\r\n"} +{"Time":"2023-05-31T19:40:00.44105142Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441054606Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:40:00.441058042Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:40:00.441061761Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.441065394Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:40:00.441069153Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441072522Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:40:00.441369196Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.441379815Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.441383545Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441387Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:40:00.441391572Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:40:00.441395187Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:40:00.441398805Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.44140251Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441409056Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:40:00.441412782Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:40:00.441416827Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:40:00.441420967Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.441424717Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441428343Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:40:00.441431869Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:40:00.441435782Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:40:00.441438925Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:40:00.441442185Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441445771Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # manage_ns_lifecycle determines whether we pin and remove namespaces\r\n"} +{"Time":"2023-05-31T19:40:00.441450442Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # and manage their lifecycle.\r\n"} +{"Time":"2023-05-31T19:40:00.441454069Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is being deprecated, and will be unconditionally true in the future.\r\n"} +{"Time":"2023-05-31T19:40:00.441463916Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" manage_ns_lifecycle = true\r\n"} +{"Time":"2023-05-31T19:40:00.441467732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441471136Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:40:00.441734478Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:40:00.441744317Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:40:00.441748903Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:40:00.441752896Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:40:00.441756732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441760865Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:40:00.44176488Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:40:00.441769128Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:40:00.441773935Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441778385Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:40:00.441783492Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:40:00.441787173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441790857Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:40:00.441794929Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:40:00.441798831Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:40:00.441802954Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.441809972Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.441813973Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:40:00.441818144Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The runtime to use is picked based on the runtime_handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:40:00.44182281Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If no runtime_handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:40:00.441826568Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:40:00.441830332Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.441834017Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:40:00.442343338Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:40:00.442351473Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:40:00.442355264Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:40:00.442358763Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:00.442362248Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:00.442365145Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:40:00.442368663Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:40:00.442372615Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:40:00.442376235Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:40:00.442380218Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:40:00.442383375Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:40:00.44238663Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:40:00.442390275Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:40:00.44239466Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:40:00.442397702Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:40:00.442401729Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:40:00.442405154Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:40:00.442408516Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:40:00.442412357Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:40:00.442415716Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:40:00.44241912Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:40:00.442423187Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:40:00.442936288Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:40:00.442944962Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.442948863Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.442952115Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:40:00.442955463Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.442959019Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:40:00.442962376Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.442965437Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.442968215Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.442971022Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.442974143Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.442977452Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:40:00.442980637Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:40:00.442984389Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:40:00.442987693Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.442990798Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:40:00.442994066Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:40:00.442997527Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:40:00.44300098Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443004203Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:40:00.443007371Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:40:00.443010442Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44301362Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:40:00.443016947Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:40:00.44302002Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443023017Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:40:00.443440901Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:40:00.443448452Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443452365Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:40:00.443456238Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.443459519Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:40:00.443463454Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:40:00.443466864Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:40:00.443470382Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:40:00.443476782Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:40:00.44348031Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:40:00.443483564Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443486822Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:40:00.443490081Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:40:00.443493282Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443496292Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:40:00.443499486Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:40:00.443502411Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.443504504Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443507072Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:40:00.443514138Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.443516279Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:40:00.443518338Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443520374Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:40:00.443523044Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:40:00.443768381Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.443774799Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.443778638Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443782151Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:40:00.443785488Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:40:00.443788941Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:40:00.443792258Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.443795745Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:40:00.443798708Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443802075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:40:00.44380588Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:40:00.443809247Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:40:00.443812806Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:40:00.44381596Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:40:00.443819023Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.443822223Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443825346Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:40:00.443828822Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:40:00.443832064Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:40:00.44383536Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #insecure_registries = \"[]\"\r\n"} +{"Time":"2023-05-31T19:40:00.443838631Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.443844327Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:40:00.443852524Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:40:00.444180569Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:40:00.444186167Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444189683Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:40:00.444193081Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.444196272Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444199618Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:40:00.444203239Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:40:00.44420654Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:40:00.44420975Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444213118Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:40:00.44421669Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:40:00.444220394Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.444223575Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444226985Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:40:00.444230285Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:40:00.444233324Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444236375Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:40:00.444239603Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:40:00.444242089Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:40:00.444244302Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.444246129Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444248008Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:40:00.444250105Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:40:00.444252065Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444254362Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:40:00.44425642Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:40:00.444666965Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444672543Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:40:00.444675898Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:40:00.444679182Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444682575Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:40:00.444685982Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.444689169Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T19:40:00.444692632Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:40:00.444695971Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.444699367Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444702468Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:40:00.444705974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.444709347Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.444712623Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:40:00.444715789Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.444719254Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.444722297Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.444725088Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:40:00.444728441Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:40:00.362259946Z] Starting CRI-O, version: 1.24.1, git: a3bbde8a77c323aa6a485da9a9046299155c6016(dirty) \r\n"} +{"Time":"2023-05-31T19:40:00.444731004Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T19:40:00.444733521Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:40:00.444735766Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:40:00.444737883Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:40:00.444739839Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.444741795Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:40:00.445215678Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445223915Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:40:00.445227533Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:40:00.445230787Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:40:00.445234173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:40:00.445237335Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445240487Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:40:00.445243829Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:40:00.445247272Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:40:00.44525067Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:40:00.445253862Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:40:00.445257082Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445260306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:40:00.445263708Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:40:00.445267415Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:40:00.445271082Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445274564Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:40:00.445277832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:40:00.445281444Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445284609Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:40:00.44528806Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:40:00.445290942Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:40:00.44529708Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445300587Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:40:00.445834655Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:40:00.445843598Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:40:00.44584718Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:40:00.44585079Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.445854743Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445857622Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:40:00.445861577Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:40:00.445864907Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:40:00.445868237Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445871123Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:40:00.445874019Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:40:00.445877629Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:40:00.445880452Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:40:00.445883653Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445886934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:40:00.445889937Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:40:00.445892932Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:40:00.445896025Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:40:00.445899039Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445901949Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T19:40:00.445905404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T19:40:00.4459088Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T19:40:00.445912308Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.445915662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T19:40:00.446484153Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T19:40:00.446494024Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T19:40:00.446498014Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T19:40:00.446501968Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446506039Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:40:00.446509296Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:40:00.446512445Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44651608Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:40:00.44652037Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:40:00.446523873Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446527284Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:40:00.446534816Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:40:00.446538665Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446542381Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:40:00.446546826Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:40:00.446550287Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:40:00.446554116Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446557716Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:40:00.446561249Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:40:00.446564662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446568183Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T19:40:00.446571785Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.446575348Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446579048Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:40:00.446582753Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:40:00.446874674Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:40:00.446880306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.446883842Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446887275Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:40:00.446890746Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:40:00.446894156Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.446897535Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446904129Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:40:00.446908008Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:40:00.446911377Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:40:00.446915759Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.446918958Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44692241Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:40:00.446926057Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:00.446929211Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446932253Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:40:00.44693571Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:00.446938076Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446940133Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:40:00.446942272Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:40:00.446944646Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:40:00.4469466Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.446948602Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:40:00.446951873Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:40:00.447319486Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:40:00.447325029Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:40:00.447328458Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:40:00.44733159Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.447334685Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.447338215Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:40:00.447341971Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T19:40:00.447345102Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.447348441Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:40:00.447352344Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.447355844Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:40:00.447359101Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44736261Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:40:00.447366085Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:40:00.447369504Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:40:00.447373404Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:40:00.447376461Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.447379392Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:40:00.447381504Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T19:40:00.447383608Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:40:00.447385481Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.447388672Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:40:00.447390767Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:40:00.447392795Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:40:00.447746299Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:40:00.447751549Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:40:00.447755076Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:00.447759913Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44777566Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:40:00.44777945Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:40:00.447782809Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:40:00.447786322Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T19:40:00.447789412Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.44779247Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.447796063Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:40:00.447799432Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T19:40:00.447802522Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.447805491Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:40:00.447808107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:40:00.447810152Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.447812219Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.447814366Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.447816589Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:40:00.44781875Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:40:00.447820832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:40:00.447822919Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:40:00.447825046Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:40:00.447826962Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.447829019Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:40:00.448210965Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:40:00.448218215Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:40:00.448222035Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:40:00.448225545Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.448229035Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:40:00.448232301Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.448235542Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T19:40:00.448238771Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T19:40:00.448242077Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.448245246Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.448248562Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T19:40:00.448251917Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T19:40:00.448255522Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T19:40:00.448258919Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.448262228Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T19:40:00.448265509Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.448268744Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.448271541Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.448273524Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:40:00.448275617Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:40:00.448277564Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.448279469Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:40:00.448281426Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.448283481Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.448643709Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:40:00.448649428Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:40:00.448652827Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:40:00.448656131Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:40:00.448659604Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:40:00.448662948Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:40:00.448668058Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:40:00.448671363Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:40:00.448674676Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:40:00.448677884Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:40:00.448681188Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:40:00.448684646Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:40:00.448688158Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:40:00.448691417Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.448694586Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.448697846Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:40:00.448701166Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:40:00.448704631Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:40:00.448706709Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.448708633Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44871068Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T19:40:00.448712736Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T19:40:00.448714823Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T19:40:00.448716735Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T19:40:00.448718757Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.4487207Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44872304Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:40:00.449159205Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:40:00.449167592Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:40:00.449171953Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:40:00.44917643Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T19:40:00.449180298Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.449184192Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.449188087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T19:40:00.449191934Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T19:40:00.449195777Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T19:40:00.449199759Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T19:40:00.449203832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.449207441Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.449211374Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T19:40:00.449215352Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T19:40:00.449219068Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T19:40:00.449222705Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:40:00.449225854Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.449228209Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:40:00.449231164Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:40:00.449233899Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:40:00.449236253Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:40:00.449238598Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.449240721Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.44924306Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:40:00.449245567Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:40:00.449645281Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:40:00.449650979Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.449654439Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:40:00.449658001Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:40:00.449663269Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:40:00.449666873Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.44967028Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:40:00.449673856Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:40:00.449677397Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:40:00.449680832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:40:00.449684083Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.449687161Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.449690411Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.4496938Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:40:00.449697245Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T19:40:00.449700501Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:40:00.449703296Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.449706378Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:40:00.449709296Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:40:00.449711459Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:40:00.449713581Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T19:40:00.449715959Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:40:00.449717935Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.449975009Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T19:40:00.449982592Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:40:00.449986054Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.449989431Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:40:00.449993007Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:40:00.449998508Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450001892Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:40:00.450005293Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:40:00.450008622Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450011974Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:40:00.450015458Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.450019082Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450022369Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:40:00.450025791Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T19:40:00.450029037Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450032244Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:40:00.450035901Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:40:00.450039363Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.450042414Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:40:00.450045481Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450048221Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:40:00.450050426Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.450052584Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.450054432Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.45005658Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:40:00.450381174Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:40:00.450386796Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:40:00.450390303Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.450393497Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450396724Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:40:00.450400277Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:40:00.450403657Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:40:00.450407129Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.450410783Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450414047Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T19:40:00.450417866Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:40:00.450421227Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:40:00.45042451Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T19:40:00.450427841Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450431166Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T19:40:00.450434701Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:40:00.450438129Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:40:00.450441419Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T19:40:00.450448073Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450450353Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:40:00.45045254Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:40:00.450454946Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:40:00.450457136Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:40:00.450847952Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450854006Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:40:00.450857598Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:40:00.450861391Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:40:00.450864932Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:40:00.450868318Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:40:00.450871733Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450875073Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T19:40:00.450880441Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T19:40:00.4508839Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T19:40:00.450886363Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.450888683Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450890895Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:40:00.450893083Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:40:00.450895184Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:40:00.45089732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450899388Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:40:00.450901751Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:40:00.450903773Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.450905823Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:40:00.450908088Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:40:00.450910358Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:40:00.450912383Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.450914451Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.451261395Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T19:40:00.451266977Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T19:40:00.451270804Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T19:40:00.451274764Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T19:40:00.45127832Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T19:40:00.451281851Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T19:40:00.451285399Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T19:40:00.451288938Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.451292133Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.451298807Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:40:00.451302384Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:40:00.451313287Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:40:00.451316893Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:40:00.451320057Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.451322533Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:40:00.451324507Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:40:00.451326572Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:40:00.451328837Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:40:00.451331027Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:00.451333107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:00.45133553Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:40:00.451337665Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:40:00.451339955Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:40:00.451681165Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:40:00.451687099Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:40:00.451690818Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:40:00.451694281Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:40:00.451698031Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:40:00.451701572Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:40:00.451704968Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:40:00.451710588Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T19:40:00.451714147Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T19:40:00.451717915Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:40:00.451721549Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:40:00.451725032Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:40:00.451728566Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:40:00.451732121Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:40:00.451735428Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:40:00.451740277Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T19:40:00.45174363Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:40:00.451746099Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:40:00.451748709Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T19:40:00.451751034Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T19:40:00.45212394Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T19:40:00.452129836Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T19:40:00.452133572Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T19:40:00.45213696Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452140247Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452145754Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:40:00.452149485Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.452152726Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:40:00.452156105Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:40:00.452159394Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.452162543Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452165723Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452168862Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.452172514Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452175737Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.452178916Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.452181909Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452184941Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452187573Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:40:00.45218995Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:40:00.452191961Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:40:00.452193929Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452195927Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:40:00.452198136Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:40:00.452200386Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:40:00.452574084Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452579892Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:40:00.452583752Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:40:00.452586984Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452590441Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:40:00.452594115Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:40:00.452597571Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452600559Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:40:00.452604119Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:40:00.452606715Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.452609898Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T19:40:00.452613503Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T19:40:00.452621194Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T19:40:00.452626064Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T19:40:00.45263308Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T19:40:00.452638638Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T19:40:00.452645638Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T19:40:00.452650338Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T19:40:00.452656778Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T19:40:00.452660898Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T19:40:00.452664595Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Example:\r\n"} +{"Time":"2023-05-31T19:40:00.45266878Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T19:40:00.453046553Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T19:40:00.453052234Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T19:40:00.453055823Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T19:40:00.453059103Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T19:40:00.45306228Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T19:40:00.45306571Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:40:00.453068987Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T19:40:00.453072453Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T19:40:00.453076179Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T19:40:00.453079757Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T19:40:00.453083341Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T19:40:00.453086976Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T19:40:00.453090656Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \r\n"} +{"Time":"2023-05-31T19:40:00.453096057Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453099459Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:40:00.45310311Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:00.453106317Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:40:00.4531093Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:40:00.453111497Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:40:00.453113659Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:40:00.453115674Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:40:00.453117812Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:40:00.453119777Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453444928Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:40:00.453452621Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:40:00.453456322Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453459509Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:40:00.453462959Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:40:00.453466385Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.453469362Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453472448Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:40:00.453475932Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.45348091Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:40:00.453484195Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453487539Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:40:00.453490927Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:40:00.453494754Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.453497964Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.453500804Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453503937Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:40:00.453507252Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:40:00.453517372Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:40:00.453520922Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:00.453524562Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:40:00.453527816Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453530851Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:40:00.453534359Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:40:00.453932409Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:40:00.453938173Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:40:00.453943234Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:40:00.453946866Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.453950099Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453954206Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:40:00.453957779Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:40:00.453961114Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:40:00.453964417Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T19:40:00.453967674Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.45397078Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453974335Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:40:00.453977723Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:40:00.453981217Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:40:00.453984363Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.453987543Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:40:00.453990695Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.453993531Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.45399644Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:40:00.453999811Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:40:00.454002478Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:40:00.454004446Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.454006451Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:40:00.454008465Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:40:00.454369838Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.454375053Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.454378525Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:40:00.454382063Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:40:00.454385157Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.454388533Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:40:00.454391927Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:40:00.454395198Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:40:00.454398822Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.454402002Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.454405323Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:40:00.454408658Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:40:00.454411858Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.454415033Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:40:00.454418172Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:40:00.454421244Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.454424343Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T19:40:00.454427365Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T19:40:00.454429865Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T19:40:00.454432108Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T19:40:00.454434182Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T19:40:00.454436322Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T19:40:00.454439513Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T19:40:00.454441638Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454443732Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T19:40:00.454804662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T19:40:00.454810083Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T19:40:00.454813553Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T19:40:00.45481741Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T19:40:00.454821075Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T19:40:00.454824424Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T19:40:00.454827742Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T19:40:00.45483114Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T19:40:00.454834387Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.4548376Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T19:40:00.454840911Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T19:40:00.454844112Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454847544Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T19:40:00.454850792Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454854125Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454857422Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.45486044Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454864311Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454866392Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454868381Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454870453Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T19:40:00.454872387Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:00.454874381Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:40:00.454876341Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:40:00.454878182Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.454880028Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:40:00.455239222Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.455244742Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.455248099Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:40:00.455253639Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T19:40:00.455257575Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T19:40:00.455261162Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T19:40:00.455264447Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.455268012Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.455271324Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:40:00.455274946Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T19:40:00.455278294Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T19:40:00.455283292Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.455286625Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T19:40:00.455290007Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T19:40:00.455293087Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.45529622Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T19:40:00.455298825Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T19:40:00.455300659Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.455302674Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T19:40:00.455306326Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T19:40:00.455308474Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.455310779Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T19:40:00.455312906Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T19:40:00.455315107Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.455317191Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T19:40:00.455679642Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T19:40:00.455685451Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.455689184Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T19:40:00.455692662Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T19:40:00.455696165Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T19:40:00.455699396Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \r\n"} +{"Time":"2023-05-31T19:40:00.455702477Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T19:40:00.455705941Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ----------------------- debugLogs end: bridge-509041 [took: 14.554964428s] --------------------------------\n"} +{"Time":"2023-05-31T19:40:00.45570958Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:175: Cleaning up \"bridge-509041\" profile ...\n"} +{"Time":"2023-05-31T19:40:00.455713154Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p bridge-509041\n"} +{"Time":"2023-05-31T19:40:01.501335798Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p bridge-509041: (1.078288806s)\n"} +{"Time":"2023-05-31T19:40:01.501371419Z","Action":"cont","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T19:40:01.501375507Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== CONT TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T19:40:01.501380449Z","Action":"run","Test":"TestStartStop/group/no-preload/serial"} +{"Time":"2023-05-31T19:40:01.501382563Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":"=== RUN TestStartStop/group/no-preload/serial\n"} +{"Time":"2023-05-31T19:40:01.501431823Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/FirstStart"} +{"Time":"2023-05-31T19:40:01.501436571Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"=== RUN TestStartStop/group/no-preload/serial/FirstStart\n"} +{"Time":"2023-05-31T19:40:01.501487914Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-linux-amd64 start -p no-preload-348437 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:40:14.495499846Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T19:40:14.495561106Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ----------------------- debugLogs start: flannel-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:40:14.495567574Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:40:14.495573003Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T19:40:14.495578125Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T19:40:14.495582277Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495586035Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:40:14.495590683Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T19:40:14.495594439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495598245Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495601691Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495605434Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:40:14.495609415Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T19:40:14.49561317Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495616609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495620115Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:40:14.495631755Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T19:40:14.495635211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495638439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495641893Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:40:14.495645989Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:40:14.495650142Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T19:40:14.495653612Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495656969Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495660512Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:40:14.495664422Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T19:40:14.495668446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T19:40:14.495672209Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T19:40:14.49567735Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T19:40:14.495680989Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T19:40:14.495684516Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T19:40:14.495687913Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T19:40:14.495691706Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 10.244.0.3\tnetcat-7458db8b8-gqs6x\n"} +{"Time":"2023-05-31T19:40:14.495695025Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495698175Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495702125Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:40:14.495706333Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T19:40:14.495710365Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T19:40:14.495714276Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" options ndots:5\n"} +{"Time":"2023-05-31T19:40:14.495717918Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495721283Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495724404Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:40:14.495728Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T19:40:14.495731645Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.495735641Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" passwd: files mymachines systemd\r\n"} +{"Time":"2023-05-31T19:40:14.495739783Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" group: files [SUCCESS=merge] mymachines [SUCCESS=merge] systemd\r\n"} +{"Time":"2023-05-31T19:40:14.495743929Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T19:40:14.49574756Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.495751259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname\r\n"} +{"Time":"2023-05-31T19:40:14.495754991Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" networks: files dns\r\n"} +{"Time":"2023-05-31T19:40:14.495758558Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.495762161Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" protocols: files\r\n"} +{"Time":"2023-05-31T19:40:14.495765654Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" services: files\r\n"} +{"Time":"2023-05-31T19:40:14.495769694Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ethers: files\r\n"} +{"Time":"2023-05-31T19:40:14.495773882Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rpc: files\r\n"} +{"Time":"2023-05-31T19:40:14.495778179Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495781712Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495785311Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:40:14.49578891Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T19:40:14.495794067Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 127.0.1.1 flannel-509041\r\n"} +{"Time":"2023-05-31T19:40:14.495798588Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.61.1\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T19:40:14.495803835Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.61.47\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T19:40:14.495807402Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.49581308Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495816885Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:40:14.495820864Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This is /run/systemd/resolve/resolv.conf managed by man:systemd-resolved(8).\r\n"} +{"Time":"2023-05-31T19:40:14.495824329Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Do not edit.\r\n"} +{"Time":"2023-05-31T19:40:14.495828262Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.495832042Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This file might be symlinked as /etc/resolv.conf. If you're looking at\r\n"} +{"Time":"2023-05-31T19:40:14.495836619Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # /etc/resolv.conf and seeing this text, you have followed the symlink.\r\n"} +{"Time":"2023-05-31T19:40:14.495839649Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.495842684Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This is a dynamic resolv.conf file for connecting local clients directly to\r\n"} +{"Time":"2023-05-31T19:40:14.495845617Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # all known uplink DNS servers. This file lists all configured search domains.\r\n"} +{"Time":"2023-05-31T19:40:14.495848664Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.495851779Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Third party programs should typically not access this file directly, but only\r\n"} +{"Time":"2023-05-31T19:40:14.495855024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # through the symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a\r\n"} +{"Time":"2023-05-31T19:40:14.495858077Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # different way, replace this symlink by a static file or a different symlink.\r\n"} +{"Time":"2023-05-31T19:40:14.495861309Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.495864192Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # See man:systemd-resolved.service(8) for details about the supported modes of\r\n"} +{"Time":"2023-05-31T19:40:14.495867785Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # operation for /etc/resolv.conf.\r\n"} +{"Time":"2023-05-31T19:40:14.495872892Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.495876289Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nameserver 192.168.122.1\r\n"} +{"Time":"2023-05-31T19:40:14.495879403Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" search .\r\n"} +{"Time":"2023-05-31T19:40:14.495882436Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495885456Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.49588964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:40:14.49589329Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T19:40:14.495896838Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node/flannel-509041 Ready control-plane 58s v1.27.2 192.168.61.47 \u003cnone\u003e Buildroot 2021.02.12 5.10.57 containerd://1.7.1\n"} +{"Time":"2023-05-31T19:40:14.495900126Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495903208Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T19:40:14.495907118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 57s \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.495910516Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default service/netcat ClusterIP 10.110.72.191 \u003cnone\u003e 8080/TCP 16s app=netcat\n"} +{"Time":"2023-05-31T19:40:14.495915108Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 55s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:14.495918383Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495922776Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T19:40:14.495926538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default endpoints/kubernetes 192.168.61.47:8443 57s\n"} +{"Time":"2023-05-31T19:40:14.495930016Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default endpoints/netcat 10.244.0.3:8080 16s\n"} +{"Time":"2023-05-31T19:40:14.495933643Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 41s\n"} +{"Time":"2023-05-31T19:40:14.495938824Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 43s\n"} +{"Time":"2023-05-31T19:40:14.495942474Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495945762Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:40:14.495951135Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-flannel daemonset.apps/kube-flannel-ds 1 1 1 1 1 \u003cnone\u003e 54s kube-flannel docker.io/flannel/flannel:v0.21.5 app=flannel\n"} +{"Time":"2023-05-31T19:40:14.495955153Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 55s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.495958735Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495961928Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:40:14.495965628Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default deployment.apps/netcat 1/1 1 1 17s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T19:40:14.495969138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system deployment.apps/coredns 1/1 1 1 55s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:14.495972562Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.495975668Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T19:40:14.495979771Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default pod/netcat-7458db8b8-gqs6x 1/1 Running 0 17s 10.244.0.3 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.495983268Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-flannel pod/kube-flannel-ds-dwcpl 1/1 Running 0 43s 192.168.61.47 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.495987546Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/coredns-5d78c9869d-8phqx 1/1 Running 0 42s 10.244.0.2 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.495991324Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/etcd-flannel-509041 1/1 Running 0 55s 192.168.61.47 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.495995228Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/kube-apiserver-flannel-509041 1/1 Running 0 55s 192.168.61.47 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.495998911Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/kube-controller-manager-flannel-509041 1/1 Running 0 55s 192.168.61.47 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496002785Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/kube-proxy-ztwqw 1/1 Running 0 43s 192.168.61.47 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.49600714Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/kube-scheduler-flannel-509041 1/1 Running 0 55s 192.168.61.47 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496010955Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-system pod/storage-provisioner 1/1 Running 0 41s 192.168.61.47 flannel-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496014398Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496017444Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496020454Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:40:14.496024124Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T19:40:14.496027608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 22405ddbb1a96 16 seconds ago Ready netcat-7458db8b8-gqs6x default 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496031177Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" c3c21be9db522 25 seconds ago Ready coredns-5d78c9869d-8phqx kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496034724Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 5e99677c6d639 36 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496038686Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1c6fb21620904 42 seconds ago Ready kube-proxy-ztwqw kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496041894Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" e44f6e7e7d913 42 seconds ago Ready kube-flannel-ds-dwcpl kube-flannel 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496045659Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" b5c6548eb3df4 About a minute ago Ready kube-apiserver-flannel-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496049012Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 878e28d4e28a8 About a minute ago Ready kube-controller-manager-flannel-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496052473Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 84ea0d5e59219 About a minute ago Ready kube-scheduler-flannel-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496055759Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0a99f963869ef About a minute ago Ready etcd-flannel-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:40:14.496059039Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496063057Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496066133Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:40:14.496069629Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\r\n"} +{"Time":"2023-05-31T19:40:14.49607328Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" e26485d1fa959 28081458d86cc 14 seconds ago Running dnsutils 0 22405ddbb1a96\r\n"} +{"Time":"2023-05-31T19:40:14.496076722Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 6618fd8c67a84 ead0a4a53df89 24 seconds ago Running coredns 0 c3c21be9db522\r\n"} +{"Time":"2023-05-31T19:40:14.496080158Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 89e4d343cf06b 6e38f40d628db 36 seconds ago Running storage-provisioner 0 5e99677c6d639\r\n"} +{"Time":"2023-05-31T19:40:14.496083218Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7fc7ac3d39d86 a6c0cb5dbd211 37 seconds ago Running kube-flannel 0 e44f6e7e7d913\r\n"} +{"Time":"2023-05-31T19:40:14.496086396Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cbd575258ddee a6c0cb5dbd211 37 seconds ago Exited install-cni 0 e44f6e7e7d913\r\n"} +{"Time":"2023-05-31T19:40:14.496091867Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" c770ceddd3f7a 7a2dcab94698c 40 seconds ago Exited install-cni-plugin 0 e44f6e7e7d913\r\n"} +{"Time":"2023-05-31T19:40:14.496095439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 696f3e63bbe6f b8aa50768fd67 42 seconds ago Running kube-proxy 0 1c6fb21620904\r\n"} +{"Time":"2023-05-31T19:40:14.496099046Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dedd7f4541ceb 86b6af7dd652c About a minute ago Running etcd 0 0a99f963869ef\r\n"} +{"Time":"2023-05-31T19:40:14.496102629Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 18df2133e14dc 89e70da428d29 About a minute ago Running kube-scheduler 0 84ea0d5e59219\r\n"} +{"Time":"2023-05-31T19:40:14.496106018Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" c392b98b8ad88 ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 878e28d4e28a8\r\n"} +{"Time":"2023-05-31T19:40:14.496109513Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" c471d227b1e6a c5b13e4f7806d About a minute ago Running kube-apiserver 0 b5c6548eb3df4\r\n"} +{"Time":"2023-05-31T19:40:14.49611306Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496115841Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496118841Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:40:14.496129633Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: netcat\n"} +{"Time":"2023-05-31T19:40:14.496135027Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:40:14.496139433Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CreationTimestamp: Wed, 31 May 2023 19:39:46 +0000\n"} +{"Time":"2023-05-31T19:40:14.496144024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:40:14.496148574Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:40:14.496152578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T19:40:14.496156972Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:40:14.496161892Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:40:14.496165295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:40:14.496168268Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:40:14.496171718Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:40:14.496175152Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:40:14.496178593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.496181565Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:40:14.496186178Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:40:14.496189562Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496193092Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496196437Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.496199667Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:40:14.49620258Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -c\n"} +{"Time":"2023-05-31T19:40:14.496205557Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:40:14.496208779Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.49621343Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496217191Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496220566Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:14.496223686Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:40:14.496226822Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:40:14.496231707Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:40:14.496234992Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:40:14.496238359Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496241578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:40:14.496245068Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.496248323Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.496251934Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.496255307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal ScalingReplicaSet 18s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T19:40:14.496259121Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496261864Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496267116Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:40:14.49627046Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: netcat-7458db8b8-gqs6x\n"} +{"Time":"2023-05-31T19:40:14.496273787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:40:14.496276593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 0\n"} +{"Time":"2023-05-31T19:40:14.496279966Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: default\n"} +{"Time":"2023-05-31T19:40:14.496283014Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-509041/192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.496286151Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 19:39:46 +0000\n"} +{"Time":"2023-05-31T19:40:14.496289241Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:40:14.496292282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T19:40:14.496295426Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496298474Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:14.496301532Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T19:40:14.496304503Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:14.49630738Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 10.244.0.3\n"} +{"Time":"2023-05-31T19:40:14.496310774Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T19:40:14.496316843Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.496319741Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:40:14.496322801Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: containerd://e26485d1fa959336e0376bdf06b81b75de924ceb523bed43ab5d48e543d2003a\n"} +{"Time":"2023-05-31T19:40:14.496326199Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:40:14.496329503Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T19:40:14.496332949Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496336118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496339435Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.496342538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:40:14.49634566Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -c\n"} +{"Time":"2023-05-31T19:40:14.496348703Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:40:14.49635221Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:14.496355547Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 19:39:50 +0000\n"} +{"Time":"2023-05-31T19:40:14.496358747Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:14.49636197Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:14.49636492Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496368318Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.496371391Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-nmmcl (ro)\n"} +{"Time":"2023-05-31T19:40:14.496374801Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:14.496377818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:14.496380864Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:14.496383973Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:14.496387102Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:14.496389777Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:14.49639314Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:14.496397732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-api-access-nmmcl:\n"} +{"Time":"2023-05-31T19:40:14.49640122Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:40:14.496404715Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:40:14.496409069Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.496412298Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:40:14.496415272Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:40:14.496418553Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:40:14.496421682Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496424842Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:40:14.496428428Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:40:14.496431609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.496434772Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.496437981Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.496441561Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Scheduled 18s default-scheduler Successfully assigned default/netcat-7458db8b8-gqs6x to flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.496445089Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulling 17s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T19:40:14.496448617Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 14s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 2.310359809s (2.310372031s including waiting)\n"} +{"Time":"2023-05-31T19:40:14.496451836Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 14s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T19:40:14.496455268Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 14s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T19:40:14.496458417Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496461549Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496464273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:40:14.496467348Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496470274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496474956Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:40:14.496478582Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:40:14.496481468Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.496484971Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CreationTimestamp: Wed, 31 May 2023 19:39:08 +0000\n"} +{"Time":"2023-05-31T19:40:14.496488198Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:14.496491558Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:40:14.496494653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:14.496497787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:40:14.496500977Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:40:14.496505292Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:40:14.496508196Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:40:14.496511497Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:40:14.496514838Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:14.496517988Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:40:14.49652084Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.496523966Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" coredns:\n"} +{"Time":"2023-05-31T19:40:14.496527524Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:40:14.496530965Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:40:14.496534165Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:40:14.496537292Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:14.496540368Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -conf\n"} +{"Time":"2023-05-31T19:40:14.496543439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:40:14.496568419Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T19:40:14.496572784Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:40:14.4965762Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:40:14.496579416Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:40:14.496584072Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:40:14.496587216Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:40:14.496590935Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:40:14.496594247Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.49659759Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.496603509Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:40:14.496606922Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:14.49661024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:40:14.496613929Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:14.496618013Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:40:14.496621466Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:14.496624632Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:40:14.496627707Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:14.496631629Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:40:14.496635724Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:40:14.496640062Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:40:14.496644161Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:40:14.496649026Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496653771Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:40:14.496657879Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.496660899Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.496664259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.496667538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal ScalingReplicaSet 44s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T19:40:14.496671168Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal ScalingReplicaSet 44s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T19:40:14.496675919Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496679219Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.496682423Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:40:14.496686043Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: coredns-5d78c9869d-8phqx\n"} +{"Time":"2023-05-31T19:40:14.496689091Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.496692801Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T19:40:14.496695943Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:40:14.49669905Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:40:14.496702186Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-509041/192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.496705251Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 19:39:26 +0000\n"} +{"Time":"2023-05-31T19:40:14.496708901Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:40:14.496712138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T19:40:14.496715672Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496718911Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:14.496722017Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:40:14.496725223Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:14.496728136Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:40:14.496731865Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T19:40:14.496734959Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.496738008Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" coredns:\n"} +{"Time":"2023-05-31T19:40:14.496741433Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: containerd://6618fd8c67a8452725ec54119be225b86dd84053f187e63a0bc16a4bf0462ef2\n"} +{"Time":"2023-05-31T19:40:14.496745678Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:40:14.496749078Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T19:40:14.496752587Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:40:14.496756888Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:40:14.496760011Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:14.496762915Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -conf\n"} +{"Time":"2023-05-31T19:40:14.496765879Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:40:14.496768835Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:14.496771608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 19:39:39 +0000\n"} +{"Time":"2023-05-31T19:40:14.496774793Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:14.496778979Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:14.496782352Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Limits:\n"} +{"Time":"2023-05-31T19:40:14.496785265Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:40:14.496788198Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:40:14.496791287Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:40:14.496794517Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:40:14.496797541Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:40:14.496800724Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:40:14.496804305Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.496807398Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.496810592Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:40:14.496813565Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-xw76m (ro)\n"} +{"Time":"2023-05-31T19:40:14.496816584Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:14.496819652Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:14.496822604Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:14.496825356Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:14.496828454Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:14.496831591Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:14.496834604Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:14.496839613Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:40:14.49684303Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:14.496846171Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:40:14.49684919Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:14.496852444Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-api-access-xw76m:\n"} +{"Time":"2023-05-31T19:40:14.496855644Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:40:14.496858485Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:40:14.496863037Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.496866006Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:40:14.496869339Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:40:14.496872347Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:40:14.496875456Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:40:14.496878146Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:40:14.496881286Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T19:40:14.496884681Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:40:14.49688811Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:40:14.496891575Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.496894548Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.496899256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.496902891Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Warning FailedScheduling 43s default-scheduler 0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling..\n"} +{"Time":"2023-05-31T19:40:14.496906685Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Scheduled 38s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-8phqx to flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.496910721Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Warning FailedCreatePodSandBox 37s kubelet Failed to create pod sandbox: rpc error: code = Unknown desc = failed to setup network for sandbox \"1bb926cb2fbfe4cb8282baaaa5ed99fa698baa96baa110c9f0bf1058641cfe0a\": plugin type=\"flannel\" failed (add): loadFlannelSubnetEnv failed: open /run/flannel/subnet.env: no such file or directory\n"} +{"Time":"2023-05-31T19:40:14.500621704Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 25s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T19:40:14.500642351Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 25s kubelet Created container coredns\n"} +{"Time":"2023-05-31T19:40:14.500647795Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 25s kubelet Started container coredns\n"} +{"Time":"2023-05-31T19:40:14.500651758Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.500655696Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.50065949Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:40:14.500663869Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" .:53\n"} +{"Time":"2023-05-31T19:40:14.500667503Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] plugin/reload: Running configuration SHA512 = 7996ca7cabdb2fd3e37b0463c78d5a492f8d30690ee66a90ae7ff24c50d9d936a24d239b3a5946771521ff70c09a796ffaf6ef8abe5753fd1ad5af38b6cdbb7f\n"} +{"Time":"2023-05-31T19:40:14.500692Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T19:40:14.500697578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T19:40:14.50070303Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 127.0.0.1:60992 - 26374 \"HINFO IN 6807809464915673162.7685764338710725248. udp 57 false 512\" NXDOMAIN qr,rd,ra 57 0.03406363s\n"} +{"Time":"2023-05-31T19:40:14.500710134Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:55614 - 39069 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000160728s\n"} +{"Time":"2023-05-31T19:40:14.500715782Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:38390 - 49672 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000220758s\n"} +{"Time":"2023-05-31T19:40:14.500721366Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:58893 - 5535 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000147178s\n"} +{"Time":"2023-05-31T19:40:14.500725942Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:42210 - 53137 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000196542s\n"} +{"Time":"2023-05-31T19:40:14.500730496Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:42210 - 52855 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000168684s\n"} +{"Time":"2023-05-31T19:40:14.500734679Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:59409 - 45480 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000090105s\n"} +{"Time":"2023-05-31T19:40:14.500739913Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:37252 - 28588 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000078572s\n"} +{"Time":"2023-05-31T19:40:14.500745659Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [INFO] 10.244.0.3:51962 - 49998 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000066415s\n"} +{"Time":"2023-05-31T19:40:14.500751022Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.500755626Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.500759429Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:40:14.50076426Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-apiserver-flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.500768889Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.500773406Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:40:14.500778432Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:40:14.500784024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-509041/192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.500788946Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 19:39:08 +0000\n"} +{"Time":"2023-05-31T19:40:14.500794863Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T19:40:14.500804976Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T19:40:14.500811361Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.61.47:8443\n"} +{"Time":"2023-05-31T19:40:14.50081663Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/config.hash: 79931245727b9a1d87857521068d8ed5\n"} +{"Time":"2023-05-31T19:40:14.500821589Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/config.mirror: 79931245727b9a1d87857521068d8ed5\n"} +{"Time":"2023-05-31T19:40:14.500827171Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/config.seen: 2023-05-31T19:39:08.643382061Z\n"} +{"Time":"2023-05-31T19:40:14.500832022Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T19:40:14.500837157Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:14.50084281Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" SeccompProfile: RuntimeDefault\n"} +{"Time":"2023-05-31T19:40:14.500847669Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.500852107Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:14.500856448Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.500860693Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: Node/flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.500869294Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.500873733Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T19:40:14.500878236Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: containerd://c471d227b1e6ab29a5c3db110f99cf8cb6b399fcc4724cd7aa572a28e69928e5\n"} +{"Time":"2023-05-31T19:40:14.500883647Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T19:40:14.500889257Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T19:40:14.500893483Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.500898613Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.500903375Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.500907875Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T19:40:14.500912257Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --advertise-address=192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.500916901Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T19:40:14.500920706Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T19:40:14.500933054Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:40:14.500938725Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:40:14.500943925Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T19:40:14.50094877Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T19:40:14.500953666Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T19:40:14.500958459Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T19:40:14.500963295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T19:40:14.500968173Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T19:40:14.500972802Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T19:40:14.500988611Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T19:40:14.500998386Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T19:40:14.501002891Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T19:40:14.50100721Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T19:40:14.501011635Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.501016458Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T19:40:14.501020559Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T19:40:14.501026852Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T19:40:14.501032543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T19:40:14.501037425Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:40:14.501042338Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T19:40:14.501047248Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T19:40:14.50105221Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T19:40:14.501057174Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T19:40:14.50106186Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T19:40:14.501066349Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:14.501070545Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 19:39:00 +0000\n"} +{"Time":"2023-05-31T19:40:14.501074825Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:14.501079302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:14.50108495Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:40:14.501090044Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:40:14.501094738Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Liveness: http-get https://192.168.61.47:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T19:40:14.501100187Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Readiness: http-get https://192.168.61.47:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:40:14.501108288Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Startup: http-get https://192.168.61.47:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T19:40:14.501113522Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.501118954Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.501122943Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T19:40:14.501127042Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T19:40:14.501131122Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T19:40:14.501135797Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:14.501140604Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:14.501145454Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:14.501150127Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:14.501154662Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:14.5011604Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:14.501165111Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:14.501171774Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca-certs:\n"} +{"Time":"2023-05-31T19:40:14.501177109Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.501181901Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:40:14.501187058Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:40:14.50119171Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T19:40:14.50119645Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.501201307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:40:14.501206093Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:40:14.501210708Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T19:40:14.50121534Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.501219803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T19:40:14.50122457Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:40:14.501229369Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:40:14.501234195Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.501239324Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:40:14.50124422Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.501248784Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.501253758Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.501258279Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 65s kubelet Container image \"registry.k8s.io/kube-apiserver:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:40:14.501263138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 65s kubelet Created container kube-apiserver\n"} +{"Time":"2023-05-31T19:40:14.50126788Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 64s kubelet Started container kube-apiserver\n"} +{"Time":"2023-05-31T19:40:14.501272785Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.501277684Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.501282404Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:40:14.50128776Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:00.730250 1 server.go:551] external host was not specified, using 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.501293379Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:00.731533 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T19:40:14.501301127Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:00.731561 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:40:14.501306987Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:01.871260 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T19:40:14.501312372Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:01.892854 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T19:40:14.501319172Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:01.893145 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T19:40:14.501324793Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:01.903009 1 logging.go:59] [core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T19:40:14.501331998Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T19:40:14.501336667Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T19:40:14.501341534Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Attributes\": null,\n"} +{"Time":"2023-05-31T19:40:14.501346274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T19:40:14.501351449Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Type\": 0,\n"} +{"Time":"2023-05-31T19:40:14.50135723Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Metadata\": null\n"} +{"Time":"2023-05-31T19:40:14.501362406Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T19:40:14.501367729Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.263213 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501373338Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:03.263363 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501378209Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.264861 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T19:40:14.501383188Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.510183 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501388226Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.511886 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:40:14.501393714Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.976176 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:40:14.501398733Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.991561 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501404167Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:03.991895 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501409288Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:03.992000 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501414708Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.994983 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501419753Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:03.995203 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501424823Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.998009 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501429635Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:03.998937 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.5014351Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:03.999154 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501457473Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:03.999301 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501462818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.002472 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501467874Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.002654 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.50147302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.009579 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.50147859Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.009767 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501486775Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.009848 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501492223Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.018181 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501497731Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.018366 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501502852Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.028648 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501507697Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.031105 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501512619Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.042183 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501517787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.042237 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501525192Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.042247 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501538786Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.045633 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501543309Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.045720 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501548959Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.045737 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501554014Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.049224 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501558387Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.049277 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501563112Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.054633 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501567472Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.054685 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501571934Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.054695 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501576186Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.057764 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501580203Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.057817 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501584689Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.057840 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501589181Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.063280 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501593748Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.063334 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501598096Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.063343 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501602585Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.067357 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501607699Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.069071 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501612314Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.069126 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501617007Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.069135 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501621904Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.077140 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501626684Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.077197 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501631558Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.077207 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501636Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.080904 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501640167Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.080949 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501644826Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.080961 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501649533Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.083994 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501656341Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.084046 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.501660897Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.111701 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:40:14.501665477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:04.111751 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:40:14.50166999Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.996276 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:40:14.501675081Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.996638 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:40:14.501679893Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.997293 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T19:40:14.501684667Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.998249 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T19:40:14.501688968Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.998491 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T19:40:14.501693383Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.999501 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T19:40:14.501698515Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.999616 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T19:40:14.501703025Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.999873 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:40:14.501708622Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.000283 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T19:40:14.501714743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.000349 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:40:14.501719541Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.000548 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T19:40:14.501723876Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:04.998554 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T19:40:14.501728563Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.001505 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:40:14.501733331Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.001742 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:40:14.501738083Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.002190 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T19:40:14.501742951Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.002273 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T19:40:14.501747386Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.002359 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T19:40:14.501752307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.002492 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T19:40:14.501756646Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.002518 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T19:40:14.501761647Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.002629 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T19:40:14.50176619Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.002680 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T19:40:14.501771072Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.007369 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T19:40:14.50177703Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.016741 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T19:40:14.501782573Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.016802 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T19:40:14.501787451Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.017259 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:40:14.501792816Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.017817 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T19:40:14.501797118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.017855 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T19:40:14.501802033Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.017878 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T19:40:14.501806561Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.017883 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:40:14.501811062Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.018104 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T19:40:14.501815785Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.018137 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:40:14.501820293Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.018337 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T19:40:14.501825155Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.018373 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T19:40:14.50182967Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.088663 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T19:40:14.501833563Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.088702 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T19:40:14.501838061Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.180317 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T19:40:14.501842998Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.189290 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T19:40:14.501847838Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.200468 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:40:14.50185261Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.208016 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T19:40:14.501857055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.208123 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T19:40:14.501861712Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.214333 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T19:40:14.501866094Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.218109 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:40:14.501870335Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.218765 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T19:40:14.501875106Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.222278 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T19:40:14.50187927Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.224499 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:40:14.50188377Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.259632 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.501888346Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:05.669612 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T19:40:14.501892652Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:06.008187 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T19:40:14.501896997Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:06.014512 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T19:40:14.501901487Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:06.014722 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T19:40:14.501905672Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:06.754860 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.501910064Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:06.817198 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.501914327Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:06.966503 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T19:40:14.501918774Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" W0531 19:39:06.981969 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.61.47]\n"} +{"Time":"2023-05-31T19:40:14.501923171Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:06.984602 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T19:40:14.501936005Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:06.995491 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.501940267Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:07.158316 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T19:40:14.501945886Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:08.506360 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T19:40:14.501950179Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:08.521850 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T19:40:14.501955653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:08.533092 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T19:40:14.501983163Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:20.710067 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T19:40:14.501990683Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:20.760957 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T19:40:14.501995034Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:47.035772 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.110.72.191]\n"} +{"Time":"2023-05-31T19:40:14.501999855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" E0531 19:39:56.222030 1 upgradeaware.go:440] Error proxying data from backend to client: write tcp 192.168.61.47:8443-\u003e192.168.61.1:56746: write: connection reset by peer\n"} +{"Time":"2023-05-31T19:40:14.502004212Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.50200824Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502012222Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:40:14.502017259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/10-flannel.conflist\r\n"} +{"Time":"2023-05-31T19:40:14.502021475Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.502025627Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"name\": \"cbr0\",\r\n"} +{"Time":"2023-05-31T19:40:14.502029865Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T19:40:14.502034338Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:40:14.502039485Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.502043858Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"flannel\",\r\n"} +{"Time":"2023-05-31T19:40:14.502049805Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"delegate\": {\r\n"} +{"Time":"2023-05-31T19:40:14.502054415Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:40:14.50205854Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"isDefaultGateway\": true\r\n"} +{"Time":"2023-05-31T19:40:14.502062627Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.502066797Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:14.502071206Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.50207538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:40:14.502079892Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:40:14.502084373Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:40:14.502088339Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.502092382Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.502096682Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.502100584Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.502104852Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T19:40:14.502109276Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.502113331Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T19:40:14.502117412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T19:40:14.502121429Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:40:14.502125571Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.502129759Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:40:14.502133734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T19:40:14.50213803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T19:40:14.502141926Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:40:14.502146305Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:40:14.502150698Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:40:14.502154959Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:40:14.502159626Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T19:40:14.502164055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T19:40:14.502168068Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [\r\n"} +{"Time":"2023-05-31T19:40:14.502172215Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.502176323Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T19:40:14.502181125Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T19:40:14.502187431Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.50219166Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.502195799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.502199736Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.502203601Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:14.502214346Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.502218659Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:40:14.50222269Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:40:14.502226791Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:40:14.502231158Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.50223494Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:14.502238901Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.502242535Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T19:40:14.502246537Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:14.502250491Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.502256521Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T19:40:14.502260952Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.5022649Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.502269011Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.502273255Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/.keep\r\n"} +{"Time":"2023-05-31T19:40:14.502277357Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502281262Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502285317Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:40:14.502289537Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:14.502294034Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T19:40:14.502297942Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T19:40:14.502302104Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:40:14.502306427Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 2: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:14.502313003Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 52:54:00:69:13:d2 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:40:14.502317466Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 192.168.61.47/24 brd 192.168.61.255 scope global dynamic eth0\r\n"} +{"Time":"2023-05-31T19:40:14.502322424Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft 3502sec preferred_lft 3502sec\r\n"} +{"Time":"2023-05-31T19:40:14.5023267Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 3: eth1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:14.502331158Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 52:54:00:a4:39:8b brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:40:14.502335312Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 192.168.122.189/24 brd 192.168.122.255 scope global dynamic eth1\r\n"} +{"Time":"2023-05-31T19:40:14.502339728Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft 3503sec preferred_lft 3503sec\r\n"} +{"Time":"2023-05-31T19:40:14.502344259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 4: sit0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:14.502348758Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/sit 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T19:40:14.502353234Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 5: flannel.1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1450 qdisc noqueue state UNKNOWN group default \r\n"} +{"Time":"2023-05-31T19:40:14.502357798Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 22:e9:b1:6d:ee:65 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:40:14.502362691Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 10.244.0.0/32 scope global flannel.1\r\n"} +{"Time":"2023-05-31T19:40:14.502367055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:40:14.502371333Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 6: cni0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1450 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:40:14.502376003Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 8e:3e:81:aa:97:a5 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:40:14.502380508Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" inet 10.244.0.1/24 brd 10.244.0.255 scope global cni0\r\n"} +{"Time":"2023-05-31T19:40:14.502384788Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:40:14.502389285Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7: vethb2a9f30e@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1450 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T19:40:14.502394163Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 6e:7f:1b:01:46:a6 brd ff:ff:ff:ff:ff:ff link-netns cni-d6b5e268-d13e-c793-d403-c4b0092d7075\r\n"} +{"Time":"2023-05-31T19:40:14.502398437Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8: veth67d1d4bc@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1450 qdisc noqueue master cni0 state UP group default \r\n"} +{"Time":"2023-05-31T19:40:14.502404173Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" link/ether 12:cc:42:cc:71:65 brd ff:ff:ff:ff:ff:ff link-netns cni-d0d0525f-dc99-0444-ad29-6c9fe19d260f\r\n"} +{"Time":"2023-05-31T19:40:14.502408448Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502412148Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502416306Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:40:14.502420639Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default via 192.168.122.1 dev eth1 proto dhcp src 192.168.122.189 metric 1024 \r\n"} +{"Time":"2023-05-31T19:40:14.502425273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 10.244.0.0/24 dev cni0 proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T19:40:14.502429138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.61.0/24 dev eth0 proto kernel scope link src 192.168.61.47 \r\n"} +{"Time":"2023-05-31T19:40:14.502433945Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.122.0/24 dev eth1 proto kernel scope link src 192.168.122.189 \r\n"} +{"Time":"2023-05-31T19:40:14.50243848Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.122.1 dev eth1 proto dhcp scope link src 192.168.122.189 metric 1024 \r\n"} +{"Time":"2023-05-31T19:40:14.502442451Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502445727Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502449623Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:40:14.502453838Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:40:06 2023\r\n"} +{"Time":"2023-05-31T19:40:14.502457915Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" *nat\r\n"} +{"Time":"2023-05-31T19:40:14.502462144Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:40:14.502466084Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:40:14.50247024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :OUTPUT ACCEPT [39:2340]\r\n"} +{"Time":"2023-05-31T19:40:14.502474485Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :POSTROUTING ACCEPT [48:3015]\r\n"} +{"Time":"2023-05-31T19:40:14.502478531Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :FLANNEL-POSTRTG - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502482963Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502486957Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502490627Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502494351Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.50249835Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502502659Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502508624Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502512995Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-UTWFOSUDHOCXYA2F - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502516904Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-VNIKGP4R4X6LWZZT - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502521018Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.50252515Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.50252933Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502533458Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502537372Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502541504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502545513Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502549769Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:14.502554069Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:14.502558685Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:40:14.502563388Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A POSTROUTING -m comment --comment \"flanneld masq\" -j FLANNEL-POSTRTG\r\n"} +{"Time":"2023-05-31T19:40:14.502567633Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG -m mark --mark 0x4000/0x4000 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:40:14.50257179Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/24 -d 10.244.0.0/16 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:40:14.502576113Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/16 -d 10.244.0.0/24 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:40:14.502580422Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG ! -s 10.244.0.0/16 -d 10.244.0.0/24 -m comment --comment \"flanneld masq\" -j RETURN\r\n"} +{"Time":"2023-05-31T19:40:14.502585309Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG -s 10.244.0.0/16 ! -d 224.0.0.0/4 -m comment --comment \"flanneld masq\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:40:14.502589938Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-POSTRTG ! -s 10.244.0.0/16 -d 10.244.0.0/16 -m comment --comment \"flanneld masq\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:40:14.502596015Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:40:14.502600943Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:40:14.502605428Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T19:40:14.502609947Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:40:14.502615004Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502619578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:40:14.502624482Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502629221Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:40:14.502633468Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -s 10.244.0.3/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502637802Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-UTWFOSUDHOCXYA2F -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T19:40:14.502642412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-VNIKGP4R4X6LWZZT -s 192.168.61.47/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502647965Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-VNIKGP4R4X6LWZZT -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.61.47:8443\r\n"} +{"Time":"2023-05-31T19:40:14.502652607Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502657947Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:40:14.502666884Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T19:40:14.502671687Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T19:40:14.502676908Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.110.72.191/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T19:40:14.502682042Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T19:40:14.502686907Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T19:40:14.502694279Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:40:14.502699868Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502704567Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T19:40:14.502709609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502713787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T19:40:14.502718319Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502728894Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.61.47:8443\" -j KUBE-SEP-VNIKGP4R4X6LWZZT\r\n"} +{"Time":"2023-05-31T19:40:14.502733873Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502738884Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T19:40:14.502743808Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.110.72.191/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:40:14.502749045Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.3:8080\" -j KUBE-SEP-UTWFOSUDHOCXYA2F\r\n"} +{"Time":"2023-05-31T19:40:14.502753237Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:40:14.502757506Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Completed on Wed May 31 19:40:06 2023\r\n"} +{"Time":"2023-05-31T19:40:14.502763273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:40:06 2023\r\n"} +{"Time":"2023-05-31T19:40:14.502767766Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" *mangle\r\n"} +{"Time":"2023-05-31T19:40:14.502771725Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :PREROUTING ACCEPT [19215:86785632]\r\n"} +{"Time":"2023-05-31T19:40:14.502776206Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :INPUT ACCEPT [19175:86782520]\r\n"} +{"Time":"2023-05-31T19:40:14.502780116Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :FORWARD ACCEPT [38:3032]\r\n"} +{"Time":"2023-05-31T19:40:14.502784442Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :OUTPUT ACCEPT [16212:6078120]\r\n"} +{"Time":"2023-05-31T19:40:14.502788673Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :POSTROUTING ACCEPT [16256:6081512]\r\n"} +{"Time":"2023-05-31T19:40:14.50279487Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502799022Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502803696Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502807863Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:40:14.502812086Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Completed on Wed May 31 19:40:06 2023\r\n"} +{"Time":"2023-05-31T19:40:14.502816297Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:40:06 2023\r\n"} +{"Time":"2023-05-31T19:40:14.502821145Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" *filter\r\n"} +{"Time":"2023-05-31T19:40:14.502825118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :INPUT ACCEPT [5993:1253293]\r\n"} +{"Time":"2023-05-31T19:40:14.502829333Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :FORWARD ACCEPT [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502833452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :OUTPUT ACCEPT [5889:1555663]\r\n"} +{"Time":"2023-05-31T19:40:14.502837584Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :FLANNEL-FWD - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502841615Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502845647Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502849697Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502853992Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502858196Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502862115Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.50286619Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502869994Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:40:14.502876519Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:14.502881345Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:40:14.502886098Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:14.502890618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:14.502895287Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:14.502899532Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T19:40:14.502904405Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:14.502909691Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:14.502914101Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FORWARD -m comment --comment \"flanneld forward\" -j FLANNEL-FWD\r\n"} +{"Time":"2023-05-31T19:40:14.502919203Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:14.502923886Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:40:14.502933989Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:40:14.50293818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-FWD -s 10.244.0.0/16 -m comment --comment \"flanneld forward\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:40:14.502942849Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A FLANNEL-FWD -d 10.244.0.0/16 -m comment --comment \"flanneld forward\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:40:14.502947818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T19:40:14.50295274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:40:14.502957222Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:40:14.502961863Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:40:14.502966782Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:40:14.502971332Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Completed on Wed May 31 19:40:06 2023\r\n"} +{"Time":"2023-05-31T19:40:14.502975186Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502979259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.502983021Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:40:14.502988028Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:40:14.502992868Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.502997204Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 56 3474 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:40:14.503001579Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503005553Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:40:14.503009973Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503014201Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503018303Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain OUTPUT (policy ACCEPT 41 packets, 2460 bytes)\r\n"} +{"Time":"2023-05-31T19:40:14.503022922Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503027388Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 131 8089 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:40:14.503031513Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503035226Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain POSTROUTING (policy ACCEPT 50 packets, 3135 bytes)\r\n"} +{"Time":"2023-05-31T19:40:14.503039697Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503044072Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 142 8909 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T19:40:14.50304849Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 100 6182 FLANNEL-POSTRTG all -- * * 0.0.0.0/0 0.0.0.0/0 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:40:14.503052956Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503057423Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain FLANNEL-POSTRTG (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503063574Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503068192Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0x4000/0x4000 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:40:14.503072721Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 12 855 RETURN all -- * * 10.244.0.0/24 10.244.0.0/16 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:40:14.503077395Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 RETURN all -- * * 10.244.0.0/16 10.244.0.0/24 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:40:14.503082176Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 RETURN all -- * * !10.244.0.0/16 10.244.0.0/24 /* flanneld masq */\r\n"} +{"Time":"2023-05-31T19:40:14.503088528Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 85 MASQUERADE all -- * * 10.244.0.0/16 !224.0.0.0/4 /* flanneld masq */ random-fully\r\n"} +{"Time":"2023-05-31T19:40:14.503093219Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 MASQUERADE all -- * * !10.244.0.0/16 10.244.0.0/16 /* flanneld masq */ random-fully\r\n"} +{"Time":"2023-05-31T19:40:14.503098947Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503103782Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503108818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.50311327Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503117583Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503121701Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503127906Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T19:40:14.50313225Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503136215Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503140866Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503145115Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503355633Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503424975Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503431003Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 50 3135 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:40:14.503568808Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T19:40:14.503611548Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T19:40:14.503623509Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503627153Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503634406Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503641113Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503644355Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503669822Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.50367477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T19:40:14.50367913Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:40:14.503682869Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503686273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503689433Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503692941Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T19:40:14.503696544Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:40:14.503699824Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503702998Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-UTWFOSUDHOCXYA2F (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503709994Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503713437Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.3 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T19:40:14.503716976Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.3:8080\r\n"} +{"Time":"2023-05-31T19:40:14.503720646Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503724084Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-VNIKGP4R4X6LWZZT (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503727387Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503730749Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 192.168.61.47 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T19:40:14.50373451Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.61.47:8443\r\n"} +{"Time":"2023-05-31T19:40:14.503737703Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503740776Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503743957Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503747395Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T19:40:14.503751053Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:40:14.503754306Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503757588Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503765286Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503769056Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:40:14.503775183Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:40:14.503782507Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.110.72.191 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:40:14.503786423Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:40:14.50379006Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:40:14.503795055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 77 4620 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T19:40:14.503802027Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503805293Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503808477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503811864Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:40:14.503815925Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:40:14.503819534Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503822732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503825789Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.50382959Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:40:14.503833192Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T19:40:14.503839503Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503842864Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503853945Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503857645Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 2 120 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:40:14.503861124Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 3 180 KUBE-SEP-VNIKGP4R4X6LWZZT all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.61.47:8443 */\r\n"} +{"Time":"2023-05-31T19:40:14.5038645Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503867979Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503871639Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503875161Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:40:14.503878756Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:40:14.503882466Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.503885676Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T19:40:14.503889055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:40:14.503892606Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.110.72.191 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:40:14.503896326Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1 60 KUBE-SEP-UTWFOSUDHOCXYA2F all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.3:8080 */\r\n"} +{"Time":"2023-05-31T19:40:14.503899768Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.503902757Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.503905952Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe flannel daemon set:\n"} +{"Time":"2023-05-31T19:40:14.503909332Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-flannel-ds\n"} +{"Time":"2023-05-31T19:40:14.503915465Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Selector: app=flannel\n"} +{"Time":"2023-05-31T19:40:14.503918639Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selector: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.503921864Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T19:40:14.503925244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" k8s-app=flannel\n"} +{"Time":"2023-05-31T19:40:14.503928603Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T19:40:14.503931928Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:40:14.503938748Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:40:14.503942096Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:40:14.503945522Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:40:14.503948686Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:40:14.50395362Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:40:14.503956875Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:40:14.503960039Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:40:14.50396649Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T19:40:14.503969608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T19:40:14.503972743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: flannel\n"} +{"Time":"2023-05-31T19:40:14.503976049Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Init Containers:\n"} +{"Time":"2023-05-31T19:40:14.503984577Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" install-cni-plugin:\n"} +{"Time":"2023-05-31T19:40:14.503990464Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel-cni-plugin:v1.1.2\n"} +{"Time":"2023-05-31T19:40:14.503993713Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.503997133Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.504000328Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.504003372Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cp\n"} +{"Time":"2023-05-31T19:40:14.504006579Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:14.504009725Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -f\n"} +{"Time":"2023-05-31T19:40:14.504012995Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /flannel\n"} +{"Time":"2023-05-31T19:40:14.504016327Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/cni/bin/flannel\n"} +{"Time":"2023-05-31T19:40:14.504019367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.504022488Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.504025449Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/cni/bin from cni-plugin (rw)\n"} +{"Time":"2023-05-31T19:40:14.504028705Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" install-cni:\n"} +{"Time":"2023-05-31T19:40:14.504031705Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel:v0.21.5\n"} +{"Time":"2023-05-31T19:40:14.504035022Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.504038277Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.50404799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.504051252Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cp\n"} +{"Time":"2023-05-31T19:40:14.504054273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:14.504181799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -f\n"} +{"Time":"2023-05-31T19:40:14.504200942Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/cni-conf.json\n"} +{"Time":"2023-05-31T19:40:14.5042073Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/10-flannel.conflist\n"} +{"Time":"2023-05-31T19:40:14.504211807Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.504215357Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.504218925Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d from cni (rw)\n"} +{"Time":"2023-05-31T19:40:14.504222514Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T19:40:14.504225874Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.504228878Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-flannel:\n"} +{"Time":"2023-05-31T19:40:14.504232477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel:v0.21.5\n"} +{"Time":"2023-05-31T19:40:14.504235662Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.504239002Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.504242001Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.504245081Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/bin/flanneld\n"} +{"Time":"2023-05-31T19:40:14.504253241Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:14.504256472Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --ip-masq\n"} +{"Time":"2023-05-31T19:40:14.504259353Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kube-subnet-mgr\n"} +{"Time":"2023-05-31T19:40:14.504262791Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:40:14.504265751Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:40:14.504269221Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:40:14.504272211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T19:40:14.504275404Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD_NAME: (v1:metadata.name)\n"} +{"Time":"2023-05-31T19:40:14.504278894Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD_NAMESPACE: (v1:metadata.namespace)\n"} +{"Time":"2023-05-31T19:40:14.504282118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EVENT_QUEUE_DEPTH: 5000\n"} +{"Time":"2023-05-31T19:40:14.504285281Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.504288373Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T19:40:14.504292441Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/flannel from run (rw)\n"} +{"Time":"2023-05-31T19:40:14.505204259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:40:14.50521317Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:14.505216752Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" run:\n"} +{"Time":"2023-05-31T19:40:14.5052198Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.505224994Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/flannel\n"} +{"Time":"2023-05-31T19:40:14.505228188Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:14.505231547Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni-plugin:\n"} +{"Time":"2023-05-31T19:40:14.505234865Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.505238105Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T19:40:14.505248657Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:14.50525661Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni:\n"} +{"Time":"2023-05-31T19:40:14.505259786Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.505263209Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:40:14.505266316Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:14.505269452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" flannel-cfg:\n"} +{"Time":"2023-05-31T19:40:14.505272677Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:14.505275933Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T19:40:14.50527878Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:14.505281861Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:40:14.505284992Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.505287947Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:40:14.505291512Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:40:14.505294794Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:40:14.505298206Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.505301223Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.505304421Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.505797768Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal SuccessfulCreate 47s daemonset-controller Created pod: kube-flannel-ds-dwcpl\n"} +{"Time":"2023-05-31T19:40:14.505805976Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.505809674Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.505812755Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe flannel pod(s):\n"} +{"Time":"2023-05-31T19:40:14.505816803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-flannel-ds-dwcpl\n"} +{"Time":"2023-05-31T19:40:14.50581991Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-flannel\n"} +{"Time":"2023-05-31T19:40:14.505823073Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:40:14.505826173Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:40:14.505829795Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: flannel\n"} +{"Time":"2023-05-31T19:40:14.505832873Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-509041/192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.505836325Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 19:39:20 +0000\n"} +{"Time":"2023-05-31T19:40:14.505840638Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: app=flannel\n"} +{"Time":"2023-05-31T19:40:14.505843781Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" controller-revision-hash=64f7f74f6b\n"} +{"Time":"2023-05-31T19:40:14.505847111Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:40:14.505850431Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier=node\n"} +{"Time":"2023-05-31T19:40:14.505853982Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.50585721Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:14.505861365Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.505865483Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:14.505869406Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.505873791Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: DaemonSet/kube-flannel-ds\n"} +{"Time":"2023-05-31T19:40:14.505877244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Init Containers:\n"} +{"Time":"2023-05-31T19:40:14.505880194Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" install-cni-plugin:\n"} +{"Time":"2023-05-31T19:40:14.505884355Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: containerd://c770ceddd3f7ad281041e8d53b430061c887377d94de31b62851445654cc954b\n"} +{"Time":"2023-05-31T19:40:14.505887937Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel-cni-plugin:v1.1.2\n"} +{"Time":"2023-05-31T19:40:14.506449763Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker.io/flannel/flannel-cni-plugin@sha256:bf4b62b131666d040f35a327d906ee5a3418280b68a88d9b9c7e828057210443\n"} +{"Time":"2023-05-31T19:40:14.506463666Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.506467351Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.50647047Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.506473238Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cp\n"} +{"Time":"2023-05-31T19:40:14.506476357Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:14.50647949Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -f\n"} +{"Time":"2023-05-31T19:40:14.506482937Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /flannel\n"} +{"Time":"2023-05-31T19:40:14.506486086Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/cni/bin/flannel\n"} +{"Time":"2023-05-31T19:40:14.506489312Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Terminated\n"} +{"Time":"2023-05-31T19:40:14.506492452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T19:40:14.506495624Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T19:40:14.506498992Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 19:39:23 +0000\n"} +{"Time":"2023-05-31T19:40:14.506502107Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Finished: Wed, 31 May 2023 19:39:23 +0000\n"} +{"Time":"2023-05-31T19:40:14.506505463Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:14.506508524Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:14.506511852Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.506515089Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.506518126Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/cni/bin from cni-plugin (rw)\n"} +{"Time":"2023-05-31T19:40:14.506521426Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-pzr2z (ro)\n"} +{"Time":"2023-05-31T19:40:14.506528393Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" install-cni:\n"} +{"Time":"2023-05-31T19:40:14.506531833Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: containerd://cbd575258ddee93d009ce1c2299174061d83dbb8f316312819e6ce0f1ac6f407\n"} +{"Time":"2023-05-31T19:40:14.506536544Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel:v0.21.5\n"} +{"Time":"2023-05-31T19:40:14.506539973Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker.io/flannel/flannel@sha256:2d5c29e591eab6e40a2959f96edf22e45a254f27769fdd2f03b5bc7f849c0de7\n"} +{"Time":"2023-05-31T19:40:14.507064468Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.507071929Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.507075371Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.50707843Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cp\n"} +{"Time":"2023-05-31T19:40:14.507081427Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:14.507084457Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -f\n"} +{"Time":"2023-05-31T19:40:14.507087608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/cni-conf.json\n"} +{"Time":"2023-05-31T19:40:14.507093973Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d/10-flannel.conflist\n"} +{"Time":"2023-05-31T19:40:14.507097528Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Terminated\n"} +{"Time":"2023-05-31T19:40:14.507100644Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Reason: Completed\n"} +{"Time":"2023-05-31T19:40:14.50711193Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Exit Code: 0\n"} +{"Time":"2023-05-31T19:40:14.507115187Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 19:39:26 +0000\n"} +{"Time":"2023-05-31T19:40:14.507118201Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Finished: Wed, 31 May 2023 19:39:26 +0000\n"} +{"Time":"2023-05-31T19:40:14.5071217Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:14.507131428Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:14.507134869Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.507138205Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.507141229Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/cni/net.d from cni (rw)\n"} +{"Time":"2023-05-31T19:40:14.507145409Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T19:40:14.507148743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-pzr2z (ro)\n"} +{"Time":"2023-05-31T19:40:14.507152077Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.507155106Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-flannel:\n"} +{"Time":"2023-05-31T19:40:14.507158293Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: containerd://7fc7ac3d39d863cbfb3944d4cde6c15a38441fd60448536ce36ed12585979a93\n"} +{"Time":"2023-05-31T19:40:14.507161646Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: docker.io/flannel/flannel:v0.21.5\n"} +{"Time":"2023-05-31T19:40:14.507164989Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: docker.io/flannel/flannel@sha256:2d5c29e591eab6e40a2959f96edf22e45a254f27769fdd2f03b5bc7f849c0de7\n"} +{"Time":"2023-05-31T19:40:14.507612296Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.507619416Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.507622663Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.507625712Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /opt/bin/flanneld\n"} +{"Time":"2023-05-31T19:40:14.507628772Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Args:\n"} +{"Time":"2023-05-31T19:40:14.507633659Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --ip-masq\n"} +{"Time":"2023-05-31T19:40:14.507636983Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --kube-subnet-mgr\n"} +{"Time":"2023-05-31T19:40:14.507639935Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:14.507643019Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 19:39:27 +0000\n"} +{"Time":"2023-05-31T19:40:14.50764666Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:14.507657675Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:14.507661586Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requests:\n"} +{"Time":"2023-05-31T19:40:14.507664787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:40:14.507668061Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memory: 50Mi\n"} +{"Time":"2023-05-31T19:40:14.507671066Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T19:40:14.507674617Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD_NAME: kube-flannel-ds-dwcpl (v1:metadata.name)\n"} +{"Time":"2023-05-31T19:40:14.507677848Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" POD_NAMESPACE: kube-flannel (v1:metadata.namespace)\n"} +{"Time":"2023-05-31T19:40:14.507681228Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EVENT_QUEUE_DEPTH: 5000\n"} +{"Time":"2023-05-31T19:40:14.507684231Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.507687167Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/kube-flannel/ from flannel-cfg (rw)\n"} +{"Time":"2023-05-31T19:40:14.507690582Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/flannel from run (rw)\n"} +{"Time":"2023-05-31T19:40:14.507698907Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:40:14.507702464Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-pzr2z (ro)\n"} +{"Time":"2023-05-31T19:40:14.507705927Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:14.507708845Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:14.507712112Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:14.508030277Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:14.508034723Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:14.508036815Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:14.508038918Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:14.508041158Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" run:\n"} +{"Time":"2023-05-31T19:40:14.50804317Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.508045354Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/flannel\n"} +{"Time":"2023-05-31T19:40:14.508047575Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:14.508049594Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni-plugin:\n"} +{"Time":"2023-05-31T19:40:14.508051688Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.508053635Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /opt/cni/bin\n"} +{"Time":"2023-05-31T19:40:14.508055543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:14.508057662Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni:\n"} +{"Time":"2023-05-31T19:40:14.508059892Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.50806308Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /etc/cni/net.d\n"} +{"Time":"2023-05-31T19:40:14.508065908Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:14.508067833Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" flannel-cfg:\n"} +{"Time":"2023-05-31T19:40:14.508069758Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:14.508071712Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T19:40:14.508073585Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:14.508075654Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:40:14.50807766Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.508079746Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:40:14.508081638Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:40:14.508083657Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-api-access-pzr2z:\n"} +{"Time":"2023-05-31T19:40:14.508085962Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:40:14.508677566Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:40:14.508683992Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.508686545Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:40:14.50868878Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:40:14.508690938Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:40:14.508692922Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.508695042Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: :NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.508697372Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.508699846Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.508702048Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.508704272Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:40:14.508706732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.508708862Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:40:14.508710997Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.508713041Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.508715163Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.508717418Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.508719799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Scheduled 47s default-scheduler Successfully assigned kube-flannel/kube-flannel-ds-dwcpl to flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.508722065Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulling 46s kubelet Pulling image \"docker.io/flannel/flannel-cni-plugin:v1.1.2\"\n"} +{"Time":"2023-05-31T19:40:14.50872446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 44s kubelet Successfully pulled image \"docker.io/flannel/flannel-cni-plugin:v1.1.2\" in 1.454552854s (1.454588229s including waiting)\n"} +{"Time":"2023-05-31T19:40:14.508729605Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 44s kubelet Created container install-cni-plugin\n"} +{"Time":"2023-05-31T19:40:14.509209221Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 44s kubelet Started container install-cni-plugin\n"} +{"Time":"2023-05-31T19:40:14.509216618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulling 44s kubelet Pulling image \"docker.io/flannel/flannel:v0.21.5\"\n"} +{"Time":"2023-05-31T19:40:14.509220256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 41s kubelet Successfully pulled image \"docker.io/flannel/flannel:v0.21.5\" in 2.392608428s (2.392653681s including waiting)\n"} +{"Time":"2023-05-31T19:40:14.509223778Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 41s kubelet Created container install-cni\n"} +{"Time":"2023-05-31T19:40:14.509227101Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 41s kubelet Started container install-cni\n"} +{"Time":"2023-05-31T19:40:14.50923065Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 41s kubelet Container image \"docker.io/flannel/flannel:v0.21.5\" already present on machine\n"} +{"Time":"2023-05-31T19:40:14.509234321Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 41s kubelet Created container kube-flannel\n"} +{"Time":"2023-05-31T19:40:14.509237925Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 40s kubelet Started container kube-flannel\n"} +{"Time":"2023-05-31T19:40:14.509241223Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509244423Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509247463Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (current):\n"} +{"Time":"2023-05-31T19:40:14.50925085Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.213191 1 main.go:356] Setting up masking rules\n"} +{"Time":"2023-05-31T19:40:14.509254383Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.215858 1 main.go:407] Changing default FORWARD chain policy to ACCEPT\n"} +{"Time":"2023-05-31T19:40:14.50925803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.216844 1 iptables.go:290] generated 7 rules\n"} +{"Time":"2023-05-31T19:40:14.50926136Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.220900 1 main.go:435] Wrote subnet file to /run/flannel/subnet.env\n"} +{"Time":"2023-05-31T19:40:14.50926504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.220937 1 main.go:439] Running backend.\n"} +{"Time":"2023-05-31T19:40:14.509268414Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.221144 1 iptables.go:290] generated 3 rules\n"} +{"Time":"2023-05-31T19:40:14.509271855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.226030 1 vxlan_network.go:64] watching for new subnet leases\n"} +{"Time":"2023-05-31T19:40:14.509275449Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.229603 1 iptables.go:283] bootstrap done\n"} +{"Time":"2023-05-31T19:40:14.509737066Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.232687 1 main.go:460] Waiting for all goroutines to exit\n"} +{"Time":"2023-05-31T19:40:14.509744094Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [pod/kube-flannel-ds-dwcpl/kube-flannel] I0531 19:39:28.249168 1 iptables.go:283] bootstrap done\n"} +{"Time":"2023-05-31T19:40:14.509747655Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.50975096Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509753855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (previous):\n"} +{"Time":"2023-05-31T19:40:14.509757525Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: previous terminated container \"install-cni-plugin\" in pod \"kube-flannel-ds-dwcpl\" not found\n"} +{"Time":"2023-05-31T19:40:14.509761171Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: previous terminated container \"install-cni\" in pod \"kube-flannel-ds-dwcpl\" not found\n"} +{"Time":"2023-05-31T19:40:14.509765041Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: previous terminated container \"kube-flannel\" in pod \"kube-flannel-ds-dwcpl\" not found\n"} +{"Time":"2023-05-31T19:40:14.509768503Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509771564Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509774546Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /run/flannel/subnet.env:\n"} +{"Time":"2023-05-31T19:40:14.509777994Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" FLANNEL_NETWORK=10.244.0.0/16\r\n"} +{"Time":"2023-05-31T19:40:14.509781174Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" FLANNEL_SUBNET=10.244.0.1/24\r\n"} +{"Time":"2023-05-31T19:40:14.509784274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" FLANNEL_MTU=1450\r\n"} +{"Time":"2023-05-31T19:40:14.509790408Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" FLANNEL_IPMASQ=true\r\n"} +{"Time":"2023-05-31T19:40:14.509793813Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509796838Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509799909Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/kube-flannel/cni-conf.json:\n"} +{"Time":"2023-05-31T19:40:14.509810608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cat: /etc/kube-flannel/cni-conf.json: No such file or directory\r\n"} +{"Time":"2023-05-31T19:40:14.509813933Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:40:14.509816998Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509819878Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.509823107Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:40:14.509826663Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.510222428Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.510229195Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:40:14.510232849Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.510236312Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:40:14.510239608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:40:14.510243025Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:40:14.510246532Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:40:14.510249868Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:40:14.510253118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:40:14.510256191Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:40:14.510259359Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:40:14.510262844Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.510265948Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.510268775Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.510272047Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:40:14.51027552Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:40:14.510278527Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.510282026Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.510285012Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.510288036Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.510291244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:40:14.510294302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:40:14.510297439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T19:40:14.510300817Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:40:14.510304846Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.510307982Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:40:14.510736671Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:40:14.510744544Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:40:14.510747777Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:14.510750844Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:40:14.510754197Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:14.510757661Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.510760609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:14.510763531Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:40:14.510767024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.510770091Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:40:14.510773004Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:40:14.510776128Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:40:14.510779503Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.510782671Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:40:14.510785914Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:14.510788855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:40:14.510792136Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.510795124Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.510798253Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.510801212Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal SuccessfulCreate 47s daemonset-controller Created pod: kube-proxy-ztwqw\n"} +{"Time":"2023-05-31T19:40:14.510806762Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.510809988Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.510813128Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:40:14.510816353Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-proxy-ztwqw\n"} +{"Time":"2023-05-31T19:40:14.510819474Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.511100543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:40:14.511103883Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:40:14.511105972Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.511108164Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node: flannel-509041/192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.511110219Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Start Time: Wed, 31 May 2023 19:39:20 +0000\n"} +{"Time":"2023-05-31T19:40:14.511117342Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T19:40:14.511119624Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.511121854Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:40:14.511129831Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.511131948Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:40:14.511134017Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.511137494Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IPs:\n"} +{"Time":"2023-05-31T19:40:14.511139516Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP: 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.511141629Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.511143564Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Containers:\n"} +{"Time":"2023-05-31T19:40:14.511146047Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:40:14.511148061Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Container ID: containerd://696f3e63bbe6fe54ad6c833bf0082edefd1783b490bf9efbcdef731e7ef7ff9f\n"} +{"Time":"2023-05-31T19:40:14.511150381Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:40:14.511152582Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Image ID: registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T19:40:14.511155646Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.511157605Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:40:14.511159639Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Command:\n"} +{"Time":"2023-05-31T19:40:14.511161596Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.511163914Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:40:14.51141924Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:40:14.511426402Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" State: Running\n"} +{"Time":"2023-05-31T19:40:14.511429199Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Started: Wed, 31 May 2023 19:39:21 +0000\n"} +{"Time":"2023-05-31T19:40:14.511432245Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:40:14.511435249Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:40:14.511440737Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment:\n"} +{"Time":"2023-05-31T19:40:14.51144411Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:40:14.51144739Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:40:14.511450192Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:40:14.511452962Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:40:14.511455715Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:40:14.511458717Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-b25rr (ro)\n"} +{"Time":"2023-05-31T19:40:14.511462161Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:40:14.511465471Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Status\n"} +{"Time":"2023-05-31T19:40:14.511468795Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:40:14.511471637Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Ready True \n"} +{"Time":"2023-05-31T19:40:14.511474709Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:40:14.511477462Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:40:14.511480352Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:40:14.511483797Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:40:14.511486944Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:40:14.511490646Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.511493815Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:40:14.511496932Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:40:14.511500334Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.511503653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:40:14.511860249Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:40:14.511866864Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:40:14.511870527Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:40:14.511873986Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:40:14.51187711Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:40:14.511880338Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-api-access-b25rr:\n"} +{"Time":"2023-05-31T19:40:14.511883698Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:40:14.5118872Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:40:14.511890937Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.511895651Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:40:14.51190037Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:40:14.511904812Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:40:14.511908676Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:40:14.511912216Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T19:40:14.511917156Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.511920905Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.511924426Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.511928205Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:40:14.51193167Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.511935139Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:40:14.511938578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:40:14.5119417Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Events:\n"} +{"Time":"2023-05-31T19:40:14.511950613Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:40:14.51301079Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:40:14.513019703Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Scheduled 48s default-scheduler Successfully assigned kube-system/kube-proxy-ztwqw to flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.513023501Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Pulled 47s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:40:14.513027758Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Created 47s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.51303146Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Normal Started 47s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.513034807Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.513038232Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.513041465Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:40:14.513045081Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.004582 1 node.go:141] Successfully retrieved node IP: 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.513048707Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.004687 1 server_others.go:110] \"Detected node IP\" address=\"192.168.61.47\"\n"} +{"Time":"2023-05-31T19:40:14.513052216Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.004728 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T19:40:14.513055765Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.067274 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T19:40:14.513059662Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.067344 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T19:40:14.513063501Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.067372 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T19:40:14.513067742Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.068247 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T19:40:14.513071152Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.068258 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:40:14.513074846Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.069105 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T19:40:14.513080048Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.069122 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T19:40:14.513083772Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.069140 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T19:40:14.513611522Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.069143 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T19:40:14.51361817Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.069919 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T19:40:14.513622007Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.070008 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T19:40:14.513626432Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.170127 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T19:40:14.513630327Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.170183 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T19:40:14.513634034Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" I0531 19:39:22.171033 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T19:40:14.513637279Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.513640496Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.513643907Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:40:14.513647594Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:40:14.513651653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: loaded (\u001b]8;;file://flannel-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:40:14.513656112Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T19:40:14.513659924Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─\u001b]8;;file://flannel-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:40:14.513663984Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:08 UTC; 59s ago\r\n"} +{"Time":"2023-05-31T19:40:14.513668879Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:40:14.513673211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Main PID: 1228 (kubelet)\r\n"} +{"Time":"2023-05-31T19:40:14.513676769Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tasks: 11 (limit: 3251)\r\n"} +{"Time":"2023-05-31T19:40:14.513679803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Memory: 33.5M\r\n"} +{"Time":"2023-05-31T19:40:14.513683321Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T19:40:14.513687891Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─1228 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=flannel-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.61.47\r\n"} +{"Time":"2023-05-31T19:40:14.51423311Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.514240822Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: E0531 19:39:27.246331 1228 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bb926cb2fbfe4cb8282baaaa5ed99fa698baa96baa110c9f0bf1058641cfe0a\\\": plugin type=\\\"flannel\\\" failed (add): loadFlannelSubnetEnv failed: open /run/flannel/subnet.env: no such file or directory\" pod=\"kube-system/coredns-5d78c9869d-8phqx\"\r\n"} +{"Time":"2023-05-31T19:40:14.514251523Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: E0531 19:39:27.246379 1228 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bb926cb2fbfe4cb8282baaaa5ed99fa698baa96baa110c9f0bf1058641cfe0a\\\": plugin type=\\\"flannel\\\" failed (add): loadFlannelSubnetEnv failed: open /run/flannel/subnet.env: no such file or directory\" pod=\"kube-system/coredns-5d78c9869d-8phqx\"\r\n"} +{"Time":"2023-05-31T19:40:14.514257401Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: E0531 19:39:27.246626 1228 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-8phqx_kube-system(b4c674ce-0afa-48e2-80ec-cababeb96873)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-8phqx_kube-system(b4c674ce-0afa-48e2-80ec-cababeb96873)\\\\\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\\\\\"1bb926cb2fbfe4cb8282baaaa5ed99fa698baa96baa110c9f0bf1058641cfe0a\\\\\\\": plugin type=\\\\\\\"flannel\\\\\\\" failed (add): loadFlannelSubnetEnv failed: open /run/flannel/subnet.env: no such file or directory\\\"\" pod=\"kube-system/coredns-5d78c9869d-8phqx\" podUID=b4c674ce-0afa-48e2-80ec-cababeb96873\r\n"} +{"Time":"2023-05-31T19:40:14.514263914Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: I0531 19:39:27.971583 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-flannel/kube-flannel-ds-dwcpl\" podStartSLOduration=3.5390057759999998 podCreationTimestamp=\"2023-05-31 19:39:20 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:39:21.882237544 +0000 UTC m=+13.409649159\" lastFinishedPulling=\"2023-05-31 19:39:26.314781053 +0000 UTC m=+17.842192665\" observedRunningTime=\"2023-05-31 19:39:27.953536469 +0000 UTC m=+19.480948088\" watchObservedRunningTime=\"2023-05-31 19:39:27.971549282 +0000 UTC m=+19.498960901\"\r\n"} +{"Time":"2023-05-31T19:40:14.514271887Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:28 flannel-509041 kubelet[1228]: I0531 19:39:28.860856 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=6.860826123 podCreationTimestamp=\"2023-05-31 19:39:22 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:27.972596726 +0000 UTC m=+19.500008345\" watchObservedRunningTime=\"2023-05-31 19:39:28.860826123 +0000 UTC m=+20.388237742\"\r\n"} +{"Time":"2023-05-31T19:40:14.514278364Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:40 flannel-509041 kubelet[1228]: I0531 19:39:40.013848 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-8phqx\" podStartSLOduration=19.013815103 podCreationTimestamp=\"2023-05-31 19:39:21 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:39.991169673 +0000 UTC m=+31.518581293\" watchObservedRunningTime=\"2023-05-31 19:39:40.013815103 +0000 UTC m=+31.541226723\"\r\n"} +{"Time":"2023-05-31T19:40:14.514665316Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:46 flannel-509041 kubelet[1228]: I0531 19:39:46.972037 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.514672836Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:47 flannel-509041 kubelet[1228]: I0531 19:39:47.091962 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-nmmcl\\\" (UniqueName: \\\"kubernetes.io/projected/392b034e-49c8-452d-b229-d9dcac54ed1e-kube-api-access-nmmcl\\\") pod \\\"netcat-7458db8b8-gqs6x\\\" (UID: \\\"392b034e-49c8-452d-b229-d9dcac54ed1e\\\") \" pod=\"default/netcat-7458db8b8-gqs6x\"\r\n"} +{"Time":"2023-05-31T19:40:14.51470186Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:51 flannel-509041 kubelet[1228]: I0531 19:39:51.015477 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-gqs6x\" podStartSLOduration=2.704966286 podCreationTimestamp=\"2023-05-31 19:39:46 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:39:47.759130753 +0000 UTC m=+39.286542367\" lastFinishedPulling=\"2023-05-31 19:39:50.069530917 +0000 UTC m=+41.596942518\" observedRunningTime=\"2023-05-31 19:39:51.014989475 +0000 UTC m=+42.542401094\" watchObservedRunningTime=\"2023-05-31 19:39:51.015366437 +0000 UTC m=+42.542778056\"\r\n"} +{"Time":"2023-05-31T19:40:14.51470806Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:40:02 flannel-509041 kubelet[1228]: E0531 19:40:02.510009 1228 upgradeaware.go:426] Error proxying data from client to backend: readfrom tcp 192.168.122.189:38126-\u003e192.168.122.189:10010: write tcp 192.168.122.189:38126-\u003e192.168.122.189:10010: write: broken pipe\r\n"} +{"Time":"2023-05-31T19:40:14.514712376Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.514715497Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.514718664Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:40:14.514722504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.51472608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:14.514729788Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:40:14.51473287Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T19:40:14.514738104Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T19:40:14.514741457Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.51474445Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:14.515220066Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T19:40:14.515225618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:40:14.515227989Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T19:40:14.515230364Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T19:40:14.515232448Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.515234599Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:14.515236621Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:14.515239029Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.515241199Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.515243941Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:14.515246385Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Wants=containerd.service\r\n"} +{"Time":"2023-05-31T19:40:14.515248296Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.515250249Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:14.515254214Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T19:40:14.515256644Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=flannel-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.61.47\r\n"} +{"Time":"2023-05-31T19:40:14.515259916Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.5152619Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:14.515263992Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.515265891Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.515267861Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:40:14.515270408Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -- Journal begins at Wed 2023-05-31 19:38:23 UTC, ends at Wed 2023-05-31 19:40:08 UTC. --\r\n"} +{"Time":"2023-05-31T19:40:14.515272748Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:57 flannel-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:40:14.515275093Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.515643504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.515656616Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.51566076Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.515670466Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.515673983Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.515677515Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 534.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.515686403Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:57 flannel-509041 kubelet[859]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:40:14.515690791Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.411888 859 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:40:14.515694626Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.411969 859 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:40:14.515698614Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.412216 859 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:40:14.515703841Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.422206 859 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.515708444Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.422364 859 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:40:14.515712429Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.427117 859 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:40:14.515716459Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.427772 859 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:40:14.516195735Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.427857 859 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:40:14.516209855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.427878 859 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:40:14.516213068Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.427889 859 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:40:14.516215551Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.427966 859 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:14.516218221Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.436726 859 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:40:14.51622073Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.436810 859 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:40:14.516223776Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.436880 859 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:40:14.516226161Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.436936 859 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:40:14.516228818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: W0531 19:38:58.437830 859 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dflannel-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.516232077Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.438024 859 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dflannel-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.516569261Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.438143 859 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:40:14.516576081Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: W0531 19:38:58.438475 859 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T19:40:14.5165933Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.439254 859 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:40:14.516597662Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.442899 859 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:40:14.516601443Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: W0531 19:38:58.445345 859 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.516606055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.445529 859 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.516612625Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.445683 859 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"flannel-509041.176451a70b96d093\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"flannel-509041\", UID:\"flannel-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"flannel-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 38, 58, 439229587, time.Local), LastTimestamp:time."} +{"Time":"2023-05-31T19:40:14.516622406Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"Date(2023, time.May, 31, 19, 38, 58, 439229587, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.61.47:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:40:14.516962514Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.447338 859 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:40:14.516969532Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.448306 859 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:40:14.516974205Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.450066 859 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:40:14.516979165Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.450954 859 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:40:14.516986854Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.451098 859 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:40:14.516991888Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: W0531 19:38:58.451552 859 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.517000354Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.451652 859 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.517008209Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.452506 859 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/flannel-509041?timeout=10s\\\": dial tcp 192.168.61.47:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T19:40:14.517013901Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.479143 859 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:40:14.517021201Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.492629 859 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:40:14.517025722Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.492728 859 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:40:14.517239617Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.492787 859 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:40:14.517245314Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.492882 859 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:40:14.517258102Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: W0531 19:38:58.499016 859 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.517271153Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.499355 859 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.517276293Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.505201 859 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:40:14.517286205Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.505217 859 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:40:14.517290964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.505234 859 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:14.517296465Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.510824 859 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:40:14.517302543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.512357 859 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:40:14.517310265Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.512550 859 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:14.517314678Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.514762 859 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:40:14.517322664Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:40:14.517327071Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:40:14.517529029Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:40:14.517534746Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.534734 859 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:40:14.517549335Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.536599 859 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:40:14.517553911Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.537768 859 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"flannel-509041\\\" not found\"\r\n"} +{"Time":"2023-05-31T19:40:14.517564307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.552162 859 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.517569691Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.553076 859 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.61.47:8443: connect: connection refused\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.51758225Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.593545 859 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.517596256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.594864 859 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.517600794Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.596842 859 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.517606193Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.598535 859 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.517610636Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.653094 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/e083b7f213eec53fc93fbd95f0a85b96-etcd-data\\\") pod \\\"etcd-flannel-509041\\\" (UID: \\\"e083b7f213eec53fc93fbd95f0a85b96\\\") \" pod=\"kube-system/etcd-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.517622558Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.653235 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/e8797a15983827b818bfa495d52cc24a-kubeconfig\\\") pod \\\"kube-scheduler-flannel-509041\\\" (UID: \\\"e8797a15983827b818bfa495d52cc24a\\\") \" pod=\"kube-system/kube-scheduler-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.517879678Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.653330 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/e083b7f213eec53fc93fbd95f0a85b96-etcd-certs\\\") pod \\\"etcd-flannel-509041\\\" (UID: \\\"e083b7f213eec53fc93fbd95f0a85b96\\\") \" pod=\"kube-system/etcd-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.517893117Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.654175 859 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/flannel-509041?timeout=10s\\\": dial tcp 192.168.61.47:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T19:40:14.517899444Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.753874 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-ca-certs\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.517910505Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.753978 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-k8s-certs\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.517917332Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.754014 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-flexvolume-dir\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.51792876Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.754047 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-kubeconfig\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.517934902Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.754086 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.518229041Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.754146 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/79931245727b9a1d87857521068d8ed5-ca-certs\\\") pod \\\"kube-apiserver-flannel-509041\\\" (UID: \\\"79931245727b9a1d87857521068d8ed5\\\") \" pod=\"kube-system/kube-apiserver-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.518245417Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.754182 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/79931245727b9a1d87857521068d8ed5-k8s-certs\\\") pod \\\"kube-apiserver-flannel-509041\\\" (UID: \\\"79931245727b9a1d87857521068d8ed5\\\") \" pod=\"kube-system/kube-apiserver-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.51825216Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.754226 859 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/79931245727b9a1d87857521068d8ed5-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-flannel-509041\\\" (UID: \\\"79931245727b9a1d87857521068d8ed5\\\") \" pod=\"kube-system/kube-apiserver-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.518263648Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: I0531 19:38:58.755764 859 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.51827794Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:58 flannel-509041 kubelet[859]: E0531 19:38:58.757142 859 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.61.47:8443: connect: connection refused\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.518291039Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: E0531 19:38:59.059298 859 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/flannel-509041?timeout=10s\\\": dial tcp 192.168.61.47:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T19:40:14.518296265Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: I0531 19:38:59.159478 859 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.518309079Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: E0531 19:38:59.160203 859 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.61.47:8443: connect: connection refused\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.518713137Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: W0531 19:38:59.264923 859 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dflannel-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.518727844Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: E0531 19:38:59.264996 859 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Dflannel-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.518733897Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: W0531 19:38:59.353823 859 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.518739001Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: E0531 19:38:59.353870 859 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.518744384Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: W0531 19:38:59.583663 859 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.518748893Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: E0531 19:38:59.583849 859 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.518752382Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: W0531 19:38:59.791918 859 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.518755912Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: E0531 19:38:59.791948 859 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.51928039Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: E0531 19:38:59.860859 859 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/flannel-509041?timeout=10s\\\": dial tcp 192.168.61.47:8443: connect: connection refused\" interval=\"1.6s\"\r\n"} +{"Time":"2023-05-31T19:40:14.519288295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: I0531 19:38:59.961647 859 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.519292705Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:59 flannel-509041 kubelet[859]: E0531 19:38:59.961982 859 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.61.47:8443: connect: connection refused\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.519298188Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:00 flannel-509041 kubelet[859]: E0531 19:39:00.579679 859 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.61.47:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:40:14.51930237Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:01 flannel-509041 kubelet[859]: I0531 19:39:01.563020 859 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.519306899Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:05 flannel-509041 kubelet[859]: E0531 19:39:05.155635 859 nodelease.go:49] \"Failed to get node when trying to set owner ref to the node lease\" err=\"nodes \\\"flannel-509041\\\" not found\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.519311816Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:05 flannel-509041 kubelet[859]: I0531 19:39:05.212825 859 kubelet_node_status.go:73] \"Successfully registered node\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.519318625Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:05 flannel-509041 kubelet[859]: E0531 19:39:05.261013 859 event.go:280] Server rejected event '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"flannel-509041.176451a70b96d093\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"flannel-509041\", UID:\"flannel-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"flannel-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, 19, 38, 58, 439229587, time.Local), LastTimestamp:time.D"} +{"Time":"2023-05-31T19:40:14.519838461Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"ate(2023, time.May, 31, 19, 38, 58, 439229587, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'namespaces \"default\" not found' (will not retry!)\r\n"} +{"Time":"2023-05-31T19:40:14.519848313Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:05 flannel-509041 kubelet[859]: I0531 19:39:05.448802 859 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:40:14.519860858Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:05 flannel-509041 kubelet[859]: I0531 19:39:05.552509 859 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:40:14.519866567Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:05 flannel-509041 kubelet[859]: I0531 19:39:05.609332 859 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:40:14.51988226Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T19:40:14.51988737Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.519897161Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.519902341Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.519911441Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.519915635Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.51991997Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.519927393Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 589.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520355723Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[859]: I0531 19:39:08.436696 859 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:40:14.520371133Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 systemd[1]: kubelet.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:40:14.520375776Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.52038514Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520389741Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520394299Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520402103Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520409706Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:40:14.520414008Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520422125Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520427582Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.52043287Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520437038Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520444835Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520455512Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 589 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.52046014Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:40:14.520467835Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.520475625Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.52141098Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.521421812Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.5214263Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.521430317Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.521434262Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 589.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.521438707Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:40:14.521443789Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.602604 1228 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:40:14.521472897Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.602674 1228 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:40:14.521477979Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.602828 1228 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:40:14.521482532Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.605520 1228 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T19:40:14.521487389Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.609021 1228 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:40:14.521491457Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.609565 1228 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:40:14.521497593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.609610 1228 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:40:14.522064823Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.609626 1228 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:40:14.522075292Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.609636 1228 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:40:14.522080158Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.609660 1228 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:14.522084726Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.609855 1228 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:40:14.522089607Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.623595 1228 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:40:14.522094312Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.623724 1228 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:40:14.522098837Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.623782 1228 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:40:14.522103344Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.623942 1228 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:40:14.522110799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.632808 1228 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:40:14.522115734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.633346 1228 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:40:14.522120566Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.651477 1228 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:40:14.522508887Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.652099 1228 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:40:14.52252889Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.654319 1228 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:40:14.522534525Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.671252 1228 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:40:14.522540346Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.677004 1228 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:40:14.522545472Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.679614 1228 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:40:14.522550446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.780653 1228 kubelet_node_status.go:70] \"Attempting to register node\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.522555323Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.798632 1228 kubelet_node_status.go:108] \"Node was previously registered\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.522560209Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.798714 1228 kubelet_node_status.go:73] \"Successfully registered node\" node=\"flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.522565485Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.826949 1228 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:40:14.522570032Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.841675 1228 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:40:14.522574712Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.841727 1228 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:40:14.522579543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.841745 1228 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:40:14.522585224Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: E0531 19:39:08.841789 1228 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:40:14.522590947Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: E0531 19:39:08.901006 1228 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:40:14.523543193Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:40:14.523563415Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:40:14.523568202Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:40:14.523572985Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.926795 1228 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:40:14.523578284Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.926990 1228 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:40:14.5235839Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.927253 1228 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:14.523588881Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.927713 1228 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T19:40:14.52359432Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.927812 1228 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T19:40:14.523602855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.927853 1228 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:40:14.523608384Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.928739 1228 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:40:14.523613901Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.928899 1228 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:40:14.52361831Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.929361 1228 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T19:40:14.52363287Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.930983 1228 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:40:14.5236385Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.932364 1228 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:40:14.523643307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.947359 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.524577088Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.947759 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.52458898Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.952688 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.524594533Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:08 flannel-509041 kubelet[1228]: I0531 19:39:08.957005 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.524600404Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.083771 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-flexvolume-dir\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.524607299Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.083923 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/e083b7f213eec53fc93fbd95f0a85b96-etcd-certs\\\") pod \\\"etcd-flannel-509041\\\" (UID: \\\"e083b7f213eec53fc93fbd95f0a85b96\\\") \" pod=\"kube-system/etcd-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.524614145Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.083977 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/79931245727b9a1d87857521068d8ed5-ca-certs\\\") pod \\\"kube-apiserver-flannel-509041\\\" (UID: \\\"79931245727b9a1d87857521068d8ed5\\\") \" pod=\"kube-system/kube-apiserver-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.524621557Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.084023 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/79931245727b9a1d87857521068d8ed5-k8s-certs\\\") pod \\\"kube-apiserver-flannel-509041\\\" (UID: \\\"79931245727b9a1d87857521068d8ed5\\\") \" pod=\"kube-system/kube-apiserver-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.524635643Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.084072 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-k8s-certs\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.524641586Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.084121 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-kubeconfig\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525160257Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.084172 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525171658Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.084218 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/e8797a15983827b818bfa495d52cc24a-kubeconfig\\\") pod \\\"kube-scheduler-flannel-509041\\\" (UID: \\\"e8797a15983827b818bfa495d52cc24a\\\") \" pod=\"kube-system/kube-scheduler-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525179999Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.084270 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/e083b7f213eec53fc93fbd95f0a85b96-etcd-data\\\") pod \\\"etcd-flannel-509041\\\" (UID: \\\"e083b7f213eec53fc93fbd95f0a85b96\\\") \" pod=\"kube-system/etcd-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525186297Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.084317 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/79931245727b9a1d87857521068d8ed5-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-flannel-509041\\\" (UID: \\\"79931245727b9a1d87857521068d8ed5\\\") \" pod=\"kube-system/kube-apiserver-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525193355Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.084362 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/5f2601918c5187d93e365dee53591b37-ca-certs\\\") pod \\\"kube-controller-manager-flannel-509041\\\" (UID: \\\"5f2601918c5187d93e365dee53591b37\\\") \" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525203592Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.644509 1228 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:40:14.525209557Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.680072 1228 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:40:14.525214409Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.688370 1228 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:40:14.52576865Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: E0531 19:39:09.902296 1228 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-flannel-509041\\\" already exists\" pod=\"kube-system/kube-controller-manager-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525780783Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: E0531 19:39:09.902719 1228 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-flannel-509041\\\" already exists\" pod=\"kube-system/kube-apiserver-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525787063Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: E0531 19:39:09.903323 1228 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-flannel-509041\\\" already exists\" pod=\"kube-system/etcd-flannel-509041\"\r\n"} +{"Time":"2023-05-31T19:40:14.525793062Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.952727 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-flannel-509041\" podStartSLOduration=1.952488591 podCreationTimestamp=\"2023-05-31 19:39:08 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:09.930501578 +0000 UTC m=+1.457913214\" watchObservedRunningTime=\"2023-05-31 19:39:09.952488591 +0000 UTC m=+1.479900205\"\r\n"} +{"Time":"2023-05-31T19:40:14.525800311Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.954503 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-flannel-509041\" podStartSLOduration=1.954475108 podCreationTimestamp=\"2023-05-31 19:39:08 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:09.949007606 +0000 UTC m=+1.476419225\" watchObservedRunningTime=\"2023-05-31 19:39:09.954475108 +0000 UTC m=+1.481886727\"\r\n"} +{"Time":"2023-05-31T19:40:14.525807935Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.992169 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-flannel-509041\" podStartSLOduration=1.992041376 podCreationTimestamp=\"2023-05-31 19:39:08 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:09.966035053 +0000 UTC m=+1.493446675\" watchObservedRunningTime=\"2023-05-31 19:39:09.992041376 +0000 UTC m=+1.519452996\"\r\n"} +{"Time":"2023-05-31T19:40:14.525816367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:09 flannel-509041 kubelet[1228]: I0531 19:39:09.993619 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-flannel-509041\" podStartSLOduration=1.993356643 podCreationTimestamp=\"2023-05-31 19:39:08 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:09.990754396 +0000 UTC m=+1.518166017\" watchObservedRunningTime=\"2023-05-31 19:39:09.993356643 +0000 UTC m=+1.520768263\"\r\n"} +{"Time":"2023-05-31T19:40:14.525822874Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.137327 1228 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:40:14.52606137Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.138620 1228 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:40:14.526069147Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.805864 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.526074351Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.807851 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.526079899Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.869671 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/f0c4d04e-5244-4d4d-b597-f61d5199d538-xtables-lock\\\") pod \\\"kube-proxy-ztwqw\\\" (UID: \\\"f0c4d04e-5244-4d4d-b597-f61d5199d538\\\") \" pod=\"kube-system/kube-proxy-ztwqw\"\r\n"} +{"Time":"2023-05-31T19:40:14.526086708Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.869860 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"run\\\" (UniqueName: \\\"kubernetes.io/host-path/4ff09468-aaf5-4ac5-8f95-9d667b140b39-run\\\") pod \\\"kube-flannel-ds-dwcpl\\\" (UID: \\\"4ff09468-aaf5-4ac5-8f95-9d667b140b39\\\") \" pod=\"kube-flannel/kube-flannel-ds-dwcpl\"\r\n"} +{"Time":"2023-05-31T19:40:14.526093776Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.869933 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-pzr2z\\\" (UniqueName: \\\"kubernetes.io/projected/4ff09468-aaf5-4ac5-8f95-9d667b140b39-kube-api-access-pzr2z\\\") pod \\\"kube-flannel-ds-dwcpl\\\" (UID: \\\"4ff09468-aaf5-4ac5-8f95-9d667b140b39\\\") \" pod=\"kube-flannel/kube-flannel-ds-dwcpl\"\r\n"} +{"Time":"2023-05-31T19:40:14.526100647Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.869983 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni\\\" (UniqueName: \\\"kubernetes.io/host-path/4ff09468-aaf5-4ac5-8f95-9d667b140b39-cni\\\") pod \\\"kube-flannel-ds-dwcpl\\\" (UID: \\\"4ff09468-aaf5-4ac5-8f95-9d667b140b39\\\") \" pod=\"kube-flannel/kube-flannel-ds-dwcpl\"\r\n"} +{"Time":"2023-05-31T19:40:14.526107093Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.870028 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/f0c4d04e-5244-4d4d-b597-f61d5199d538-kube-proxy\\\") pod \\\"kube-proxy-ztwqw\\\" (UID: \\\"f0c4d04e-5244-4d4d-b597-f61d5199d538\\\") \" pod=\"kube-system/kube-proxy-ztwqw\"\r\n"} +{"Time":"2023-05-31T19:40:14.526113799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.870080 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"cni-plugin\\\" (UniqueName: \\\"kubernetes.io/host-path/4ff09468-aaf5-4ac5-8f95-9d667b140b39-cni-plugin\\\") pod \\\"kube-flannel-ds-dwcpl\\\" (UID: \\\"4ff09468-aaf5-4ac5-8f95-9d667b140b39\\\") \" pod=\"kube-flannel/kube-flannel-ds-dwcpl\"\r\n"} +{"Time":"2023-05-31T19:40:14.526405379Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.870127 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/f0c4d04e-5244-4d4d-b597-f61d5199d538-lib-modules\\\") pod \\\"kube-proxy-ztwqw\\\" (UID: \\\"f0c4d04e-5244-4d4d-b597-f61d5199d538\\\") \" pod=\"kube-system/kube-proxy-ztwqw\"\r\n"} +{"Time":"2023-05-31T19:40:14.526415087Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.870174 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-b25rr\\\" (UniqueName: \\\"kubernetes.io/projected/f0c4d04e-5244-4d4d-b597-f61d5199d538-kube-api-access-b25rr\\\") pod \\\"kube-proxy-ztwqw\\\" (UID: \\\"f0c4d04e-5244-4d4d-b597-f61d5199d538\\\") \" pod=\"kube-system/kube-proxy-ztwqw\"\r\n"} +{"Time":"2023-05-31T19:40:14.526421106Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.870223 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flannel-cfg\\\" (UniqueName: \\\"kubernetes.io/configmap/4ff09468-aaf5-4ac5-8f95-9d667b140b39-flannel-cfg\\\") pod \\\"kube-flannel-ds-dwcpl\\\" (UID: \\\"4ff09468-aaf5-4ac5-8f95-9d667b140b39\\\") \" pod=\"kube-flannel/kube-flannel-ds-dwcpl\"\r\n"} +{"Time":"2023-05-31T19:40:14.526426787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:20 flannel-509041 kubelet[1228]: I0531 19:39:20.870281 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/4ff09468-aaf5-4ac5-8f95-9d667b140b39-xtables-lock\\\") pod \\\"kube-flannel-ds-dwcpl\\\" (UID: \\\"4ff09468-aaf5-4ac5-8f95-9d667b140b39\\\") \" pod=\"kube-flannel/kube-flannel-ds-dwcpl\"\r\n"} +{"Time":"2023-05-31T19:40:14.52643241Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:23 flannel-509041 kubelet[1228]: I0531 19:39:23.942574 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-ztwqw\" podStartSLOduration=3.9425427060000002 podCreationTimestamp=\"2023-05-31 19:39:20 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:21.929538911 +0000 UTC m=+13.456950530\" watchObservedRunningTime=\"2023-05-31 19:39:23.942542706 +0000 UTC m=+15.469954325\"\r\n"} +{"Time":"2023-05-31T19:40:14.526437512Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:26 flannel-509041 kubelet[1228]: I0531 19:39:26.471553 1228 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T19:40:14.526441638Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:26 flannel-509041 kubelet[1228]: I0531 19:39:26.673323 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.526445749Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:26 flannel-509041 kubelet[1228]: I0531 19:39:26.678270 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.52676665Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:26 flannel-509041 kubelet[1228]: I0531 19:39:26.718334 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-xw76m\\\" (UniqueName: \\\"kubernetes.io/projected/b4c674ce-0afa-48e2-80ec-cababeb96873-kube-api-access-xw76m\\\") pod \\\"coredns-5d78c9869d-8phqx\\\" (UID: \\\"b4c674ce-0afa-48e2-80ec-cababeb96873\\\") \" pod=\"kube-system/coredns-5d78c9869d-8phqx\"\r\n"} +{"Time":"2023-05-31T19:40:14.52677539Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:26 flannel-509041 kubelet[1228]: I0531 19:39:26.718547 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-g8z5h\\\" (UniqueName: \\\"kubernetes.io/projected/24bc778a-c744-4de6-b9ba-54495299130a-kube-api-access-g8z5h\\\") pod \\\"storage-provisioner\\\" (UID: \\\"24bc778a-c744-4de6-b9ba-54495299130a\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:40:14.52678472Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:26 flannel-509041 kubelet[1228]: I0531 19:39:26.718609 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/b4c674ce-0afa-48e2-80ec-cababeb96873-config-volume\\\") pod \\\"coredns-5d78c9869d-8phqx\\\" (UID: \\\"b4c674ce-0afa-48e2-80ec-cababeb96873\\\") \" pod=\"kube-system/coredns-5d78c9869d-8phqx\"\r\n"} +{"Time":"2023-05-31T19:40:14.526790283Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:26 flannel-509041 kubelet[1228]: I0531 19:39:26.718666 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/24bc778a-c744-4de6-b9ba-54495299130a-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"24bc778a-c744-4de6-b9ba-54495299130a\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:40:14.526802647Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: E0531 19:39:27.246123 1228 remote_runtime.go:176] \"RunPodSandbox from runtime service failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bb926cb2fbfe4cb8282baaaa5ed99fa698baa96baa110c9f0bf1058641cfe0a\\\": plugin type=\\\"flannel\\\" failed (add): loadFlannelSubnetEnv failed: open /run/flannel/subnet.env: no such file or directory\"\r\n"} +{"Time":"2023-05-31T19:40:14.526812584Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: E0531 19:39:27.246331 1228 kuberuntime_sandbox.go:72] \"Failed to create sandbox for pod\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bb926cb2fbfe4cb8282baaaa5ed99fa698baa96baa110c9f0bf1058641cfe0a\\\": plugin type=\\\"flannel\\\" failed (add): loadFlannelSubnetEnv failed: open /run/flannel/subnet.env: no such file or directory\" pod=\"kube-system/coredns-5d78c9869d-8phqx\"\r\n"} +{"Time":"2023-05-31T19:40:14.526821422Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: E0531 19:39:27.246379 1228 kuberuntime_manager.go:1122] \"CreatePodSandbox for pod failed\" err=\"rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1bb926cb2fbfe4cb8282baaaa5ed99fa698baa96baa110c9f0bf1058641cfe0a\\\": plugin type=\\\"flannel\\\" failed (add): loadFlannelSubnetEnv failed: open /run/flannel/subnet.env: no such file or directory\" pod=\"kube-system/coredns-5d78c9869d-8phqx\"\r\n"} +{"Time":"2023-05-31T19:40:14.527019282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: E0531 19:39:27.246626 1228 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"CreatePodSandbox\\\" for \\\"coredns-5d78c9869d-8phqx_kube-system(b4c674ce-0afa-48e2-80ec-cababeb96873)\\\" with CreatePodSandboxError: \\\"Failed to create sandbox for pod \\\\\\\"coredns-5d78c9869d-8phqx_kube-system(b4c674ce-0afa-48e2-80ec-cababeb96873)\\\\\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\\\\\"1bb926cb2fbfe4cb8282baaaa5ed99fa698baa96baa110c9f0bf1058641cfe0a\\\\\\\": plugin type=\\\\\\\"flannel\\\\\\\" failed (add): loadFlannelSubnetEnv failed: open /run/flannel/subnet.env: no such file or directory\\\"\" pod=\"kube-system/coredns-5d78c9869d-8phqx\" podUID=b4c674ce-0afa-48e2-80ec-cababeb96873\r\n"} +{"Time":"2023-05-31T19:40:14.527029572Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:27 flannel-509041 kubelet[1228]: I0531 19:39:27.971583 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-flannel/kube-flannel-ds-dwcpl\" podStartSLOduration=3.5390057759999998 podCreationTimestamp=\"2023-05-31 19:39:20 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:39:21.882237544 +0000 UTC m=+13.409649159\" lastFinishedPulling=\"2023-05-31 19:39:26.314781053 +0000 UTC m=+17.842192665\" observedRunningTime=\"2023-05-31 19:39:27.953536469 +0000 UTC m=+19.480948088\" watchObservedRunningTime=\"2023-05-31 19:39:27.971549282 +0000 UTC m=+19.498960901\"\r\n"} +{"Time":"2023-05-31T19:40:14.52703723Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:28 flannel-509041 kubelet[1228]: I0531 19:39:28.860856 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=6.860826123 podCreationTimestamp=\"2023-05-31 19:39:22 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:27.972596726 +0000 UTC m=+19.500008345\" watchObservedRunningTime=\"2023-05-31 19:39:28.860826123 +0000 UTC m=+20.388237742\"\r\n"} +{"Time":"2023-05-31T19:40:14.527042913Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:40 flannel-509041 kubelet[1228]: I0531 19:39:40.013848 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-8phqx\" podStartSLOduration=19.013815103 podCreationTimestamp=\"2023-05-31 19:39:21 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:39.991169673 +0000 UTC m=+31.518581293\" watchObservedRunningTime=\"2023-05-31 19:39:40.013815103 +0000 UTC m=+31.541226723\"\r\n"} +{"Time":"2023-05-31T19:40:14.527048056Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:46 flannel-509041 kubelet[1228]: I0531 19:39:46.972037 1228 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:40:14.527053856Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:47 flannel-509041 kubelet[1228]: I0531 19:39:47.091962 1228 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-nmmcl\\\" (UniqueName: \\\"kubernetes.io/projected/392b034e-49c8-452d-b229-d9dcac54ed1e-kube-api-access-nmmcl\\\") pod \\\"netcat-7458db8b8-gqs6x\\\" (UID: \\\"392b034e-49c8-452d-b229-d9dcac54ed1e\\\") \" pod=\"default/netcat-7458db8b8-gqs6x\"\r\n"} +{"Time":"2023-05-31T19:40:14.527252495Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:51 flannel-509041 kubelet[1228]: I0531 19:39:51.015477 1228 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"default/netcat-7458db8b8-gqs6x\" podStartSLOduration=2.704966286 podCreationTimestamp=\"2023-05-31 19:39:46 +0000 UTC\" firstStartedPulling=\"2023-05-31 19:39:47.759130753 +0000 UTC m=+39.286542367\" lastFinishedPulling=\"2023-05-31 19:39:50.069530917 +0000 UTC m=+41.596942518\" observedRunningTime=\"2023-05-31 19:39:51.014989475 +0000 UTC m=+42.542401094\" watchObservedRunningTime=\"2023-05-31 19:39:51.015366437 +0000 UTC m=+42.542778056\"\r\n"} +{"Time":"2023-05-31T19:40:14.527260504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:40:02 flannel-509041 kubelet[1228]: E0531 19:40:02.510009 1228 upgradeaware.go:426] Error proxying data from client to backend: readfrom tcp 192.168.122.189:38126-\u003e192.168.122.189:10010: write tcp 192.168.122.189:38126-\u003e192.168.122.189:10010: write: broken pipe\r\n"} +{"Time":"2023-05-31T19:40:14.52726503Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.527268898Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.527272669Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:40:14.527277648Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T19:40:14.527281967Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters:\r\n"} +{"Time":"2023-05-31T19:40:14.527285799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T19:40:14.527292114Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:40:14.527298367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"UjY3QwpBNXcxQzg2MWNYMVV6MlN5WlNjT05GeG9mNmRSWTB6T2ZrQ0gzNDJPS1pEQnhOcmZmOGNkL3kwMUE4RmZYQXlHCmNkeDFJM3lQREJ1OHIzOW82eSt4c0FpRGNSSnMyUmY3UU5BTWV2MEszbm8zQlpoc1loeDdNNXllZ2hNemdxTW4KUU50bnY3T2lYTllMVFpRZDd6dSs5Y3NNbXRnNDBLUU9DWUQyTG1jMkpOWHRSNjcyT013eGpkRG5hNVpGZlZSMgpEcXR6SFRlTFZrSXhIUi9UT0hoQ09xSm0yMHF6dEVjRVd2d3hXcm1rdk5QNkFURnVHck1UVlVRRjBybFQrMDNwCnluUHdmdFRZbXJjOEVwWDUzUmVaUlVHWHZEM1N4QnlKWFdySGEzNFJhQURGaGEvdnJMZTN3ZEppNVlLRFZrVWIKN0NnQkFieU9VWXM1cmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T19:40:14.527541566Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T19:40:14.527548661Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: mk\r\n"} +{"Time":"2023-05-31T19:40:14.527552773Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts:\r\n"} +{"Time":"2023-05-31T19:40:14.527556377Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - context:\r\n"} +{"Time":"2023-05-31T19:40:14.527560117Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T19:40:14.527569265Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user: system:node:flannel-509041\r\n"} +{"Time":"2023-05-31T19:40:14.527573358Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: system:node:flannel-509041@mk\r\n"} +{"Time":"2023-05-31T19:40:14.527577481Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: system:node:flannel-509041@mk\r\n"} +{"Time":"2023-05-31T19:40:14.527581388Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T19:40:14.527585075Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T19:40:14.52758884Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users:\r\n"} +{"Time":"2023-05-31T19:40:14.527592545Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - name: system:node:flannel-509041\r\n"} +{"Time":"2023-05-31T19:40:14.527596347Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user:\r\n"} +{"Time":"2023-05-31T19:40:14.527600113Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:40:14.527604295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:40:14.527608172Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.527611743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.527615444Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:40:14.527619305Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T19:40:14.527632369Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authentication:\r\n"} +{"Time":"2023-05-31T19:40:14.52763623Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T19:40:14.527639819Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T19:40:14.527643792Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:40:14.52764786Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528152241Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T19:40:14.528162476Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" x509:\r\n"} +{"Time":"2023-05-31T19:40:14.528170256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T19:40:14.528174885Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authorization:\r\n"} +{"Time":"2023-05-31T19:40:14.52817901Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T19:40:14.528183408Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:40:14.528187729Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528192421Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528196781Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T19:40:14.528200988Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T19:40:14.52820553Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T19:40:14.528209995Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T19:40:14.528214777Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.528219065Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528223166Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T19:40:14.528227658Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:40:14.528231768Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:40:14.528235768Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T19:40:14.528240608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528244743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T19:40:14.528249994Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528254118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T19:40:14.528258105Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T19:40:14.528262491Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T19:40:14.528267081Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528271269Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T19:40:14.528276025Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528688537Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T19:40:14.528701424Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" logging:\r\n"} +{"Time":"2023-05-31T19:40:14.528706009Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T19:40:14.528710572Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" options:\r\n"} +{"Time":"2023-05-31T19:40:14.528714847Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" json:\r\n"} +{"Time":"2023-05-31T19:40:14.528718594Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T19:40:14.528722863Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T19:40:14.528726963Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T19:40:14.528731368Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528735361Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528739341Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resolvConf: /run/systemd/resolve/resolv.conf\r\n"} +{"Time":"2023-05-31T19:40:14.528744254Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T19:40:14.528748379Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T19:40:14.528752391Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528757911Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528767346Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T19:40:14.528771738Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528797101Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.52880217Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:40:14.528805999Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.528809504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.52882162Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:40:14.52882669Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.52883076Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T19:40:14.528834662Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:40:14.528838268Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:40:14.528842448Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T19:40:14.529216343Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T19:40:14.52922635Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" last-update: Wed, 31 May 2023 19:40:05 UTC\n"} +{"Time":"2023-05-31T19:40:14.52923085Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.529235593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:40:14.529239454Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:40:14.529242701Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://192.168.39.43:8443\n"} +{"Time":"2023-05-31T19:40:14.529246077Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:40:14.529250375Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:40:14.52925439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:40:14.529258275Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T19:40:14.529262342Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T19:40:14.529266877Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" last-update: Wed, 31 May 2023 19:39:20 UTC\n"} +{"Time":"2023-05-31T19:40:14.529270496Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.529274214Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:40:14.529277525Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:40:14.529281163Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://192.168.61.47:8443\n"} +{"Time":"2023-05-31T19:40:14.529284974Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.529288809Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts:\n"} +{"Time":"2023-05-31T19:40:14.529292356Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - context:\n"} +{"Time":"2023-05-31T19:40:14.529295832Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cluster: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:40:14.529300031Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T19:40:14.529303446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T19:40:14.529307155Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" last-update: Wed, 31 May 2023 19:40:05 UTC\n"} +{"Time":"2023-05-31T19:40:14.529311071Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.529314694Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:40:14.529318371Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:40:14.529323214Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:40:14.529326467Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:40:14.529330017Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:40:14.529336994Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - context:\n"} +{"Time":"2023-05-31T19:40:14.529340649Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cluster: flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.529344105Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extensions:\n"} +{"Time":"2023-05-31T19:40:14.52934774Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - extension:\n"} +{"Time":"2023-05-31T19:40:14.52935204Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" last-update: Wed, 31 May 2023 19:39:20 UTC\n"} +{"Time":"2023-05-31T19:40:14.529355561Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.529359985Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:40:14.529363743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:40:14.529367573Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:40:14.52937115Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user: flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.529374851Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.52937853Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:40:14.529382026Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:40:14.529385863Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:40:14.529389534Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users:\n"} +{"Time":"2023-05-31T19:40:14.529393169Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - name: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:40:14.529396945Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user:\n"} +{"Time":"2023-05-31T19:40:14.529400623Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt\n"} +{"Time":"2023-05-31T19:40:14.529404655Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.key\n"} +{"Time":"2023-05-31T19:40:14.529408686Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - name: flannel-509041\n"} +{"Time":"2023-05-31T19:40:14.529412053Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user:\n"} +{"Time":"2023-05-31T19:40:14.529415786Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt\n"} +{"Time":"2023-05-31T19:40:14.529788285Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.key\n"} +{"Time":"2023-05-31T19:40:14.52979525Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.529798743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.52980259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:40:14.529806593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.529812919Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" items:\n"} +{"Time":"2023-05-31T19:40:14.529816682Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.529820781Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.52982452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:14.529828699Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.529832621Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:14.529836648Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:14.529840415Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:14.52984414Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:14.5298484Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:14.529852365Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:14.529856488Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:14.529860211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:14.529864562Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:14.529868426Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:14.52987268Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:14.529877186Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:14.529880777Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:14.530140995Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:14.530148348Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:14.530152321Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:14.53015636Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:14.530160666Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.530164573Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.530168186Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.530172761Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:14.530176162Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:14.530180893Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:14.530184828Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:14.530189016Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:14.530192978Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:20Z\"\n"} +{"Time":"2023-05-31T19:40:14.530196994Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.530200899Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:40:14.530204395Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"371\"\n"} +{"Time":"2023-05-31T19:40:14.530208214Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: a26c960b-c5c6-429c-845c-c10fcca4a886\n"} +{"Time":"2023-05-31T19:40:14.530211766Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.530215673Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.530219305Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni-conf.json: |\n"} +{"Time":"2023-05-31T19:40:14.530222879Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\n"} +{"Time":"2023-05-31T19:40:14.530226576Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"name\": \"cbr0\",\n"} +{"Time":"2023-05-31T19:40:14.530230496Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"cniVersion\": \"0.3.1\",\n"} +{"Time":"2023-05-31T19:40:14.5302341Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"plugins\": [\n"} +{"Time":"2023-05-31T19:40:14.530237675Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\n"} +{"Time":"2023-05-31T19:40:14.530631832Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"flannel\",\n"} +{"Time":"2023-05-31T19:40:14.530645979Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"delegate\": {\n"} +{"Time":"2023-05-31T19:40:14.530655196Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"hairpinMode\": true,\n"} +{"Time":"2023-05-31T19:40:14.530660917Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"isDefaultGateway\": true\n"} +{"Time":"2023-05-31T19:40:14.530677457Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.530682427Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\n"} +{"Time":"2023-05-31T19:40:14.530690278Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\n"} +{"Time":"2023-05-31T19:40:14.530706605Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"type\": \"portmap\",\n"} +{"Time":"2023-05-31T19:40:14.530715625Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"capabilities\": {\n"} +{"Time":"2023-05-31T19:40:14.530722436Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"portMappings\": true\n"} +{"Time":"2023-05-31T19:40:14.530728597Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.530736361Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.53074094Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\n"} +{"Time":"2023-05-31T19:40:14.530749751Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.530758526Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net-conf.json: |\n"} +{"Time":"2023-05-31T19:40:14.530767007Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\n"} +{"Time":"2023-05-31T19:40:14.530770915Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Network\": \"10.244.0.0/16\",\n"} +{"Time":"2023-05-31T19:40:14.530784496Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Backend\": {\n"} +{"Time":"2023-05-31T19:40:14.53078975Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"Type\": \"vxlan\"\n"} +{"Time":"2023-05-31T19:40:14.530798196Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.530802096Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.530806295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.530810588Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.53081476Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:14.530818895Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubectl.kubernetes.io/last-applied-configuration: |\n"} +{"Time":"2023-05-31T19:40:14.5308255Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\"apiVersion\":\"v1\",\"data\":{\"cni-conf.json\":\"{\\n \\\"name\\\": \\\"cbr0\\\",\\n \\\"cniVersion\\\": \\\"0.3.1\\\",\\n \\\"plugins\\\": [\\n {\\n \\\"type\\\": \\\"flannel\\\",\\n \\\"delegate\\\": {\\n \\\"hairpinMode\\\": true,\\n \\\"isDefaultGateway\\\": true\\n }\\n },\\n {\\n \\\"type\\\": \\\"portmap\\\",\\n \\\"capabilities\\\": {\\n \\\"portMappings\\\": true\\n }\\n }\\n ]\\n}\\n\",\"net-conf.json\":\"{\\n \\\"Network\\\": \\\"10.244.0.0/16\\\",\\n \\\"Backend\\\": {\\n \\\"Type\\\": \\\"vxlan\\\"\\n }\\n}\\n\"},\"kind\":\"ConfigMap\",\"metadata\":{\"annotations\":{},\"labels\":{\"app\":\"flannel\",\"k8s-app\":\"flannel\",\"tier\":\"node\"},\"name\":\"kube-flannel-cfg\",\"namespace\":\"kube-flannel\"}}\n"} +{"Time":"2023-05-31T19:40:14.530943129Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:09Z\"\n"} +{"Time":"2023-05-31T19:40:14.530948793Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" labels:\n"} +{"Time":"2023-05-31T19:40:14.530952656Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" app: flannel\n"} +{"Time":"2023-05-31T19:40:14.530956418Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" k8s-app: flannel\n"} +{"Time":"2023-05-31T19:40:14.530960248Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tier: node\n"} +{"Time":"2023-05-31T19:40:14.530964145Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-flannel-cfg\n"} +{"Time":"2023-05-31T19:40:14.530969878Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-flannel\n"} +{"Time":"2023-05-31T19:40:14.530973836Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"291\"\n"} +{"Time":"2023-05-31T19:40:14.530977897Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 4c0136dc-76de-4f92-b027-7f2a63d6cf77\n"} +{"Time":"2023-05-31T19:40:14.530981766Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.530986666Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.530990428Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:14.530994427Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.530998095Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:14.531002026Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:14.531006006Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:14.531008805Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:14.531011376Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:14.531013855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:14.531016256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:14.531108541Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:14.531123828Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:14.531128188Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:14.531133076Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:14.531137036Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:14.531140734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:14.531144745Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:14.531148637Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:14.531152856Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:14.531156476Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:14.53116089Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.531164953Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.531169058Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.531172746Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:14.53117765Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:14.531181756Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:14.531185567Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:14.531189522Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:14.531193101Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:20Z\"\n"} +{"Time":"2023-05-31T19:40:14.531197032Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.531200555Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-flannel\n"} +{"Time":"2023-05-31T19:40:14.531204452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"373\"\n"} +{"Time":"2023-05-31T19:40:14.531208452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 5b9dcdb2-3f07-4eb2-95dd-053446169b5c\n"} +{"Time":"2023-05-31T19:40:14.53123367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.531242964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.531247312Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:14.531254096Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.531261754Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:14.531266032Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:14.531269799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:14.531274014Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:14.531280056Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:14.531283884Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:14.531287481Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:14.531291462Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:14.531295169Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:14.531299331Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:14.531303545Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:14.531307504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:14.531310953Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:14.531314813Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:14.531318204Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:14.531322048Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:14.53132569Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:14.53132951Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.531521849Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.531527409Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.531535982Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:14.531539923Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:14.531544754Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:14.531549653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:14.531558587Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:14.531563129Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:20Z\"\n"} +{"Time":"2023-05-31T19:40:14.531570795Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.531575114Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T19:40:14.531582353Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"375\"\n"} +{"Time":"2023-05-31T19:40:14.531586465Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: dc0d88a7-b959-402e-a7ee-db9187a90029\n"} +{"Time":"2023-05-31T19:40:14.531593889Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.53159795Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.531604997Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" jws-kubeconfig-dlcfym: eyJhbGciOiJIUzI1NiIsImtpZCI6ImRsY2Z5bSJ9..T2_Si4JYTcYFv0t2Ourtv9-ed4eb6ReUfl4_81DxIQU\n"} +{"Time":"2023-05-31T19:40:14.531609211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T19:40:14.531613195Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.53161805Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T19:40:14.531629242Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:40:14.531641089Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCakNDQWU2Z0F3SUJBZ0lCQVRBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwdGFXNXAKYTNWaVpVTkJNQjRYRFRJek1EVXpNREU0TkRReU1Wb1hEVE16TURVeU9ERTRORFF5TVZvd0ZURVRNQkVHQTFVRQpBeE1LYldsdWFXdDFZbVZEUVRDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBUEpiCnVsSG1TdWthRHJFeWN1RUJ5RVFaaUl5eFBFcjN2eXVWMjNDUVI2T3JDQzI4ak9KYlRzeHMrRVE0dUhGTm5wTTUKdGdvTER2TStabVlRZXJqczcxM2xDOHdORTdVdVFoTWRsV1pPa3Z4Z3ErQTlNNitVZ1V6dmMyUXFFMVZTWldvWgpoWS9yNTRjS01HK2xsZWt0ajVDK3BnRHdOVW5Eb0NjVjI1UDN3bHhwWndrRUN4dUxDNHJ2THh1SFVZN1hIeGNGCllHVCt4MGF3WlN1a0ZXL2FYVXpZODlJYXdXWkoyY3NzOUdkRGR0R0NnNEZ0YllNM0M3VHBJcUs5YU1QcEdHdzkKYTFwNnRqTEFlKzRJT1ZpVzZsNWtWdkUwTVJJZmhqcjdzOW4za3cxaU50c254U0ZUV2I5UEQxUWxyTWJZNVdVRAp3Q0ErNlprQlI2NHVkOUZya24wQ0F3RUFBYU5oTUY4d0RnWURWUjBQQVFIL0JBUURBZ0trTUIwR0ExVWRKUVFXCk1CUUdDQ3NHQVFVRkJ3TUNCZ2dyQmdFRkJRY0RBVEFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVcKQkJUTy9vK0Zpc1BrVllLVkJERGU0cUFVWDBNWThUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRU"} +{"Time":"2023-05-31T19:40:14.531880502Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"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\n"} +{"Time":"2023-05-31T19:40:14.53188853Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:40:14.531892747Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: \"\"\n"} +{"Time":"2023-05-31T19:40:14.531896679Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts: null\n"} +{"Time":"2023-05-31T19:40:14.531900841Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:40:14.531904796Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:40:14.531908647Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:40:14.531912824Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users: null\n"} +{"Time":"2023-05-31T19:40:14.531916748Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.531922988Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.531927276Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:08Z\"\n"} +{"Time":"2023-05-31T19:40:14.531931374Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T19:40:14.531935137Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:40:14.531938959Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"348\"\n"} +{"Time":"2023-05-31T19:40:14.531943045Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: edbce311-5a45-4279-a9da-4f73d01511f8\n"} +{"Time":"2023-05-31T19:40:14.531947115Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.531950953Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.532197577Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:14.532203875Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.532208182Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:14.532212547Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:14.532216407Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:14.53222028Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:14.532226357Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:14.53223082Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:14.532235412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:14.532239499Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:14.532243263Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:14.532247169Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:14.53225071Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:14.532254753Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:14.532258543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:14.532262517Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:14.532265994Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:14.532269686Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:14.532273384Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:14.532277494Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.532281158Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.532284779Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.532492998Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:14.532498466Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:14.532502557Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:14.532506711Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:14.532511246Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:14.53251515Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:20Z\"\n"} +{"Time":"2023-05-31T19:40:14.532519066Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.532522919Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:40:14.532526732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"376\"\n"} +{"Time":"2023-05-31T19:40:14.532530555Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 69b5295d-c53f-498a-950e-5fdaf1593c72\n"} +{"Time":"2023-05-31T19:40:14.532534244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.532538828Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.532542351Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Corefile: |\n"} +{"Time":"2023-05-31T19:40:14.53254587Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" .:53 {\n"} +{"Time":"2023-05-31T19:40:14.532562758Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" log\n"} +{"Time":"2023-05-31T19:40:14.532566486Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" errors\n"} +{"Time":"2023-05-31T19:40:14.532570124Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" health {\n"} +{"Time":"2023-05-31T19:40:14.532574516Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T19:40:14.53257836Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.532582208Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ready\n"} +{"Time":"2023-05-31T19:40:14.532585716Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T19:40:14.532589434Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pods insecure\n"} +{"Time":"2023-05-31T19:40:14.532594062Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T19:40:14.532598365Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ttl 30\n"} +{"Time":"2023-05-31T19:40:14.532601725Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.532605564Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T19:40:14.53279029Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hosts {\n"} +{"Time":"2023-05-31T19:40:14.532797071Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 192.168.61.1 host.minikube.internal\n"} +{"Time":"2023-05-31T19:40:14.532800941Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fallthrough\n"} +{"Time":"2023-05-31T19:40:14.532804193Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.532807419Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T19:40:14.532810949Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T19:40:14.532814458Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.532817711Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cache 30\n"} +{"Time":"2023-05-31T19:40:14.53282102Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" loop\n"} +{"Time":"2023-05-31T19:40:14.532824524Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" reload\n"} +{"Time":"2023-05-31T19:40:14.532827934Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" loadbalance\n"} +{"Time":"2023-05-31T19:40:14.532831611Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\n"} +{"Time":"2023-05-31T19:40:14.532834755Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.532840618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.532843935Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:08Z\"\n"} +{"Time":"2023-05-31T19:40:14.532847221Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: coredns\n"} +{"Time":"2023-05-31T19:40:14.532850294Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.532853095Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"412\"\n"} +{"Time":"2023-05-31T19:40:14.532855446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 6b8af131-2fc6-4605-a83d-19f9c0f6d7b2\n"} +{"Time":"2023-05-31T19:40:14.532857606Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.532859538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.532861775Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T19:40:14.532863919Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.532866404Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:14.53286867Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:14.532871056Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:14.533019212Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:14.533026472Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:14.533030287Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:14.533034269Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:14.533040276Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:14.53304411Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:14.533048341Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:14.533051909Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:14.533055741Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:14.533064966Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:14.533068596Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:14.533072166Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:14.533075717Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:14.533079086Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:14.533082753Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.533086151Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T19:40:14.533089956Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T19:40:14.533093239Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.533096647Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T19:40:14.533100457Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM4NTVaFw0zMzA1MjgxOTM4NTVaMBkxFzAV\n"} +{"Time":"2023-05-31T19:40:14.533104012Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T19:40:14.533370849Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CgKCAQEAonLCRqNdUc5f4h5D7BA589uay0qv65gWG0x4DO9O4QQIq8+44aiHNz19\n"} +{"Time":"2023-05-31T19:40:14.533380416Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AS+zwFUIi1cf+QWEcSy3hfQWZyv40ZhpTpx3UzqJhS7JwWq7faMd3ygu/Ei2dUo0\n"} +{"Time":"2023-05-31T19:40:14.533384814Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" T6DZw3cmu2iBZFIEIs9/eKI5bmRARLjzGMo1LFEp25FWtWPs173oRP7KcMXEMVOw\n"} +{"Time":"2023-05-31T19:40:14.533391709Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nTw/zjNyQ16PnFZJn7vZGutQze0V6Foc4JruzDdrOIcaS4N2uQUUVVCcEGF5cP36\n"} +{"Time":"2023-05-31T19:40:14.533397339Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 1LEbIROmtTW4Pc6G0RoXabSGMeCTJvmQkJ/ilPZkUTCv6sFeTFjzQIgDsGUy+B96\n"} +{"Time":"2023-05-31T19:40:14.533404197Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WGgf855y7LmaLETRiRLn5zhqjkMClQIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T19:40:14.533408302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUMauhy1J5SE+IvTjTwrctb1StWQww\n"} +{"Time":"2023-05-31T19:40:14.53341478Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAF4C\n"} +{"Time":"2023-05-31T19:40:14.533419429Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" HhFZ5oHWjcTjvYywffYxkPgmwxnX4X+zfX/QX5aATnvZNyAcL6bUM51w7XEkfqtX\n"} +{"Time":"2023-05-31T19:40:14.533425834Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 6L1sXNZsHO2phsbj/+YDQxmqME/FrbDyuOPtNooRSg70DvWRUYYuMWan6LlmjuOo\n"} +{"Time":"2023-05-31T19:40:14.533429984Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ThClCoaUWeP92wwsWEsbzqoTG8MyUyqNC8Z2l9iziNtdqfUKq2ij1DVjz42wHA1m\n"} +{"Time":"2023-05-31T19:40:14.533434159Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 6KmZWL8SxL5comYTor+erUygJlVaSdC0hXtUIHHJayzwJcDY0LC8sML2qP/+Yf3B\n"} +{"Time":"2023-05-31T19:40:14.533438435Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DPpCbvBIHr5TSlHVKmerzxVcrl6uMTvjD21dGnDZMwzWGLRHBBpqcB2briJgUN98\n"} +{"Time":"2023-05-31T19:40:14.533454024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" VqG3gjvgMjK0RoCQSqE=\n"} +{"Time":"2023-05-31T19:40:14.533460706Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.533465102Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T19:40:14.533472193Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T19:40:14.533479366Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T19:40:14.533483295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.533487624Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.533492361Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:05Z\"\n"} +{"Time":"2023-05-31T19:40:14.533499323Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T19:40:14.533907558Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.53391297Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"14\"\n"} +{"Time":"2023-05-31T19:40:14.533916491Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 8f12ba3f-e2c3-4b75-9c51-5a0b70a33902\n"} +{"Time":"2023-05-31T19:40:14.533920008Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.533924096Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.533927294Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T19:40:14.53393034Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.533933028Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.533935159Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:05Z\"\n"} +{"Time":"2023-05-31T19:40:14.533937564Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T19:40:14.533942424Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.533944492Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"32\"\n"} +{"Time":"2023-05-31T19:40:14.533946847Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 4e315264-e0ec-4e47-9dc0-f1cfea65f6f0\n"} +{"Time":"2023-05-31T19:40:14.533949004Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.533951507Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.533953888Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T19:40:14.53395622Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T19:40:14.533958395Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T19:40:14.533960877Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T19:40:14.533970237Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clientConnection:\n"} +{"Time":"2023-05-31T19:40:14.533973589Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T19:40:14.533976728Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" burst: 0\n"} +{"Time":"2023-05-31T19:40:14.533980017Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T19:40:14.533983106Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T19:40:14.533986421Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" qps: 0\n"} +{"Time":"2023-05-31T19:40:14.533991637Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:40:14.53446549Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.534473998Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conntrack:\n"} +{"Time":"2023-05-31T19:40:14.534478283Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T19:40:14.534482753Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" min: null\n"} +{"Time":"2023-05-31T19:40:14.534486412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:14.534489886Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:14.534493576Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" detectLocal:\n"} +{"Time":"2023-05-31T19:40:14.534497794Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T19:40:14.534501843Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T19:40:14.534506426Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T19:40:14.534510213Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T19:40:14.53451386Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T19:40:14.534517499Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T19:40:14.534521475Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" iptables:\n"} +{"Time":"2023-05-31T19:40:14.534524763Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T19:40:14.53453314Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T19:40:14.534537035Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T19:40:14.53454074Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.534544245Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.534547714Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ipvs:\n"} +{"Time":"2023-05-31T19:40:14.534552083Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T19:40:14.53455592Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.534559833Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T19:40:14.53456371Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" strictARP: false\n"} +{"Time":"2023-05-31T19:40:14.534567634Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.53457116Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:14.534574777Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:14.535110576Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:14.535124181Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T19:40:14.535129057Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T19:40:14.535137162Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T19:40:14.535143473Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T19:40:14.535151958Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T19:40:14.535156729Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T19:40:14.535164499Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T19:40:14.53516884Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" winkernel:\n"} +{"Time":"2023-05-31T19:40:14.535174541Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T19:40:14.535180242Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T19:40:14.535188111Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T19:40:14.535192606Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T19:40:14.535200313Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T19:40:14.53520531Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T19:40:14.535212859Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.535217309Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:40:14.535224356Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters:\n"} +{"Time":"2023-05-31T19:40:14.535229047Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:40:14.535237586Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T19:40:14.535243366Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:40:14.535251282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: default\n"} +{"Time":"2023-05-31T19:40:14.535256721Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts:\n"} +{"Time":"2023-05-31T19:40:14.535260981Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - context:\n"} +{"Time":"2023-05-31T19:40:14.535265755Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cluster: default\n"} +{"Time":"2023-05-31T19:40:14.535272744Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:40:14.535277639Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user: default\n"} +{"Time":"2023-05-31T19:40:14.535704312Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: default\n"} +{"Time":"2023-05-31T19:40:14.535715005Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: default\n"} +{"Time":"2023-05-31T19:40:14.535719735Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users:\n"} +{"Time":"2023-05-31T19:40:14.535723607Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - name: default\n"} +{"Time":"2023-05-31T19:40:14.535727522Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" user:\n"} +{"Time":"2023-05-31T19:40:14.535731739Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T19:40:14.535735885Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.535739792Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.535744209Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:08Z\"\n"} +{"Time":"2023-05-31T19:40:14.535757884Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" labels:\n"} +{"Time":"2023-05-31T19:40:14.535761477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.535765217Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T19:40:14.535768518Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.535773882Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"270\"\n"} +{"Time":"2023-05-31T19:40:14.535777943Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 5a4e2ded-0833-4f1a-a0c1-f14b0bb32f86\n"} +{"Time":"2023-05-31T19:40:14.535781476Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.535784889Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.535788466Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:40:14.535792171Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.535795862Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:40:14.535799537Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:40:14.535803346Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:40:14.535806874Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:40:14.535810919Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:40:14.535814497Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:40:14.535982134Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:40:14.535987538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:40:14.53599127Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:40:14.535995731Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:40:14.535999464Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:40:14.536003053Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:40:14.536006591Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:40:14.536010494Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:40:14.536013984Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:40:14.536019799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:40:14.536023246Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:40:14.536026564Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:40:14.536030341Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.536033483Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.536037066Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" annotations:\n"} +{"Time":"2023-05-31T19:40:14.536040485Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:40:14.536044291Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:40:14.536048378Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:40:14.536052178Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:40:14.536055956Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:20Z\"\n"} +{"Time":"2023-05-31T19:40:14.536059863Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:40:14.536063487Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.536275523Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"378\"\n"} +{"Time":"2023-05-31T19:40:14.536283653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: a824d92a-e02e-4f38-8395-483affc057cf\n"} +{"Time":"2023-05-31T19:40:14.536287388Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.536290636Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.536293765Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T19:40:14.536299119Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiServer:\n"} +{"Time":"2023-05-31T19:40:14.536302582Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certSANs:\n"} +{"Time":"2023-05-31T19:40:14.536305745Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T19:40:14.536308885Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - localhost\n"} +{"Time":"2023-05-31T19:40:14.536311758Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - 192.168.61.47\n"} +{"Time":"2023-05-31T19:40:14.536314822Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:40:14.536318422Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T19:40:14.536321862Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:40:14.536325771Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T19:40:14.536328722Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:40:14.536332068Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:40:14.536335805Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T19:40:14.536339604Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:40:14.536343445Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" controllerManager:\n"} +{"Time":"2023-05-31T19:40:14.536346395Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:40:14.536349577Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T19:40:14.536353004Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:40:14.536356084Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dns: {}\n"} +{"Time":"2023-05-31T19:40:14.536359168Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" etcd:\n"} +{"Time":"2023-05-31T19:40:14.53636238Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" local:\n"} +{"Time":"2023-05-31T19:40:14.536365789Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:40:14.53682179Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:40:14.53683145Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T19:40:14.53683563Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T19:40:14.536840053Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T19:40:14.536843473Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T19:40:14.536846998Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" networking:\n"} +{"Time":"2023-05-31T19:40:14.536850312Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T19:40:14.53685339Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:40:14.536856576Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T19:40:14.536859719Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" scheduler:\n"} +{"Time":"2023-05-31T19:40:14.536863095Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:40:14.536866213Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:40:14.536869888Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.536873025Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.536876028Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:07Z\"\n"} +{"Time":"2023-05-31T19:40:14.536879067Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T19:40:14.536882292Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.536885662Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"233\"\n"} +{"Time":"2023-05-31T19:40:14.536889072Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 2dcf4ac2-7cb2-436c-acf8-964f97b2aaad\n"} +{"Time":"2023-05-31T19:40:14.536892195Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:40:14.536895462Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" data:\n"} +{"Time":"2023-05-31T19:40:14.536898782Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kubelet: |\n"} +{"Time":"2023-05-31T19:40:14.536902216Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T19:40:14.536905692Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authentication:\n"} +{"Time":"2023-05-31T19:40:14.536909725Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" anonymous:\n"} +{"Time":"2023-05-31T19:40:14.536913141Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enabled: false\n"} +{"Time":"2023-05-31T19:40:14.536916254Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" webhook:\n"} +{"Time":"2023-05-31T19:40:14.537274028Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T19:40:14.537284761Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enabled: true\n"} +{"Time":"2023-05-31T19:40:14.537288668Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" x509:\n"} +{"Time":"2023-05-31T19:40:14.537292307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:40:14.537295683Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" authorization:\n"} +{"Time":"2023-05-31T19:40:14.537298788Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T19:40:14.537302387Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" webhook:\n"} +{"Time":"2023-05-31T19:40:14.537305892Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:40:14.537308694Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:40:14.537312094Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T19:40:14.537315179Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T19:40:14.537317956Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T19:40:14.537320974Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T19:40:14.537324298Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T19:40:14.537328362Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.53733269Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" evictionHard:\n"} +{"Time":"2023-05-31T19:40:14.537335964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T19:40:14.537338972Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T19:40:14.537342282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T19:40:14.537345781Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.537349056Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T19:40:14.537352526Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:14.537355348Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T19:40:14.537358341Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T19:40:14.537361101Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T19:40:14.537363941Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:14.537367058Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T19:40:14.537816747Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T19:40:14.53782618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T19:40:14.537829866Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" logging:\n"} +{"Time":"2023-05-31T19:40:14.537833486Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T19:40:14.537836825Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" options:\n"} +{"Time":"2023-05-31T19:40:14.537840593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" json:\n"} +{"Time":"2023-05-31T19:40:14.53784428Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T19:40:14.537847993Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T19:40:14.537851731Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T19:40:14.53785486Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:14.537858458Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:14.53786191Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resolvConf: /run/systemd/resolve/resolv.conf\n"} +{"Time":"2023-05-31T19:40:14.537865269Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T19:40:14.537868347Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T19:40:14.537871517Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.537874852Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T19:40:14.537878138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T19:40:14.537881403Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T19:40:14.537884705Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T19:40:14.537888337Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T19:40:14.537891721Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:40:14.537895042Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.537901142Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" creationTimestamp: \"2023-05-31T19:39:07Z\"\n"} +{"Time":"2023-05-31T19:40:14.537904519Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T19:40:14.537907731Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:40:14.537911061Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"236\"\n"} +{"Time":"2023-05-31T19:40:14.538257434Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid: 084a8e64-5398-453c-9bc5-9c856fe0a463\n"} +{"Time":"2023-05-31T19:40:14.538265588Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: List\n"} +{"Time":"2023-05-31T19:40:14.53826937Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metadata:\n"} +{"Time":"2023-05-31T19:40:14.538272478Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T19:40:14.538275722Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538278925Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538282091Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:40:14.538285668Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ● docker.service\r\n"} +{"Time":"2023-05-31T19:40:14.538289643Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: masked (Reason: Unit docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:40:14.538293474Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T19:40:14.538296577Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:40:14.538299557Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538302384Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538305781Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:40:14.538309219Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;35m# Unit docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:40:14.538312579Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538315475Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538318732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:40:14.538322021Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" {\r\n"} +{"Time":"2023-05-31T19:40:14.53832526Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"exec-opts\": [\r\n"} +{"Time":"2023-05-31T19:40:14.538328406Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"native.cgroupdriver=systemd\"\r\n"} +{"Time":"2023-05-31T19:40:14.538334734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ],\r\n"} +{"Time":"2023-05-31T19:40:14.538337578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T19:40:14.538341043Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T19:40:14.538344014Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T19:40:14.538347438Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" },\r\n"} +{"Time":"2023-05-31T19:40:14.538350521Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T19:40:14.538678672Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" }\r\n"} +{"Time":"2023-05-31T19:40:14.53868497Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538688677Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538694183Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:40:14.538698156Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Client:\r\n"} +{"Time":"2023-05-31T19:40:14.538701899Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T19:40:14.538706142Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Context: default\r\n"} +{"Time":"2023-05-31T19:40:14.538709414Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T19:40:14.538713132Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.538716401Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Server:\r\n"} +{"Time":"2023-05-31T19:40:14.538720055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ERROR: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?\r\n"} +{"Time":"2023-05-31T19:40:14.538724226Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" errors pretty printing info\r\n"} +{"Time":"2023-05-31T19:40:14.538728024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:40:14.538731257Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538734792Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.538738836Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:40:14.538742383Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;31m●\u001b[0m cri-docker.service\r\n"} +{"Time":"2023-05-31T19:40:14.538746436Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: masked (Reason: Unit cri-docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:40:14.538750251Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: \u001b[0;1;31mfailed\u001b[0m (Result: exit-code) since Wed 2023-05-31 19:38:35 UTC; 1min 35s ago\r\n"} +{"Time":"2023-05-31T19:40:14.538754244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TriggeredBy: \u001b[0;1;31m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:40:14.538758709Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Main PID: 452 (code=exited, status=1/FAILURE)\r\n"} +{"Time":"2023-05-31T19:40:14.538761973Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.538765944Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:35 minikube systemd[1]: cri-docker.service: Scheduled restart job, restart counter is at 3.\r\n"} +{"Time":"2023-05-31T19:40:14.538769805Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:35 minikube systemd[1]: Stopped CRI Interface for Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T19:40:14.538777133Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:35 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Start request repeated too quickly.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.539101645Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:35 minikube systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.539115047Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:35 minikube systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.539119899Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:40:14.539123562Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539126684Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539129881Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:40:14.539133459Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;35m# Unit cri-docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:40:14.539137407Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539141469Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539154071Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:40:14.539162465Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cat: /etc/systemd/system/cri-docker.service.d/10-cni.conf: No such file or directory\r\n"} +{"Time":"2023-05-31T19:40:14.539167276Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:40:14.539171599Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539174873Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539185121Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:40:14.5391891Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:14.539193057Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T19:40:14.539197573Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T19:40:14.539201401Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T19:40:14.539204636Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:40:14.539207907Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:40:14.539211295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.539214334Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:14.539445749Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:40:14.539461993Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T19:40:14.539466223Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:40:14.539469871Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T19:40:14.539473977Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T19:40:14.53948748Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:40:14.539491936Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.539497219Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T19:40:14.539502056Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T19:40:14.539511469Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:40:14.539515536Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T19:40:14.539519086Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.539523242Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T19:40:14.539528259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T19:40:14.539532569Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:40:14.539536418Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T19:40:14.539540426Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.539544486Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:40:14.539549026Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:40:14.539552708Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.539556312Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.539576501Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.53958074Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.539584497Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T19:40:14.539588502Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T19:40:14.539870388Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.539879512Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:40:14.539883472Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:40:14.539887093Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.539891207Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:14.539905387Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:14.539933209Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539936746Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539940589Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:40:14.539944695Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cri-dockerd 0.3.2 (23513f4)\r\n"} +{"Time":"2023-05-31T19:40:14.539948256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.539951843Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.53995577Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:40:14.539959724Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T19:40:14.539964976Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: loaded (\u001b]8;;file://flannel-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: disabled)\r\n"} +{"Time":"2023-05-31T19:40:14.539970775Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:38:51 UTC; 1min 20s ago\r\n"} +{"Time":"2023-05-31T19:40:14.539975273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:40:14.53997927Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Main PID: 663 (containerd)\r\n"} +{"Time":"2023-05-31T19:40:14.539982635Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Tasks: 113 (limit: 8192)\r\n"} +{"Time":"2023-05-31T19:40:14.539986618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Memory: 292.1M\r\n"} +{"Time":"2023-05-31T19:40:14.539991153Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T19:40:14.539995055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─ 663 /usr/bin/containerd --root /mnt/vda1/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:40:14.539999463Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─ 923 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 84ea0d5e5921969cc0835e76bee9d5e894ded5856b63004ecc266c557e70676e -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.540200236Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─ 926 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0a99f963869efb96ecd7391c49ee6361580e66fa0959b6d94d01d568036c0018 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.540208945Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─ 941 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 878e28d4e28a8d179417e9cd84529ab9d4ae5dbfa811bdd69fdac8b963e73317 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.540212868Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─ 947 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b5c6548eb3df423d362039de5335b870f04b9bd09bd1535a201d3866e8fd6552 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.540216667Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─1420 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id e44f6e7e7d913e3fd081dcc366218c843a1036417ddff0f382e97b660b77afa5 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.540220338Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─1424 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1c6fb216209049532b45b7922db6fa4ad8c7359a3ccb7f491e3e3f4988b999c0 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.540225381Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─1782 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 5e99677c6d6397a9de0eb581342e949b4e66c372c38a4784af83e5dd353a1e26 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.54023095Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ├─2063 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id c3c21be9db522e26ef8fee215b7a468e51d73d48f40a7f63af737d51f96a6534 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.540244715Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" └─2210 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 22405ddbb1a961403953c0c661e3e9e9e0da5b95fcac9cdb6cb0794891b5b9de -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:40:14.540248348Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.540251954Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.046783908Z\" level=info msg=\"stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: active requests=0, bytes read=51164237\"\r\n"} +{"Time":"2023-05-31T19:40:14.540256784Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.054956113Z\" level=info msg=\"ImageCreate event name:\\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:40:14.540261792Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.059364919Z\" level=info msg=\"ImageUpdate event name:\\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:40:14.54026652Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.064622092Z\" level=info msg=\"ImageCreate event name:\\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:40:14.540443277Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.068168224Z\" level=info msg=\"Pulled image \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" with image id \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\", repo tag \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\", repo digest \\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\", size \\\"51155161\\\" in 2.307178118s\"\r\n"} +{"Time":"2023-05-31T19:40:14.540452429Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.068790140Z\" level=info msg=\"PullImage \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" returns image reference \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54045734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.073146190Z\" level=info msg=\"CreateContainer within sandbox \\\"22405ddbb1a961403953c0c661e3e9e9e0da5b95fcac9cdb6cb0794891b5b9de\\\" for container \u0026ContainerMetadata{Name:dnsutils,Attempt:0,}\"\r\n"} +{"Time":"2023-05-31T19:40:14.540462399Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.098231538Z\" level=info msg=\"CreateContainer within sandbox \\\"22405ddbb1a961403953c0c661e3e9e9e0da5b95fcac9cdb6cb0794891b5b9de\\\" for \u0026ContainerMetadata{Name:dnsutils,Attempt:0,} returns container id \\\"e26485d1fa959336e0376bdf06b81b75de924ceb523bed43ab5d48e543d2003a\\\"\"\r\n"} +{"Time":"2023-05-31T19:40:14.540467259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.100686381Z\" level=info msg=\"StartContainer for \\\"e26485d1fa959336e0376bdf06b81b75de924ceb523bed43ab5d48e543d2003a\\\"\"\r\n"} +{"Time":"2023-05-31T19:40:14.540471673Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:39:50 flannel-509041 containerd[663]: time=\"2023-05-31T19:39:50.196201581Z\" level=info msg=\"StartContainer for \\\"e26485d1fa959336e0376bdf06b81b75de924ceb523bed43ab5d48e543d2003a\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:40:14.540475374Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.54047844Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.540481895Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:40:14.540485879Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.540490256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:14.540493354Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:40:14.540496543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:40:14.540758966Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:14.540767928Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:14.540771333Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.540774731Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:14.540778278Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:40:14.540781964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:40:14.540786078Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:40:14.540789372Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:40:14.54079274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:40:14.540795887Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:40:14.540799075Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:14.540802356Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:14.540805541Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:40:14.540808803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:40:14.54081212Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:40:14.540815924Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:40:14.540819327Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:40:14.540824922Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:40:14.54082887Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:40:14.540832155Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:40:14.540835622Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.540840979Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.540855242Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:40:14.540858672Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:40:14.540862248Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541085128Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:14.541093498Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:14.541097121Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.541100603Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.541104303Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:40:14.541107911Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:14.541110957Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:40:14.541116779Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:40:14.541120262Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:14.541123579Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:14.541127Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541130198Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:14.54113345Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:40:14.541136521Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:40:14.541142463Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:40:14.541153165Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:40:14.541156867Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:40:14.541159816Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:40:14.541169297Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:14.541173473Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:14.541176675Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:40:14.541179908Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:40:14.541183072Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:40:14.541187654Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:40:14.5411909Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:40:14.541193794Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:40:14.541506779Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:40:14.541515399Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:40:14.541519227Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.541522611Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.541526236Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:40:14.541529234Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:40:14.541532856Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541536003Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:14.541539224Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:14.541542531Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.541545699Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.541549023Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:40:14.541553291Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:40:14.541556439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:14.541559723Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:14.541562743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:40:14.541566491Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # imports\r\n"} +{"Time":"2023-05-31T19:40:14.541601267Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541604426Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:40:14.541607548Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:40:14.541610856Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.541616916Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.541620148Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:14.541623474Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:14.541626657Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541630002Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:40:14.541633076Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.541855446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.541866884Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.541870255Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.541873577Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541877115Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:40:14.541880543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.541883691Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:40:14.541887048Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541889919Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:40:14.541893194Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.541896336Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541899124Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:40:14.541902978Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:40:14.541908052Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:40:14.541911459Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:40:14.541914908Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.541917737Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:40:14.541920918Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:40:14.541924232Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:40:14.541927233Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:40:14.541930759Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:40:14.541933982Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:40:14.541937256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:40:14.541940465Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.541955967Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:40:14.541961871Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:40:14.541965139Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:40:14.542181588Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.542189301Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:40:14.542193271Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542196838Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542200362Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542203705Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:40:14.542207415Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:40:14.54221079Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:40:14.542213887Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:40:14.542217723Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:40:14.542221528Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.542238698Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:40:14.542242931Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:40:14.542246531Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:40:14.542252391Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54225596Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:40:14.542259472Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:40:14.542262877Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.542266221Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:40:14.542269723Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:40:14.542273247Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:40:14.54227678Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:40:14.542279832Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:40:14.542282981Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:40:14.542417523Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:40:14.5424314Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:40:14.542435133Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.542438391Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.54244163Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:40:14.542445247Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T19:40:14.542448687Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T19:40:14.542452037Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:40:14.542455431Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542458756Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T19:40:14.54246219Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:14.542465498Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:14.542468645Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54247168Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:40:14.542474745Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.542477835Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:40:14.542480825Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.5424841Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.542487252Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:40:14.542490689Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542493746Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542496735Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.542511096Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542514642Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.54251792Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.542521048Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:40:14.542524443Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:40:14.542527476Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.542827885Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:14.542837529Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:14.54284118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542845053Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542848412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542851494Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.542854815Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.542858143Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.54286155Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:40:14.542864359Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54286798Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:40:14.542870961Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.542874027Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:40:14.542876868Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.542880052Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:40:14.542883755Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:40:14.542894722Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:40:14.542898773Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:40:14.542904588Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:40:14.542908032Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:40:14.542911597Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.542914679Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:40:14.542918179Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cdi_spec_dirs = [\"/etc/cdi\", \"/var/run/cdi\"]\r\n"} +{"Time":"2023-05-31T19:40:14.542922164Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:40:14.542929012Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T19:40:14.54293225Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T19:40:14.542957719Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:40:14.543201247Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T19:40:14.543209503Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T19:40:14.543213585Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" drain_exec_sync_io_timeout = \"0s\"\r\n"} +{"Time":"2023-05-31T19:40:14.543217572Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_cdi = false\r\n"} +{"Time":"2023-05-31T19:40:14.543221387Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:40:14.543225484Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:40:14.543273477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T19:40:14.543280107Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T19:40:14.543284572Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T19:40:14.54328831Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" image_pull_progress_timeout = \"1m0s\"\r\n"} +{"Time":"2023-05-31T19:40:14.54329208Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:40:14.543296019Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:40:14.543299527Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T19:40:14.543303552Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:40:14.543307644Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:40:14.543321157Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T19:40:14.543325009Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:40:14.543328956Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T19:40:14.543332487Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543336263Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:40:14.543339971Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T19:40:14.543343734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:40:14.543355428Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543359377Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.543363421Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:40:14.543526337Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:40:14.543533709Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:40:14.543549941Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543553771Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543585855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T19:40:14.543590571Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" setup_serially = false\r\n"} +{"Time":"2023-05-31T19:40:14.543593945Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.54359784Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:40:14.543601887Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.543606005Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T19:40:14.543610042Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:40:14.54361399Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ignore_blockio_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:40:14.543620823Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:40:14.543624784Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:40:14.543628435Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:40:14.543631935Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.543635657Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T19:40:14.543639609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543643657Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543647543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:40:14.543651273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:14.543654791Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:14.543658439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:14.543661961Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:40:14.543665975Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543850783Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543859387Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543863351Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543867014Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543870608Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54387453Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.543878678Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T19:40:14.543882693Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.543889591Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:40:14.543894002Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.543897747Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:40:14.543901927Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543905387Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543935981Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:40:14.543940079Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:14.543944159Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:14.543947758Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:14.543951965Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:40:14.543955787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543959679Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543963189Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543966703Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:40:14.543970719Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543974323Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.543977607Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.544307656Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:40:14.544316936Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:40:14.544322662Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.544326412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:40:14.544330676Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.544334191Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.544337399Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:40:14.544340827Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:14.544343993Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:14.544348681Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:14.544354069Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:40:14.544357627Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.544360888Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.544364449Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.544367665Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.544371152Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.544374622Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.544377641Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.544380819Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T19:40:14.544384309Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.544387124Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T19:40:14.544390756Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T19:40:14.54439359Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.544396934Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:40:14.544400259Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:40:14.545987598Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.545998857Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T19:40:14.546002801Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546006408Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T19:40:14.54600964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546030931Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T19:40:14.546034848Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546048295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T19:40:14.546051733Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546055335Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T19:40:14.54605944Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546062751Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54606595Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546069085Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546072734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T19:40:14.54607565Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546078716Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T19:40:14.54608212Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T19:40:14.546085142Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546088367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T19:40:14.5460916Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T19:40:14.546094942Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T19:40:14.54609805Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546101277Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546104168Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T19:40:14.546107274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546113143Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546116564Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:40:14.546119653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.54612275Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.nri.v1.nri\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546125602Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable = true\r\n"} +{"Time":"2023-05-31T19:40:14.546129197Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" disable_connections = false\r\n"} +{"Time":"2023-05-31T19:40:14.546132208Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" plugin_config_path = \"/etc/nri/conf.d\"\r\n"} +{"Time":"2023-05-31T19:40:14.546135578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" plugin_path = \"/opt/nri/plugins\"\r\n"} +{"Time":"2023-05-31T19:40:14.546139874Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" plugin_registration_timeout = \"5s\"\r\n"} +{"Time":"2023-05-31T19:40:14.546143989Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" plugin_request_timeout = \"2s\"\r\n"} +{"Time":"2023-05-31T19:40:14.5461483Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" socket_path = \"/var/run/nri/nri.sock\"\r\n"} +{"Time":"2023-05-31T19:40:14.546152353Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.54615643Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546161237Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T19:40:14.546165103Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.546168665Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546171944Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T19:40:14.546175293Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T19:40:14.546178313Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.54618176Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546184909Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546188356Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T19:40:14.546191233Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546194228Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546197586Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546200493Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546328111Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546340087Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546344468Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54634851Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546352429Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546356839Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546360606Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546364244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546367932Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546371524Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.54637538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546379103Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T19:40:14.546382668Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546386316Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T19:40:14.546390089Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546393494Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546397673Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546401308Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546405321Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546408789Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T19:40:14.546413241Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546417066Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546420948Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T19:40:14.54642491Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.546429233Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T19:40:14.546433135Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.546437088Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547008814Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.547016135Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547020078Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547023779Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.547027609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T19:40:14.547031204Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54703491Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547038295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [plugins.\"io.containerd.transfer.v1.local\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547041873Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54704522Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:40:14.547048681Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" max_concurrent_uploaded_layers = 3\r\n"} +{"Time":"2023-05-31T19:40:14.547051872Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547055148Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [[plugins.\"io.containerd.transfer.v1.local\".unpack_config]]\r\n"} +{"Time":"2023-05-31T19:40:14.54705868Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" differ = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.54706199Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" platform = \"linux/amd64\"\r\n"} +{"Time":"2023-05-31T19:40:14.54706547Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:40:14.54706881Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547072068Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T19:40:14.547075307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547078582Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T19:40:14.54708185Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547085937Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547089542Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547093559Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:40:14.54709738Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:40:14.54710106Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:40:14.547388069Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T19:40:14.547394156Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547397815Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547401903Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547405736Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547409498Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:40:14.547413374Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:40:14.547416754Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T19:40:14.547420178Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547423368Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T19:40:14.547426755Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T19:40:14.547430498Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.metrics.shimstats\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:40:14.547434102Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:40:14.54743759Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:40:14.5474412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T19:40:14.547444658Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:40:14.54744809Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547451252Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T19:40:14.547454462Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.547457743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.547460962Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:40:14.547464163Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.547467298Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.547473268Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:40:14.547476866Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ● crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:40:14.547783346Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Loaded: loaded (\u001b]8;;file://flannel-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:40:14.547789055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Active: inactive (dead) since Wed 2023-05-31 19:38:50 UTC; 1min 23s ago\r\n"} +{"Time":"2023-05-31T19:40:14.547792875Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:40:14.547796906Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Main PID: 377 (code=exited, status=0/SUCCESS)\r\n"} +{"Time":"2023-05-31T19:40:14.547800159Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.547803816Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:48 flannel-509041 crio[377]: time=\"2023-05-31 19:38:48.657026819Z\" level=debug msg=\"Cached value indicated that metacopy is being used\" file=\"overlay/overlay.go:339\"\r\n"} +{"Time":"2023-05-31T19:40:14.547808151Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:48 flannel-509041 crio[377]: time=\"2023-05-31 19:38:48.657102296Z\" level=debug msg=\"backingFs=extfs, projectQuotaSupported=false, useNativeDiff=false, usingMetacopy=true\" file=\"overlay/overlay.go:400\"\r\n"} +{"Time":"2023-05-31T19:40:14.547812644Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:48 flannel-509041 crio[377]: time=\"2023-05-31 19:38:48.666351333Z\" level=debug msg=\"Closing exit monitor...\" file=\"server/server.go:693\"\r\n"} +{"Time":"2023-05-31T19:40:14.547817123Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:48 flannel-509041 crio[377]: time=\"2023-05-31 19:38:48.666536291Z\" level=debug msg=\"hook monitoring canceled: context canceled\" file=\"hooks/monitor.go:60\"\r\n"} +{"Time":"2023-05-31T19:40:14.547821465Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:50 flannel-509041 crio[377]: time=\"2023-05-31 19:38:50.420007480Z\" level=debug msg=\"Closed stream server\" file=\"crio/main.go:383\"\r\n"} +{"Time":"2023-05-31T19:40:14.547825603Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:50 flannel-509041 crio[377]: time=\"2023-05-31 19:38:50.420144832Z\" level=debug msg=\"Closed monitors\" file=\"crio/main.go:385\"\r\n"} +{"Time":"2023-05-31T19:40:14.547831367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:50 flannel-509041 crio[377]: time=\"2023-05-31 19:38:50.420214466Z\" level=debug msg=\"Closed hook monitor\" file=\"crio/main.go:388\"\r\n"} +{"Time":"2023-05-31T19:40:14.54783566Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:50 flannel-509041 crio[377]: time=\"2023-05-31 19:38:50.420276841Z\" level=debug msg=\"Closed main server\" file=\"crio/main.go:393\"\r\n"} +{"Time":"2023-05-31T19:40:14.547839543Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:50 flannel-509041 systemd[1]: crio.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:40:14.547843567Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" May 31 19:38:50 flannel-509041 systemd[1]: Stopped Container Runtime Interface for OCI (CRI-O).\r\n"} +{"Time":"2023-05-31T19:40:14.547847145Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:40:14.548338076Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.548343557Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.548348305Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:40:14.548352202Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[0;1;34m# \u001b]8;;file://flannel-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:40:14.548356057Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:40:14.548359651Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:40:14.54836328Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T19:40:14.548366848Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:40:14.548370448Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:14.548373879Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:40:14.548377581Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" After=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:40:14.548381105Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Requires=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:40:14.548384235Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.548387733Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:40:14.548391302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:40:14.548394578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=-/etc/sysconfig/crio\r\n"} +{"Time":"2023-05-31T19:40:14.548398497Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=-/etc/sysconfig/crio.minikube\r\n"} +{"Time":"2023-05-31T19:40:14.548401885Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:40:14.548405195Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:40:14.548408387Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T19:40:14.548411753Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CRIO_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:40:14.548416244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" $CRIO_MINIKUBE_OPTIONS\r\n"} +{"Time":"2023-05-31T19:40:14.548419547Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:40:14.548422921Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:40:14.548426172Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:40:14.548429657Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T19:40:14.548872817Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:40:14.548878517Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T19:40:14.548882147Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:40:14.548885549Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:40:14.548889113Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.548892507Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:40:14.548895993Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:40:14.548899504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.548902749Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.548906119Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:40:14.548909646Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T19:40:14.548913246Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:40:14.54891693Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:40:14.548920546Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:40:14.548923826Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.548927053Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:40:14.548930656Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.548934063Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:40:14.548937646Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:40:14.548941173Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:40:14.548944663Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:40:14.548947803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.548951143Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:40:14.54895468Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:40:14.548958294Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:40:14.549433538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:40:14.549450939Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:40:14.549460857Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.549476537Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:40:14.549485677Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:40:14.549494801Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:40:14.549503981Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.549514638Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:40:14.549525158Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:40:14.549529393Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.549536141Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:40:14.549549071Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:40:14.54955905Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:40:14.549570079Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.54958071Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:40:14.54958913Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:40:14.549593163Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:40:14.549604204Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:40:14.549613928Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.549617382Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.549626552Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:40:14.549630306Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:40:14.549634138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:40:14.549640914Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.549952643Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:40:14.549960599Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:40:14.549964592Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:40:14.549968641Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:40:14.549972338Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.549975734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:40:14.549979268Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:40:14.549983066Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:40:14.549986799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:40:14.549990132Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.549993477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:40:14.549996737Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:40:14.550000495Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550003979Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:40:14.550007522Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:40:14.550010786Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550014102Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:40:14.550017642Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:40:14.550020959Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550024417Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:40:14.550028408Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:40:14.550031769Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:40:14.550037427Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550040732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:40:14.550044002Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:40:14.550400086Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550406232Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:40:14.550409851Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:40:14.550413405Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:40:14.550417046Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.550420224Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550424404Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:40:14.550427964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:40:14.550431354Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.550434752Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550438072Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:40:14.550441667Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:40:14.550445302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:40:14.55044876Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.550452288Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550455593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:40:14.550459471Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:14.550462871Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550466255Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:40:14.550469956Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:14.550473091Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550476445Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:40:14.550479982Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:40:14.550483496Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:40:14.550866657Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550871409Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:40:14.550875013Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:40:14.550879286Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:40:14.550882931Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:40:14.550886441Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:40:14.550889803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #]\r\n"} +{"Time":"2023-05-31T19:40:14.550892949Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550896173Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:40:14.550899421Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:40:14.550902531Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550905801Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:40:14.550909278Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.550912753Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:40:14.550916241Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550919623Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:40:14.550923123Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:40:14.550926451Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:40:14.550929928Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550933075Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:40:14.550936663Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:40:14.550939774Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.550945863Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:40:14.550949493Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:40:14.550954112Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:40:14.551319995Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:40:14.551325948Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.551329297Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.551336693Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:40:14.551341671Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:40:14.551345313Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:40:14.551348704Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_env = [\r\n"} +{"Time":"2023-05-31T19:40:14.551352004Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.551355438Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55135875Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:40:14.551362239Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" selinux = false\r\n"} +{"Time":"2023-05-31T19:40:14.551365591Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.551368918Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:40:14.551372674Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:40:14.551376294Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.551379617Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.551382931Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.551386195Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:40:14.551389568Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:40:14.55139297Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:40:14.551396424Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:40:14.551399998Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:40:14.551403139Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.551407201Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:40:14.551410862Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:40:14.551806976Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:40:14.55181215Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:40:14.551815824Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.551819264Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:40:14.551822754Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.551826086Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:40:14.551829376Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:40:14.551832903Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.551836032Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:40:14.551839459Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.551842694Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.551846105Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:40:14.551849518Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:40:14.551852863Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:40:14.551855983Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:40:14.55185943Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:40:14.551862906Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:40:14.551866354Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:40:14.551869786Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:40:14.551873006Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:40:14.551876271Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:40:14.551879561Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:40:14.551883081Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:40:14.551886616Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:40:14.551889789Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.552247331Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.552253822Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:40:14.552272618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:40:14.552276291Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:40:14.552279732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.552283138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.552286443Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:40:14.552290052Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:40:14.55229428Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:40:14.552297845Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:40:14.55230138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" additional_devices = [\r\n"} +{"Time":"2023-05-31T19:40:14.552304763Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.552307763Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.552311044Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:40:14.552314407Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:40:14.552317653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:40:14.552320961Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:40:14.552324258Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.5523274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.552330716Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:40:14.552334157Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:40:14.552337668Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:40:14.552340831Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.552344077Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:40:14.552754582Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:40:14.552761354Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:40:14.552764789Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.552768125Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:40:14.552771713Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:40:14.552777069Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:40:14.552780752Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:40:14.552783985Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.552787217Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.552790619Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.552793952Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:40:14.552797352Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:40:14.552800606Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.552803989Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:40:14.552807811Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:40:14.552811402Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:40:14.552814778Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # limit is never exceeded.\r\n"} +{"Time":"2023-05-31T19:40:14.552817993Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:40:14.552821214Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.552824513Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Whether container output should be logged to journald in addition to the kubernetes log file\r\n"} +{"Time":"2023-05-31T19:40:14.552828073Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:40:14.55283137Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.552834916Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:40:14.552838481Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:40:14.553238474Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553244637Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:40:14.553248174Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:40:14.553251783Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553254975Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:40:14.553258424Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.553262207Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553265391Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:40:14.553268786Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" read_only = false\r\n"} +{"Time":"2023-05-31T19:40:14.553272007Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55327544Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:40:14.553279143Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:40:14.553282545Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.553285924Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:40:14.553289203Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55329239Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:40:14.553295981Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.553299078Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.553302438Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553305818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:40:14.553309105Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:40:14.553312587Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:40:14.553315933Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.553319406Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553322808Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:40:14.553727037Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:40:14.553732395Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:40:14.553735646Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.553741164Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553744638Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:40:14.553748156Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:40:14.553751829Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:40:14.553755407Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:40:14.553758736Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553762152Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # manage_ns_lifecycle determines whether we pin and remove namespaces\r\n"} +{"Time":"2023-05-31T19:40:14.553765667Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # and manage their lifecycle.\r\n"} +{"Time":"2023-05-31T19:40:14.553768979Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is being deprecated, and will be unconditionally true in the future.\r\n"} +{"Time":"2023-05-31T19:40:14.553772439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" manage_ns_lifecycle = true\r\n"} +{"Time":"2023-05-31T19:40:14.553776104Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553779489Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:40:14.553783246Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:40:14.553786669Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:40:14.553790081Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:40:14.553793412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:40:14.553796419Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.553799734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:40:14.553803044Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:40:14.553806445Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:40:14.553809687Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.554192798Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:40:14.554198568Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:40:14.554202206Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.554205204Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:40:14.554209113Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:40:14.554213853Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:40:14.554217137Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.554220452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.554223658Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:40:14.554227213Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The runtime to use is picked based on the runtime_handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:40:14.554230378Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If no runtime_handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:40:14.554233831Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:40:14.554237258Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.554240273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:40:14.554243577Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:40:14.554246902Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:40:14.554250159Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:40:14.554253798Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:14.55425716Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:14.554260395Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:40:14.554263784Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:40:14.554267505Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:40:14.554271067Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:40:14.554682714Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:40:14.554687991Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:40:14.554691624Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:40:14.554697092Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:40:14.554700696Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:40:14.554704134Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:40:14.554707449Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:40:14.554711208Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:40:14.554714743Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:40:14.55471824Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:40:14.554721868Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:40:14.554725155Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:40:14.554728753Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:40:14.554732484Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:40:14.554735792Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.554739252Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.554742444Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:40:14.554745677Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.55474896Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:40:14.554752273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.554755417Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.554758567Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.554761541Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.554764696Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555157134Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:40:14.555162186Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:40:14.55516554Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:40:14.555168304Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55517148Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:40:14.555175211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:40:14.555178282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:40:14.555181546Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555184439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:40:14.555187818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:40:14.555191094Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555194282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:40:14.555197604Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:40:14.555200918Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555203883Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:40:14.555206921Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:40:14.555210334Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555213418Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:40:14.555216651Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.555219649Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:40:14.555223119Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:40:14.555226965Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:40:14.555230206Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:40:14.555235383Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:40:14.555628399Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:40:14.555633625Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555637097Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:40:14.55564066Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:40:14.55564547Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555649024Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:40:14.555652745Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:40:14.555656307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.555659724Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555663069Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:40:14.555666527Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.555669845Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:40:14.555673117Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555676618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:40:14.555680355Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:40:14.555683806Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.555687127Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.55569027Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555693572Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:40:14.555697252Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:40:14.555700903Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:40:14.555704445Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.555708017Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:40:14.555711325Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.555990926Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:40:14.555995805Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:40:14.555999378Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:40:14.55600275Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:40:14.55600627Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:40:14.556009801Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.556013072Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556016433Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:40:14.556019934Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:40:14.55602323Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:40:14.556026432Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #insecure_registries = \"[]\"\r\n"} +{"Time":"2023-05-31T19:40:14.556029618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556034083Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:40:14.556037773Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:40:14.556041103Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:40:14.556044436Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556047819Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:40:14.55605138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.55605456Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556057834Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:40:14.5560613Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:40:14.556064757Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:40:14.556067867Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55607131Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:40:14.556476159Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:40:14.556482519Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.556485824Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556490935Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:40:14.556494477Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:40:14.556497904Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55650124Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:40:14.556504789Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:40:14.556508179Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:40:14.556511572Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.556514881Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556518107Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:40:14.556521397Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:40:14.556524759Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556528012Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:40:14.556531372Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:40:14.556534516Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556537769Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:40:14.556541379Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:40:14.556544717Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.556565905Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:40:14.556569732Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.556573086Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T19:40:14.556576256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:40:14.556579443Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.556582768Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557069353Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:40:14.557074679Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.557078353Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557081708Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:40:14.557085021Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.557088307Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.557091617Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.557094957Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:40:14.557101161Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:40:14.451179423Z] Starting CRI-O, version: 1.24.1, git: a3bbde8a77c323aa6a485da9a9046299155c6016(dirty) \r\n"} +{"Time":"2023-05-31T19:40:14.557105427Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T19:40:14.557109678Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:40:14.55711344Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:40:14.557117016Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:40:14.557120441Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.557124044Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:40:14.55712737Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557130849Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:40:14.55713435Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:40:14.557137817Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:40:14.557141196Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:40:14.557144287Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557147302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:40:14.55715054Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:40:14.557702456Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:40:14.557708811Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:40:14.557725534Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:40:14.557730035Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557733868Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:40:14.557737675Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:40:14.557741029Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:40:14.557744374Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557747783Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:40:14.557751488Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:40:14.557754841Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557758114Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:40:14.557761578Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:40:14.557764961Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:40:14.557768499Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557771787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:40:14.557775175Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:40:14.557778427Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:40:14.55778175Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:40:14.55778525Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.557788363Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.557791695Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:40:14.557795698Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:40:14.557799132Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:40:14.558504872Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.558513912Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:40:14.558518244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:40:14.558522412Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:40:14.558529854Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:40:14.558534148Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55853789Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:40:14.558542282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:40:14.55854667Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:40:14.558550757Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:40:14.55855464Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.558558625Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T19:40:14.558576917Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T19:40:14.558581918Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T19:40:14.558585818Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.558589666Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T19:40:14.558593749Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T19:40:14.55859922Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T19:40:14.558603338Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T19:40:14.558607325Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.558611542Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:40:14.558615593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:40:14.558619389Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.558638282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:40:14.559268532Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:40:14.559279236Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.559283214Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:40:14.559287367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:40:14.559291494Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55929539Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:40:14.559300074Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:40:14.559304201Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:40:14.559307968Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.559311731Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:40:14.559315688Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:40:14.559319674Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.559323673Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T19:40:14.559327618Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.559331405Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.559335431Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:40:14.559339432Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:40:14.559345065Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:40:14.559349735Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.559353486Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.55935748Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:40:14.559361668Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:40:14.559365598Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.559369359Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.559373353Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:40:14.560040219Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:40:14.560046657Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:40:14.560050605Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.560054721Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.560058719Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:40:14.560063306Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:14.56006715Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.560071171Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:40:14.560075612Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:40:14.560079523Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.560083502Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:40:14.560087731Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:40:14.560091681Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:40:14.560095278Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.560099047Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:40:14.560102917Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:40:14.560107447Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:40:14.56011143Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:40:14.560115439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:40:14.560119441Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.560123448Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.560126853Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:40:14.560130851Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T19:40:14.560134686Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.561191187Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:40:14.561201007Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.56120502Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:40:14.561209367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.561213202Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:40:14.561216944Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:40:14.561220472Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:40:14.561224519Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:40:14.561228222Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.56123198Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:40:14.561235674Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T19:40:14.561241784Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:40:14.561245439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.561249361Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:40:14.561253265Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:40:14.561259354Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:40:14.561263478Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:40:14.561267452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:40:14.561271636Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ]\r\n"} +{"Time":"2023-05-31T19:40:14.561275545Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.561279326Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:40:14.561283466Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:40:14.56128756Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:40:14.561291645Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T19:40:14.56228615Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.562294439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.562297953Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:40:14.562304147Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T19:40:14.562307569Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.562311098Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:40:14.562315048Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:40:14.562318643Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.562321984Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.562325651Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.562328905Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:40:14.562332642Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:40:14.562336018Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:40:14.562339705Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:40:14.562343121Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:40:14.562346773Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.56235006Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:40:14.562353538Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:40:14.562357211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:40:14.562360913Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:40:14.56236434Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.562367862Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:40:14.562372133Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.562375411Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T19:40:14.563230911Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T19:40:14.563239334Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.563242792Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.563246509Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T19:40:14.563250035Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T19:40:14.563253362Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T19:40:14.563256975Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.563260418Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T19:40:14.563264149Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.563267604Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.563270957Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.563274317Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:40:14.563277793Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:40:14.563280964Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.563284261Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:40:14.563287744Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.563290958Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.563294265Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:40:14.563297794Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:40:14.563301228Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:40:14.563304656Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:40:14.563307842Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:40:14.563311254Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:40:14.563314701Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:40:14.563318127Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:40:14.564262617Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:40:14.564271867Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:40:14.564275651Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:40:14.56427965Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:40:14.564283826Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:40:14.564290593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.564294799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.564299143Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:40:14.564303527Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:40:14.564307445Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:40:14.564311177Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.564314902Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.564318464Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T19:40:14.56432274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T19:40:14.564326847Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T19:40:14.564330673Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T19:40:14.564334499Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.564338084Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.564341974Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:40:14.564346014Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:40:14.564351086Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:40:14.564355744Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:40:14.564359684Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T19:40:14.564363286Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.564367232Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.564371219Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T19:40:14.565422213Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T19:40:14.565430891Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T19:40:14.565444273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T19:40:14.56544785Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.565452143Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.565455632Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T19:40:14.56545955Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T19:40:14.565462992Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T19:40:14.565467613Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:40:14.565471067Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.565474511Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:40:14.565478017Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:40:14.565481452Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:40:14.565484812Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:40:14.56548826Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.565491253Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.565494653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:40:14.565498289Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:40:14.565501804Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:40:14.565504957Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.565508183Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:40:14.565511703Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:40:14.565515188Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:40:14.56551882Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.566472391Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:40:14.566481247Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:40:14.566484956Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:40:14.566488633Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:40:14.56649226Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.566495682Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.566499367Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.566502746Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:40:14.566506631Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T19:40:14.566510504Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:40:14.566513858Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.566517323Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:40:14.566522101Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:40:14.566525966Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:40:14.566530109Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T19:40:14.566533879Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:40:14.566537497Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.566540791Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T19:40:14.566544224Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:40:14.566547511Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.566550967Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:40:14.566554316Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:40:14.566557735Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.56740839Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:40:14.567416675Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:40:14.567422058Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.567425663Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:40:14.5674291Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.5674327Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.567436156Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:40:14.567439628Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T19:40:14.567443417Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.567446803Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:40:14.567450382Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:40:14.567453782Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.567457188Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:40:14.567460593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.567463954Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:40:14.567467403Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.567470739Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.567474453Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.567477903Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:40:14.567481382Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:40:14.567484888Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:40:14.567488123Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.567491349Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.567494612Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:40:14.567498104Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:40:14.568365893Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:40:14.568373955Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.568377548Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.568380951Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T19:40:14.568384747Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:40:14.568388396Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:40:14.568391853Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T19:40:14.568395137Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.568398545Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T19:40:14.568402106Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:40:14.568405661Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:40:14.568409022Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T19:40:14.568412196Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.568415609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:40:14.568419187Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:40:14.568423424Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:40:14.568427117Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:40:14.568430447Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.568433767Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:40:14.568437594Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:40:14.5684409Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:40:14.568444872Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:40:14.568448099Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:40:14.569413869Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.569423305Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T19:40:14.569427736Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T19:40:14.569432439Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T19:40:14.569436688Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.569440624Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.569444404Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:40:14.569448366Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:40:14.569452446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:40:14.569465599Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.569469062Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:40:14.569472943Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:40:14.569476133Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.569479591Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:40:14.569483134Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:40:14.569486593Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:40:14.569489861Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.569493486Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.569496625Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T19:40:14.569500128Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T19:40:14.569504536Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T19:40:14.569508211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T19:40:14.569511749Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T19:40:14.570830698Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T19:40:14.570840295Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T19:40:14.570843946Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.570847652Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.570851274Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:40:14.570855256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:40:14.5708589Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:40:14.570862461Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:40:14.570865908Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.570869102Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:40:14.570872714Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:40:14.570876286Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:40:14.570880246Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:40:14.570883773Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:40:14.570887123Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:40:14.570890458Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:40:14.570893827Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:40:14.570897366Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:40:14.57090099Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:40:14.570904457Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:40:14.57090783Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:40:14.570911229Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:40:14.570915009Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:40:14.572715997Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:40:14.572725557Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:40:14.572729064Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T19:40:14.572732873Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T19:40:14.572736389Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:40:14.572740004Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:40:14.572743833Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:40:14.572747474Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:40:14.57275125Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:40:14.572754917Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:40:14.572761003Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T19:40:14.572765406Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:40:14.57276897Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:40:14.572772991Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T19:40:14.572776804Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T19:40:14.57278033Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T19:40:14.572785567Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T19:40:14.572789413Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T19:40:14.572792775Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.572796004Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.572799379Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:40:14.574320579Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.574329886Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:40:14.574333606Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:40:14.57433703Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.574340481Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.574343798Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.574347162Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.574350971Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.574354245Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.574357894Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.574364184Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.57436739Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.574370597Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:40:14.574374215Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:40:14.574377655Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:40:14.574380887Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.574384342Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:40:14.574388006Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:40:14.574391881Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:40:14.574395628Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.574399043Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:40:14.574403118Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:40:14.574406444Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.57440977Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:40:14.574413128Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:40:14.574416301Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.575788218Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:40:14.575797734Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:40:14.575801557Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.575805205Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T19:40:14.575809399Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T19:40:14.5758208Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T19:40:14.575826765Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T19:40:14.575830759Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T19:40:14.575834995Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T19:40:14.575838825Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T19:40:14.575843044Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T19:40:14.575846922Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T19:40:14.5758505Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T19:40:14.57585399Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Example:\r\n"} +{"Time":"2023-05-31T19:40:14.575857522Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T19:40:14.575861023Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T19:40:14.575864525Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T19:40:14.575868007Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T19:40:14.57587138Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T19:40:14.575874728Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T19:40:14.575878134Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:40:14.575881475Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T19:40:14.577755729Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T19:40:14.577766648Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T19:40:14.577770975Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T19:40:14.577775232Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T19:40:14.577782636Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T19:40:14.577787446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \r\n"} +{"Time":"2023-05-31T19:40:14.577791352Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.577795569Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:40:14.577800237Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" #\r\n"} +{"Time":"2023-05-31T19:40:14.577804055Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:40:14.577808025Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:40:14.577812176Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:40:14.577816484Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:40:14.577820859Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:40:14.577824817Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:40:14.577828567Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.577832694Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:40:14.577836609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:40:14.577841032Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.577844904Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:40:14.577849084Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:40:14.577853254Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.579760526Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.579770548Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:40:14.579775199Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.579779651Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:40:14.579783604Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.579787705Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:40:14.579791995Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:40:14.579796346Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.579800211Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.579804247Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.579808029Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:40:14.579812256Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:40:14.579816376Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:40:14.579820666Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:40:14.579824596Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:40:14.57982855Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.579832548Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:40:14.579836545Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:40:14.579849314Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:40:14.579853184Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:40:14.579856652Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:40:14.579862275Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.579865585Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.581761932Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:40:14.58177093Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:40:14.581775062Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:40:14.581778977Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T19:40:14.58178273Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.581786135Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.581790006Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:40:14.581793614Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:40:14.581797302Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:40:14.581800532Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.581803799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:40:14.581807158Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.581810444Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.581813722Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:40:14.58181714Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:40:14.581820576Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:40:14.581823682Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.581826954Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:40:14.581830441Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:40:14.581833827Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.581837181Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.581840513Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:40:14.581843804Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:40:14.581847569Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.581851134Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:40:14.583147882Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:40:14.583158462Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:40:14.583162595Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.583166633Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.58317046Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:40:14.583174155Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:40:14.583177862Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.583181602Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:40:14.583188353Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:40:14.583191801Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.583195421Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T19:40:14.583199112Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T19:40:14.583202848Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T19:40:14.583207489Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T19:40:14.583211577Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T19:40:14.583215953Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T19:40:14.583219571Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T19:40:14.583224002Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.583228128Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T19:40:14.583232294Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T19:40:14.583235857Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T19:40:14.583239908Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T19:40:14.583243609Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T19:40:14.58324768Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T19:40:14.58325147Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T19:40:14.584812697Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T19:40:14.584823925Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T19:40:14.584828082Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584832111Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T19:40:14.584836147Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T19:40:14.584840154Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584844282Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T19:40:14.584848833Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584853317Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584857244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584861244Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584865569Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584869799Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584873676Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.584877712Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T19:40:14.58488181Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:40:14.58488843Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:40:14.584892488Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:40:14.584896446Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.584900653Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:40:14.584904731Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.584908562Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.584912512Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:40:14.584916626Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T19:40:14.584920932Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T19:40:14.586192113Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T19:40:14.586201238Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.586205045Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.586208328Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:40:14.58621234Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T19:40:14.58621527Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T19:40:14.586218626Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.586221674Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T19:40:14.586224993Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T19:40:14.586228248Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.586231272Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T19:40:14.586234459Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T19:40:14.586241178Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.586244434Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T19:40:14.586247847Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T19:40:14.586250813Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.586254298Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T19:40:14.586257787Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T19:40:14.586261087Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.5862643Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T19:40:14.586267845Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T19:40:14.586271132Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.586274375Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T19:40:14.586278094Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T19:40:14.586281917Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T19:40:14.587256649Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \r\n"} +{"Time":"2023-05-31T19:40:14.587265036Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T19:40:14.587269071Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ----------------------- debugLogs end: flannel-509041 [took: 17.946380034s] --------------------------------\n"} +{"Time":"2023-05-31T19:40:14.587272934Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:175: Cleaning up \"flannel-509041\" profile ...\n"} +{"Time":"2023-05-31T19:40:14.587276754Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p flannel-509041\n"} +{"Time":"2023-05-31T19:40:16.410863438Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p flannel-509041: (1.87103619s)\n"} +{"Time":"2023-05-31T19:40:16.41089579Z","Action":"cont","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T19:40:16.410902071Z","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== CONT TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T19:40:16.410910259Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial"} +{"Time":"2023-05-31T19:40:16.410913692Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":"=== RUN TestStartStop/group/embed-certs/serial\n"} +{"Time":"2023-05-31T19:40:16.410921168Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/FirstStart"} +{"Time":"2023-05-31T19:40:16.410925125Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"=== RUN TestStartStop/group/embed-certs/serial/FirstStart\n"} +{"Time":"2023-05-31T19:40:16.410957736Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-linux-amd64 start -p embed-certs-850877 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:40:20.552235919Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"E0531 19:40:20.552165 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:40:48.869645428Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" net_test.go:111: (dbg) Done: out/minikube-linux-amd64 start -p enable-default-cni-509041 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --enable-default-cni=true --driver=kvm2 --container-runtime=containerd: (1m47.527064275s)\n"} +{"Time":"2023-05-31T19:40:48.869682018Z","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags"} +{"Time":"2023-05-31T19:40:48.869686989Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/KubeletFlags\n"} +{"Time":"2023-05-31T19:40:48.869699401Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags","Output":" net_test.go:132: (dbg) Run: out/minikube-linux-amd64 ssh -p enable-default-cni-509041 \"pgrep -a kubelet\"\n"} +{"Time":"2023-05-31T19:40:49.093287885Z","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod"} +{"Time":"2023-05-31T19:40:49.093311011Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/NetCatPod\n"} +{"Time":"2023-05-31T19:40:49.093318097Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" net_test.go:148: (dbg) Run: kubectl --context enable-default-cni-509041 replace --force -f testdata/netcat-deployment.yaml\n"} +{"Time":"2023-05-31T19:40:49.557622857Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/enable-default-cni/NetCatPod: waiting 15m0s for pods matching \"app=netcat\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:40:49.561775108Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-pffgl\" [c3df56c0-fd70-4363-9467-9f420555d978] Pending / Ready:ContainersNotReady (containers with unready status: [dnsutils]) / ContainersReady:ContainersNotReady (containers with unready status: [dnsutils])\n"} +{"Time":"2023-05-31T19:40:51.322996674Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":"E0531 19:40:51.322914 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:40:54.566722751Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" helpers_test.go:344: \"netcat-7458db8b8-pffgl\" [c3df56c0-fd70-4363-9467-9f420555d978] Running\n"} +{"Time":"2023-05-31T19:41:00.565655525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" net_test.go:162: (dbg) TestNetworkPlugins/group/enable-default-cni/NetCatPod: app=netcat healthy within 11.008041173s\n"} +{"Time":"2023-05-31T19:41:00.565680972Z","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/DNS"} +{"Time":"2023-05-31T19:41:00.565685074Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/DNS","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/DNS\n"} +{"Time":"2023-05-31T19:41:00.565781181Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/DNS","Output":" net_test.go:174: (dbg) Run: kubectl --context enable-default-cni-509041 exec deployment/netcat -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T19:41:00.78231061Z","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost"} +{"Time":"2023-05-31T19:41:00.782337926Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/Localhost\n"} +{"Time":"2023-05-31T19:41:00.782388467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost","Output":" net_test.go:193: (dbg) Run: kubectl --context enable-default-cni-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z localhost 8080\"\n"} +{"Time":"2023-05-31T19:41:00.997077653Z","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin"} +{"Time":"2023-05-31T19:41:00.997106432Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/HairPin\n"} +{"Time":"2023-05-31T19:41:00.997113585Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Output":" net_test.go:248: (dbg) Run: kubectl --context enable-default-cni-509041 exec deployment/netcat -- /bin/sh -c \"nc -w 5 -i 5 -z netcat 8080\"\n"} +{"Time":"2023-05-31T19:41:01.191488378Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" net_test.go:209: \"enable-default-cni\" test finished in 6m14.673073385s, failed=false\n"} +{"Time":"2023-05-31T19:41:08.276436977Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"E0531 19:41:08.276366 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:41:16.269113728Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T19:41:16.269140337Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ----------------------- debugLogs start: enable-default-cni-509041 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T19:41:16.269144093Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T19:41:16.26914767Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Server:\t\t10.96.0.10\n"} +{"Time":"2023-05-31T19:41:16.269150238Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Address:\t10.96.0.10#53\n"} +{"Time":"2023-05-31T19:41:16.269152514Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269160086Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name:\tkubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:41:16.269162324Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Address: 10.96.0.1\n"} +{"Time":"2023-05-31T19:41:16.269164477Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269166864Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269168853Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269171007Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T19:41:16.269173117Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Connection to 10.96.0.10 53 port [udp/*] succeeded!\n"} +{"Time":"2023-05-31T19:41:16.269175258Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269177786Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269181011Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T19:41:16.269184399Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Connection to 10.96.0.10 53 port [tcp/*] succeeded!\n"} +{"Time":"2023-05-31T19:41:16.269187838Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269190867Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269194329Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:41:16.269198391Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cat: can't open '/etc/nsswitch.conf': No such file or directory\n"} +{"Time":"2023-05-31T19:41:16.269202719Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" command terminated with exit code 1\n"} +{"Time":"2023-05-31T19:41:16.269206419Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269209534Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.26921272Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T19:41:16.269216372Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kubernetes-managed hosts file.\n"} +{"Time":"2023-05-31T19:41:16.269219679Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 127.0.0.1\tlocalhost\n"} +{"Time":"2023-05-31T19:41:16.269222972Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ::1\tlocalhost ip6-localhost ip6-loopback\n"} +{"Time":"2023-05-31T19:41:16.26922621Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::0\tip6-localnet\n"} +{"Time":"2023-05-31T19:41:16.269228932Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::0\tip6-mcastprefix\n"} +{"Time":"2023-05-31T19:41:16.269231059Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::1\tip6-allnodes\n"} +{"Time":"2023-05-31T19:41:16.269233202Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fe00::2\tip6-allrouters\n"} +{"Time":"2023-05-31T19:41:16.269235253Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 10.244.0.4\tnetcat-7458db8b8-pffgl\n"} +{"Time":"2023-05-31T19:41:16.269237174Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269238888Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269240953Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:41:16.269242953Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" search default.svc.cluster.local svc.cluster.local cluster.local\n"} +{"Time":"2023-05-31T19:41:16.269244906Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nameserver 10.96.0.10\n"} +{"Time":"2023-05-31T19:41:16.269246848Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" options ndots:5\n"} +{"Time":"2023-05-31T19:41:16.269248752Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269251859Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269253758Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T19:41:16.269255738Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # /etc/nsswitch.conf\r\n"} +{"Time":"2023-05-31T19:41:16.269257708Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.269259615Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" passwd: files mymachines systemd\r\n"} +{"Time":"2023-05-31T19:41:16.269262225Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" group: files [SUCCESS=merge] mymachines [SUCCESS=merge] systemd\r\n"} +{"Time":"2023-05-31T19:41:16.26926504Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shadow: files\r\n"} +{"Time":"2023-05-31T19:41:16.269267643Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.26927104Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hosts: files mymachines resolve [!UNAVAIL=return] dns myhostname\r\n"} +{"Time":"2023-05-31T19:41:16.2692744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" networks: files dns\r\n"} +{"Time":"2023-05-31T19:41:16.269277535Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.269280586Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" protocols: files\r\n"} +{"Time":"2023-05-31T19:41:16.269283581Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" services: files\r\n"} +{"Time":"2023-05-31T19:41:16.269286975Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ethers: files\r\n"} +{"Time":"2023-05-31T19:41:16.2692903Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rpc: files\r\n"} +{"Time":"2023-05-31T19:41:16.269293453Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269296375Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269299475Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T19:41:16.269302622Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 127.0.0.1\tlocalhost\r\n"} +{"Time":"2023-05-31T19:41:16.26930556Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 127.0.1.1 enable-default-cni-509041\r\n"} +{"Time":"2023-05-31T19:41:16.269308462Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.39.1\thost.minikube.internal\r\n"} +{"Time":"2023-05-31T19:41:16.26931208Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.39.43\tcontrol-plane.minikube.internal\r\n"} +{"Time":"2023-05-31T19:41:16.26931518Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269318807Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269321756Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T19:41:16.2693258Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This is /run/systemd/resolve/resolv.conf managed by man:systemd-resolved(8).\r\n"} +{"Time":"2023-05-31T19:41:16.269329372Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Do not edit.\r\n"} +{"Time":"2023-05-31T19:41:16.269332247Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.269338992Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This file might be symlinked as /etc/resolv.conf. If you're looking at\r\n"} +{"Time":"2023-05-31T19:41:16.269342208Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # /etc/resolv.conf and seeing this text, you have followed the symlink.\r\n"} +{"Time":"2023-05-31T19:41:16.269345152Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.269348265Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This is a dynamic resolv.conf file for connecting local clients directly to\r\n"} +{"Time":"2023-05-31T19:41:16.269351741Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # all known uplink DNS servers. This file lists all configured search domains.\r\n"} +{"Time":"2023-05-31T19:41:16.269355022Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.269358132Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Third party programs should typically not access this file directly, but only\r\n"} +{"Time":"2023-05-31T19:41:16.269360969Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # through the symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a\r\n"} +{"Time":"2023-05-31T19:41:16.269364202Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # different way, replace this symlink by a static file or a different symlink.\r\n"} +{"Time":"2023-05-31T19:41:16.269366957Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.269380011Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # See man:systemd-resolved.service(8) for details about the supported modes of\r\n"} +{"Time":"2023-05-31T19:41:16.269384081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # operation for /etc/resolv.conf.\r\n"} +{"Time":"2023-05-31T19:41:16.269387571Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.269390929Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nameserver 192.168.122.1\r\n"} +{"Time":"2023-05-31T19:41:16.269394932Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" search .\r\n"} +{"Time":"2023-05-31T19:41:16.269399069Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269402141Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269406349Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T19:41:16.269411263Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME\n"} +{"Time":"2023-05-31T19:41:16.26941732Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node/enable-default-cni-509041 Ready control-plane 79s v1.27.2 192.168.39.43 \u003cnone\u003e Buildroot 2021.02.12 5.10.57 containerd://1.7.1\n"} +{"Time":"2023-05-31T19:41:16.269421856Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269425611Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE SELECTOR\n"} +{"Time":"2023-05-31T19:41:16.269429611Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default service/kubernetes ClusterIP 10.96.0.1 \u003cnone\u003e 443/TCP 78s \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269434067Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default service/netcat ClusterIP 10.103.29.180 \u003cnone\u003e 8080/TCP 19s app=netcat\n"} +{"Time":"2023-05-31T19:41:16.269437511Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system service/kube-dns ClusterIP 10.96.0.10 \u003cnone\u003e 53/UDP,53/TCP,9153/TCP 76s k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:41:16.269441757Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269445871Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME ENDPOINTS AGE\n"} +{"Time":"2023-05-31T19:41:16.269449528Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default endpoints/kubernetes 192.168.39.43:8443 78s\n"} +{"Time":"2023-05-31T19:41:16.26945325Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default endpoints/netcat 10.244.0.4:8080 19s\n"} +{"Time":"2023-05-31T19:41:16.269457199Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system endpoints/k8s.io-minikube-hostpath \u003cnone\u003e 60s\n"} +{"Time":"2023-05-31T19:41:16.269461588Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system endpoints/kube-dns 10.244.0.2:53,10.244.0.2:53,10.244.0.2:9153 64s\n"} +{"Time":"2023-05-31T19:41:16.269465537Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269468906Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME DESIRED CURRENT READY UP-TO-DATE AVAILABLE NODE SELECTOR AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:41:16.269472732Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system daemonset.apps/kube-proxy 1 1 1 1 1 kubernetes.io/os=linux 76s kube-proxy registry.k8s.io/kube-proxy:v1.27.2 k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.26947694Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269480678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME READY UP-TO-DATE AVAILABLE AGE CONTAINERS IMAGES SELECTOR\n"} +{"Time":"2023-05-31T19:41:16.269486424Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default deployment.apps/netcat 1/1 1 1 19s dnsutils registry.k8s.io/e2e-test-images/agnhost:2.40 app=netcat\n"} +{"Time":"2023-05-31T19:41:16.26949074Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system deployment.apps/coredns 1/1 1 1 76s coredns registry.k8s.io/coredns/coredns:v1.10.1 k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:41:16.269496515Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.26950165Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NAMESPACE NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES\n"} +{"Time":"2023-05-31T19:41:16.269505684Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default pod/netcat-7458db8b8-pffgl 1/1 Running 0 19s 10.244.0.4 enable-default-cni-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269510117Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/coredns-5d78c9869d-x4l4s 1/1 Running 0 62s 10.244.0.2 enable-default-cni-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269515225Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/etcd-enable-default-cni-509041 1/1 Running 0 76s 192.168.39.43 enable-default-cni-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269519984Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/kube-apiserver-enable-default-cni-509041 1/1 Running 0 76s 192.168.39.43 enable-default-cni-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269525097Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/kube-controller-manager-enable-default-cni-509041 1/1 Running 0 76s 192.168.39.43 enable-default-cni-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269534533Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/kube-proxy-nhbhc 1/1 Running 0 63s 192.168.39.43 enable-default-cni-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269540182Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/kube-scheduler-enable-default-cni-509041 1/1 Running 0 76s 192.168.39.43 enable-default-cni-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.26954561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-system pod/storage-provisioner 1/1 Running 0 60s 192.168.39.43 enable-default-cni-509041 \u003cnone\u003e \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269550102Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269554032Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.26956Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T19:41:16.26956475Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" POD ID CREATED STATE NAME NAMESPACE ATTEMPT RUNTIME\r\n"} +{"Time":"2023-05-31T19:41:16.269569959Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1f0cf3e0bc8d9 18 seconds ago Ready netcat-7458db8b8-pffgl default 0 (default)\r\n"} +{"Time":"2023-05-31T19:41:16.269574645Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" b714f669adb51 59 seconds ago Ready storage-provisioner kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:41:16.269579299Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" f2e48c35a5699 About a minute ago Ready coredns-5d78c9869d-x4l4s kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:41:16.269583846Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a80aea2aa3ca8 About a minute ago Ready kube-proxy-nhbhc kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:41:16.269588553Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0ef3fa6269014 About a minute ago Ready kube-controller-manager-enable-default-cni-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:41:16.269592829Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ec6602f25a60b About a minute ago Ready kube-scheduler-enable-default-cni-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:41:16.269597352Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 2ed36dcaa61b9 About a minute ago Ready etcd-enable-default-cni-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:41:16.26960253Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a682f88d274c2 About a minute ago Ready kube-apiserver-enable-default-cni-509041 kube-system 0 (default)\r\n"} +{"Time":"2023-05-31T19:41:16.269606936Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269611243Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269615366Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T19:41:16.269620152Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\r\n"} +{"Time":"2023-05-31T19:41:16.26962527Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 2c312f70c3822 28081458d86cc 15 seconds ago Running dnsutils 0 1f0cf3e0bc8d9\r\n"} +{"Time":"2023-05-31T19:41:16.269629915Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 16fbf8c7b3823 6e38f40d628db 58 seconds ago Running storage-provisioner 0 b714f669adb51\r\n"} +{"Time":"2023-05-31T19:41:16.269635224Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0d9aecccf70ed ead0a4a53df89 About a minute ago Running coredns 0 f2e48c35a5699\r\n"} +{"Time":"2023-05-31T19:41:16.26963982Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0256c9d774cd7 b8aa50768fd67 About a minute ago Running kube-proxy 0 a80aea2aa3ca8\r\n"} +{"Time":"2023-05-31T19:41:16.269647297Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0c2884f28815d 86b6af7dd652c About a minute ago Running etcd 0 2ed36dcaa61b9\r\n"} +{"Time":"2023-05-31T19:41:16.269651651Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 09127400cc20a ac2b7465ebba9 About a minute ago Running kube-controller-manager 0 0ef3fa6269014\r\n"} +{"Time":"2023-05-31T19:41:16.26965608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 5208afb9b0099 89e70da428d29 About a minute ago Running kube-scheduler 0 ec6602f25a60b\r\n"} +{"Time":"2023-05-31T19:41:16.269660428Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" d5085323fdc55 c5b13e4f7806d About a minute ago Running kube-apiserver 0 a682f88d274c2\r\n"} +{"Time":"2023-05-31T19:41:16.269664309Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269667878Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269672998Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T19:41:16.269676828Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: netcat\n"} +{"Time":"2023-05-31T19:41:16.269680438Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:41:16.269683273Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CreationTimestamp: Wed, 31 May 2023 19:40:49 +0000\n"} +{"Time":"2023-05-31T19:41:16.26968575Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:41:16.26968821Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:41:16.269690757Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Selector: app=netcat\n"} +{"Time":"2023-05-31T19:41:16.26969311Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:41:16.269695527Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:41:16.269697875Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:41:16.269700867Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RollingUpdateStrategy: 25% max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:41:16.269703879Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:41:16.269706331Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:41:16.26970868Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T19:41:16.269711387Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:41:16.269713786Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:41:16.26971639Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269718947Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269721382Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T19:41:16.269723778Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:41:16.269726011Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -c\n"} +{"Time":"2023-05-31T19:41:16.269728304Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:41:16.269730819Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269734466Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269738066Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269741659Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:41:16.269745476Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:41:16.269749207Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:41:16.269755317Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:41:16.269759549Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:41:16.269763845Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269767739Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NewReplicaSet: netcat-7458db8b8 (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:41:16.269771481Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T19:41:16.269776098Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:41:16.269780677Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:41:16.269786693Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal ScalingReplicaSet 20s deployment-controller Scaled up replica set netcat-7458db8b8 to 1\n"} +{"Time":"2023-05-31T19:41:16.269790838Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.269794511Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.26979814Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T19:41:16.269802013Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: netcat-7458db8b8-pffgl\n"} +{"Time":"2023-05-31T19:41:16.269806008Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: default\n"} +{"Time":"2023-05-31T19:41:16.269809908Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority: 0\n"} +{"Time":"2023-05-31T19:41:16.269813699Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: default\n"} +{"Time":"2023-05-31T19:41:16.269818341Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node: enable-default-cni-509041/192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.269822813Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Start Time: Wed, 31 May 2023 19:40:49 +0000\n"} +{"Time":"2023-05-31T19:41:16.269827551Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: app=netcat\n"} +{"Time":"2023-05-31T19:41:16.269832571Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod-template-hash=7458db8b8\n"} +{"Time":"2023-05-31T19:41:16.269837751Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269841821Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:41:16.269846569Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T19:41:16.269851598Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IPs:\n"} +{"Time":"2023-05-31T19:41:16.269855543Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 10.244.0.4\n"} +{"Time":"2023-05-31T19:41:16.269859935Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Controlled By: ReplicaSet/netcat-7458db8b8\n"} +{"Time":"2023-05-31T19:41:16.269863401Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T19:41:16.269867798Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dnsutils:\n"} +{"Time":"2023-05-31T19:41:16.269872258Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Container ID: containerd://2c312f70c3822226ef8700bd40fa38cc083e2d12beb35786059ddc0595a7b636\n"} +{"Time":"2023-05-31T19:41:16.269876415Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/e2e-test-images/agnhost:2.40\n"} +{"Time":"2023-05-31T19:41:16.269881309Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image ID: registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\n"} +{"Time":"2023-05-31T19:41:16.269887754Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269891804Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269896495Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T19:41:16.269900615Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /bin/sh\n"} +{"Time":"2023-05-31T19:41:16.269905097Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -c\n"} +{"Time":"2023-05-31T19:41:16.269909867Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" while true; do echo hello | nc -l -p 8080; done\n"} +{"Time":"2023-05-31T19:41:16.269913852Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" State: Running\n"} +{"Time":"2023-05-31T19:41:16.269918469Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Started: Wed, 31 May 2023 19:40:53 +0000\n"} +{"Time":"2023-05-31T19:41:16.2699234Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:41:16.269927529Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:41:16.269932549Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.269936964Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:41:16.269941311Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-xzksq (ro)\n"} +{"Time":"2023-05-31T19:41:16.269945661Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:41:16.269949743Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status\n"} +{"Time":"2023-05-31T19:41:16.269953839Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:41:16.26997199Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready True \n"} +{"Time":"2023-05-31T19:41:16.269976281Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:41:16.269980915Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:41:16.269985Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:41:16.269988894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-api-access-xzksq:\n"} +{"Time":"2023-05-31T19:41:16.269993032Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:41:16.269997284Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:41:16.270001076Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:41:16.270007442Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:41:16.27001196Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:41:16.270015958Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:41:16.270020319Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270024488Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:41:16.270029255Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:41:16.27003392Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T19:41:16.27003853Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:41:16.27004311Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:41:16.270047085Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Scheduled 20s default-scheduler Successfully assigned default/netcat-7458db8b8-pffgl to enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.270051578Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulling 19s kubelet Pulling image \"registry.k8s.io/e2e-test-images/agnhost:2.40\"\n"} +{"Time":"2023-05-31T19:41:16.270056138Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulled 17s kubelet Successfully pulled image \"registry.k8s.io/e2e-test-images/agnhost:2.40\" in 2.735392434s (2.73540648s including waiting)\n"} +{"Time":"2023-05-31T19:41:16.270060304Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Created 16s kubelet Created container dnsutils\n"} +{"Time":"2023-05-31T19:41:16.270064255Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Started 16s kubelet Started container dnsutils\n"} +{"Time":"2023-05-31T19:41:16.270068721Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270072514Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270076431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T19:41:16.270080825Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270084897Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270089245Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T19:41:16.270093256Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:41:16.270105887Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.27010996Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CreationTimestamp: Wed, 31 May 2023 19:39:52 +0000\n"} +{"Time":"2023-05-31T19:41:16.270115839Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:41:16.270120272Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: deployment.kubernetes.io/revision: 1\n"} +{"Time":"2023-05-31T19:41:16.270124507Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Selector: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:41:16.270128432Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable\n"} +{"Time":"2023-05-31T19:41:16.270132446Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StrategyType: RollingUpdate\n"} +{"Time":"2023-05-31T19:41:16.270136086Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MinReadySeconds: 0\n"} +{"Time":"2023-05-31T19:41:16.270139836Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RollingUpdateStrategy: 1 max unavailable, 25% max surge\n"} +{"Time":"2023-05-31T19:41:16.270144069Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:41:16.270147689Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:41:16.270151694Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:41:16.270155325Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T19:41:16.270161399Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" coredns:\n"} +{"Time":"2023-05-31T19:41:16.2701654Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:41:16.270169042Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:41:16.270172914Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:41:16.270179039Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Args:\n"} +{"Time":"2023-05-31T19:41:16.270182862Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -conf\n"} +{"Time":"2023-05-31T19:41:16.270186695Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:41:16.270190324Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Limits:\n"} +{"Time":"2023-05-31T19:41:16.270194181Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:41:16.270197473Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requests:\n"} +{"Time":"2023-05-31T19:41:16.270200757Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:41:16.270205776Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:41:16.270209336Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:41:16.270212993Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:41:16.270218004Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270221711Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:41:16.270225002Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:41:16.270228534Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:41:16.270231854Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:41:16.270235038Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:41:16.270238389Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:41:16.270241671Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:41:16.270244998Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:41:16.270248399Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:41:16.270251584Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status Reason\n"} +{"Time":"2023-05-31T19:41:16.270254697Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ------\n"} +{"Time":"2023-05-31T19:41:16.270257583Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Available True MinimumReplicasAvailable\n"} +{"Time":"2023-05-31T19:41:16.270260085Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Progressing True NewReplicaSetAvailable\n"} +{"Time":"2023-05-31T19:41:16.270262159Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OldReplicaSets: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270264194Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NewReplicaSet: coredns-5d78c9869d (1/1 replicas created)\n"} +{"Time":"2023-05-31T19:41:16.27026641Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T19:41:16.270268412Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:41:16.270270754Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:41:16.270272778Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal ScalingReplicaSet 64s deployment-controller Scaled up replica set coredns-5d78c9869d to 2\n"} +{"Time":"2023-05-31T19:41:16.27027572Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal ScalingReplicaSet 63s deployment-controller Scaled down replica set coredns-5d78c9869d to 1 from 2\n"} +{"Time":"2023-05-31T19:41:16.270277865Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270279786Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270286464Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T19:41:16.270288827Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: coredns-5d78c9869d-x4l4s\n"} +{"Time":"2023-05-31T19:41:16.27029089Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.270292934Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority: 2000000000\n"} +{"Time":"2023-05-31T19:41:16.270294943Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-cluster-critical\n"} +{"Time":"2023-05-31T19:41:16.270298348Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: coredns\n"} +{"Time":"2023-05-31T19:41:16.270300512Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node: enable-default-cni-509041/192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.270302634Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Start Time: Wed, 31 May 2023 19:40:06 +0000\n"} +{"Time":"2023-05-31T19:41:16.270304778Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-dns\n"} +{"Time":"2023-05-31T19:41:16.270306853Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod-template-hash=5d78c9869d\n"} +{"Time":"2023-05-31T19:41:16.270308902Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270311677Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:41:16.270313579Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:41:16.270315435Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IPs:\n"} +{"Time":"2023-05-31T19:41:16.270317463Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 10.244.0.2\n"} +{"Time":"2023-05-31T19:41:16.270319573Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Controlled By: ReplicaSet/coredns-5d78c9869d\n"} +{"Time":"2023-05-31T19:41:16.270321532Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T19:41:16.270323762Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" coredns:\n"} +{"Time":"2023-05-31T19:41:16.270334595Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Container ID: containerd://0d9aecccf70ed3b568c2b23e67d4424fdce3e59fd3190bb3ac686653cbcedcb4\n"} +{"Time":"2023-05-31T19:41:16.27033689Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T19:41:16.270339124Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image ID: registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e\n"} +{"Time":"2023-05-31T19:41:16.270342524Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ports: 53/UDP, 53/TCP, 9153/TCP\n"} +{"Time":"2023-05-31T19:41:16.270344519Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Ports: 0/UDP, 0/TCP, 0/TCP\n"} +{"Time":"2023-05-31T19:41:16.270346517Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Args:\n"} +{"Time":"2023-05-31T19:41:16.270348588Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -conf\n"} +{"Time":"2023-05-31T19:41:16.2703507Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/coredns/Corefile\n"} +{"Time":"2023-05-31T19:41:16.270353015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" State: Running\n"} +{"Time":"2023-05-31T19:41:16.270355031Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Started: Wed, 31 May 2023 19:40:08 +0000\n"} +{"Time":"2023-05-31T19:41:16.270357186Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:41:16.270359321Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:41:16.270361236Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Limits:\n"} +{"Time":"2023-05-31T19:41:16.270363282Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memory: 170Mi\n"} +{"Time":"2023-05-31T19:41:16.270365346Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requests:\n"} +{"Time":"2023-05-31T19:41:16.270367505Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpu: 100m\n"} +{"Time":"2023-05-31T19:41:16.270369837Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memory: 70Mi\n"} +{"Time":"2023-05-31T19:41:16.270372158Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Liveness: http-get http://:8080/health delay=60s timeout=5s period=10s #success=1 #failure=5\n"} +{"Time":"2023-05-31T19:41:16.270374287Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Readiness: http-get http://:8181/ready delay=0s timeout=1s period=10s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:41:16.270376312Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270378198Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:41:16.270380139Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/coredns from config-volume (ro)\n"} +{"Time":"2023-05-31T19:41:16.270382408Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-grmh4 (ro)\n"} +{"Time":"2023-05-31T19:41:16.270384561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:41:16.270386541Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status\n"} +{"Time":"2023-05-31T19:41:16.270389811Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:41:16.270391907Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready True \n"} +{"Time":"2023-05-31T19:41:16.270393932Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:41:16.270395808Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:41:16.270397816Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:41:16.270399678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config-volume:\n"} +{"Time":"2023-05-31T19:41:16.270401714Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:41:16.270403679Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: coredns\n"} +{"Time":"2023-05-31T19:41:16.270405549Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:41:16.270407426Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-api-access-grmh4:\n"} +{"Time":"2023-05-31T19:41:16.270409433Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:41:16.270411441Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:41:16.270413469Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:41:16.270415488Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:41:16.270417618Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:41:16.270419615Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:41:16.270421558Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:41:16.270423592Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tolerations: CriticalAddonsOnly op=Exists\n"} +{"Time":"2023-05-31T19:41:16.270425629Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node-role.kubernetes.io/control-plane:NoSchedule\n"} +{"Time":"2023-05-31T19:41:16.270427814Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:41:16.270430353Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T19:41:16.270432545Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T19:41:16.270434562Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:41:16.270437628Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:41:16.270439827Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Scheduled 63s default-scheduler Successfully assigned kube-system/coredns-5d78c9869d-x4l4s to enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.270442145Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulled 61s kubelet Container image \"registry.k8s.io/coredns/coredns:v1.10.1\" already present on machine\n"} +{"Time":"2023-05-31T19:41:16.270444461Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Created 61s kubelet Created container coredns\n"} +{"Time":"2023-05-31T19:41:16.270446804Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Started 61s kubelet Started container coredns\n"} +{"Time":"2023-05-31T19:41:16.270449051Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Warning Unhealthy 61s kubelet Readiness probe failed: Get \"http://10.244.0.2:8181/ready\": dial tcp 10.244.0.2:8181: connect: connection refused\n"} +{"Time":"2023-05-31T19:41:16.270451497Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Warning Unhealthy 32s (x4 over 60s) kubelet Readiness probe failed: HTTP probe failed with statuscode: 503\n"} +{"Time":"2023-05-31T19:41:16.270453825Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270455601Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.27045836Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T19:41:16.270460716Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.270462666Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:41:16.270465062Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.270467867Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.270470184Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.270472287Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.270474362Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.270476415Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.270478451Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.270480657Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T19:41:16.27048277Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [WARNING] plugin/kubernetes: starting server with unsynced Kubernetes API\n"} +{"Time":"2023-05-31T19:41:16.270484752Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" .:53\n"} +{"Time":"2023-05-31T19:41:16.270486883Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/reload: Running configuration SHA512 = 591cf328cccc12bc490481273e738df59329c62c0b729d94e8b61db9961c2fa5f046dd37f1cf888b953814040d180f52594972691cd6ff41be96639138a43908\n"} +{"Time":"2023-05-31T19:41:16.270489107Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CoreDNS-1.10.1\n"} +{"Time":"2023-05-31T19:41:16.270491045Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" linux/amd64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T19:41:16.27049307Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:41:16.270495115Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:41:16.270497098Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T19:41:16.270499185Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [WARNING] plugin/kubernetes: Kubernetes API connection failure: Get \"https://10.96.0.1:443/version\": dial tcp 10.96.0.1:443: i/o timeout\n"} +{"Time":"2023-05-31T19:41:16.270501327Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] Reloading\n"} +{"Time":"2023-05-31T19:41:16.27050398Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] plugin/reload: Running configuration SHA512 = 6c8bd46af3d98e03c4ae8e438c65dd0c69a5f817565481bcf1725dd66ff794963b7938c81e3a23d4c2ad9e52f818076e819219c79e8007dd90564767ed68ba4c\n"} +{"Time":"2023-05-31T19:41:16.27050614Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] Reloading complete\n"} +{"Time":"2023-05-31T19:41:16.27050821Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:50657 - 9371 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.00034184s\n"} +{"Time":"2023-05-31T19:41:16.270512278Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:60067 - 50210 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000120007s\n"} +{"Time":"2023-05-31T19:41:16.270514893Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:56939 - 34181 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000149116s\n"} +{"Time":"2023-05-31T19:41:16.270517045Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:44655 - 6645 \"A IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 98 0.000174166s\n"} +{"Time":"2023-05-31T19:41:16.270519177Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:44655 - 6976 \"AAAA IN netcat.default.svc.cluster.local. udp 50 false 512\" NOERROR qr,aa,rd 143 0.000132013s\n"} +{"Time":"2023-05-31T19:41:16.270522561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:50721 - 21056 \"A IN kubernetes.default.default.svc.cluster.local. udp 62 false 512\" NXDOMAIN qr,aa,rd 155 0.000165223s\n"} +{"Time":"2023-05-31T19:41:16.270524827Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:59128 - 48386 \"A IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 106 0.000212542s\n"} +{"Time":"2023-05-31T19:41:16.270527074Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [INFO] 10.244.0.4:51348 - 5929 \"AAAA IN kubernetes.default.svc.cluster.local. udp 54 false 512\" NOERROR qr,aa,rd 147 0.000358572s\n"} +{"Time":"2023-05-31T19:41:16.270529082Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270530975Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270532837Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T19:41:16.270534872Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-apiserver-enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.270537491Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.270539577Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:41:16.270541592Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:41:16.270544162Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node: enable-default-cni-509041/192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.270546136Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Start Time: Wed, 31 May 2023 19:39:52 +0000\n"} +{"Time":"2023-05-31T19:41:16.270548138Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: component=kube-apiserver\n"} +{"Time":"2023-05-31T19:41:16.270550157Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tier=control-plane\n"} +{"Time":"2023-05-31T19:41:16.270552249Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: kubeadm.kubernetes.io/kube-apiserver.advertise-address.endpoint: 192.168.39.43:8443\n"} +{"Time":"2023-05-31T19:41:16.270554368Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/config.hash: 213c4720b0499fe086c468097563a9b0\n"} +{"Time":"2023-05-31T19:41:16.270556453Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/config.mirror: 213c4720b0499fe086c468097563a9b0\n"} +{"Time":"2023-05-31T19:41:16.270558551Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/config.seen: 2023-05-31T19:39:52.459032132Z\n"} +{"Time":"2023-05-31T19:41:16.270560674Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/config.source: file\n"} +{"Time":"2023-05-31T19:41:16.270562631Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:41:16.270565429Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" SeccompProfile: RuntimeDefault\n"} +{"Time":"2023-05-31T19:41:16.270567424Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.270569254Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IPs:\n"} +{"Time":"2023-05-31T19:41:16.270571152Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.270573166Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Controlled By: Node/enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.270575053Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T19:41:16.270576937Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver:\n"} +{"Time":"2023-05-31T19:41:16.270579372Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Container ID: containerd://d5085323fdc5541435cee49350b0b2a51110c8b8cb68d19d5512e0248bfb193f\n"} +{"Time":"2023-05-31T19:41:16.270581531Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T19:41:16.270583657Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image ID: registry.k8s.io/kube-apiserver@sha256:94e48585629fde3c1d06c6ae8f62885d3052f12a1072ffd97611296525eff5b9\n"} +{"Time":"2023-05-31T19:41:16.270585961Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270587976Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270590058Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T19:41:16.270591991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver\n"} +{"Time":"2023-05-31T19:41:16.270594013Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --advertise-address=192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.270595989Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --allow-privileged=true\n"} +{"Time":"2023-05-31T19:41:16.270597918Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --authorization-mode=Node,RBAC\n"} +{"Time":"2023-05-31T19:41:16.270599868Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --client-ca-file=/var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:41:16.270602299Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:41:16.270604558Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --enable-bootstrap-token-auth=true\n"} +{"Time":"2023-05-31T19:41:16.270606573Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt\n"} +{"Time":"2023-05-31T19:41:16.270608638Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt\n"} +{"Time":"2023-05-31T19:41:16.270611958Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key\n"} +{"Time":"2023-05-31T19:41:16.270614023Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --etcd-servers=https://127.0.0.1:2379\n"} +{"Time":"2023-05-31T19:41:16.270616113Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt\n"} +{"Time":"2023-05-31T19:41:16.270618312Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key\n"} +{"Time":"2023-05-31T19:41:16.270620293Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname\n"} +{"Time":"2023-05-31T19:41:16.270622347Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt\n"} +{"Time":"2023-05-31T19:41:16.270624404Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key\n"} +{"Time":"2023-05-31T19:41:16.270627435Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-allowed-names=front-proxy-client\n"} +{"Time":"2023-05-31T19:41:16.270629538Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T19:41:16.270631558Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-extra-headers-prefix=X-Remote-Extra-\n"} +{"Time":"2023-05-31T19:41:16.27063372Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-group-headers=X-Remote-Group\n"} +{"Time":"2023-05-31T19:41:16.270635687Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --requestheader-username-headers=X-Remote-User\n"} +{"Time":"2023-05-31T19:41:16.270637574Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --secure-port=8443\n"} +{"Time":"2023-05-31T19:41:16.270639511Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --service-account-issuer=https://kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T19:41:16.270641507Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --service-account-key-file=/var/lib/minikube/certs/sa.pub\n"} +{"Time":"2023-05-31T19:41:16.270643503Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --service-account-signing-key-file=/var/lib/minikube/certs/sa.key\n"} +{"Time":"2023-05-31T19:41:16.27064561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --service-cluster-ip-range=10.96.0.0/12\n"} +{"Time":"2023-05-31T19:41:16.27064758Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --tls-cert-file=/var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T19:41:16.270649615Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --tls-private-key-file=/var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T19:41:16.270651534Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" State: Running\n"} +{"Time":"2023-05-31T19:41:16.270653567Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Started: Wed, 31 May 2023 19:39:45 +0000\n"} +{"Time":"2023-05-31T19:41:16.270655527Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:41:16.270657454Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:41:16.27065937Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requests:\n"} +{"Time":"2023-05-31T19:41:16.27066139Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpu: 250m\n"} +{"Time":"2023-05-31T19:41:16.270663405Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Liveness: http-get https://192.168.39.43:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=8\n"} +{"Time":"2023-05-31T19:41:16.270665628Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Readiness: http-get https://192.168.39.43:8443/readyz delay=0s timeout=15s period=1s #success=1 #failure=3\n"} +{"Time":"2023-05-31T19:41:16.270667841Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Startup: http-get https://192.168.39.43:8443/livez delay=10s timeout=15s period=10s #success=1 #failure=24\n"} +{"Time":"2023-05-31T19:41:16.270670135Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270672048Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:41:16.27067398Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/ssl/certs from ca-certs (ro)\n"} +{"Time":"2023-05-31T19:41:16.270675968Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /usr/share/ca-certificates from usr-share-ca-certificates (ro)\n"} +{"Time":"2023-05-31T19:41:16.270678049Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/lib/minikube/certs from k8s-certs (ro)\n"} +{"Time":"2023-05-31T19:41:16.270679965Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:41:16.270681852Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status\n"} +{"Time":"2023-05-31T19:41:16.270683846Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:41:16.270687584Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready True \n"} +{"Time":"2023-05-31T19:41:16.270689499Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:41:16.270691397Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:41:16.270693948Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:41:16.270695885Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca-certs:\n"} +{"Time":"2023-05-31T19:41:16.27069784Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:41:16.270699785Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /etc/ssl/certs\n"} +{"Time":"2023-05-31T19:41:16.270832853Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:41:16.270859771Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" k8s-certs:\n"} +{"Time":"2023-05-31T19:41:16.270864675Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:41:16.270868498Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:41:16.270872595Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:41:16.270876371Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" usr-share-ca-certificates:\n"} +{"Time":"2023-05-31T19:41:16.270881702Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:41:16.270885225Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /usr/share/ca-certificates\n"} +{"Time":"2023-05-31T19:41:16.270888708Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: DirectoryOrCreate\n"} +{"Time":"2023-05-31T19:41:16.270892133Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QoS Class: Burstable\n"} +{"Time":"2023-05-31T19:41:16.270895532Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270899214Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tolerations: :NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:41:16.270902894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.270906619Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270910077Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.270913427Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T19:41:16.270917128Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:45.784513 1 server.go:551] external host was not specified, using 192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.270921076Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:45.786637 1 server.go:165] Version: v1.27.2\n"} +{"Time":"2023-05-31T19:41:16.270924663Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:45.786697 1 server.go:167] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:41:16.270929125Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:46.321392 1 shared_informer.go:311] Waiting for caches to sync for node_authorizer\n"} +{"Time":"2023-05-31T19:41:16.27093365Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:46.339846 1 plugins.go:158] Loaded 12 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,LimitRanger,ServiceAccount,NodeRestriction,TaintNodesByCondition,Priority,DefaultTolerationSeconds,DefaultStorageClass,StorageObjectInUseProtection,RuntimeClass,DefaultIngressClass,MutatingAdmissionWebhook.\n"} +{"Time":"2023-05-31T19:41:16.271081215Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:46.340411 1 plugins.go:161] Loaded 13 validating admission controller(s) successfully in the following order: LimitRanger,ServiceAccount,PodSecurity,Priority,PersistentVolumeClaimResize,RuntimeClass,CertificateApproval,CertificateSigning,ClusterTrustBundleAttest,CertificateSubjectRestriction,ValidatingAdmissionPolicy,ValidatingAdmissionWebhook,ResourceQuota.\n"} +{"Time":"2023-05-31T19:41:16.271088265Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:46.344826 1 logging.go:59] [core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {\n"} +{"Time":"2023-05-31T19:41:16.271093067Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"Addr\": \"127.0.0.1:2379\",\n"} +{"Time":"2023-05-31T19:41:16.271096202Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ServerName\": \"127.0.0.1\",\n"} +{"Time":"2023-05-31T19:41:16.27109934Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"Attributes\": null,\n"} +{"Time":"2023-05-31T19:41:16.271102802Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"BalancerAttributes\": null,\n"} +{"Time":"2023-05-31T19:41:16.271105807Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"Type\": 0,\n"} +{"Time":"2023-05-31T19:41:16.271108965Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"Metadata\": null\n"} +{"Time":"2023-05-31T19:41:16.271112332Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }. Err: connection error: desc = \"transport: Error while dialing dial tcp 127.0.0.1:2379: connect: connection refused\"\n"} +{"Time":"2023-05-31T19:41:16.271115949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:47.581961 1 handler.go:232] Adding GroupVersion apiextensions.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271119345Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:47.588821 1 genericapiserver.go:752] Skipping API apiextensions.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.2711234Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:47.593342 1 instance.go:282] Using reconciler: lease\n"} +{"Time":"2023-05-31T19:41:16.271127425Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:47.805084 1 handler.go:232] Adding GroupVersion v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271131397Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:47.806124 1 instance.go:651] API group \"internal.apiserver.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:41:16.271145722Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.191713 1 instance.go:651] API group \"resource.k8s.io\" is not enabled, skipping.\n"} +{"Time":"2023-05-31T19:41:16.271150172Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.203289 1 handler.go:232] Adding GroupVersion authentication.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271392511Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.203331 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271402455Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.203337 1 genericapiserver.go:752] Skipping API authentication.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271406983Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.205636 1 handler.go:232] Adding GroupVersion authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271411983Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.205688 1 genericapiserver.go:752] Skipping API authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.27141607Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.208160 1 handler.go:232] Adding GroupVersion autoscaling v2 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271420145Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.209082 1 handler.go:232] Adding GroupVersion autoscaling v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271446485Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.209133 1 genericapiserver.go:752] Skipping API autoscaling/v2beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271451063Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.209140 1 genericapiserver.go:752] Skipping API autoscaling/v2beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.27145513Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.212176 1 handler.go:232] Adding GroupVersion batch v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271459557Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.212279 1 genericapiserver.go:752] Skipping API batch/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271463738Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.214720 1 handler.go:232] Adding GroupVersion certificates.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271467592Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.214769 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271472217Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.214783 1 genericapiserver.go:752] Skipping API certificates.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271476437Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.225082 1 handler.go:232] Adding GroupVersion coordination.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271480704Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.225121 1 genericapiserver.go:752] Skipping API coordination.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271484732Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.230951 1 genericapiserver.go:752] Skipping API discovery.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271644995Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.240501 1 handler.go:232] Adding GroupVersion discovery.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271652413Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.249046 1 handler.go:232] Adding GroupVersion networking.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271656782Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.249092 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.27166787Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.249098 1 genericapiserver.go:752] Skipping API networking.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271672095Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.251375 1 handler.go:232] Adding GroupVersion node.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271676268Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.251416 1 genericapiserver.go:752] Skipping API node.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271680583Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.251422 1 genericapiserver.go:752] Skipping API node.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271684674Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.253994 1 handler.go:232] Adding GroupVersion policy v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271689042Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.254039 1 genericapiserver.go:752] Skipping API policy/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271693287Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.257341 1 handler.go:232] Adding GroupVersion rbac.authorization.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271697387Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.257386 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271701777Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.257396 1 genericapiserver.go:752] Skipping API rbac.authorization.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271706012Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.259646 1 handler.go:232] Adding GroupVersion scheduling.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271709977Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.259703 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271714249Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.259713 1 genericapiserver.go:752] Skipping API scheduling.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271718422Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.263350 1 handler.go:232] Adding GroupVersion storage.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271886298Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.263400 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271889952Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.263410 1 genericapiserver.go:752] Skipping API storage.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271896824Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.266348 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta3 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.27189927Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.267658 1 handler.go:232] Adding GroupVersion flowcontrol.apiserver.k8s.io v1beta2 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271901579Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.267712 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271904082Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.267722 1 genericapiserver.go:752] Skipping API flowcontrol.apiserver.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271906879Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.273410 1 handler.go:232] Adding GroupVersion apps v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271909285Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.273464 1 genericapiserver.go:752] Skipping API apps/v1beta2 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271911495Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.273474 1 genericapiserver.go:752] Skipping API apps/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271913956Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.276465 1 handler.go:232] Adding GroupVersion admissionregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271916189Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.276515 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271918408Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.276522 1 genericapiserver.go:752] Skipping API admissionregistration.k8s.io/v1alpha1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271920614Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.278885 1 handler.go:232] Adding GroupVersion events.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271922881Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.278936 1 genericapiserver.go:752] Skipping API events.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.271925086Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:48.298567 1 handler.go:232] Adding GroupVersion apiregistration.k8s.io v1 to ResourceManager\n"} +{"Time":"2023-05-31T19:41:16.271927274Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:48.298993 1 genericapiserver.go:752] Skipping API apiregistration.k8s.io/v1beta1 because it has no resources.\n"} +{"Time":"2023-05-31T19:41:16.272121864Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.040772 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:41:16.272128703Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.041330 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:41:16.272132836Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.041846 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"serving-cert::/var/lib/minikube/certs/apiserver.crt::/var/lib/minikube/certs/apiserver.key\"\n"} +{"Time":"2023-05-31T19:41:16.272139524Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.042353 1 secure_serving.go:210] Serving securely on [::]:8443\n"} +{"Time":"2023-05-31T19:41:16.272143351Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.042537 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T19:41:16.272147097Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.042850 1 apiservice_controller.go:97] Starting APIServiceRegistrationController\n"} +{"Time":"2023-05-31T19:41:16.272150768Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.042885 1 cache.go:32] Waiting for caches to sync for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:41:16.27215457Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.043005 1 available_controller.go:423] Starting AvailableConditionController\n"} +{"Time":"2023-05-31T19:41:16.27215822Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.043115 1 cache.go:32] Waiting for caches to sync for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:41:16.272161561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.043133 1 apf_controller.go:361] Starting API Priority and Fairness config controller\n"} +{"Time":"2023-05-31T19:41:16.272167291Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.043853 1 cluster_authentication_trust_controller.go:440] Starting cluster_authentication_trust_controller controller\n"} +{"Time":"2023-05-31T19:41:16.272169884Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.043888 1 shared_informer.go:311] Waiting for caches to sync for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:41:16.272172336Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.044200 1 customresource_discovery_controller.go:289] Starting DiscoveryController\n"} +{"Time":"2023-05-31T19:41:16.272175971Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.044923 1 controller.go:83] Starting OpenAPI AggregationController\n"} +{"Time":"2023-05-31T19:41:16.272179701Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.044985 1 handler_discovery.go:392] Starting ResourceDiscoveryManager\n"} +{"Time":"2023-05-31T19:41:16.272183417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.045445 1 controller.go:121] Starting legacy_token_tracking_controller\n"} +{"Time":"2023-05-31T19:41:16.272363716Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.045480 1 shared_informer.go:311] Waiting for caches to sync for configmaps\n"} +{"Time":"2023-05-31T19:41:16.272369413Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.045863 1 autoregister_controller.go:141] Starting autoregister controller\n"} +{"Time":"2023-05-31T19:41:16.272373028Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.045902 1 cache.go:32] Waiting for caches to sync for autoregister controller\n"} +{"Time":"2023-05-31T19:41:16.272377138Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.046015 1 controller.go:80] Starting OpenAPI V3 AggregationController\n"} +{"Time":"2023-05-31T19:41:16.272380933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.046132 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\n"} +{"Time":"2023-05-31T19:41:16.272386682Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.046398 1 dynamic_cafile_content.go:157] \"Starting controller\" name=\"request-header::/var/lib/minikube/certs/front-proxy-ca.crt\"\n"} +{"Time":"2023-05-31T19:41:16.272391091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.046783 1 system_namespaces_controller.go:67] Starting system namespaces controller\n"} +{"Time":"2023-05-31T19:41:16.272395646Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.047022 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:41:16.27239953Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.047317 1 gc_controller.go:78] Starting apiserver lease garbage collector\n"} +{"Time":"2023-05-31T19:41:16.272403373Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.047732 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"aggregator-proxy-cert::/var/lib/minikube/certs/front-proxy-client.crt::/var/lib/minikube/certs/front-proxy-client.key\"\n"} +{"Time":"2023-05-31T19:41:16.272407636Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.052751 1 controller.go:85] Starting OpenAPI controller\n"} +{"Time":"2023-05-31T19:41:16.27241164Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.052814 1 controller.go:85] Starting OpenAPI V3 controller\n"} +{"Time":"2023-05-31T19:41:16.272415228Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.052827 1 naming_controller.go:291] Starting NamingConditionController\n"} +{"Time":"2023-05-31T19:41:16.272418837Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.052838 1 establishing_controller.go:76] Starting EstablishingController\n"} +{"Time":"2023-05-31T19:41:16.272422388Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.052852 1 nonstructuralschema_controller.go:192] Starting NonStructuralSchemaConditionController\n"} +{"Time":"2023-05-31T19:41:16.27242606Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.052861 1 apiapproval_controller.go:186] Starting KubernetesAPIApprovalPolicyConformantConditionController\n"} +{"Time":"2023-05-31T19:41:16.276789544Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.052872 1 crd_finalizer.go:266] Starting CRDFinalizer\n"} +{"Time":"2023-05-31T19:41:16.276802984Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.068651 1 crdregistration_controller.go:111] Starting crd-autoregister controller\n"} +{"Time":"2023-05-31T19:41:16.276807882Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.068695 1 shared_informer.go:311] Waiting for caches to sync for crd-autoregister\n"} +{"Time":"2023-05-31T19:41:16.276812101Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.145957 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T19:41:16.276815914Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.149421 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T19:41:16.27681947Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.149472 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T19:41:16.276822993Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.169339 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T19:41:16.276827331Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.192877 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T19:41:16.27683083Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.221626 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T19:41:16.276834894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.242953 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T19:41:16.276838751Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.245770 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T19:41:16.276842667Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.246688 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T19:41:16.276846356Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.246868 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T19:41:16.276849885Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.250015 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.276853576Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:49.769359 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T19:41:16.276857564Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:50.056141 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T19:41:16.276861089Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:50.075010 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T19:41:16.276864845Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:50.075064 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T19:41:16.276870001Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:50.693737 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.276874168Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:50.762011 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.276877832Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:50.882605 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T19:41:16.276881736Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" W0531 19:39:50.890051 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.39.43]\n"} +{"Time":"2023-05-31T19:41:16.276885555Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:50.890954 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T19:41:16.276889053Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:50.903084 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.276892563Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:51.128531 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T19:41:16.276896884Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:52.259985 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T19:41:16.276900644Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:52.279113 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T19:41:16.27690452Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:39:52.306919 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T19:41:16.27690803Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:04.840815 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T19:41:16.276911664Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:04.846796 1 controller.go:624] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T19:41:16.276916094Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:05.587666 1 trace.go:219] Trace[1394613183]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:3b7339c6-f6a8-4bcc-8804-181164fde9c7,client:192.168.39.43,protocol:HTTP/2.0,resource:replicasets,scope:resource,url:/apis/apps/v1/namespaces/kube-system/replicasets,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:deployment-controller,verb:POST (31-May-2023 19:40:04.839) (total time: 748ms):\n"} +{"Time":"2023-05-31T19:41:16.276924288Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1394613183]: [\"Create etcd3\" audit-id:3b7339c6-f6a8-4bcc-8804-181164fde9c7,key:/replicasets/kube-system/coredns-5d78c9869d,type:*apps.ReplicaSet,resource:replicasets.apps 743ms (19:40:04.843)\n"} +{"Time":"2023-05-31T19:41:16.276929208Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1394613183]: ---\"Txn call succeeded\" 743ms (19:40:05.587)]\n"} +{"Time":"2023-05-31T19:41:16.276932789Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1394613183]: [748.491941ms] [748.491941ms] END\n"} +{"Time":"2023-05-31T19:41:16.276937643Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:05.604877 1 trace.go:219] Trace[1200253205]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:e2708ec2-7d70-4bd0-af47-268f847da568,client:192.168.39.43,protocol:HTTP/2.0,resource:endpoints,scope:resource,url:/api/v1/namespaces/kube-system/endpoints,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:endpoint-controller,verb:POST (31-May-2023 19:40:04.852) (total time: 751ms):\n"} +{"Time":"2023-05-31T19:41:16.276942498Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1200253205]: [\"Create etcd3\" audit-id:e2708ec2-7d70-4bd0-af47-268f847da568,key:/services/endpoints/kube-system/kube-dns,type:*core.Endpoints,resource:endpoints 751ms (19:40:04.853)\n"} +{"Time":"2023-05-31T19:41:16.276946417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1200253205]: ---\"Txn call succeeded\" 750ms (19:40:05.604)]\n"} +{"Time":"2023-05-31T19:41:16.27695164Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1200253205]: [751.978407ms] [751.978407ms] END\n"} +{"Time":"2023-05-31T19:41:16.276956372Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:05.608871 1 trace.go:219] Trace[150026658]: \"Update\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:2cccd0d1-af24-44a3-b5ae-d87feb10c305,client:192.168.39.43,protocol:HTTP/2.0,resource:certificatesigningrequests,scope:resource,url:/apis/certificates.k8s.io/v1/certificatesigningrequests/csr-xwq9p/approval,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:certificate-controller,verb:PUT (31-May-2023 19:40:04.847) (total time: 761ms):\n"} +{"Time":"2023-05-31T19:41:16.276962768Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[150026658]: [\"GuaranteedUpdate etcd3\" audit-id:2cccd0d1-af24-44a3-b5ae-d87feb10c305,key:/certificatesigningrequests/csr-xwq9p,type:*certificates.CertificateSigningRequest,resource:certificatesigningrequests.certificates.k8s.io 761ms (19:40:04.847)\n"} +{"Time":"2023-05-31T19:41:16.276966774Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[150026658]: ---\"Txn call completed\" 760ms (19:40:05.608)]\n"} +{"Time":"2023-05-31T19:41:16.276970189Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[150026658]: [761.245737ms] [761.245737ms] END\n"} +{"Time":"2023-05-31T19:41:16.276974835Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:05.609732 1 trace.go:219] Trace[1509080059]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:b10a2d7e-17f0-417e-a88c-e3e8084976d9,client:192.168.39.43,protocol:HTTP/2.0,resource:controllerrevisions,scope:resource,url:/apis/apps/v1/namespaces/kube-system/controllerrevisions,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:daemon-set-controller,verb:POST (31-May-2023 19:40:04.842) (total time: 767ms):\n"} +{"Time":"2023-05-31T19:41:16.276980678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1509080059]: [\"Create etcd3\" audit-id:b10a2d7e-17f0-417e-a88c-e3e8084976d9,key:/controllerrevisions/kube-system/kube-proxy-8bdf7b6c,type:*apps.ControllerRevision,resource:controllerrevisions.apps 762ms (19:40:04.847)\n"} +{"Time":"2023-05-31T19:41:16.276984971Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1509080059]: ---\"Txn call succeeded\" 762ms (19:40:05.609)]\n"} +{"Time":"2023-05-31T19:41:16.276988576Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1509080059]: [767.508922ms] [767.508922ms] END\n"} +{"Time":"2023-05-31T19:41:16.27699565Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:05.609834 1 trace.go:219] Trace[581208880]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:77b1999e-77e0-469b-b8b5-a215f1650674,client:192.168.39.43,protocol:HTTP/2.0,resource:endpointslices,scope:resource,url:/apis/discovery.k8s.io/v1/namespaces/kube-system/endpointslices,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:endpointslice-controller,verb:POST (31-May-2023 19:40:04.844) (total time: 765ms):\n"} +{"Time":"2023-05-31T19:41:16.277000579Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[581208880]: [\"Create etcd3\" audit-id:77b1999e-77e0-469b-b8b5-a215f1650674,key:/endpointslices/kube-system/kube-dns-jnqr6,type:*discovery.EndpointSlice,resource:endpointslices.discovery.k8s.io 760ms (19:40:04.849)\n"} +{"Time":"2023-05-31T19:41:16.277004399Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[581208880]: ---\"Txn call succeeded\" 760ms (19:40:05.609)]\n"} +{"Time":"2023-05-31T19:41:16.277007987Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[581208880]: [765.195931ms] [765.195931ms] END\n"} +{"Time":"2023-05-31T19:41:16.277012337Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:05.614009 1 trace.go:219] Trace[104110024]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:5dfcab66-e80d-42bb-a587-0d906241f7d6,client:192.168.39.43,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/kube-system/serviceaccounts/root-ca-cert-publisher/token,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/kube-controller-manager,verb:POST (31-May-2023 19:40:04.844) (total time: 769ms):\n"} +{"Time":"2023-05-31T19:41:16.277017016Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[104110024]: ---\"Write to database call succeeded\" len:81 769ms (19:40:05.613)\n"} +{"Time":"2023-05-31T19:41:16.277020657Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[104110024]: [769.966661ms] [769.966661ms] END\n"} +{"Time":"2023-05-31T19:41:16.277025132Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:05.616427 1 trace.go:219] Trace[847155194]: \"Get\" accept:application/json;as=Table;v=v1;g=meta.k8s.io,application/json;as=Table;v=v1beta1;g=meta.k8s.io,application/json,audit-id:1abb82cb-6c79-4060-ab1b-af2539e0b13b,client:127.0.0.1,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/default/serviceaccounts/default,user-agent:kubectl/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:GET (31-May-2023 19:40:05.008) (total time: 607ms):\n"} +{"Time":"2023-05-31T19:41:16.277030955Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[847155194]: ---\"About to write a response\" 607ms (19:40:05.615)\n"} +{"Time":"2023-05-31T19:41:16.277034651Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[847155194]: [607.980592ms] [607.980592ms] END\n"} +{"Time":"2023-05-31T19:41:16.277040706Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:05.623753 1 trace.go:219] Trace[413004041]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:05abb83c-1977-45ee-826a-bf8ca47ce6a4,client:192.168.39.43,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/kube-system/serviceaccounts/bootstrap-signer/token,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/kube-controller-manager,verb:POST (31-May-2023 19:40:04.879) (total time: 742ms):\n"} +{"Time":"2023-05-31T19:41:16.277045244Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[413004041]: ---\"Write to database call succeeded\" len:81 739ms (19:40:05.619)\n"} +{"Time":"2023-05-31T19:41:16.277048691Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[413004041]: [742.027479ms] [742.027479ms] END\n"} +{"Time":"2023-05-31T19:41:16.277053218Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.118865 1 trace.go:219] Trace[1031045029]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:ebe3d556-a024-4a59-ae4b-f0d183e10fd3,client:192.168.39.43,protocol:HTTP/2.0,resource:events,scope:resource,url:/api/v1/namespaces/kube-system/events,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:deployment-controller,verb:POST (31-May-2023 19:40:05.590) (total time: 528ms):\n"} +{"Time":"2023-05-31T19:41:16.277058009Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1031045029]: [\"Create etcd3\" audit-id:ebe3d556-a024-4a59-ae4b-f0d183e10fd3,key:/events/kube-system/coredns.176451b6ae015114,type:*core.Event,resource:events 528ms (19:40:05.590)\n"} +{"Time":"2023-05-31T19:41:16.277061856Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1031045029]: ---\"Txn call succeeded\" 527ms (19:40:06.118)]\n"} +{"Time":"2023-05-31T19:41:16.277065322Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1031045029]: [528.629753ms] [528.629753ms] END\n"} +{"Time":"2023-05-31T19:41:16.277069743Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.119648 1 trace.go:219] Trace[1944754197]: \"Update\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:4bc6251e-f6d7-4696-9d53-7ea41b633c49,client:192.168.39.43,protocol:HTTP/2.0,resource:deployments,scope:resource,url:/apis/apps/v1/namespaces/kube-system/deployments/coredns/status,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:deployment-controller,verb:PUT (31-May-2023 19:40:05.590) (total time: 529ms):\n"} +{"Time":"2023-05-31T19:41:16.277074751Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1944754197]: [\"GuaranteedUpdate etcd3\" audit-id:4bc6251e-f6d7-4696-9d53-7ea41b633c49,key:/deployments/kube-system/coredns,type:*apps.Deployment,resource:deployments.apps 529ms (19:40:05.590)\n"} +{"Time":"2023-05-31T19:41:16.277079148Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1944754197]: ---\"Txn call completed\" 524ms (19:40:06.119)]\n"} +{"Time":"2023-05-31T19:41:16.277082655Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1944754197]: [529.562636ms] [529.562636ms] END\n"} +{"Time":"2023-05-31T19:41:16.277087072Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.121314 1 trace.go:219] Trace[1669776734]: \"Get\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:0e112c50-6fbb-4856-b7d0-12cf62eff7e7,client:192.168.39.43,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/kube-system/serviceaccounts/replicaset-controller,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/kube-controller-manager,verb:GET (31-May-2023 19:40:05.587) (total time: 534ms):\n"} +{"Time":"2023-05-31T19:41:16.27709134Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1669776734]: ---\"About to write a response\" 534ms (19:40:06.121)\n"} +{"Time":"2023-05-31T19:41:16.277094804Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1669776734]: [534.158923ms] [534.158923ms] END\n"} +{"Time":"2023-05-31T19:41:16.27709901Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.517289 1 trace.go:219] Trace[164789234]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:fbeeec34-70cb-4006-aa76-5cfd5ba34f45,client:192.168.39.43,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/kube-system/pods,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:daemon-set-controller,verb:POST (31-May-2023 19:40:05.611) (total time: 905ms):\n"} +{"Time":"2023-05-31T19:41:16.27710347Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[164789234]: [\"Create etcd3\" audit-id:fbeeec34-70cb-4006-aa76-5cfd5ba34f45,key:/pods/kube-system/kube-proxy-nhbhc,type:*core.Pod,resource:pods 902ms (19:40:05.615)\n"} +{"Time":"2023-05-31T19:41:16.277107098Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[164789234]: ---\"Txn call succeeded\" 901ms (19:40:06.517)]\n"} +{"Time":"2023-05-31T19:41:16.27711047Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[164789234]: [905.290571ms] [905.290571ms] END\n"} +{"Time":"2023-05-31T19:41:16.277114642Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.519780 1 trace.go:219] Trace[975983981]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:1ada2192-0a3d-4ad9-89f9-0dd4eeddec57,client:192.168.39.43,protocol:HTTP/2.0,resource:configmaps,scope:resource,url:/api/v1/namespaces/default/configmaps,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:root-ca-cert-publisher,verb:POST (31-May-2023 19:40:05.624) (total time: 895ms):\n"} +{"Time":"2023-05-31T19:41:16.277119193Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[975983981]: [\"Create etcd3\" audit-id:1ada2192-0a3d-4ad9-89f9-0dd4eeddec57,key:/configmaps/default/kube-root-ca.crt,type:*core.ConfigMap,resource:configmaps 893ms (19:40:05.626)\n"} +{"Time":"2023-05-31T19:41:16.277122985Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[975983981]: ---\"Txn call succeeded\" 893ms (19:40:06.519)]\n"} +{"Time":"2023-05-31T19:41:16.277127022Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[975983981]: [895.154676ms] [895.154676ms] END\n"} +{"Time":"2023-05-31T19:41:16.277131387Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.523194 1 trace.go:219] Trace[1298463593]: \"Update\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:71bf84cd-8071-4bec-b3d9-bcbdf2a290ff,client:192.168.39.43,protocol:HTTP/2.0,resource:certificatesigningrequests,scope:resource,url:/apis/certificates.k8s.io/v1/certificatesigningrequests/csr-xwq9p/status,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:certificate-controller,verb:PUT (31-May-2023 19:40:05.602) (total time: 920ms):\n"} +{"Time":"2023-05-31T19:41:16.277136433Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1298463593]: [\"GuaranteedUpdate etcd3\" audit-id:71bf84cd-8071-4bec-b3d9-bcbdf2a290ff,key:/certificatesigningrequests/csr-xwq9p,type:*certificates.CertificateSigningRequest,resource:certificatesigningrequests.certificates.k8s.io 920ms (19:40:05.602)\n"} +{"Time":"2023-05-31T19:41:16.277144602Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1298463593]: ---\"Txn call completed\" 919ms (19:40:06.523)]\n"} +{"Time":"2023-05-31T19:41:16.2771482Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1298463593]: [920.511943ms] [920.511943ms] END\n"} +{"Time":"2023-05-31T19:41:16.277152371Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.523835 1 trace.go:219] Trace[932934819]: \"Get\" accept:application/json, */*,audit-id:ec19c09b-f278-4f5c-abc3-06bea1732d89,client:192.168.39.1,protocol:HTTP/2.0,resource:deployments,scope:resource,url:/apis/apps/v1/namespaces/kube-system/deployments/coredns/scale,user-agent:minikube-linux-amd64/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (31-May-2023 19:40:05.726) (total time: 796ms):\n"} +{"Time":"2023-05-31T19:41:16.27715707Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[932934819]: ---\"About to write a response\" 796ms (19:40:06.523)\n"} +{"Time":"2023-05-31T19:41:16.27716072Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[932934819]: [796.822478ms] [796.822478ms] END\n"} +{"Time":"2023-05-31T19:41:16.277165615Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.523927 1 trace.go:219] Trace[1070945478]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:927be292-2040-487c-83cd-f69c2c3a4308,client:192.168.39.43,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/kube-public/serviceaccounts,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:service-account-controller,verb:POST (31-May-2023 19:40:05.613) (total time: 910ms):\n"} +{"Time":"2023-05-31T19:41:16.277172046Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1070945478]: [\"Create etcd3\" audit-id:927be292-2040-487c-83cd-f69c2c3a4308,key:/serviceaccounts/kube-public/default,type:*core.ServiceAccount,resource:serviceaccounts 908ms (19:40:05.615)\n"} +{"Time":"2023-05-31T19:41:16.277175883Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1070945478]: ---\"Txn call succeeded\" 908ms (19:40:06.523)]\n"} +{"Time":"2023-05-31T19:41:16.277179332Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1070945478]: [910.712869ms] [910.712869ms] END\n"} +{"Time":"2023-05-31T19:41:16.277184119Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.526076 1 trace.go:219] Trace[217467906]: \"Update\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:fe8c577d-a105-46a9-b401-c3fae233df64,client:192.168.39.43,protocol:HTTP/2.0,resource:configmaps,scope:resource,url:/api/v1/namespaces/kube-public/configmaps/cluster-info,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:bootstrap-signer,verb:PUT (31-May-2023 19:40:05.627) (total time: 898ms):\n"} +{"Time":"2023-05-31T19:41:16.277188688Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[217467906]: [\"GuaranteedUpdate etcd3\" audit-id:fe8c577d-a105-46a9-b401-c3fae233df64,key:/configmaps/kube-public/cluster-info,type:*core.ConfigMap,resource:configmaps 898ms (19:40:05.627)\n"} +{"Time":"2023-05-31T19:41:16.277193797Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[217467906]: ---\"Txn call completed\" 897ms (19:40:06.525)]\n"} +{"Time":"2023-05-31T19:41:16.277197169Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[217467906]: [898.708228ms] [898.708228ms] END\n"} +{"Time":"2023-05-31T19:41:16.277201293Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.529110 1 trace.go:219] Trace[252758478]: \"Get\" accept:application/json,audit-id:f3dd227f-435a-4439-84f3-d83f2a4962b1,client:127.0.0.1,protocol:HTTP/2.0,resource:configmaps,scope:resource,url:/api/v1/namespaces/kube-system/configmaps/coredns,user-agent:kubectl/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:GET (31-May-2023 19:40:05.821) (total time: 708ms):\n"} +{"Time":"2023-05-31T19:41:16.277205529Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[252758478]: ---\"About to write a response\" 707ms (19:40:06.528)\n"} +{"Time":"2023-05-31T19:41:16.27720898Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[252758478]: [708.081075ms] [708.081075ms] END\n"} +{"Time":"2023-05-31T19:41:16.277213156Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.545509 1 trace.go:219] Trace[622146436]: \"List\" accept:application/json, */*,audit-id:9161b31f-25e6-4cd4-887c-a575518f3f3e,client:192.168.39.1,protocol:HTTP/2.0,resource:storageclasses,scope:cluster,url:/apis/storage.k8s.io/v1/storageclasses,user-agent:minikube-linux-amd64/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (31-May-2023 19:40:05.737) (total time: 807ms):\n"} +{"Time":"2023-05-31T19:41:16.277217538Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[622146436]: [\"List(recursive=true) etcd3\" audit-id:9161b31f-25e6-4cd4-887c-a575518f3f3e,key:/storageclasses,resourceVersion:,resourceVersionMatch:,limit:0,continue: 807ms (19:40:05.737)]\n"} +{"Time":"2023-05-31T19:41:16.27722134Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[622146436]: [807.71795ms] [807.71795ms] END\n"} +{"Time":"2023-05-31T19:41:16.277225799Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.925093 1 trace.go:219] Trace[225832393]: \"Update\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:f139a359-d6cc-4f18-893a-5049c70b2859,client:192.168.39.43,protocol:HTTP/2.0,resource:deployments,scope:resource,url:/apis/apps/v1/namespaces/kube-system/deployments/coredns/status,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:deployment-controller,verb:PUT (31-May-2023 19:40:06.121) (total time: 803ms):\n"} +{"Time":"2023-05-31T19:41:16.27723107Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[225832393]: [\"GuaranteedUpdate etcd3\" audit-id:f139a359-d6cc-4f18-893a-5049c70b2859,key:/deployments/kube-system/coredns,type:*apps.Deployment,resource:deployments.apps 803ms (19:40:06.121)]\n"} +{"Time":"2023-05-31T19:41:16.277234801Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[225832393]: [803.871174ms] [803.871174ms] END\n"} +{"Time":"2023-05-31T19:41:16.27724015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:06.935339 1 trace.go:219] Trace[1324214265]: \"Create\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:4d673f89-4420-4eee-9774-1cd6a2a528f6,client:192.168.39.43,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/kube-system/serviceaccounts/replicaset-controller/token,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/kube-controller-manager,verb:POST (31-May-2023 19:40:06.127) (total time: 807ms):\n"} +{"Time":"2023-05-31T19:41:16.277244594Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1324214265]: ---\"Write to database call succeeded\" len:81 807ms (19:40:06.935)\n"} +{"Time":"2023-05-31T19:41:16.277248186Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1324214265]: [807.602788ms] [807.602788ms] END\n"} +{"Time":"2023-05-31T19:41:16.277252529Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:16.068492 1 trace.go:219] Trace[484804855]: \"Update\" accept:application/vnd.kubernetes.protobuf, */*,audit-id:910e31a1-87f1-41ca-b180-7be7058c7673,client:192.168.39.43,protocol:HTTP/2.0,resource:endpointslices,scope:resource,url:/apis/discovery.k8s.io/v1/namespaces/kube-system/endpointslices/kube-dns-jnqr6,user-agent:kube-controller-manager/v1.27.2 (linux/amd64) kubernetes/7f6f68f/system:serviceaccount:kube-system:endpointslice-controller,verb:PUT (31-May-2023 19:40:15.266) (total time: 802ms):\n"} +{"Time":"2023-05-31T19:41:16.277257288Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[484804855]: [\"GuaranteedUpdate etcd3\" audit-id:910e31a1-87f1-41ca-b180-7be7058c7673,key:/endpointslices/kube-system/kube-dns-jnqr6,type:*discovery.EndpointSlice,resource:endpointslices.discovery.k8s.io 801ms (19:40:15.266)\n"} +{"Time":"2023-05-31T19:41:16.27726132Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[484804855]: ---\"Txn call completed\" 800ms (19:40:16.068)]\n"} +{"Time":"2023-05-31T19:41:16.277264923Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[484804855]: [802.362008ms] [802.362008ms] END\n"} +{"Time":"2023-05-31T19:41:16.27726925Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:16.615017 1 trace.go:219] Trace[1139872015]: \"Patch\" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:454e2778-7b8b-47e1-aea6-73d124947413,client:192.168.39.43,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/kube-system/pods/coredns-5d78c9869d-sx4t6/status,user-agent:kubelet/v1.27.2 (linux/amd64) kubernetes/7f6f68f,verb:PATCH (31-May-2023 19:40:16.075) (total time: 539ms):\n"} +{"Time":"2023-05-31T19:41:16.277273925Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1139872015]: [\"GuaranteedUpdate etcd3\" audit-id:454e2778-7b8b-47e1-aea6-73d124947413,key:/pods/kube-system/coredns-5d78c9869d-sx4t6,type:*core.Pod,resource:pods 539ms (19:40:16.075)\n"} +{"Time":"2023-05-31T19:41:16.277277771Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1139872015]: ---\"Txn call completed\" 527ms (19:40:16.614)]\n"} +{"Time":"2023-05-31T19:41:16.277281278Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1139872015]: ---\"Object stored in database\" 530ms (19:40:16.614)\n"} +{"Time":"2023-05-31T19:41:16.277284657Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1139872015]: [539.284256ms] [539.284256ms] END\n"} +{"Time":"2023-05-31T19:41:16.277288798Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:16.623481 1 trace.go:219] Trace[1099560234]: \"Get\" accept:application/json, */*,audit-id:23f354d1-066d-4a70-857d-85b151ee4149,client:192.168.39.1,protocol:HTTP/2.0,resource:nodes,scope:resource,url:/api/v1/nodes/enable-default-cni-509041,user-agent:minikube-linux-amd64/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (31-May-2023 19:40:16.087) (total time: 535ms):\n"} +{"Time":"2023-05-31T19:41:16.277293088Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1099560234]: ---\"About to write a response\" 531ms (19:40:16.619)\n"} +{"Time":"2023-05-31T19:41:16.277296493Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Trace[1099560234]: [535.259337ms] [535.259337ms] END\n"} +{"Time":"2023-05-31T19:41:16.277300011Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:49.526494 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/netcat\" clusterIPs=map[IPv4:10.103.29.180]\n"} +{"Time":"2023-05-31T19:41:16.277304121Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" E0531 19:41:00.777295 1 upgradeaware.go:426] Error proxying data from client to backend: write tcp 192.168.39.43:47452-\u003e192.168.39.43:10250: write: broken pipe\n"} +{"Time":"2023-05-31T19:41:16.277308343Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" E0531 19:41:06.910833 1 upgradeaware.go:426] Error proxying data from client to backend: read tcp 192.168.39.43:8443-\u003e192.168.39.1:51622: read: connection reset by peer\n"} +{"Time":"2023-05-31T19:41:16.277312236Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" E0531 19:41:07.056855 1 upgradeaware.go:426] Error proxying data from client to backend: write tcp 192.168.39.43:47520-\u003e192.168.39.43:10250: write: broken pipe\n"} +{"Time":"2023-05-31T19:41:16.277315812Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.277318805Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.277321985Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T19:41:16.277325555Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/cni/net.d/1-k8s.conflist\r\n"} +{"Time":"2023-05-31T19:41:16.277329608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.27733269Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277335887Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"cniVersion\": \"0.3.1\",\r\n"} +{"Time":"2023-05-31T19:41:16.27733934Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"name\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:41:16.27734269Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:41:16.277345872Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277349885Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:41:16.277353472Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"bridge\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:41:16.277356824Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"addIf\": \"true\",\r\n"} +{"Time":"2023-05-31T19:41:16.277360298Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"isDefaultGateway\": true,\r\n"} +{"Time":"2023-05-31T19:41:16.277363643Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"forceAddress\": false,\r\n"} +{"Time":"2023-05-31T19:41:16.277366792Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:41:16.277370059Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:41:16.277373314Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:41:16.277376983Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:41:16.277380346Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"subnet\": \"10.244.0.0/16\"\r\n"} +{"Time":"2023-05-31T19:41:16.277383789Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277386936Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T19:41:16.277390016Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277393042Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:41:16.277396365Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:41:16.277399572Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:41:16.277403112Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277406196Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277409299Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.277412455Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277416704Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/cni/net.d/87-podman-bridge.conflist.mk_disabled\r\n"} +{"Time":"2023-05-31T19:41:16.277420054Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277423227Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"cniVersion\": \"0.4.0\",\r\n"} +{"Time":"2023-05-31T19:41:16.27742649Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"name\": \"podman\",\r\n"} +{"Time":"2023-05-31T19:41:16.277429909Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"plugins\": [\r\n"} +{"Time":"2023-05-31T19:41:16.277433141Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277436401Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"bridge\",\r\n"} +{"Time":"2023-05-31T19:41:16.277439786Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"bridge\": \"cni-podman0\",\r\n"} +{"Time":"2023-05-31T19:41:16.277443896Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"isGateway\": true,\r\n"} +{"Time":"2023-05-31T19:41:16.277447096Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipMasq\": true,\r\n"} +{"Time":"2023-05-31T19:41:16.277450233Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"hairpinMode\": true,\r\n"} +{"Time":"2023-05-31T19:41:16.27745344Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ipam\": {\r\n"} +{"Time":"2023-05-31T19:41:16.277456849Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"host-local\",\r\n"} +{"Time":"2023-05-31T19:41:16.277460377Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"routes\": [{ \"dst\": \"0.0.0.0/0\" }],\r\n"} +{"Time":"2023-05-31T19:41:16.277463951Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"ranges\": [\r\n"} +{"Time":"2023-05-31T19:41:16.277471513Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [\r\n"} +{"Time":"2023-05-31T19:41:16.277474816Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277478103Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"subnet\": \"10.88.0.0/16\",\r\n"} +{"Time":"2023-05-31T19:41:16.277481602Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"gateway\": \"10.88.0.1\"\r\n"} +{"Time":"2023-05-31T19:41:16.277485116Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277488389Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.27749149Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.27749482Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277497949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T19:41:16.277515019Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277518255Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"portmap\",\r\n"} +{"Time":"2023-05-31T19:41:16.277521688Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"capabilities\": {\r\n"} +{"Time":"2023-05-31T19:41:16.277525502Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"portMappings\": true\r\n"} +{"Time":"2023-05-31T19:41:16.277528386Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277531254Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T19:41:16.277534003Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277538346Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"firewall\"\r\n"} +{"Time":"2023-05-31T19:41:16.27754186Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T19:41:16.277544769Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.277548062Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"type\": \"tuning\"\r\n"} +{"Time":"2023-05-31T19:41:16.2775514Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277554614Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.277558206Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.277561436Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/cni/net.d/.keep\r\n"} +{"Time":"2023-05-31T19:41:16.277564604Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.277567649Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.277570737Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T19:41:16.277574336Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1: lo: \u003cLOOPBACK,UP,LOWER_UP\u003e mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:41:16.277578029Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00\r\n"} +{"Time":"2023-05-31T19:41:16.277581404Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" inet 127.0.0.1/8 scope host lo\r\n"} +{"Time":"2023-05-31T19:41:16.277584658Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:41:16.277588509Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 2: eth0: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:41:16.277592109Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether 52:54:00:1f:10:3e brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:41:16.277595576Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" inet 192.168.39.43/24 brd 192.168.39.255 scope global dynamic eth0\r\n"} +{"Time":"2023-05-31T19:41:16.277599537Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" valid_lft 3489sec preferred_lft 3489sec\r\n"} +{"Time":"2023-05-31T19:41:16.277602814Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 3: eth1: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc pfifo_fast state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:41:16.277606189Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether 52:54:00:86:79:08 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:41:16.277609432Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" inet 192.168.122.87/24 brd 192.168.122.255 scope global dynamic eth1\r\n"} +{"Time":"2023-05-31T19:41:16.277612995Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" valid_lft 3489sec preferred_lft 3489sec\r\n"} +{"Time":"2023-05-31T19:41:16.277616105Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 4: sit0@NONE: \u003cNOARP\u003e mtu 1480 qdisc noop state DOWN group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:41:16.277619501Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/sit 0.0.0.0 brd 0.0.0.0\r\n"} +{"Time":"2023-05-31T19:41:16.27762286Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 5: bridge: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue state UP group default qlen 1000\r\n"} +{"Time":"2023-05-31T19:41:16.277626434Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether ea:fa:a6:4e:6b:84 brd ff:ff:ff:ff:ff:ff\r\n"} +{"Time":"2023-05-31T19:41:16.277629631Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" inet 10.244.0.1/16 brd 10.244.255.255 scope global bridge\r\n"} +{"Time":"2023-05-31T19:41:16.277632931Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" valid_lft forever preferred_lft forever\r\n"} +{"Time":"2023-05-31T19:41:16.277635952Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 6: veth6309a833@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T19:41:16.277639553Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether fe:53:0f:5a:f6:2a brd ff:ff:ff:ff:ff:ff link-netns cni-5f934db9-781b-9938-48f7-90c5efb9435d\r\n"} +{"Time":"2023-05-31T19:41:16.277643491Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 8: vethd202f9e1@if4: \u003cBROADCAST,MULTICAST,UP,LOWER_UP\u003e mtu 1500 qdisc noqueue master bridge state UP group default \r\n"} +{"Time":"2023-05-31T19:41:16.277647332Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" link/ether de:95:e0:d8:97:33 brd ff:ff:ff:ff:ff:ff link-netns cni-fa2101ab-ebca-aa3e-1d7b-340064417339\r\n"} +{"Time":"2023-05-31T19:41:16.277650791Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.277655271Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.277658298Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T19:41:16.277662018Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default via 192.168.122.1 dev eth1 proto dhcp src 192.168.122.87 metric 1024 \r\n"} +{"Time":"2023-05-31T19:41:16.277665463Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 10.244.0.0/16 dev bridge proto kernel scope link src 10.244.0.1 \r\n"} +{"Time":"2023-05-31T19:41:16.277669238Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.39.0/24 dev eth0 proto kernel scope link src 192.168.39.43 \r\n"} +{"Time":"2023-05-31T19:41:16.277672792Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.122.0/24 dev eth1 proto kernel scope link src 192.168.122.87 \r\n"} +{"Time":"2023-05-31T19:41:16.277676548Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.122.1 dev eth1 proto dhcp scope link src 192.168.122.87 metric 1024 \r\n"} +{"Time":"2023-05-31T19:41:16.277679925Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.27768364Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.27768698Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T19:41:16.277690388Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:41:10 2023\r\n"} +{"Time":"2023-05-31T19:41:16.277693585Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" *nat\r\n"} +{"Time":"2023-05-31T19:41:16.277696883Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :PREROUTING ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:41:16.277700102Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :INPUT ACCEPT [36:2160]\r\n"} +{"Time":"2023-05-31T19:41:16.277703363Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :OUTPUT ACCEPT [46:2776]\r\n"} +{"Time":"2023-05-31T19:41:16.277706839Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :POSTROUTING ACCEPT [46:2776]\r\n"} +{"Time":"2023-05-31T19:41:16.277710166Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :CNI-07719fc6e744c2033f38e9a8 - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277713648Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :CNI-4037589da83377ce90c24bf0 - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277716905Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277720168Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-MARK-MASQ - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.27772342Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277726497Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-POSTROUTING - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277731246Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277734478Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-6RNM4WNZ6V67EHO7 - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277737774Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-IT2ZTR26TO4XFPTO - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277740987Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-N4G2XR5TDX7PQE7P - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277744178Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-XPTUC4FRAFEFDBGF - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277748325Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SEP-YIL6JZP7A3QYXJU2 - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277751587Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277754984Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-ERIFXISQEP7F7OF4 - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277758222Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-JD5MR3NA4I4DYORP - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277761365Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-NPX46M4PTMTKRN6Y - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277764596Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-TCOU7JCQXEZGVUNU - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277767806Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SVC-WDP22YZC5S6MZWYX - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277771128Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A PREROUTING -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:41:16.277774769Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:41:16.277778442Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A POSTROUTING -m comment --comment \"kubernetes postrouting rules\" -j KUBE-POSTROUTING\r\n"} +{"Time":"2023-05-31T19:41:16.277783321Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A POSTROUTING -s 10.244.0.2/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"f2e48c35a56990e0f7844a58be6ccb274063e417c9b3f51ce75f38d6eec84c3a\\\"\" -j CNI-07719fc6e744c2033f38e9a8\r\n"} +{"Time":"2023-05-31T19:41:16.277787633Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A POSTROUTING -s 10.244.0.4/32 -m comment --comment \"name: \\\"bridge\\\" id: \\\"1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c\\\"\" -j CNI-4037589da83377ce90c24bf0\r\n"} +{"Time":"2023-05-31T19:41:16.277791792Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A CNI-07719fc6e744c2033f38e9a8 -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"f2e48c35a56990e0f7844a58be6ccb274063e417c9b3f51ce75f38d6eec84c3a\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:41:16.277796004Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A CNI-07719fc6e744c2033f38e9a8 ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"f2e48c35a56990e0f7844a58be6ccb274063e417c9b3f51ce75f38d6eec84c3a\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T19:41:16.277800089Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A CNI-4037589da83377ce90c24bf0 -d 10.244.0.0/16 -m comment --comment \"name: \\\"bridge\\\" id: \\\"1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c\\\"\" -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:41:16.277804313Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A CNI-4037589da83377ce90c24bf0 ! -d 224.0.0.0/4 -m comment --comment \"name: \\\"bridge\\\" id: \\\"1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c\\\"\" -j MASQUERADE\r\n"} +{"Time":"2023-05-31T19:41:16.277808088Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-MARK-MASQ -j MARK --set-xmark 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:41:16.277812037Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-POSTROUTING -m mark ! --mark 0x4000/0x4000 -j RETURN\r\n"} +{"Time":"2023-05-31T19:41:16.277815591Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-POSTROUTING -j MARK --set-xmark 0x4000/0x0\r\n"} +{"Time":"2023-05-31T19:41:16.277819234Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-POSTROUTING -m comment --comment \"kubernetes service traffic requiring SNAT\" -j MASQUERADE --random-fully\r\n"} +{"Time":"2023-05-31T19:41:16.277823008Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-6RNM4WNZ6V67EHO7 -s 192.168.39.43/32 -m comment --comment \"default/kubernetes:https\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277826794Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-6RNM4WNZ6V67EHO7 -p tcp -m comment --comment \"default/kubernetes:https\" -m tcp -j DNAT --to-destination 192.168.39.43:8443\r\n"} +{"Time":"2023-05-31T19:41:16.277830648Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns-tcp\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277834656Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-IT2ZTR26TO4XFPTO -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp\" -m tcp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:41:16.277838983Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:metrics\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277842781Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-N4G2XR5TDX7PQE7P -p tcp -m comment --comment \"kube-system/kube-dns:metrics\" -m tcp -j DNAT --to-destination 10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:41:16.277846963Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -s 10.244.0.4/32 -m comment --comment \"default/netcat\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277850823Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-XPTUC4FRAFEFDBGF -p tcp -m comment --comment \"default/netcat\" -m tcp -j DNAT --to-destination 10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T19:41:16.277854863Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -s 10.244.0.2/32 -m comment --comment \"kube-system/kube-dns:dns\" -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277858649Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SEP-YIL6JZP7A3QYXJU2 -p udp -m comment --comment \"kube-system/kube-dns:dns\" -m udp -j DNAT --to-destination 10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:41:16.277862658Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-SVC-JD5MR3NA4I4DYORP\r\n"} +{"Time":"2023-05-31T19:41:16.277866567Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.103.29.180/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-SVC-WDP22YZC5S6MZWYX\r\n"} +{"Time":"2023-05-31T19:41:16.277870449Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-SVC-NPX46M4PTMTKRN6Y\r\n"} +{"Time":"2023-05-31T19:41:16.277874422Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-SVC-TCOU7JCQXEZGVUNU\r\n"} +{"Time":"2023-05-31T19:41:16.277878398Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-SVC-ERIFXISQEP7F7OF4\r\n"} +{"Time":"2023-05-31T19:41:16.27788271Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SERVICES -m comment --comment \"kubernetes service nodeports; NOTE: this must be the last rule in this chain\" -m addrtype --dst-type LOCAL -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:41:16.277886797Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:dns-tcp cluster IP\" -m tcp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277890653Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-ERIFXISQEP7F7OF4 -m comment --comment \"kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53\" -j KUBE-SEP-IT2ZTR26TO4XFPTO\r\n"} +{"Time":"2023-05-31T19:41:16.277894983Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p tcp -m comment --comment \"kube-system/kube-dns:metrics cluster IP\" -m tcp --dport 9153 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277898866Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-JD5MR3NA4I4DYORP -m comment --comment \"kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153\" -j KUBE-SEP-N4G2XR5TDX7PQE7P\r\n"} +{"Time":"2023-05-31T19:41:16.27790275Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y ! -s 10.244.0.0/16 -d 10.96.0.1/32 -p tcp -m comment --comment \"default/kubernetes:https cluster IP\" -m tcp --dport 443 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277908231Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-NPX46M4PTMTKRN6Y -m comment --comment \"default/kubernetes:https -\u003e 192.168.39.43:8443\" -j KUBE-SEP-6RNM4WNZ6V67EHO7\r\n"} +{"Time":"2023-05-31T19:41:16.277912202Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU ! -s 10.244.0.0/16 -d 10.96.0.10/32 -p udp -m comment --comment \"kube-system/kube-dns:dns cluster IP\" -m udp --dport 53 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.277916027Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-TCOU7JCQXEZGVUNU -m comment --comment \"kube-system/kube-dns:dns -\u003e 10.244.0.2:53\" -j KUBE-SEP-YIL6JZP7A3QYXJU2\r\n"} +{"Time":"2023-05-31T19:41:16.277919965Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX ! -s 10.244.0.0/16 -d 10.103.29.180/32 -p tcp -m comment --comment \"default/netcat cluster IP\" -m tcp --dport 8080 -j KUBE-MARK-MASQ\r\n"} +{"Time":"2023-05-31T19:41:16.27792377Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-SVC-WDP22YZC5S6MZWYX -m comment --comment \"default/netcat -\u003e 10.244.0.4:8080\" -j KUBE-SEP-XPTUC4FRAFEFDBGF\r\n"} +{"Time":"2023-05-31T19:41:16.277927782Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:41:16.277931635Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Completed on Wed May 31 19:41:10 2023\r\n"} +{"Time":"2023-05-31T19:41:16.277934979Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:41:10 2023\r\n"} +{"Time":"2023-05-31T19:41:16.277938213Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" *mangle\r\n"} +{"Time":"2023-05-31T19:41:16.277941357Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :PREROUTING ACCEPT [20950:56323829]\r\n"} +{"Time":"2023-05-31T19:41:16.277944554Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :INPUT ACCEPT [20900:56320049]\r\n"} +{"Time":"2023-05-31T19:41:16.277947644Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :FORWARD ACCEPT [46:3620]\r\n"} +{"Time":"2023-05-31T19:41:16.27795086Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :OUTPUT ACCEPT [19311:6505289]\r\n"} +{"Time":"2023-05-31T19:41:16.277954108Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :POSTROUTING ACCEPT [19357:6508909]\r\n"} +{"Time":"2023-05-31T19:41:16.277957239Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-IPTABLES-HINT - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277960444Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.27796355Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277966841Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:41:16.277969862Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Completed on Wed May 31 19:41:10 2023\r\n"} +{"Time":"2023-05-31T19:41:16.277973278Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Generated by iptables-save v1.8.6 on Wed May 31 19:41:10 2023\r\n"} +{"Time":"2023-05-31T19:41:16.277976494Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" *filter\r\n"} +{"Time":"2023-05-31T19:41:16.277979744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :INPUT ACCEPT [6601:1330130]\r\n"} +{"Time":"2023-05-31T19:41:16.277982884Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :FORWARD ACCEPT [15:849]\r\n"} +{"Time":"2023-05-31T19:41:16.277986108Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :OUTPUT ACCEPT [6474:1644260]\r\n"} +{"Time":"2023-05-31T19:41:16.277989707Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-EXTERNAL-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277993251Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277996634Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-FORWARD - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.277999958Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-KUBELET-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.278003177Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-NODEPORTS - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.278006534Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-PROXY-CANARY - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.278009809Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-PROXY-FIREWALL - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.278013128Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" :KUBE-SERVICES - [0:0]\r\n"} +{"Time":"2023-05-31T19:41:16.278016564Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:41:16.278020361Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A INPUT -m comment --comment \"kubernetes health check service ports\" -j KUBE-NODEPORTS\r\n"} +{"Time":"2023-05-31T19:41:16.278024122Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A INPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:41:16.278027543Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A INPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:41:16.278030933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:41:16.278036129Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -m comment --comment \"kubernetes forwarding rules\" -j KUBE-FORWARD\r\n"} +{"Time":"2023-05-31T19:41:16.278039932Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:41:16.278043813Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A FORWARD -m conntrack --ctstate NEW -m comment --comment \"kubernetes externally-visible service portals\" -j KUBE-EXTERNAL-SERVICES\r\n"} +{"Time":"2023-05-31T19:41:16.278047617Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes load balancer firewall\" -j KUBE-PROXY-FIREWALL\r\n"} +{"Time":"2023-05-31T19:41:16.278051284Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -m conntrack --ctstate NEW -m comment --comment \"kubernetes service portals\" -j KUBE-SERVICES\r\n"} +{"Time":"2023-05-31T19:41:16.278054776Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A OUTPUT -j KUBE-FIREWALL\r\n"} +{"Time":"2023-05-31T19:41:16.278058288Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-FIREWALL ! -s 127.0.0.0/8 -d 127.0.0.0/8 -m comment --comment \"block incoming localnet connections\" -m conntrack ! --ctstate RELATED,ESTABLISHED,DNAT -j DROP\r\n"} +{"Time":"2023-05-31T19:41:16.278062117Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-FORWARD -m conntrack --ctstate INVALID -j DROP\r\n"} +{"Time":"2023-05-31T19:41:16.278065999Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding rules\" -m mark --mark 0x4000/0x4000 -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:41:16.27806972Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -A KUBE-FORWARD -m comment --comment \"kubernetes forwarding conntrack rule\" -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT\r\n"} +{"Time":"2023-05-31T19:41:16.27807311Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" COMMIT\r\n"} +{"Time":"2023-05-31T19:41:16.278076956Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Completed on Wed May 31 19:41:10 2023\r\n"} +{"Time":"2023-05-31T19:41:16.278080052Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.278083191Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.278086521Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T19:41:16.278089999Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain PREROUTING (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:41:16.278093784Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278097608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 63 4144 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:41:16.278102737Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278106092Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain INPUT (policy ACCEPT 37 packets, 2220 bytes)\r\n"} +{"Time":"2023-05-31T19:41:16.278109535Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278113038Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278117876Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain OUTPUT (policy ACCEPT 46 packets, 2776 bytes)\r\n"} +{"Time":"2023-05-31T19:41:16.278121212Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278124945Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 126 7622 KUBE-SERVICES all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service portals */\r\n"} +{"Time":"2023-05-31T19:41:16.27812833Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278131568Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain POSTROUTING (policy ACCEPT 46 packets, 2776 bytes)\r\n"} +{"Time":"2023-05-31T19:41:16.278135186Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278138901Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 139 8612 KUBE-POSTROUTING all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes postrouting rules */\r\n"} +{"Time":"2023-05-31T19:41:16.278142805Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 3 230 CNI-07719fc6e744c2033f38e9a8 all -- * * 10.244.0.2 0.0.0.0/0 /* name: \"bridge\" id: \"f2e48c35a56990e0f7844a58be6ccb274063e417c9b3f51ce75f38d6eec84c3a\" */\r\n"} +{"Time":"2023-05-31T19:41:16.278146897Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 9 675 CNI-4037589da83377ce90c24bf0 all -- * * 10.244.0.4 0.0.0.0/0 /* name: \"bridge\" id: \"1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c\" */\r\n"} +{"Time":"2023-05-31T19:41:16.278150633Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278153907Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain CNI-07719fc6e744c2033f38e9a8 (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278157492Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278161349Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"f2e48c35a56990e0f7844a58be6ccb274063e417c9b3f51ce75f38d6eec84c3a\" */\r\n"} +{"Time":"2023-05-31T19:41:16.278165629Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 3 230 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"f2e48c35a56990e0f7844a58be6ccb274063e417c9b3f51ce75f38d6eec84c3a\" */\r\n"} +{"Time":"2023-05-31T19:41:16.278169357Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278172599Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain CNI-4037589da83377ce90c24bf0 (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278176084Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278180099Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 9 675 ACCEPT all -- * * 0.0.0.0/0 10.244.0.0/16 /* name: \"bridge\" id: \"1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c\" */\r\n"} +{"Time":"2023-05-31T19:41:16.278184276Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 MASQUERADE all -- * * 0.0.0.0/0 !224.0.0.0/4 /* name: \"bridge\" id: \"1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c\" */\r\n"} +{"Time":"2023-05-31T19:41:16.278187866Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278191091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-KUBELET-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:41:16.27819456Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278197752Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278200916Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-MARK-MASQ (10 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278204256Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278207796Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK or 0x4000\r\n"} +{"Time":"2023-05-31T19:41:16.278211128Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278214948Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-NODEPORTS (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278218343Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278221643Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278224838Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-POSTROUTING (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278228257Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278231719Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 55 3451 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 mark match ! 0x4000/0x4000\r\n"} +{"Time":"2023-05-31T19:41:16.278235301Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 MARK all -- * * 0.0.0.0/0 0.0.0.0/0 MARK xor 0x4000\r\n"} +{"Time":"2023-05-31T19:41:16.278240195Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service traffic requiring SNAT */ random-fully\r\n"} +{"Time":"2023-05-31T19:41:16.278243533Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278246701Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-PROXY-CANARY (0 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278250073Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278253279Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278256416Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-6RNM4WNZ6V67EHO7 (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278259749Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278265009Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ all -- * * 192.168.39.43 0.0.0.0/0 /* default/kubernetes:https */\r\n"} +{"Time":"2023-05-31T19:41:16.27826868Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 3 180 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https */ tcp to:192.168.39.43:8443\r\n"} +{"Time":"2023-05-31T19:41:16.278274206Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278277528Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-IT2ZTR26TO4XFPTO (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278281036Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278284823Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */\r\n"} +{"Time":"2023-05-31T19:41:16.278288979Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp */ tcp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:41:16.278292447Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.27829572Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-N4G2XR5TDX7PQE7P (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278299348Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278303001Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:metrics */\r\n"} +{"Time":"2023-05-31T19:41:16.278307489Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics */ tcp to:10.244.0.2:9153\r\n"} +{"Time":"2023-05-31T19:41:16.278310954Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278314118Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-XPTUC4FRAFEFDBGF (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278317603Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278321418Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-MARK-MASQ all -- * * 10.244.0.4 0.0.0.0/0 /* default/netcat */\r\n"} +{"Time":"2023-05-31T19:41:16.278324995Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 DNAT tcp -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat */ tcp to:10.244.0.4:8080\r\n"} +{"Time":"2023-05-31T19:41:16.2783285Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278331656Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SEP-YIL6JZP7A3QYXJU2 (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278336218Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278354077Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ all -- * * 10.244.0.2 0.0.0.0/0 /* kube-system/kube-dns:dns */\r\n"} +{"Time":"2023-05-31T19:41:16.278360649Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 8 615 DNAT udp -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns */ udp to:10.244.0.2:53\r\n"} +{"Time":"2023-05-31T19:41:16.278364113Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.27836736Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SERVICES (2 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278370779Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.27837473Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-SVC-JD5MR3NA4I4DYORP tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:41:16.27837866Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-SVC-WDP22YZC5S6MZWYX tcp -- * * 0.0.0.0/0 10.103.29.180 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:41:16.278382584Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-SVC-NPX46M4PTMTKRN6Y tcp -- * * 0.0.0.0/0 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:41:16.278386494Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 8 615 KUBE-SVC-TCOU7JCQXEZGVUNU udp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:41:16.278390478Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-SVC-ERIFXISQEP7F7OF4 tcp -- * * 0.0.0.0/0 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:41:16.278395946Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 80 4800 KUBE-NODEPORTS all -- * * 0.0.0.0/0 0.0.0.0/0 /* kubernetes service nodeports; NOTE: this must be the last rule in this chain */ ADDRTYPE match dst-type LOCAL\r\n"} +{"Time":"2023-05-31T19:41:16.278399613Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278402891Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-ERIFXISQEP7F7OF4 (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278406416Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.27841012Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns-tcp cluster IP */ tcp dpt:53\r\n"} +{"Time":"2023-05-31T19:41:16.278414116Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-SEP-IT2ZTR26TO4XFPTO all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns-tcp -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:41:16.278417676Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278420721Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-JD5MR3NA4I4DYORP (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278424266Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278428506Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:metrics cluster IP */ tcp dpt:9153\r\n"} +{"Time":"2023-05-31T19:41:16.278433263Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-SEP-N4G2XR5TDX7PQE7P all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:metrics -\u003e 10.244.0.2:9153 */\r\n"} +{"Time":"2023-05-31T19:41:16.278437943Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278441256Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-NPX46M4PTMTKRN6Y (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278444763Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278448627Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.96.0.1 /* default/kubernetes:https cluster IP */ tcp dpt:443\r\n"} +{"Time":"2023-05-31T19:41:16.278452547Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 3 180 KUBE-SEP-6RNM4WNZ6V67EHO7 all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/kubernetes:https -\u003e 192.168.39.43:8443 */\r\n"} +{"Time":"2023-05-31T19:41:16.278456106Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278459435Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-TCOU7JCQXEZGVUNU (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278462925Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278470925Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ udp -- * * !10.244.0.0/16 10.96.0.10 /* kube-system/kube-dns:dns cluster IP */ udp dpt:53\r\n"} +{"Time":"2023-05-31T19:41:16.278474841Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 8 615 KUBE-SEP-YIL6JZP7A3QYXJU2 all -- * * 0.0.0.0/0 0.0.0.0/0 /* kube-system/kube-dns:dns -\u003e 10.244.0.2:53 */\r\n"} +{"Time":"2023-05-31T19:41:16.2784783Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.278481641Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Chain KUBE-SVC-WDP22YZC5S6MZWYX (1 references)\r\n"} +{"Time":"2023-05-31T19:41:16.278485071Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pkts bytes target prot opt in out source destination \r\n"} +{"Time":"2023-05-31T19:41:16.278488868Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 0 0 KUBE-MARK-MASQ tcp -- * * !10.244.0.0/16 10.103.29.180 /* default/netcat cluster IP */ tcp dpt:8080\r\n"} +{"Time":"2023-05-31T19:41:16.278492848Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 1 60 KUBE-SEP-XPTUC4FRAFEFDBGF all -- * * 0.0.0.0/0 0.0.0.0/0 /* default/netcat -\u003e 10.244.0.4:8080 */\r\n"} +{"Time":"2023-05-31T19:41:16.278496435Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.278499479Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.278502787Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T19:41:16.27855268Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.278565469Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Selector: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.278569583Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selector: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:41:16.278573051Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.278576688Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: deprecated.daemonset.template.generation: 1\n"} +{"Time":"2023-05-31T19:41:16.278580521Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Desired Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:41:16.278584667Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Current Number of Nodes Scheduled: 1\n"} +{"Time":"2023-05-31T19:41:16.278588574Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Number of Nodes Scheduled with Up-to-date Pods: 1\n"} +{"Time":"2023-05-31T19:41:16.278592765Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Number of Nodes Scheduled with Available Pods: 1\n"} +{"Time":"2023-05-31T19:41:16.278596181Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Number of Nodes Misscheduled: 0\n"} +{"Time":"2023-05-31T19:41:16.278599989Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Pods Status: 1 Running / 0 Waiting / 0 Succeeded / 0 Failed\n"} +{"Time":"2023-05-31T19:41:16.278603505Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Pod Template:\n"} +{"Time":"2023-05-31T19:41:16.278606894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.278610714Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.278614438Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T19:41:16.278617546Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:41:16.278621229Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:41:16.278624814Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.278628794Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.278636562Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T19:41:16.278639996Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.278643642Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:41:16.27864692Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:41:16.278650341Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment:\n"} +{"Time":"2023-05-31T19:41:16.278836671Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:41:16.278841794Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:41:16.278845555Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:41:16.27884943Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:41:16.278853659Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:41:16.278857224Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:41:16.278861583Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:41:16.27886518Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:41:16.278868767Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.278872191Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:41:16.278875874Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:41:16.278879418Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:41:16.278882985Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:41:16.278886937Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:41:16.278890405Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:41:16.278894081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:41:16.278897723Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:41:16.278901397Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:41:16.278904854Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:41:16.278908574Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T19:41:16.278912117Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:41:16.278917571Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:41:16.278921695Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal SuccessfulCreate 64s daemonset-controller Created pod: kube-proxy-nhbhc\n"} +{"Time":"2023-05-31T19:41:16.279211563Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.279217718Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.279221166Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T19:41:16.279225009Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-proxy-nhbhc\n"} +{"Time":"2023-05-31T19:41:16.279229153Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.279232694Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority: 2000001000\n"} +{"Time":"2023-05-31T19:41:16.279236804Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Priority Class Name: system-node-critical\n"} +{"Time":"2023-05-31T19:41:16.27924036Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Service Account: kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.279243903Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node: enable-default-cni-509041/192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.279247328Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Start Time: Wed, 31 May 2023 19:40:06 +0000\n"} +{"Time":"2023-05-31T19:41:16.279250855Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Labels: controller-revision-hash=8bdf7b6c\n"} +{"Time":"2023-05-31T19:41:16.279254425Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" k8s-app=kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.279257916Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod-template-generation=1\n"} +{"Time":"2023-05-31T19:41:16.279261215Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.279264763Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Status: Running\n"} +{"Time":"2023-05-31T19:41:16.279268033Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.279271168Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IPs:\n"} +{"Time":"2023-05-31T19:41:16.279274326Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP: 192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.27927757Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Controlled By: DaemonSet/kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.27928102Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Containers:\n"} +{"Time":"2023-05-31T19:41:16.279284512Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:41:16.279288336Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Container ID: containerd://0256c9d774cd7dd593d1541d7be33a49f9ff46732c0f12028ccfeb6359e6810c\n"} +{"Time":"2023-05-31T19:41:16.27929219Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T19:41:16.279568175Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Image ID: registry.k8s.io/kube-proxy@sha256:1e4f13f5f5c215813fb9c9c6f56da1c0354363f2a69bd12732658f79d585864f\n"} +{"Time":"2023-05-31T19:41:16.279572806Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.279576165Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T19:41:16.279579881Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Command:\n"} +{"Time":"2023-05-31T19:41:16.279583119Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /usr/local/bin/kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.279586608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --config=/var/lib/kube-proxy/config.conf\n"} +{"Time":"2023-05-31T19:41:16.279590068Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --hostname-override=$(NODE_NAME)\n"} +{"Time":"2023-05-31T19:41:16.279593324Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" State: Running\n"} +{"Time":"2023-05-31T19:41:16.279596936Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Started: Wed, 31 May 2023 19:40:08 +0000\n"} +{"Time":"2023-05-31T19:41:16.279600453Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready: True\n"} +{"Time":"2023-05-31T19:41:16.279603711Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart Count: 0\n"} +{"Time":"2023-05-31T19:41:16.279607088Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment:\n"} +{"Time":"2023-05-31T19:41:16.27961033Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" NODE_NAME: (v1:spec.nodeName)\n"} +{"Time":"2023-05-31T19:41:16.279613118Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Mounts:\n"} +{"Time":"2023-05-31T19:41:16.279616612Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /lib/modules from lib-modules (ro)\n"} +{"Time":"2023-05-31T19:41:16.279619801Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /run/xtables.lock from xtables-lock (rw)\n"} +{"Time":"2023-05-31T19:41:16.279623243Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/lib/kube-proxy from kube-proxy (rw)\n"} +{"Time":"2023-05-31T19:41:16.27962676Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-zp7wv (ro)\n"} +{"Time":"2023-05-31T19:41:16.27963012Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Conditions:\n"} +{"Time":"2023-05-31T19:41:16.279633648Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Status\n"} +{"Time":"2023-05-31T19:41:16.279637081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Initialized True \n"} +{"Time":"2023-05-31T19:41:16.279640231Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Ready True \n"} +{"Time":"2023-05-31T19:41:16.279646158Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ContainersReady True \n"} +{"Time":"2023-05-31T19:41:16.279884484Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T19:41:16.279888653Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Volumes:\n"} +{"Time":"2023-05-31T19:41:16.279891997Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-proxy:\n"} +{"Time":"2023-05-31T19:41:16.279895794Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: ConfigMap (a volume populated by a ConfigMap)\n"} +{"Time":"2023-05-31T19:41:16.279899329Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Name: kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.279902614Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Optional: false\n"} +{"Time":"2023-05-31T19:41:16.279905997Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" xtables-lock:\n"} +{"Time":"2023-05-31T19:41:16.279909294Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:41:16.279912533Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /run/xtables.lock\n"} +{"Time":"2023-05-31T19:41:16.279915789Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: FileOrCreate\n"} +{"Time":"2023-05-31T19:41:16.279919004Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" lib-modules:\n"} +{"Time":"2023-05-31T19:41:16.279922577Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T19:41:16.27992595Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Path: /lib/modules\n"} +{"Time":"2023-05-31T19:41:16.2799291Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" HostPathType: \n"} +{"Time":"2023-05-31T19:41:16.279932229Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-api-access-zp7wv:\n"} +{"Time":"2023-05-31T19:41:16.279935629Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T19:41:16.279938994Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T19:41:16.279942217Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:41:16.27994543Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T19:41:16.279948909Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T19:41:16.279960743Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T19:41:16.279964136Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Node-Selectors: kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T19:41:16.27996727Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tolerations: op=Exists\n"} +{"Time":"2023-05-31T19:41:16.279971228Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/disk-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:41:16.280225253Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/memory-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:41:16.280229418Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/network-unavailable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:41:16.280233233Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/not-ready:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:41:16.280236734Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/pid-pressure:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:41:16.28024027Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists\n"} +{"Time":"2023-05-31T19:41:16.280245412Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" node.kubernetes.io/unschedulable:NoSchedule op=Exists\n"} +{"Time":"2023-05-31T19:41:16.280248925Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Events:\n"} +{"Time":"2023-05-31T19:41:16.28025216Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T19:41:16.280255496Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T19:41:16.28025901Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Scheduled 64s default-scheduler Successfully assigned kube-system/kube-proxy-nhbhc to enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.280263095Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Pulled 63s kubelet Container image \"registry.k8s.io/kube-proxy:v1.27.2\" already present on machine\n"} +{"Time":"2023-05-31T19:41:16.280266804Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Created 63s kubelet Created container kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.28027101Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Normal Started 62s kubelet Started container kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.280275674Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.280278733Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.280282472Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T19:41:16.280286022Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.288533 1 node.go:141] Successfully retrieved node IP: 192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.28028954Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.288634 1 server_others.go:110] \"Detected node IP\" address=\"192.168.39.43\"\n"} +{"Time":"2023-05-31T19:41:16.280293436Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.288656 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T19:41:16.280296964Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.490775 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T19:41:16.280501187Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.490818 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T19:41:16.280505947Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.490845 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T19:41:16.280510091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.491309 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T19:41:16.280513829Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.491320 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T19:41:16.280517687Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.493178 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T19:41:16.280521528Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.493291 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T19:41:16.280525095Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.493313 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T19:41:16.280528699Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.493316 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T19:41:16.280532834Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.493637 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T19:41:16.280536448Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.493641 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T19:41:16.280541114Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.593441 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T19:41:16.280544711Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.593564 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T19:41:16.280560816Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" I0531 19:40:08.593719 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T19:41:16.280564469Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.280567448Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.280570561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T19:41:16.280574144Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;32m●\u001b[0m kubelet.service - kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:41:16.280578942Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: loaded (\u001b]8;;file://enable-default-cni-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007; disabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:41:16.28078145Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Drop-In: /etc/systemd/system/kubelet.service.d\r\n"} +{"Time":"2023-05-31T19:41:16.280786531Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─\u001b]8;;file://enable-default-cni-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u000710-kubeadm.conf\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:41:16.280790812Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:52 UTC; 1min 18s ago\r\n"} +{"Time":"2023-05-31T19:41:16.280794684Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docs: \u001b]8;;http://kubernetes.io/docs/\u0007http://kubernetes.io/docs/\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:41:16.280798386Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Main PID: 1225 (kubelet)\r\n"} +{"Time":"2023-05-31T19:41:16.280801517Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tasks: 15 (limit: 3251)\r\n"} +{"Time":"2023-05-31T19:41:16.280804755Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Memory: 33.0M\r\n"} +{"Time":"2023-05-31T19:41:16.2808081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CGroup: /system.slice/kubelet.service\r\n"} +{"Time":"2023-05-31T19:41:16.280812483Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─1225 /var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=enable-default-cni-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.39.43\r\n"} +{"Time":"2023-05-31T19:41:16.280817194Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.28082176Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:16 enable-default-cni-509041 kubelet[1225]: I0531 19:40:16.484560 1225 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:containerd ID:4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83} err=\"failed to get container status \\\"4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83\\\": rpc error: code = NotFound desc = an error occurred when try to find container \\\"4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83\\\": not found\"\r\n"} +{"Time":"2023-05-31T19:41:16.280827708Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:18 enable-default-cni-509041 kubelet[1225]: I0531 19:40:18.569364 1225 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=320ba50d-cf66-4582-941d-ed4f8ee33fca path=\"/var/lib/kubelet/pods/320ba50d-cf66-4582-941d-ed4f8ee33fca/volumes\"\r\n"} +{"Time":"2023-05-31T19:41:16.280832513Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:49 enable-default-cni-509041 kubelet[1225]: I0531 19:40:49.474450 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.280836635Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:49 enable-default-cni-509041 kubelet[1225]: E0531 19:40:49.475065 1225 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"320ba50d-cf66-4582-941d-ed4f8ee33fca\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T19:41:16.281031738Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:49 enable-default-cni-509041 kubelet[1225]: I0531 19:40:49.475367 1225 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"320ba50d-cf66-4582-941d-ed4f8ee33fca\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T19:41:16.281060304Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:49 enable-default-cni-509041 kubelet[1225]: I0531 19:40:49.590689 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-xzksq\\\" (UniqueName: \\\"kubernetes.io/projected/c3df56c0-fd70-4363-9467-9f420555d978-kube-api-access-xzksq\\\") pod \\\"netcat-7458db8b8-pffgl\\\" (UID: \\\"c3df56c0-fd70-4363-9467-9f420555d978\\\") \" pod=\"default/netcat-7458db8b8-pffgl\"\r\n"} +{"Time":"2023-05-31T19:41:16.281067272Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 kubelet[1225]: E0531 19:40:52.654562 1225 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:41:16.281076445Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 kubelet[1225]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:41:16.281080633Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 kubelet[1225]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:41:16.281084247Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 kubelet[1225]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:41:16.281090082Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.281093718Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.281097099Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T19:41:16.281101127Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-509041/usr/lib/systemd/system/kubelet.service\u0007/usr/lib/systemd/system/kubelet.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.281105486Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:41:16.281108518Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=kubelet: The Kubernetes Node Agent\r\n"} +{"Time":"2023-05-31T19:41:16.281111612Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=http://kubernetes.io/docs/\r\n"} +{"Time":"2023-05-31T19:41:16.281116396Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitIntervalSec=0\r\n"} +{"Time":"2023-05-31T19:41:16.281119747Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.28112273Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:41:16.281375026Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet\r\n"} +{"Time":"2023-05-31T19:41:16.281379876Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:41:16.281382293Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Tuned for local dev: faster than upstream default (10s), but slower than systemd default (100ms)\r\n"} +{"Time":"2023-05-31T19:41:16.281384557Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RestartSec=600ms\r\n"} +{"Time":"2023-05-31T19:41:16.281386661Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.281388826Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:41:16.281390822Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:41:16.281393023Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.281395295Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-509041/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u0007/etc/systemd/system/kubelet.service.d/10-kubeadm.conf\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.281397915Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:41:16.281400058Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wants=containerd.service\r\n"} +{"Time":"2023-05-31T19:41:16.281402238Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.281404488Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:41:16.281406726Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=\r\n"} +{"Time":"2023-05-31T19:41:16.281409098Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///run/containerd/containerd.sock --hostname-override=enable-default-cni-509041 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.39.43\r\n"} +{"Time":"2023-05-31T19:41:16.281411745Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.281413663Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:41:16.281415621Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.281417473Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.281419557Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T19:41:16.281421992Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -- Journal begins at Wed 2023-05-31 19:39:14 UTC, ends at Wed 2023-05-31 19:41:11 UTC. --\r\n"} +{"Time":"2023-05-31T19:41:16.281424145Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:41:16.281662026Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.28166586Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.281668406Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.281670995Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.281673239Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.281675598Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.281678087Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 548.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.281680682Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:41:16.281684555Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.728302 865 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:41:16.281688518Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.728480 865 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:41:16.281693032Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.728777 865 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:41:16.281698067Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.733862 865 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.281703276Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.733945 865 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:41:16.281707475Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.737059 865 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:41:16.281972231Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.737595 865 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:41:16.281979413Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.737686 865 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:41:16.281988874Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.737748 865 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:41:16.281993919Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.737784 865 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:41:16.281998181Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.737872 865 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:41:16.282002424Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.742927 865 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:41:16.282006446Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.743034 865 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:41:16.282010501Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.743091 865 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:41:16.282014311Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.743133 865 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:41:16.282018661Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.744748 865 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:41:16.282249906Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: W0531 19:39:43.745090 865 probe.go:268] Flexvolume plugin directory at /usr/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.\r\n"} +{"Time":"2023-05-31T19:41:16.282255882Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.745614 865 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:41:16.282260323Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: W0531 19:39:43.745835 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.282265858Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.745927 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.282270966Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.748453 865 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:41:16.282274855Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.751313 865 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:41:16.282281075Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.754399 865 event.go:289] Unable to write event: '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"enable-default-cni-509041.176451b1980f287e\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Node\", Namespace:\"\", Name:\"enable-default-cni-509041\", UID:\"enable-default-cni-509041\", APIVersion:\"\", ResourceVersion:\"\", FieldPath:\"\"}, Reason:\"Starting\", Message:\"Starting kubelet.\", Source:v1.EventSource{Component:\"kubelet\", Host:\"enable-default-cni-509041\"}, FirstTimestamp:time.Date(2023, time.May, 31, "} +{"Time":"2023-05-31T19:41:16.282290448Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"19, 39, 43, 745599614, time.Local), LastTimestamp:time.Date(2023, time.May, 31, 19, 39, 43, 745599614, time.Local), Count:1, Type:\"Normal\", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'Post \"https://control-plane.minikube.internal:8443/api/v1/namespaces/default/events\": dial tcp 192.168.39.43:8443: connect: connection refused'(may retry after sleeping)\r\n"} +{"Time":"2023-05-31T19:41:16.282547651Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: W0531 19:39:43.754799 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Denable-default-cni-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.28255746Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.754865 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Denable-default-cni-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.282562174Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.754899 865 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:41:16.282566772Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.755812 865 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:41:16.282570751Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.757867 865 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:41:16.282574665Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.757965 865 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:41:16.282579295Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: W0531 19:39:43.758573 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.282585346Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.758647 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.282590057Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.759183 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/enable-default-cni-509041?timeout=10s\\\": dial tcp 192.168.39.43:8443: connect: connection refused\" interval=\"200ms\"\r\n"} +{"Time":"2023-05-31T19:41:16.282858187Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.783178 865 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:41:16.282868382Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.783487 865 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:41:16.282873334Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.783605 865 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:41:16.282877169Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.790048 865 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:41:16.282881289Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.791325 865 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:41:16.28288523Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.791507 865 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:41:16.282888988Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.794196 865 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:41:16.282892978Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.799305 865 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:41:16.282896588Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.799325 865 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:41:16.2829002Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.799346 865 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:41:16.28290396Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.799385 865 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:41:16.282908448Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: W0531 19:39:43.800891 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.283111909Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.800956 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.283120612Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.803874 865 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:41:16.283125442Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.804421 865 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:41:16.283129142Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.808164 865 eviction_manager.go:262] \"Eviction manager: failed to get summary stats\" err=\"failed to get node info: node \\\"enable-default-cni-509041\\\" not found\"\r\n"} +{"Time":"2023-05-31T19:41:16.283133785Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.813356 865 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:41:16.283137747Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:41:16.283141902Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:41:16.28314566Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:41:16.283149506Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.860059 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283153798Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.860603 865 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.39.43:8443: connect: connection refused\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283158469Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.899703 865 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.28338692Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.900881 865 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.283392954Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.902760 865 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.283396997Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.905070 865 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.283401258Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: I0531 19:39:43.959167 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/d467f37fc895e6c162185a2ac18f4f0d-etcd-certs\\\") pod \\\"etcd-enable-default-cni-509041\\\" (UID: \\\"d467f37fc895e6c162185a2ac18f4f0d\\\") \" pod=\"kube-system/etcd-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283406726Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:43 enable-default-cni-509041 kubelet[865]: E0531 19:39:43.960769 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/enable-default-cni-509041?timeout=10s\\\": dial tcp 192.168.39.43:8443: connect: connection refused\" interval=\"400ms\"\r\n"} +{"Time":"2023-05-31T19:41:16.283412234Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060371 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/213c4720b0499fe086c468097563a9b0-ca-certs\\\") pod \\\"kube-apiserver-enable-default-cni-509041\\\" (UID: \\\"213c4720b0499fe086c468097563a9b0\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283418103Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060426 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/213c4720b0499fe086c468097563a9b0-k8s-certs\\\") pod \\\"kube-apiserver-enable-default-cni-509041\\\" (UID: \\\"213c4720b0499fe086c468097563a9b0\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283423532Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060455 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-k8s-certs\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283431848Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060482 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283756782Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060521 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/d467f37fc895e6c162185a2ac18f4f0d-etcd-data\\\") pod \\\"etcd-enable-default-cni-509041\\\" (UID: \\\"d467f37fc895e6c162185a2ac18f4f0d\\\") \" pod=\"kube-system/etcd-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283767458Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060542 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/213c4720b0499fe086c468097563a9b0-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-enable-default-cni-509041\\\" (UID: \\\"213c4720b0499fe086c468097563a9b0\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283773499Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060561 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-ca-certs\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283781338Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060614 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-flexvolume-dir\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283786759Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060638 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-kubeconfig\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.283792015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.060660 865 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/98259d46e5f2778c9738304bf890d580-kubeconfig\\\") pod \\\"kube-scheduler-enable-default-cni-509041\\\" (UID: \\\"98259d46e5f2778c9738304bf890d580\\\") \" pod=\"kube-system/kube-scheduler-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284109417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.061663 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284113726Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: E0531 19:39:44.062046 865 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.39.43:8443: connect: connection refused\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284117902Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: E0531 19:39:44.362093 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/enable-default-cni-509041?timeout=10s\\\": dial tcp 192.168.39.43:8443: connect: connection refused\" interval=\"800ms\"\r\n"} +{"Time":"2023-05-31T19:41:16.284120941Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: I0531 19:39:44.467587 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284123893Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: E0531 19:39:44.468937 865 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.39.43:8443: connect: connection refused\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284127015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: W0531 19:39:44.609439 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Denable-default-cni-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.28413026Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: E0531 19:39:44.609504 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://control-plane.minikube.internal:8443/api/v1/nodes?fieldSelector=metadata.name%3Denable-default-cni-509041\u0026limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.28413455Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: W0531 19:39:44.876727 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.284447981Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:44 enable-default-cni-509041 kubelet[865]: E0531 19:39:44.876780 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://control-plane.minikube.internal:8443/api/v1/services?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.284454576Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:45 enable-default-cni-509041 kubelet[865]: E0531 19:39:45.162589 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"Get \\\"https://control-plane.minikube.internal:8443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/enable-default-cni-509041?timeout=10s\\\": dial tcp 192.168.39.43:8443: connect: connection refused\" interval=\"1.6s\"\r\n"} +{"Time":"2023-05-31T19:41:16.284458136Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:45 enable-default-cni-509041 kubelet[865]: W0531 19:39:45.240708 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.284461294Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:45 enable-default-cni-509041 kubelet[865]: E0531 19:39:45.240756 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://control-plane.minikube.internal:8443/apis/storage.k8s.io/v1/csidrivers?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.284464196Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:45 enable-default-cni-509041 kubelet[865]: I0531 19:39:45.270681 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284467689Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:45 enable-default-cni-509041 kubelet[865]: E0531 19:39:45.270974 865 kubelet_node_status.go:92] \"Unable to register node with API server\" err=\"Post \\\"https://control-plane.minikube.internal:8443/api/v1/nodes\\\": dial tcp 192.168.39.43:8443: connect: connection refused\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284471434Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:45 enable-default-cni-509041 kubelet[865]: W0531 19:39:45.286433 865 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.284474391Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:45 enable-default-cni-509041 kubelet[865]: E0531 19:39:45.286481 865 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://control-plane.minikube.internal:8443/apis/node.k8s.io/v1/runtimeclasses?limit=500\u0026resourceVersion=0\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.284822911Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:45 enable-default-cni-509041 kubelet[865]: E0531 19:39:45.741948 865 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://control-plane.minikube.internal:8443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 192.168.39.43:8443: connect: connection refused\r\n"} +{"Time":"2023-05-31T19:41:16.284830904Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:46 enable-default-cni-509041 kubelet[865]: I0531 19:39:46.873136 865 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284834991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:49 enable-default-cni-509041 kubelet[865]: I0531 19:39:49.181376 865 kubelet_node_status.go:73] \"Successfully registered node\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.284839029Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:49 enable-default-cni-509041 kubelet[865]: E0531 19:39:49.265800 865 controller.go:146] \"Failed to ensure lease exists, will retry\" err=\"namespaces \\\"kube-node-lease\\\" not found\" interval=\"3.2s\"\r\n"} +{"Time":"2023-05-31T19:41:16.284843509Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:49 enable-default-cni-509041 kubelet[865]: I0531 19:39:49.748579 865 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:41:16.284847337Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:49 enable-default-cni-509041 kubelet[865]: I0531 19:39:49.758811 865 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:41:16.284851424Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:49 enable-default-cni-509041 kubelet[865]: I0531 19:39:49.802598 865 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:41:16.284855805Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[865]: I0531 19:39:52.190851 865 dynamic_cafile_content.go:171] \"Shutting down controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:41:16.284860131Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 systemd[1]: Stopping kubelet: The Kubernetes Node Agent...\r\n"} +{"Time":"2023-05-31T19:41:16.284864146Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has begun execution\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.284868439Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.284872709Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285168696Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285172902Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has begun execution.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.28517536Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285177673Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 603.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285180043Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 systemd[1]: kubelet.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:41:16.285182281Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: Unit succeeded\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.28518463Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285188754Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285191309Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285193598Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe unit kubelet.service has successfully entered the 'dead' state.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285196497Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 systemd[1]: Stopped kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:41:16.285199002Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A stop job for unit kubelet.service has finished\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285201427Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285203904Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.2852061Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285208387Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA stop job for unit kubelet.service has finished.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285211352Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285214842Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 603 and the job result is done.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285475463Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 systemd[1]: Started kubelet: The Kubernetes Node Agent.\r\n"} +{"Time":"2023-05-31T19:41:16.285478259Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSubject: A start job for unit kubelet.service has finished successfully\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285480733Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mDefined-By: systemd\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285483086Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mSupport: https://lists.freedesktop.org/mailman/listinfo/systemd-devel\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285485312Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285487813Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mA start job for unit kubelet.service has finished successfully.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285490363Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32m\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285492604Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;38;5;245m░░\u001b[0m \u001b[0;32mThe job identifier is 603.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.285510879Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.\r\n"} +{"Time":"2023-05-31T19:41:16.285514183Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.366096 1225 server.go:415] \"Kubelet version\" kubeletVersion=\"v1.27.2\"\r\n"} +{"Time":"2023-05-31T19:41:16.285516853Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.366337 1225 server.go:417] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\r\n"} +{"Time":"2023-05-31T19:41:16.285520546Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.366616 1225 server.go:837] \"Client rotation is on, will bootstrap in background\"\r\n"} +{"Time":"2023-05-31T19:41:16.285523412Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.368536 1225 certificate_store.go:130] Loading cert/key pair from \"/var/lib/kubelet/pki/kubelet-client-current.pem\".\r\n"} +{"Time":"2023-05-31T19:41:16.285526185Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.370380 1225 dynamic_cafile_content.go:157] \"Starting controller\" name=\"client-ca-bundle::/var/lib/minikube/certs/ca.crt\"\r\n"} +{"Time":"2023-05-31T19:41:16.28552888Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.374942 1225 server.go:662] \"--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /\"\r\n"} +{"Time":"2023-05-31T19:41:16.285779042Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.375552 1225 container_manager_linux.go:266] \"Container manager verified user specified cgroup-root exists\" cgroupRoot=[]\r\n"} +{"Time":"2023-05-31T19:41:16.285792012Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.375661 1225 container_manager_linux.go:271] \"Creating Container Manager object based on Node Config\" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:cgroupfs KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]}\r\n"} +{"Time":"2023-05-31T19:41:16.285798872Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.375728 1225 topology_manager.go:136] \"Creating topology manager with policy per scope\" topologyPolicyName=\"none\" topologyScopeName=\"container\"\r\n"} +{"Time":"2023-05-31T19:41:16.285803554Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.375767 1225 container_manager_linux.go:302] \"Creating device plugin manager\"\r\n"} +{"Time":"2023-05-31T19:41:16.285812464Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.375821 1225 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:41:16.285816467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.405377 1225 kubelet.go:405] \"Attempting to sync node with API server\"\r\n"} +{"Time":"2023-05-31T19:41:16.285820386Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.405505 1225 kubelet.go:298] \"Adding static pod path\" path=\"/etc/kubernetes/manifests\"\r\n"} +{"Time":"2023-05-31T19:41:16.285824586Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.405604 1225 kubelet.go:309] \"Adding apiserver pod source\"\r\n"} +{"Time":"2023-05-31T19:41:16.285828332Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.405672 1225 apiserver.go:42] \"Waiting for node sync before watching apiserver pods\"\r\n"} +{"Time":"2023-05-31T19:41:16.285832309Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.411830 1225 kuberuntime_manager.go:257] \"Container runtime initialized\" containerRuntime=\"containerd\" version=\"v1.7.1\" apiVersion=\"v1\"\r\n"} +{"Time":"2023-05-31T19:41:16.28600503Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.414025 1225 server.go:1168] \"Started kubelet\"\r\n"} +{"Time":"2023-05-31T19:41:16.286011816Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.422869 1225 fs_resource_analyzer.go:67] \"Starting FS ResourceAnalyzer\"\r\n"} +{"Time":"2023-05-31T19:41:16.286016041Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.431541 1225 server.go:162] \"Starting to listen\" address=\"0.0.0.0\" port=10250\r\n"} +{"Time":"2023-05-31T19:41:16.28602018Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.456899 1225 server.go:461] \"Adding debug handlers to kubelet server\"\r\n"} +{"Time":"2023-05-31T19:41:16.286024139Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.459342 1225 volume_manager.go:284] \"Starting Kubelet Volume Manager\"\r\n"} +{"Time":"2023-05-31T19:41:16.286027883Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.459355 1225 desired_state_of_world_populator.go:145] \"Desired state populator starts to run\"\r\n"} +{"Time":"2023-05-31T19:41:16.286031902Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.431589 1225 ratelimit.go:65] \"Setting rate limiting for podresources endpoint\" qps=100 burstTokens=10\r\n"} +{"Time":"2023-05-31T19:41:16.286035619Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.552005 1225 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv4\r\n"} +{"Time":"2023-05-31T19:41:16.286039324Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.565338 1225 kubelet_network_linux.go:63] \"Initialized iptables rules.\" protocol=IPv6\r\n"} +{"Time":"2023-05-31T19:41:16.286043653Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.565387 1225 status_manager.go:207] \"Starting to sync pod status with apiserver\"\r\n"} +{"Time":"2023-05-31T19:41:16.28604749Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.565408 1225 kubelet.go:2257] \"Starting kubelet main sync loop\"\r\n"} +{"Time":"2023-05-31T19:41:16.286052131Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: E0531 19:39:52.565470 1225 kubelet.go:2281] \"Skipping pod synchronization\" err=\"[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]\"\r\n"} +{"Time":"2023-05-31T19:41:16.286056682Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.575579 1225 kubelet_node_status.go:70] \"Attempting to register node\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.286262667Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.594017 1225 kubelet_node_status.go:108] \"Node was previously registered\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.28626956Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.599436 1225 kubelet_node_status.go:73] \"Successfully registered node\" node=\"enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.286273455Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: E0531 19:39:52.644356 1225 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:41:16.286277643Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:41:16.286281782Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:41:16.286285678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:41:16.286289575Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: E0531 19:39:52.666084 1225 kubelet.go:2281] \"Skipping pod synchronization\" err=\"container runtime status check may not have completed yet\"\r\n"} +{"Time":"2023-05-31T19:41:16.286293587Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.681515 1225 cpu_manager.go:214] \"Starting CPU manager\" policy=\"none\"\r\n"} +{"Time":"2023-05-31T19:41:16.286297657Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.681555 1225 cpu_manager.go:215] \"Reconciling\" reconcilePeriod=\"10s\"\r\n"} +{"Time":"2023-05-31T19:41:16.286301545Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.681571 1225 state_mem.go:36] \"Initialized new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:41:16.286305213Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.681685 1225 state_mem.go:88] \"Updated default CPUSet\" cpuSet=\"\"\r\n"} +{"Time":"2023-05-31T19:41:16.28630931Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.681702 1225 state_mem.go:96] \"Updated CPUSet assignments\" assignments=map[]\r\n"} +{"Time":"2023-05-31T19:41:16.286313578Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.681708 1225 policy_none.go:49] \"None policy: Start\"\r\n"} +{"Time":"2023-05-31T19:41:16.286594831Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.682830 1225 memory_manager.go:169] \"Starting memorymanager\" policy=\"None\"\r\n"} +{"Time":"2023-05-31T19:41:16.286601564Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.682887 1225 state_mem.go:35] \"Initializing new in-memory state store\"\r\n"} +{"Time":"2023-05-31T19:41:16.286605386Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.683045 1225 state_mem.go:75] \"Updated machine memory state\"\r\n"} +{"Time":"2023-05-31T19:41:16.286609414Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.684385 1225 manager.go:455] \"Failed to read data from checkpoint\" checkpoint=\"kubelet_internal_checkpoint\" err=\"checkpoint is not found\"\r\n"} +{"Time":"2023-05-31T19:41:16.286613708Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.689122 1225 plugin_manager.go:118] \"Starting Kubelet Plugin Manager\"\r\n"} +{"Time":"2023-05-31T19:41:16.286617649Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.695525 1225 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\r\n"} +{"Time":"2023-05-31T19:41:16.28662127Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.866451 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.286624796Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.866682 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.286628579Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.866747 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.286641428Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.866782 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.286645475Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: E0531 19:39:52.887168 1225 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-enable-default-cni-509041\\\" already exists\" pod=\"kube-system/etcd-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.28665041Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.898964 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/213c4720b0499fe086c468097563a9b0-ca-certs\\\") pod \\\"kube-apiserver-enable-default-cni-509041\\\" (UID: \\\"213c4720b0499fe086c468097563a9b0\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.286829537Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899042 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/213c4720b0499fe086c468097563a9b0-k8s-certs\\\") pod \\\"kube-apiserver-enable-default-cni-509041\\\" (UID: \\\"213c4720b0499fe086c468097563a9b0\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.286838883Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899084 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-kubeconfig\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.286842821Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899120 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.286849688Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899149 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/d467f37fc895e6c162185a2ac18f4f0d-etcd-certs\\\") pod \\\"etcd-enable-default-cni-509041\\\" (UID: \\\"d467f37fc895e6c162185a2ac18f4f0d\\\") \" pod=\"kube-system/etcd-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.286853192Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899179 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/d467f37fc895e6c162185a2ac18f4f0d-etcd-data\\\") pod \\\"etcd-enable-default-cni-509041\\\" (UID: \\\"d467f37fc895e6c162185a2ac18f4f0d\\\") \" pod=\"kube-system/etcd-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.286856633Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899321 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/213c4720b0499fe086c468097563a9b0-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-enable-default-cni-509041\\\" (UID: \\\"213c4720b0499fe086c468097563a9b0\\\") \" pod=\"kube-system/kube-apiserver-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.287019732Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899359 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-ca-certs\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.28703294Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899398 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-flexvolume-dir\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.287039283Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899423 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/b68447d33394b21209270ed9200aaa24-k8s-certs\\\") pod \\\"kube-controller-manager-enable-default-cni-509041\\\" (UID: \\\"b68447d33394b21209270ed9200aaa24\\\") \" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.287045048Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:52 enable-default-cni-509041 kubelet[1225]: I0531 19:39:52.899449 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/98259d46e5f2778c9738304bf890d580-kubeconfig\\\") pod \\\"kube-scheduler-enable-default-cni-509041\\\" (UID: \\\"98259d46e5f2778c9738304bf890d580\\\") \" pod=\"kube-system/kube-scheduler-enable-default-cni-509041\"\r\n"} +{"Time":"2023-05-31T19:41:16.287049831Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:53 enable-default-cni-509041 kubelet[1225]: I0531 19:39:53.420580 1225 apiserver.go:52] \"Watching apiserver\"\r\n"} +{"Time":"2023-05-31T19:41:16.28705504Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:53 enable-default-cni-509041 kubelet[1225]: I0531 19:39:53.478841 1225 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-enable-default-cni-509041\" podStartSLOduration=1.478725888 podCreationTimestamp=\"2023-05-31 19:39:52 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:53.477874087 +0000 UTC m=+1.251200197\" watchObservedRunningTime=\"2023-05-31 19:39:53.478725888 +0000 UTC m=+1.252051996\"\r\n"} +{"Time":"2023-05-31T19:41:16.287068815Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:53 enable-default-cni-509041 kubelet[1225]: I0531 19:39:53.496142 1225 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\r\n"} +{"Time":"2023-05-31T19:41:16.287185716Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:53 enable-default-cni-509041 kubelet[1225]: I0531 19:39:53.504575 1225 reconciler.go:41] \"Reconciler: start to sync state\"\r\n"} +{"Time":"2023-05-31T19:41:16.287191744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:53 enable-default-cni-509041 kubelet[1225]: I0531 19:39:53.507446 1225 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-enable-default-cni-509041\" podStartSLOduration=1.5060509309999999 podCreationTimestamp=\"2023-05-31 19:39:52 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:53.505958254 +0000 UTC m=+1.279284364\" watchObservedRunningTime=\"2023-05-31 19:39:53.506050931 +0000 UTC m=+1.279377036\"\r\n"} +{"Time":"2023-05-31T19:41:16.287198331Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:53 enable-default-cni-509041 kubelet[1225]: I0531 19:39:53.558758 1225 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-enable-default-cni-509041\" podStartSLOduration=1.5587137370000002 podCreationTimestamp=\"2023-05-31 19:39:52 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:53.528916391 +0000 UTC m=+1.302242519\" watchObservedRunningTime=\"2023-05-31 19:39:53.558713737 +0000 UTC m=+1.332039848\"\r\n"} +{"Time":"2023-05-31T19:41:16.287204581Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:53 enable-default-cni-509041 kubelet[1225]: I0531 19:39:53.661916 1225 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-enable-default-cni-509041\" podStartSLOduration=1.66188921 podCreationTimestamp=\"2023-05-31 19:39:52 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:39:53.559321026 +0000 UTC m=+1.332647160\" watchObservedRunningTime=\"2023-05-31 19:39:53.66188921 +0000 UTC m=+1.435215319\"\r\n"} +{"Time":"2023-05-31T19:41:16.287209704Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:06 enable-default-cni-509041 kubelet[1225]: I0531 19:40:06.927113 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.287213677Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:06 enable-default-cni-509041 kubelet[1225]: I0531 19:40:06.986832 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.287218303Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.048065 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"lib-modules\\\" (UniqueName: \\\"kubernetes.io/host-path/f82ceac2-8380-403e-a97b-1ccb4bfa44f1-lib-modules\\\") pod \\\"kube-proxy-nhbhc\\\" (UID: \\\"f82ceac2-8380-403e-a97b-1ccb4bfa44f1\\\") \" pod=\"kube-system/kube-proxy-nhbhc\"\r\n"} +{"Time":"2023-05-31T19:41:16.287225949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.048167 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-zp7wv\\\" (UniqueName: \\\"kubernetes.io/projected/f82ceac2-8380-403e-a97b-1ccb4bfa44f1-kube-api-access-zp7wv\\\") pod \\\"kube-proxy-nhbhc\\\" (UID: \\\"f82ceac2-8380-403e-a97b-1ccb4bfa44f1\\\") \" pod=\"kube-system/kube-proxy-nhbhc\"\r\n"} +{"Time":"2023-05-31T19:41:16.287358762Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.048275 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"xtables-lock\\\" (UniqueName: \\\"kubernetes.io/host-path/f82ceac2-8380-403e-a97b-1ccb4bfa44f1-xtables-lock\\\") pod \\\"kube-proxy-nhbhc\\\" (UID: \\\"f82ceac2-8380-403e-a97b-1ccb4bfa44f1\\\") \" pod=\"kube-system/kube-proxy-nhbhc\"\r\n"} +{"Time":"2023-05-31T19:41:16.287365051Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.048319 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-proxy\\\" (UniqueName: \\\"kubernetes.io/configmap/f82ceac2-8380-403e-a97b-1ccb4bfa44f1-kube-proxy\\\") pod \\\"kube-proxy-nhbhc\\\" (UID: \\\"f82ceac2-8380-403e-a97b-1ccb4bfa44f1\\\") \" pod=\"kube-system/kube-proxy-nhbhc\"\r\n"} +{"Time":"2023-05-31T19:41:16.287369884Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.067879 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.287375091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.151016 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/929ebd27-af2f-48e0-965e-37cb06543c93-config-volume\\\") pod \\\"coredns-5d78c9869d-x4l4s\\\" (UID: \\\"929ebd27-af2f-48e0-965e-37cb06543c93\\\") \" pod=\"kube-system/coredns-5d78c9869d-x4l4s\"\r\n"} +{"Time":"2023-05-31T19:41:16.287380824Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.158110 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-grmh4\\\" (UniqueName: \\\"kubernetes.io/projected/929ebd27-af2f-48e0-965e-37cb06543c93-kube-api-access-grmh4\\\") pod \\\"coredns-5d78c9869d-x4l4s\\\" (UID: \\\"929ebd27-af2f-48e0-965e-37cb06543c93\\\") \" pod=\"kube-system/coredns-5d78c9869d-x4l4s\"\r\n"} +{"Time":"2023-05-31T19:41:16.28738648Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.258520 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/320ba50d-cf66-4582-941d-ed4f8ee33fca-config-volume\\\") pod \\\"coredns-5d78c9869d-sx4t6\\\" (UID: \\\"320ba50d-cf66-4582-941d-ed4f8ee33fca\\\") \" pod=\"kube-system/coredns-5d78c9869d-sx4t6\"\r\n"} +{"Time":"2023-05-31T19:41:16.287392168Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:07 enable-default-cni-509041 kubelet[1225]: I0531 19:40:07.258581 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-lrj79\\\" (UniqueName: \\\"kubernetes.io/projected/320ba50d-cf66-4582-941d-ed4f8ee33fca-kube-api-access-lrj79\\\") pod \\\"coredns-5d78c9869d-sx4t6\\\" (UID: \\\"320ba50d-cf66-4582-941d-ed4f8ee33fca\\\") \" pod=\"kube-system/coredns-5d78c9869d-sx4t6\"\r\n"} +{"Time":"2023-05-31T19:41:16.287574703Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:08 enable-default-cni-509041 kubelet[1225]: I0531 19:40:08.771858 1225 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-x4l4s\" podStartSLOduration=2.771805825 podCreationTimestamp=\"2023-05-31 19:40:06 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:40:08.723356529 +0000 UTC m=+16.496682640\" watchObservedRunningTime=\"2023-05-31 19:40:08.771805825 +0000 UTC m=+16.545131934\"\r\n"} +{"Time":"2023-05-31T19:41:16.287582174Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:09 enable-default-cni-509041 kubelet[1225]: I0531 19:40:09.017454 1225 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-proxy-nhbhc\" podStartSLOduration=4.017417498 podCreationTimestamp=\"2023-05-31 19:40:05 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:40:08.771740372 +0000 UTC m=+16.545066483\" watchObservedRunningTime=\"2023-05-31 19:40:09.017417498 +0000 UTC m=+16.790743605\"\r\n"} +{"Time":"2023-05-31T19:41:16.287587754Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:09 enable-default-cni-509041 kubelet[1225]: I0531 19:40:09.017706 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.287592493Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:09 enable-default-cni-509041 kubelet[1225]: I0531 19:40:09.180025 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-z9f2r\\\" (UniqueName: \\\"kubernetes.io/projected/3b494277-d229-49ce-9350-40e243e4ee34-kube-api-access-z9f2r\\\") pod \\\"storage-provisioner\\\" (UID: \\\"3b494277-d229-49ce-9350-40e243e4ee34\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:41:16.28759793Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:09 enable-default-cni-509041 kubelet[1225]: I0531 19:40:09.180067 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp\\\" (UniqueName: \\\"kubernetes.io/host-path/3b494277-d229-49ce-9350-40e243e4ee34-tmp\\\") pod \\\"storage-provisioner\\\" (UID: \\\"3b494277-d229-49ce-9350-40e243e4ee34\\\") \" pod=\"kube-system/storage-provisioner\"\r\n"} +{"Time":"2023-05-31T19:41:16.28760363Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:09 enable-default-cni-509041 kubelet[1225]: I0531 19:40:09.785326 1225 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/coredns-5d78c9869d-sx4t6\" podStartSLOduration=2.78517225 podCreationTimestamp=\"2023-05-31 19:40:07 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:40:09.748605381 +0000 UTC m=+17.521931492\" watchObservedRunningTime=\"2023-05-31 19:40:09.78517225 +0000 UTC m=+17.558498360\"\r\n"} +{"Time":"2023-05-31T19:41:16.287608719Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:12 enable-default-cni-509041 kubelet[1225]: I0531 19:40:12.857615 1225 kuberuntime_manager.go:1460] \"Updating runtime config through cri with podcidr\" CIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:41:16.28776986Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:12 enable-default-cni-509041 kubelet[1225]: I0531 19:40:12.860799 1225 kubelet_network.go:61] \"Updating Pod CIDR\" originalPodCIDR=\"\" newPodCIDR=\"10.244.0.0/24\"\r\n"} +{"Time":"2023-05-31T19:41:16.287775903Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: I0531 19:40:15.129544 1225 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/320ba50d-cf66-4582-941d-ed4f8ee33fca-config-volume\\\") pod \\\"320ba50d-cf66-4582-941d-ed4f8ee33fca\\\" (UID: \\\"320ba50d-cf66-4582-941d-ed4f8ee33fca\\\") \"\r\n"} +{"Time":"2023-05-31T19:41:16.287781545Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: I0531 19:40:15.129621 1225 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-lrj79\\\" (UniqueName: \\\"kubernetes.io/projected/320ba50d-cf66-4582-941d-ed4f8ee33fca-kube-api-access-lrj79\\\") pod \\\"320ba50d-cf66-4582-941d-ed4f8ee33fca\\\" (UID: \\\"320ba50d-cf66-4582-941d-ed4f8ee33fca\\\") \"\r\n"} +{"Time":"2023-05-31T19:41:16.287786773Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: W0531 19:40:15.130457 1225 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/320ba50d-cf66-4582-941d-ed4f8ee33fca/volumes/kubernetes.io~configmap/config-volume: clearQuota called, but quotas disabled\r\n"} +{"Time":"2023-05-31T19:41:16.287791895Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: I0531 19:40:15.130912 1225 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/configmap/320ba50d-cf66-4582-941d-ed4f8ee33fca-config-volume\" (OuterVolumeSpecName: \"config-volume\") pod \"320ba50d-cf66-4582-941d-ed4f8ee33fca\" (UID: \"320ba50d-cf66-4582-941d-ed4f8ee33fca\"). InnerVolumeSpecName \"config-volume\". PluginName \"kubernetes.io/configmap\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.287797765Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: I0531 19:40:15.135749 1225 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/320ba50d-cf66-4582-941d-ed4f8ee33fca-kube-api-access-lrj79\" (OuterVolumeSpecName: \"kube-api-access-lrj79\") pod \"320ba50d-cf66-4582-941d-ed4f8ee33fca\" (UID: \"320ba50d-cf66-4582-941d-ed4f8ee33fca\"). InnerVolumeSpecName \"kube-api-access-lrj79\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.287803275Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: I0531 19:40:15.229787 1225 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-lrj79\\\" (UniqueName: \\\"kubernetes.io/projected/320ba50d-cf66-4582-941d-ed4f8ee33fca-kube-api-access-lrj79\\\") on node \\\"enable-default-cni-509041\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T19:41:16.287808552Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: I0531 19:40:15.229853 1225 reconciler_common.go:300] \"Volume detached for volume \\\"config-volume\\\" (UniqueName: \\\"kubernetes.io/configmap/320ba50d-cf66-4582-941d-ed4f8ee33fca-config-volume\\\") on node \\\"enable-default-cni-509041\\\" DevicePath \\\"\\\"\"\r\n"} +{"Time":"2023-05-31T19:41:16.287963237Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: I0531 19:40:15.261183 1225 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/storage-provisioner\" podStartSLOduration=7.261137132 podCreationTimestamp=\"2023-05-31 19:40:08 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 19:40:10.738893025 +0000 UTC m=+18.512219137\" watchObservedRunningTime=\"2023-05-31 19:40:15.261137132 +0000 UTC m=+23.034463245\"\r\n"} +{"Time":"2023-05-31T19:41:16.287975691Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:15 enable-default-cni-509041 kubelet[1225]: I0531 19:40:15.724387 1225 scope.go:115] \"RemoveContainer\" containerID=\"4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83\"\r\n"} +{"Time":"2023-05-31T19:41:16.287980417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:16 enable-default-cni-509041 kubelet[1225]: I0531 19:40:16.483089 1225 scope.go:115] \"RemoveContainer\" containerID=\"4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83\"\r\n"} +{"Time":"2023-05-31T19:41:16.287985764Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:16 enable-default-cni-509041 kubelet[1225]: E0531 19:40:16.484464 1225 remote_runtime.go:415] \"ContainerStatus from runtime service failed\" err=\"rpc error: code = NotFound desc = an error occurred when try to find container \\\"4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83\\\": not found\" containerID=\"4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83\"\r\n"} +{"Time":"2023-05-31T19:41:16.287991158Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:16 enable-default-cni-509041 kubelet[1225]: I0531 19:40:16.484560 1225 pod_container_deletor.go:53] \"DeleteContainer returned error\" containerID={Type:containerd ID:4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83} err=\"failed to get container status \\\"4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83\\\": rpc error: code = NotFound desc = an error occurred when try to find container \\\"4c8f7ba063fd8e4c04463eb045d200f25d4d41ea51dbb35f0bdd478a22ab1f83\\\": not found\"\r\n"} +{"Time":"2023-05-31T19:41:16.287995956Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:18 enable-default-cni-509041 kubelet[1225]: I0531 19:40:18.569364 1225 kubelet_volumes.go:161] \"Cleaned up orphaned pod volumes dir\" podUID=320ba50d-cf66-4582-941d-ed4f8ee33fca path=\"/var/lib/kubelet/pods/320ba50d-cf66-4582-941d-ed4f8ee33fca/volumes\"\r\n"} +{"Time":"2023-05-31T19:41:16.28800013Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:49 enable-default-cni-509041 kubelet[1225]: I0531 19:40:49.474450 1225 topology_manager.go:212] \"Topology Admit Handler\"\r\n"} +{"Time":"2023-05-31T19:41:16.288004198Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:49 enable-default-cni-509041 kubelet[1225]: E0531 19:40:49.475065 1225 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"320ba50d-cf66-4582-941d-ed4f8ee33fca\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T19:41:16.288012616Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:49 enable-default-cni-509041 kubelet[1225]: I0531 19:40:49.475367 1225 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"320ba50d-cf66-4582-941d-ed4f8ee33fca\" containerName=\"coredns\"\r\n"} +{"Time":"2023-05-31T19:41:16.288070152Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:49 enable-default-cni-509041 kubelet[1225]: I0531 19:40:49.590689 1225 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-xzksq\\\" (UniqueName: \\\"kubernetes.io/projected/c3df56c0-fd70-4363-9467-9f420555d978-kube-api-access-xzksq\\\") pod \\\"netcat-7458db8b8-pffgl\\\" (UID: \\\"c3df56c0-fd70-4363-9467-9f420555d978\\\") \" pod=\"default/netcat-7458db8b8-pffgl\"\r\n"} +{"Time":"2023-05-31T19:41:16.28807622Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 kubelet[1225]: E0531 19:40:52.654562 1225 iptables.go:575] \"Could not set up iptables canary\" err=\u003c\r\n"} +{"Time":"2023-05-31T19:41:16.288080014Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 kubelet[1225]: \terror creating chain \"KUBE-KUBELET-CANARY\": exit status 3: ip6tables v1.8.6 (legacy): can't initialize ip6tables table `nat': Table does not exist (do you need to insmod?)\r\n"} +{"Time":"2023-05-31T19:41:16.288083664Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 kubelet[1225]: \tPerhaps ip6tables or your kernel needs to be upgraded.\r\n"} +{"Time":"2023-05-31T19:41:16.28808744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 kubelet[1225]: \u003e table=nat chain=KUBE-KUBELET-CANARY\r\n"} +{"Time":"2023-05-31T19:41:16.288091685Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.28809814Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.28810183Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T19:41:16.288105513Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\r\n"} +{"Time":"2023-05-31T19:41:16.288108927Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters:\r\n"} +{"Time":"2023-05-31T19:41:16.288112154Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\r\n"} +{"Time":"2023-05-31T19:41:16.288147541Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority-data: 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"} +{"Time":"2023-05-31T19:41:16.288214391Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"UjY3QwpBNXcxQzg2MWNYMVV6MlN5WlNjT05GeG9mNmRSWTB6T2ZrQ0gzNDJPS1pEQnhOcmZmOGNkL3kwMUE4RmZYQXlHCmNkeDFJM3lQREJ1OHIzOW82eSt4c0FpRGNSSnMyUmY3UU5BTWV2MEszbm8zQlpoc1loeDdNNXllZ2hNemdxTW4KUU50bnY3T2lYTllMVFpRZDd6dSs5Y3NNbXRnNDBLUU9DWUQyTG1jMkpOWHRSNjcyT013eGpkRG5hNVpGZlZSMgpEcXR6SFRlTFZrSXhIUi9UT0hoQ09xSm0yMHF6dEVjRVd2d3hXcm1rdk5QNkFURnVHck1UVlVRRjBybFQrMDNwCnluUHdmdFRZbXJjOEVwWDUzUmVaUlVHWHZEM1N4QnlKWFdySGEzNFJhQURGaGEvdnJMZTN3ZEppNVlLRFZrVWIKN0NnQkFieU9VWXM1cmc9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==\r\n"} +{"Time":"2023-05-31T19:41:16.288249495Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://control-plane.minikube.internal:8443\r\n"} +{"Time":"2023-05-31T19:41:16.288255723Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: mk\r\n"} +{"Time":"2023-05-31T19:41:16.288260164Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts:\r\n"} +{"Time":"2023-05-31T19:41:16.288267384Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - context:\r\n"} +{"Time":"2023-05-31T19:41:16.2882717Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cluster: mk\r\n"} +{"Time":"2023-05-31T19:41:16.288275931Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user: system:node:enable-default-cni-509041\r\n"} +{"Time":"2023-05-31T19:41:16.288280082Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: system:node:enable-default-cni-509041@mk\r\n"} +{"Time":"2023-05-31T19:41:16.28828413Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: system:node:enable-default-cni-509041@mk\r\n"} +{"Time":"2023-05-31T19:41:16.2882885Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\r\n"} +{"Time":"2023-05-31T19:41:16.288292282Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" preferences: {}\r\n"} +{"Time":"2023-05-31T19:41:16.288296026Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users:\r\n"} +{"Time":"2023-05-31T19:41:16.288300177Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - name: system:node:enable-default-cni-509041\r\n"} +{"Time":"2023-05-31T19:41:16.288304036Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user:\r\n"} +{"Time":"2023-05-31T19:41:16.288332672Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-certificate: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:41:16.288338624Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-key: /var/lib/kubelet/pki/kubelet-client-current.pem\r\n"} +{"Time":"2023-05-31T19:41:16.288343562Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.288347077Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.288350911Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T19:41:16.28835499Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\r\n"} +{"Time":"2023-05-31T19:41:16.288359691Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authentication:\r\n"} +{"Time":"2023-05-31T19:41:16.28837414Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" anonymous:\r\n"} +{"Time":"2023-05-31T19:41:16.288387104Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enabled: false\r\n"} +{"Time":"2023-05-31T19:41:16.288391906Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:41:16.288395709Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheTTL: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288400156Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enabled: true\r\n"} +{"Time":"2023-05-31T19:41:16.288404353Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" x509:\r\n"} +{"Time":"2023-05-31T19:41:16.288408235Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\r\n"} +{"Time":"2023-05-31T19:41:16.288412154Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authorization:\r\n"} +{"Time":"2023-05-31T19:41:16.288416091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mode: Webhook\r\n"} +{"Time":"2023-05-31T19:41:16.288419921Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" webhook:\r\n"} +{"Time":"2023-05-31T19:41:16.288423781Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheAuthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288427727Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheUnauthorizedTTL: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288431402Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cgroupDriver: cgroupfs\r\n"} +{"Time":"2023-05-31T19:41:16.28843503Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterDNS:\r\n"} +{"Time":"2023-05-31T19:41:16.288438627Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - 10.96.0.10\r\n"} +{"Time":"2023-05-31T19:41:16.288442582Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterDomain: cluster.local\r\n"} +{"Time":"2023-05-31T19:41:16.288455882Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" containerRuntimeEndpoint: \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.288467448Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpuManagerReconcilePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288471302Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" evictionHard:\r\n"} +{"Time":"2023-05-31T19:41:16.288475175Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imagefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:41:16.288479152Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodefs.available: 0%\r\n"} +{"Time":"2023-05-31T19:41:16.288482742Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodefs.inodesFree: 0%\r\n"} +{"Time":"2023-05-31T19:41:16.288486776Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" evictionPressureTransitionPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288493025Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" failSwapOn: false\r\n"} +{"Time":"2023-05-31T19:41:16.288497211Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fileCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288501005Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hairpinMode: hairpin-veth\r\n"} +{"Time":"2023-05-31T19:41:16.288504981Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzBindAddress: 127.0.0.1\r\n"} +{"Time":"2023-05-31T19:41:16.288508911Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzPort: 10248\r\n"} +{"Time":"2023-05-31T19:41:16.288512603Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" httpCheckFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288517079Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageGCHighThresholdPercent: 100\r\n"} +{"Time":"2023-05-31T19:41:16.288520849Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageMinimumGCAge: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288536771Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: KubeletConfiguration\r\n"} +{"Time":"2023-05-31T19:41:16.288541087Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" logging:\r\n"} +{"Time":"2023-05-31T19:41:16.288545369Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" flushFrequency: 0\r\n"} +{"Time":"2023-05-31T19:41:16.288565999Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" options:\r\n"} +{"Time":"2023-05-31T19:41:16.288569934Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" json:\r\n"} +{"Time":"2023-05-31T19:41:16.288576518Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" infoBufferSize: \"0\"\r\n"} +{"Time":"2023-05-31T19:41:16.288580729Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" verbosity: 0\r\n"} +{"Time":"2023-05-31T19:41:16.288584681Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memorySwap: {}\r\n"} +{"Time":"2023-05-31T19:41:16.288588819Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodeStatusReportFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.28859347Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodeStatusUpdateFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288618606Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resolvConf: /run/systemd/resolve/resolv.conf\r\n"} +{"Time":"2023-05-31T19:41:16.288623221Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rotateCertificates: true\r\n"} +{"Time":"2023-05-31T19:41:16.288627655Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtimeRequestTimeout: 15m0s\r\n"} +{"Time":"2023-05-31T19:41:16.288693861Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shutdownGracePeriod: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.28869743Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shutdownGracePeriodCriticalPods: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.28870002Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" staticPodPath: /etc/kubernetes/manifests\r\n"} +{"Time":"2023-05-31T19:41:16.288702897Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" streamingConnectionIdleTimeout: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288705401Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" syncFrequency: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.28870786Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" volumeStatsAggPeriod: 0s\r\n"} +{"Time":"2023-05-31T19:41:16.288710425Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.288714381Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.288716674Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T19:41:16.288719086Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.288721396Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters:\n"} +{"Time":"2023-05-31T19:41:16.288723595Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:41:16.288736492Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:41:16.288739192Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extensions:\n"} +{"Time":"2023-05-31T19:41:16.288741627Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - extension:\n"} +{"Time":"2023-05-31T19:41:16.288743665Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" last-update: Wed, 31 May 2023 19:40:05 UTC\n"} +{"Time":"2023-05-31T19:41:16.288745916Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.288748069Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:41:16.288750039Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:41:16.288752071Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://192.168.39.43:8443\n"} +{"Time":"2023-05-31T19:41:16.288754184Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.288756219Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:41:16.288758525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority: /home/jenkins/minikube-integration/16569-10887/.minikube/ca.crt\n"} +{"Time":"2023-05-31T19:41:16.288761095Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extensions:\n"} +{"Time":"2023-05-31T19:41:16.288842013Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - extension:\n"} +{"Time":"2023-05-31T19:41:16.288847253Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" last-update: Wed, 31 May 2023 19:40:47 UTC\n"} +{"Time":"2023-05-31T19:41:16.28885043Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.288854042Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:41:16.288857111Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: cluster_info\n"} +{"Time":"2023-05-31T19:41:16.288860338Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://192.168.72.81:8443\n"} +{"Time":"2023-05-31T19:41:16.288863443Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:41:16.288868761Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts:\n"} +{"Time":"2023-05-31T19:41:16.288872247Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - context:\n"} +{"Time":"2023-05-31T19:41:16.288875882Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cluster: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.28887894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extensions:\n"} +{"Time":"2023-05-31T19:41:16.288882589Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - extension:\n"} +{"Time":"2023-05-31T19:41:16.288885593Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" last-update: Wed, 31 May 2023 19:40:05 UTC\n"} +{"Time":"2023-05-31T19:41:16.288889288Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.288892808Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:41:16.28889636Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:41:16.288912436Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:41:16.288917123Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.288926618Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.288930494Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - context:\n"} +{"Time":"2023-05-31T19:41:16.288934455Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cluster: old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:41:16.288938291Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extensions:\n"} +{"Time":"2023-05-31T19:41:16.288941474Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - extension:\n"} +{"Time":"2023-05-31T19:41:16.28894449Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" last-update: Wed, 31 May 2023 19:40:47 UTC\n"} +{"Time":"2023-05-31T19:41:16.288948051Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" provider: minikube.sigs.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.289004925Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version: v1.30.1\n"} +{"Time":"2023-05-31T19:41:16.289009172Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: context_info\n"} +{"Time":"2023-05-31T19:41:16.289012509Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:41:16.289027036Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user: old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:41:16.289037363Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:41:16.289041568Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:41:16.289044808Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:41:16.289048266Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:41:16.28905168Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users:\n"} +{"Time":"2023-05-31T19:41:16.289055332Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - name: enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:16.289059096Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user:\n"} +{"Time":"2023-05-31T19:41:16.289062956Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt\n"} +{"Time":"2023-05-31T19:41:16.289067065Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.key\n"} +{"Time":"2023-05-31T19:41:16.289070961Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - name: old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:41:16.289074251Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user:\n"} +{"Time":"2023-05-31T19:41:16.289077685Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-certificate: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/old-k8s-version-709650/client.crt\n"} +{"Time":"2023-05-31T19:41:16.289081245Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-key: /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/old-k8s-version-709650/client.key\n"} +{"Time":"2023-05-31T19:41:16.289084506Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.289087432Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.289090662Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T19:41:16.289093522Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.289096352Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" items:\n"} +{"Time":"2023-05-31T19:41:16.289099569Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.28920131Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.289211442Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:41:16.289215483Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.289219503Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:41:16.289223483Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:41:16.289227158Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:41:16.289230682Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:41:16.289234352Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:41:16.289237778Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:41:16.289241029Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:41:16.28924461Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:41:16.28924814Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:41:16.289251767Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:41:16.289255285Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:41:16.28925873Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:41:16.28926214Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:41:16.289265569Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:41:16.289268407Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:41:16.28927058Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:41:16.289272709Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:41:16.289274833Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.289510336Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.289517794Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.289521968Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" annotations:\n"} +{"Time":"2023-05-31T19:41:16.289526127Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:41:16.289531193Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:41:16.289535489Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:41:16.289549186Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:41:16.289553321Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:40:05Z\"\n"} +{"Time":"2023-05-31T19:41:16.289557628Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:41:16.289562126Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:41:16.289566007Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"315\"\n"} +{"Time":"2023-05-31T19:41:16.289570336Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: c2b96a07-6290-4660-a07e-3d671adec7a7\n"} +{"Time":"2023-05-31T19:41:16.289574149Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.289577665Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.289581798Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:41:16.289584403Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.289587Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:41:16.289591305Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:41:16.289593901Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:41:16.28959634Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:41:16.289598813Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:41:16.289601161Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:41:16.289877395Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:41:16.289888174Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:41:16.289892174Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:41:16.289895409Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:41:16.289898804Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:41:16.289901903Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:41:16.289905234Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:41:16.289908267Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:41:16.289911677Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:41:16.289915032Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:41:16.289918244Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:41:16.289921541Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.289924944Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.2899281Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.28994396Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" annotations:\n"} +{"Time":"2023-05-31T19:41:16.289947651Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:41:16.289951368Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:41:16.289954762Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:41:16.290002375Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:41:16.290007633Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:40:06Z\"\n"} +{"Time":"2023-05-31T19:41:16.290011691Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:41:16.290015601Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-node-lease\n"} +{"Time":"2023-05-31T19:41:16.290019173Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"318\"\n"} +{"Time":"2023-05-31T19:41:16.290022693Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 21fb2cd0-eb10-4bf9-a43f-187e0f22113e\n"} +{"Time":"2023-05-31T19:41:16.290025845Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.290029293Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.290032726Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" jws-kubeconfig-jdutcq: eyJhbGciOiJIUzI1NiIsImtpZCI6ImpkdXRjcSJ9..0yvoSDVd6KL4eblmMqt_LzcKiMg2v2LTqBmwDaCtcXg\n"} +{"Time":"2023-05-31T19:41:16.29003621Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubeconfig: |\n"} +{"Time":"2023-05-31T19:41:16.29003949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.290042744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters:\n"} +{"Time":"2023-05-31T19:41:16.290045682Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:41:16.290053159Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURCakNDQWU2Z0F3SUJBZ0lCQVRBTkJna3Foa2lHOXcwQkFRc0ZBREFWTVJNd0VRWURWUVFERXdwdGFXNXAKYTNWaVpVTkJNQjRYRFRJek1EVXpNREU0TkRReU1Wb1hEVE16TURVeU9ERTRORFF5TVZvd0ZURVRNQkVHQTFVRQpBeE1LYldsdWFXdDFZbVZEUVRDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDQVFvQ2dnRUJBUEpiCnVsSG1TdWthRHJFeWN1RUJ5RVFaaUl5eFBFcjN2eXVWMjNDUVI2T3JDQzI4ak9KYlRzeHMrRVE0dUhGTm5wTTUKdGdvTER2TStabVlRZXJqczcxM2xDOHdORTdVdVFoTWRsV1pPa3Z4Z3ErQTlNNitVZ1V6dmMyUXFFMVZTWldvWgpoWS9yNTRjS01HK2xsZWt0ajVDK3BnRHdOVW5Eb0NjVjI1UDN3bHhwWndrRUN4dUxDNHJ2THh1SFVZN1hIeGNGCllHVCt4MGF3WlN1a0ZXL2FYVXpZODlJYXdXWkoyY3NzOUdkRGR0R0NnNEZ0YllNM0M3VHBJcUs5YU1QcEdHdzkKYTFwNnRqTEFlKzRJT1ZpVzZsNWtWdkUwTVJJZmhqcjdzOW4za3cxaU50c254U0ZUV2I5UEQxUWxyTWJZNVdVRAp3Q0ErNlprQlI2NHVkOUZya24wQ0F3RUFBYU5oTUY4d0RnWURWUjBQQVFIL0JBUURBZ0trTUIwR0ExVWRKUVFXCk1CUUdDQ3NHQVFVRkJ3TUNCZ2dyQmdFRkJRY0RBVEFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVcKQkJUTy9vK0Zpc1BrVllLVkJERGU0cUFVWDBNWThUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRU"} +{"Time":"2023-05-31T19:41:16.290059026Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"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\n"} +{"Time":"2023-05-31T19:41:16.290066454Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:41:16.290069867Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: \"\"\n"} +{"Time":"2023-05-31T19:41:16.290073217Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts: null\n"} +{"Time":"2023-05-31T19:41:16.290085568Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T19:41:16.290089427Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:41:16.290092577Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" preferences: {}\n"} +{"Time":"2023-05-31T19:41:16.290100084Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users: null\n"} +{"Time":"2023-05-31T19:41:16.290103601Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.290107022Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.290109984Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:39:52Z\"\n"} +{"Time":"2023-05-31T19:41:16.290113378Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: cluster-info\n"} +{"Time":"2023-05-31T19:41:16.290116766Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:41:16.290120244Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"316\"\n"} +{"Time":"2023-05-31T19:41:16.290123533Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: b06c0a0a-5707-466f-aad5-7dfef695a5ca\n"} +{"Time":"2023-05-31T19:41:16.290127365Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.290130358Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.290133444Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:41:16.290136694Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.290140263Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:41:16.290143654Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:41:16.290158581Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:41:16.290161817Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:41:16.290166678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:41:16.290170141Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:41:16.290173656Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:41:16.290176955Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:41:16.290179751Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:41:16.290182013Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:41:16.29018427Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:41:16.290186746Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:41:16.290188833Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:41:16.290190846Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:41:16.29019293Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:41:16.290194935Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:41:16.290197025Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:41:16.29019909Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.290201472Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.290203609Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.290205576Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" annotations:\n"} +{"Time":"2023-05-31T19:41:16.290207673Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:41:16.29020992Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:41:16.290212169Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:41:16.29021435Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:41:16.290216425Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:40:06Z\"\n"} +{"Time":"2023-05-31T19:41:16.290218611Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:41:16.290220783Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-public\n"} +{"Time":"2023-05-31T19:41:16.290223209Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"325\"\n"} +{"Time":"2023-05-31T19:41:16.29039123Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 0abf1bbf-d73f-4246-a006-729eb8e9c5ee\n"} +{"Time":"2023-05-31T19:41:16.2903952Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.2903977Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.290399917Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Corefile: |\n"} +{"Time":"2023-05-31T19:41:16.290401913Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" .:53 {\n"} +{"Time":"2023-05-31T19:41:16.290403845Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" log\n"} +{"Time":"2023-05-31T19:41:16.290405811Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" errors\n"} +{"Time":"2023-05-31T19:41:16.290407902Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" health {\n"} +{"Time":"2023-05-31T19:41:16.290410015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" lameduck 5s\n"} +{"Time":"2023-05-31T19:41:16.290411937Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T19:41:16.290413883Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ready\n"} +{"Time":"2023-05-31T19:41:16.290415783Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes cluster.local in-addr.arpa ip6.arpa {\n"} +{"Time":"2023-05-31T19:41:16.290417914Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pods insecure\n"} +{"Time":"2023-05-31T19:41:16.290419968Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fallthrough in-addr.arpa ip6.arpa\n"} +{"Time":"2023-05-31T19:41:16.290422145Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ttl 30\n"} +{"Time":"2023-05-31T19:41:16.290424175Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T19:41:16.290426173Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" prometheus :9153\n"} +{"Time":"2023-05-31T19:41:16.29042826Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hosts {\n"} +{"Time":"2023-05-31T19:41:16.29043038Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 192.168.39.1 host.minikube.internal\n"} +{"Time":"2023-05-31T19:41:16.290432297Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fallthrough\n"} +{"Time":"2023-05-31T19:41:16.290434388Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T19:41:16.290436318Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" forward . /etc/resolv.conf {\n"} +{"Time":"2023-05-31T19:41:16.290440002Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_concurrent 1000\n"} +{"Time":"2023-05-31T19:41:16.290441988Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T19:41:16.290443894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cache 30\n"} +{"Time":"2023-05-31T19:41:16.290506158Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" loop\n"} +{"Time":"2023-05-31T19:41:16.290508776Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" reload\n"} +{"Time":"2023-05-31T19:41:16.290510797Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" loadbalance\n"} +{"Time":"2023-05-31T19:41:16.290512926Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\n"} +{"Time":"2023-05-31T19:41:16.29051487Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.290516816Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.29051888Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:39:52Z\"\n"} +{"Time":"2023-05-31T19:41:16.290520894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: coredns\n"} +{"Time":"2023-05-31T19:41:16.290522859Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.290525984Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"361\"\n"} +{"Time":"2023-05-31T19:41:16.290528055Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 924bf870-9a19-4640-8b47-816cb5633cfa\n"} +{"Time":"2023-05-31T19:41:16.29053003Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.290531879Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.290533769Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" client-ca-file: |\n"} +{"Time":"2023-05-31T19:41:16.290535768Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.290538608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:41:16.290540888Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:41:16.290543036Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:41:16.290545242Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:41:16.29054738Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:41:16.290549554Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:41:16.290551628Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:41:16.290554043Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:41:16.290724076Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:41:16.290727519Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:41:16.29072997Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:41:16.290732547Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:41:16.290734631Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:41:16.290736646Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:41:16.290738714Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:41:16.290740759Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:41:16.290742716Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:41:16.290744615Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.290757122Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-allowed-names: '[\"front-proxy-client\"]'\n"} +{"Time":"2023-05-31T19:41:16.290759648Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-client-ca-file: |\n"} +{"Time":"2023-05-31T19:41:16.290761722Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.290763844Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDCjCCAfKgAwIBAgIBADANBgkqhkiG9w0BAQsFADAZMRcwFQYDVQQDEw5mcm9u\n"} +{"Time":"2023-05-31T19:41:16.290765963Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dC1wcm94eS1jYTAeFw0yMzA1MzExOTM5NDFaFw0zMzA1MjgxOTM5NDFaMBkxFzAV\n"} +{"Time":"2023-05-31T19:41:16.290768012Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BgNVBAMTDmZyb250LXByb3h5LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB\n"} +{"Time":"2023-05-31T19:41:16.290770221Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CgKCAQEArmLxscaN2hwLoR0ursW9UX8Tj0kdsNeJ6uyO4w1c93g1RA70K0SNH14t\n"} +{"Time":"2023-05-31T19:41:16.290772421Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hlKjQZuqLY0/nkSzVWsoVQaq1Uomn2orYO47yI54tKJ6vFMMK4ooK+Gwli6NAa/k\n"} +{"Time":"2023-05-31T19:41:16.290774573Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" wWThOn8RrPQKpePQz0mHM4zrM1JJkt8/x+wh2NDHWzwyMXdo21ok8SzCWn8fuh0U\n"} +{"Time":"2023-05-31T19:41:16.290776759Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" opWi4ba93Ggcq7Zv11W9fO93eaeVabrkYqKqEjeawSLG5n/llikew+0WatuqVq6W\n"} +{"Time":"2023-05-31T19:41:16.290926744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" E0O0FksEv2QaZ/ZAWBsCXQhUTTzhH+sUnGSmOBBYiBu7uzD1NrzjAysMRxZvUfZQ\n"} +{"Time":"2023-05-31T19:41:16.290929601Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a0phnWOJiLbzts7+yZoLaneT4jEOgQIDAQABo10wWzAOBgNVHQ8BAf8EBAMCAqQw\n"} +{"Time":"2023-05-31T19:41:16.290931901Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUOg1GTEd9z7EKbbLXFvU8UyglcxMw\n"} +{"Time":"2023-05-31T19:41:16.29093534Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" GQYDVR0RBBIwEIIOZnJvbnQtcHJveHktY2EwDQYJKoZIhvcNAQELBQADggEBAJwb\n"} +{"Time":"2023-05-31T19:41:16.290937553Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fSLLo4kVAV2JGQ7Ujs2MoxhXBVbst80oam9eEgIznACCiyHXbMw6DCXSv2Yc45/i\n"} +{"Time":"2023-05-31T19:41:16.290939678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" aTi+qiXD7lkiJ7mTK+hNLWk+mLrNJS08+llCMkRT2CA4q+JmzYnCNUClvqiJU+0v\n"} +{"Time":"2023-05-31T19:41:16.290942753Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OejGyzKKnODBsJ4OVztyS/1ehiuZofI/BoW2nWvBYGiS4r0xNKpzhaQNmBSfK9sC\n"} +{"Time":"2023-05-31T19:41:16.290944851Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wps6EDsTSFIP2qwBBJ96e2BUlwlBaHcWo7XBsQmWYwCgH8cFYQR+ksyM0HIDG3Tm\n"} +{"Time":"2023-05-31T19:41:16.290947052Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pmiAjvhf2Txq2tLwq0I66l4H46JrmnqbulUWLNKCcIE13xhIJ0Y38luitcbTI0Hd\n"} +{"Time":"2023-05-31T19:41:16.290948921Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" E3pmi+DzkFkjFokoz3U=\n"} +{"Time":"2023-05-31T19:41:16.290951153Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.290953258Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-extra-headers-prefix: '[\"X-Remote-Extra-\"]'\n"} +{"Time":"2023-05-31T19:41:16.290955761Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-group-headers: '[\"X-Remote-Group\"]'\n"} +{"Time":"2023-05-31T19:41:16.290957843Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" requestheader-username-headers: '[\"X-Remote-User\"]'\n"} +{"Time":"2023-05-31T19:41:16.29095983Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.290961668Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.290963563Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:39:49Z\"\n"} +{"Time":"2023-05-31T19:41:16.29097745Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: extension-apiserver-authentication\n"} +{"Time":"2023-05-31T19:41:16.29097969Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.290981573Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"38\"\n"} +{"Time":"2023-05-31T19:41:16.29098362Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 426af5e5-b8ec-4672-9ffa-3a0a7e933fb2\n"} +{"Time":"2023-05-31T19:41:16.291168726Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.291171352Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.291173493Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" since: \"2023-05-31\"\n"} +{"Time":"2023-05-31T19:41:16.291175973Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.291178045Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.291180189Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:39:49Z\"\n"} +{"Time":"2023-05-31T19:41:16.291182583Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-apiserver-legacy-service-account-token-tracking\n"} +{"Time":"2023-05-31T19:41:16.291184653Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.291187017Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"33\"\n"} +{"Time":"2023-05-31T19:41:16.29119724Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 567f2ea0-13ab-4678-8d9a-a925a94ed570\n"} +{"Time":"2023-05-31T19:41:16.291199486Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.291202763Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.29120475Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config.conf: |-\n"} +{"Time":"2023-05-31T19:41:16.291206848Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T19:41:16.291209143Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bindAddress: 0.0.0.0\n"} +{"Time":"2023-05-31T19:41:16.291211637Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bindAddressHardFail: false\n"} +{"Time":"2023-05-31T19:41:16.291214964Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clientConnection:\n"} +{"Time":"2023-05-31T19:41:16.29121841Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" acceptContentTypes: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291234554Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" burst: 0\n"} +{"Time":"2023-05-31T19:41:16.291238512Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contentType: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291249012Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubeconfig: /var/lib/kube-proxy/kubeconfig.conf\n"} +{"Time":"2023-05-31T19:41:16.291252782Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" qps: 0\n"} +{"Time":"2023-05-31T19:41:16.291256093Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterCIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:41:16.291259009Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" configSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.291261414Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conntrack:\n"} +{"Time":"2023-05-31T19:41:16.291438826Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" maxPerCore: 0\n"} +{"Time":"2023-05-31T19:41:16.291443135Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" min: null\n"} +{"Time":"2023-05-31T19:41:16.291445221Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T19:41:16.291447491Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T19:41:16.291449612Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" detectLocal:\n"} +{"Time":"2023-05-31T19:41:16.291451677Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bridgeInterface: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291453737Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" interfaceNamePrefix: \"\"\n"} +{"Time":"2023-05-31T19:41:16.29145967Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" detectLocalMode: \"\"\n"} +{"Time":"2023-05-31T19:41:16.29146235Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enableProfiling: false\n"} +{"Time":"2023-05-31T19:41:16.291464377Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzBindAddress: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291466461Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hostnameOverride: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291468525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" iptables:\n"} +{"Time":"2023-05-31T19:41:16.291470615Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" localhostNodePorts: null\n"} +{"Time":"2023-05-31T19:41:16.291472646Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" masqueradeAll: false\n"} +{"Time":"2023-05-31T19:41:16.291474674Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" masqueradeBit: null\n"} +{"Time":"2023-05-31T19:41:16.291476629Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.291478627Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.291480714Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ipvs:\n"} +{"Time":"2023-05-31T19:41:16.291482752Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" excludeCIDRs: null\n"} +{"Time":"2023-05-31T19:41:16.291484864Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" minSyncPeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.291486745Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" scheduler: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291488681Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" strictARP: false\n"} +{"Time":"2023-05-31T19:41:16.291490551Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" syncPeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.291492498Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcpFinTimeout: 0s\n"} +{"Time":"2023-05-31T19:41:16.291494446Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcpTimeout: 0s\n"} +{"Time":"2023-05-31T19:41:16.291874572Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" udpTimeout: 0s\n"} +{"Time":"2023-05-31T19:41:16.291881913Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T19:41:16.291885389Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T19:41:16.291891535Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mode: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291895274Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodePortAddresses: null\n"} +{"Time":"2023-05-31T19:41:16.291898532Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" oomScoreAdj: null\n"} +{"Time":"2023-05-31T19:41:16.291902037Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" portRange: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291905396Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" showHiddenMetricsForVersion: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291908704Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" winkernel:\n"} +{"Time":"2023-05-31T19:41:16.291911604Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enableDSR: false\n"} +{"Time":"2023-05-31T19:41:16.291914949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" forwardHealthCheckVip: false\n"} +{"Time":"2023-05-31T19:41:16.29191809Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" networkName: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291974547Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rootHnsEndpointName: \"\"\n"} +{"Time":"2023-05-31T19:41:16.291978163Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sourceVip: \"\"\n"} +{"Time":"2023-05-31T19:41:16.29198139Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubeconfig.conf: |-\n"} +{"Time":"2023-05-31T19:41:16.291985283Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.291988186Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\n"} +{"Time":"2023-05-31T19:41:16.291991578Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters:\n"} +{"Time":"2023-05-31T19:41:16.291994453Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - cluster:\n"} +{"Time":"2023-05-31T19:41:16.291997942Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt\n"} +{"Time":"2023-05-31T19:41:16.29200187Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" server: https://control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:41:16.292005663Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: default\n"} +{"Time":"2023-05-31T19:41:16.292008819Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts:\n"} +{"Time":"2023-05-31T19:41:16.292012287Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - context:\n"} +{"Time":"2023-05-31T19:41:16.29201545Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cluster: default\n"} +{"Time":"2023-05-31T19:41:16.292297351Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: default\n"} +{"Time":"2023-05-31T19:41:16.292306723Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user: default\n"} +{"Time":"2023-05-31T19:41:16.292310403Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: default\n"} +{"Time":"2023-05-31T19:41:16.292313463Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: default\n"} +{"Time":"2023-05-31T19:41:16.292316617Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users:\n"} +{"Time":"2023-05-31T19:41:16.292320215Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - name: default\n"} +{"Time":"2023-05-31T19:41:16.292324436Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" user:\n"} +{"Time":"2023-05-31T19:41:16.292328451Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token\n"} +{"Time":"2023-05-31T19:41:16.292332361Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.292335603Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.292338942Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:39:52Z\"\n"} +{"Time":"2023-05-31T19:41:16.292342569Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" labels:\n"} +{"Time":"2023-05-31T19:41:16.292346268Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" app: kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.292349712Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-proxy\n"} +{"Time":"2023-05-31T19:41:16.292352963Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.292360143Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"236\"\n"} +{"Time":"2023-05-31T19:41:16.292364264Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: ca52c03e-369b-4e9c-a906-2dc057e188ad\n"} +{"Time":"2023-05-31T19:41:16.292367777Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.292371188Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.292374688Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ca.crt: |\n"} +{"Time":"2023-05-31T19:41:16.292377683Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----BEGIN CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.292380988Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MIIDBjCCAe6gAwIBAgIBATANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDEwptaW5p\n"} +{"Time":"2023-05-31T19:41:16.292384288Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a3ViZUNBMB4XDTIzMDUzMDE4NDQyMVoXDTMzMDUyODE4NDQyMVowFTETMBEGA1UE\n"} +{"Time":"2023-05-31T19:41:16.292387569Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" AxMKbWluaWt1YmVDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPJb\n"} +{"Time":"2023-05-31T19:41:16.292720837Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ulHmSukaDrEycuEByEQZiIyxPEr3vyuV23CQR6OrCC28jOJbTsxs+EQ4uHFNnpM5\n"} +{"Time":"2023-05-31T19:41:16.292728724Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tgoLDvM+ZmYQerjs713lC8wNE7UuQhMdlWZOkvxgq+A9M6+UgUzvc2QqE1VSZWoZ\n"} +{"Time":"2023-05-31T19:41:16.292732178Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hY/r54cKMG+llektj5C+pgDwNUnDoCcV25P3wlxpZwkECxuLC4rvLxuHUY7XHxcF\n"} +{"Time":"2023-05-31T19:41:16.292735531Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" YGT+x0awZSukFW/aXUzY89IawWZJ2css9GdDdtGCg4FtbYM3C7TpIqK9aMPpGGw9\n"} +{"Time":"2023-05-31T19:41:16.292738755Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" a1p6tjLAe+4IOViW6l5kVvE0MRIfhjr7s9n3kw1iNtsnxSFTWb9PD1QlrMbY5WUD\n"} +{"Time":"2023-05-31T19:41:16.292742466Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" wCA+6ZkBR64ud9Frkn0CAwEAAaNhMF8wDgYDVR0PAQH/BAQDAgKkMB0GA1UdJQQW\n"} +{"Time":"2023-05-31T19:41:16.292746184Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" MBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW\n"} +{"Time":"2023-05-31T19:41:16.292749907Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" BBTO/o+FisPkVYKVBDDe4qAUX0MY8TANBgkqhkiG9w0BAQsFAAOCAQEAcNoiR67C\n"} +{"Time":"2023-05-31T19:41:16.292753754Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" A5w1C861cX1Uz2SyZScONFxof6dRY0zOfkCH342OKZDBxNrff8cd/y01A8FfXAyG\n"} +{"Time":"2023-05-31T19:41:16.292757332Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cdx1I3yPDBu8r39o6y+xsAiDcRJs2Rf7QNAMev0K3no3BZhsYhx7M5yeghMzgqMn\n"} +{"Time":"2023-05-31T19:41:16.292760857Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" QNtnv7OiXNYLTZQd7zu+9csMmtg40KQOCYD2Lmc2JNXtR672OMwxjdDna5ZFfVR2\n"} +{"Time":"2023-05-31T19:41:16.292764283Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" DqtzHTeLVkIxHR/TOHhCOqJm20qztEcEWvwxWrmkvNP6ATFuGrMTVUQF0rlT+03p\n"} +{"Time":"2023-05-31T19:41:16.292768414Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ynPwftTYmrc8EpX53ReZRUGXvD3SxByJXWrHa34RaADFha/vrLe3wdJi5YKDVkUb\n"} +{"Time":"2023-05-31T19:41:16.29277265Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" 7CgBAbyOUYs5rg==\n"} +{"Time":"2023-05-31T19:41:16.29277669Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -----END CERTIFICATE-----\n"} +{"Time":"2023-05-31T19:41:16.292780207Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.292784161Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.292787726Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" annotations:\n"} +{"Time":"2023-05-31T19:41:16.292791594Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetes.io/description: Contains a CA bundle that can be used to verify the\n"} +{"Time":"2023-05-31T19:41:16.292795308Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kube-apiserver when using internal endpoints such as the internal service\n"} +{"Time":"2023-05-31T19:41:16.292799128Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" IP or kubernetes.default.svc. No other usage is guaranteed across distributions\n"} +{"Time":"2023-05-31T19:41:16.2931417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" of Kubernetes clusters.\n"} +{"Time":"2023-05-31T19:41:16.293147954Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:40:06Z\"\n"} +{"Time":"2023-05-31T19:41:16.293151645Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kube-root-ca.crt\n"} +{"Time":"2023-05-31T19:41:16.293163136Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.293167392Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"332\"\n"} +{"Time":"2023-05-31T19:41:16.29317103Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 542c5d0f-ac6b-41b4-8e46-a99a71a0a950\n"} +{"Time":"2023-05-31T19:41:16.293174663Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.29317839Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.293182366Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ClusterConfiguration: |\n"} +{"Time":"2023-05-31T19:41:16.293185897Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiServer:\n"} +{"Time":"2023-05-31T19:41:16.293189213Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certSANs:\n"} +{"Time":"2023-05-31T19:41:16.293192613Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - 127.0.0.1\n"} +{"Time":"2023-05-31T19:41:16.293196049Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - localhost\n"} +{"Time":"2023-05-31T19:41:16.293199467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - 192.168.39.43\n"} +{"Time":"2023-05-31T19:41:16.293203095Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:41:16.293206678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authorization-mode: Node,RBAC\n"} +{"Time":"2023-05-31T19:41:16.293210719Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable-admission-plugins: NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\n"} +{"Time":"2023-05-31T19:41:16.293214597Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" timeoutForControlPlane: 4m0s\n"} +{"Time":"2023-05-31T19:41:16.293217824Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T19:41:16.293221055Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" certificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T19:41:16.293226919Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterName: mk\n"} +{"Time":"2023-05-31T19:41:16.293230276Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" controlPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T19:41:16.293233837Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" controllerManager:\n"} +{"Time":"2023-05-31T19:41:16.293506688Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:41:16.293511973Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T19:41:16.293515456Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:41:16.293518502Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dns: {}\n"} +{"Time":"2023-05-31T19:41:16.293521608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" etcd:\n"} +{"Time":"2023-05-31T19:41:16.29352509Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" local:\n"} +{"Time":"2023-05-31T19:41:16.293528068Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T19:41:16.293531064Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:41:16.293534661Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T19:41:16.29353783Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageRepository: registry.k8s.io\n"} +{"Time":"2023-05-31T19:41:16.293541265Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ClusterConfiguration\n"} +{"Time":"2023-05-31T19:41:16.29354504Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T19:41:16.293551876Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" networking:\n"} +{"Time":"2023-05-31T19:41:16.293555482Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T19:41:16.293560278Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" podSubnet: 10.244.0.0/16\n"} +{"Time":"2023-05-31T19:41:16.293563207Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T19:41:16.293567415Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" scheduler:\n"} +{"Time":"2023-05-31T19:41:16.293572456Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" extraArgs:\n"} +{"Time":"2023-05-31T19:41:16.293576332Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" leader-elect: \"false\"\n"} +{"Time":"2023-05-31T19:41:16.293579602Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.29358277Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.293586894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:39:50Z\"\n"} +{"Time":"2023-05-31T19:41:16.293590023Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kubeadm-config\n"} +{"Time":"2023-05-31T19:41:16.293593021Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.293597787Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"196\"\n"} +{"Time":"2023-05-31T19:41:16.29374379Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 7948c83b-6e30-40c6-9109-b83a516a2c26\n"} +{"Time":"2023-05-31T19:41:16.293749907Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - apiVersion: v1\n"} +{"Time":"2023-05-31T19:41:16.293753933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" data:\n"} +{"Time":"2023-05-31T19:41:16.293757793Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kubelet: |\n"} +{"Time":"2023-05-31T19:41:16.293760957Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T19:41:16.29376394Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authentication:\n"} +{"Time":"2023-05-31T19:41:16.293767472Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" anonymous:\n"} +{"Time":"2023-05-31T19:41:16.29377062Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enabled: false\n"} +{"Time":"2023-05-31T19:41:16.293774092Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" webhook:\n"} +{"Time":"2023-05-31T19:41:16.29377784Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheTTL: 0s\n"} +{"Time":"2023-05-31T19:41:16.293780865Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enabled: true\n"} +{"Time":"2023-05-31T19:41:16.293784189Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" x509:\n"} +{"Time":"2023-05-31T19:41:16.29378742Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T19:41:16.293790814Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" authorization:\n"} +{"Time":"2023-05-31T19:41:16.29379418Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mode: Webhook\n"} +{"Time":"2023-05-31T19:41:16.293797482Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" webhook:\n"} +{"Time":"2023-05-31T19:41:16.293801233Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheAuthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:41:16.293804247Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cacheUnauthorizedTTL: 0s\n"} +{"Time":"2023-05-31T19:41:16.293807412Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T19:41:16.293810756Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterDNS:\n"} +{"Time":"2023-05-31T19:41:16.293814079Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" - 10.96.0.10\n"} +{"Time":"2023-05-31T19:41:16.293817373Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusterDomain: cluster.local\n"} +{"Time":"2023-05-31T19:41:16.293820741Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" containerRuntimeEndpoint: \"\"\n"} +{"Time":"2023-05-31T19:41:16.293825061Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cpuManagerReconcilePeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.293828452Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" evictionHard:\n"} +{"Time":"2023-05-31T19:41:16.294123245Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imagefs.available: 0%\n"} +{"Time":"2023-05-31T19:41:16.294128577Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodefs.available: 0%\n"} +{"Time":"2023-05-31T19:41:16.294131969Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodefs.inodesFree: 0%\n"} +{"Time":"2023-05-31T19:41:16.294135667Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" evictionPressureTransitionPeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.294139975Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" failSwapOn: false\n"} +{"Time":"2023-05-31T19:41:16.294143302Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fileCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:41:16.294146605Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T19:41:16.294149954Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzBindAddress: 127.0.0.1\n"} +{"Time":"2023-05-31T19:41:16.294153293Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" healthzPort: 10248\n"} +{"Time":"2023-05-31T19:41:16.294156361Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" httpCheckFrequency: 0s\n"} +{"Time":"2023-05-31T19:41:16.294159665Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T19:41:16.294163126Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imageMinimumGCAge: 0s\n"} +{"Time":"2023-05-31T19:41:16.294166679Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: KubeletConfiguration\n"} +{"Time":"2023-05-31T19:41:16.294170419Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" logging:\n"} +{"Time":"2023-05-31T19:41:16.294174348Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" flushFrequency: 0\n"} +{"Time":"2023-05-31T19:41:16.294178015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" options:\n"} +{"Time":"2023-05-31T19:41:16.294181399Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" json:\n"} +{"Time":"2023-05-31T19:41:16.294184658Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" infoBufferSize: \"0\"\n"} +{"Time":"2023-05-31T19:41:16.294188794Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" verbosity: 0\n"} +{"Time":"2023-05-31T19:41:16.294192559Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" memorySwap: {}\n"} +{"Time":"2023-05-31T19:41:16.294198132Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodeStatusReportFrequency: 0s\n"} +{"Time":"2023-05-31T19:41:16.29420208Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" nodeStatusUpdateFrequency: 0s\n"} +{"Time":"2023-05-31T19:41:16.294205429Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resolvConf: /run/systemd/resolve/resolv.conf\n"} +{"Time":"2023-05-31T19:41:16.294208712Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rotateCertificates: true\n"} +{"Time":"2023-05-31T19:41:16.294212054Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtimeRequestTimeout: 15m0s\n"} +{"Time":"2023-05-31T19:41:16.294509698Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shutdownGracePeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.294518548Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shutdownGracePeriodCriticalPods: 0s\n"} +{"Time":"2023-05-31T19:41:16.294559248Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" staticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T19:41:16.294564965Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" streamingConnectionIdleTimeout: 0s\n"} +{"Time":"2023-05-31T19:41:16.294568543Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" syncFrequency: 0s\n"} +{"Time":"2023-05-31T19:41:16.294572645Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" volumeStatsAggPeriod: 0s\n"} +{"Time":"2023-05-31T19:41:16.294576207Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: ConfigMap\n"} +{"Time":"2023-05-31T19:41:16.294579819Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.294583293Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" creationTimestamp: \"2023-05-31T19:39:50Z\"\n"} +{"Time":"2023-05-31T19:41:16.294587302Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" name: kubelet-config\n"} +{"Time":"2023-05-31T19:41:16.294590844Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespace: kube-system\n"} +{"Time":"2023-05-31T19:41:16.294594747Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"200\"\n"} +{"Time":"2023-05-31T19:41:16.294598416Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid: 11c3ffd2-e43f-4e40-91bf-66b3e4616654\n"} +{"Time":"2023-05-31T19:41:16.29460189Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: List\n"} +{"Time":"2023-05-31T19:41:16.294605977Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metadata:\n"} +{"Time":"2023-05-31T19:41:16.294609652Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" resourceVersion: \"\"\n"} +{"Time":"2023-05-31T19:41:16.294613032Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.294616157Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.294619634Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T19:41:16.294635423Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ● docker.service\r\n"} +{"Time":"2023-05-31T19:41:16.294639812Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: masked (Reason: Unit docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:41:16.294643709Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: inactive (dead)\r\n"} +{"Time":"2023-05-31T19:41:16.294647582Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:41:16.294651124Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.294654454Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.294808429Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T19:41:16.294819063Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;35m# Unit docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:41:16.294823014Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.294826425Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.294829964Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T19:41:16.294833611Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" {\r\n"} +{"Time":"2023-05-31T19:41:16.294836971Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"exec-opts\": [\r\n"} +{"Time":"2023-05-31T19:41:16.294840431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"native.cgroupdriver=systemd\"\r\n"} +{"Time":"2023-05-31T19:41:16.294843965Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ],\r\n"} +{"Time":"2023-05-31T19:41:16.294847769Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"log-driver\": \"json-file\",\r\n"} +{"Time":"2023-05-31T19:41:16.294851384Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"log-opts\": {\r\n"} +{"Time":"2023-05-31T19:41:16.294854743Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"max-size\": \"100m\"\r\n"} +{"Time":"2023-05-31T19:41:16.294858205Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" },\r\n"} +{"Time":"2023-05-31T19:41:16.294861651Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"storage-driver\": \"overlay2\"\r\n"} +{"Time":"2023-05-31T19:41:16.294867771Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" }\r\n"} +{"Time":"2023-05-31T19:41:16.294880241Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.294883336Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.294886649Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T19:41:16.2948902Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Client:\r\n"} +{"Time":"2023-05-31T19:41:16.294893537Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Version: 24.0.1\r\n"} +{"Time":"2023-05-31T19:41:16.294897088Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Context: default\r\n"} +{"Time":"2023-05-31T19:41:16.294900436Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Debug Mode: false\r\n"} +{"Time":"2023-05-31T19:41:16.294903711Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.294906727Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Server:\r\n"} +{"Time":"2023-05-31T19:41:16.294910096Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ERROR: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?\r\n"} +{"Time":"2023-05-31T19:41:16.294914235Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" errors pretty printing info\r\n"} +{"Time":"2023-05-31T19:41:16.295175485Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:41:16.295179952Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.295182957Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.295186114Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T19:41:16.295189659Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;31m●\u001b[0m cri-docker.service\r\n"} +{"Time":"2023-05-31T19:41:16.295193548Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: masked (Reason: Unit cri-docker.service is masked.)\r\n"} +{"Time":"2023-05-31T19:41:16.295197322Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: \u001b[0;1;31mfailed\u001b[0m (Result: exit-code) since Wed 2023-05-31 19:39:25 UTC; 1min 47s ago\r\n"} +{"Time":"2023-05-31T19:41:16.295201042Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TriggeredBy: \u001b[0;1;31m●\u001b[0m cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:41:16.295204557Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Main PID: 453 (code=exited, status=1/FAILURE)\r\n"} +{"Time":"2023-05-31T19:41:16.295207893Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.295211409Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:25 enable-default-cni-509041 systemd[1]: cri-docker.service: Scheduled restart job, restart counter is at 3.\r\n"} +{"Time":"2023-05-31T19:41:16.295228103Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:25 enable-default-cni-509041 systemd[1]: Stopped CRI Interface for Docker Application Container Engine.\r\n"} +{"Time":"2023-05-31T19:41:16.295232136Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:25 enable-default-cni-509041 systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Start request repeated too quickly.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.295236901Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:25 enable-default-cni-509041 systemd[1]: \u001b[0;1;38;5;185m\u001b[0;1;39m\u001b[0;1;38;5;185mcri-docker.service: Failed with result 'exit-code'.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.295240964Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:25 enable-default-cni-509041 systemd[1]: \u001b[0;1;31m\u001b[0;1;39m\u001b[0;1;31mFailed to start CRI Interface for Docker Application Container Engine.\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.295244801Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:41:16.295247812Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.295250625Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.295253824Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T19:41:16.295257324Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;35m# Unit cri-docker.service is masked\u001b[0m.\r\n"} +{"Time":"2023-05-31T19:41:16.295524447Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.295528837Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.29553224Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T19:41:16.295536722Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cat: /etc/systemd/system/cri-docker.service.d/10-cni.conf: No such file or directory\r\n"} +{"Time":"2023-05-31T19:41:16.295540176Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ssh: Process exited with status 1\n"} +{"Time":"2023-05-31T19:41:16.295543345Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.295546304Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.295549572Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T19:41:16.295552926Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:41:16.295565745Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=CRI Interface for Docker Application Container Engine\r\n"} +{"Time":"2023-05-31T19:41:16.295569406Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://docs.mirantis.com\r\n"} +{"Time":"2023-05-31T19:41:16.295572859Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network-online.target firewalld.service docker.service\r\n"} +{"Time":"2023-05-31T19:41:16.295576599Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:41:16.295579867Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requires=cri-docker.socket\r\n"} +{"Time":"2023-05-31T19:41:16.295583103Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.295586237Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:41:16.295589442Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:41:16.295592864Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/cri-dockerd --container-runtime-endpoint fd://\r\n"} +{"Time":"2023-05-31T19:41:16.295596427Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:41:16.29559997Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TimeoutSec=0\r\n"} +{"Time":"2023-05-31T19:41:16.295603049Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" RestartSec=2\r\n"} +{"Time":"2023-05-31T19:41:16.295606096Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=always\r\n"} +{"Time":"2023-05-31T19:41:16.295609836Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.295615805Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note that StartLimit* options were moved from \"Service\" to \"Unit\" in systemd 229.\r\n"} +{"Time":"2023-05-31T19:41:16.295946385Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Both the old, and new location are accepted by systemd 229 and up, so using the old location\r\n"} +{"Time":"2023-05-31T19:41:16.295951232Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # to make them work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:41:16.295954559Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitBurst=3\r\n"} +{"Time":"2023-05-31T19:41:16.295957799Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.29596127Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note that StartLimitInterval was renamed to StartLimitIntervalSec in systemd 230.\r\n"} +{"Time":"2023-05-31T19:41:16.295964794Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Both the old, and new name are accepted by systemd 230 and up, so using the old name to make\r\n"} +{"Time":"2023-05-31T19:41:16.295968442Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this option work for either version of systemd.\r\n"} +{"Time":"2023-05-31T19:41:16.295972047Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" StartLimitInterval=60s\r\n"} +{"Time":"2023-05-31T19:41:16.295975439Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.295978784Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:41:16.295982492Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:41:16.295985874Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.295990909Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.295994339Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.295997532Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.296000949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Comment TasksMax if your systemd version does not support it.\r\n"} +{"Time":"2023-05-31T19:41:16.296004531Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only systemd 226 and above support this option.\r\n"} +{"Time":"2023-05-31T19:41:16.296008118Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.296011624Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:41:16.296015118Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:41:16.296018561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.29602171Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:41:16.296025334Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:41:16.296344893Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.296351093Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.296354487Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T19:41:16.296357844Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cri-dockerd 0.3.2 (23513f4)\r\n"} +{"Time":"2023-05-31T19:41:16.296360872Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.296364107Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.296367249Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T19:41:16.296370709Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;32m●\u001b[0m containerd.service - containerd container runtime\r\n"} +{"Time":"2023-05-31T19:41:16.296374809Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: loaded (\u001b]8;;file://enable-default-cni-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007; disabled; vendor preset: disabled)\r\n"} +{"Time":"2023-05-31T19:41:16.296378883Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: \u001b[0;1;32mactive (running)\u001b[0m since Wed 2023-05-31 19:39:37 UTC; 1min 36s ago\r\n"} +{"Time":"2023-05-31T19:41:16.296382554Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docs: \u001b]8;;https://containerd.io\u0007https://containerd.io\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:41:16.296386214Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Main PID: 668 (containerd)\r\n"} +{"Time":"2023-05-31T19:41:16.296389885Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Tasks: 104 (limit: 8192)\r\n"} +{"Time":"2023-05-31T19:41:16.296393474Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Memory: 201.3M\r\n"} +{"Time":"2023-05-31T19:41:16.296396821Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" CGroup: /system.slice/containerd.service\r\n"} +{"Time":"2023-05-31T19:41:16.296400531Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─ 668 /usr/bin/containerd --root /mnt/vda1/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:41:16.296404661Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─ 910 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a682f88d274c28d1023047b20052a8e02a7dffb63ed474d4ce1bf3b28b969c9c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:41:16.29642289Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─ 938 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ec6602f25a60bea6b6ae2f4b2646ee5de2db3bb9f908a0857b20bef81a845811 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:41:16.296427097Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─ 946 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 0ef3fa6269014da9d8697a29483bab328e4c0fa57fb70079acb299949c58d16d -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:41:16.29666014Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─ 950 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 2ed36dcaa61b909932431ee24abf074ed24457f44e453b4b90fd593afbdea5e2 -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:41:16.296667798Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─1446 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id a80aea2aa3ca8359a1710ac18edf1c5681ee318e58963b3115d8bfa2aeae604a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:41:16.296672388Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─1525 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id f2e48c35a56990e0f7844a58be6ccb274063e417c9b3f51ce75f38d6eec84c3a -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:41:16.29667716Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ├─1832 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id b714f669adb517ccd511bd1f6160b26e8e6108bc6b71ad52ca3d4255038e4d1c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:41:16.296683438Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" └─2078 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id 1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c -address /run/containerd/containerd.sock\r\n"} +{"Time":"2023-05-31T19:41:16.29668722Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.296691106Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:52.987770331Z\" level=info msg=\"stop pulling image registry.k8s.io/e2e-test-images/agnhost:2.40: active requests=0, bytes read=51164237\"\r\n"} +{"Time":"2023-05-31T19:41:16.296695918Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:52.991059676Z\" level=info msg=\"ImageCreate event name:\\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:41:16.29670112Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:52.994687931Z\" level=info msg=\"ImageUpdate event name:\\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:41:16.296706596Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:52.997974666Z\" level=info msg=\"ImageCreate event name:\\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\" labels:{key:\\\"io.cri-containerd.image\\\" value:\\\"managed\\\"}\"\r\n"} +{"Time":"2023-05-31T19:41:16.296712179Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:52.998959940Z\" level=info msg=\"Pulled image \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" with image id \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\", repo tag \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\", repo digest \\\"registry.k8s.io/e2e-test-images/agnhost@sha256:af7e3857d87770ddb40f5ea4f89b5a2709504ab1ee31f9ea4ab5823c045f2146\\\", size \\\"51155161\\\" in 2.733368425s\"\r\n"} +{"Time":"2023-05-31T19:41:16.297083278Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:52 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:52.999020454Z\" level=info msg=\"PullImage \\\"registry.k8s.io/e2e-test-images/agnhost:2.40\\\" returns image reference \\\"sha256:28081458d86cc949dd455f7c87a8986604095595b14e58d51483e63bb6ab5b97\\\"\"\r\n"} +{"Time":"2023-05-31T19:41:16.297093882Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:53 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:53.005083788Z\" level=info msg=\"CreateContainer within sandbox \\\"1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c\\\" for container \u0026ContainerMetadata{Name:dnsutils,Attempt:0,}\"\r\n"} +{"Time":"2023-05-31T19:41:16.297100148Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:53 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:53.032495879Z\" level=info msg=\"CreateContainer within sandbox \\\"1f0cf3e0bc8d915cef25153e895dbc5746879829e67b05e97fde4be9424c058c\\\" for \u0026ContainerMetadata{Name:dnsutils,Attempt:0,} returns container id \\\"2c312f70c3822226ef8700bd40fa38cc083e2d12beb35786059ddc0595a7b636\\\"\"\r\n"} +{"Time":"2023-05-31T19:41:16.297106623Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:53 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:53.036013407Z\" level=info msg=\"StartContainer for \\\"2c312f70c3822226ef8700bd40fa38cc083e2d12beb35786059ddc0595a7b636\\\"\"\r\n"} +{"Time":"2023-05-31T19:41:16.297112282Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:40:53 enable-default-cni-509041 containerd[668]: time=\"2023-05-31T19:40:53.126911603Z\" level=info msg=\"StartContainer for \\\"2c312f70c3822226ef8700bd40fa38cc083e2d12beb35786059ddc0595a7b636\\\" returns successfully\"\r\n"} +{"Time":"2023-05-31T19:41:16.297116947Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.297120915Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.29712497Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T19:41:16.2971302Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-509041/usr/lib/systemd/system/containerd.service\u0007/usr/lib/systemd/system/containerd.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.29713492Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:41:16.29713877Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:41:16.297156566Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:41:16.297160822Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:41:16.297182994Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:41:16.29718714Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.297190917Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:41:16.297195379Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:41:16.297199485Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:41:16.297203425Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:41:16.297207417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:41:16.297211181Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:41:16.297215074Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:41:16.297219244Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:41:16.297223191Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:41:16.297227176Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:41:16.297231004Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:41:16.297234951Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:41:16.297239056Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:41:16.297242696Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:41:16.297246487Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:41:16.297250345Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:41:16.297254864Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:41:16.29725879Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.297262385Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.297266081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:41:16.297269771Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:41:16.297273398Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.297460428Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:41:16.297464856Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:41:16.297473355Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.297476929Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.29748074Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T19:41:16.297484715Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:41:16.297498043Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=containerd container runtime\r\n"} +{"Time":"2023-05-31T19:41:16.297501991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://containerd.io\r\n"} +{"Time":"2023-05-31T19:41:16.297505591Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:41:16.297508836Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:41:16.297511933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.297514942Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:41:16.297518066Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=-/etc/sysconfig/containerd\r\n"} +{"Time":"2023-05-31T19:41:16.297521417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=-/etc/sysconfig/containerd.minikube\r\n"} +{"Time":"2023-05-31T19:41:16.297524778Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:41:16.297528125Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:41:16.297531431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStartPre=/sbin/modprobe overlay\r\n"} +{"Time":"2023-05-31T19:41:16.297534733Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/containerd \\\r\n"} +{"Time":"2023-05-31T19:41:16.297537974Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CONTAINERD_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:41:16.297541505Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CONTAINERD_MINIKUBE_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:41:16.297544774Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --root ${PERSISTENT_DIR}/var/lib/containerd\r\n"} +{"Time":"2023-05-31T19:41:16.297548082Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:41:16.297551427Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ref: https://github.com/containerd/containerd/blob/main/docs/ops.md#systemd\r\n"} +{"Time":"2023-05-31T19:41:16.297554669Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Delegate=yes\r\n"} +{"Time":"2023-05-31T19:41:16.297731019Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" KillMode=process\r\n"} +{"Time":"2023-05-31T19:41:16.29775051Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:41:16.297754802Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Having non-zero Limit*s causes performance problems due to accounting overhead\r\n"} +{"Time":"2023-05-31T19:41:16.297758891Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in the kernel. We recommend using cgroups to do container-local accounting.\r\n"} +{"Time":"2023-05-31T19:41:16.297774787Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.29778436Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.297788131Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:41:16.297791508Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:41:16.29779478Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.297798619Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:41:16.29780207Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:41:16.297805752Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.297808996Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.297812424Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T19:41:16.297816583Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:41:16.297819949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:41:16.297835536Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:41:16.297845292Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:41:16.297848933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # imports\r\n"} +{"Time":"2023-05-31T19:41:16.297852264Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.297855578Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:41:16.297859071Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:41:16.297862664Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.297866067Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.297872234Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:41:16.297980647Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:41:16.297986397Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.297990037Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:41:16.297993389Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298006364Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.298009702Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.298013231Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298016493Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.29801978Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:41:16.298037431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298041012Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:41:16.298044618Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298047974Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:41:16.298051504Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298054744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298057893Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:41:16.298061138Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:41:16.298064508Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:41:16.298067029Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:41:16.298069695Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.29807305Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:41:16.298076391Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:41:16.298089005Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:41:16.298098824Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:41:16.298102433Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:41:16.298106105Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:41:16.298215505Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:41:16.298226291Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298229932Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:41:16.298233867Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:41:16.298236838Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:41:16.298240187Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.298243773Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:41:16.298247541Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298250689Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298253738Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298257417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:41:16.298261047Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:41:16.298289244Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:41:16.298301195Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:41:16.298305288Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:41:16.298308744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.29831214Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:41:16.298317033Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:41:16.298320742Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:41:16.298324024Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298327424Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:41:16.29833228Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:41:16.298335231Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298467463Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:41:16.298473704Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:41:16.298478995Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:41:16.298482708Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:41:16.298485928Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:41:16.298499608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:41:16.298508974Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:41:16.298514192Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:41:16.298517967Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.298520948Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.298524153Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T19:41:16.298527874Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disabled_plugins = []\r\n"} +{"Time":"2023-05-31T19:41:16.298531135Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" imports = [\"/etc/containerd/config.toml\"]\r\n"} +{"Time":"2023-05-31T19:41:16.298534273Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" oom_score = 0\r\n"} +{"Time":"2023-05-31T19:41:16.298537056Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" plugin_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298540563Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" required_plugins = []\r\n"} +{"Time":"2023-05-31T19:41:16.29854377Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root = \"/var/lib/containerd\"\r\n"} +{"Time":"2023-05-31T19:41:16.29855798Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" state = \"/run/containerd\"\r\n"} +{"Time":"2023-05-31T19:41:16.298561977Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" temp = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298565322Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version = 2\r\n"} +{"Time":"2023-05-31T19:41:16.298577865Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.29858147Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [cgroup]\r\n"} +{"Time":"2023-05-31T19:41:16.298584705Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298588075Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298591299Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [debug]\r\n"} +{"Time":"2023-05-31T19:41:16.298594912Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298730733Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" format = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.29873665Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.29874115Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" level = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298744561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.298757995Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298769377Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [grpc]\r\n"} +{"Time":"2023-05-31T19:41:16.298773226Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"/run/containerd/containerd.sock\"\r\n"} +{"Time":"2023-05-31T19:41:16.298777005Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.298780372Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_recv_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:41:16.298783989Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_send_message_size = 16777216\r\n"} +{"Time":"2023-05-31T19:41:16.298787353Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcp_address = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298791108Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcp_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298794487Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcp_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298797762Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tcp_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298800997Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.298820879Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298825025Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [metrics]\r\n"} +{"Time":"2023-05-31T19:41:16.298828665Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.298831904Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" grpc_histogram = false\r\n"} +{"Time":"2023-05-31T19:41:16.298837846Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298841221Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins]\r\n"} +{"Time":"2023-05-31T19:41:16.298844478Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.298847942Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.gc.v1.scheduler\"]\r\n"} +{"Time":"2023-05-31T19:41:16.298851502Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" deletion_threshold = 0\r\n"} +{"Time":"2023-05-31T19:41:16.298855239Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" mutation_threshold = 100\r\n"} +{"Time":"2023-05-31T19:41:16.298858775Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pause_threshold = 0.02\r\n"} +{"Time":"2023-05-31T19:41:16.299013042Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" schedule_delay = \"0s\"\r\n"} +{"Time":"2023-05-31T19:41:16.299018907Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" startup_delay = \"100ms\"\r\n"} +{"Time":"2023-05-31T19:41:16.299022353Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.299025784Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\"]\r\n"} +{"Time":"2023-05-31T19:41:16.299029689Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cdi_spec_dirs = [\"/etc/cdi\", \"/var/run/cdi\"]\r\n"} +{"Time":"2023-05-31T19:41:16.299033729Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:41:16.299037024Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_apparmor = false\r\n"} +{"Time":"2023-05-31T19:41:16.299040609Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_cgroup = false\r\n"} +{"Time":"2023-05-31T19:41:16.299044226Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:41:16.299047702Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_proc_mount = false\r\n"} +{"Time":"2023-05-31T19:41:16.299053009Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_tcp_service = true\r\n"} +{"Time":"2023-05-31T19:41:16.299056255Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" drain_exec_sync_io_timeout = \"0s\"\r\n"} +{"Time":"2023-05-31T19:41:16.299070441Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_cdi = false\r\n"} +{"Time":"2023-05-31T19:41:16.299080585Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_selinux = false\r\n"} +{"Time":"2023-05-31T19:41:16.299084369Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_tls_streaming = false\r\n"} +{"Time":"2023-05-31T19:41:16.299088359Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_unprivileged_icmp = false\r\n"} +{"Time":"2023-05-31T19:41:16.299092256Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_unprivileged_ports = false\r\n"} +{"Time":"2023-05-31T19:41:16.299095907Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ignore_image_defined_volumes = false\r\n"} +{"Time":"2023-05-31T19:41:16.299100186Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" image_pull_progress_timeout = \"1m0s\"\r\n"} +{"Time":"2023-05-31T19:41:16.299103531Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:41:16.299107368Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_container_log_line_size = 16384\r\n"} +{"Time":"2023-05-31T19:41:16.299111198Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" netns_mounts_under_state_dir = false\r\n"} +{"Time":"2023-05-31T19:41:16.299126158Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" restrict_oom_score_adj = false\r\n"} +{"Time":"2023-05-31T19:41:16.299130224Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sandbox_image = \"registry.k8s.io/pause:3.9\"\r\n"} +{"Time":"2023-05-31T19:41:16.299215963Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" selinux_category_range = 1024\r\n"} +{"Time":"2023-05-31T19:41:16.299221125Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stats_collect_period = 10\r\n"} +{"Time":"2023-05-31T19:41:16.299224729Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_idle_timeout = \"4h0m0s\"\r\n"} +{"Time":"2023-05-31T19:41:16.299229259Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_server_address = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299232724Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_server_port = \"10010\"\r\n"} +{"Time":"2023-05-31T19:41:16.299236617Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" systemd_cgroup = false\r\n"} +{"Time":"2023-05-31T19:41:16.299252105Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tolerate_missing_hugetlb_controller = true\r\n"} +{"Time":"2023-05-31T19:41:16.299256244Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" unset_seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299266261Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.299269991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".cni]\r\n"} +{"Time":"2023-05-31T19:41:16.299273378Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bin_dir = \"/opt/cni/bin\"\r\n"} +{"Time":"2023-05-31T19:41:16.299277061Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conf_dir = \"/etc/cni/net.d\"\r\n"} +{"Time":"2023-05-31T19:41:16.29928151Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conf_template = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299285178Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ip_pref = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299288653Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_conf_num = 1\r\n"} +{"Time":"2023-05-31T19:41:16.299292053Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" setup_serially = false\r\n"} +{"Time":"2023-05-31T19:41:16.299295377Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.299298597Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd]\r\n"} +{"Time":"2023-05-31T19:41:16.299302394Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_runtime_name = \"runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.29930588Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_snapshot_annotations = true\r\n"} +{"Time":"2023-05-31T19:41:16.299309475Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" discard_unpacked_layers = true\r\n"} +{"Time":"2023-05-31T19:41:16.299312813Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ignore_blockio_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:41:16.299316233Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ignore_rdt_not_enabled_errors = false\r\n"} +{"Time":"2023-05-31T19:41:16.299319591Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:41:16.299484899Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:41:16.299489632Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.299493258Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime]\r\n"} +{"Time":"2023-05-31T19:41:16.29949747Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299501269Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299506741Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:41:16.299510379Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:41:16.299513853Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:41:16.299517209Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:41:16.299520618Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:41:16.299524297Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299527596Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299530908Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299534358Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.29953766Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299540833Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299544043Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.299547809Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.default_runtime.options]\r\n"} +{"Time":"2023-05-31T19:41:16.299553073Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.299556371Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes]\r\n"} +{"Time":"2023-05-31T19:41:16.299559828Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.299563155Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:41:16.29956676Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299569621Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299773555Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:41:16.299783612Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:41:16.299787257Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:41:16.29979025Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:41:16.299794435Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:41:16.299798456Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299802022Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.29980562Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299809031Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"io.containerd.runc.v2\"\r\n"} +{"Time":"2023-05-31T19:41:16.299812512Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299816015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299819291Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.299822802Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.runtimes.runc.options]\r\n"} +{"Time":"2023-05-31T19:41:16.299826753Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" SystemdCgroup = false\r\n"} +{"Time":"2023-05-31T19:41:16.299829813Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.29983326Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime]\r\n"} +{"Time":"2023-05-31T19:41:16.299836837Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" base_runtime_spec = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299840202Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_conf_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.299843374Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cni_max_conf_num = 0\r\n"} +{"Time":"2023-05-31T19:41:16.29984708Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" container_annotations = []\r\n"} +{"Time":"2023-05-31T19:41:16.299850259Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pod_annotations = []\r\n"} +{"Time":"2023-05-31T19:41:16.299853755Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:41:16.299857502Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" privileged_without_host_devices_all_devices_allowed = false\r\n"} +{"Time":"2023-05-31T19:41:16.300000257Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_engine = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300004575Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300007908Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.30001142Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300014885Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sandbox_mode = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300018335Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" snapshotter = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300021745Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300028297Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".containerd.untrusted_workload_runtime.options]\r\n"} +{"Time":"2023-05-31T19:41:16.300032103Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300035487Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".image_decryption]\r\n"} +{"Time":"2023-05-31T19:41:16.300039255Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" key_model = \"node\"\r\n"} +{"Time":"2023-05-31T19:41:16.300042659Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300046041Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry]\r\n"} +{"Time":"2023-05-31T19:41:16.300049543Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config_path = \"/etc/containerd/certs.d\"\r\n"} +{"Time":"2023-05-31T19:41:16.300052921Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300056048Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.auths]\r\n"} +{"Time":"2023-05-31T19:41:16.300059467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300065311Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.configs]\r\n"} +{"Time":"2023-05-31T19:41:16.300068896Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300072225Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.headers]\r\n"} +{"Time":"2023-05-31T19:41:16.300075546Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300078822Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".registry.mirrors]\r\n"} +{"Time":"2023-05-31T19:41:16.300082236Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30008538Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.grpc.v1.cri\".x509_key_pair_streaming]\r\n"} +{"Time":"2023-05-31T19:41:16.30027292Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tls_cert_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300276867Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" tls_key_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300280144Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300283463Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.internal.v1.opt\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300286924Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"/opt/containerd\"\r\n"} +{"Time":"2023-05-31T19:41:16.300290254Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300294604Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.internal.v1.restart\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300298261Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" interval = \"10s\"\r\n"} +{"Time":"2023-05-31T19:41:16.300301804Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300304998Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.internal.v1.tracing\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300308387Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sampling_ratio = 1.0\r\n"} +{"Time":"2023-05-31T19:41:16.300311965Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" service_name = \"containerd\"\r\n"} +{"Time":"2023-05-31T19:41:16.300315271Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300318601Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.metadata.v1.bolt\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300332275Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" content_sharing_policy = \"shared\"\r\n"} +{"Time":"2023-05-31T19:41:16.300336044Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300340254Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.monitor.v1.cgroups\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300343547Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_prometheus = false\r\n"} +{"Time":"2023-05-31T19:41:16.300346695Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300349901Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.nri.v1.nri\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300353403Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable = true\r\n"} +{"Time":"2023-05-31T19:41:16.300356768Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" disable_connections = false\r\n"} +{"Time":"2023-05-31T19:41:16.300360503Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" plugin_config_path = \"/etc/nri/conf.d\"\r\n"} +{"Time":"2023-05-31T19:41:16.300364086Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" plugin_path = \"/opt/nri/plugins\"\r\n"} +{"Time":"2023-05-31T19:41:16.300525991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" plugin_registration_timeout = \"5s\"\r\n"} +{"Time":"2023-05-31T19:41:16.300530229Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" plugin_request_timeout = \"2s\"\r\n"} +{"Time":"2023-05-31T19:41:16.300533929Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" socket_path = \"/var/run/nri/nri.sock\"\r\n"} +{"Time":"2023-05-31T19:41:16.300537276Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300540388Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.runtime.v1.linux\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300543796Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_shim = false\r\n"} +{"Time":"2023-05-31T19:41:16.300566265Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.300570249Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.30057371Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shim = \"containerd-shim\"\r\n"} +{"Time":"2023-05-31T19:41:16.300577007Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" shim_debug = false\r\n"} +{"Time":"2023-05-31T19:41:16.30058009Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30058361Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.runtime.v2.task\"]\r\n"} +{"Time":"2023-05-31T19:41:16.30058697Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" platforms = [\"linux/amd64\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300590696Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" sched_core = false\r\n"} +{"Time":"2023-05-31T19:41:16.30059421Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30059729Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.service.v1.diff-service\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300600462Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default = [\"walking\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300605536Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300608589Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.service.v1.tasks-service\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300612016Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300615395Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300618795Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300621982Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.aufs\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300625366Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300628262Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300756125Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.btrfs\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300760627Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300763991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300767304Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.devmapper\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300770702Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" async_remove = false\r\n"} +{"Time":"2023-05-31T19:41:16.300774431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" base_image_size = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300778199Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" discard_blocks = false\r\n"} +{"Time":"2023-05-31T19:41:16.30078164Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fs_options = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300785033Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" fs_type = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300788325Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pool_name = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300791523Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300794617Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300797715Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.native\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300801167Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300804277Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300807438Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.overlayfs\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300810763Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300813918Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" upperdir_label = false\r\n"} +{"Time":"2023-05-31T19:41:16.300816958Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300820135Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.snapshotter.v1.zfs\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300823439Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300828015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300831304Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.tracing.processor.v1.otlp\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300834509Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" endpoint = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300837757Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" insecure = false\r\n"} +{"Time":"2023-05-31T19:41:16.300896115Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" protocol = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300899759Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300903019Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [plugins.\"io.containerd.transfer.v1.local\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300907739Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300911364Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_concurrent_downloads = 3\r\n"} +{"Time":"2023-05-31T19:41:16.300914648Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" max_concurrent_uploaded_layers = 3\r\n"} +{"Time":"2023-05-31T19:41:16.300917911Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300921184Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [[plugins.\"io.containerd.transfer.v1.local\".unpack_config]]\r\n"} +{"Time":"2023-05-31T19:41:16.300924626Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" differ = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.300927808Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" platform = \"linux/amd64\"\r\n"} +{"Time":"2023-05-31T19:41:16.300931091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" snapshotter = \"overlayfs\"\r\n"} +{"Time":"2023-05-31T19:41:16.300934318Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300937491Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [proxy_plugins]\r\n"} +{"Time":"2023-05-31T19:41:16.300940608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300943927Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [stream_processors]\r\n"} +{"Time":"2023-05-31T19:41:16.300947033Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300950385Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300954415Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300957921Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300961933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:41:16.300965602Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:41:16.300969568Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" returns = \"application/vnd.oci.image.layer.v1.tar\"\r\n"} +{"Time":"2023-05-31T19:41:16.300973228Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.300976661Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [stream_processors.\"io.containerd.ocicrypt.decoder.v1.tar.gzip\"]\r\n"} +{"Time":"2023-05-31T19:41:16.30107491Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" accepts = [\"application/vnd.oci.image.layer.v1.tar+gzip+encrypted\"]\r\n"} +{"Time":"2023-05-31T19:41:16.301079517Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" args = [\"--decryption-keys-path\", \"/etc/containerd/ocicrypt/keys\"]\r\n"} +{"Time":"2023-05-31T19:41:16.301083354Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" env = [\"OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf\"]\r\n"} +{"Time":"2023-05-31T19:41:16.301087274Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" path = \"ctd-decoder\"\r\n"} +{"Time":"2023-05-31T19:41:16.301090892Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" returns = \"application/vnd.oci.image.layer.v1.tar+gzip\"\r\n"} +{"Time":"2023-05-31T19:41:16.301094248Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.301097485Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [timeouts]\r\n"} +{"Time":"2023-05-31T19:41:16.301100807Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.bolt.open\" = \"0s\"\r\n"} +{"Time":"2023-05-31T19:41:16.301104467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.metrics.shimstats\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:41:16.301108081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.shim.cleanup\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:41:16.301111594Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.shim.load\" = \"5s\"\r\n"} +{"Time":"2023-05-31T19:41:16.301114963Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.shim.shutdown\" = \"3s\"\r\n"} +{"Time":"2023-05-31T19:41:16.301118423Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \"io.containerd.timeout.task.state\" = \"2s\"\r\n"} +{"Time":"2023-05-31T19:41:16.301121588Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.301124645Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [ttrpc]\r\n"} +{"Time":"2023-05-31T19:41:16.301127651Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" address = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.301131054Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.301134224Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid = 0\r\n"} +{"Time":"2023-05-31T19:41:16.301137346Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.301140359Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.301143567Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T19:41:16.30114702Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ● crio.service - Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:41:16.301151949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Loaded: loaded (\u001b]8;;file://enable-default-cni-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007; enabled; vendor preset: enabled)\r\n"} +{"Time":"2023-05-31T19:41:16.301328811Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Active: inactive (dead) since Wed 2023-05-31 19:39:36 UTC; 1min 38s ago\r\n"} +{"Time":"2023-05-31T19:41:16.301332933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Docs: \u001b]8;;https://github.com/cri-o/cri-o\u0007https://github.com/cri-o/cri-o\u001b]8;;\u0007\r\n"} +{"Time":"2023-05-31T19:41:16.301336873Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Main PID: 378 (code=exited, status=0/SUCCESS)\r\n"} +{"Time":"2023-05-31T19:41:16.301340087Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.301343716Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:35 enable-default-cni-509041 crio[378]: time=\"2023-05-31 19:39:35.645058250Z\" level=debug msg=\"backingFs=extfs, projectQuotaSupported=false, useNativeDiff=false, usingMetacopy=true\" file=\"overlay/overlay.go:400\"\r\n"} +{"Time":"2023-05-31T19:41:16.301348152Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:35 enable-default-cni-509041 crio[378]: time=\"2023-05-31 19:39:35.653562423Z\" level=debug msg=\"Closed http server\" file=\"crio/main.go:353\"\r\n"} +{"Time":"2023-05-31T19:41:16.301352295Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:35 enable-default-cni-509041 crio[378]: time=\"2023-05-31 19:39:35.654765741Z\" level=debug msg=\"Closing exit monitor...\" file=\"server/server.go:693\"\r\n"} +{"Time":"2023-05-31T19:41:16.301356465Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:35 enable-default-cni-509041 crio[378]: time=\"2023-05-31 19:39:35.659171529Z\" level=debug msg=\"hook monitoring canceled: context canceled\" file=\"hooks/monitor.go:60\"\r\n"} +{"Time":"2023-05-31T19:41:16.301361168Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:36 enable-default-cni-509041 crio[378]: time=\"2023-05-31 19:39:36.655163505Z\" level=debug msg=\"Closed stream server\" file=\"crio/main.go:383\"\r\n"} +{"Time":"2023-05-31T19:41:16.301365091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:36 enable-default-cni-509041 crio[378]: time=\"2023-05-31 19:39:36.655800459Z\" level=debug msg=\"Closed monitors\" file=\"crio/main.go:385\"\r\n"} +{"Time":"2023-05-31T19:41:16.3013692Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:36 enable-default-cni-509041 crio[378]: time=\"2023-05-31 19:39:36.655936021Z\" level=debug msg=\"Closed hook monitor\" file=\"crio/main.go:388\"\r\n"} +{"Time":"2023-05-31T19:41:16.301373205Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:36 enable-default-cni-509041 crio[378]: time=\"2023-05-31 19:39:36.656047459Z\" level=debug msg=\"Closed main server\" file=\"crio/main.go:393\"\r\n"} +{"Time":"2023-05-31T19:41:16.301377132Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:36 enable-default-cni-509041 systemd[1]: crio.service: Succeeded.\r\n"} +{"Time":"2023-05-31T19:41:16.3013808Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" May 31 19:39:36 enable-default-cni-509041 systemd[1]: Stopped Container Runtime Interface for OCI (CRI-O).\r\n"} +{"Time":"2023-05-31T19:41:16.301384585Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ssh: Process exited with status 3\n"} +{"Time":"2023-05-31T19:41:16.301586365Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.301589993Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.301593141Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T19:41:16.301596785Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[0;1;34m# \u001b]8;;file://enable-default-cni-509041/usr/lib/systemd/system/crio.service\u0007/usr/lib/systemd/system/crio.service\u001b]8;;\u0007\u001b[0m\r\n"} +{"Time":"2023-05-31T19:41:16.301600433Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Unit]\r\n"} +{"Time":"2023-05-31T19:41:16.301603625Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Description=Container Runtime Interface for OCI (CRI-O)\r\n"} +{"Time":"2023-05-31T19:41:16.301606679Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Documentation=https://github.com/cri-o/cri-o\r\n"} +{"Time":"2023-05-31T19:41:16.301609875Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Wants=network-online.target\r\n"} +{"Time":"2023-05-31T19:41:16.301613311Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=network-online.target minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:41:16.301616554Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requires=minikube-automount.service\r\n"} +{"Time":"2023-05-31T19:41:16.301620299Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" After=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:41:16.301623895Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Requires=crio-wipe.service\r\n"} +{"Time":"2023-05-31T19:41:16.301627052Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.301629844Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Service]\r\n"} +{"Time":"2023-05-31T19:41:16.301633407Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Type=notify\r\n"} +{"Time":"2023-05-31T19:41:16.3016367Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=-/etc/sysconfig/crio\r\n"} +{"Time":"2023-05-31T19:41:16.301640182Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=-/etc/sysconfig/crio.minikube\r\n"} +{"Time":"2023-05-31T19:41:16.301643845Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" EnvironmentFile=/var/run/minikube/env\r\n"} +{"Time":"2023-05-31T19:41:16.301646819Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Environment=GOTRACEBACK=crash\r\n"} +{"Time":"2023-05-31T19:41:16.301650154Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecStart=/usr/bin/crio \\\r\n"} +{"Time":"2023-05-31T19:41:16.301653709Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CRIO_OPTIONS \\\r\n"} +{"Time":"2023-05-31T19:41:16.301656983Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" $CRIO_MINIKUBE_OPTIONS\r\n"} +{"Time":"2023-05-31T19:41:16.301660423Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ExecReload=/bin/kill -s HUP $MAINPID\r\n"} +{"Time":"2023-05-31T19:41:16.301663699Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TasksMax=8192\r\n"} +{"Time":"2023-05-31T19:41:16.301851401Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNOFILE=1048576\r\n"} +{"Time":"2023-05-31T19:41:16.301855471Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitNPROC=1048576\r\n"} +{"Time":"2023-05-31T19:41:16.301858944Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" LimitCORE=infinity\r\n"} +{"Time":"2023-05-31T19:41:16.301864085Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" OOMScoreAdjust=-999\r\n"} +{"Time":"2023-05-31T19:41:16.301867299Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" TimeoutStartSec=0\r\n"} +{"Time":"2023-05-31T19:41:16.301870754Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Restart=on-abnormal\r\n"} +{"Time":"2023-05-31T19:41:16.301874128Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.301877409Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [Install]\r\n"} +{"Time":"2023-05-31T19:41:16.301880651Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" WantedBy=multi-user.target\r\n"} +{"Time":"2023-05-31T19:41:16.301883858Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.301887041Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.301890521Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T19:41:16.301894106Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/crio/crio.conf\r\n"} +{"Time":"2023-05-31T19:41:16.301897566Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:41:16.301901314Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:41:16.301904831Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:41:16.301908131Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.301912454Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:41:16.301929798Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.301934395Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:41:16.301938175Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:41:16.301941626Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:41:16.301944925Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:41:16.301948182Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302125028Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:41:16.302130043Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:41:16.3021338Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:41:16.302137394Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:41:16.30214085Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:41:16.302144291Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302147746Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:41:16.30215119Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:41:16.302154558Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:41:16.302157771Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302161225Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:41:16.302175912Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:41:16.30217933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30219112Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:41:16.302194892Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:41:16.302198445Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:41:16.302201728Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302205099Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:41:16.302208665Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:41:16.302212152Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:41:16.302215263Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:41:16.302218507Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.302221644Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30237006Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:41:16.30237417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:41:16.302377928Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:41:16.30238131Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302384673Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:41:16.30238802Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:41:16.302391406Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:41:16.302394792Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:41:16.302398369Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302401633Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:41:16.302405162Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:41:16.302408544Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:41:16.302412004Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:41:16.302415293Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30242525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:41:16.30242854Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:41:16.302431779Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302435159Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:41:16.302438587Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:41:16.302441916Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302445148Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:41:16.302448451Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:41:16.302452085Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302651451Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:41:16.302662921Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:41:16.302667455Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:41:16.302671185Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302674861Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:41:16.302678581Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:41:16.30268213Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302685628Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:41:16.302689286Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:41:16.302692855Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:41:16.302696361Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.302699678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302703058Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:41:16.302707442Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:41:16.302710821Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.302714275Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302717795Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:41:16.302721825Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:41:16.302725907Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:41:16.302729256Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.302732471Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.302736715Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:41:16.302740675Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:41:16.303203554Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303214531Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:41:16.303219528Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:41:16.303223524Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303227329Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:41:16.303231346Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:41:16.303235256Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:41:16.303239429Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303243999Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:41:16.303248767Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:41:16.30325423Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:41:16.303258973Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:41:16.303263187Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:41:16.303267226Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #]\r\n"} +{"Time":"2023-05-31T19:41:16.303271335Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303275329Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:41:16.303279731Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" no_pivot = false\r\n"} +{"Time":"2023-05-31T19:41:16.303284922Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303318943Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:41:16.303325028Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.303329445Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:41:16.303334071Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303338081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:41:16.303525876Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:41:16.303535795Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:41:16.303546183Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303550655Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:41:16.303554052Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:41:16.303557601Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303561101Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:41:16.303564834Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:41:16.303568272Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:41:16.303572Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:41:16.303575707Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.303578897Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303582327Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:41:16.303585728Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:41:16.303589728Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:41:16.30359318Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_env = [\r\n"} +{"Time":"2023-05-31T19:41:16.303596322Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.30359947Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303602982Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:41:16.303609557Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" selinux = false\r\n"} +{"Time":"2023-05-31T19:41:16.303612436Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303615525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:41:16.303618154Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:41:16.3038939Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.303902005Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.303905604Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30390964Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:41:16.303913291Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:41:16.303917322Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:41:16.3039212Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:41:16.303924958Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:41:16.303928462Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303932171Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:41:16.303935881Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:41:16.303939815Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:41:16.303943877Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:41:16.303949347Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.303953148Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:41:16.303956687Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30396028Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:41:16.30396417Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:41:16.30396762Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.303971461Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:41:16.303975718Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.303978941Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304141345Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:41:16.304147855Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:41:16.30415137Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:41:16.304155467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:41:16.304160038Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:41:16.304163846Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:41:16.304167898Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:41:16.304171191Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:41:16.304174616Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:41:16.304178173Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:41:16.304181596Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:41:16.304184711Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:41:16.304190761Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:41:16.304195959Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.304199839Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304203968Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:41:16.304207588Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:41:16.30421163Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:41:16.304215001Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.304218321Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304222009Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:41:16.304225973Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:41:16.30423059Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:41:16.304234403Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:41:16.304382023Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" additional_devices = [\r\n"} +{"Time":"2023-05-31T19:41:16.304387039Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.304392289Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304396032Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:41:16.3043998Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:41:16.304403461Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:41:16.304406989Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:41:16.304411256Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.304414645Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304418105Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:41:16.304421686Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:41:16.30442544Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:41:16.304428601Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.304432179Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:41:16.304436176Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:41:16.304439936Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:41:16.304443506Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.304446975Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:41:16.304450691Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:41:16.304466345Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:41:16.304470386Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:41:16.304474072Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.304702756Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.304708988Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304712544Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:41:16.304725238Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:41:16.304728943Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304732467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:41:16.304736525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:41:16.304740391Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:41:16.304744258Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # limit is never exceeded.\r\n"} +{"Time":"2023-05-31T19:41:16.304747914Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:41:16.304751333Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304754788Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Whether container output should be logged to journald in addition to the kubernetes log file\r\n"} +{"Time":"2023-05-31T19:41:16.304759017Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:41:16.304762386Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304765806Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:41:16.304769532Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:41:16.304772932Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304776493Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:41:16.304780122Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:41:16.304783842Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304787491Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:41:16.304791105Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.304795012Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304799031Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:41:16.30495782Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" read_only = false\r\n"} +{"Time":"2023-05-31T19:41:16.30496264Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.304966357Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:41:16.304969999Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:41:16.304973677Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.304979874Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:41:16.30498343Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30498709Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:41:16.304990854Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.304994091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.304998195Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.305001802Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:41:16.305005277Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:41:16.3050092Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:41:16.305012641Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.305016284Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.305019815Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:41:16.305023428Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:41:16.30502687Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:41:16.305030286Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.305033781Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.305037346Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:41:16.305045889Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:41:16.305312642Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:41:16.305324347Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:41:16.305328738Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.305332977Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # manage_ns_lifecycle determines whether we pin and remove namespaces\r\n"} +{"Time":"2023-05-31T19:41:16.305349915Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # and manage their lifecycle.\r\n"} +{"Time":"2023-05-31T19:41:16.305354861Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is being deprecated, and will be unconditionally true in the future.\r\n"} +{"Time":"2023-05-31T19:41:16.305368509Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" manage_ns_lifecycle = true\r\n"} +{"Time":"2023-05-31T19:41:16.305373249Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.305377079Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:41:16.305380996Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:41:16.305385769Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:41:16.305390775Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:41:16.305398459Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:41:16.305402252Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.305405635Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:41:16.305409979Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:41:16.305413483Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:41:16.305416917Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.305420669Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:41:16.305425175Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:41:16.305428866Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30543318Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:41:16.305616467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:41:16.305624341Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:41:16.30562876Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.305632858Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.305639681Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:41:16.305643946Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The runtime to use is picked based on the runtime_handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:41:16.305648084Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If no runtime_handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:41:16.305652598Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:41:16.305656591Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.305660369Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:41:16.305665475Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:41:16.30566949Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:41:16.3056737Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:41:16.305684471Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:41:16.305688277Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:41:16.305692506Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:41:16.305696715Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:41:16.305701Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:41:16.305704455Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:41:16.3057082Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:41:16.30571184Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:41:16.30605689Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:41:16.306069445Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:41:16.306074937Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:41:16.30607975Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:41:16.306084218Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:41:16.306088878Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:41:16.30609333Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:41:16.306097675Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:41:16.306101524Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:41:16.306107238Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:41:16.306114771Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:41:16.306120304Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:41:16.306128854Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306132819Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306136303Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:41:16.306140279Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.306144507Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:41:16.306148637Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.306152736Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306156644Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306160759Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306164887Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306168846Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:41:16.30634828Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:41:16.30635448Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:41:16.306358579Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306362558Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:41:16.306367103Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:41:16.306371359Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:41:16.306375335Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306379305Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:41:16.30638344Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:41:16.306387373Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.30639156Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:41:16.306395772Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:41:16.306399776Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306403881Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:41:16.306408176Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:41:16.30641202Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.3064161Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:41:16.306420182Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.306424648Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:41:16.306428917Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:41:16.306432745Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:41:16.306437036Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:41:16.306568589Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:41:16.306576838Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:41:16.306580383Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306584146Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:41:16.306587921Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:41:16.306591537Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306595237Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:41:16.306598863Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:41:16.306602251Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.306605607Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306609283Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:41:16.30661333Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.306616767Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:41:16.306620376Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306623964Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:41:16.306627687Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:41:16.30663243Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.30663599Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.306639223Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306642625Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:41:16.306646475Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:41:16.306650695Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:41:16.30691952Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.306927704Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:41:16.306931789Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306936343Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:41:16.306940504Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:41:16.306944888Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:41:16.306949548Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:41:16.306954324Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:41:16.306958342Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.306962317Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306966291Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:41:16.3069708Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:41:16.306974921Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:41:16.306979116Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #insecure_registries = \"[]\"\r\n"} +{"Time":"2023-05-31T19:41:16.306983016Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.306986806Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:41:16.306990884Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:41:16.30699486Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:41:16.306999061Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307003068Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:41:16.307006956Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.30701066Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307478862Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:41:16.307487143Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:41:16.307490777Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:41:16.307494526Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307498556Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:41:16.307505021Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:41:16.307508839Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.307512727Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307516097Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:41:16.307520299Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:41:16.307528866Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307532349Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:41:16.307540559Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:41:16.307544002Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:41:16.307547684Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.307551189Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307554526Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:41:16.307557946Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:41:16.307561314Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307564687Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:41:16.307568473Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:41:16.307571503Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307575558Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:41:16.30757942Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:41:16.307582766Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307763413Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:41:16.30776826Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.30777167Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" /etc/crio/crio.conf.d/02-crio.conf\r\n"} +{"Time":"2023-05-31T19:41:16.307775366Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:41:16.30777897Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_image = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.30778228Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307785359Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:41:16.307788655Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.307791991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307795362Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:41:16.307798918Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cgroup_manager = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.307802318Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.307805613Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.30780926Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T19:41:16.307813196Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[36mINFO\u001b[0m[2023-05-31 19:41:16.237051149Z] Starting CRI-O, version: 1.24.1, git: a3bbde8a77c323aa6a485da9a9046299155c6016(dirty) \r\n"} +{"Time":"2023-05-31T19:41:16.307817625Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u001b[36mINFO\u001b[0m Using default capabilities: CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_FSETID, CAP_FOWNER, CAP_SETGID, CAP_SETUID, CAP_SETPCAP, CAP_NET_BIND_SERVICE, CAP_KILL \r\n"} +{"Time":"2023-05-31T19:41:16.30782179Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The CRI-O configuration file specifies all of the available configuration\r\n"} +{"Time":"2023-05-31T19:41:16.307825668Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # options and command-line flags for the crio(8) OCI Kubernetes Container Runtime\r\n"} +{"Time":"2023-05-31T19:41:16.307829316Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # daemon, but in a TOML format that can be more easily modified and versioned.\r\n"} +{"Time":"2023-05-31T19:41:16.30783274Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.307836203Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Please refer to crio.conf(5) for details of all configuration options.\r\n"} +{"Time":"2023-05-31T19:41:16.307840324Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.307843731Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O supports partial configuration reload during runtime, which can be\r\n"} +{"Time":"2023-05-31T19:41:16.308019659Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # done by sending SIGHUP to the running process. Currently supported options\r\n"} +{"Time":"2023-05-31T19:41:16.308025451Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # are explicitly mentioned with: 'This option supports live configuration\r\n"} +{"Time":"2023-05-31T19:41:16.308029119Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # reload'.\r\n"} +{"Time":"2023-05-31T19:41:16.308032445Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308036176Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O reads its storage defaults from the containers-storage.conf(5) file\r\n"} +{"Time":"2023-05-31T19:41:16.308044112Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # located at /etc/containers/storage.conf. Modify this storage configuration if\r\n"} +{"Time":"2023-05-31T19:41:16.308048048Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you want to change the system's defaults. If you want to modify storage just\r\n"} +{"Time":"2023-05-31T19:41:16.308051585Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # for CRI-O, you can change the storage configuration options here.\r\n"} +{"Time":"2023-05-31T19:41:16.308055576Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio]\r\n"} +{"Time":"2023-05-31T19:41:16.308058897Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308062487Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the \"root directory\". CRI-O stores all of its data, including\r\n"} +{"Time":"2023-05-31T19:41:16.308068894Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers images, in this directory.\r\n"} +{"Time":"2023-05-31T19:41:16.30807274Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # root = \"/var/lib/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:41:16.308076845Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308080515Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the \"run directory\". CRI-O stores all of its state in this directory.\r\n"} +{"Time":"2023-05-31T19:41:16.308084629Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runroot = \"/var/run/containers/storage\"\r\n"} +{"Time":"2023-05-31T19:41:16.308088285Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308092404Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Storage driver used to manage the storage of images and containers. Please\r\n"} +{"Time":"2023-05-31T19:41:16.308096431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # refer to containers-storage.conf(5) to see all available storage drivers.\r\n"} +{"Time":"2023-05-31T19:41:16.30810009Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" storage_driver = \"overlay\"\r\n"} +{"Time":"2023-05-31T19:41:16.308103492Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308107501Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List to pass options to the storage driver. Please refer to\r\n"} +{"Time":"2023-05-31T19:41:16.308234018Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers-storage.conf(5) to see all available storage options.\r\n"} +{"Time":"2023-05-31T19:41:16.308238841Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" storage_option = [\r\n"} +{"Time":"2023-05-31T19:41:16.308242461Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"overlay.mountopt=nodev,metacopy=on\",\r\n"} +{"Time":"2023-05-31T19:41:16.308246131Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.30824931Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308253065Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The default log directory where all logs will go unless directly specified by\r\n"} +{"Time":"2023-05-31T19:41:16.308256961Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the kubelet. The log directory specified must be an absolute directory.\r\n"} +{"Time":"2023-05-31T19:41:16.308260522Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_dir = \"/var/log/crio/pods\"\r\n"} +{"Time":"2023-05-31T19:41:16.308264118Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308267851Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the temporary version file.\r\n"} +{"Time":"2023-05-31T19:41:16.308271803Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check if crio wipe should wipe containers, which should\r\n"} +{"Time":"2023-05-31T19:41:16.308277464Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # always happen on a node reboot\r\n"} +{"Time":"2023-05-31T19:41:16.308281248Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # version_file = \"/var/run/crio/version\"\r\n"} +{"Time":"2023-05-31T19:41:16.308284767Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308288454Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the persistent version file.\r\n"} +{"Time":"2023-05-31T19:41:16.308292338Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check if crio wipe should wipe images, which should\r\n"} +{"Time":"2023-05-31T19:41:16.308296015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only happen when CRI-O has been upgraded\r\n"} +{"Time":"2023-05-31T19:41:16.308299817Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # version_file_persist = \"/var/lib/crio/version\"\r\n"} +{"Time":"2023-05-31T19:41:16.308303549Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308307314Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # InternalWipe is whether CRI-O should wipe containers and images after a reboot when the server starts.\r\n"} +{"Time":"2023-05-31T19:41:16.308312186Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to false, one must use the external command 'crio wipe' to wipe the containers and images in these situations.\r\n"} +{"Time":"2023-05-31T19:41:16.30831629Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # internal_wipe = true\r\n"} +{"Time":"2023-05-31T19:41:16.308442602Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308448872Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Location for CRI-O to lay down the clean shutdown file.\r\n"} +{"Time":"2023-05-31T19:41:16.308452738Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is used to check whether crio had time to sync before shutting down.\r\n"} +{"Time":"2023-05-31T19:41:16.308460467Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If not found, crio wipe will clear the storage directory.\r\n"} +{"Time":"2023-05-31T19:41:16.308463997Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # clean_shutdown_file = \"/var/lib/crio/clean.shutdown\"\r\n"} +{"Time":"2023-05-31T19:41:16.308467667Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308471157Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.api table contains settings for the kubelet/gRPC interface.\r\n"} +{"Time":"2023-05-31T19:41:16.308474679Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.api]\r\n"} +{"Time":"2023-05-31T19:41:16.308478034Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308481344Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to AF_LOCAL socket on which CRI-O will listen.\r\n"} +{"Time":"2023-05-31T19:41:16.308484875Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # listen = \"/var/run/crio/crio.sock\"\r\n"} +{"Time":"2023-05-31T19:41:16.308488224Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308491517Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # IP address on which the stream server will listen.\r\n"} +{"Time":"2023-05-31T19:41:16.308494871Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_address = \"127.0.0.1\"\r\n"} +{"Time":"2023-05-31T19:41:16.308498123Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308501329Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The port on which the stream server will listen. If the port is set to \"0\", then\r\n"} +{"Time":"2023-05-31T19:41:16.308505052Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O will allocate a random free port number.\r\n"} +{"Time":"2023-05-31T19:41:16.308507648Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_port = \"0\"\r\n"} +{"Time":"2023-05-31T19:41:16.308510037Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308512227Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Enable encrypted TLS transport of the stream server.\r\n"} +{"Time":"2023-05-31T19:41:16.308514257Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_enable_tls = false\r\n"} +{"Time":"2023-05-31T19:41:16.308516135Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308518967Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Length of time until open streams terminate due to lack of activity\r\n"} +{"Time":"2023-05-31T19:41:16.308945448Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_idle_timeout = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.308954048Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308958344Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the x509 certificate file used to serve the encrypted stream. This\r\n"} +{"Time":"2023-05-31T19:41:16.308962726Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # file can change, and CRI-O will automatically pick up the changes within 5\r\n"} +{"Time":"2023-05-31T19:41:16.308966838Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minutes.\r\n"} +{"Time":"2023-05-31T19:41:16.308970952Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.308975211Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308979378Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the key file used to serve the encrypted stream. This file can\r\n"} +{"Time":"2023-05-31T19:41:16.308984081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # change and CRI-O will automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:41:16.308988121Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_key = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.30899219Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.308996227Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the x509 CA(s) file used to verify and authenticate client\r\n"} +{"Time":"2023-05-31T19:41:16.309003446Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # communication with the encrypted stream. This file can change and CRI-O will\r\n"} +{"Time":"2023-05-31T19:41:16.309007821Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # automatically pick up the changes within 5 minutes.\r\n"} +{"Time":"2023-05-31T19:41:16.30901182Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stream_tls_ca = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.309015778Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309019795Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum grpc send message size in bytes. If not set or \u003c=0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:41:16.309024335Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" grpc_max_send_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:41:16.309028215Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.3090325Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum grpc receive message size. If not set or \u003c= 0, then CRI-O will default to 16 * 1024 * 1024.\r\n"} +{"Time":"2023-05-31T19:41:16.309037171Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" grpc_max_recv_msg_size = 16777216\r\n"} +{"Time":"2023-05-31T19:41:16.309048445Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309328497Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.runtime table contains settings pertaining to the OCI runtime used\r\n"} +{"Time":"2023-05-31T19:41:16.309335813Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # and options for how to set up and manage the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:41:16.309339411Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime]\r\n"} +{"Time":"2023-05-31T19:41:16.309342483Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309345911Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A list of ulimits to be set in containers by default, specified as\r\n"} +{"Time":"2023-05-31T19:41:16.309351431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"\u003culimit name\u003e=\u003csoft limit\u003e:\u003chard limit\u003e\", for example:\r\n"} +{"Time":"2023-05-31T19:41:16.309355401Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"nofile=1024:2048\"\r\n"} +{"Time":"2023-05-31T19:41:16.309358616Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If nothing is set here, settings will be inherited from the CRI-O daemon\r\n"} +{"Time":"2023-05-31T19:41:16.309362081Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_ulimits = [\r\n"} +{"Time":"2023-05-31T19:41:16.309366601Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.309370303Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309373314Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If true, the runtime will not use pivot_root, but instead use MS_MOVE.\r\n"} +{"Time":"2023-05-31T19:41:16.309377349Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # no_pivot = false\r\n"} +{"Time":"2023-05-31T19:41:16.30938078Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309383737Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # decryption_keys_path is the path where the keys required for\r\n"} +{"Time":"2023-05-31T19:41:16.309387266Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # image decryption are stored. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.30939066Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # decryption_keys_path = \"/etc/crio/keys/\"\r\n"} +{"Time":"2023-05-31T19:41:16.309393975Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309396935Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the conmon binary, used for monitoring the OCI runtime.\r\n"} +{"Time":"2023-05-31T19:41:16.309399797Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Will be searched for using $PATH if empty.\r\n"} +{"Time":"2023-05-31T19:41:16.309402833Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:41:16.309406148Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conmon = \"/usr/libexec/crio/conmon\"\r\n"} +{"Time":"2023-05-31T19:41:16.309409741Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309791083Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Cgroup setting for conmon\r\n"} +{"Time":"2023-05-31T19:41:16.309802665Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorCgroup.\r\n"} +{"Time":"2023-05-31T19:41:16.309806743Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conmon_cgroup = \"system.slice\"\r\n"} +{"Time":"2023-05-31T19:41:16.309810096Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309813432Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Environment variable list for the conmon process, used for passing necessary\r\n"} +{"Time":"2023-05-31T19:41:16.309817016Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # environment variables to conmon or the runtime.\r\n"} +{"Time":"2023-05-31T19:41:16.309820702Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is currently deprecated, and will be replaced with RuntimeHandler.MonitorEnv.\r\n"} +{"Time":"2023-05-31T19:41:16.309824227Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" conmon_env = [\r\n"} +{"Time":"2023-05-31T19:41:16.309827707Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \t\"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\",\r\n"} +{"Time":"2023-05-31T19:41:16.309831699Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ]\r\n"} +{"Time":"2023-05-31T19:41:16.309834827Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309838727Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Additional environment variables to set for all the\r\n"} +{"Time":"2023-05-31T19:41:16.309842207Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers. These are overridden if set in the\r\n"} +{"Time":"2023-05-31T19:41:16.309846567Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container image spec or in the container runtime configuration.\r\n"} +{"Time":"2023-05-31T19:41:16.309850592Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_env = [\r\n"} +{"Time":"2023-05-31T19:41:16.309854482Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.309857562Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309860919Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If true, SELinux will be used for pod separation on the host.\r\n"} +{"Time":"2023-05-31T19:41:16.309864599Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # selinux = false\r\n"} +{"Time":"2023-05-31T19:41:16.309868587Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.309872279Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the seccomp.json profile which is used as the default seccomp profile\r\n"} +{"Time":"2023-05-31T19:41:16.309876564Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # for the runtime. If not specified, then the internal default seccomp profile\r\n"} +{"Time":"2023-05-31T19:41:16.309880308Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will be used. This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.310246834Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # seccomp_profile = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.310254719Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.310258612Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Changes the meaning of an empty seccomp profile. By default\r\n"} +{"Time":"2023-05-31T19:41:16.310262219Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # (and according to CRI spec), an empty profile means unconfined.\r\n"} +{"Time":"2023-05-31T19:41:16.310266596Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option tells CRI-O to treat an empty profile as the default profile,\r\n"} +{"Time":"2023-05-31T19:41:16.310270666Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # which might increase security.\r\n"} +{"Time":"2023-05-31T19:41:16.310274775Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" seccomp_use_default_when_empty = false\r\n"} +{"Time":"2023-05-31T19:41:16.310278664Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.310281992Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Used to change the name of the default AppArmor profile of CRI-O. The default\r\n"} +{"Time":"2023-05-31T19:41:16.310294384Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # profile name is \"crio-default\". This profile only takes effect if the user\r\n"} +{"Time":"2023-05-31T19:41:16.310298864Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # does not specify a profile via the Kubernetes Pod's metadata annotation. If\r\n"} +{"Time":"2023-05-31T19:41:16.310302541Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the profile is set to \"unconfined\", then this equals to disabling AppArmor.\r\n"} +{"Time":"2023-05-31T19:41:16.310305602Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.310308598Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # apparmor_profile = \"crio-default\"\r\n"} +{"Time":"2023-05-31T19:41:16.310312168Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.310315613Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the blockio class configuration file for configuring\r\n"} +{"Time":"2023-05-31T19:41:16.310318969Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the cgroup blockio controller.\r\n"} +{"Time":"2023-05-31T19:41:16.310322865Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # blockio_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.310329381Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.310333071Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Used to change irqbalance service config file path which is used for configuring\r\n"} +{"Time":"2023-05-31T19:41:16.310336711Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # irqbalance daemon.\r\n"} +{"Time":"2023-05-31T19:41:16.310340063Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # irqbalance_config_file = \"/etc/sysconfig/irqbalance\"\r\n"} +{"Time":"2023-05-31T19:41:16.310759224Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.310769434Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the RDT configuration file for configuring the resctrl pseudo-filesystem.\r\n"} +{"Time":"2023-05-31T19:41:16.310773339Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.310776795Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # rdt_config_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.310780921Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.310784052Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Cgroup management implementation used for the runtime.\r\n"} +{"Time":"2023-05-31T19:41:16.310787779Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cgroup_manager = \"systemd\"\r\n"} +{"Time":"2023-05-31T19:41:16.31079104Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.310794307Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Specify whether the image pull must be performed in a separate cgroup.\r\n"} +{"Time":"2023-05-31T19:41:16.310797882Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separate_pull_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.310801142Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.310804227Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of default capabilities for containers. If it is empty or commented out,\r\n"} +{"Time":"2023-05-31T19:41:16.310807686Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only the capabilities defined in the containers json file by the user/kube\r\n"} +{"Time":"2023-05-31T19:41:16.310810971Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will be added.\r\n"} +{"Time":"2023-05-31T19:41:16.310814545Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_capabilities = [\r\n"} +{"Time":"2023-05-31T19:41:16.31081774Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"CHOWN\",\r\n"} +{"Time":"2023-05-31T19:41:16.310821212Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"DAC_OVERRIDE\",\r\n"} +{"Time":"2023-05-31T19:41:16.310824528Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"FSETID\",\r\n"} +{"Time":"2023-05-31T19:41:16.310827624Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"FOWNER\",\r\n"} +{"Time":"2023-05-31T19:41:16.310831253Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETGID\",\r\n"} +{"Time":"2023-05-31T19:41:16.310834303Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETUID\",\r\n"} +{"Time":"2023-05-31T19:41:16.310837468Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"SETPCAP\",\r\n"} +{"Time":"2023-05-31T19:41:16.310841015Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"NET_BIND_SERVICE\",\r\n"} +{"Time":"2023-05-31T19:41:16.310844107Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"KILL\",\r\n"} +{"Time":"2023-05-31T19:41:16.311286895Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.311295333Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.311299758Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of default sysctls. If it is empty or commented out, only the sysctls\r\n"} +{"Time":"2023-05-31T19:41:16.311304001Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:41:16.311308496Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_sysctls = [\r\n"} +{"Time":"2023-05-31T19:41:16.311312201Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.311316097Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.311319928Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of devices on the host that a\r\n"} +{"Time":"2023-05-31T19:41:16.311323978Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # user can specify with the \"io.kubernetes.cri-o.Devices\" allowed annotation.\r\n"} +{"Time":"2023-05-31T19:41:16.311328453Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # allowed_devices = [\r\n"} +{"Time":"2023-05-31T19:41:16.311332404Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/dev/fuse\",\r\n"} +{"Time":"2023-05-31T19:41:16.31133627Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.311340301Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.311343948Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of additional devices. specified as\r\n"} +{"Time":"2023-05-31T19:41:16.311348014Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"\u003cdevice-on-host\u003e:\u003cdevice-on-container\u003e:\u003cpermissions\u003e\", for example: \"--device=/dev/sdc:/dev/xvdc:rwm\".\r\n"} +{"Time":"2023-05-31T19:41:16.31135255Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If it is empty or commented out, only the devices\r\n"} +{"Time":"2023-05-31T19:41:16.311355724Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # defined in the container json file by the user/kube will be added.\r\n"} +{"Time":"2023-05-31T19:41:16.311358348Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # additional_devices = [\r\n"} +{"Time":"2023-05-31T19:41:16.311360963Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.31136318Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.311365538Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of directories to scan for CDI Spec files.\r\n"} +{"Time":"2023-05-31T19:41:16.311367933Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cdi_spec_dirs = [\r\n"} +{"Time":"2023-05-31T19:41:16.311370686Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/etc/cdi\",\r\n"} +{"Time":"2023-05-31T19:41:16.311373053Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/var/run/cdi\",\r\n"} +{"Time":"2023-05-31T19:41:16.311768004Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.311775844Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.311780172Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Change the default behavior of setting container devices uid/gid from CRI's\r\n"} +{"Time":"2023-05-31T19:41:16.311784113Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # SecurityContext (RunAsUser/RunAsGroup) instead of taking host's uid/gid.\r\n"} +{"Time":"2023-05-31T19:41:16.311787882Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Defaults to false.\r\n"} +{"Time":"2023-05-31T19:41:16.311791487Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # device_ownership_from_security_context = false\r\n"} +{"Time":"2023-05-31T19:41:16.311798714Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.311802169Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to OCI hooks directories for automatically executed hooks. If one of the\r\n"} +{"Time":"2023-05-31T19:41:16.311805792Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # directories does not exist, then CRI-O will automatically skip them.\r\n"} +{"Time":"2023-05-31T19:41:16.311809138Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # hooks_dir = [\r\n"} +{"Time":"2023-05-31T19:41:16.311813555Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/usr/share/containers/oci/hooks.d\",\r\n"} +{"Time":"2023-05-31T19:41:16.311817055Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.311820194Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.311823729Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the file specifying the defaults mounts for each container. The\r\n"} +{"Time":"2023-05-31T19:41:16.311827407Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # format of the config is /SRC:/DST, one mount per line. Notice that CRI-O reads\r\n"} +{"Time":"2023-05-31T19:41:16.311830917Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # its default mounts from the following two files:\r\n"} +{"Time":"2023-05-31T19:41:16.311834317Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.311837621Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # 1) /etc/containers/mounts.conf (i.e., default_mounts_file): This is the\r\n"} +{"Time":"2023-05-31T19:41:16.311841053Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # override file, where users can either add in their own default mounts, or\r\n"} +{"Time":"2023-05-31T19:41:16.311844337Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # override the default mounts shipped with the package.\r\n"} +{"Time":"2023-05-31T19:41:16.311847191Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.311850025Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # 2) /usr/share/containers/mounts.conf: This is the default file read for\r\n"} +{"Time":"2023-05-31T19:41:16.31200437Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # mounts. If you want CRI-O to read from a different, specific mounts file,\r\n"} +{"Time":"2023-05-31T19:41:16.312007324Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you can change the default_mounts_file. Note, if this is done, CRI-O will\r\n"} +{"Time":"2023-05-31T19:41:16.312009505Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # only add mounts it finds in this file.\r\n"} +{"Time":"2023-05-31T19:41:16.312011585Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.312013508Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_mounts_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.312015579Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312017718Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum number of processes allowed in a container.\r\n"} +{"Time":"2023-05-31T19:41:16.312019952Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is deprecated. The Kubelet flag '--pod-pids-limit' should be used instead.\r\n"} +{"Time":"2023-05-31T19:41:16.312022597Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pids_limit = 1024\r\n"} +{"Time":"2023-05-31T19:41:16.312024472Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312026538Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Maximum sized allowed for the container log file. Negative numbers indicate\r\n"} +{"Time":"2023-05-31T19:41:16.312028623Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # that no size limit is imposed. If it is positive, it must be \u003e= 8192 to\r\n"} +{"Time":"2023-05-31T19:41:16.312030749Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # match/exceed conmon's read buffer. The file is truncated and re-opened so the\r\n"} +{"Time":"2023-05-31T19:41:16.312034371Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # limit is never exceeded. This option is deprecated. The Kubelet flag '--container-log-max-size' should be used instead.\r\n"} +{"Time":"2023-05-31T19:41:16.312036621Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_size_max = -1\r\n"} +{"Time":"2023-05-31T19:41:16.312038683Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312040789Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Whether container output should be logged to journald in addition to the kuberentes log file\r\n"} +{"Time":"2023-05-31T19:41:16.312042981Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_to_journald = false\r\n"} +{"Time":"2023-05-31T19:41:16.312044964Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312046879Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to directory in which container exit files are written to by conmon.\r\n"} +{"Time":"2023-05-31T19:41:16.312049139Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container_exits_dir = \"/var/run/crio/exits\"\r\n"} +{"Time":"2023-05-31T19:41:16.31205128Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312386702Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to directory for container attach sockets.\r\n"} +{"Time":"2023-05-31T19:41:16.312391932Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # container_attach_socket_dir = \"/var/run/crio\"\r\n"} +{"Time":"2023-05-31T19:41:16.312394624Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312397067Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The prefix to use for the source of the bind mounts.\r\n"} +{"Time":"2023-05-31T19:41:16.312399582Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # bind_mount_prefix = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.312402104Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312404448Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to true, all containers will run in read-only mode.\r\n"} +{"Time":"2023-05-31T19:41:16.312406886Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # read_only = false\r\n"} +{"Time":"2023-05-31T19:41:16.312409219Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312411509Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Changes the verbosity of the logs based on the level it is set to. Options\r\n"} +{"Time":"2023-05-31T19:41:16.312414022Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # are fatal, panic, error, warn, info, debug and trace. This option supports\r\n"} +{"Time":"2023-05-31T19:41:16.312416525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.312418851Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_level = \"info\"\r\n"} +{"Time":"2023-05-31T19:41:16.312421217Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312423691Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Filter the log messages by the provided regular expression.\r\n"} +{"Time":"2023-05-31T19:41:16.312426161Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.31242996Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # log_filter = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.312432584Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312434955Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The UID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:41:16.312437351Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the form containerUID:HostUID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:41:16.312439724Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:41:16.312442608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # uid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.312445221Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312447595Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The GID mappings for the user namespace of each container. A range is\r\n"} +{"Time":"2023-05-31T19:41:16.31288992Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the form containerGID:HostGID:Size. Multiple ranges must be\r\n"} +{"Time":"2023-05-31T19:41:16.312900027Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # separated by comma.\r\n"} +{"Time":"2023-05-31T19:41:16.312904787Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # gid_mappings = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.312908919Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312913084Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set, CRI-O will reject any attempt to map host UIDs below this value\r\n"} +{"Time":"2023-05-31T19:41:16.31291744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:41:16.312921642Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:41:16.312925593Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minimum_mappable_uid = -1\r\n"} +{"Time":"2023-05-31T19:41:16.312929386Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312933272Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set, CRI-O will reject any attempt to map host GIDs below this value\r\n"} +{"Time":"2023-05-31T19:41:16.312937432Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # into user namespaces. A negative value indicates that no minimum is set,\r\n"} +{"Time":"2023-05-31T19:41:16.312941522Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # so specifying mappings will only be allowed for pods that run as UID 0.\r\n"} +{"Time":"2023-05-31T19:41:16.312945553Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # minimum_mappable_gid = -1\r\n"} +{"Time":"2023-05-31T19:41:16.312949001Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312956102Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The minimal amount of time in seconds to wait before issuing a timeout\r\n"} +{"Time":"2023-05-31T19:41:16.312958937Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # regarding the proper termination of the container. The lowest possible\r\n"} +{"Time":"2023-05-31T19:41:16.312961737Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # value is 30s, whereas lower values are not considered by CRI-O.\r\n"} +{"Time":"2023-05-31T19:41:16.312964275Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ctr_stop_timeout = 30\r\n"} +{"Time":"2023-05-31T19:41:16.312966593Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.312968922Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # drop_infra_ctr determines whether CRI-O drops the infra container\r\n"} +{"Time":"2023-05-31T19:41:16.312971411Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # when a pod does not have a private PID namespace, and does not use\r\n"} +{"Time":"2023-05-31T19:41:16.312973777Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a kernel separating runtime (like kata).\r\n"} +{"Time":"2023-05-31T19:41:16.31325787Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It requires manage_ns_lifecycle to be true.\r\n"} +{"Time":"2023-05-31T19:41:16.313265243Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" drop_infra_ctr = false\r\n"} +{"Time":"2023-05-31T19:41:16.313269146Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.313273101Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # infra_ctr_cpuset determines what CPUs will be used to run infra containers.\r\n"} +{"Time":"2023-05-31T19:41:16.313277073Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # You can use linux CPU list format to specify desired CPUs.\r\n"} +{"Time":"2023-05-31T19:41:16.313281256Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To get better isolation for guaranteed pods, set this parameter to be equal to kubelet reserved-cpus.\r\n"} +{"Time":"2023-05-31T19:41:16.313285233Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # infra_ctr_cpuset = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.313288975Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.313292853Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The directory where the state of the managed namespaces gets tracked.\r\n"} +{"Time":"2023-05-31T19:41:16.313296548Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Only used when manage_ns_lifecycle is true.\r\n"} +{"Time":"2023-05-31T19:41:16.313300123Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # namespaces_dir = \"/var/run\"\r\n"} +{"Time":"2023-05-31T19:41:16.313303757Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.313307661Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pinns_path is the path to find the pinns binary, which is needed to manage namespace lifecycle\r\n"} +{"Time":"2023-05-31T19:41:16.313311443Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pinns_path = \"/usr/bin/pinns\"\r\n"} +{"Time":"2023-05-31T19:41:16.313315106Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.313318995Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_runtime is the _name_ of the OCI runtime to be used as the default.\r\n"} +{"Time":"2023-05-31T19:41:16.313323252Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The name is matched against the runtimes map below. If this value is changed,\r\n"} +{"Time":"2023-05-31T19:41:16.313327237Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the corresponding existing entry from the runtimes map below will be ignored.\r\n"} +{"Time":"2023-05-31T19:41:16.313330982Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_runtime = \"runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.313334842Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.31333854Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A list of paths that, when absent from the host,\r\n"} +{"Time":"2023-05-31T19:41:16.313342785Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # will cause a container creation to fail (as opposed to the current behavior being created as a directory).\r\n"} +{"Time":"2023-05-31T19:41:16.313647828Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option is to protect from source locations whose existence as a directory could jepordize the health of the node, and whose\r\n"} +{"Time":"2023-05-31T19:41:16.313656253Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # creation as a file is not desired either.\r\n"} +{"Time":"2023-05-31T19:41:16.31365998Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # An example is /etc/hostname, which will cause failures on reboot if it's created as a directory, but often doesn't exist because\r\n"} +{"Time":"2023-05-31T19:41:16.313663278Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the hostname is being managed dynamically.\r\n"} +{"Time":"2023-05-31T19:41:16.313666679Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # absent_mount_sources_to_reject = [\r\n"} +{"Time":"2023-05-31T19:41:16.313670335Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.31367413Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.313677545Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The \"crio.runtime.runtimes\" table defines a list of OCI compatible runtimes.\r\n"} +{"Time":"2023-05-31T19:41:16.313681008Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The runtime to use is picked based on the runtime handler provided by the CRI.\r\n"} +{"Time":"2023-05-31T19:41:16.313684205Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If no runtime handler is provided, the runtime will be picked based on the level\r\n"} +{"Time":"2023-05-31T19:41:16.313687712Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # of trust of the workload. Each entry in the table should follow the format:\r\n"} +{"Time":"2023-05-31T19:41:16.313690973Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.313694555Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.runtime-handler]\r\n"} +{"Time":"2023-05-31T19:41:16.313698298Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_path = \"/path/to/the/executable\"\r\n"} +{"Time":"2023-05-31T19:41:16.313702195Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:41:16.313705431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # runtime_root = \"/path/to/the/root\"\r\n"} +{"Time":"2023-05-31T19:41:16.313709054Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # privileged_without_host_devices = false\r\n"} +{"Time":"2023-05-31T19:41:16.313712835Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # allowed_annotations = []\r\n"} +{"Time":"2023-05-31T19:41:16.313716202Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:41:16.313719709Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime-handler: name used to identify the runtime\r\n"} +{"Time":"2023-05-31T19:41:16.313723325Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_path (optional, string): absolute path to the runtime executable in\r\n"} +{"Time":"2023-05-31T19:41:16.314070558Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the host filesystem. If omitted, the runtime-handler identifier should match\r\n"} +{"Time":"2023-05-31T19:41:16.314074189Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # the runtime executable name, and the runtime executable should be placed\r\n"} +{"Time":"2023-05-31T19:41:16.314076646Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # in $PATH.\r\n"} +{"Time":"2023-05-31T19:41:16.3140796Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_type (optional, string): type of runtime, one of: \"oci\", \"vm\". If\r\n"} +{"Time":"2023-05-31T19:41:16.314081963Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # omitted, an \"oci\" runtime is assumed.\r\n"} +{"Time":"2023-05-31T19:41:16.31408414Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_root (optional, string): root directory for storage of containers\r\n"} +{"Time":"2023-05-31T19:41:16.314086323Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # state.\r\n"} +{"Time":"2023-05-31T19:41:16.314088443Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - runtime_config_path (optional, string): the path for the runtime configuration\r\n"} +{"Time":"2023-05-31T19:41:16.314090647Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # file. This can only be used with when using the VM runtime_type.\r\n"} +{"Time":"2023-05-31T19:41:16.314092866Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - privileged_without_host_devices (optional, bool): an option for restricting\r\n"} +{"Time":"2023-05-31T19:41:16.314094991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # host devices from being passed to privileged containers.\r\n"} +{"Time":"2023-05-31T19:41:16.31409703Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - allowed_annotations (optional, array of strings): an option for specifying\r\n"} +{"Time":"2023-05-31T19:41:16.314099304Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # a list of experimental annotations that this runtime handler is allowed to process.\r\n"} +{"Time":"2023-05-31T19:41:16.314101447Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The currently recognized values are:\r\n"} +{"Time":"2023-05-31T19:41:16.314103893Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.userns-mode\" for configuring a user namespace for the pod.\r\n"} +{"Time":"2023-05-31T19:41:16.31410614Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.cgroup2-mount-hierarchy-rw\" for mounting cgroups writably when set to \"true\".\r\n"} +{"Time":"2023-05-31T19:41:16.314108655Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.Devices\" for configuring devices for the pod.\r\n"} +{"Time":"2023-05-31T19:41:16.314112629Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.ShmSize\" for configuring the size of /dev/shm.\r\n"} +{"Time":"2023-05-31T19:41:16.314114781Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri-o.UnifiedCgroup.$CTR_NAME\" for configuring the cgroup v2 unified block for a container.\r\n"} +{"Time":"2023-05-31T19:41:16.31441985Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.containers.trace-syscall\" for tracing syscalls via the OCI seccomp BPF hook.\r\n"} +{"Time":"2023-05-31T19:41:16.314423459Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.kubernetes.cri.rdt-class\" for setting the RDT class of a container\r\n"} +{"Time":"2023-05-31T19:41:16.314425663Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # - monitor_exec_cgroup (optional, string): if set to \"container\", indicates exec probes\r\n"} +{"Time":"2023-05-31T19:41:16.314428139Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # should be moved to the container's cgroup\r\n"} +{"Time":"2023-05-31T19:41:16.314430238Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314432365Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314434367Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.runtime.runtimes.runc]\r\n"} +{"Time":"2023-05-31T19:41:16.314436525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_path = \"/usr/bin/runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.314438981Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_type = \"oci\"\r\n"} +{"Time":"2023-05-31T19:41:16.314441083Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_root = \"/run/runc\"\r\n"} +{"Time":"2023-05-31T19:41:16.314443123Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" runtime_config_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.314445416Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314447366Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314449316Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" monitor_path = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.31445129Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314453368Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" monitor_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.314455486Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" monitor_exec_cgroup = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.31445744Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314459321Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314461465Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # crun is a fast and lightweight fully featured OCI runtime and C library for\r\n"} +{"Time":"2023-05-31T19:41:16.314463388Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # running containers\r\n"} +{"Time":"2023-05-31T19:41:16.314465375Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.crun]\r\n"} +{"Time":"2023-05-31T19:41:16.314467261Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314469263Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers is an OCI runtime, where containers are run inside lightweight\r\n"} +{"Time":"2023-05-31T19:41:16.314882859Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # VMs. Kata provides additional isolation towards the host, minimizing the host attack\r\n"} +{"Time":"2023-05-31T19:41:16.314888322Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # surface and mitigating the consequences of containers breakout.\r\n"} +{"Time":"2023-05-31T19:41:16.31489077Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.31489303Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the default configured VMM\r\n"} +{"Time":"2023-05-31T19:41:16.314895414Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-runtime]\r\n"} +{"Time":"2023-05-31T19:41:16.314897431Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314899525Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the QEMU VMM\r\n"} +{"Time":"2023-05-31T19:41:16.314901562Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-qemu]\r\n"} +{"Time":"2023-05-31T19:41:16.314903524Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314905482Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Kata Containers with the Firecracker VMM\r\n"} +{"Time":"2023-05-31T19:41:16.314907557Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #[crio.runtime.runtimes.kata-fc]\r\n"} +{"Time":"2023-05-31T19:41:16.314909585Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.314911569Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The workloads table defines ways to customize containers with different resources\r\n"} +{"Time":"2023-05-31T19:41:16.314915838Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # that work based on annotations, rather than the CRI.\r\n"} +{"Time":"2023-05-31T19:41:16.31491799Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Note, the behavior of this table is EXPERIMENTAL and may change at any time.\r\n"} +{"Time":"2023-05-31T19:41:16.314920248Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Each workload, has a name, activation_annotation, annotation_prefix and set of resources it supports mutating.\r\n"} +{"Time":"2023-05-31T19:41:16.314924102Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The currently supported resources are \"cpu\" (to configure the cpu shares) and \"cpuset\" to configure the cpuset.\r\n"} +{"Time":"2023-05-31T19:41:16.314926542Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Each resource can have a default value specified, or be empty.\r\n"} +{"Time":"2023-05-31T19:41:16.314928822Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # For a container to opt-into this workload, the pod should be configured with the annotation $activation_annotation (key only, value is ignored).\r\n"} +{"Time":"2023-05-31T19:41:16.314931209Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To customize per-container, an annotation of the form $annotation_prefix.$resource/$ctrName = \"value\" can be specified\r\n"} +{"Time":"2023-05-31T19:41:16.315234703Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # signifying for that resource type to override the default value.\r\n"} +{"Time":"2023-05-31T19:41:16.315238515Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If the annotation_prefix is not present, every container in the pod will be given the default values.\r\n"} +{"Time":"2023-05-31T19:41:16.315240904Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Example:\r\n"} +{"Time":"2023-05-31T19:41:16.31524306Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # [crio.runtime.workloads.workload-type]\r\n"} +{"Time":"2023-05-31T19:41:16.315245265Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # activation_annotation = \"io.crio/workload\"\r\n"} +{"Time":"2023-05-31T19:41:16.315247424Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # annotation_prefix = \"io.crio.workload-type\"\r\n"} +{"Time":"2023-05-31T19:41:16.315249546Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # [crio.runtime.workloads.workload-type.resources]\r\n"} +{"Time":"2023-05-31T19:41:16.315251773Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cpuset = 0\r\n"} +{"Time":"2023-05-31T19:41:16.31525377Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cpushares = \"0-1\"\r\n"} +{"Time":"2023-05-31T19:41:16.315255885Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Where:\r\n"} +{"Time":"2023-05-31T19:41:16.315258278Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The workload name is workload-type.\r\n"} +{"Time":"2023-05-31T19:41:16.315260415Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To specify, the pod must have the \"io.crio.workload\" annotation (this is a precise string match).\r\n"} +{"Time":"2023-05-31T19:41:16.315262678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This workload supports setting cpuset and cpu resources.\r\n"} +{"Time":"2023-05-31T19:41:16.315270513Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # annotation_prefix is used to customize the different resources.\r\n"} +{"Time":"2023-05-31T19:41:16.315272711Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # To configure the cpu shares a container gets in the example above, the pod would have to have the following annotation:\r\n"} +{"Time":"2023-05-31T19:41:16.31527491Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \"io.crio.workload-type/$container_name = {\"cpushares\": \"value\"}\"\r\n"} +{"Time":"2023-05-31T19:41:16.31527726Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \r\n"} +{"Time":"2023-05-31T19:41:16.3152793Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.315283772Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.image table contains settings pertaining to the management of OCI images.\r\n"} +{"Time":"2023-05-31T19:41:16.315285822Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" #\r\n"} +{"Time":"2023-05-31T19:41:16.315287806Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O reads its configured registries defaults from the system wide\r\n"} +{"Time":"2023-05-31T19:41:16.315576181Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # containers-registries.conf(5) located in /etc/containers/registries.conf. If\r\n"} +{"Time":"2023-05-31T19:41:16.315579634Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # you want to modify just CRI-O, you can change the registries configuration in\r\n"} +{"Time":"2023-05-31T19:41:16.315583064Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this file. Otherwise, leave insecure_registries and registries commented out to\r\n"} +{"Time":"2023-05-31T19:41:16.315586504Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # use the system's defaults from /etc/containers/registries.conf.\r\n"} +{"Time":"2023-05-31T19:41:16.315589972Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.image]\r\n"} +{"Time":"2023-05-31T19:41:16.315592903Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.315596476Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Default transport for pulling images from a remote container storage.\r\n"} +{"Time":"2023-05-31T19:41:16.315599698Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default_transport = \"docker://\"\r\n"} +{"Time":"2023-05-31T19:41:16.315603033Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.31560641Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The path to a file containing credentials necessary for pulling images from\r\n"} +{"Time":"2023-05-31T19:41:16.315609634Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # secure registries. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:41:16.315612991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # global_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.315616376Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.315621005Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The image used to instantiate infra containers.\r\n"} +{"Time":"2023-05-31T19:41:16.315624678Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.315628195Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" pause_image = \"registry.k8s.io/pause:3.2\"\r\n"} +{"Time":"2023-05-31T19:41:16.315631627Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.315634622Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The path to a file containing credentials specific for pulling the pause_image from\r\n"} +{"Time":"2023-05-31T19:41:16.315638095Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # above. The file is similar to that of /var/lib/kubelet/config.json\r\n"} +{"Time":"2023-05-31T19:41:16.31564093Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.315644011Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_image_auth_file = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.315647238Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.315972871Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The command to run to have a container stay in the paused state.\r\n"} +{"Time":"2023-05-31T19:41:16.315977473Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # When explicitly set to \"\", it will fallback to the entrypoint and command\r\n"} +{"Time":"2023-05-31T19:41:16.315980328Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # specified in the pause image. When commented out, it will fallback to the\r\n"} +{"Time":"2023-05-31T19:41:16.315982508Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # default: \"/pause\". This option supports live configuration reload.\r\n"} +{"Time":"2023-05-31T19:41:16.31598495Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # pause_command = \"/pause\"\r\n"} +{"Time":"2023-05-31T19:41:16.315987134Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.315989341Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the file which decides what sort of policy we use when deciding\r\n"} +{"Time":"2023-05-31T19:41:16.315991547Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # whether or not to trust an image that we've pulled. It is not recommended that\r\n"} +{"Time":"2023-05-31T19:41:16.315993661Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # this option be used, as the default behavior of using the system-wide default\r\n"} +{"Time":"2023-05-31T19:41:16.315995789Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # policy (i.e., /etc/containers/policy.json) is most often preferred. Please\r\n"} +{"Time":"2023-05-31T19:41:16.315997913Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # refer to containers-policy.json(5) for more details.\r\n"} +{"Time":"2023-05-31T19:41:16.316000029Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # signature_policy = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.316002013Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316004076Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # List of registries to skip TLS verification for pulling images. Please\r\n"} +{"Time":"2023-05-31T19:41:16.316006466Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # consider configuring the registries via /etc/containers/registries.conf before\r\n"} +{"Time":"2023-05-31T19:41:16.316008509Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # changing them here.\r\n"} +{"Time":"2023-05-31T19:41:16.316010483Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # insecure_registries = [\r\n"} +{"Time":"2023-05-31T19:41:16.316012419Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.3160142Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.31601623Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Controls how image volumes are handled. The valid values are mkdir, bind and\r\n"} +{"Time":"2023-05-31T19:41:16.316018216Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ignore; the latter will ignore volumes entirely.\r\n"} +{"Time":"2023-05-31T19:41:16.316020353Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # image_volumes = \"mkdir\"\r\n"} +{"Time":"2023-05-31T19:41:16.316330471Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316333757Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Temporary directory to use for storing big files\r\n"} +{"Time":"2023-05-31T19:41:16.316335881Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # big_files_temporary_dir = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.316337901Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316340445Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The crio.network table containers settings pertaining to the management of\r\n"} +{"Time":"2023-05-31T19:41:16.316342618Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CNI plugins.\r\n"} +{"Time":"2023-05-31T19:41:16.316344533Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.network]\r\n"} +{"Time":"2023-05-31T19:41:16.316346589Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316348608Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The default CNI network name to be selected. If not set or \"\", then\r\n"} +{"Time":"2023-05-31T19:41:16.316350884Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # CRI-O will pick-up the first one found in network_dir.\r\n"} +{"Time":"2023-05-31T19:41:16.316353266Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # cni_default_network = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.316355482Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316357491Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Path to the directory where CNI configuration files are located.\r\n"} +{"Time":"2023-05-31T19:41:16.316359611Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # network_dir = \"/etc/cni/net.d/\"\r\n"} +{"Time":"2023-05-31T19:41:16.316361646Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316363681Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Paths to directories where CNI plugin binaries are located.\r\n"} +{"Time":"2023-05-31T19:41:16.316365863Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # plugin_dirs = [\r\n"} +{"Time":"2023-05-31T19:41:16.316367809Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"/opt/cni/bin/\",\r\n"} +{"Time":"2023-05-31T19:41:16.316371688Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.316373539Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316375534Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A necessary configuration for Prometheus based metrics retrieval\r\n"} +{"Time":"2023-05-31T19:41:16.31637759Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.metrics]\r\n"} +{"Time":"2023-05-31T19:41:16.316379511Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316381599Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Globally enable or disable metrics support.\r\n"} +{"Time":"2023-05-31T19:41:16.316744579Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" enable_metrics = true\r\n"} +{"Time":"2023-05-31T19:41:16.316749996Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.316752316Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Specify enabled metrics collectors.\r\n"} +{"Time":"2023-05-31T19:41:16.316754966Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Per default all metrics are enabled.\r\n"} +{"Time":"2023-05-31T19:41:16.316757211Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # It is possible, to prefix the metrics with \"container_runtime_\" and \"crio_\".\r\n"} +{"Time":"2023-05-31T19:41:16.316760205Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # For example, the metrics collector \"operations\" would be treated in the same\r\n"} +{"Time":"2023-05-31T19:41:16.31676262Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # way as \"crio_operations\" and \"container_runtime_crio_operations\".\r\n"} +{"Time":"2023-05-31T19:41:16.31676495Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_collectors = [\r\n"} +{"Time":"2023-05-31T19:41:16.316767033Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations\",\r\n"} +{"Time":"2023-05-31T19:41:16.316769439Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_microseconds_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.316771753Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_microseconds\",\r\n"} +{"Time":"2023-05-31T19:41:16.316776653Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_errors\",\r\n"} +{"Time":"2023-05-31T19:41:16.316778849Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_digest\",\r\n"} +{"Time":"2023-05-31T19:41:16.316780929Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_name\",\r\n"} +{"Time":"2023-05-31T19:41:16.316783228Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_by_name_skipped\",\r\n"} +{"Time":"2023-05-31T19:41:16.316785287Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_failures\",\r\n"} +{"Time":"2023-05-31T19:41:16.316787317Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_successes\",\r\n"} +{"Time":"2023-05-31T19:41:16.316789402Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_layer_size\",\r\n"} +{"Time":"2023-05-31T19:41:16.316791405Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_layer_reuse\",\r\n"} +{"Time":"2023-05-31T19:41:16.316793386Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.316795473Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom\",\r\n"} +{"Time":"2023-05-31T19:41:16.316797486Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"processes_defunct\",\r\n"} +{"Time":"2023-05-31T19:41:16.316799426Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317090855Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_seconds\",\r\n"} +{"Time":"2023-05-31T19:41:16.317094142Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_latency_seconds_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317096227Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"operations_errors_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317098152Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317100145Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_skipped_bytes_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317102326Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_failure_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317104342Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_pulls_success_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317106644Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"image_layer_reuse_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317109713Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # \t\"containers_oom_count_total\",\r\n"} +{"Time":"2023-05-31T19:41:16.317111874Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # ]\r\n"} +{"Time":"2023-05-31T19:41:16.317113991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The port on which the metrics server will listen.\r\n"} +{"Time":"2023-05-31T19:41:16.317116222Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_port = 9090\r\n"} +{"Time":"2023-05-31T19:41:16.317118332Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317120278Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Local socket path to bind the metrics server to\r\n"} +{"Time":"2023-05-31T19:41:16.317122361Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_socket = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.317124507Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317126487Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The certificate for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:41:16.317128692Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If the certificate is not available on disk, then CRI-O will generate a\r\n"} +{"Time":"2023-05-31T19:41:16.317130917Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # self-signed one. CRI-O also watches for changes of this path and reloads the\r\n"} +{"Time":"2023-05-31T19:41:16.317133056Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # certificate on any modification event.\r\n"} +{"Time":"2023-05-31T19:41:16.317135162Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_cert = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.317137114Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317139094Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The certificate key for the secure metrics server.\r\n"} +{"Time":"2023-05-31T19:41:16.317141169Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Behaves in the same way as the metrics_cert.\r\n"} +{"Time":"2023-05-31T19:41:16.317438538Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # metrics_key = \"\"\r\n"} +{"Time":"2023-05-31T19:41:16.317441286Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317443298Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # A necessary configuration for OpenTelemetry trace data exporting\r\n"} +{"Time":"2023-05-31T19:41:16.3174455Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.tracing]\r\n"} +{"Time":"2023-05-31T19:41:16.317447561Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317449538Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Globally enable or disable exporting OpenTelemetry traces.\r\n"} +{"Time":"2023-05-31T19:41:16.317451622Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # enable_tracing = false\r\n"} +{"Time":"2023-05-31T19:41:16.317453818Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317455742Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Address on which the gRPC trace collector listens on.\r\n"} +{"Time":"2023-05-31T19:41:16.317458091Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # tracing_endpoint = \"0.0.0.0:4317\"\r\n"} +{"Time":"2023-05-31T19:41:16.317460205Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317462383Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Number of samples to collect per million spans.\r\n"} +{"Time":"2023-05-31T19:41:16.317464831Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # tracing_sampling_rate_per_million = 0\r\n"} +{"Time":"2023-05-31T19:41:16.317466875Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317468985Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # Necessary information pertaining to container and pod stats reporting.\r\n"} +{"Time":"2023-05-31T19:41:16.31747135Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" [crio.stats]\r\n"} +{"Time":"2023-05-31T19:41:16.317473464Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.317475537Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # The number of seconds between collecting pod and container stats.\r\n"} +{"Time":"2023-05-31T19:41:16.317477928Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # If set to 0, the stats are collected on-demand instead.\r\n"} +{"Time":"2023-05-31T19:41:16.31747991Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" # stats_collection_period = 0\r\n"} +{"Time":"2023-05-31T19:41:16.317482075Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \r\n"} +{"Time":"2023-05-31T19:41:16.31748411Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T19:41:16.317487299Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ----------------------- debugLogs end: enable-default-cni-509041 [took: 15.077063722s] --------------------------------\n"} +{"Time":"2023-05-31T19:41:16.317489745Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:175: Cleaning up \"enable-default-cni-509041\" profile ...\n"} +{"Time":"2023-05-31T19:41:16.317881751Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p enable-default-cni-509041\n"} +{"Time":"2023-05-31T19:41:17.340679262Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:178: (dbg) Done: out/minikube-linux-amd64 delete -p enable-default-cni-509041: (1.044033447s)\n"} +{"Time":"2023-05-31T19:41:17.340718624Z","Action":"cont","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T19:41:17.340722699Z","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== CONT TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T19:41:17.340728559Z","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" start_stop_delete_test.go:103: skipping TestStartStop/group/disable-driver-mounts - only runs on virtualbox\n"} +{"Time":"2023-05-31T19:41:17.340770736Z","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" helpers_test.go:175: Cleaning up \"disable-driver-mounts-681403\" profile ...\n"} +{"Time":"2023-05-31T19:41:17.340802085Z","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p disable-driver-mounts-681403\n"} +{"Time":"2023-05-31T19:41:17.487848744Z","Action":"cont","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T19:41:17.487869127Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== CONT TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T19:41:17.487876113Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial"} +{"Time":"2023-05-31T19:41:17.48787899Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial\n"} +{"Time":"2023-05-31T19:41:17.487883593Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart"} +{"Time":"2023-05-31T19:41:17.487885603Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/FirstStart\n"} +{"Time":"2023-05-31T19:41:17.487943785Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-linux-amd64 start -p default-k8s-diff-port-809922 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:41:30.426584241Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-linux-amd64 start -p no-preload-348437 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2: (1m28.924977985s)\n"} +{"Time":"2023-05-31T19:41:30.426617023Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/DeployApp"} +{"Time":"2023-05-31T19:41:30.42662244Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"=== RUN TestStartStop/group/no-preload/serial/DeployApp\n"} +{"Time":"2023-05-31T19:41:30.426703428Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context no-preload-348437 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T19:41:30.776429171Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/no-preload/serial/DeployApp: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:41:30.800263661Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [02d0db52-312e-423e-92c8-7c33dec6979c] Pending\n"} +{"Time":"2023-05-31T19:41:31.804455117Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [02d0db52-312e-423e-92c8-7c33dec6979c] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T19:41:33.804407336Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [02d0db52-312e-423e-92c8-7c33dec6979c] Running\n"} +{"Time":"2023-05-31T19:41:38.805237617Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/no-preload/serial/DeployApp: integration-test=busybox healthy within 8.028795872s\n"} +{"Time":"2023-05-31T19:41:38.805270183Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context no-preload-348437 exec busybox -- /bin/sh -c \"ulimit -n\"\n"} +{"Time":"2023-05-31T19:41:38.973098191Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T19:41:38.973130315Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/no-preload/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T19:41:38.97313887Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-linux-amd64 addons enable metrics-server -p no-preload-348437 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T19:41:39.886115532Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context no-preload-348437 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T19:41:39.968488431Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/Stop"} +{"Time":"2023-05-31T19:41:39.968520168Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"=== RUN TestStartStop/group/no-preload/serial/Stop\n"} +{"Time":"2023-05-31T19:41:39.968527016Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-linux-amd64 stop -p no-preload-348437 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T19:42:03.615652087Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:03.615579 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:03.620879817Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:03.620827 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:03.631135687Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:03.631081 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:03.651367876Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:03.651318 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:03.691605744Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:03.691556 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:03.771927102Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:03.771876 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:03.932535978Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:03.932453 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.252783517Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.252708 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.288965283Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.288901 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.294226291Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.294168 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.304457359Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.304405 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.324728275Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.324663 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.364986073Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.364930 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.445293124Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.445213 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.606130976Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.606058 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.893719375Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.893638 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:04.926830697Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:04.926761 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:05.566994326Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:05.566915 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:06.173889402Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:06.173799 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:06.847338929Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:06.847256 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:08.734410995Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:08.734344 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:09.407981597Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:09.407918 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:13.855318889Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:13.855237 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:14.528119235Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:14.528044 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:15.147332746Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"E0531 19:42:15.147278 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:20.66949554Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-linux-amd64 start -p embed-certs-850877 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2: (2m4.258417478s)\n"} +{"Time":"2023-05-31T19:42:20.669533274Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/DeployApp"} +{"Time":"2023-05-31T19:42:20.669539585Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":"=== RUN TestStartStop/group/embed-certs/serial/DeployApp\n"} +{"Time":"2023-05-31T19:42:20.66961473Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context embed-certs-850877 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T19:42:21.010924624Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/embed-certs/serial/DeployApp: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:42:21.027367104Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [ef2e2c3a-772f-4f90-8323-2c415c084c18] Pending\n"} +{"Time":"2023-05-31T19:42:22.032280792Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [ef2e2c3a-772f-4f90-8323-2c415c084c18] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T19:42:24.032316967Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [ef2e2c3a-772f-4f90-8323-2c415c084c18] Running\n"} +{"Time":"2023-05-31T19:42:24.096301727Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":"E0531 19:42:24.096252 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:24.768889474Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":"E0531 19:42:24.768819 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:30.031101316Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/embed-certs/serial/DeployApp: integration-test=busybox healthy within 9.020191972s\n"} +{"Time":"2023-05-31T19:42:30.031143869Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context embed-certs-850877 exec busybox -- /bin/sh -c \"ulimit -n\"\n"} +{"Time":"2023-05-31T19:42:30.173299303Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T19:42:30.17333118Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/embed-certs/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T19:42:30.173340905Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-linux-amd64 addons enable metrics-server -p embed-certs-850877 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T19:42:30.246023011Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-linux-amd64 start -p default-k8s-diff-port-809922 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2: (1m12.757956083s)\n"} +{"Time":"2023-05-31T19:42:30.246058691Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp"} +{"Time":"2023-05-31T19:42:30.246063479Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/DeployApp\n"} +{"Time":"2023-05-31T19:42:30.246127215Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context default-k8s-diff-port-809922 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T19:42:30.581538144Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/default-k8s-diff-port/serial/DeployApp: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:42:30.607836262Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [5ea14648-150e-46f5-943b-665736eb496d] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T19:42:31.165323615Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context embed-certs-850877 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T19:42:31.241731495Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/Stop"} +{"Time":"2023-05-31T19:42:31.241761487Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":"=== RUN TestStartStop/group/embed-certs/serial/Stop\n"} +{"Time":"2023-05-31T19:42:31.241771188Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-linux-amd64 stop -p embed-certs-850877 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T19:42:33.611717614Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [5ea14648-150e-46f5-943b-665736eb496d] Running\n"} +{"Time":"2023-05-31T19:42:39.611558101Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/default-k8s-diff-port/serial/DeployApp: integration-test=busybox healthy within 9.030007014s\n"} +{"Time":"2023-05-31T19:42:39.611590566Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context default-k8s-diff-port-809922 exec busybox -- /bin/sh -c \"ulimit -n\"\n"} +{"Time":"2023-05-31T19:42:39.745215161Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T19:42:39.745245428Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T19:42:39.745258932Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-linux-amd64 addons enable metrics-server -p default-k8s-diff-port-809922 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T19:42:40.686377743Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context default-k8s-diff-port-809922 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T19:42:40.757593901Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop"} +{"Time":"2023-05-31T19:42:40.757622612Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/Stop\n"} +{"Time":"2023-05-31T19:42:40.757640269Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-linux-amd64 stop -p default-k8s-diff-port-809922 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T19:42:44.576705825Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":"E0531 19:42:44.576630 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:42:45.249304605Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":"E0531 19:42:45.249231 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:11.680725935Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-linux-amd64 stop -p no-preload-348437 --alsologtostderr -v=3: (1m31.712116823s)\n"} +{"Time":"2023-05-31T19:43:11.680756577Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T19:43:11.680760484Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T19:43:11.680766942Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p no-preload-348437 -n no-preload-348437\n"} +{"Time":"2023-05-31T19:43:11.735130647Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Host}} -p no-preload-348437 -n no-preload-348437: exit status 7 (54.282731ms)\n"} +{"Time":"2023-05-31T19:43:11.735160069Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:43:11.735172159Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:43:11.735177501Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:43:11.735180854Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:43:11.735183842Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:43:11.735186309Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T19:43:11.735189104Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-linux-amd64 addons enable dashboard -p no-preload-348437 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T19:43:11.82615053Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/SecondStart"} +{"Time":"2023-05-31T19:43:11.826171928Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"=== RUN TestStartStop/group/no-preload/serial/SecondStart\n"} +{"Time":"2023-05-31T19:43:11.826178541Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-linux-amd64 start -p no-preload-348437 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:43:25.536989656Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:25.536909 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:26.210399673Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:26.210307 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:28.543815782Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:28.543745 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:28.549091843Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:28.549040 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:28.559297626Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:28.559256 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:28.579589632Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:28.579543 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:28.619856205Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:28.619809 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:28.700107604Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:28.700061 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:28.860463301Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:28.860404 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:29.181352808Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:29.181277 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:29.822220218Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:29.822155 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:31.102933602Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:31.102846 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:33.663950242Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:33.663866 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:38.784592355Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:38.784524 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:45.661160572Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:45.661087 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:45.666445223Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:45.666367 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:45.676668725Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:45.676617 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:45.69697286Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:45.696875 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:45.737852012Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:45.737774 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:45.818191723Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:45.818112 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:45.978661747Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:45.978566 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:46.29923605Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:46.299157 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:46.939903852Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:46.939840 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:48.220705251Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:48.220637 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:49.024738916Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:49.024676 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:50.781158791Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:50.781088 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:43:55.901833012Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"E0531 19:43:55.901776 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:02.979361938Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-linux-amd64 stop -p embed-certs-850877 --alsologtostderr -v=3: (1m31.737497652s)\n"} +{"Time":"2023-05-31T19:44:02.979384611Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T19:44:02.979387735Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T19:44:02.979420872Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p embed-certs-850877 -n embed-certs-850877\n"} +{"Time":"2023-05-31T19:44:03.033314648Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Host}} -p embed-certs-850877 -n embed-certs-850877: exit status 7 (53.798062ms)\n"} +{"Time":"2023-05-31T19:44:03.033337179Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:44:03.03334826Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:44:03.033351458Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:44:03.033353628Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:44:03.033355774Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:44:03.03335805Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T19:44:03.033362133Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-linux-amd64 addons enable dashboard -p embed-certs-850877 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T19:44:03.13109368Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/SecondStart"} +{"Time":"2023-05-31T19:44:03.131114292Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"=== RUN TestStartStop/group/embed-certs/serial/SecondStart\n"} +{"Time":"2023-05-31T19:44:03.131124924Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-linux-amd64 start -p embed-certs-850877 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:44:06.142873986Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 19:44:06.142805 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:09.505980885Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"E0531 19:44:09.505910 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:12.778841263Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-linux-amd64 stop -p default-k8s-diff-port-809922 --alsologtostderr -v=3: (1m32.021122401s)\n"} +{"Time":"2023-05-31T19:44:12.778873551Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T19:44:12.778878265Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T19:44:12.778885853Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:44:12.842049538Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Host}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922: exit status 7 (63.075324ms)\n"} +{"Time":"2023-05-31T19:44:12.842079414Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:44:12.842085436Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:44:12.842089525Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:44:12.842093458Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:44:12.842097172Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:44:12.842100563Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T19:44:12.842104468Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-linux-amd64 addons enable dashboard -p default-k8s-diff-port-809922 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T19:44:12.939637309Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart"} +{"Time":"2023-05-31T19:44:12.939663266Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/SecondStart\n"} +{"Time":"2023-05-31T19:44:12.939671413Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-linux-amd64 start -p default-k8s-diff-port-809922 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:44:26.623913717Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:26.623833 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:33.33336873Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:33.333304 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:33.338683269Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:33.338624 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:33.348951156Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:33.348893 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:33.369214818Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:33.369156 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:33.40945688Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:33.409383 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:33.489781732Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:33.489718 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:33.650318191Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:33.650243 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:33.971194365Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:33.971124 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:34.611839177Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:34.611769 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:35.892349076Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:35.892290 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:38.452494603Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:38.452419 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:41.459474428Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:41.459407 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:41.464677449Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:41.464617 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:41.475054346Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:41.474927 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:41.495262754Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:41.495212 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:41.535503546Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:41.535466 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:41.615808972Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:41.615758 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:41.776232708Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:41.776173 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:42.096341419Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:42.096259 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:42.73730202Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:42.737226 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:43.573215169Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:43.573142 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:44.017510481Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:44.017423 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:46.578323464Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:46.578226 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:47.457373974Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:47.457299 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:48.131084546Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:48.131025 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:50.466575098Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:50.466479 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:51.698552824Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:51.698485 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:53.81414483Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:44:53.814057 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:44:59.613970503Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-linux-amd64 start -p old-k8s-version-709650 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.16.0: (5m44.743018834s)\n"} +{"Time":"2023-05-31T19:44:59.614015682Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp"} +{"Time":"2023-05-31T19:44:59.614028311Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/DeployApp\n"} +{"Time":"2023-05-31T19:44:59.614095184Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context old-k8s-version-709650 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T19:44:59.873695616Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/old-k8s-version/serial/DeployApp: waiting 8m0s for pods matching \"integration-test=busybox\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T19:44:59.89421895Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [a60f0456-a255-49bc-b8d6-e1f922f364b4] Pending\n"} +{"Time":"2023-05-31T19:45:00.897599388Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [a60f0456-a255-49bc-b8d6-e1f922f364b4] Pending / Ready:ContainersNotReady (containers with unready status: [busybox]) / ContainersReady:ContainersNotReady (containers with unready status: [busybox])\n"} +{"Time":"2023-05-31T19:45:01.939312219Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":"E0531 19:45:01.939255 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:02.899207413Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:344: \"busybox\" [a60f0456-a255-49bc-b8d6-e1f922f364b4] Running\n"} +{"Time":"2023-05-31T19:45:07.584516102Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":"E0531 19:45:07.584442 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:08.897908737Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) TestStartStop/group/old-k8s-version/serial/DeployApp: integration-test=busybox healthy within 9.024205774s\n"} +{"Time":"2023-05-31T19:45:08.897943272Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context old-k8s-version-709650 exec busybox -- /bin/sh -c \"ulimit -n\"\n"} +{"Time":"2023-05-31T19:45:09.025324442Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T19:45:09.025354462Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T19:45:09.025363636Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-linux-amd64 addons enable metrics-server -p old-k8s-version-709650 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T19:45:09.606466731Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context old-k8s-version-709650 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T19:45:09.688885943Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/Stop"} +{"Time":"2023-05-31T19:45:09.688912318Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/Stop\n"} +{"Time":"2023-05-31T19:45:09.688927443Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-linux-amd64 stop -p old-k8s-version-709650 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T19:45:14.294841293Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:14.294770 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:20.552250241Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:20.552173 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:22.420195816Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:22.420130 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:49.539264541Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:49.539189 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:49.544513819Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:49.544442 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:49.554762614Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:49.554697 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:49.575081533Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:49.575024 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:49.615355599Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:49.615306 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:49.695594916Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:49.695531 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:49.856412417Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:49.856329 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:50.176947008Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:50.176871 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:50.817086278Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:50.817025 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:52.097926631Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:52.097849 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:54.658437441Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:54.658376 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:55.255818152Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:55.255752 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:45:59.778884324Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:45:59.778760 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:46:03.380798302Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:46:03.380725 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:46:08.27633536Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:46:08.276276 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:46:10.019278107Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:46:10.019208 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:46:12.387254744Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:46:12.387188 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:46:29.504743755Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:46:29.504677 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:46:30.500328158Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"E0531 19:46:30.500264 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:46:51.784258174Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-linux-amd64 stop -p old-k8s-version-709650 --alsologtostderr -v=3: (1m42.095237269s)\n"} +{"Time":"2023-05-31T19:46:51.784299985Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T19:46:51.784305583Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T19:46:51.784312786Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p old-k8s-version-709650 -n old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:46:51.853710597Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Host}} -p old-k8s-version-709650 -n old-k8s-version-709650: exit status 7 (69.277738ms)\n"} +{"Time":"2023-05-31T19:46:51.853735042Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:46:51.853752784Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:46:51.85376367Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:46:51.85376693Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:46:51.853770366Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:46:51.853773297Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T19:46:51.853778698Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-linux-amd64 addons enable dashboard -p old-k8s-version-709650 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T19:46:51.947369424Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart"} +{"Time":"2023-05-31T19:46:51.947392658Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/SecondStart\n"} +{"Time":"2023-05-31T19:46:51.947415494Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-linux-amd64 start -p old-k8s-version-709650 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T19:46:58.192820019Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:46:58.192747 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:47:03.61532384Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:47:03.615248 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:47:04.288948345Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:47:04.288885 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:47:11.460933744Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:47:11.460860 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:47:15.147035138Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:47:15.146969 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:47:17.176266827Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:47:17.176191 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:47:25.301763133Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:47:25.301693 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:47:31.297587332Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:47:31.297495 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:47:31.972093843Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:47:31.972028 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:48:28.544123846Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:48:28.544026 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:48:33.382160671Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:48:33.382084 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:48:45.661428948Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:48:45.661360 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:48:56.228415226Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:48:56.228343 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:49:13.345706703Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:49:13.345633 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:49:33.33398342Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:49:33.333701 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:49:41.459284642Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:49:41.459210 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:50:01.016782289Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:50:01.016692 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/bridge-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:50:03.602035072Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:50:03.601959 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:50:09.142939404Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:50:09.142873 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:50:20.552307904Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"E0531 19:50:20.552243 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/ingress-addon-legacy-859355/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:50:49.282641353Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-linux-amd64 start -p default-k8s-diff-port-809922 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2: (6m36.342708332s)\n"} +{"Time":"2023-05-31T19:50:49.2830657Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:50:49.540181066Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"E0531 19:50:49.540098 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:50:49.56086974Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T19:50:49.560891822Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T19:50:49.562413309Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T19:50:49.575398741Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-6nfpr\" [c5e6a9b3-3d6a-49eb-ba6e-da2ef60f8923] Running\n"} +{"Time":"2023-05-31T19:50:54.580673518Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.01822165s\n"} +{"Time":"2023-05-31T19:50:54.580699935Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T19:50:54.580704272Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T19:50:54.58182278Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T19:50:54.587108017Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-6nfpr\" [c5e6a9b3-3d6a-49eb-ba6e-da2ef60f8923] Running\n"} +{"Time":"2023-05-31T19:50:59.591470324Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.009635185s\n"} +{"Time":"2023-05-31T19:50:59.591523244Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context default-k8s-diff-port-809922 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T19:50:59.66447332Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T19:50:59.664493262Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T19:50:59.664499854Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-linux-amd64 ssh -p default-k8s-diff-port-809922 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T19:50:59.894627281Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T19:50:59.894655891Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T19:50:59.894663954Z","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause"} +{"Time":"2023-05-31T19:50:59.894667397Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/Pause\n"} +{"Time":"2023-05-31T19:50:59.894706038Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 pause -p default-k8s-diff-port-809922 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:51:00.573616153Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:51:00.805487654Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.APIServer}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922: exit status 2 (231.795215ms)\n"} +{"Time":"2023-05-31T19:51:00.805519285Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:51:00.805537173Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:51:00.805540732Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T19:51:00.80554402Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:51:00.805547842Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:51:00.805551302Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:51:00.805559112Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:51:01.047053937Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Kubelet}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922: exit status 2 (241.450356ms)\n"} +{"Time":"2023-05-31T19:51:01.047086102Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:51:01.047091574Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:51:01.047095065Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:51:01.047099293Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:51:01.047102936Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:51:01.047106233Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:51:01.047110412Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 unpause -p default-k8s-diff-port-809922 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:51:01.716603489Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:51:02.047816188Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p default-k8s-diff-port-809922 -n default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:51:02.339502335Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-linux-amd64 delete -p default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:51:03.522998946Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-linux-amd64 delete -p default-k8s-diff-port-809922: (1.183460675s)\n"} +{"Time":"2023-05-31T19:51:03.523021395Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:51:03.567124045Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts default-k8s-diff-port-809922: exit status 1 (44.001652ms)\n"} +{"Time":"2023-05-31T19:51:03.567156696Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T19:51:03.567163005Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:51:03.567167033Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T19:51:03.567182218Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T19:51:03.567184982Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:51:03.567188778Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:51:03.56719322Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \terror: context default-k8s-diff-port-809922 not found\n"} +{"Time":"2023-05-31T19:51:03.567197737Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T19:51:03.567201451Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:51:03.567204986Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T19:51:03.567213903Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" helpers_test.go:175: Cleaning up \"default-k8s-diff-port-809922\" profile ...\n"} +{"Time":"2023-05-31T19:51:03.567218708Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p default-k8s-diff-port-809922\n"} +{"Time":"2023-05-31T19:51:03.709186432Z","Action":"cont","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T19:51:03.709212013Z","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== CONT TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T19:51:03.709218131Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial"} +{"Time":"2023-05-31T19:51:03.709221021Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":"=== RUN TestStartStop/group/newest-cni/serial\n"} +{"Time":"2023-05-31T19:51:03.709236833Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/FirstStart"} +{"Time":"2023-05-31T19:51:03.709240466Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"=== RUN TestStartStop/group/newest-cni/serial/FirstStart\n"} +{"Time":"2023-05-31T19:51:03.709245225Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-linux-amd64 start -p newest-cni-134774 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:51:08.27652907Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"E0531 19:51:08.276468 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/addons-346378/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:51:09.738179718Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-linux-amd64 start -p embed-certs-850877 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2: (7m6.606964801s)\n"} +{"Time":"2023-05-31T19:51:09.738217585Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p embed-certs-850877 -n embed-certs-850877\n"} +{"Time":"2023-05-31T19:51:10.076367112Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T19:51:10.076394945Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T19:51:10.077744635Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T19:51:10.090453079Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-zcbjv\" [eb96db3a-e1e6-4b88-bab3-532e9d240131] Pending / Ready:ContainersNotReady (containers with unready status: [kubernetes-dashboard]) / ContainersReady:ContainersNotReady (containers with unready status: [kubernetes-dashboard])\n"} +{"Time":"2023-05-31T19:51:17.222915211Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":"E0531 19:51:17.222839 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/enable-default-cni-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:51:20.095848786Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-zcbjv\" [eb96db3a-e1e6-4b88-bab3-532e9d240131] Running\n"} +{"Time":"2023-05-31T19:51:25.097515383Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 15.019767398s\n"} +{"Time":"2023-05-31T19:51:25.097546689Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T19:51:25.097550878Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T19:51:25.098948791Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/embed-certs/serial/AddonExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T19:51:25.103000847Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-zcbjv\" [eb96db3a-e1e6-4b88-bab3-532e9d240131] Running\n"} +{"Time":"2023-05-31T19:51:30.108048234Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/embed-certs/serial/AddonExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.009065067s\n"} +{"Time":"2023-05-31T19:51:30.108081021Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context embed-certs-850877 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T19:51:30.182363261Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T19:51:30.182390259Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/embed-certs/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T19:51:30.182398172Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-linux-amd64 ssh -p embed-certs-850877 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T19:51:30.401568988Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T19:51:30.401608323Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T19:51:30.401660293Z","Action":"run","Test":"TestStartStop/group/embed-certs/serial/Pause"} +{"Time":"2023-05-31T19:51:30.401674683Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":"=== RUN TestStartStop/group/embed-certs/serial/Pause\n"} +{"Time":"2023-05-31T19:51:30.401700289Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 pause -p embed-certs-850877 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:51:31.036622934Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p embed-certs-850877 -n embed-certs-850877\n"} +{"Time":"2023-05-31T19:51:31.279627077Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.APIServer}} -p embed-certs-850877 -n embed-certs-850877: exit status 2 (242.915094ms)\n"} +{"Time":"2023-05-31T19:51:31.279657194Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:51:31.279662594Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:51:31.27966677Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T19:51:31.279670075Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:51:31.279673126Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:51:31.279676412Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:51:31.279680847Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p embed-certs-850877 -n embed-certs-850877\n"} +{"Time":"2023-05-31T19:51:31.510087323Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Kubelet}} -p embed-certs-850877 -n embed-certs-850877: exit status 2 (230.351191ms)\n"} +{"Time":"2023-05-31T19:51:31.510116871Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:51:31.510127198Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:51:31.510131902Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:51:31.510135708Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:51:31.510138488Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:51:31.510141661Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:51:31.510145588Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 unpause -p embed-certs-850877 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:51:32.294161895Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p embed-certs-850877 -n embed-certs-850877\n"} +{"Time":"2023-05-31T19:51:32.696786414Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p embed-certs-850877 -n embed-certs-850877\n"} +{"Time":"2023-05-31T19:51:33.091020615Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-linux-amd64 delete -p embed-certs-850877\n"} +{"Time":"2023-05-31T19:51:34.344469877Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-linux-amd64 delete -p embed-certs-850877: (1.25339775s)\n"} +{"Time":"2023-05-31T19:51:34.344501067Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts embed-certs-850877\n"} +{"Time":"2023-05-31T19:51:34.387057768Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts embed-certs-850877: exit status 1 (42.477233ms)\n"} +{"Time":"2023-05-31T19:51:34.387081498Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T19:51:34.387086201Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:51:34.387090321Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T19:51:34.387094288Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T19:51:34.38709763Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:51:34.387101045Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:51:34.387104681Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \terror: context embed-certs-850877 not found\n"} +{"Time":"2023-05-31T19:51:34.387108662Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T19:51:34.387112038Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:51:34.387115452Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T19:51:34.387123102Z","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" helpers_test.go:175: Cleaning up \"embed-certs-850877\" profile ...\n"} +{"Time":"2023-05-31T19:51:34.387125684Z","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p embed-certs-850877\n"} +{"Time":"2023-05-31T19:51:34.533295935Z","Action":"output","Test":"TestNetworkPlugins","Output":"--- PASS: TestNetworkPlugins (1011.82s)\n"} +{"Time":"2023-05-31T19:51:34.533318436Z","Action":"output","Test":"TestNetworkPlugins/group","Output":" --- PASS: TestNetworkPlugins/group (12.25s)\n"} +{"Time":"2023-05-31T19:51:34.533322317Z","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --- SKIP: TestNetworkPlugins/group/kubenet (3.81s)\n"} +{"Time":"2023-05-31T19:51:34.533325549Z","Action":"skip","Test":"TestNetworkPlugins/group/kubenet","Elapsed":3.81} +{"Time":"2023-05-31T19:51:34.533331048Z","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --- PASS: TestNetworkPlugins/group/false (5.38s)\n"} +{"Time":"2023-05-31T19:51:34.533333602Z","Action":"pass","Test":"TestNetworkPlugins/group/false","Elapsed":5.38} +{"Time":"2023-05-31T19:51:34.533337302Z","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" --- SKIP: TestNetworkPlugins/group/cilium (3.06s)\n"} +{"Time":"2023-05-31T19:51:34.533341672Z","Action":"skip","Test":"TestNetworkPlugins/group/cilium","Elapsed":3.06} +{"Time":"2023-05-31T19:51:34.533344807Z","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --- PASS: TestNetworkPlugins/group/auto (137.99s)\n"} +{"Time":"2023-05-31T19:51:34.533349262Z","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" --- PASS: TestNetworkPlugins/group/auto/Start (108.55s)\n"} +{"Time":"2023-05-31T19:51:34.533353821Z","Action":"pass","Test":"TestNetworkPlugins/group/auto/Start","Elapsed":108.55} +{"Time":"2023-05-31T19:51:34.533357301Z","Action":"output","Test":"TestNetworkPlugins/group/auto/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/auto/KubeletFlags (0.24s)\n"} +{"Time":"2023-05-31T19:51:34.533361541Z","Action":"pass","Test":"TestNetworkPlugins/group/auto/KubeletFlags","Elapsed":0.24} +{"Time":"2023-05-31T19:51:34.533365656Z","Action":"output","Test":"TestNetworkPlugins/group/auto/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/auto/NetCatPod (11.40s)\n"} +{"Time":"2023-05-31T19:51:34.533370551Z","Action":"pass","Test":"TestNetworkPlugins/group/auto/NetCatPod","Elapsed":11.4} +{"Time":"2023-05-31T19:51:34.533373797Z","Action":"output","Test":"TestNetworkPlugins/group/auto/DNS","Output":" --- PASS: TestNetworkPlugins/group/auto/DNS (0.17s)\n"} +{"Time":"2023-05-31T19:51:34.533377547Z","Action":"pass","Test":"TestNetworkPlugins/group/auto/DNS","Elapsed":0.17} +{"Time":"2023-05-31T19:51:34.533380667Z","Action":"output","Test":"TestNetworkPlugins/group/auto/Localhost","Output":" --- PASS: TestNetworkPlugins/group/auto/Localhost (0.13s)\n"} +{"Time":"2023-05-31T19:51:34.533388006Z","Action":"pass","Test":"TestNetworkPlugins/group/auto/Localhost","Elapsed":0.13} +{"Time":"2023-05-31T19:51:34.533390059Z","Action":"output","Test":"TestNetworkPlugins/group/auto/HairPin","Output":" --- PASS: TestNetworkPlugins/group/auto/HairPin (0.13s)\n"} +{"Time":"2023-05-31T19:51:34.533392469Z","Action":"pass","Test":"TestNetworkPlugins/group/auto/HairPin","Elapsed":0.13} +{"Time":"2023-05-31T19:51:34.533394141Z","Action":"pass","Test":"TestNetworkPlugins/group/auto","Elapsed":137.99} +{"Time":"2023-05-31T19:51:34.533396149Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --- PASS: TestNetworkPlugins/group/kindnet (128.28s)\n"} +{"Time":"2023-05-31T19:51:34.533398952Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" --- PASS: TestNetworkPlugins/group/kindnet/Start (94.14s)\n"} +{"Time":"2023-05-31T19:51:34.533401597Z","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/Start","Elapsed":94.14} +{"Time":"2023-05-31T19:51:34.533404051Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Output":" --- PASS: TestNetworkPlugins/group/kindnet/ControllerPod (5.02s)\n"} +{"Time":"2023-05-31T19:51:34.533407939Z","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/ControllerPod","Elapsed":5.02} +{"Time":"2023-05-31T19:51:34.533411889Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/kindnet/KubeletFlags (0.20s)\n"} +{"Time":"2023-05-31T19:51:34.533415548Z","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/KubeletFlags","Elapsed":0.2} +{"Time":"2023-05-31T19:51:34.533419061Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/kindnet/NetCatPod (10.33s)\n"} +{"Time":"2023-05-31T19:51:34.533423121Z","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/NetCatPod","Elapsed":10.33} +{"Time":"2023-05-31T19:51:34.533425738Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/DNS","Output":" --- PASS: TestNetworkPlugins/group/kindnet/DNS (0.17s)\n"} +{"Time":"2023-05-31T19:51:34.533428729Z","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/DNS","Elapsed":0.17} +{"Time":"2023-05-31T19:51:34.533431698Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Localhost","Output":" --- PASS: TestNetworkPlugins/group/kindnet/Localhost (0.15s)\n"} +{"Time":"2023-05-31T19:51:34.533438333Z","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/Localhost","Elapsed":0.15} +{"Time":"2023-05-31T19:51:34.533441679Z","Action":"output","Test":"TestNetworkPlugins/group/kindnet/HairPin","Output":" --- PASS: TestNetworkPlugins/group/kindnet/HairPin (0.14s)\n"} +{"Time":"2023-05-31T19:51:34.533445635Z","Action":"pass","Test":"TestNetworkPlugins/group/kindnet/HairPin","Elapsed":0.14} +{"Time":"2023-05-31T19:51:34.533448081Z","Action":"pass","Test":"TestNetworkPlugins/group/kindnet","Elapsed":128.28} +{"Time":"2023-05-31T19:51:34.533450939Z","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --- PASS: TestNetworkPlugins/group/calico (127.39s)\n"} +{"Time":"2023-05-31T19:51:34.533460861Z","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" --- PASS: TestNetworkPlugins/group/calico/Start (94.59s)\n"} +{"Time":"2023-05-31T19:51:34.533464893Z","Action":"pass","Test":"TestNetworkPlugins/group/calico/Start","Elapsed":94.59} +{"Time":"2023-05-31T19:51:34.533468447Z","Action":"output","Test":"TestNetworkPlugins/group/calico/ControllerPod","Output":" --- PASS: TestNetworkPlugins/group/calico/ControllerPod (5.02s)\n"} +{"Time":"2023-05-31T19:51:34.53347268Z","Action":"pass","Test":"TestNetworkPlugins/group/calico/ControllerPod","Elapsed":5.02} +{"Time":"2023-05-31T19:51:34.533476237Z","Action":"output","Test":"TestNetworkPlugins/group/calico/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/calico/KubeletFlags (0.22s)\n"} +{"Time":"2023-05-31T19:51:34.533480315Z","Action":"pass","Test":"TestNetworkPlugins/group/calico/KubeletFlags","Elapsed":0.22} +{"Time":"2023-05-31T19:51:34.533483606Z","Action":"output","Test":"TestNetworkPlugins/group/calico/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/calico/NetCatPod (10.51s)\n"} +{"Time":"2023-05-31T19:51:34.533487651Z","Action":"pass","Test":"TestNetworkPlugins/group/calico/NetCatPod","Elapsed":10.51} +{"Time":"2023-05-31T19:51:34.533490845Z","Action":"output","Test":"TestNetworkPlugins/group/calico/DNS","Output":" --- PASS: TestNetworkPlugins/group/calico/DNS (0.21s)\n"} +{"Time":"2023-05-31T19:51:34.533494554Z","Action":"pass","Test":"TestNetworkPlugins/group/calico/DNS","Elapsed":0.21} +{"Time":"2023-05-31T19:51:34.533497927Z","Action":"output","Test":"TestNetworkPlugins/group/calico/Localhost","Output":" --- PASS: TestNetworkPlugins/group/calico/Localhost (0.17s)\n"} +{"Time":"2023-05-31T19:51:34.533501979Z","Action":"pass","Test":"TestNetworkPlugins/group/calico/Localhost","Elapsed":0.17} +{"Time":"2023-05-31T19:51:34.533505522Z","Action":"output","Test":"TestNetworkPlugins/group/calico/HairPin","Output":" --- PASS: TestNetworkPlugins/group/calico/HairPin (0.18s)\n"} +{"Time":"2023-05-31T19:51:34.533509433Z","Action":"pass","Test":"TestNetworkPlugins/group/calico/HairPin","Elapsed":0.18} +{"Time":"2023-05-31T19:51:34.533512329Z","Action":"pass","Test":"TestNetworkPlugins/group/calico","Elapsed":127.39} +{"Time":"2023-05-31T19:51:34.533515662Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel (139.87s)\n"} +{"Time":"2023-05-31T19:51:34.533519814Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/Start (109.94s)\n"} +{"Time":"2023-05-31T19:51:34.533523489Z","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/Start","Elapsed":109.94} +{"Time":"2023-05-31T19:51:34.533526924Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/KubeletFlags (0.24s)\n"} +{"Time":"2023-05-31T19:51:34.533530907Z","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/KubeletFlags","Elapsed":0.24} +{"Time":"2023-05-31T19:51:34.533535683Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/NetCatPod (12.51s)\n"} +{"Time":"2023-05-31T19:51:34.533539545Z","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/NetCatPod","Elapsed":12.51} +{"Time":"2023-05-31T19:51:34.533543256Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/DNS","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/DNS (0.19s)\n"} +{"Time":"2023-05-31T19:51:34.533547003Z","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/DNS","Elapsed":0.19} +{"Time":"2023-05-31T19:51:34.533550441Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Localhost","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/Localhost (0.16s)\n"} +{"Time":"2023-05-31T19:51:34.533554185Z","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/Localhost","Elapsed":0.16} +{"Time":"2023-05-31T19:51:34.533557609Z","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/HairPin","Output":" --- PASS: TestNetworkPlugins/group/custom-flannel/HairPin (0.18s)\n"} +{"Time":"2023-05-31T19:51:34.533568159Z","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel/HairPin","Elapsed":0.18} +{"Time":"2023-05-31T19:51:34.533571291Z","Action":"pass","Test":"TestNetworkPlugins/group/custom-flannel","Elapsed":139.87} +{"Time":"2023-05-31T19:51:34.533577244Z","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --- PASS: TestNetworkPlugins/group/bridge (149.06s)\n"} +{"Time":"2023-05-31T19:51:34.533582668Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" --- PASS: TestNetworkPlugins/group/bridge/Start (120.26s)\n"} +{"Time":"2023-05-31T19:51:34.533586527Z","Action":"pass","Test":"TestNetworkPlugins/group/bridge/Start","Elapsed":120.26} +{"Time":"2023-05-31T19:51:34.533589822Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/bridge/KubeletFlags (0.23s)\n"} +{"Time":"2023-05-31T19:51:34.533593561Z","Action":"pass","Test":"TestNetworkPlugins/group/bridge/KubeletFlags","Elapsed":0.23} +{"Time":"2023-05-31T19:51:34.5335969Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/bridge/NetCatPod (12.43s)\n"} +{"Time":"2023-05-31T19:51:34.533600953Z","Action":"pass","Test":"TestNetworkPlugins/group/bridge/NetCatPod","Elapsed":12.43} +{"Time":"2023-05-31T19:51:34.533604391Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/DNS","Output":" --- PASS: TestNetworkPlugins/group/bridge/DNS (0.19s)\n"} +{"Time":"2023-05-31T19:51:34.533608181Z","Action":"pass","Test":"TestNetworkPlugins/group/bridge/DNS","Elapsed":0.19} +{"Time":"2023-05-31T19:51:34.533611442Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/Localhost","Output":" --- PASS: TestNetworkPlugins/group/bridge/Localhost (0.15s)\n"} +{"Time":"2023-05-31T19:51:34.533615023Z","Action":"pass","Test":"TestNetworkPlugins/group/bridge/Localhost","Elapsed":0.15} +{"Time":"2023-05-31T19:51:34.533618051Z","Action":"output","Test":"TestNetworkPlugins/group/bridge/HairPin","Output":" --- PASS: TestNetworkPlugins/group/bridge/HairPin (0.15s)\n"} +{"Time":"2023-05-31T19:51:34.533621662Z","Action":"pass","Test":"TestNetworkPlugins/group/bridge/HairPin","Elapsed":0.15} +{"Time":"2023-05-31T19:51:34.533624475Z","Action":"pass","Test":"TestNetworkPlugins/group/bridge","Elapsed":149.06} +{"Time":"2023-05-31T19:51:34.533627432Z","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --- PASS: TestNetworkPlugins/group/flannel (157.99s)\n"} +{"Time":"2023-05-31T19:51:34.533631751Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" --- PASS: TestNetworkPlugins/group/flannel/Start (123.03s)\n"} +{"Time":"2023-05-31T19:51:34.533637127Z","Action":"pass","Test":"TestNetworkPlugins/group/flannel/Start","Elapsed":123.03} +{"Time":"2023-05-31T19:51:34.533640679Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Output":" --- PASS: TestNetworkPlugins/group/flannel/ControllerPod (5.02s)\n"} +{"Time":"2023-05-31T19:51:34.533644111Z","Action":"pass","Test":"TestNetworkPlugins/group/flannel/ControllerPod","Elapsed":5.02} +{"Time":"2023-05-31T19:51:34.533647125Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/flannel/KubeletFlags (0.20s)\n"} +{"Time":"2023-05-31T19:51:34.533650192Z","Action":"pass","Test":"TestNetworkPlugins/group/flannel/KubeletFlags","Elapsed":0.2} +{"Time":"2023-05-31T19:51:34.533652898Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/flannel/NetCatPod (9.40s)\n"} +{"Time":"2023-05-31T19:51:34.533656267Z","Action":"pass","Test":"TestNetworkPlugins/group/flannel/NetCatPod","Elapsed":9.4} +{"Time":"2023-05-31T19:51:34.533658916Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/DNS","Output":" --- PASS: TestNetworkPlugins/group/flannel/DNS (0.16s)\n"} +{"Time":"2023-05-31T19:51:34.533662089Z","Action":"pass","Test":"TestNetworkPlugins/group/flannel/DNS","Elapsed":0.16} +{"Time":"2023-05-31T19:51:34.53366552Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/Localhost","Output":" --- PASS: TestNetworkPlugins/group/flannel/Localhost (0.17s)\n"} +{"Time":"2023-05-31T19:51:34.533668594Z","Action":"pass","Test":"TestNetworkPlugins/group/flannel/Localhost","Elapsed":0.17} +{"Time":"2023-05-31T19:51:34.533671216Z","Action":"output","Test":"TestNetworkPlugins/group/flannel/HairPin","Output":" --- PASS: TestNetworkPlugins/group/flannel/HairPin (0.15s)\n"} +{"Time":"2023-05-31T19:51:34.533674387Z","Action":"pass","Test":"TestNetworkPlugins/group/flannel/HairPin","Elapsed":0.15} +{"Time":"2023-05-31T19:51:34.533676739Z","Action":"pass","Test":"TestNetworkPlugins/group/flannel","Elapsed":157.99} +{"Time":"2023-05-31T19:51:34.533679465Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni (136.00s)\n"} +{"Time":"2023-05-31T19:51:34.533682731Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/Start (107.53s)\n"} +{"Time":"2023-05-31T19:51:34.533686568Z","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Elapsed":107.53} +{"Time":"2023-05-31T19:51:34.533689518Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/KubeletFlags (0.22s)\n"} +{"Time":"2023-05-31T19:51:34.533693167Z","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/KubeletFlags","Elapsed":0.22} +{"Time":"2023-05-31T19:51:34.533706089Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/NetCatPod (11.47s)\n"} +{"Time":"2023-05-31T19:51:34.533710826Z","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/NetCatPod","Elapsed":11.47} +{"Time":"2023-05-31T19:51:34.533714216Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/DNS","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/DNS (0.22s)\n"} +{"Time":"2023-05-31T19:51:34.533719067Z","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/DNS","Elapsed":0.22} +{"Time":"2023-05-31T19:51:34.533723034Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/Localhost (0.21s)\n"} +{"Time":"2023-05-31T19:51:34.533729542Z","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/Localhost","Elapsed":0.21} +{"Time":"2023-05-31T19:51:34.533733503Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Output":" --- PASS: TestNetworkPlugins/group/enable-default-cni/HairPin (0.19s)\n"} +{"Time":"2023-05-31T19:52:03.615159604Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Output":"E0531 19:52:03.615103 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/auto-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:04.289848151Z","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Output":"E0531 19:52:04.289778 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/kindnet-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:08.167280385Z","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni/HairPin","Elapsed":0.19} +{"Time":"2023-05-31T19:52:08.167311786Z","Action":"pass","Test":"TestNetworkPlugins/group/enable-default-cni","Elapsed":136} +{"Time":"2023-05-31T19:52:08.167317703Z","Action":"pass","Test":"TestNetworkPlugins/group","Elapsed":12.25} +{"Time":"2023-05-31T19:52:08.167322374Z","Action":"pass","Test":"TestNetworkPlugins","Elapsed":1011.82} +{"Time":"2023-05-31T19:52:08.16732825Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Done: out/minikube-linux-amd64 start -p newest-cni-134774 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2: (1m4.457920783s)\n"} +{"Time":"2023-05-31T19:52:08.16733594Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/DeployApp"} +{"Time":"2023-05-31T19:52:08.167340392Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Output":"=== RUN TestStartStop/group/newest-cni/serial/DeployApp\n"} +{"Time":"2023-05-31T19:52:08.167356191Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T19:52:08.167360861Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/newest-cni/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T19:52:08.167365265Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-linux-amd64 addons enable metrics-server -p newest-cni-134774 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T19:52:09.24623519Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Done: out/minikube-linux-amd64 addons enable metrics-server -p newest-cni-134774 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain: (1.078781228s)\n"} +{"Time":"2023-05-31T19:52:09.246265421Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:211: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T19:52:09.246274719Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/Stop"} +{"Time":"2023-05-31T19:52:09.246277904Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":"=== RUN TestStartStop/group/newest-cni/serial/Stop\n"} +{"Time":"2023-05-31T19:52:09.24628708Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-linux-amd64 stop -p newest-cni-134774 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T19:52:15.147129866Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":"E0531 19:52:15.147056 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/functional-384583/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:26.362026587Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Done: out/minikube-linux-amd64 stop -p newest-cni-134774 --alsologtostderr -v=3: (17.115655111s)\n"} +{"Time":"2023-05-31T19:52:26.362052395Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T19:52:26.362055208Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T19:52:26.36210409Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p newest-cni-134774 -n newest-cni-134774\n"} +{"Time":"2023-05-31T19:52:26.418786525Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Host}} -p newest-cni-134774 -n newest-cni-134774: exit status 7 (56.583769ms)\n"} +{"Time":"2023-05-31T19:52:26.418811151Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:52:26.418815078Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:52:26.418817728Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:52:26.418820184Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T19:52:26.418822514Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:52:26.418824823Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T19:52:26.418827852Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-linux-amd64 addons enable dashboard -p newest-cni-134774 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T19:52:26.512173739Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/SecondStart"} +{"Time":"2023-05-31T19:52:26.512198479Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"=== RUN TestStartStop/group/newest-cni/serial/SecondStart\n"} +{"Time":"2023-05-31T19:52:26.512206694Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-linux-amd64 start -p newest-cni-134774 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T19:52:30.582095512Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:30.582034 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:30.587315175Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:30.587266 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:30.597576201Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:30.597532 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:30.617833593Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:30.617769 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:30.658070285Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:30.658007 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:30.738328974Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:30.738268 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:30.898619135Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:30.898540 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:31.21916966Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:31.219098 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:31.859724838Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:31.859650 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:33.140615721Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:33.140561 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:35.701084163Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:35.701014 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:40.822094031Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:40.822034 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:52:51.062399291Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"E0531 19:52:51.062329 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:53:08.946254031Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-linux-amd64 start -p no-preload-348437 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2: (9m57.119970394s)\n"} +{"Time":"2023-05-31T19:53:08.946354921Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p no-preload-348437 -n no-preload-348437\n"} +{"Time":"2023-05-31T19:53:09.193358738Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T19:53:09.193390697Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T19:53:09.194863616Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/no-preload/serial/UserAppExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T19:53:09.210425657Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-swnj4\" [4c43e3c6-4d39-482c-9c16-e39b864f5c33] Running\n"} +{"Time":"2023-05-31T19:53:11.542745321Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":"E0531 19:53:11.542668 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:53:14.215754525Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/no-preload/serial/UserAppExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.020859764s\n"} +{"Time":"2023-05-31T19:53:14.215800224Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T19:53:14.215804337Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T19:53:14.217113632Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/no-preload/serial/AddonExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T19:53:14.221037985Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-5c5cfc8747-swnj4\" [4c43e3c6-4d39-482c-9c16-e39b864f5c33] Running\n"} +{"Time":"2023-05-31T19:53:19.225390923Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/no-preload/serial/AddonExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.008277519s\n"} +{"Time":"2023-05-31T19:53:19.225415152Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context no-preload-348437 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T19:53:19.299370606Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T19:53:19.299390842Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/no-preload/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T19:53:19.299410635Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-linux-amd64 ssh -p no-preload-348437 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T19:53:19.524619057Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T19:53:19.524695036Z","Action":"run","Test":"TestStartStop/group/no-preload/serial/Pause"} +{"Time":"2023-05-31T19:53:19.524704357Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":"=== RUN TestStartStop/group/no-preload/serial/Pause\n"} +{"Time":"2023-05-31T19:53:19.524745455Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 pause -p no-preload-348437 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:53:20.185118446Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p no-preload-348437 -n no-preload-348437\n"} +{"Time":"2023-05-31T19:53:20.407617008Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.APIServer}} -p no-preload-348437 -n no-preload-348437: exit status 2 (222.421068ms)\n"} +{"Time":"2023-05-31T19:53:20.407647351Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:53:20.407655426Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:53:20.407669431Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T19:53:20.407672771Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:53:20.407675202Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:53:20.407677299Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:53:20.407683772Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p no-preload-348437 -n no-preload-348437\n"} +{"Time":"2023-05-31T19:53:20.62623139Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Kubelet}} -p no-preload-348437 -n no-preload-348437: exit status 2 (218.507314ms)\n"} +{"Time":"2023-05-31T19:53:20.626264823Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:53:20.626270578Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:53:20.626275556Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:53:20.626279181Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:53:20.626282453Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:53:20.626286104Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:53:20.626290721Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 unpause -p no-preload-348437 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:53:21.238711493Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p no-preload-348437 -n no-preload-348437\n"} +{"Time":"2023-05-31T19:53:21.544291703Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p no-preload-348437 -n no-preload-348437\n"} +{"Time":"2023-05-31T19:53:21.803175034Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-linux-amd64 delete -p no-preload-348437\n"} +{"Time":"2023-05-31T19:53:22.868118348Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-linux-amd64 delete -p no-preload-348437: (1.064868757s)\n"} +{"Time":"2023-05-31T19:53:22.868190922Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts no-preload-348437\n"} +{"Time":"2023-05-31T19:53:22.90847056Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts no-preload-348437: exit status 1 (40.269164ms)\n"} +{"Time":"2023-05-31T19:53:22.908497425Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T19:53:22.908502811Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:53:22.908507394Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T19:53:22.908511532Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T19:53:22.908515307Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:53:22.90851868Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:53:22.908521814Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \terror: context no-preload-348437 not found\n"} +{"Time":"2023-05-31T19:53:22.908538354Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T19:53:22.908542651Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:53:22.908602584Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T19:53:22.908618586Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":" helpers_test.go:175: Cleaning up \"no-preload-348437\" profile ...\n"} +{"Time":"2023-05-31T19:53:22.908622427Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p no-preload-348437\n"} +{"Time":"2023-05-31T19:53:28.544025951Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":"E0531 19:53:28.543936 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/calico-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:53:45.66074443Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":"E0531 19:53:45.660667 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/custom-flannel-509041/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:53:52.503354997Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":"E0531 19:53:52.503281 18150 cert_rotation.go:168] key failed with : open /home/jenkins/minikube-integration/16569-10887/.minikube/profiles/default-k8s-diff-port-809922/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T19:54:02.503314504Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-linux-amd64 start -p newest-cni-134774 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.27.2: (1m35.991015642s)\n"} +{"Time":"2023-05-31T19:54:02.503341886Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p newest-cni-134774 -n newest-cni-134774\n"} +{"Time":"2023-05-31T19:54:02.7430628Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T19:54:02.743087357Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T19:54:02.743121969Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:273: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T19:54:02.743151235Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T19:54:02.743155634Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T19:54:02.743165861Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:284: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T19:54:02.743181264Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T19:54:02.743184625Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/newest-cni/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T19:54:02.743241278Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-linux-amd64 ssh -p newest-cni-134774 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T19:54:02.953037907Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: kindest/kindnetd:v20230511-dc714da8\n"} +{"Time":"2023-05-31T19:54:02.953071277Z","Action":"run","Test":"TestStartStop/group/newest-cni/serial/Pause"} +{"Time":"2023-05-31T19:54:02.953075867Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":"=== RUN TestStartStop/group/newest-cni/serial/Pause\n"} +{"Time":"2023-05-31T19:54:02.953081563Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 pause -p newest-cni-134774 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:54:03.464708922Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p newest-cni-134774 -n newest-cni-134774\n"} +{"Time":"2023-05-31T19:54:03.681381429Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.APIServer}} -p newest-cni-134774 -n newest-cni-134774: exit status 2 (216.603833ms)\n"} +{"Time":"2023-05-31T19:54:03.681414006Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:54:03.681418974Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:54:03.681423191Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T19:54:03.681426063Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:54:03.681429371Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:54:03.681432981Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:54:03.681437869Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p newest-cni-134774 -n newest-cni-134774\n"} +{"Time":"2023-05-31T19:54:03.914086465Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Kubelet}} -p newest-cni-134774 -n newest-cni-134774: exit status 2 (232.622615ms)\n"} +{"Time":"2023-05-31T19:54:03.914123214Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:54:03.914128215Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:54:03.914132447Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:54:03.914136836Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:54:03.914140325Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:54:03.914143813Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:54:03.914149955Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 unpause -p newest-cni-134774 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:54:04.389786389Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p newest-cni-134774 -n newest-cni-134774\n"} +{"Time":"2023-05-31T19:54:04.660933831Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p newest-cni-134774 -n newest-cni-134774\n"} +{"Time":"2023-05-31T19:54:04.906531112Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-linux-amd64 delete -p newest-cni-134774\n"} +{"Time":"2023-05-31T19:54:06.027762949Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-linux-amd64 delete -p newest-cni-134774: (1.121221092s)\n"} +{"Time":"2023-05-31T19:54:06.027792726Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts newest-cni-134774\n"} +{"Time":"2023-05-31T19:54:06.067923625Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts newest-cni-134774: exit status 1 (40.080388ms)\n"} +{"Time":"2023-05-31T19:54:06.067947482Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T19:54:06.067953145Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:54:06.067957119Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T19:54:06.067961453Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T19:54:06.067965056Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:54:06.067968137Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:54:06.067971308Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \terror: context newest-cni-134774 not found\n"} +{"Time":"2023-05-31T19:54:06.067974564Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T19:54:06.067983804Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:54:06.067987877Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T19:54:06.067995494Z","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" helpers_test.go:175: Cleaning up \"newest-cni-134774\" profile ...\n"} +{"Time":"2023-05-31T19:54:06.067998948Z","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p newest-cni-134774\n"} +{"Time":"2023-05-31T19:54:18.867484978Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Done: out/minikube-linux-amd64 start -p old-k8s-version-709650 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=kvm2 --container-runtime=containerd --kubernetes-version=v1.16.0: (7m26.919988178s)\n"} +{"Time":"2023-05-31T19:54:18.867539611Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:262: (dbg) Run: out/minikube-linux-amd64 status --format={{.Host}} -p old-k8s-version-709650 -n old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:54:19.108209123Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T19:54:19.10823905Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T19:54:19.109007191Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T19:54:19.118986767Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-84b68f675b-vvpnh\" [f6b4e0e7-25a0-4f54-8006-fa6f99a617f8] Running\n"} +{"Time":"2023-05-31T19:54:24.12278663Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:274: (dbg) TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.013759283s\n"} +{"Time":"2023-05-31T19:54:24.122814804Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T19:54:24.12281838Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T19:54:24.123641397Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: waiting 9m0s for pods matching \"k8s-app=kubernetes-dashboard\" in namespace \"kubernetes-dashboard\" ...\n"} +{"Time":"2023-05-31T19:54:24.127024635Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:344: \"kubernetes-dashboard-84b68f675b-vvpnh\" [f6b4e0e7-25a0-4f54-8006-fa6f99a617f8] Running\n"} +{"Time":"2023-05-31T19:54:29.131206928Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:287: (dbg) TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop: k8s-app=kubernetes-dashboard healthy within 5.007541243s\n"} +{"Time":"2023-05-31T19:54:29.13124106Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context old-k8s-version-709650 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T19:54:29.196539389Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T19:54:29.196574501Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T19:54:29.196584144Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-linux-amd64 ssh -p old-k8s-version-709650 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T19:54:29.442217255Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: kindest/kindnetd:v20210326-1e038dc5\n"} +{"Time":"2023-05-31T19:54:29.44224832Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: Found non-minikube image: gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T19:54:29.442270325Z","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/Pause"} +{"Time":"2023-05-31T19:54:29.442273395Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/Pause\n"} +{"Time":"2023-05-31T19:54:29.442343796Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 pause -p old-k8s-version-709650 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:54:30.065670883Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p old-k8s-version-709650 -n old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:54:30.292706918Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.APIServer}} -p old-k8s-version-709650 -n old-k8s-version-709650: exit status 2 (226.943921ms)\n"} +{"Time":"2023-05-31T19:54:30.292738583Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:54:30.292743252Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:54:30.292747181Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tPaused\n"} +{"Time":"2023-05-31T19:54:30.292750419Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:54:30.292754069Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:54:30.29275786Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:54:30.292763956Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p old-k8s-version-709650 -n old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:54:30.524709203Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-linux-amd64 status --format={{.Kubelet}} -p old-k8s-version-709650 -n old-k8s-version-709650: exit status 2 (231.899916ms)\n"} +{"Time":"2023-05-31T19:54:30.524734018Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:54:30.524738911Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:54:30.524743294Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T19:54:30.524746667Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T19:54:30.524750546Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:54:30.524753393Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: status error: exit status 2 (may be ok)\n"} +{"Time":"2023-05-31T19:54:30.52475892Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 unpause -p old-k8s-version-709650 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T19:54:31.121247271Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.APIServer}} -p old-k8s-version-709650 -n old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:54:31.424429031Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-linux-amd64 status --format={{.Kubelet}} -p old-k8s-version-709650 -n old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:54:31.695561009Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-linux-amd64 delete -p old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:54:33.035811443Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:162: (dbg) Done: out/minikube-linux-amd64 delete -p old-k8s-version-709650: (1.340214305s)\n"} +{"Time":"2023-05-31T19:54:33.03583896Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:54:33.077000467Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts old-k8s-version-709650: exit status 1 (41.092005ms)\n"} +{"Time":"2023-05-31T19:54:33.077027074Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \n"} +{"Time":"2023-05-31T19:54:33.077031028Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T19:54:33.077033635Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T19:54:33.077036364Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \n"} +{"Time":"2023-05-31T19:54:33.077038564Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T19:54:33.077040669Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T19:54:33.077042832Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \terror: context old-k8s-version-709650 not found\n"} +{"Time":"2023-05-31T19:54:33.077044935Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \n"} +{"Time":"2023-05-31T19:54:33.077046966Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T19:54:33.077048999Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T19:54:33.077055378Z","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" helpers_test.go:175: Cleaning up \"old-k8s-version-709650\" profile ...\n"} +{"Time":"2023-05-31T19:54:33.077057737Z","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" helpers_test.go:178: (dbg) Run: out/minikube-linux-amd64 delete -p old-k8s-version-709650\n"} +{"Time":"2023-05-31T19:54:33.20763226Z","Action":"output","Test":"TestStartStop","Output":"--- PASS: TestStartStop (1178.24s)\n"} +{"Time":"2023-05-31T19:54:33.207662757Z","Action":"output","Test":"TestStartStop/group","Output":" --- PASS: TestStartStop/group (0.00s)\n"} +{"Time":"2023-05-31T19:54:33.207667903Z","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" --- SKIP: TestStartStop/group/disable-driver-mounts (0.15s)\n"} +{"Time":"2023-05-31T19:54:33.207672706Z","Action":"skip","Test":"TestStartStop/group/disable-driver-mounts","Elapsed":0.15} +{"Time":"2023-05-31T19:54:33.207680099Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port (586.22s)\n"} +{"Time":"2023-05-31T19:54:33.207685028Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial (586.08s)\n"} +{"Time":"2023-05-31T19:54:33.20768986Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/FirstStart (72.76s)\n"} +{"Time":"2023-05-31T19:54:33.207693997Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Elapsed":72.76} +{"Time":"2023-05-31T19:54:33.207697518Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/DeployApp (9.50s)\n"} +{"Time":"2023-05-31T19:54:33.207704046Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Elapsed":9.5} +{"Time":"2023-05-31T19:54:33.207710063Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive (1.01s)\n"} +{"Time":"2023-05-31T19:54:33.207714619Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Elapsed":1.01} +{"Time":"2023-05-31T19:54:33.207718211Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/Stop (92.02s)\n"} +{"Time":"2023-05-31T19:54:33.207731432Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Elapsed":92.02} +{"Time":"2023-05-31T19:54:33.207735171Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop (0.16s)\n"} +{"Time":"2023-05-31T19:54:33.20773965Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Elapsed":0.16} +{"Time":"2023-05-31T19:54:33.207743455Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/SecondStart (396.62s)\n"} +{"Time":"2023-05-31T19:54:33.207747463Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Elapsed":396.62} +{"Time":"2023-05-31T19:54:33.20775124Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop (5.02s)\n"} +{"Time":"2023-05-31T19:54:33.207755563Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Elapsed":5.02} +{"Time":"2023-05-31T19:54:33.207759031Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop (5.08s)\n"} +{"Time":"2023-05-31T19:54:33.207762983Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Elapsed":5.08} +{"Time":"2023-05-31T19:54:33.207768719Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages (0.23s)\n"} +{"Time":"2023-05-31T19:54:33.207771783Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Elapsed":0.23} +{"Time":"2023-05-31T19:54:33.207774063Z","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/Pause (2.44s)\n"} +{"Time":"2023-05-31T19:54:33.207776519Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Elapsed":2.44} +{"Time":"2023-05-31T19:54:33.207778413Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial","Elapsed":586.08} +{"Time":"2023-05-31T19:54:33.207780163Z","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port","Elapsed":586.22} +{"Time":"2023-05-31T19:54:33.207782106Z","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" --- PASS: TestStartStop/group/embed-certs (678.12s)\n"} +{"Time":"2023-05-31T19:54:33.207784765Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" --- PASS: TestStartStop/group/embed-certs/serial (677.98s)\n"} +{"Time":"2023-05-31T19:54:33.207787321Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" --- PASS: TestStartStop/group/embed-certs/serial/FirstStart (124.26s)\n"} +{"Time":"2023-05-31T19:54:33.207789697Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Elapsed":124.26} +{"Time":"2023-05-31T19:54:33.207791739Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" --- PASS: TestStartStop/group/embed-certs/serial/DeployApp (9.50s)\n"} +{"Time":"2023-05-31T19:54:33.20779415Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Elapsed":9.5} +{"Time":"2023-05-31T19:54:33.207796486Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/embed-certs/serial/EnableAddonWhileActive (1.07s)\n"} +{"Time":"2023-05-31T19:54:33.207798826Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Elapsed":1.07} +{"Time":"2023-05-31T19:54:33.207800821Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/Stop (91.74s)\n"} +{"Time":"2023-05-31T19:54:33.207803161Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/Stop","Elapsed":91.74} +{"Time":"2023-05-31T19:54:33.207805203Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/EnableAddonAfterStop (0.15s)\n"} +{"Time":"2023-05-31T19:54:33.207807542Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Elapsed":0.15} +{"Time":"2023-05-31T19:54:33.207809459Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" --- PASS: TestStartStop/group/embed-certs/serial/SecondStart (426.95s)\n"} +{"Time":"2023-05-31T19:54:33.207812873Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Elapsed":426.95} +{"Time":"2023-05-31T19:54:33.207816113Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop (15.02s)\n"} +{"Time":"2023-05-31T19:54:33.207820521Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Elapsed":15.02} +{"Time":"2023-05-31T19:54:33.207823815Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/AddonExistsAfterStop (5.08s)\n"} +{"Time":"2023-05-31T19:54:33.207827462Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Elapsed":5.08} +{"Time":"2023-05-31T19:54:33.207830701Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/embed-certs/serial/VerifyKubernetesImages (0.22s)\n"} +{"Time":"2023-05-31T19:54:33.207834788Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Elapsed":0.22} +{"Time":"2023-05-31T19:54:33.20783729Z","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" --- PASS: TestStartStop/group/embed-certs/serial/Pause (2.69s)\n"} +{"Time":"2023-05-31T19:54:33.207840945Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/Pause","Elapsed":2.69} +{"Time":"2023-05-31T19:54:33.207843567Z","Action":"pass","Test":"TestStartStop/group/embed-certs/serial","Elapsed":677.98} +{"Time":"2023-05-31T19:54:33.207846395Z","Action":"pass","Test":"TestStartStop/group/embed-certs","Elapsed":678.12} +{"Time":"2023-05-31T19:54:33.207849365Z","Action":"output","Test":"TestStartStop/group/no-preload","Output":" --- PASS: TestStartStop/group/no-preload (801.54s)\n"} +{"Time":"2023-05-31T19:54:33.207853023Z","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" --- PASS: TestStartStop/group/no-preload/serial (801.41s)\n"} +{"Time":"2023-05-31T19:54:33.207856702Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" --- PASS: TestStartStop/group/no-preload/serial/FirstStart (88.93s)\n"} +{"Time":"2023-05-31T19:54:33.207860778Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/FirstStart","Elapsed":88.93} +{"Time":"2023-05-31T19:54:33.207864264Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" --- PASS: TestStartStop/group/no-preload/serial/DeployApp (8.55s)\n"} +{"Time":"2023-05-31T19:54:33.207868201Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/DeployApp","Elapsed":8.55} +{"Time":"2023-05-31T19:54:33.207871634Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/no-preload/serial/EnableAddonWhileActive (1.00s)\n"} +{"Time":"2023-05-31T19:54:33.207875865Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Elapsed":1} +{"Time":"2023-05-31T19:54:33.207879557Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":" --- PASS: TestStartStop/group/no-preload/serial/Stop (91.71s)\n"} +{"Time":"2023-05-31T19:54:33.207883692Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/Stop","Elapsed":91.71} +{"Time":"2023-05-31T19:54:33.207887119Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/no-preload/serial/EnableAddonAfterStop (0.15s)\n"} +{"Time":"2023-05-31T19:54:33.207895235Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Elapsed":0.15} +{"Time":"2023-05-31T19:54:33.207900118Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" --- PASS: TestStartStop/group/no-preload/serial/SecondStart (597.37s)\n"} +{"Time":"2023-05-31T19:54:33.207903996Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/SecondStart","Elapsed":597.37} +{"Time":"2023-05-31T19:54:33.207907388Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/no-preload/serial/UserAppExistsAfterStop (5.02s)\n"} +{"Time":"2023-05-31T19:54:33.207911625Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Elapsed":5.02} +{"Time":"2023-05-31T19:54:33.207914806Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/no-preload/serial/AddonExistsAfterStop (5.08s)\n"} +{"Time":"2023-05-31T19:54:33.207919155Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Elapsed":5.08} +{"Time":"2023-05-31T19:54:33.207922573Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/no-preload/serial/VerifyKubernetesImages (0.23s)\n"} +{"Time":"2023-05-31T19:54:33.20792936Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Elapsed":0.23} +{"Time":"2023-05-31T19:54:33.207932847Z","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" --- PASS: TestStartStop/group/no-preload/serial/Pause (2.28s)\n"} +{"Time":"2023-05-31T19:54:33.207936581Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial/Pause","Elapsed":2.28} +{"Time":"2023-05-31T19:54:33.207939346Z","Action":"pass","Test":"TestStartStop/group/no-preload/serial","Elapsed":801.41} +{"Time":"2023-05-31T19:54:33.207942541Z","Action":"pass","Test":"TestStartStop/group/no-preload","Elapsed":801.54} +{"Time":"2023-05-31T19:54:33.207945739Z","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" --- PASS: TestStartStop/group/newest-cni (182.49s)\n"} +{"Time":"2023-05-31T19:54:33.207949729Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" --- PASS: TestStartStop/group/newest-cni/serial (182.36s)\n"} +{"Time":"2023-05-31T19:54:33.207953739Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" --- PASS: TestStartStop/group/newest-cni/serial/FirstStart (64.46s)\n"} +{"Time":"2023-05-31T19:54:33.207958101Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Elapsed":64.46} +{"Time":"2023-05-31T19:54:33.207961739Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Output":" --- PASS: TestStartStop/group/newest-cni/serial/DeployApp (0.00s)\n"} +{"Time":"2023-05-31T19:54:33.207965981Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Elapsed":0} +{"Time":"2023-05-31T19:54:33.207969026Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/newest-cni/serial/EnableAddonWhileActive (1.08s)\n"} +{"Time":"2023-05-31T19:54:33.207973029Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Elapsed":1.08} +{"Time":"2023-05-31T19:54:33.207980983Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/Stop (17.12s)\n"} +{"Time":"2023-05-31T19:54:33.207985054Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/Stop","Elapsed":17.12} +{"Time":"2023-05-31T19:54:33.207988396Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/EnableAddonAfterStop (0.15s)\n"} +{"Time":"2023-05-31T19:54:33.207993663Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Elapsed":0.15} +{"Time":"2023-05-31T19:54:33.207996943Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" --- PASS: TestStartStop/group/newest-cni/serial/SecondStart (96.23s)\n"} +{"Time":"2023-05-31T19:54:33.208000921Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Elapsed":96.23} +{"Time":"2023-05-31T19:54:33.208004192Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop (0.00s)\n"} +{"Time":"2023-05-31T19:54:33.208008203Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Elapsed":0} +{"Time":"2023-05-31T19:54:33.208011638Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/AddonExistsAfterStop (0.00s)\n"} +{"Time":"2023-05-31T19:54:33.208015262Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Elapsed":0} +{"Time":"2023-05-31T19:54:33.208018498Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/newest-cni/serial/VerifyKubernetesImages (0.21s)\n"} +{"Time":"2023-05-31T19:54:33.208022313Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Elapsed":0.21} +{"Time":"2023-05-31T19:54:33.208025628Z","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" --- PASS: TestStartStop/group/newest-cni/serial/Pause (1.95s)\n"} +{"Time":"2023-05-31T19:54:33.208029368Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/Pause","Elapsed":1.95} +{"Time":"2023-05-31T19:54:33.208032297Z","Action":"pass","Test":"TestStartStop/group/newest-cni/serial","Elapsed":182.36} +{"Time":"2023-05-31T19:54:33.208035097Z","Action":"pass","Test":"TestStartStop/group/newest-cni","Elapsed":182.49} +{"Time":"2023-05-31T19:54:33.20803845Z","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" --- PASS: TestStartStop/group/old-k8s-version (918.34s)\n"} +{"Time":"2023-05-31T19:54:33.208042509Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial (918.21s)\n"} +{"Time":"2023-05-31T19:54:33.208049679Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/FirstStart (344.74s)\n"} +{"Time":"2023-05-31T19:54:33.208053885Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Elapsed":344.74} +{"Time":"2023-05-31T19:54:33.208057082Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/DeployApp (9.41s)\n"} +{"Time":"2023-05-31T19:54:33.208060912Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Elapsed":9.41} +{"Time":"2023-05-31T19:54:33.20806413Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive (0.66s)\n"} +{"Time":"2023-05-31T19:54:33.208068287Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Elapsed":0.66} +{"Time":"2023-05-31T19:54:33.2080717Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/Stop (102.10s)\n"} +{"Time":"2023-05-31T19:54:33.20807761Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Elapsed":102.1} +{"Time":"2023-05-31T19:54:33.208081175Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop (0.16s)\n"} +{"Time":"2023-05-31T19:54:33.208087056Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Elapsed":0.16} +{"Time":"2023-05-31T19:54:33.208090402Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/SecondStart (447.16s)\n"} +{"Time":"2023-05-31T19:54:33.208094222Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Elapsed":447.16} +{"Time":"2023-05-31T19:54:33.208097447Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop (5.01s)\n"} +{"Time":"2023-05-31T19:54:33.208101894Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Elapsed":5.01} +{"Time":"2023-05-31T19:54:33.208108074Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop (5.07s)\n"} +{"Time":"2023-05-31T19:54:33.208112219Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Elapsed":5.07} +{"Time":"2023-05-31T19:54:33.20811548Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages (0.25s)\n"} +{"Time":"2023-05-31T19:54:33.208119281Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Elapsed":0.25} +{"Time":"2023-05-31T19:54:33.208126142Z","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/Pause (2.25s)\n"} +{"Time":"2023-05-31T19:54:33.208129466Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Elapsed":2.25} +{"Time":"2023-05-31T19:54:33.208132177Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial","Elapsed":918.21} +{"Time":"2023-05-31T19:54:33.208135404Z","Action":"pass","Test":"TestStartStop/group/old-k8s-version","Elapsed":918.34} +{"Time":"2023-05-31T19:54:33.208138085Z","Action":"pass","Test":"TestStartStop/group","Elapsed":0} +{"Time":"2023-05-31T19:54:33.208141182Z","Action":"pass","Test":"TestStartStop","Elapsed":1178.24} +{"Time":"2023-05-31T19:54:33.208144429Z","Action":"output","Output":"FAIL\n"} +{"Time":"2023-05-31T19:54:33.208147817Z","Action":"output","Output":"Tests completed in 1h11m5.491203124s (result code 1)\n"} +{"Time":"2023-05-31T19:54:33.211351104Z","Action":"fail","Elapsed":4265.53} diff --git a/testdata/testdb/QEMU_macOS.json b/testdata/testdb/QEMU_macOS.json new file mode 100644 index 0000000..83cccfd --- /dev/null +++ b/testdata/testdb/QEMU_macOS.json @@ -0,0 +1,17389 @@ +{"Time":"2023-05-31T11:42:45.268538-07:00","Action":"start"} +{"Time":"2023-05-31T11:42:45.836723-07:00","Action":"output","Output":"Found 8 cores, limiting parallelism with --test.parallel=2\n"} +{"Time":"2023-05-31T11:42:45.836855-07:00","Action":"run","Test":"TestDownloadOnly"} +{"Time":"2023-05-31T11:42:45.836858-07:00","Action":"output","Test":"TestDownloadOnly","Output":"=== RUN TestDownloadOnly\n"} +{"Time":"2023-05-31T11:42:45.836913-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0"} +{"Time":"2023-05-31T11:42:45.836918-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":"=== RUN TestDownloadOnly/v1.16.0\n"} +{"Time":"2023-05-31T11:42:45.836921-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/json-events"} +{"Time":"2023-05-31T11:42:45.836925-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":"=== RUN TestDownloadOnly/v1.16.0/json-events\n"} +{"Time":"2023-05-31T11:42:45.83711-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" aaa_download_only_test.go:69: (dbg) Run: out/minikube-darwin-arm64 start -o=json --download-only -p download-only-883000 --force --alsologtostderr --kubernetes-version=v1.16.0 --container-runtime=docker --driver=qemu2 \n"} +{"Time":"2023-05-31T11:43:10.615483-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" aaa_download_only_test.go:69: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -o=json --download-only -p download-only-883000 --force --alsologtostderr --kubernetes-version=v1.16.0 --container-runtime=docker --driver=qemu2 : exit status 40 (24.777810834s)\n"} +{"Time":"2023-05-31T11:43:10.615554-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \n"} +{"Time":"2023-05-31T11:43:10.615561-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:43:10.615567-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"a86028a7-ce51-422c-8929-63508b2ffc41\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"0\",\"message\":\"[download-only-883000] minikube v1.30.1 on Darwin 13.4 (arm64)\",\"name\":\"Initial Minikube Setup\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T11:43:10.615577-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"8d63e94b-843e-48f0-8b7a-51d9eabc5b1f\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_LOCATION=16569\"}}\n"} +{"Time":"2023-05-31T11:43:10.615586-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"acfe8244-109b-494e-930e-027fd16fbca4\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\"}}\n"} +{"Time":"2023-05-31T11:43:10.615598-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"57a9e869-4e49-43b0-8cbe-b4f87cc200ea\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_BIN=out/minikube-darwin-arm64\"}}\n"} +{"Time":"2023-05-31T11:43:10.615605-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"fa2ae1ef-e9fc-4a1a-a26d-afbe217ba8cd\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\"}}\n"} +{"Time":"2023-05-31T11:43:10.615611-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"dbbc7c89-63e4-475a-80bf-826c0fb0bd1c\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\"}}\n"} +{"Time":"2023-05-31T11:43:10.615617-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"2536fe35-c010-49eb-bb75-443e412c71c4\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.warning\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"minikube skips various validations when --force is supplied; this may lead to unexpected behavior\"}}\n"} +{"Time":"2023-05-31T11:43:10.615627-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"b2aea36d-8a8a-4666-813a-fa37ddeec475\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"1\",\"message\":\"Using the qemu2 driver based on user configuration\",\"name\":\"Selecting Driver\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T11:43:10.615634-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"f2ded2e3-6f53-4036-ae1d-923cc778b738\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"Automatically selected the socket_vmnet network\"}}\n"} +{"Time":"2023-05-31T11:43:10.61564-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"7893cb5d-9aa6-40a7-9c30-0d9b3273b7be\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"1\",\"message\":\"Downloading VM boot image ...\",\"name\":\"Selecting Driver\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T11:43:10.615646-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"ead6f7ca-e37c-49de-bf0b-ddafedcb25ea\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"3\",\"message\":\"Starting control plane node download-only-883000 in cluster download-only-883000\",\"name\":\"Starting Node\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T11:43:10.615653-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"a51b9a80-4fbd-4d83-8e97-2e30738079a0\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"3\",\"message\":\"Downloading Kubernetes v1.16.0 preload ...\",\"name\":\"Starting Node\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T11:43:10.615666-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"ba25cb4c-65ab-4550-913d-6216cb3735ff\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.error\",\"datacontenttype\":\"application/json\",\"data\":{\"advice\":\"\",\"exitcode\":\"40\",\"issues\":\"\",\"message\":\"Failed to cache kubectl: download failed: https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl.sha1: getter: \\u0026{Ctx:context.Background Src:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl.sha1 Dst:/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/darwin/arm64/v1.16.0/kubectl.download Pwd: Mode:2 Umask:---------- Detectors:[0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8] Decompressors:map[bz2:0x14000057038 gz:0x14000057110 tar:0x14000057040 tar.bz2:0x14000057050 tar.gz:0x140000570a0 tar.xz:0x140000570c0 tar.zst:0x140000570e0 tbz2:0x14000057050 tgz:0x140000"} +{"Time":"2023-05-31T11:43:10.615686-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":"570a0 txz:0x140000570c0 tzst:0x140000570e0 xz:0x14000057118 zip:0x14000057120 zst:0x14000057130] Getters:map[file:0x14000130b80 http:0x140009c0a00 https:0x140009c0a50] Dir:false ProgressListener:\\u003cnil\\u003e Insecure:false DisableSymlinks:false Options:[]}: invalid checksum: Error downloading checksum file: bad response code: 404\",\"name\":\"INET_CACHE_KUBECTL\",\"url\":\"\"}}\n"} +{"Time":"2023-05-31T11:43:10.615694-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{\"specversion\":\"1.0\",\"id\":\"819bbc27-dde1-46f7-91f0-ab2453081105\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.error\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"╭───────────────────────────────────────────────────────────────────────────────────────────╮\\n│ │\\n│ If the above advice does not help, please let us know: │\\n│ https://github.com/kubernetes/minikube/issues/new/choose │\\n│ │\\n│ Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\\n│ "} +{"Time":"2023-05-31T11:43:10.615704-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" │\\n╰───────────────────────────────────────────────────────────────────────────────────────────╯\"}}\n"} +{"Time":"2023-05-31T11:43:10.615709-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \n"} +{"Time":"2023-05-31T11:43:10.615713-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:43:10.615717-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:43:10.61572-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.864628 1479 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:43:10.615734-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.864755 1479 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:10.615741-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.864758 1479 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:43:10.615745-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.864761 1479 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:10.615749-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.864834 1479 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:43:10.615754-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tW0531 11:42:45.864890 1479 root.go:312] Error reading config file at /Users/jenkins/minikube-integration/16569-1035/.minikube/config/config.json: open /Users/jenkins/minikube-integration/16569-1035/.minikube/config/config.json: no such file or directory\n"} +{"Time":"2023-05-31T11:43:10.61576-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.865981 1479 out.go:303] Setting JSON to true\n"} +{"Time":"2023-05-31T11:43:10.615771-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.894902 1479 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":736,\"bootTime\":1685557829,\"procs\":407,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:43:10.615781-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tW0531 11:42:45.894958 1479 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:43:10.615785-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.903674 1479 out.go:97] [download-only-883000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:43:10.61579-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tW0531 11:42:45.903803 1479 preload.go:295] Failed to list preload files: open /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball: no such file or directory\n"} +{"Time":"2023-05-31T11:43:10.6158-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.910506 1479 out.go:169] MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:43:10.615804-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.903828 1479 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:43:10.615808-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.925030 1479 out.go:169] KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:43:10.615812-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.931864 1479 out.go:169] MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:43:10.615818-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.938874 1479 out.go:169] MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:43:10.615822-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.945757 1479 out.go:169] MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:43:10.615827-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tW0531 11:42:45.959597 1479 out.go:272] minikube skips various validations when --force is supplied; this may lead to unexpected behavior\n"} +{"Time":"2023-05-31T11:43:10.615837-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.959877 1479 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:43:10.615841-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.996653 1479 out.go:97] Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:43:10.615845-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.996676 1479 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:43:10.61585-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.996680 1479 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:43:10.615855-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:45.996753 1479 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:43:10.615859-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.015305 1479 out.go:169] Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:43:10.615864-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.026376 1479 start_flags.go:382] Using suggested 4000MB memory alloc based on sys=16384MB, container=0MB\n"} +{"Time":"2023-05-31T11:43:10.615868-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.026466 1479 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T11:43:10.615873-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.026484 1479 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:43:10.615877-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.026508 1479 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T11:43:10.615968-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.026512 1479 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:43:10.616051-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t{Name:download-only-883000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:download-only-883000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRun"} +{"Time":"2023-05-31T11:43:10.616064-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":"time:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:43:10.616072-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.026680 1479 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:43:10.616076-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.036272 1479 out.go:97] Downloading VM boot image ...\n"} +{"Time":"2023-05-31T11:43:10.616081-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:46.036306 1479 download.go:107] Downloading: https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso?checksum=file:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso.sha256 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso\n"} +{"Time":"2023-05-31T11:43:10.616086-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:59.456116 1479 out.go:97] Starting control plane node download-only-883000 in cluster download-only-883000\n"} +{"Time":"2023-05-31T11:43:10.616091-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:59.456148 1479 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:10.616095-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:59.513577 1479 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.16.0/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:10.616101-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:59.513623 1479 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:43:10.616105-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:59.513795 1479 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:10.616108-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:59.518901 1479 out.go:97] Downloading Kubernetes v1.16.0 preload ...\n"} +{"Time":"2023-05-31T11:43:10.616113-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:59.518907 1479 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:10.616117-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:42:59.653332 1479 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.16.0/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4?checksum=md5:a000baffb0664b293d602f95ed25caa6 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:10.616136-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:09.475994 1479 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:10.616141-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:09.476138 1479 preload.go:256] verifying checksum of /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:10.616146-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:10.128767 1479 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T11:43:10.61615-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:10.128940 1479 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/download-only-883000/config.json ...\n"} +{"Time":"2023-05-31T11:43:10.616155-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:10.128958 1479 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/download-only-883000/config.json: {Name:mkb379b1b60f82f079305edc44cc631f1f2aca8c Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:43:10.61616-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:10.129203 1479 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:10.616164-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:10.129387 1479 download.go:107] Downloading: https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl.sha1 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/darwin/arm64/v1.16.0/kubectl\n"} +{"Time":"2023-05-31T11:43:10.616169-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:10.581814 1479 out.go:169] \n"} +{"Time":"2023-05-31T11:43:10.616176-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tW0531 11:43:10.584777 1479 out_reason.go:110] Failed to cache kubectl: download failed: https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl.sha1: getter: \u0026{Ctx:context.Background Src:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl.sha1 Dst:/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/darwin/arm64/v1.16.0/kubectl.download Pwd: Mode:2 Umask:---------- Detectors:[0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8] Decompressors:map[bz2:0x14000057038 gz:0x14000057110 tar:0x14000057040 tar.bz2:0x14000057050 tar.gz:0x140000570a0 tar.xz:0x140000570c0 tar.zst:0x140000570e0 tbz2:0x14000057050 tgz:0x140000570a0 txz:0x140000570c0 tzst:0x140000570e0 xz:0x14000057118 zip:0x14000057120 zst:0x14000057130] Getters:map[file:0x14000130b80 http:0x140009c0a00 https:0x140009c0a50] Dir:false ProgressListener"} +{"Time":"2023-05-31T11:43:10.616182-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":":\u003cnil\u003e Insecure:false DisableSymlinks:false Options:[]}: invalid checksum: Error downloading checksum file: bad response code: 404\n"} +{"Time":"2023-05-31T11:43:10.616186-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tW0531 11:43:10.584802 1479 out_reason.go:110] \n"} +{"Time":"2023-05-31T11:43:10.616191-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tW0531 11:43:10.590865 1479 out.go:229] ╭───────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:43:10.616198-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:43:10.616202-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t│ If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:43:10.616206-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:43:10.61621-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:43:10.616214-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t│ Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:43:10.616219-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:43:10.616223-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \t╰───────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:43:10.616228-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \tI0531 11:43:10.593717 1479 out.go:169] \n"} +{"Time":"2023-05-31T11:43:10.616232-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" \n"} +{"Time":"2023-05-31T11:43:10.616235-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:43:10.61624-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" aaa_download_only_test.go:71: failed to download only. args: [\"start\" \"-o=json\" \"--download-only\" \"-p\" \"download-only-883000\" \"--force\" \"--alsologtostderr\" \"--kubernetes-version=v1.16.0\" \"--container-runtime=docker\" \"--driver=qemu2\" \"\"] exit status 40\n"} +{"Time":"2023-05-31T11:43:10.616251-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/preload-exists"} +{"Time":"2023-05-31T11:43:10.616256-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/preload-exists","Output":"=== RUN TestDownloadOnly/v1.16.0/preload-exists\n"} +{"Time":"2023-05-31T11:43:10.62057-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/cached-images"} +{"Time":"2023-05-31T11:43:10.620586-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":"=== RUN TestDownloadOnly/v1.16.0/cached-images\n"} +{"Time":"2023-05-31T11:43:10.620607-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":" aaa_download_only_test.go:117: Preload exists, images won't be cached\n"} +{"Time":"2023-05-31T11:43:10.620676-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/binaries"} +{"Time":"2023-05-31T11:43:10.620683-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":"=== RUN TestDownloadOnly/v1.16.0/binaries\n"} +{"Time":"2023-05-31T11:43:10.620689-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":" aaa_download_only_test.go:136: Preload exists, binaries are present within.\n"} +{"Time":"2023-05-31T11:43:10.620713-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/kubectl"} +{"Time":"2023-05-31T11:43:10.620719-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/kubectl","Output":"=== RUN TestDownloadOnly/v1.16.0/kubectl\n"} +{"Time":"2023-05-31T11:43:10.620768-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/kubectl","Output":" aaa_download_only_test.go:160: expected the file for binary exist at \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/darwin/arm64/v1.16.0/kubectl\" but got error stat /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/darwin/arm64/v1.16.0/kubectl: no such file or directory\n"} +{"Time":"2023-05-31T11:43:10.620796-07:00","Action":"run","Test":"TestDownloadOnly/v1.16.0/LogsDuration"} +{"Time":"2023-05-31T11:43:10.620802-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"=== RUN TestDownloadOnly/v1.16.0/LogsDuration\n"} +{"Time":"2023-05-31T11:43:10.620927-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Run: out/minikube-darwin-arm64 logs -p download-only-883000\n"} +{"Time":"2023-05-31T11:43:10.715488-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Non-zero exit: out/minikube-darwin-arm64 logs -p download-only-883000: exit status 85 (94.226375ms)\n"} +{"Time":"2023-05-31T11:43:10.715503-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T11:43:10.715507-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:43:10.715509-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:10.715511-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T11:43:10.715514-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* |---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:10.715516-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T11:43:10.715519-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:10.715521-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-883000 | jenkins | v1.30.1 | 31 May 23 11:42 PDT | |\n"} +{"Time":"2023-05-31T11:43:10.715523-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | -p download-only-883000 | | | | | |\n"} +{"Time":"2023-05-31T11:43:10.715525-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:43:10.715527-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T11:43:10.715529-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --container-runtime=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:10.715532-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:43:10.715534-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:10.715536-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T11:43:10.715538-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:10.71554-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T11:43:10.715542-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* Log file created at: 2023/05/31 11:42:45\n"} +{"Time":"2023-05-31T11:43:10.715544-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tRunning on machine: MacOS-M1-Agent-1\n"} +{"Time":"2023-05-31T11:43:10.715546-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tBinary: Built with gc go1.20.4 for darwin/arm64\n"} +{"Time":"2023-05-31T11:43:10.715548-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T11:43:10.71555-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.864628 1479 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:43:10.715552-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.864755 1479 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:10.715554-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.864758 1479 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:43:10.715556-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.864761 1479 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:10.715558-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.864834 1479 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:43:10.715561-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:42:45.864890 1479 root.go:312] Error reading config file at /Users/jenkins/minikube-integration/16569-1035/.minikube/config/config.json: open /Users/jenkins/minikube-integration/16569-1035/.minikube/config/config.json: no such file or directory\n"} +{"Time":"2023-05-31T11:43:10.715564-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.865981 1479 out.go:303] Setting JSON to true\n"} +{"Time":"2023-05-31T11:43:10.715566-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.894902 1479 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":736,\"bootTime\":1685557829,\"procs\":407,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:43:10.71557-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:42:45.894958 1479 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:43:10.715572-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.903674 1479 out.go:97] [download-only-883000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:43:10.715575-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:42:45.903803 1479 preload.go:295] Failed to list preload files: open /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball: no such file or directory\n"} +{"Time":"2023-05-31T11:43:10.715587-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.910506 1479 out.go:169] MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:43:10.71559-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.903828 1479 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:43:10.715592-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.925030 1479 out.go:169] KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:43:10.715594-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.931864 1479 out.go:169] MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:43:10.715596-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.938874 1479 out.go:169] MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:43:10.715598-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.945757 1479 out.go:169] MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:43:10.715601-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:42:45.959597 1479 out.go:272] minikube skips various validations when --force is supplied; this may lead to unexpected behavior\n"} +{"Time":"2023-05-31T11:43:10.715604-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.959877 1479 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:43:10.715606-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.996653 1479 out.go:97] Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:43:10.715608-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.996676 1479 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:43:10.715611-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.996680 1479 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:43:10.715613-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:45.996753 1479 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:43:10.715615-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.015305 1479 out.go:169] Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:43:10.715646-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.026376 1479 start_flags.go:382] Using suggested 4000MB memory alloc based on sys=16384MB, container=0MB\n"} +{"Time":"2023-05-31T11:43:10.715649-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.026466 1479 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T11:43:10.715651-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.026484 1479 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:43:10.715655-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.026508 1479 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T11:43:10.715657-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.026512 1479 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:43:10.715661-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t{Name:download-only-883000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:download-only-883000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRun"} +{"Time":"2023-05-31T11:43:10.715666-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":"time:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:43:10.71567-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.026680 1479 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:43:10.715674-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.036272 1479 out.go:97] Downloading VM boot image ...\n"} +{"Time":"2023-05-31T11:43:10.715677-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:46.036306 1479 download.go:107] Downloading: https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso?checksum=file:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso.sha256 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso\n"} +{"Time":"2023-05-31T11:43:10.715684-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.456116 1479 out.go:97] Starting control plane node download-only-883000 in cluster download-only-883000\n"} +{"Time":"2023-05-31T11:43:10.715689-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.456148 1479 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:10.715691-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.513577 1479 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.16.0/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:10.715694-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.513623 1479 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:43:10.715696-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.513795 1479 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:10.715698-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.518901 1479 out.go:97] Downloading Kubernetes v1.16.0 preload ...\n"} +{"Time":"2023-05-31T11:43:10.715701-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.518907 1479 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:10.715704-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:42:59.653332 1479 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.16.0/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4?checksum=md5:a000baffb0664b293d602f95ed25caa6 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:10.715706-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:09.475994 1479 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:10.715709-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:09.476138 1479 preload.go:256] verifying checksum of /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:10.715711-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:10.128767 1479 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T11:43:10.715714-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:10.128940 1479 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/download-only-883000/config.json ...\n"} +{"Time":"2023-05-31T11:43:10.715716-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:10.128958 1479 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/download-only-883000/config.json: {Name:mkb379b1b60f82f079305edc44cc631f1f2aca8c Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:43:10.715719-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:10.129203 1479 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T11:43:10.715725-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:10.129387 1479 download.go:107] Downloading: https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl.sha1 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/darwin/arm64/v1.16.0/kubectl\n"} +{"Time":"2023-05-31T11:43:10.715728-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:10.581814 1479 out.go:169] \n"} +{"Time":"2023-05-31T11:43:10.715732-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:43:10.584777 1479 out_reason.go:110] Failed to cache kubectl: download failed: https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl.sha1: getter: \u0026{Ctx:context.Background Src:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.16.0/bin/darwin/arm64/kubectl.sha1 Dst:/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/darwin/arm64/v1.16.0/kubectl.download Pwd: Mode:2 Umask:---------- Detectors:[0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8 0x1042b33b8] Decompressors:map[bz2:0x14000057038 gz:0x14000057110 tar:0x14000057040 tar.bz2:0x14000057050 tar.gz:0x140000570a0 tar.xz:0x140000570c0 tar.zst:0x140000570e0 tbz2:0x14000057050 tgz:0x140000570a0 txz:0x140000570c0 tzst:0x140000570e0 xz:0x14000057118 zip:0x14000057120 zst:0x14000057130] Getters:map[file:0x14000130b80 http:0x140009c0a00 https:0x140009c0a50] Dir:false ProgressListener"} +{"Time":"2023-05-31T11:43:10.715735-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":":\u003cnil\u003e Insecure:false DisableSymlinks:false Options:[]}: invalid checksum: Error downloading checksum file: bad response code: 404\n"} +{"Time":"2023-05-31T11:43:10.715738-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:43:10.584802 1479 out_reason.go:110] \n"} +{"Time":"2023-05-31T11:43:10.715741-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tW0531 11:43:10.590865 1479 out.go:229] ╭───────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:43:10.715744-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:43:10.715746-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t│ If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:43:10.715749-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:43:10.715751-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:43:10.715753-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t│ Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:43:10.715755-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:43:10.715758-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t╰───────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:43:10.71576-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \tI0531 11:43:10.593717 1479 out.go:169] \n"} +{"Time":"2023-05-31T11:43:10.715763-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T11:43:10.715765-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:10.715767-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t* The control plane node \"\" does not exist.\n"} +{"Time":"2023-05-31T11:43:10.715769-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \t To start a cluster, run: \"minikube start -p download-only-883000\"\n"} +{"Time":"2023-05-31T11:43:10.715771-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T11:43:10.715773-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:43:10.715775-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" aaa_download_only_test.go:170: minikube logs failed with error: exit status 85\n"} +{"Time":"2023-05-31T11:43:10.715784-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:43:10.715787-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p download-only-883000 -n download-only-883000\n"} +{"Time":"2023-05-31T11:43:10.749988-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p download-only-883000 -n download-only-883000: exit status 7 (34.330458ms)\n"} +{"Time":"2023-05-31T11:43:10.750005-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" \n"} +{"Time":"2023-05-31T11:43:10.750008-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:43:10.750009-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" \tNonexistent\n"} +{"Time":"2023-05-31T11:43:10.750011-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" \n"} +{"Time":"2023-05-31T11:43:10.750012-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:43:10.750014-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:43:10.750015-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" helpers_test.go:241: \"download-only-883000\" host is not running, skipping log retrieval (state=\"Nonexistent\")\n"} +{"Time":"2023-05-31T11:43:10.750019-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2"} +{"Time":"2023-05-31T11:43:10.75002-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2","Output":"=== RUN TestDownloadOnly/v1.27.2\n"} +{"Time":"2023-05-31T11:43:10.750028-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/json-events"} +{"Time":"2023-05-31T11:43:10.75003-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":"=== RUN TestDownloadOnly/v1.27.2/json-events\n"} +{"Time":"2023-05-31T11:43:10.750055-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" aaa_download_only_test.go:69: (dbg) Run: out/minikube-darwin-arm64 start -o=json --download-only -p download-only-883000 --force --alsologtostderr --kubernetes-version=v1.27.2 --container-runtime=docker --driver=qemu2 \n"} +{"Time":"2023-05-31T11:43:24.170827-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" aaa_download_only_test.go:69: (dbg) Done: out/minikube-darwin-arm64 start -o=json --download-only -p download-only-883000 --force --alsologtostderr --kubernetes-version=v1.27.2 --container-runtime=docker --driver=qemu2 : (13.420956s)\n"} +{"Time":"2023-05-31T11:43:24.170964-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/preload-exists"} +{"Time":"2023-05-31T11:43:24.170971-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/preload-exists","Output":"=== RUN TestDownloadOnly/v1.27.2/preload-exists\n"} +{"Time":"2023-05-31T11:43:24.171144-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/cached-images"} +{"Time":"2023-05-31T11:43:24.171155-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":"=== RUN TestDownloadOnly/v1.27.2/cached-images\n"} +{"Time":"2023-05-31T11:43:24.171158-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":" aaa_download_only_test.go:117: Preload exists, images won't be cached\n"} +{"Time":"2023-05-31T11:43:24.171161-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/binaries"} +{"Time":"2023-05-31T11:43:24.171163-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":"=== RUN TestDownloadOnly/v1.27.2/binaries\n"} +{"Time":"2023-05-31T11:43:24.171165-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":" aaa_download_only_test.go:136: Preload exists, binaries are present within.\n"} +{"Time":"2023-05-31T11:43:24.171168-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/kubectl"} +{"Time":"2023-05-31T11:43:24.171169-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/kubectl","Output":"=== RUN TestDownloadOnly/v1.27.2/kubectl\n"} +{"Time":"2023-05-31T11:43:24.171194-07:00","Action":"run","Test":"TestDownloadOnly/v1.27.2/LogsDuration"} +{"Time":"2023-05-31T11:43:24.171198-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"=== RUN TestDownloadOnly/v1.27.2/LogsDuration\n"} +{"Time":"2023-05-31T11:43:24.171215-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Run: out/minikube-darwin-arm64 logs -p download-only-883000\n"} +{"Time":"2023-05-31T11:43:24.246156-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:169: (dbg) Non-zero exit: out/minikube-darwin-arm64 logs -p download-only-883000: exit status 85 (74.369875ms)\n"} +{"Time":"2023-05-31T11:43:24.246175-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T11:43:24.246177-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:43:24.246179-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:24.24618-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T11:43:24.246183-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* |---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:24.246185-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T11:43:24.246187-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:24.246188-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-883000 | jenkins | v1.30.1 | 31 May 23 11:42 PDT | |\n"} +{"Time":"2023-05-31T11:43:24.24619-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | -p download-only-883000 | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246202-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246204-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246206-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --container-runtime=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246208-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246209-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| start | -o=json --download-only | download-only-883000 | jenkins | v1.30.1 | 31 May 23 11:43 PDT | |\n"} +{"Time":"2023-05-31T11:43:24.246211-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | -p download-only-883000 | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246213-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --force --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246214-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --kubernetes-version=v1.27.2 | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246216-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --container-runtime=docker | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246218-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:43:24.246219-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t|---------|--------------------------------|----------------------|---------|---------|---------------------|----------|\n"} +{"Time":"2023-05-31T11:43:24.246221-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T11:43:24.246222-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:24.246223-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T11:43:24.246225-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* Log file created at: 2023/05/31 11:43:10\n"} +{"Time":"2023-05-31T11:43:24.246229-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tRunning on machine: MacOS-M1-Agent-1\n"} +{"Time":"2023-05-31T11:43:24.246231-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tBinary: Built with gc go1.20.4 for darwin/arm64\n"} +{"Time":"2023-05-31T11:43:24.246233-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T11:43:24.246234-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.776407 1490 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:43:24.246236-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.776519 1490 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:24.246238-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.776521 1490 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:43:24.246239-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.776524 1490 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:43:24.246241-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.776591 1490 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:43:24.246243-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:10.776647 1490 root.go:312] Error reading config file at /Users/jenkins/minikube-integration/16569-1035/.minikube/config/config.json: open /Users/jenkins/minikube-integration/16569-1035/.minikube/config/config.json: no such file or directory\n"} +{"Time":"2023-05-31T11:43:24.246245-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.777639 1490 out.go:303] Setting JSON to true\n"} +{"Time":"2023-05-31T11:43:24.246247-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.792754 1490 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":761,\"bootTime\":1685557829,\"procs\":409,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:43:24.24625-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:10.792819 1490 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:43:24.246251-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.796476 1490 out.go:97] [download-only-883000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:43:24.246253-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.800459 1490 out.go:169] MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:43:24.246255-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.796576 1490 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:43:24.246257-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.806473 1490 out.go:169] KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:43:24.246258-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.809492 1490 out.go:169] MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:43:24.24626-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.812470 1490 out.go:169] MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:43:24.246262-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.815470 1490 out.go:169] MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:43:24.246263-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:10.821450 1490 out.go:272] minikube skips various validations when --force is supplied; this may lead to unexpected behavior\n"} +{"Time":"2023-05-31T11:43:24.246265-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.821730 1490 config.go:182] Loaded profile config \"download-only-883000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T11:43:24.246267-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:10.821754 1490 start.go:783] api.Load failed for download-only-883000: filestore \"download-only-883000\": Docker machine \"download-only-883000\" does not exist. Use \"docker-machine ls\" to list machines. Use \"docker-machine create\" to add a new one.\n"} +{"Time":"2023-05-31T11:43:24.24627-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.821793 1490 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:43:24.246271-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tW0531 11:43:10.821805 1490 start.go:783] api.Load failed for download-only-883000: filestore \"download-only-883000\": Docker machine \"download-only-883000\" does not exist. Use \"docker-machine ls\" to list machines. Use \"docker-machine create\" to add a new one.\n"} +{"Time":"2023-05-31T11:43:24.246273-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.825400 1490 out.go:97] Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T11:43:24.246275-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.825409 1490 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:43:24.246279-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.825411 1490 start.go:875] validating driver \"qemu2\" against \u0026{Name:download-only-883000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesC"} +{"Time":"2023-05-31T11:43:24.246287-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"onfig:{KubernetesVersion:v1.16.0 ClusterName:download-only-883000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker Binar"} +{"Time":"2023-05-31T11:43:24.24629-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"yMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:43:24.246291-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.827278 1490 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:43:24.246294-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.827295 1490 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:43:24.246296-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.827301 1490 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:43:24.246299-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t{Name:download-only-883000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:download-only-883000 Namespace:def"} +{"Time":"2023-05-31T11:43:24.246308-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":"ault APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath"} +{"Time":"2023-05-31T11:43:24.246311-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":": SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:43:24.246313-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.827387 1490 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:43:24.246315-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.830461 1490 out.go:97] Starting control plane node download-only-883000 in cluster download-only-883000\n"} +{"Time":"2023-05-31T11:43:24.246316-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.830469 1490 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:43:24.246318-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.978685 1490 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.27.2/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:24.24632-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.978746 1490 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:43:24.246322-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.979114 1490 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:43:24.246324-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.983258 1490 out.go:97] Downloading Kubernetes v1.27.2 preload ...\n"} +{"Time":"2023-05-31T11:43:24.246325-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:10.983273 1490 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:24.246327-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:11.121672 1490 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.27.2/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4?checksum=md5:4271952d77a401a4cbcfc4225771d46f -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:43:24.24633-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:19.753945 1490 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:24.246332-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:19.754069 1490 preload.go:256] verifying checksum of /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:43:24.246334-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:20.323189 1490 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:43:24.246335-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:20.323268 1490 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/download-only-883000/config.json ...\n"} +{"Time":"2023-05-31T11:43:24.24634-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:20.323584 1490 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:43:24.246342-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \tI0531 11:43:20.323743 1490 download.go:107] Downloading: https://dl.k8s.io/release/v1.27.2/bin/darwin/arm64/kubectl?checksum=file:https://dl.k8s.io/release/v1.27.2/bin/darwin/arm64/kubectl.sha256 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/darwin/arm64/v1.27.2/kubectl\n"} +{"Time":"2023-05-31T11:43:24.246344-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t\n"} +{"Time":"2023-05-31T11:43:24.246345-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* \n"} +{"Time":"2023-05-31T11:43:24.246347-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t* The control plane node \"\" does not exist.\n"} +{"Time":"2023-05-31T11:43:24.246349-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \t To start a cluster, run: \"minikube start -p download-only-883000\"\n"} +{"Time":"2023-05-31T11:43:24.24635-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" \n"} +{"Time":"2023-05-31T11:43:24.246352-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:43:24.246353-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" aaa_download_only_test.go:170: minikube logs failed with error: exit status 85\n"} +{"Time":"2023-05-31T11:43:24.246357-07:00","Action":"run","Test":"TestDownloadOnly/DeleteAll"} +{"Time":"2023-05-31T11:43:24.246359-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":"=== RUN TestDownloadOnly/DeleteAll\n"} +{"Time":"2023-05-31T11:43:24.246364-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":" aaa_download_only_test.go:187: (dbg) Run: out/minikube-darwin-arm64 delete --all\n"} +{"Time":"2023-05-31T11:43:24.4887-07:00","Action":"run","Test":"TestDownloadOnly/DeleteAlwaysSucceeds"} +{"Time":"2023-05-31T11:43:24.488711-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":"=== RUN TestDownloadOnly/DeleteAlwaysSucceeds\n"} +{"Time":"2023-05-31T11:43:24.48874-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":" aaa_download_only_test.go:199: (dbg) Run: out/minikube-darwin-arm64 delete -p download-only-883000\n"} +{"Time":"2023-05-31T11:43:24.720166-07:00","Action":"output","Test":"TestDownloadOnly","Output":" helpers_test.go:175: Cleaning up \"download-only-883000\" profile ...\n"} +{"Time":"2023-05-31T11:43:24.72019-07:00","Action":"output","Test":"TestDownloadOnly","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p download-only-883000\n"} +{"Time":"2023-05-31T11:43:24.949899-07:00","Action":"output","Test":"TestDownloadOnly","Output":"--- FAIL: TestDownloadOnly (39.11s)\n"} +{"Time":"2023-05-31T11:43:24.949919-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0","Output":" --- FAIL: TestDownloadOnly/v1.16.0 (24.91s)\n"} +{"Time":"2023-05-31T11:43:24.949924-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/json-events","Output":" --- FAIL: TestDownloadOnly/v1.16.0/json-events (24.78s)\n"} +{"Time":"2023-05-31T11:43:24.949926-07:00","Action":"fail","Test":"TestDownloadOnly/v1.16.0/json-events","Elapsed":24.78} +{"Time":"2023-05-31T11:43:24.949942-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/preload-exists","Output":" --- PASS: TestDownloadOnly/v1.16.0/preload-exists (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.949948-07:00","Action":"pass","Test":"TestDownloadOnly/v1.16.0/preload-exists","Elapsed":0} +{"Time":"2023-05-31T11:43:24.949949-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/cached-images","Output":" --- SKIP: TestDownloadOnly/v1.16.0/cached-images (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.94995-07:00","Action":"skip","Test":"TestDownloadOnly/v1.16.0/cached-images","Elapsed":0} +{"Time":"2023-05-31T11:43:24.949952-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/binaries","Output":" --- SKIP: TestDownloadOnly/v1.16.0/binaries (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.949953-07:00","Action":"skip","Test":"TestDownloadOnly/v1.16.0/binaries","Elapsed":0} +{"Time":"2023-05-31T11:43:24.949954-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/kubectl","Output":" --- FAIL: TestDownloadOnly/v1.16.0/kubectl (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.949956-07:00","Action":"fail","Test":"TestDownloadOnly/v1.16.0/kubectl","Elapsed":0} +{"Time":"2023-05-31T11:43:24.949957-07:00","Action":"output","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Output":" --- PASS: TestDownloadOnly/v1.16.0/LogsDuration (0.09s)\n"} +{"Time":"2023-05-31T11:43:24.949958-07:00","Action":"pass","Test":"TestDownloadOnly/v1.16.0/LogsDuration","Elapsed":0.09} +{"Time":"2023-05-31T11:43:24.94996-07:00","Action":"fail","Test":"TestDownloadOnly/v1.16.0","Elapsed":24.91} +{"Time":"2023-05-31T11:43:24.949961-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2","Output":" --- PASS: TestDownloadOnly/v1.27.2 (13.50s)\n"} +{"Time":"2023-05-31T11:43:24.949963-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/json-events","Output":" --- PASS: TestDownloadOnly/v1.27.2/json-events (13.42s)\n"} +{"Time":"2023-05-31T11:43:24.949964-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2/json-events","Elapsed":13.42} +{"Time":"2023-05-31T11:43:24.949966-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/preload-exists","Output":" --- PASS: TestDownloadOnly/v1.27.2/preload-exists (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.949967-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2/preload-exists","Elapsed":0} +{"Time":"2023-05-31T11:43:24.949969-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/cached-images","Output":" --- SKIP: TestDownloadOnly/v1.27.2/cached-images (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.949982-07:00","Action":"skip","Test":"TestDownloadOnly/v1.27.2/cached-images","Elapsed":0} +{"Time":"2023-05-31T11:43:24.949983-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/binaries","Output":" --- SKIP: TestDownloadOnly/v1.27.2/binaries (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.949985-07:00","Action":"skip","Test":"TestDownloadOnly/v1.27.2/binaries","Elapsed":0} +{"Time":"2023-05-31T11:43:24.949986-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/kubectl","Output":" --- PASS: TestDownloadOnly/v1.27.2/kubectl (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.949987-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2/kubectl","Elapsed":0} +{"Time":"2023-05-31T11:43:24.949988-07:00","Action":"output","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Output":" --- PASS: TestDownloadOnly/v1.27.2/LogsDuration (0.07s)\n"} +{"Time":"2023-05-31T11:43:24.94999-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2/LogsDuration","Elapsed":0.07} +{"Time":"2023-05-31T11:43:24.949992-07:00","Action":"pass","Test":"TestDownloadOnly/v1.27.2","Elapsed":13.5} +{"Time":"2023-05-31T11:43:24.949995-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAll","Output":" --- PASS: TestDownloadOnly/DeleteAll (0.24s)\n"} +{"Time":"2023-05-31T11:43:24.949997-07:00","Action":"pass","Test":"TestDownloadOnly/DeleteAll","Elapsed":0.24} +{"Time":"2023-05-31T11:43:24.949998-07:00","Action":"output","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Output":" --- PASS: TestDownloadOnly/DeleteAlwaysSucceeds (0.23s)\n"} +{"Time":"2023-05-31T11:43:24.950001-07:00","Action":"pass","Test":"TestDownloadOnly/DeleteAlwaysSucceeds","Elapsed":0.23} +{"Time":"2023-05-31T11:43:24.950002-07:00","Action":"fail","Test":"TestDownloadOnly","Elapsed":39.11} +{"Time":"2023-05-31T11:43:24.950003-07:00","Action":"run","Test":"TestDownloadOnlyKic"} +{"Time":"2023-05-31T11:43:24.950004-07:00","Action":"output","Test":"TestDownloadOnlyKic","Output":"=== RUN TestDownloadOnlyKic\n"} +{"Time":"2023-05-31T11:43:24.950006-07:00","Action":"output","Test":"TestDownloadOnlyKic","Output":" aaa_download_only_test.go:210: skipping, only for docker or podman driver\n"} +{"Time":"2023-05-31T11:43:24.950007-07:00","Action":"output","Test":"TestDownloadOnlyKic","Output":"--- SKIP: TestDownloadOnlyKic (0.00s)\n"} +{"Time":"2023-05-31T11:43:24.950009-07:00","Action":"skip","Test":"TestDownloadOnlyKic","Elapsed":0} +{"Time":"2023-05-31T11:43:24.950011-07:00","Action":"run","Test":"TestBinaryMirror"} +{"Time":"2023-05-31T11:43:24.950012-07:00","Action":"output","Test":"TestBinaryMirror","Output":"=== RUN TestBinaryMirror\n"} +{"Time":"2023-05-31T11:43:24.9813-07:00","Action":"output","Test":"TestBinaryMirror","Output":" aaa_download_only_test.go:304: (dbg) Run: out/minikube-darwin-arm64 start --download-only -p binary-mirror-974000 --alsologtostderr --binary-mirror http://127.0.0.1:49416 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:43:25.167247-07:00","Action":"output","Test":"TestBinaryMirror","Output":" helpers_test.go:175: Cleaning up \"binary-mirror-974000\" profile ...\n"} +{"Time":"2023-05-31T11:43:25.16726-07:00","Action":"output","Test":"TestBinaryMirror","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p binary-mirror-974000\n"} +{"Time":"2023-05-31T11:43:25.281846-07:00","Action":"output","Test":"TestBinaryMirror","Output":"--- PASS: TestBinaryMirror (0.33s)\n"} +{"Time":"2023-05-31T11:43:25.281863-07:00","Action":"pass","Test":"TestBinaryMirror","Elapsed":0.33} +{"Time":"2023-05-31T11:43:25.281867-07:00","Action":"run","Test":"TestOffline"} +{"Time":"2023-05-31T11:43:25.281873-07:00","Action":"output","Test":"TestOffline","Output":"=== RUN TestOffline\n"} +{"Time":"2023-05-31T11:43:25.281883-07:00","Action":"output","Test":"TestOffline","Output":"=== PAUSE TestOffline\n"} +{"Time":"2023-05-31T11:43:25.281884-07:00","Action":"pause","Test":"TestOffline"} +{"Time":"2023-05-31T11:43:25.281886-07:00","Action":"run","Test":"TestAddons"} +{"Time":"2023-05-31T11:43:25.281887-07:00","Action":"output","Test":"TestAddons","Output":"=== RUN TestAddons\n"} +{"Time":"2023-05-31T11:43:25.281918-07:00","Action":"run","Test":"TestAddons/Setup"} +{"Time":"2023-05-31T11:43:25.281922-07:00","Action":"output","Test":"TestAddons/Setup","Output":"=== RUN TestAddons/Setup\n"} +{"Time":"2023-05-31T11:43:25.281975-07:00","Action":"output","Test":"TestAddons/Setup","Output":" addons_test.go:88: (dbg) Run: out/minikube-darwin-arm64 start -p addons-901000 --wait=true --memory=4000 --alsologtostderr --addons=registry --addons=metrics-server --addons=volumesnapshots --addons=csi-hostpath-driver --addons=gcp-auth --addons=cloud-spanner --addons=inspektor-gadget --driver=qemu2 --addons=ingress --addons=ingress-dns\n"} +{"Time":"2023-05-31T11:44:08.730828-07:00","Action":"output","Test":"TestAddons/Setup","Output":" addons_test.go:88: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p addons-901000 --wait=true --memory=4000 --alsologtostderr --addons=registry --addons=metrics-server --addons=volumesnapshots --addons=csi-hostpath-driver --addons=gcp-auth --addons=cloud-spanner --addons=inspektor-gadget --driver=qemu2 --addons=ingress --addons=ingress-dns: exit status 80 (43.445128458s)\n"} +{"Time":"2023-05-31T11:44:08.730851-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \n"} +{"Time":"2023-05-31T11:44:08.730855-07:00","Action":"output","Test":"TestAddons/Setup","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:44:08.730858-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* [addons-901000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:44:08.730859-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:44:08.730862-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.730863-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:44:08.730866-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:44:08.730868-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:44:08.730869-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:44:08.730871-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:44:08.730872-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:44:08.730874-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* Starting control plane node addons-901000 in cluster addons-901000\n"} +{"Time":"2023-05-31T11:44:08.730875-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:44:08.730877-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* Preparing Kubernetes v1.27.2 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T11:44:08.730878-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T11:44:08.730879-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - Booting up control plane ...\n"} +{"Time":"2023-05-31T11:44:08.73088-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - Configuring RBAC rules ...\n"} +{"Time":"2023-05-31T11:44:08.730882-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T11:44:08.730883-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* Verifying csi-hostpath-driver addon...\n"} +{"Time":"2023-05-31T11:44:08.730884-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - Using image ghcr.io/inspektor-gadget/inspektor-gadget:v0.16.1\n"} +{"Time":"2023-05-31T11:44:08.730886-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - Using image registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794\n"} +{"Time":"2023-05-31T11:44:08.730888-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.730889-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - Using image gcr.io/cloud-spanner-emulator/emulator:1.5.5\n"} +{"Time":"2023-05-31T11:44:08.73089-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - Using image registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794\n"} +{"Time":"2023-05-31T11:44:08.73093-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - Using image registry.k8s.io/ingress-nginx/controller:v1.7.0\n"} +{"Time":"2023-05-31T11:44:08.730933-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* Verifying registry addon...\n"} +{"Time":"2023-05-31T11:44:08.730934-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.730935-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \n"} +{"Time":"2023-05-31T11:44:08.730948-07:00","Action":"output","Test":"TestAddons/Setup","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:44:08.730949-07:00","Action":"output","Test":"TestAddons/Setup","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:44:08.730952-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.308142 1544 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:44:08.730954-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.308531 1544 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:44:08.730955-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.308535 1544 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:44:08.730957-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.308537 1544 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:44:08.730958-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.308644 1544 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:44:08.73096-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.310229 1544 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:44:08.730961-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.325614 1544 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":776,\"bootTime\":1685557829,\"procs\":394,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:44:08.730964-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:43:25.325680 1544 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:44:08.730965-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.331124 1544 out.go:177] * [addons-901000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:44:08.730967-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.338309 1544 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:44:08.730968-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.338330 1544 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:44:08.730969-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.341302 1544 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.730971-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.344323 1544 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:44:08.730972-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.347303 1544 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:44:08.730977-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.350270 1544 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:44:08.730979-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.353269 1544 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:44:08.73098-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.356423 1544 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:44:08.730981-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.359183 1544 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:44:08.730983-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.366292 1544 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:44:08.730985-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.366297 1544 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:44:08.730986-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.366303 1544 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:44:08.730988-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.368133 1544 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:44:08.73099-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.375247 1544 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:44:08.730991-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.378354 1544 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T11:44:08.730992-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.378367 1544 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:44:08.730994-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.378383 1544 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:44:08.730996-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.378387 1544 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T11:44:08.730997-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.378394 1544 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:44:08.731-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t{Name:addons-901000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:addons-901000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CR"} +{"Time":"2023-05-31T11:44:08.731004-07:00","Action":"output","Test":"TestAddons/Setup","Output":"ISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:44:08.731006-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.378499 1544 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731008-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.387239 1544 out.go:177] * Starting control plane node addons-901000 in cluster addons-901000\n"} +{"Time":"2023-05-31T11:44:08.731009-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391231 1544 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:44:08.731013-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391254 1544 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:44:08.731015-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391266 1544 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:44:08.731017-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391334 1544 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:44:08.731018-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391339 1544 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:44:08.73102-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391556 1544 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/config.json ...\n"} +{"Time":"2023-05-31T11:44:08.731021-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391568 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/config.json: {Name:mk97a64ec3b197a4650b130f9b12c09b679b0329 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731023-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391774 1544 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:44:08.731024-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391809 1544 start.go:364] acquiring machines lock for addons-901000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731026-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391890 1544 start.go:368] acquired machines lock for \"addons-901000\" in 75.583µs\n"} +{"Time":"2023-05-31T11:44:08.731029-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391915 1544 start.go:93] Provisioning new machine with config: \u0026{Name:addons-901000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfi"} +{"Time":"2023-05-31T11:44:08.731032-07:00","Action":"output","Test":"TestAddons/Setup","Output":"g:{KubernetesVersion:v1.27.2 ClusterName:addons-901000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262"} +{"Time":"2023-05-31T11:44:08.731034-07:00","Action":"output","Test":"TestAddons/Setup","Output":"144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:44:08.731036-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.391944 1544 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:44:08.731038-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.400297 1544 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:44:08.731039-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.760738 1544 start.go:159] libmachine.API.Create for \"addons-901000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:44:08.731041-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.760770 1544 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:44:08.731042-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.760930 1544 main.go:141] libmachine: Creating CA: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:44:08.731044-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.826509 1544 main.go:141] libmachine: Creating client certificate: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:44:08.731045-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:25.861468 1544 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:44:08.731047-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.180605 1544 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:44:08.731048-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.321589 1544 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:44:08.73105-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.321596 1544 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:44:08.731052-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.321801 1544 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/disk.qcow2\n"} +{"Time":"2023-05-31T11:44:08.731053-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.410519 1544 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:44:08.731054-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.410543 1544 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:44:08.731056-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.410612 1544 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:44:08.731057-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.417949 1544 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:44:08.731058-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.73106-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.417969 1544 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:44:08.731061-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.417983 1544 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/disk.qcow2\n"} +{"Time":"2023-05-31T11:44:08.731063-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.417995 1544 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:44:08.731065-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.418030 1544 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 4000 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/qemu.pid -device virtio-net-pci,netdev=net0,mac=56:da:28:08:b0:67 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/disk.qcow2\n"} +{"Time":"2023-05-31T11:44:08.731067-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.496279 1544 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:44:08.731068-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.496301 1544 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:44:08.731069-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.496305 1544 main.go:141] libmachine: Attempt 0\n"} +{"Time":"2023-05-31T11:44:08.731071-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:26.496322 1544 main.go:141] libmachine: Searching for 56:da:28:8:b0:67 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:44:08.731072-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:28.498527 1544 main.go:141] libmachine: Attempt 1\n"} +{"Time":"2023-05-31T11:44:08.731073-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:28.498606 1544 main.go:141] libmachine: Searching for 56:da:28:8:b0:67 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:44:08.731075-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:30.500731 1544 main.go:141] libmachine: Attempt 2\n"} +{"Time":"2023-05-31T11:44:08.731076-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:30.500752 1544 main.go:141] libmachine: Searching for 56:da:28:8:b0:67 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:44:08.731078-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:32.502751 1544 main.go:141] libmachine: Attempt 3\n"} +{"Time":"2023-05-31T11:44:08.731079-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:32.502765 1544 main.go:141] libmachine: Searching for 56:da:28:8:b0:67 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:44:08.731083-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:34.504747 1544 main.go:141] libmachine: Attempt 4\n"} +{"Time":"2023-05-31T11:44:08.731085-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:34.504757 1544 main.go:141] libmachine: Searching for 56:da:28:8:b0:67 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:44:08.731088-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:36.506778 1544 main.go:141] libmachine: Attempt 5\n"} +{"Time":"2023-05-31T11:44:08.73109-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:36.506811 1544 main.go:141] libmachine: Searching for 56:da:28:8:b0:67 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:44:08.731092-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:38.509000 1544 main.go:141] libmachine: Attempt 6\n"} +{"Time":"2023-05-31T11:44:08.731093-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:38.509089 1544 main.go:141] libmachine: Searching for 56:da:28:8:b0:67 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:44:08.731095-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:38.509390 1544 main.go:141] libmachine: Found 1 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:44:08.731096-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:38.509515 1544 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:44:08.731098-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:38.509539 1544 main.go:141] libmachine: Found match: 56:da:28:8:b0:67\n"} +{"Time":"2023-05-31T11:44:08.731099-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:38.509576 1544 main.go:141] libmachine: IP: 192.168.105.2\n"} +{"Time":"2023-05-31T11:44:08.7311-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:38.509602 1544 main.go:141] libmachine: Waiting for VM to start (ssh -p 22 docker@192.168.105.2)...\n"} +{"Time":"2023-05-31T11:44:08.731102-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.530950 1544 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T11:44:08.731103-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.531039 1544 buildroot.go:166] provisioning hostname \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.731105-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.531918 1544 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:44:08.731106-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.532971 1544 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1031e86d0] 0x1031eb130 \u003cnil\u003e [] 0s} 192.168.105.2 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731108-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.532988 1544 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:44:08.731109-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tsudo hostname addons-901000 \u0026\u0026 echo \"addons-901000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T11:44:08.73111-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.624549 1544 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: addons-901000\n"} +{"Time":"2023-05-31T11:44:08.731112-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731113-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.624666 1544 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:44:08.731114-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.625161 1544 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1031e86d0] 0x1031eb130 \u003cnil\u003e [] 0s} 192.168.105.2 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731116-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.625177 1544 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:44:08.731117-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731118-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\t\tif ! grep -xq '.*\\saddons-901000' /etc/hosts; then\n"} +{"Time":"2023-05-31T11:44:08.73112-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T11:44:08.731123-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 addons-901000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T11:44:08.731125-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T11:44:08.731126-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\t\t\t\techo '127.0.1.1 addons-901000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T11:44:08.731128-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T11:44:08.731129-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T11:44:08.73113-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.702666 1544 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T11:44:08.731132-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.702683 1544 buildroot.go:172] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1035/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1035/.minikube}\n"} +{"Time":"2023-05-31T11:44:08.731135-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.702699 1544 buildroot.go:174] setting up certificates\n"} +{"Time":"2023-05-31T11:44:08.731136-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.702711 1544 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T11:44:08.731137-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.702718 1544 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T11:44:08.731139-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.702884 1544 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731141-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.703947 1544 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731143-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.704319 1544 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731145-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.704548 1544 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem org=jenkins.addons-901000 san=[192.168.105.2 192.168.105.2 localhost 127.0.0.1 minikube addons-901000]\n"} +{"Time":"2023-05-31T11:44:08.731147-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.993593 1544 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T11:44:08.731148-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.993708 1544 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T11:44:08.73115-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:40.993733 1544 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.2 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:44:08.731151-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.027715 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731153-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.034887 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731157-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.041770 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1216 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731158-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.048574 1544 provision.go:86] duration metric: configureAuth took 345.862959ms\n"} +{"Time":"2023-05-31T11:44:08.73116-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.048583 1544 buildroot.go:189] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T11:44:08.731161-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.048928 1544 config.go:182] Loaded profile config \"addons-901000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.731163-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.048975 1544 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:44:08.731164-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.049205 1544 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1031e86d0] 0x1031eb130 \u003cnil\u003e [] 0s} 192.168.105.2 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731166-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.049215 1544 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:44:08.731167-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T11:44:08.731169-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.114421 1544 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: tmpfs\n"} +{"Time":"2023-05-31T11:44:08.73117-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731171-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.114432 1544 buildroot.go:70] root file system type: tmpfs\n"} +{"Time":"2023-05-31T11:44:08.731173-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.114487 1544 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T11:44:08.731174-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.114537 1544 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:44:08.731176-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.114794 1544 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1031e86d0] 0x1031eb130 \u003cnil\u003e [] 0s} 192.168.105.2 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731177-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.114835 1544 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:44:08.731179-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %s \"[Unit]\n"} +{"Time":"2023-05-31T11:44:08.73118-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:44:08.731182-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:44:08.731183-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tAfter=network.target minikube-automount.service docker.socket\n"} +{"Time":"2023-05-31T11:44:08.731184-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tRequires= minikube-automount.service docker.socket \n"} +{"Time":"2023-05-31T11:44:08.731186-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T11:44:08.731187-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:44:08.731188-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.73119-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:44:08.731191-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tType=notify\n"} +{"Time":"2023-05-31T11:44:08.731192-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T11:44:08.731193-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731194-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731196-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731197-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:44:08.731198-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:44:08.7312-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:44:08.731201-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:44:08.731203-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:44:08.731204-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:44:08.731225-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:44:08.731226-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731228-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:44:08.731229-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:44:08.731231-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:44:08.731232-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=qemu2 --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:44:08.731236-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T11:44:08.731238-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731239-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:44:08.73124-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:44:08.731242-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T11:44:08.731243-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:44:08.731245-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T11:44:08.731246-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731248-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:44:08.731249-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:44:08.73125-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T11:44:08.731251-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:44:08.731252-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731254-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:44:08.731255-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T11:44:08.731256-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731257-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:44:08.731259-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T11:44:08.73126-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731261-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:44:08.731262-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:44:08.731263-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T11:44:08.731265-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.181378 1544 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T11:44:08.731266-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:44:08.731267-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:44:08.731269-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tAfter=network.target minikube-automount.service docker.socket\n"} +{"Time":"2023-05-31T11:44:08.73127-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tRequires= minikube-automount.service docker.socket \n"} +{"Time":"2023-05-31T11:44:08.731271-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T11:44:08.731273-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:44:08.731274-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731275-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:44:08.731276-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tType=notify\n"} +{"Time":"2023-05-31T11:44:08.731278-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T11:44:08.731279-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.73128-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731281-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731282-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:44:08.731284-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:44:08.731285-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:44:08.731286-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:44:08.731288-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:44:08.731289-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:44:08.731292-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:44:08.731294-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731295-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:44:08.731297-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:44:08.731298-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:44:08.7313-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=qemu2 --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:44:08.731301-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T11:44:08.731303-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731304-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:44:08.731305-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:44:08.731307-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T11:44:08.731308-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:44:08.731309-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T11:44:08.73131-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731312-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:44:08.731313-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:44:08.731314-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T11:44:08.731316-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:44:08.731318-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731319-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:44:08.73132-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T11:44:08.731322-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731323-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:44:08.731324-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T11:44:08.731325-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731327-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:44:08.731328-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:44:08.731329-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731331-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.181426 1544 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:44:08.731332-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.181675 1544 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1031e86d0] 0x1031eb130 \u003cnil\u003e [] 0s} 192.168.105.2 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731334-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.181689 1544 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:44:08.731336-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T11:44:08.731337-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.533403 1544 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: diff: can't stat '/lib/systemd/system/docker.service': No such file or directory\n"} +{"Time":"2023-05-31T11:44:08.731339-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tCreated symlink /etc/systemd/system/multi-user.target.wants/docker.service → /usr/lib/systemd/system/docker.service.\n"} +{"Time":"2023-05-31T11:44:08.73134-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731342-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.533415 1544 machine.go:91] provisioned docker machine in 1.002459208s\n"} +{"Time":"2023-05-31T11:44:08.731343-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.533421 1544 client.go:171] LocalClient.Create took 15.773024959s\n"} +{"Time":"2023-05-31T11:44:08.731347-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.533429 1544 start.go:167] duration metric: libmachine.API.Create for \"addons-901000\" took 15.773075458s\n"} +{"Time":"2023-05-31T11:44:08.731348-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.533433 1544 start.go:300] post-start starting for \"addons-901000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:44:08.73135-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.533437 1544 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T11:44:08.731352-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.533492 1544 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:44:08.731353-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.533501 1544 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.2 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:44:08.731355-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.567644 1544 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T11:44:08.731356-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.569293 1544 info.go:137] Remote host: Buildroot 2021.02.12\n"} +{"Time":"2023-05-31T11:44:08.731358-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.569303 1544 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1035/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T11:44:08.73136-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.569367 1544 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1035/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T11:44:08.731361-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.569390 1544 start.go:303] post-start completed in 35.955375ms\n"} +{"Time":"2023-05-31T11:44:08.731363-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.569755 1544 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/config.json ...\n"} +{"Time":"2023-05-31T11:44:08.731365-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.569905 1544 start.go:128] duration metric: createHost completed in 16.178345875s\n"} +{"Time":"2023-05-31T11:44:08.731366-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.569931 1544 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:44:08.731368-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.570152 1544 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1031e86d0] 0x1031eb130 \u003cnil\u003e [] 0s} 192.168.105.2 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.731369-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.570156 1544 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:44:08.73137-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tdate +%s.%N\n"} +{"Time":"2023-05-31T11:44:08.731372-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.633748 1544 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: 1685558621.644738294\n"} +{"Time":"2023-05-31T11:44:08.731373-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731375-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.633757 1544 fix.go:207] guest clock: 1685558621.644738294\n"} +{"Time":"2023-05-31T11:44:08.731376-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.633761 1544 fix.go:220] Guest: 2023-05-31 11:43:41.644738294 -0700 PDT Remote: 2023-05-31 11:43:41.569908 -0700 PDT m=+16.280559501 (delta=74.830294ms)\n"} +{"Time":"2023-05-31T11:44:08.731378-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.633772 1544 fix.go:191] guest clock delta is within tolerance: 74.830294ms\n"} +{"Time":"2023-05-31T11:44:08.731379-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.633775 1544 start.go:83] releasing machines lock for \"addons-901000\", held for 16.242270292s\n"} +{"Time":"2023-05-31T11:44:08.731381-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.634087 1544 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T11:44:08.731382-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.634095 1544 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.2 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:44:08.731386-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.634108 1544 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T11:44:08.731387-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.634159 1544 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.2 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:44:08.731389-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.716481 1544 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:44:08.731393-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.718905 1544 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T11:44:08.731394-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:43:41.720891 1544 cni.go:208] loopback cni configuration skipped: \"/etc/cni/net.d/*loopback.conf*\" not found\n"} +{"Time":"2023-05-31T11:44:08.731396-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.720922 1544 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f ( ( -name *bridge* -or -name *podman* ) -and -not -name *.mk_disabled ) -printf \"%p, \" -exec sh -c \"sudo mv {} {}.mk_disabled\" ;\n"} +{"Time":"2023-05-31T11:44:08.731398-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.726532 1544 cni.go:261] disabled [/etc/cni/net.d/87-podman-bridge.conflist] bridge cni config(s)\n"} +{"Time":"2023-05-31T11:44:08.731399-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.726553 1544 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:44:08.7314-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.726652 1544 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:44:08.731402-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.734371 1544 docker.go:633] Got preloaded images: \n"} +{"Time":"2023-05-31T11:44:08.731403-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.734377 1544 docker.go:639] registry.k8s.io/kube-apiserver:v1.27.2 wasn't preloaded\n"} +{"Time":"2023-05-31T11:44:08.731404-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.734418 1544 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:44:08.731406-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.737211 1544 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T11:44:08.731407-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.738761 1544 ssh_runner.go:195] Run: stat -c \"%s %y\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:44:08.731409-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.739992 1544 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%s %y\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T11:44:08.73141-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:44:08.731411-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.731412-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:44:08.731414-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T11:44:08.731415-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:41.740009 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 --\u003e /preloaded.tar.lz4 (343635669 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731417-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:43.061916 1544 docker.go:597] Took 1.323243 seconds to copy over tarball\n"} +{"Time":"2023-05-31T11:44:08.731418-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:43.061994 1544 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:44:08.73142-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:44.194919 1544 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (1.132932875s)\n"} +{"Time":"2023-05-31T11:44:08.731421-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:44.194935 1544 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:44:08.731422-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:44.210393 1544 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:44:08.731424-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:44.213344 1544 ssh_runner.go:362] scp memory --\u003e /var/lib/docker/image/overlay2/repositories.json (2629 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731426-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:44.218441 1544 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:44:08.731427-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:44.291225 1544 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:44:08.731428-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.947331 1544 ssh_runner.go:235] Completed: sudo systemctl restart docker: (1.656129292s)\n"} +{"Time":"2023-05-31T11:44:08.73143-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.947368 1544 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T11:44:08.731431-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.947508 1544 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T11:44:08.731433-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T11:44:08.731665-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.952900 1544 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.9\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:44:08.731682-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.955951 1544 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:44:08.731687-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.959040 1544 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T11:44:08.731691-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.959071 1544 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:44:08.731726-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.962061 1544 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:44:08.731731-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.964873 1544 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:44:08.731734-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.968183 1544 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:44:08.731735-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.971595 1544 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T11:44:08.731737-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.974904 1544 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:44:08.731741-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.977719 1544 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T11:44:08.731742-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.980541 1544 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T11:44:08.731744-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:45.983671 1544 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:44:08.731746-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.059080 1544 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T11:44:08.731747-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.067620 1544 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T11:44:08.731748-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.067691 1544 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T11:44:08.73175-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.073469 1544 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service containerd\n"} +{"Time":"2023-05-31T11:44:08.731751-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.078465 1544 ssh_runner.go:195] Run: sudo systemctl stop -f containerd\n"} +{"Time":"2023-05-31T11:44:08.731817-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.087466 1544 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service containerd\n"} +{"Time":"2023-05-31T11:44:08.731826-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.092295 1544 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T11:44:08.731873-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.097272 1544 ssh_runner.go:195] Run: sudo systemctl stop -f crio\n"} +{"Time":"2023-05-31T11:44:08.731879-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.137948 1544 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T11:44:08.731899-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.142976 1544 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %s \"runtime-endpoint: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:44:08.731907-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T11:44:08.731912-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.148182 1544 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T11:44:08.731915-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.149555 1544 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T11:44:08.73192-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.152444 1544 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731924-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.157782 1544 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T11:44:08.731927-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.239820 1544 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T11:44:08.731931-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.321679 1544 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T11:44:08.731934-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.321693 1544 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T11:44:08.731938-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.327061 1544 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:44:08.731942-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:46.403268 1544 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:44:08.731946-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:47.572967 1544 ssh_runner.go:235] Completed: sudo systemctl restart docker: (1.169708208s)\n"} +{"Time":"2023-05-31T11:44:08.731949-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:47.573028 1544 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T11:44:08.731953-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:47.649505 1544 ssh_runner.go:195] Run: sudo systemctl unmask cri-docker.socket\n"} +{"Time":"2023-05-31T11:44:08.731957-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:47.730888 1544 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T11:44:08.73196-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:47.803423 1544 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:44:08.731964-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:47.884477 1544 ssh_runner.go:195] Run: sudo systemctl restart cri-docker.socket\n"} +{"Time":"2023-05-31T11:44:08.731983-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:47.892210 1544 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:44:08.731988-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:47.981099 1544 ssh_runner.go:195] Run: sudo systemctl restart cri-docker\n"} +{"Time":"2023-05-31T11:44:08.731992-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.004539 1544 start.go:528] Will wait 60s for socket path /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:44:08.731996-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.004621 1544 ssh_runner.go:195] Run: stat /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:44:08.731999-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.006822 1544 start.go:549] Will wait 60s for crictl version\n"} +{"Time":"2023-05-31T11:44:08.732002-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.006863 1544 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T11:44:08.732006-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.008890 1544 ssh_runner.go:195] Run: sudo /usr/bin/crictl version\n"} +{"Time":"2023-05-31T11:44:08.73201-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.026804 1544 start.go:565] Version: 0.1.0\n"} +{"Time":"2023-05-31T11:44:08.732014-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tRuntimeName: docker\n"} +{"Time":"2023-05-31T11:44:08.73203-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tRuntimeVersion: 24.0.1\n"} +{"Time":"2023-05-31T11:44:08.732033-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tRuntimeApiVersion: v1alpha2\n"} +{"Time":"2023-05-31T11:44:08.732037-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.026894 1544 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T11:44:08.732041-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.034762 1544 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T11:44:08.732045-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.046161 1544 out.go:204] * Preparing Kubernetes v1.27.2 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T11:44:08.732048-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.046331 1544 ssh_runner.go:195] Run: grep 192.168.105.1\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T11:44:08.732052-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.047646 1544 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.105.1\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T11:44:08.732057-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.051483 1544 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:44:08.73206-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.051526 1544 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:44:08.732063-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.057478 1544 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T11:44:08.732067-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.73207-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.732073-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.732076-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.732079-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T11:44:08.732082-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T11:44:08.732085-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T11:44:08.732088-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:44:08.732091-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.732094-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:44:08.732098-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.057487 1544 docker.go:563] Images already preloaded, skipping extraction\n"} +{"Time":"2023-05-31T11:44:08.732101-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.057541 1544 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:44:08.732104-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.063299 1544 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T11:44:08.732107-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.73211-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.732113-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.732116-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.732119-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T11:44:08.732122-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T11:44:08.732125-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T11:44:08.732128-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:44:08.73214-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.732144-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:44:08.732147-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.063308 1544 cache_images.go:84] Images are preloaded, skipping loading\n"} +{"Time":"2023-05-31T11:44:08.73215-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.063362 1544 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T11:44:08.732153-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.074768 1544 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:44:08.732157-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.074783 1544 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:44:08.73216-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.074791 1544 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T11:44:08.732166-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.074799 1544 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.105.2 APIServerPort:8443 KubernetesVersion:v1.27.2 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:addons-901000 NodeName:addons-901000 DNSDomain:cluster.local CRISocket:/var/run/cri-dockerd.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.105.2\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.105.2 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt StaticPodPath:/etc/ku"} +{"Time":"2023-05-31T11:44:08.732173-07:00","Action":"output","Test":"TestAddons/Setup","Output":"bernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:true}\n"} +{"Time":"2023-05-31T11:44:08.732176-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.074868 1544 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T11:44:08.73218-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T11:44:08.732183-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T11:44:08.732186-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T11:44:08.732189-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t advertiseAddress: 192.168.105.2\n"} +{"Time":"2023-05-31T11:44:08.732193-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T11:44:08.732195-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T11:44:08.732198-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - groups:\n"} +{"Time":"2023-05-31T11:44:08.732201-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T11:44:08.732204-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T11:44:08.732305-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t usages:\n"} +{"Time":"2023-05-31T11:44:08.732309-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - signing\n"} +{"Time":"2023-05-31T11:44:08.732312-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t - authentication\n"} +{"Time":"2023-05-31T11:44:08.732315-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T11:44:08.732328-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t criSocket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:44:08.732332-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t name: \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.732335-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T11:44:08.732339-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t node-ip: 192.168.105.2\n"} +{"Time":"2023-05-31T11:44:08.732342-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t taints: []\n"} +{"Time":"2023-05-31T11:44:08.732345-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t---\n"} +{"Time":"2023-05-31T11:44:08.732348-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T11:44:08.732351-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T11:44:08.732354-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T11:44:08.732363-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.105.2\"]\n"} +{"Time":"2023-05-31T11:44:08.732378-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:44:08.732383-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T11:44:08.732386-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T11:44:08.732396-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:44:08.732406-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T11:44:08.732409-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T11:44:08.732413-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T11:44:08.732415-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:44:08.732418-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T11:44:08.732421-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T11:44:08.732438-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T11:44:08.732444-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T11:44:08.732448-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tetcd:\n"} +{"Time":"2023-05-31T11:44:08.732473-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t local:\n"} +{"Time":"2023-05-31T11:44:08.732476-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T11:44:08.732479-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:44:08.732483-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T11:44:08.732486-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tkubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.732489-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T11:44:08.732492-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T11:44:08.732501-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T11:44:08.732513-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T11:44:08.732517-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t---\n"} +{"Time":"2023-05-31T11:44:08.73252-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T11:44:08.732523-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T11:44:08.732526-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T11:44:08.732535-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t x509:\n"} +{"Time":"2023-05-31T11:44:08.732539-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T11:44:08.732542-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T11:44:08.732545-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T11:44:08.732564-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T11:44:08.732568-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T11:44:08.732572-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T11:44:08.732585-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T11:44:08.732589-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T11:44:08.732592-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t nodefs.available: \"0%\"\n"} +{"Time":"2023-05-31T11:44:08.732596-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t nodefs.inodesFree: \"0%\"\n"} +{"Time":"2023-05-31T11:44:08.732599-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t imagefs.available: \"0%\"\n"} +{"Time":"2023-05-31T11:44:08.732602-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T11:44:08.732605-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T11:44:08.732608-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t---\n"} +{"Time":"2023-05-31T11:44:08.732611-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T11:44:08.732614-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T11:44:08.73266-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T11:44:08.732665-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T11:44:08.732668-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T11:44:08.732671-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T11:44:08.732675-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T11:44:08.732678-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T11:44:08.732682-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T11:44:08.732685-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T11:44:08.732689-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.732692-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.074906 1544 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T11:44:08.732698-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T11:44:08.732706-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.732709-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:44:08.732712-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:44:08.732716-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=addons-901000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.105.2\n"} +{"Time":"2023-05-31T11:44:08.73272-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.732723-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:44:08.732726-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t config:\n"} +{"Time":"2023-05-31T11:44:08.73273-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t{KubernetesVersion:v1.27.2 ClusterName:addons-901000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T11:44:08.732734-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.074957 1544 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.732737-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.077727 1544 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T11:44:08.732742-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.077758 1544 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T11:44:08.732811-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.080416 1544 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (375 bytes)\n"} +{"Time":"2023-05-31T11:44:08.732816-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.085397 1544 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T11:44:08.73282-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.090431 1544 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2099 bytes)\n"} +{"Time":"2023-05-31T11:44:08.732823-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.095594 1544 ssh_runner.go:195] Run: grep 192.168.105.2\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T11:44:08.732827-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.097091 1544 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.105.2\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T11:44:08.732832-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.100816 1544 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000 for IP: 192.168.105.2\n"} +{"Time":"2023-05-31T11:44:08.732995-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.100838 1544 certs.go:190] acquiring lock for shared ca certs: {Name:mk5d2be9e1df042d7290b2e1516090ac43150ffe Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.73301-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.100982 1544 certs.go:204] generating minikubeCA CA: /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key\n"} +{"Time":"2023-05-31T11:44:08.733014-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.239788 1544 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt ...\n"} +{"Time":"2023-05-31T11:44:08.733018-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.239794 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt: {Name:mkee84fa16254b66c35e9e10b33f4fbe29c93400 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733022-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.239995 1544 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key ...\n"} +{"Time":"2023-05-31T11:44:08.733026-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.239998 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key: {Name:mk5891ebdbe2898c1d18cf4c114398bf03212710 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733052-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.240113 1544 certs.go:204] generating proxyClientCA CA: /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T11:44:08.733057-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.348259 1544 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.crt ...\n"} +{"Time":"2023-05-31T11:44:08.733061-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.348262 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.crt: {Name:mkd4147fbb6ba63bd5b3ffcba5003315cbd7539f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733075-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.348400 1544 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key ...\n"} +{"Time":"2023-05-31T11:44:08.73308-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.348403 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key: {Name:mk3cbef9da723122813624308f6861cce59d5d07 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733084-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.348533 1544 certs.go:319] generating minikube-user signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/client.key\n"} +{"Time":"2023-05-31T11:44:08.733088-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.348541 1544 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/client.crt with IP's: []\n"} +{"Time":"2023-05-31T11:44:08.733092-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.449602 1544 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/client.crt ...\n"} +{"Time":"2023-05-31T11:44:08.733096-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.449607 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/client.crt: {Name:mk0b2cb8f79e79dfc203c73ae7b921878532c061 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733099-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.449746 1544 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/client.key ...\n"} +{"Time":"2023-05-31T11:44:08.733104-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.449749 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/client.key: {Name:mk4cac0ab291dadcdb37474b8281374e00a2d414 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733108-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.449858 1544 certs.go:319] generating minikube signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.key.96055969\n"} +{"Time":"2023-05-31T11:44:08.733139-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.449867 1544 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.crt.96055969 with IP's: [192.168.105.2 10.96.0.1 127.0.0.1 10.0.0.1]\n"} +{"Time":"2023-05-31T11:44:08.733148-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.550401 1544 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.crt.96055969 ...\n"} +{"Time":"2023-05-31T11:44:08.73315-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.550408 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.crt.96055969: {Name:mka736e8fb8496aede6578e5374903fad0557e58 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733152-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.550624 1544 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.key.96055969 ...\n"} +{"Time":"2023-05-31T11:44:08.733154-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.550628 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.key.96055969: {Name:mkf400d9c922ce6035a50ba02971335986e15541 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733156-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.550728 1544 certs.go:337] copying /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.crt.96055969 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.crt\n"} +{"Time":"2023-05-31T11:44:08.733158-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.550957 1544 certs.go:341] copying /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.key.96055969 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.key\n"} +{"Time":"2023-05-31T11:44:08.733159-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.551070 1544 certs.go:319] generating aggregator signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/proxy-client.key\n"} +{"Time":"2023-05-31T11:44:08.733161-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.551083 1544 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/proxy-client.crt with IP's: []\n"} +{"Time":"2023-05-31T11:44:08.733163-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.711266 1544 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/proxy-client.crt ...\n"} +{"Time":"2023-05-31T11:44:08.733164-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.711271 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/proxy-client.crt: {Name:mkf30b67b01652e0a6e616d8d31e01fb015e8e28 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733166-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.711445 1544 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/proxy-client.key ...\n"} +{"Time":"2023-05-31T11:44:08.733167-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.711448 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/proxy-client.key: {Name:mkf3747de44689ca89e039440788baac67e47f6b Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.733175-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.711728 1544 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733177-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.712158 1544 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733178-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.712192 1544 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T11:44:08.73334-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.712381 1544 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733348-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.712831 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733352-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.720718 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733357-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.728185 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733361-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.735538 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/addons-901000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733365-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.742904 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733369-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.749837 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733373-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.756619 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733376-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.763691 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:44:08.73338-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.770650 1544 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733384-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.777577 1544 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T11:44:08.733391-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.783214 1544 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T11:44:08.733394-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.785105 1544 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T11:44:08.733565-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.788435 1544 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:44:08.73357-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.789935 1544 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:43 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:44:08.733574-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.789954 1544 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:44:08.733595-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.791581 1544 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T11:44:08.7336-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.794400 1544 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T11:44:08.733604-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.795883 1544 certs.go:353] certs directory doesn't exist, likely first start: ls /var/lib/minikube/certs/etcd: Process exited with status 2\n"} +{"Time":"2023-05-31T11:44:08.733608-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:44:08.733611-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.733614-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:44:08.733617-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tls: cannot access '/var/lib/minikube/certs/etcd': No such file or directory\n"} +{"Time":"2023-05-31T11:44:08.733624-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.795921 1544 kubeadm.go:404] StartCluster: {Name:addons-901000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v"} +{"Time":"2023-05-31T11:44:08.733631-07:00","Action":"output","Test":"TestAddons/Setup","Output":"1.27.2 ClusterName:addons-901000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.105.2 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 Mount"} +{"Time":"2023-05-31T11:44:08.73406-07:00","Action":"output","Test":"TestAddons/Setup","Output":"Options:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:44:08.734066-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.795983 1544 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T11:44:08.734068-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.801401 1544 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T11:44:08.734069-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.804566 1544 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T11:44:08.734071-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.807748 1544 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T11:44:08.734073-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.810353 1544 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T11:44:08.734075-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:44:08.734076-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t\n"} +{"Time":"2023-05-31T11:44:08.734078-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:44:08.734079-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:44:08.73408-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:44:08.734082-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:44:08.734083-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:44:08.734085-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.810367 1544 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,Mem\"\n"} +{"Time":"2023-05-31T11:44:08.734089-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.832101 1544 kubeadm.go:322] [init] Using Kubernetes version: v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.734323-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.832132 1544 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:44:08.734334-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.887405 1544 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:44:08.734338-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.887458 1544 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:44:08.734342-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.887507 1544 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:44:08.734346-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.945790 1544 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:44:08.734349-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.955023 1544 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T11:44:08.734353-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.955073 1544 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:44:08.734356-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.955102 1544 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:44:08.734372-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:48.988563 1544 kubeadm.go:322] [certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T11:44:08.734377-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.058133 1544 kubeadm.go:322] [certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T11:44:08.73438-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.101472 1544 kubeadm.go:322] [certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T11:44:08.734384-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.186128 1544 kubeadm.go:322] [certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T11:44:08.734397-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.239008 1544 kubeadm.go:322] [certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T11:44:08.734401-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.239064 1544 kubeadm.go:322] [certs] etcd/server serving cert is signed for DNS names [addons-901000 localhost] and IPs [192.168.105.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:44:08.734404-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.325389 1544 kubeadm.go:322] [certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T11:44:08.734408-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.325448 1544 kubeadm.go:322] [certs] etcd/peer serving cert is signed for DNS names [addons-901000 localhost] and IPs [192.168.105.2 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:44:08.734412-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.429941 1544 kubeadm.go:322] [certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T11:44:08.734415-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.589937 1544 kubeadm.go:322] [certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T11:44:08.73447-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.786307 1544 kubeadm.go:322] [certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T11:44:08.734476-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.786348 1544 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:44:08.73448-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:49.846108 1544 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:44:08.734484-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.038048 1544 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:44:08.734542-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.316585 1544 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:44:08.734546-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.450220 1544 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:44:08.734585-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.456912 1544 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:44:08.734592-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.456960 1544 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:44:08.734596-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.456981 1544 kubeadm.go:322] [kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:44:08.734599-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.531576 1544 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:44:08.734603-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.534856 1544 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T11:44:08.734607-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.534903 1544 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:44:08.734617-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.534942 1544 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:44:08.734621-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.534977 1544 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:44:08.734625-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.535034 1544 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:44:08.734629-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:50.535114 1544 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:44:08.734633-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:54.535557 1544 kubeadm.go:322] [apiclient] All control plane components are healthy after 4.001250 seconds\n"} +{"Time":"2023-05-31T11:44:08.734638-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:54.535658 1544 kubeadm.go:322] [upload-config] Storing the configuration used in ConfigMap \"kubeadm-config\" in the \"kube-system\" Namespace\n"} +{"Time":"2023-05-31T11:44:08.734644-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:54.543285 1544 kubeadm.go:322] [kubelet] Creating a ConfigMap \"kubelet-config\" in namespace kube-system with the configuration for the kubelets in the cluster\n"} +{"Time":"2023-05-31T11:44:08.734648-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.060714 1544 kubeadm.go:322] [upload-certs] Skipping phase. Please see --upload-certs\n"} +{"Time":"2023-05-31T11:44:08.734652-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.060880 1544 kubeadm.go:322] [mark-control-plane] Marking the node addons-901000 as control-plane by adding the labels: [node-role.kubernetes.io/control-plane node.kubernetes.io/exclude-from-external-load-balancers]\n"} +{"Time":"2023-05-31T11:44:08.734656-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.566163 1544 kubeadm.go:322] [bootstrap-token] Using token: fdln59.o48tcrmvb1cxi2aa\n"} +{"Time":"2023-05-31T11:44:08.73466-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.571987 1544 out.go:204] - Configuring RBAC rules ...\n"} +{"Time":"2023-05-31T11:44:08.734663-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.572043 1544 kubeadm.go:322] [bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles\n"} +{"Time":"2023-05-31T11:44:08.734667-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.572943 1544 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to get nodes\n"} +{"Time":"2023-05-31T11:44:08.734671-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.580034 1544 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials\n"} +{"Time":"2023-05-31T11:44:08.734674-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.581278 1544 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token\n"} +{"Time":"2023-05-31T11:44:08.734678-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.582425 1544 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster\n"} +{"Time":"2023-05-31T11:44:08.734682-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.584407 1544 kubeadm.go:322] [bootstrap-token] Creating the \"cluster-info\" ConfigMap in the \"kube-public\" namespace\n"} +{"Time":"2023-05-31T11:44:08.734685-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.588284 1544 kubeadm.go:322] [kubelet-finalize] Updating \"/etc/kubernetes/kubelet.conf\" to point to a rotatable kubelet client certificate and key\n"} +{"Time":"2023-05-31T11:44:08.734689-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.740002 1544 kubeadm.go:322] [addons] Applied essential addon: CoreDNS\n"} +{"Time":"2023-05-31T11:44:08.734693-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976257 1544 kubeadm.go:322] [addons] Applied essential addon: kube-proxy\n"} +{"Time":"2023-05-31T11:44:08.734696-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976669 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734699-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976708 1544 kubeadm.go:322] Your Kubernetes control-plane has initialized successfully!\n"} +{"Time":"2023-05-31T11:44:08.73484-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976713 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734845-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976757 1544 kubeadm.go:322] To start using your cluster, you need to run the following as a regular user:\n"} +{"Time":"2023-05-31T11:44:08.734849-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976760 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734852-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976773 1544 kubeadm.go:322] mkdir -p $HOME/.kube\n"} +{"Time":"2023-05-31T11:44:08.734862-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976810 1544 kubeadm.go:322] sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config\n"} +{"Time":"2023-05-31T11:44:08.734865-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976848 1544 kubeadm.go:322] sudo chown $(id -u):$(id -g) $HOME/.kube/config\n"} +{"Time":"2023-05-31T11:44:08.734869-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976854 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734873-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976881 1544 kubeadm.go:322] Alternatively, if you are the root user, you can run:\n"} +{"Time":"2023-05-31T11:44:08.734877-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976883 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734905-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976912 1544 kubeadm.go:322] export KUBECONFIG=/etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T11:44:08.734912-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976948 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734916-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.976986 1544 kubeadm.go:322] You should now deploy a pod network to the cluster.\n"} +{"Time":"2023-05-31T11:44:08.734921-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977031 1544 kubeadm.go:322] Run \"kubectl apply -f [podnetwork].yaml\" with one of the options listed at:\n"} +{"Time":"2023-05-31T11:44:08.734925-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977067 1544 kubeadm.go:322] https://kubernetes.io/docs/concepts/cluster-administration/addons/\n"} +{"Time":"2023-05-31T11:44:08.734961-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977072 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734966-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977160 1544 kubeadm.go:322] You can now join any number of control-plane nodes by copying certificate authorities\n"} +{"Time":"2023-05-31T11:44:08.73497-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977220 1544 kubeadm.go:322] and service account keys on each node and then running the following as root:\n"} +{"Time":"2023-05-31T11:44:08.734974-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977223 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734977-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977280 1544 kubeadm.go:322] kubeadm join control-plane.minikube.internal:8443 --token fdln59.o48tcrmvb1cxi2aa \\\n"} +{"Time":"2023-05-31T11:44:08.734981-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977335 1544 kubeadm.go:322] \t--discovery-token-ca-cert-hash sha256:c0b872ca59dfdea0de4508a70b7bc5477f2020e7d748dccf465015401d65b410 \\\n"} +{"Time":"2023-05-31T11:44:08.734985-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977348 1544 kubeadm.go:322] \t--control-plane \n"} +{"Time":"2023-05-31T11:44:08.734988-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977351 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734992-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977396 1544 kubeadm.go:322] Then you can join any number of worker nodes by running the following on each as root:\n"} +{"Time":"2023-05-31T11:44:08.734995-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977400 1544 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:44:08.734999-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977453 1544 kubeadm.go:322] kubeadm join control-plane.minikube.internal:8443 --token fdln59.o48tcrmvb1cxi2aa \\\n"} +{"Time":"2023-05-31T11:44:08.735003-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977513 1544 kubeadm.go:322] \t--discovery-token-ca-cert-hash sha256:c0b872ca59dfdea0de4508a70b7bc5477f2020e7d748dccf465015401d65b410 \n"} +{"Time":"2023-05-31T11:44:08.735007-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977810 1544 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:44:08.735032-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.977908 1544 kubeadm.go:322] W0531 18:43:48.898735 1364 images.go:80] could not find officially supported version of etcd for Kubernetes v1.27.2, falling back to the nearest etcd version (3.5.7-0)\n"} +{"Time":"2023-05-31T11:44:08.735036-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.978007 1544 kubeadm.go:322] W0531 18:43:50.543800 1364 images.go:80] could not find officially supported version of etcd for Kubernetes v1.27.2, falling back to the nearest etcd version (3.5.7-0)\n"} +{"Time":"2023-05-31T11:44:08.73504-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.978018 1544 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:44:08.735044-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.978027 1544 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:44:08.735048-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.986527 1544 out.go:177] * Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T11:44:08.735051-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.989606 1544 ssh_runner.go:195] Run: sudo mkdir -p /etc/cni/net.d\n"} +{"Time":"2023-05-31T11:44:08.735055-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.992621 1544 ssh_runner.go:362] scp memory --\u003e /etc/cni/net.d/1-k8s.conflist (457 bytes)\n"} +{"Time":"2023-05-31T11:44:08.735058-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.997997 1544 ssh_runner.go:195] Run: /bin/bash -c \"cat /proc/$(pgrep kube-apiserver)/oom_adj\"\n"} +{"Time":"2023-05-31T11:44:08.735062-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.998066 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl create clusterrolebinding minikube-rbac --clusterrole=cluster-admin --serviceaccount=kube-system:default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735115-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:55.998080 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl label nodes minikube.k8s.io/version=v1.30.1 minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140 minikube.k8s.io/name=addons-901000 minikube.k8s.io/updated_at=2023_05_31T11_43_55_0700 minikube.k8s.io/primary=true --all --overwrite --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735122-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:56.013394 1544 ops.go:34] apiserver oom_adj: -16\n"} +{"Time":"2023-05-31T11:44:08.735125-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:56.078937 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735129-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:56.614138 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735133-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:57.114078 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735137-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:57.614038 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.73514-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:58.114051 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735144-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:58.614238 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735147-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:59.114252 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735151-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:43:59.614263 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735154-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:00.114301 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735158-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:00.612233 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735162-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:01.114244 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735166-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:01.614072 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735169-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:02.114215 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735306-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:02.613934 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735314-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:03.113942 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735318-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:03.614114 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735322-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:04.113318 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735326-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:04.613866 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735329-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:05.113291 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735333-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:05.614057 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735339-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:06.113889 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735344-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:06.614185 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735348-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:07.113853 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735351-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:07.613976 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735355-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.113868 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735359-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.612704 1544 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735363-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.651971 1544 kubeadm.go:1076] duration metric: took 12.654252042s to wait for elevateKubeSystemPrivileges.\n"} +{"Time":"2023-05-31T11:44:08.735366-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.651999 1544 kubeadm.go:406] StartCluster complete in 19.856541959s\n"} +{"Time":"2023-05-31T11:44:08.73537-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652012 1544 settings.go:142] acquiring lock: {Name:mk21b0706c1b317cf69100362f2296fa879c00d7 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.735374-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652172 1544 settings.go:150] Updating kubeconfig: /Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:44:08.735378-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652361 1544 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/kubeconfig: {Name:mk798616fa7d82f2defe425781279f8a2840bc7d Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:44:08.735382-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652562 1544 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml\"\n"} +{"Time":"2023-05-31T11:44:08.735388-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652607 1544 addons.go:496] enable addons start: toEnable=map[ambassador:false auto-pause:false cloud-spanner:true csi-hostpath-driver:true dashboard:false default-storageclass:true efk:false freshpod:false gcp-auth:true gvisor:false headlamp:false helm-tiller:false inaccel:false ingress:true ingress-dns:true inspektor-gadget:true istio:false istio-provisioner:false kong:false kubevirt:false logviewer:false metallb:false metrics-server:true nvidia-driver-installer:false nvidia-gpu-device-plugin:false olm:false pod-security-policy:false portainer:false registry:true registry-aliases:false registry-creds:false storage-provisioner:true storage-provisioner-gluster:false volumesnapshots:true]\n"} +{"Time":"2023-05-31T11:44:08.735399-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652675 1544 addons.go:66] Setting volumesnapshots=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735403-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652684 1544 addons.go:228] Setting addon volumesnapshots=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735406-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652702 1544 addons.go:66] Setting csi-hostpath-driver=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.73541-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652705 1544 addons.go:66] Setting ingress=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735413-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652715 1544 addons.go:228] Setting addon ingress=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735598-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652718 1544 addons.go:228] Setting addon csi-hostpath-driver=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735603-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652746 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.735607-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652751 1544 addons.go:66] Setting gcp-auth=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735611-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652754 1544 addons.go:66] Setting inspektor-gadget=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735614-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652757 1544 mustload.go:65] Loading cluster: addons-901000\n"} +{"Time":"2023-05-31T11:44:08.735634-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652758 1544 addons.go:228] Setting addon inspektor-gadget=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735638-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652768 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.735641-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652776 1544 addons.go:66] Setting default-storageclass=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735645-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652811 1544 addons.go:66] Setting registry=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735648-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652824 1544 addons.go:228] Setting addon registry=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735652-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652808 1544 addons.go:66] Setting cloud-spanner=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735655-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652832 1544 config.go:182] Loaded profile config \"addons-901000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.735659-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652825 1544 addons_storage_classes.go:33] enableOrDisableStorageClasses default-storageclass=true on \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.73568-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652847 1544 addons.go:228] Setting addon cloud-spanner=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735685-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652888 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.735689-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652907 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.735693-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652951 1544 config.go:182] Loaded profile config \"addons-901000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:44:08.735697-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652781 1544 addons.go:66] Setting ingress-dns=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735701-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653043 1544 addons.go:228] Setting addon ingress-dns=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.73589-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653104 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.735977-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652956 1544 addons.go:66] Setting storage-provisioner=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735982-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653232 1544 addons.go:228] Setting addon storage-provisioner=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.735987-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653243 1544 host.go:54] host status for \"addons-901000\" returned error: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.735991-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653255 1544 addons_storage_classes.go:55] \"addons-901000\" is not running, writing default-storageclass=true to disk and skipping enablement\n"} +{"Time":"2023-05-31T11:44:08.735996-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653258 1544 addons.go:228] Setting addon default-storageclass=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.736007-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653260 1544 host.go:54] host status for \"addons-901000\" returned error: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.736011-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653264 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.736015-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653266 1544 addons.go:274] \"addons-901000\" is not running, setting volumesnapshots=true and skipping enablement (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:44:08.736019-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652746 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.736023-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653269 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.736026-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652751 1544 addons.go:66] Setting metrics-server=true in profile \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.73603-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653405 1544 addons.go:228] Setting addon metrics-server=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.736034-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653419 1544 host.go:54] host status for \"addons-901000\" returned error: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.736039-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653425 1544 addons.go:274] \"addons-901000\" is not running, setting ingress-dns=true and skipping enablement (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:44:08.736043-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653454 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.736047-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653497 1544 host.go:54] host status for \"addons-901000\" returned error: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.73609-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653504 1544 addons.go:274] \"addons-901000\" is not running, setting csi-hostpath-driver=true and skipping enablement (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:44:08.736095-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.653507 1544 addons.go:464] Verifying addon csi-hostpath-driver=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.736099-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653512 1544 host.go:54] host status for \"addons-901000\" returned error: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.736103-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653517 1544 addons.go:274] \"addons-901000\" is not running, setting default-storageclass=true and skipping enablement (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:44:08.736107-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.657789 1544 out.go:177] * Verifying csi-hostpath-driver addon...\n"} +{"Time":"2023-05-31T11:44:08.736111-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.652746 1544 host.go:66] Checking if \"addons-901000\" exists ...\n"} +{"Time":"2023-05-31T11:44:08.736114-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653633 1544 host.go:54] host status for \"addons-901000\" returned error: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.736118-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653670 1544 host.go:54] host status for \"addons-901000\" returned error: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.736123-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.653672 1544 host.go:54] host status for \"addons-901000\" returned error: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.736127-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.667920 1544 addons.go:274] \"addons-901000\" is not running, setting storage-provisioner=true and skipping enablement (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:44:08.73613-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.667920 1544 addons.go:274] \"addons-901000\" is not running, setting metrics-server=true and skipping enablement (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:44:08.736135-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.667941 1544 addons.go:274] \"addons-901000\" is not running, setting registry=true and skipping enablement (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:44:08.736138-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.668354 1544 kapi.go:75] Waiting for pod with label \"kubernetes.io/minikube-addons=csi-hostpath-driver\" in ns \"kube-system\" ...\n"} +{"Time":"2023-05-31T11:44:08.736142-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.671825 1544 out.go:177] \n"} +{"Time":"2023-05-31T11:44:08.736156-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.675801 1544 out.go:177] - Using image ghcr.io/inspektor-gadget/inspektor-gadget:v0.16.1\n"} +{"Time":"2023-05-31T11:44:08.736283-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.675809 1544 out.go:177] - Using image registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794\n"} +{"Time":"2023-05-31T11:44:08.736289-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.675815 1544 addons.go:464] Verifying addon metrics-server=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.7363-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.675803 1544 out.go:177] - Using image gcr.io/cloud-spanner-emulator/emulator:1.5.5\n"} +{"Time":"2023-05-31T11:44:08.736306-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.679821 1544 addons.go:420] installing /etc/kubernetes/addons/ig-namespace.yaml\n"} +{"Time":"2023-05-31T11:44:08.73631-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.685828 1544 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/ig-namespace.yaml (55 bytes)\n"} +{"Time":"2023-05-31T11:44:08.736314-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.685839 1544 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.2 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:44:08.736318-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.685843 1544 addons.go:420] installing /etc/kubernetes/addons/deployment.yaml\n"} +{"Time":"2023-05-31T11:44:08.736321-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.685846 1544 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/deployment.yaml (1003 bytes)\n"} +{"Time":"2023-05-31T11:44:08.736325-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.685851 1544 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.2 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:44:08.736357-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.688730 1544 out.go:177] - Using image registry.k8s.io/ingress-nginx/kube-webhook-certgen:v20230312-helm-chart-4.5.2-28-g66a760794\n"} +{"Time":"2023-05-31T11:44:08.736363-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.688746 1544 out.go:239] X Exiting due to GUEST_STATUS: Unable to get machine status: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.736367-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.678264 1544 kapi.go:86] Found 0 Pods for label selector kubernetes.io/minikube-addons=csi-hostpath-driver\n"} +{"Time":"2023-05-31T11:44:08.736388-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.675818 1544 addons.go:464] Verifying addon registry=true in \"addons-901000\"\n"} +{"Time":"2023-05-31T11:44:08.736393-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.697814 1544 out.go:177] - Using image registry.k8s.io/ingress-nginx/controller:v1.7.0\n"} +{"Time":"2023-05-31T11:44:08.736397-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tX Exiting due to GUEST_STATUS: Unable to get machine status: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:44:08.736438-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.704792 1544 out.go:177] * Verifying registry addon...\n"} +{"Time":"2023-05-31T11:44:08.736443-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.697870 1544 out.go:239] * \n"} +{"Time":"2023-05-31T11:44:08.736447-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.701795 1544 addons.go:420] installing /etc/kubernetes/addons/ingress-deploy.yaml\n"} +{"Time":"2023-05-31T11:44:08.736451-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.702591 1544 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml | sed -e '/^ forward . \\/etc\\/resolv.conf.*/i \\ hosts {\\n 192.168.105.1 host.minikube.internal\\n fallthrough\\n }' -e '/^ errors *$/i \\ log' | sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig replace -f -\"\n"} +{"Time":"2023-05-31T11:44:08.736457-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.712800 1544 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/ingress-deploy.yaml (16145 bytes)\n"} +{"Time":"2023-05-31T11:44:08.736461-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.712810 1544 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.2 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/addons-901000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:44:08.736465-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t* \n"} +{"Time":"2023-05-31T11:44:08.736468-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.713159 1544 kapi.go:75] Waiting for pod with label \"kubernetes.io/minikube-addons=registry\" in ns \"kube-system\" ...\n"} +{"Time":"2023-05-31T11:44:08.736473-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tW0531 11:44:08.713289 1544 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:44:08.736478-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:44:08.736492-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:44:08.736499-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:44:08.736506-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:44:08.736546-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:44:08.736553-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:44:08.736555-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:44:08.736557-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:44:08.736559-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:44:08.736561-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:44:08.736563-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:44:08.736564-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:44:08.736565-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:44:08.736567-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:44:08.736569-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:44:08.73657-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.716814 1544 out.go:177] \n"} +{"Time":"2023-05-31T11:44:08.736572-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \tI0531 11:44:08.714808 1544 kapi.go:86] Found 0 Pods for label selector kubernetes.io/minikube-addons=registry\n"} +{"Time":"2023-05-31T11:44:08.736574-07:00","Action":"output","Test":"TestAddons/Setup","Output":" \n"} +{"Time":"2023-05-31T11:44:08.736575-07:00","Action":"output","Test":"TestAddons/Setup","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:44:08.736577-07:00","Action":"output","Test":"TestAddons/Setup","Output":" addons_test.go:90: out/minikube-darwin-arm64 start -p addons-901000 --wait=true --memory=4000 --alsologtostderr --addons=registry --addons=metrics-server --addons=volumesnapshots --addons=csi-hostpath-driver --addons=gcp-auth --addons=cloud-spanner --addons=inspektor-gadget --driver=qemu2 --addons=ingress --addons=ingress-dns failed: exit status 80\n"} +{"Time":"2023-05-31T11:44:08.73658-07:00","Action":"output","Test":"TestAddons","Output":" addons_test.go:96: Failed setup for addon tests\n"} +{"Time":"2023-05-31T11:44:08.736582-07:00","Action":"output","Test":"TestAddons","Output":" helpers_test.go:175: Cleaning up \"addons-901000\" profile ...\n"} +{"Time":"2023-05-31T11:44:08.736584-07:00","Action":"output","Test":"TestAddons","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p addons-901000\n"} +{"Time":"2023-05-31T11:44:08.883338-07:00","Action":"output","Test":"TestAddons","Output":"--- FAIL: TestAddons (43.60s)\n"} +{"Time":"2023-05-31T11:44:08.883354-07:00","Action":"output","Test":"TestAddons/Setup","Output":" --- FAIL: TestAddons/Setup (43.45s)\n"} +{"Time":"2023-05-31T11:44:08.883538-07:00","Action":"fail","Test":"TestAddons/Setup","Elapsed":43.45} +{"Time":"2023-05-31T11:44:08.883545-07:00","Action":"fail","Test":"TestAddons","Elapsed":43.6} +{"Time":"2023-05-31T11:44:08.883548-07:00","Action":"run","Test":"TestCertOptions"} +{"Time":"2023-05-31T11:44:08.883549-07:00","Action":"output","Test":"TestCertOptions","Output":"=== RUN TestCertOptions\n"} +{"Time":"2023-05-31T11:44:08.883552-07:00","Action":"output","Test":"TestCertOptions","Output":"=== PAUSE TestCertOptions\n"} +{"Time":"2023-05-31T11:44:08.883553-07:00","Action":"pause","Test":"TestCertOptions"} +{"Time":"2023-05-31T11:44:08.883571-07:00","Action":"run","Test":"TestCertExpiration"} +{"Time":"2023-05-31T11:44:08.883573-07:00","Action":"output","Test":"TestCertExpiration","Output":"=== RUN TestCertExpiration\n"} +{"Time":"2023-05-31T11:44:08.883574-07:00","Action":"output","Test":"TestCertExpiration","Output":"=== PAUSE TestCertExpiration\n"} +{"Time":"2023-05-31T11:44:08.883576-07:00","Action":"pause","Test":"TestCertExpiration"} +{"Time":"2023-05-31T11:44:08.883577-07:00","Action":"run","Test":"TestDockerFlags"} +{"Time":"2023-05-31T11:44:08.883578-07:00","Action":"output","Test":"TestDockerFlags","Output":"=== RUN TestDockerFlags\n"} +{"Time":"2023-05-31T11:44:08.88358-07:00","Action":"output","Test":"TestDockerFlags","Output":"=== PAUSE TestDockerFlags\n"} +{"Time":"2023-05-31T11:44:08.883581-07:00","Action":"pause","Test":"TestDockerFlags"} +{"Time":"2023-05-31T11:44:08.883582-07:00","Action":"run","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T11:44:08.883584-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"=== RUN TestForceSystemdFlag\n"} +{"Time":"2023-05-31T11:44:08.883615-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"=== PAUSE TestForceSystemdFlag\n"} +{"Time":"2023-05-31T11:44:08.883617-07:00","Action":"pause","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T11:44:08.883619-07:00","Action":"run","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T11:44:08.88362-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"=== RUN TestForceSystemdEnv\n"} +{"Time":"2023-05-31T11:44:08.883622-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"=== PAUSE TestForceSystemdEnv\n"} +{"Time":"2023-05-31T11:44:08.883623-07:00","Action":"pause","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T11:44:08.883625-07:00","Action":"run","Test":"TestKVMDriverInstallOrUpdate"} +{"Time":"2023-05-31T11:44:08.883627-07:00","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":"=== RUN TestKVMDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T11:44:08.88366-07:00","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":" driver_install_or_update_test.go:41: Skip if not linux.\n"} +{"Time":"2023-05-31T11:44:08.883699-07:00","Action":"output","Test":"TestKVMDriverInstallOrUpdate","Output":"--- SKIP: TestKVMDriverInstallOrUpdate (0.00s)\n"} +{"Time":"2023-05-31T11:44:08.883706-07:00","Action":"skip","Test":"TestKVMDriverInstallOrUpdate","Elapsed":0} +{"Time":"2023-05-31T11:44:08.88371-07:00","Action":"run","Test":"TestHyperKitDriverInstallOrUpdate"} +{"Time":"2023-05-31T11:44:08.883713-07:00","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"=== RUN TestHyperKitDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T11:44:08.88374-07:00","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"=== PAUSE TestHyperKitDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T11:44:08.883744-07:00","Action":"pause","Test":"TestHyperKitDriverInstallOrUpdate"} +{"Time":"2023-05-31T11:44:08.883746-07:00","Action":"run","Test":"TestHyperkitDriverSkipUpgrade"} +{"Time":"2023-05-31T11:44:08.883748-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"=== RUN TestHyperkitDriverSkipUpgrade\n"} +{"Time":"2023-05-31T11:44:08.883753-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"=== PAUSE TestHyperkitDriverSkipUpgrade\n"} +{"Time":"2023-05-31T11:44:08.883754-07:00","Action":"pause","Test":"TestHyperkitDriverSkipUpgrade"} +{"Time":"2023-05-31T11:44:08.883755-07:00","Action":"run","Test":"TestErrorSpam"} +{"Time":"2023-05-31T11:44:08.883757-07:00","Action":"output","Test":"TestErrorSpam","Output":"=== RUN TestErrorSpam\n"} +{"Time":"2023-05-31T11:44:08.883875-07:00","Action":"run","Test":"TestErrorSpam/setup"} +{"Time":"2023-05-31T11:44:08.883878-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":"=== RUN TestErrorSpam/setup\n"} +{"Time":"2023-05-31T11:44:08.883943-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":" error_spam_test.go:81: (dbg) Run: out/minikube-darwin-arm64 start -p nospam-694000 -n=1 --memory=2250 --wait=false --log_dir=/var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:44:39.117181-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":" error_spam_test.go:81: (dbg) Done: out/minikube-darwin-arm64 start -p nospam-694000 -n=1 --memory=2250 --wait=false --log_dir=/var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 --driver=qemu2 : (30.233893292s)\n"} +{"Time":"2023-05-31T11:44:39.117268-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":" error_spam_test.go:91: acceptable stderr: \"! /usr/local/bin/kubectl is version 1.25.9, which may have incompatibilities with Kubernetes 1.27.2.\"\n"} +{"Time":"2023-05-31T11:44:39.117279-07:00","Action":"run","Test":"TestErrorSpam/start"} +{"Time":"2023-05-31T11:44:39.117281-07:00","Action":"output","Test":"TestErrorSpam/start","Output":"=== RUN TestErrorSpam/start\n"} +{"Time":"2023-05-31T11:44:39.117427-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:216: Cleaning up 1 logfile(s) ...\n"} +{"Time":"2023-05-31T11:44:39.117651-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 start --dry-run\n"} +{"Time":"2023-05-31T11:44:39.228606-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 start --dry-run\n"} +{"Time":"2023-05-31T11:44:39.333791-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 start --dry-run\n"} +{"Time":"2023-05-31T11:44:39.434478-07:00","Action":"run","Test":"TestErrorSpam/status"} +{"Time":"2023-05-31T11:44:39.434489-07:00","Action":"output","Test":"TestErrorSpam/status","Output":"=== RUN TestErrorSpam/status\n"} +{"Time":"2023-05-31T11:44:39.434527-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T11:44:39.434619-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 status\n"} +{"Time":"2023-05-31T11:44:39.51985-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 status\n"} +{"Time":"2023-05-31T11:44:39.604102-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 status\n"} +{"Time":"2023-05-31T11:44:39.692546-07:00","Action":"run","Test":"TestErrorSpam/pause"} +{"Time":"2023-05-31T11:44:39.692558-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":"=== RUN TestErrorSpam/pause\n"} +{"Time":"2023-05-31T11:44:39.692602-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T11:44:39.69262-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 pause\n"} +{"Time":"2023-05-31T11:44:39.989174-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 pause\n"} +{"Time":"2023-05-31T11:44:40.183564-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 pause\n"} +{"Time":"2023-05-31T11:44:40.367598-07:00","Action":"run","Test":"TestErrorSpam/unpause"} +{"Time":"2023-05-31T11:44:40.367612-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":"=== RUN TestErrorSpam/unpause\n"} +{"Time":"2023-05-31T11:44:40.36765-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T11:44:40.367668-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 unpause\n"} +{"Time":"2023-05-31T11:44:40.592976-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 unpause\n"} +{"Time":"2023-05-31T11:44:40.800073-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 unpause\n"} +{"Time":"2023-05-31T11:44:40.994806-07:00","Action":"run","Test":"TestErrorSpam/stop"} +{"Time":"2023-05-31T11:44:40.994818-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":"=== RUN TestErrorSpam/stop\n"} +{"Time":"2023-05-31T11:44:40.994853-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:216: Cleaning up 0 logfile(s) ...\n"} +{"Time":"2023-05-31T11:44:40.994873-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 stop\n"} +{"Time":"2023-05-31T11:44:53.072432-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Done: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 stop: (12.077517042s)\n"} +{"Time":"2023-05-31T11:44:53.072494-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:159: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 stop\n"} +{"Time":"2023-05-31T11:44:53.171474-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" error_spam_test.go:182: (dbg) Run: out/minikube-darwin-arm64 -p nospam-694000 --log_dir /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/nospam-694000 stop\n"} +{"Time":"2023-05-31T11:44:53.234468-07:00","Action":"output","Test":"TestErrorSpam","Output":" helpers_test.go:175: Cleaning up \"nospam-694000\" profile ...\n"} +{"Time":"2023-05-31T11:44:53.23448-07:00","Action":"output","Test":"TestErrorSpam","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p nospam-694000\n"} +{"Time":"2023-05-31T11:44:53.376701-07:00","Action":"output","Test":"TestErrorSpam","Output":"--- PASS: TestErrorSpam (44.49s)\n"} +{"Time":"2023-05-31T11:44:53.376715-07:00","Action":"output","Test":"TestErrorSpam/setup","Output":" --- PASS: TestErrorSpam/setup (30.23s)\n"} +{"Time":"2023-05-31T11:44:53.376717-07:00","Action":"pass","Test":"TestErrorSpam/setup","Elapsed":30.23} +{"Time":"2023-05-31T11:44:53.376721-07:00","Action":"output","Test":"TestErrorSpam/start","Output":" --- PASS: TestErrorSpam/start (0.32s)\n"} +{"Time":"2023-05-31T11:44:53.376722-07:00","Action":"pass","Test":"TestErrorSpam/start","Elapsed":0.32} +{"Time":"2023-05-31T11:44:53.376724-07:00","Action":"output","Test":"TestErrorSpam/status","Output":" --- PASS: TestErrorSpam/status (0.26s)\n"} +{"Time":"2023-05-31T11:44:53.376725-07:00","Action":"pass","Test":"TestErrorSpam/status","Elapsed":0.26} +{"Time":"2023-05-31T11:44:53.376727-07:00","Action":"output","Test":"TestErrorSpam/pause","Output":" --- PASS: TestErrorSpam/pause (0.68s)\n"} +{"Time":"2023-05-31T11:44:53.376729-07:00","Action":"pass","Test":"TestErrorSpam/pause","Elapsed":0.68} +{"Time":"2023-05-31T11:44:53.37673-07:00","Action":"output","Test":"TestErrorSpam/unpause","Output":" --- PASS: TestErrorSpam/unpause (0.63s)\n"} +{"Time":"2023-05-31T11:44:53.376732-07:00","Action":"pass","Test":"TestErrorSpam/unpause","Elapsed":0.63} +{"Time":"2023-05-31T11:44:53.376733-07:00","Action":"output","Test":"TestErrorSpam/stop","Output":" --- PASS: TestErrorSpam/stop (12.24s)\n"} +{"Time":"2023-05-31T11:44:53.376736-07:00","Action":"pass","Test":"TestErrorSpam/stop","Elapsed":12.24} +{"Time":"2023-05-31T11:44:53.376737-07:00","Action":"pass","Test":"TestErrorSpam","Elapsed":44.49} +{"Time":"2023-05-31T11:44:53.376738-07:00","Action":"run","Test":"TestFunctional"} +{"Time":"2023-05-31T11:44:53.37674-07:00","Action":"output","Test":"TestFunctional","Output":"=== RUN TestFunctional\n"} +{"Time":"2023-05-31T11:44:53.37675-07:00","Action":"run","Test":"TestFunctional/serial"} +{"Time":"2023-05-31T11:44:53.376751-07:00","Action":"output","Test":"TestFunctional/serial","Output":"=== RUN TestFunctional/serial\n"} +{"Time":"2023-05-31T11:44:53.376779-07:00","Action":"run","Test":"TestFunctional/serial/CopySyncFile"} +{"Time":"2023-05-31T11:44:53.376783-07:00","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":"=== RUN TestFunctional/serial/CopySyncFile\n"} +{"Time":"2023-05-31T11:44:53.376818-07:00","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":" functional_test.go:1850: local sync path: /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/test/nested/copy/1477/hosts\n"} +{"Time":"2023-05-31T11:44:53.37788-07:00","Action":"run","Test":"TestFunctional/serial/StartWithProxy"} +{"Time":"2023-05-31T11:44:53.377891-07:00","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":"=== RUN TestFunctional/serial/StartWithProxy\n"} +{"Time":"2023-05-31T11:44:53.378601-07:00","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" functional_test.go:2229: (dbg) Run: out/minikube-darwin-arm64 start -p functional-730000 --memory=4000 --apiserver-port=8441 --wait=all --driver=qemu2 \n"} +{"Time":"2023-05-31T11:45:41.799632-07:00","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" functional_test.go:2229: (dbg) Done: out/minikube-darwin-arm64 start -p functional-730000 --memory=4000 --apiserver-port=8441 --wait=all --driver=qemu2 : (48.422138375s)\n"} +{"Time":"2023-05-31T11:45:41.79965-07:00","Action":"run","Test":"TestFunctional/serial/AuditLog"} +{"Time":"2023-05-31T11:45:41.799652-07:00","Action":"output","Test":"TestFunctional/serial/AuditLog","Output":"=== RUN TestFunctional/serial/AuditLog\n"} +{"Time":"2023-05-31T11:45:41.799754-07:00","Action":"run","Test":"TestFunctional/serial/SoftStart"} +{"Time":"2023-05-31T11:45:41.799758-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":"=== RUN TestFunctional/serial/SoftStart\n"} +{"Time":"2023-05-31T11:45:41.800113-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:654: (dbg) Run: out/minikube-darwin-arm64 start -p functional-730000 --alsologtostderr -v=8\n"} +{"Time":"2023-05-31T11:46:15.699813-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:654: (dbg) Done: out/minikube-darwin-arm64 start -p functional-730000 --alsologtostderr -v=8: (33.859334584s)\n"} +{"Time":"2023-05-31T11:46:15.699828-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" functional_test.go:658: soft start took 33.859743625s for \"functional-730000\" cluster.\n"} +{"Time":"2023-05-31T11:46:15.700054-07:00","Action":"run","Test":"TestFunctional/serial/KubeContext"} +{"Time":"2023-05-31T11:46:15.700058-07:00","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":"=== RUN TestFunctional/serial/KubeContext\n"} +{"Time":"2023-05-31T11:46:15.700114-07:00","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":" functional_test.go:676: (dbg) Run: kubectl config current-context\n"} +{"Time":"2023-05-31T11:46:15.73065-07:00","Action":"run","Test":"TestFunctional/serial/KubectlGetPods"} +{"Time":"2023-05-31T11:46:15.730662-07:00","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":"=== RUN TestFunctional/serial/KubectlGetPods\n"} +{"Time":"2023-05-31T11:46:15.730734-07:00","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":" functional_test.go:691: (dbg) Run: kubectl --context functional-730000 get po -A\n"} +{"Time":"2023-05-31T11:46:15.779992-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd"} +{"Time":"2023-05-31T11:46:15.780007-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd","Output":"=== RUN TestFunctional/serial/CacheCmd\n"} +{"Time":"2023-05-31T11:46:15.780023-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache"} +{"Time":"2023-05-31T11:46:15.780025-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache","Output":"=== RUN TestFunctional/serial/CacheCmd/cache\n"} +{"Time":"2023-05-31T11:46:15.780042-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/add_remote"} +{"Time":"2023-05-31T11:46:15.780046-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/add_remote\n"} +{"Time":"2023-05-31T11:46:15.780106-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 cache add registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T11:46:18.060546-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 cache add registry.k8s.io/pause:3.1: (2.279453167s)\n"} +{"Time":"2023-05-31T11:46:18.060562-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 cache add registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T11:46:20.134244-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 cache add registry.k8s.io/pause:3.3: (2.072895125s)\n"} +{"Time":"2023-05-31T11:46:20.13426-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 cache add registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:46:21.723635-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" functional_test.go:1044: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 cache add registry.k8s.io/pause:latest: (1.588834s)\n"} +{"Time":"2023-05-31T11:46:21.723666-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/add_local"} +{"Time":"2023-05-31T11:46:21.723669-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/add_local\n"} +{"Time":"2023-05-31T11:46:21.724346-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1072: (dbg) Run: docker build -t minikube-local-cache-test:functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalserialCacheCmdcacheadd_local2368023089/001\n"} +{"Time":"2023-05-31T11:46:22.104901-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1084: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 cache add minikube-local-cache-test:functional-730000\n"} +{"Time":"2023-05-31T11:46:22.948604-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1089: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 cache delete minikube-local-cache-test:functional-730000\n"} +{"Time":"2023-05-31T11:46:22.982084-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" functional_test.go:1078: (dbg) Run: docker rmi minikube-local-cache-test:functional-730000\n"} +{"Time":"2023-05-31T11:46:23.032689-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete"} +{"Time":"2023-05-31T11:46:23.032701-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/CacheDelete\n"} +{"Time":"2023-05-31T11:46:23.032704-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":" functional_test.go:1097: (dbg) Run: out/minikube-darwin-arm64 cache delete registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T11:46:23.066038-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/list"} +{"Time":"2023-05-31T11:46:23.066059-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/list\n"} +{"Time":"2023-05-31T11:46:23.066064-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":" functional_test.go:1105: (dbg) Run: out/minikube-darwin-arm64 cache list\n"} +{"Time":"2023-05-31T11:46:23.099037-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node"} +{"Time":"2023-05-31T11:46:23.099048-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node\n"} +{"Time":"2023-05-31T11:46:23.099067-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":" functional_test.go:1119: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh sudo crictl images\n"} +{"Time":"2023-05-31T11:46:23.172279-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload"} +{"Time":"2023-05-31T11:46:23.17229-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/cache_reload\n"} +{"Time":"2023-05-31T11:46:23.172307-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1142: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh sudo docker rmi registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:46:23.248263-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1148: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh sudo crictl inspecti registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:46:23.319214-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1148: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 ssh sudo crictl inspecti registry.k8s.io/pause:latest: exit status 1 (70.820708ms)\n"} +{"Time":"2023-05-31T11:46:23.319227-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T11:46:23.319229-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:46:23.319231-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \t\u001b[31mFATA\u001b[0m[0000] no such image \"registry.k8s.io/pause:latest\" present \n"} +{"Time":"2023-05-31T11:46:23.319232-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T11:46:23.319241-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:46:23.319242-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:46:23.319244-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:46:23.319245-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" \n"} +{"Time":"2023-05-31T11:46:23.319246-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:46:23.319248-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1153: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 cache reload\n"} +{"Time":"2023-05-31T11:46:24.437019-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1153: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 cache reload: (1.117466708s)\n"} +{"Time":"2023-05-31T11:46:24.437039-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" functional_test.go:1158: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh sudo crictl inspecti registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:46:24.512814-07:00","Action":"run","Test":"TestFunctional/serial/CacheCmd/cache/delete"} +{"Time":"2023-05-31T11:46:24.512828-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":"=== RUN TestFunctional/serial/CacheCmd/cache/delete\n"} +{"Time":"2023-05-31T11:46:24.512853-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" functional_test.go:1167: (dbg) Run: out/minikube-darwin-arm64 cache delete registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T11:46:24.546581-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" functional_test.go:1167: (dbg) Run: out/minikube-darwin-arm64 cache delete registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:46:24.577883-07:00","Action":"run","Test":"TestFunctional/serial/MinikubeKubectlCmd"} +{"Time":"2023-05-31T11:46:24.577894-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":"=== RUN TestFunctional/serial/MinikubeKubectlCmd\n"} +{"Time":"2023-05-31T11:46:24.577905-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":" functional_test.go:711: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 kubectl -- --context functional-730000 get pods\n"} +{"Time":"2023-05-31T11:46:25.072334-07:00","Action":"run","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly"} +{"Time":"2023-05-31T11:46:25.072346-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":"=== RUN TestFunctional/serial/MinikubeKubectlCmdDirectly\n"} +{"Time":"2023-05-31T11:46:25.072611-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":" functional_test.go:736: (dbg) Run: out/kubectl --context functional-730000 get pods\n"} +{"Time":"2023-05-31T11:46:25.606599-07:00","Action":"run","Test":"TestFunctional/serial/ExtraConfig"} +{"Time":"2023-05-31T11:46:25.606611-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":"=== RUN TestFunctional/serial/ExtraConfig\n"} +{"Time":"2023-05-31T11:46:25.606659-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:752: (dbg) Run: out/minikube-darwin-arm64 start -p functional-730000 --extra-config=apiserver.enable-admission-plugins=NamespaceAutoProvision --wait=all\n"} +{"Time":"2023-05-31T11:47:02.010764-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:752: (dbg) Done: out/minikube-darwin-arm64 start -p functional-730000 --extra-config=apiserver.enable-admission-plugins=NamespaceAutoProvision --wait=all: (36.401204833s)\n"} +{"Time":"2023-05-31T11:47:02.010779-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" functional_test.go:756: restart took 36.401308166s for \"functional-730000\" cluster.\n"} +{"Time":"2023-05-31T11:47:02.010971-07:00","Action":"run","Test":"TestFunctional/serial/ComponentHealth"} +{"Time":"2023-05-31T11:47:02.010976-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":"=== RUN TestFunctional/serial/ComponentHealth\n"} +{"Time":"2023-05-31T11:47:02.011047-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:805: (dbg) Run: kubectl --context functional-730000 get po -l tier=control-plane -n kube-system -o=json\n"} +{"Time":"2023-05-31T11:47:02.053787-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: etcd phase: Running\n"} +{"Time":"2023-05-31T11:47:02.053801-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: etcd status: Ready\n"} +{"Time":"2023-05-31T11:47:02.053803-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-apiserver phase: Running\n"} +{"Time":"2023-05-31T11:47:02.053805-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-apiserver status: Ready\n"} +{"Time":"2023-05-31T11:47:02.053807-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-controller-manager phase: Running\n"} +{"Time":"2023-05-31T11:47:02.053808-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-controller-manager status: Ready\n"} +{"Time":"2023-05-31T11:47:02.053809-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:820: kube-scheduler phase: Running\n"} +{"Time":"2023-05-31T11:47:02.053811-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" functional_test.go:830: kube-scheduler status: Ready\n"} +{"Time":"2023-05-31T11:47:02.053814-07:00","Action":"run","Test":"TestFunctional/serial/LogsCmd"} +{"Time":"2023-05-31T11:47:02.053816-07:00","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":"=== RUN TestFunctional/serial/LogsCmd\n"} +{"Time":"2023-05-31T11:47:02.053817-07:00","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":" functional_test.go:1231: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 logs\n"} +{"Time":"2023-05-31T11:47:02.695939-07:00","Action":"run","Test":"TestFunctional/serial/LogsFileCmd"} +{"Time":"2023-05-31T11:47:02.695952-07:00","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":"=== RUN TestFunctional/serial/LogsFileCmd\n"} +{"Time":"2023-05-31T11:47:02.696169-07:00","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":" functional_test.go:1245: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 logs --file /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalserialLogsFileCmd3523057780/001/logs.txt\n"} +{"Time":"2023-05-31T11:47:03.346612-07:00","Action":"run","Test":"TestFunctional/parallel"} +{"Time":"2023-05-31T11:47:03.346629-07:00","Action":"output","Test":"TestFunctional/parallel","Output":"=== RUN TestFunctional/parallel\n"} +{"Time":"2023-05-31T11:47:03.346633-07:00","Action":"run","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T11:47:03.346634-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== RUN TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T11:47:03.346645-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== PAUSE TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T11:47:03.346646-07:00","Action":"pause","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T11:47:03.346647-07:00","Action":"run","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T11:47:03.346648-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== RUN TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T11:47:03.346651-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== PAUSE TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T11:47:03.346652-07:00","Action":"pause","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T11:47:03.346653-07:00","Action":"run","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T11:47:03.346654-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== RUN TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T11:47:03.346656-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== PAUSE TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T11:47:03.346657-07:00","Action":"pause","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T11:47:03.346658-07:00","Action":"run","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T11:47:03.34666-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== RUN TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T11:47:03.346662-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== PAUSE TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T11:47:03.346663-07:00","Action":"pause","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T11:47:03.346664-07:00","Action":"run","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T11:47:03.346665-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== RUN TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T11:47:03.346667-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== PAUSE TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T11:47:03.346668-07:00","Action":"pause","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T11:47:03.346673-07:00","Action":"run","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T11:47:03.346674-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== RUN TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T11:47:03.346676-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== PAUSE TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T11:47:03.346678-07:00","Action":"pause","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T11:47:03.346699-07:00","Action":"run","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T11:47:03.3467-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== RUN TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T11:47:03.346701-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== PAUSE TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T11:47:03.346703-07:00","Action":"pause","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T11:47:03.346704-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T11:47:03.346705-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== RUN TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T11:47:03.346707-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== PAUSE TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T11:47:03.346708-07:00","Action":"pause","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T11:47:03.346709-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T11:47:03.346711-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== RUN TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T11:47:03.346724-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== PAUSE TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T11:47:03.346728-07:00","Action":"pause","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T11:47:03.34673-07:00","Action":"run","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T11:47:03.346732-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== RUN TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T11:47:03.346742-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== PAUSE TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T11:47:03.346746-07:00","Action":"pause","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T11:47:03.346748-07:00","Action":"run","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T11:47:03.346749-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== RUN TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T11:47:03.346751-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== PAUSE TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T11:47:03.346752-07:00","Action":"pause","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T11:47:03.346754-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T11:47:03.346756-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== RUN TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T11:47:03.34676-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== PAUSE TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T11:47:03.346762-07:00","Action":"pause","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T11:47:03.346763-07:00","Action":"run","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T11:47:03.346764-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== RUN TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T11:47:03.346766-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== PAUSE TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T11:47:03.346767-07:00","Action":"pause","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T11:47:03.346856-07:00","Action":"run","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T11:47:03.346874-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== RUN TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T11:47:03.346897-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== PAUSE TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T11:47:03.346899-07:00","Action":"pause","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T11:47:03.3469-07:00","Action":"run","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T11:47:03.346901-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== RUN TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T11:47:03.346903-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== PAUSE TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T11:47:03.346904-07:00","Action":"pause","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T11:47:03.346905-07:00","Action":"run","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T11:47:03.346906-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== RUN TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T11:47:03.346908-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== PAUSE TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T11:47:03.346911-07:00","Action":"pause","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T11:47:03.346912-07:00","Action":"run","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T11:47:03.346913-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== RUN TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T11:47:03.346916-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== PAUSE TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T11:47:03.346917-07:00","Action":"pause","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T11:47:03.346918-07:00","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T11:47:03.34692-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T11:47:03.346921-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T11:47:03.346922-07:00","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T11:47:03.346923-07:00","Action":"run","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T11:47:03.346924-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== RUN TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T11:47:03.346926-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== PAUSE TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T11:47:03.346927-07:00","Action":"pause","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T11:47:03.346928-07:00","Action":"run","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T11:47:03.346929-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== RUN TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T11:47:03.346931-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== PAUSE TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T11:47:03.346933-07:00","Action":"pause","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T11:47:03.346934-07:00","Action":"run","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T11:47:03.346935-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== RUN TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T11:47:03.346937-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== PAUSE TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T11:47:03.346938-07:00","Action":"pause","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T11:47:03.346939-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T11:47:03.34694-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== RUN TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T11:47:03.346942-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== PAUSE TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T11:47:03.346944-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T11:47:03.346945-07:00","Action":"run","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T11:47:03.346946-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== RUN TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T11:47:03.346948-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== PAUSE TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T11:47:03.346949-07:00","Action":"pause","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T11:47:03.346951-07:00","Action":"run","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T11:47:03.346952-07:00","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== RUN TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T11:47:03.346953-07:00","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== PAUSE TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T11:47:03.346954-07:00","Action":"pause","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T11:47:03.346956-07:00","Action":"run","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T11:47:03.346957-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== RUN TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T11:47:03.346958-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== PAUSE TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T11:47:03.346959-07:00","Action":"pause","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T11:47:03.34696-07:00","Action":"cont","Test":"TestFunctional/parallel/ConfigCmd"} +{"Time":"2023-05-31T11:47:03.346962-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":"=== CONT TestFunctional/parallel/ConfigCmd\n"} +{"Time":"2023-05-31T11:47:03.346963-07:00","Action":"cont","Test":"TestFunctional/parallel/CpCmd"} +{"Time":"2023-05-31T11:47:03.346965-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":"=== CONT TestFunctional/parallel/CpCmd\n"} +{"Time":"2023-05-31T11:47:03.346966-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 config unset cpus\n"} +{"Time":"2023-05-31T11:47:03.347011-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 cp testdata/cp-test.txt /home/docker/cp-test.txt\n"} +{"Time":"2023-05-31T11:47:03.383777-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 config get cpus\n"} +{"Time":"2023-05-31T11:47:03.412852-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 config get cpus: exit status 14 (29.054417ms)\n"} +{"Time":"2023-05-31T11:47:03.412867-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T11:47:03.412869-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:03.412871-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \tError: specified key could not be found in config\n"} +{"Time":"2023-05-31T11:47:03.412873-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T11:47:03.412874-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:03.412877-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 config set cpus 2\n"} +{"Time":"2023-05-31T11:47:03.421711-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh -n functional-730000 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T11:47:03.44764-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 config get cpus\n"} +{"Time":"2023-05-31T11:47:03.488619-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 config unset cpus\n"} +{"Time":"2023-05-31T11:47:03.491807-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:556: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 cp functional-730000:/home/docker/cp-test.txt /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelCpCmd2722981526/001/cp-test.txt\n"} +{"Time":"2023-05-31T11:47:03.521776-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 config get cpus\n"} +{"Time":"2023-05-31T11:47:03.550373-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" functional_test.go:1194: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 config get cpus: exit status 14 (28.526334ms)\n"} +{"Time":"2023-05-31T11:47:03.550386-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T11:47:03.550388-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:03.55039-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \tError: specified key could not be found in config\n"} +{"Time":"2023-05-31T11:47:03.550392-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" \n"} +{"Time":"2023-05-31T11:47:03.550393-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:03.550396-07:00","Action":"cont","Test":"TestFunctional/parallel/License"} +{"Time":"2023-05-31T11:47:03.550397-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":"=== CONT TestFunctional/parallel/License\n"} +{"Time":"2023-05-31T11:47:03.550447-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":" functional_test.go:2283: (dbg) Run: out/minikube-darwin-arm64 license\n"} +{"Time":"2023-05-31T11:47:03.556678-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" helpers_test.go:534: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh -n functional-730000 \"sudo cat /home/docker/cp-test.txt\"\n"} +{"Time":"2023-05-31T11:47:03.624154-07:00","Action":"cont","Test":"TestFunctional/parallel/Version"} +{"Time":"2023-05-31T11:47:03.624167-07:00","Action":"output","Test":"TestFunctional/parallel/Version","Output":"=== CONT TestFunctional/parallel/Version\n"} +{"Time":"2023-05-31T11:47:03.624171-07:00","Action":"run","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T11:47:03.624173-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== RUN TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T11:47:03.624177-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== PAUSE TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T11:47:03.624178-07:00","Action":"pause","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T11:47:03.624181-07:00","Action":"run","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T11:47:03.624182-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== RUN TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T11:47:03.624187-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== PAUSE TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T11:47:03.624188-07:00","Action":"pause","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T11:47:03.62419-07:00","Action":"cont","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled"} +{"Time":"2023-05-31T11:47:03.624199-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":"=== CONT TestFunctional/parallel/NonActiveRuntimeDisabled\n"} +{"Time":"2023-05-31T11:47:03.624264-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" functional_test.go:2022: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo systemctl is-active crio\"\n"} +{"Time":"2023-05-31T11:47:03.688272-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" functional_test.go:2022: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo systemctl is-active crio\": exit status 1 (63.9415ms)\n"} +{"Time":"2023-05-31T11:47:03.688285-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T11:47:03.688287-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:47:03.688289-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \tinactive\n"} +{"Time":"2023-05-31T11:47:03.688291-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T11:47:03.688293-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:47:03.688294-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:03.688295-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \tssh: Process exited with status 3\n"} +{"Time":"2023-05-31T11:47:03.688304-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" \n"} +{"Time":"2023-05-31T11:47:03.688305-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:03.688314-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands"} +{"Time":"2023-05-31T11:47:03.688315-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":"=== CONT TestFunctional/parallel/ImageCommands\n"} +{"Time":"2023-05-31T11:47:03.688317-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T11:47:03.688318-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T11:47:03.68832-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T11:47:03.688321-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T11:47:03.688323-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T11:47:03.688324-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T11:47:03.688355-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T11:47:03.68837-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T11:47:03.688374-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T11:47:03.688377-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T11:47:03.688381-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T11:47:03.688384-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T11:47:03.688389-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T11:47:03.688392-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T11:47:03.688396-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T11:47:03.688399-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T11:47:03.688402-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T11:47:03.688404-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T11:47:03.688408-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== PAUSE TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T11:47:03.688411-07:00","Action":"pause","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T11:47:03.688415-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/Setup"} +{"Time":"2023-05-31T11:47:03.688418-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":"=== RUN TestFunctional/parallel/ImageCommands/Setup\n"} +{"Time":"2023-05-31T11:47:03.688505-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:340: (dbg) Run: docker pull gcr.io/google-containers/addon-resizer:1.8.8\n"} +{"Time":"2023-05-31T11:47:03.955409-07:00","Action":"cont","Test":"TestFunctional/parallel/NodeLabels"} +{"Time":"2023-05-31T11:47:03.95542-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":"=== CONT TestFunctional/parallel/NodeLabels\n"} +{"Time":"2023-05-31T11:47:03.955505-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":" functional_test.go:217: (dbg) Run: kubectl --context functional-730000 get nodes --output=go-template \"--template='{{range $k, $v := (index .items 0).metadata.labels}}{{$k}} {{end}}'\"\n"} +{"Time":"2023-05-31T11:47:03.991724-07:00","Action":"cont","Test":"TestFunctional/parallel/PodmanEnv"} +{"Time":"2023-05-31T11:47:03.991738-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":"=== CONT TestFunctional/parallel/PodmanEnv\n"} +{"Time":"2023-05-31T11:47:03.991746-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":" functional_test.go:545: only validate podman env with docker container runtime, currently testing docker\n"} +{"Time":"2023-05-31T11:47:03.991763-07:00","Action":"cont","Test":"TestFunctional/parallel/DockerEnv"} +{"Time":"2023-05-31T11:47:03.991782-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":"=== CONT TestFunctional/parallel/DockerEnv\n"} +{"Time":"2023-05-31T11:47:03.991787-07:00","Action":"run","Test":"TestFunctional/parallel/DockerEnv/bash"} +{"Time":"2023-05-31T11:47:03.991788-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":"=== RUN TestFunctional/parallel/DockerEnv/bash\n"} +{"Time":"2023-05-31T11:47:03.991838-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":" functional_test.go:494: (dbg) Run: /bin/bash -c \"eval $(out/minikube-darwin-arm64 -p functional-730000 docker-env) \u0026\u0026 out/minikube-darwin-arm64 status -p functional-730000\"\n"} +{"Time":"2023-05-31T11:47:04.246752-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":" functional_test.go:517: (dbg) Run: /bin/bash -c \"eval $(out/minikube-darwin-arm64 -p functional-730000 docker-env) \u0026\u0026 docker images\"\n"} +{"Time":"2023-05-31T11:47:04.39974-07:00","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd"} +{"Time":"2023-05-31T11:47:04.399752-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd\n"} +{"Time":"2023-05-31T11:47:04.399756-07:00","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T11:47:04.399758-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T11:47:04.399771-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T11:47:04.399772-07:00","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T11:47:04.399774-07:00","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T11:47:04.399776-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T11:47:04.399779-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T11:47:04.39978-07:00","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T11:47:04.399783-07:00","Action":"run","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T11:47:04.399784-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== RUN TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T11:47:04.399793-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== PAUSE TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T11:47:04.399795-07:00","Action":"pause","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T11:47:04.399797-07:00","Action":"cont","Test":"TestFunctional/parallel/CertSync"} +{"Time":"2023-05-31T11:47:04.399798-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":"=== CONT TestFunctional/parallel/CertSync\n"} +{"Time":"2023-05-31T11:47:04.400006-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /etc/ssl/certs/1477.pem within VM\n"} +{"Time":"2023-05-31T11:47:04.400013-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo cat /etc/ssl/certs/1477.pem\"\n"} +{"Time":"2023-05-31T11:47:04.470315-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /usr/share/ca-certificates/1477.pem within VM\n"} +{"Time":"2023-05-31T11:47:04.470331-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo cat /usr/share/ca-certificates/1477.pem\"\n"} +{"Time":"2023-05-31T11:47:04.537212-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1967: Checking for existence of /etc/ssl/certs/51391683.0 within VM\n"} +{"Time":"2023-05-31T11:47:04.537235-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1968: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo cat /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T11:47:04.605326-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /etc/ssl/certs/14772.pem within VM\n"} +{"Time":"2023-05-31T11:47:04.605344-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo cat /etc/ssl/certs/14772.pem\"\n"} +{"Time":"2023-05-31T11:47:04.673216-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /usr/share/ca-certificates/14772.pem within VM\n"} +{"Time":"2023-05-31T11:47:04.673234-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo cat /usr/share/ca-certificates/14772.pem\"\n"} +{"Time":"2023-05-31T11:47:04.740733-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1994: Checking for existence of /etc/ssl/certs/3ec20f2e.0 within VM\n"} +{"Time":"2023-05-31T11:47:04.740748-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" functional_test.go:1995: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo cat /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T11:47:04.810348-07:00","Action":"cont","Test":"TestFunctional/parallel/FileSync"} +{"Time":"2023-05-31T11:47:04.810366-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":"=== CONT TestFunctional/parallel/FileSync\n"} +{"Time":"2023-05-31T11:47:04.810375-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1924: Checking for existence of /etc/test/nested/copy/1477/hosts within VM\n"} +{"Time":"2023-05-31T11:47:04.81041-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1926: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo cat /etc/test/nested/copy/1477/hosts\"\n"} +{"Time":"2023-05-31T11:47:04.881291-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" functional_test.go:1931: file sync test content: Test file for checking file sync process\n"} +{"Time":"2023-05-31T11:47:04.881508-07:00","Action":"cont","Test":"TestFunctional/parallel/MySQL"} +{"Time":"2023-05-31T11:47:04.881513-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":"=== CONT TestFunctional/parallel/MySQL\n"} +{"Time":"2023-05-31T11:47:04.881586-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" functional_test.go:1782: arm64 is not supported by mysql. Skip the test. See https://github.com/kubernetes/minikube/issues/10144\n"} +{"Time":"2023-05-31T11:47:04.881588-07:00","Action":"cont","Test":"TestFunctional/parallel/ServiceCmd"} +{"Time":"2023-05-31T11:47:04.881596-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":"=== CONT TestFunctional/parallel/ServiceCmd\n"} +{"Time":"2023-05-31T11:47:04.881598-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/DeployApp"} +{"Time":"2023-05-31T11:47:04.881599-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":"=== RUN TestFunctional/parallel/ServiceCmd/DeployApp\n"} +{"Time":"2023-05-31T11:47:04.881652-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1435: (dbg) Run: kubectl --context functional-730000 create deployment hello-node --image=registry.k8s.io/echoserver-arm:1.8\n"} +{"Time":"2023-05-31T11:47:04.92039-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1443: (dbg) Run: kubectl --context functional-730000 expose deployment hello-node --type=NodePort --port=8080\n"} +{"Time":"2023-05-31T11:47:04.967311-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1448: (dbg) TestFunctional/parallel/ServiceCmd/DeployApp: waiting 10m0s for pods matching \"app=hello-node\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:04.977693-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" helpers_test.go:344: \"hello-node-7b684b55f9-7pbws\" [d8491b04-6efb-4030-b764-a46c6a800ab8] Pending / Ready:ContainersNotReady (containers with unready status: [echoserver-arm]) / ContainersReady:ContainersNotReady (containers with unready status: [echoserver-arm])\n"} +{"Time":"2023-05-31T11:47:05.836872-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:340: (dbg) Done: docker pull gcr.io/google-containers/addon-resizer:1.8.8: (2.148323166s)\n"} +{"Time":"2023-05-31T11:47:05.836938-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" functional_test.go:345: (dbg) Run: docker tag gcr.io/google-containers/addon-resizer:1.8.8 gcr.io/google-containers/addon-resizer:functional-730000\n"} +{"Time":"2023-05-31T11:47:05.878764-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon"} +{"Time":"2023-05-31T11:47:05.878787-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageLoadDaemon\n"} +{"Time":"2023-05-31T11:47:05.878825-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:353: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image load --daemon gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:07.960979-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:353: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 image load --daemon gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr: (2.082105625s)\n"} +{"Time":"2023-05-31T11:47:07.960992-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls\n"} +{"Time":"2023-05-31T11:47:08.041185-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon"} +{"Time":"2023-05-31T11:47:08.041207-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageReloadDaemon\n"} +{"Time":"2023-05-31T11:47:08.041214-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:363: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image load --daemon gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:09.507369-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:363: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 image load --daemon gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr: (1.466092458s)\n"} +{"Time":"2023-05-31T11:47:09.507393-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls\n"} +{"Time":"2023-05-31T11:47:09.583882-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon"} +{"Time":"2023-05-31T11:47:09.583896-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon\n"} +{"Time":"2023-05-31T11:47:09.583992-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:233: (dbg) Run: docker pull gcr.io/google-containers/addon-resizer:1.8.9\n"} +{"Time":"2023-05-31T11:47:11.802795-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:233: (dbg) Done: docker pull gcr.io/google-containers/addon-resizer:1.8.9: (2.218641833s)\n"} +{"Time":"2023-05-31T11:47:11.802915-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:238: (dbg) Run: docker tag gcr.io/google-containers/addon-resizer:1.8.9 gcr.io/google-containers/addon-resizer:functional-730000\n"} +{"Time":"2023-05-31T11:47:11.866252-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:243: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image load --daemon gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:11.980692-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" helpers_test.go:344: \"hello-node-7b684b55f9-7pbws\" [d8491b04-6efb-4030-b764-a46c6a800ab8] Running / Ready:ContainersNotReady (containers with unready status: [echoserver-arm]) / ContainersReady:ContainersNotReady (containers with unready status: [echoserver-arm])\n"} +{"Time":"2023-05-31T11:47:13.737485-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:243: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 image load --daemon gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr: (1.871216208s)\n"} +{"Time":"2023-05-31T11:47:13.7375-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls\n"} +{"Time":"2023-05-31T11:47:13.813953-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile"} +{"Time":"2023-05-31T11:47:13.813965-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageSaveToFile\n"} +{"Time":"2023-05-31T11:47:13.81404-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":" functional_test.go:378: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image save gcr.io/google-containers/addon-resizer:functional-730000 /Users/jenkins/workspace/addon-resizer-save.tar --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:14.333562-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageRemove"} +{"Time":"2023-05-31T11:47:14.333577-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageRemove\n"} +{"Time":"2023-05-31T11:47:14.333586-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" functional_test.go:390: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image rm gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:14.423046-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls\n"} +{"Time":"2023-05-31T11:47:14.495942-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile"} +{"Time":"2023-05-31T11:47:14.495956-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageLoadFromFile\n"} +{"Time":"2023-05-31T11:47:14.495976-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" functional_test.go:407: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image load /Users/jenkins/workspace/addon-resizer-save.tar --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:15.040255-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls\n"} +{"Time":"2023-05-31T11:47:15.120379-07:00","Action":"run","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon"} +{"Time":"2023-05-31T11:47:15.120392-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":"=== RUN TestFunctional/parallel/ImageCommands/ImageSaveDaemon\n"} +{"Time":"2023-05-31T11:47:15.120505-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:417: (dbg) Run: docker rmi gcr.io/google-containers/addon-resizer:functional-730000\n"} +{"Time":"2023-05-31T11:47:15.165635-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:422: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image save --daemon gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:16.684703-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:422: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 image save --daemon gcr.io/google-containers/addon-resizer:functional-730000 --alsologtostderr: (1.518967542s)\n"} +{"Time":"2023-05-31T11:47:16.684718-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" functional_test.go:427: (dbg) Run: docker image inspect gcr.io/google-containers/addon-resizer:functional-730000\n"} +{"Time":"2023-05-31T11:47:16.723321-07:00","Action":"cont","Test":"TestFunctional/parallel/SSHCmd"} +{"Time":"2023-05-31T11:47:16.723333-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":"=== CONT TestFunctional/parallel/SSHCmd\n"} +{"Time":"2023-05-31T11:47:16.72337-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" functional_test.go:1723: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"echo hello\"\n"} +{"Time":"2023-05-31T11:47:16.804202-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" functional_test.go:1740: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"cat /etc/hostname\"\n"} +{"Time":"2023-05-31T11:47:16.875766-07:00","Action":"cont","Test":"TestFunctional/parallel/TunnelCmd"} +{"Time":"2023-05-31T11:47:16.875778-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":"=== CONT TestFunctional/parallel/TunnelCmd\n"} +{"Time":"2023-05-31T11:47:16.875801-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial"} +{"Time":"2023-05-31T11:47:16.875802-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial\n"} +{"Time":"2023-05-31T11:47:16.875832-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel"} +{"Time":"2023-05-31T11:47:16.875833-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel\n"} +{"Time":"2023-05-31T11:47:16.888496-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:154: (dbg) daemon: [out/minikube-darwin-arm64 -p functional-730000 tunnel --alsologtostderr]\n"} +{"Time":"2023-05-31T11:47:16.888545-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:154: (dbg) daemon: [out/minikube-darwin-arm64 -p functional-730000 tunnel --alsologtostderr]\n"} +{"Time":"2023-05-31T11:47:16.97513-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:194: (dbg) stopping [out/minikube-darwin-arm64 -p functional-730000 tunnel --alsologtostderr] ...\n"} +{"Time":"2023-05-31T11:47:17.086729-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" helpers_test.go:508: unable to kill pid 1990: os: process already finished\n"} +{"Time":"2023-05-31T11:47:17.086758-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" functional_test_tunnel_test.go:194: (dbg) stopping [out/minikube-darwin-arm64 -p functional-730000 tunnel --alsologtostderr] ...\n"} +{"Time":"2023-05-31T11:47:17.086762-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T11:47:17.086822-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel"} +{"Time":"2023-05-31T11:47:17.086824-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/StartTunnel\n"} +{"Time":"2023-05-31T11:47:17.097293-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":" functional_test_tunnel_test.go:129: (dbg) daemon: [out/minikube-darwin-arm64 -p functional-730000 tunnel --alsologtostderr]\n"} +{"Time":"2023-05-31T11:47:17.099418-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService"} +{"Time":"2023-05-31T11:47:17.099425-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/WaitService\n"} +{"Time":"2023-05-31T11:47:17.109675-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup"} +{"Time":"2023-05-31T11:47:17.109687-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup\n"} +{"Time":"2023-05-31T11:47:17.110348-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" functional_test_tunnel_test.go:212: (dbg) Run: kubectl --context functional-730000 apply -f testdata/testsvc.yaml\n"} +{"Time":"2023-05-31T11:47:17.309806-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" functional_test_tunnel_test.go:216: (dbg) TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup: waiting 4m0s for pods matching \"run=nginx-svc\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:17.311425-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" helpers_test.go:344: \"nginx-svc\" [722c6ae9-122f-4f4a-a458-dd0fbdb0ea4b] Pending / Ready:ContainersNotReady (containers with unready status: [nginx]) / ContainersReady:ContainersNotReady (containers with unready status: [nginx])\n"} +{"Time":"2023-05-31T11:47:17.982492-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" functional_test.go:1448: (dbg) TestFunctional/parallel/ServiceCmd/DeployApp: app=hello-node healthy within 13.015176709s\n"} +{"Time":"2023-05-31T11:47:17.982524-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/List"} +{"Time":"2023-05-31T11:47:17.982528-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":"=== RUN TestFunctional/parallel/ServiceCmd/List\n"} +{"Time":"2023-05-31T11:47:17.982585-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":" functional_test.go:1457: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 service list\n"} +{"Time":"2023-05-31T11:47:18.08214-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput"} +{"Time":"2023-05-31T11:47:18.082155-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":"=== RUN TestFunctional/parallel/ServiceCmd/JSONOutput\n"} +{"Time":"2023-05-31T11:47:18.082211-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" functional_test.go:1487: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 service list -o json\n"} +{"Time":"2023-05-31T11:47:18.171768-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" functional_test.go:1492: Took \"89.548667ms\" to run \"out/minikube-darwin-arm64 -p functional-730000 service list -o json\"\n"} +{"Time":"2023-05-31T11:47:18.17194-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/HTTPS"} +{"Time":"2023-05-31T11:47:18.171956-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":"=== RUN TestFunctional/parallel/ServiceCmd/HTTPS\n"} +{"Time":"2023-05-31T11:47:18.171963-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" functional_test.go:1507: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 service --namespace=default --https --url hello-node\n"} +{"Time":"2023-05-31T11:47:18.275055-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" functional_test.go:1520: found endpoint: https://192.168.105.4:31990\n"} +{"Time":"2023-05-31T11:47:18.275161-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/Format"} +{"Time":"2023-05-31T11:47:18.275163-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":"=== RUN TestFunctional/parallel/ServiceCmd/Format\n"} +{"Time":"2023-05-31T11:47:18.275208-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" functional_test.go:1538: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 service hello-node --url --format={{.IP}}\n"} +{"Time":"2023-05-31T11:47:18.372699-07:00","Action":"run","Test":"TestFunctional/parallel/ServiceCmd/URL"} +{"Time":"2023-05-31T11:47:18.372713-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":"=== RUN TestFunctional/parallel/ServiceCmd/URL\n"} +{"Time":"2023-05-31T11:47:18.372718-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" functional_test.go:1557: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 service hello-node --url\n"} +{"Time":"2023-05-31T11:47:18.47371-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" functional_test.go:1563: found endpoint for hello-node: http://192.168.105.4:31990\n"} +{"Time":"2023-05-31T11:47:18.473859-07:00","Action":"cont","Test":"TestFunctional/parallel/PersistentVolumeClaim"} +{"Time":"2023-05-31T11:47:18.473865-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":"=== CONT TestFunctional/parallel/PersistentVolumeClaim\n"} +{"Time":"2023-05-31T11:47:18.474363-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:44: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 4m0s for pods matching \"integration-test=storage-provisioner\" in namespace \"kube-system\" ...\n"} +{"Time":"2023-05-31T11:47:18.476038-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"storage-provisioner\" [9d24627b-1cc8-4785-976e-c58e95c7273d] Running\n"} +{"Time":"2023-05-31T11:47:21.320189-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" helpers_test.go:344: \"nginx-svc\" [722c6ae9-122f-4f4a-a458-dd0fbdb0ea4b] Running\n"} +{"Time":"2023-05-31T11:47:23.485748-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:44: (dbg) TestFunctional/parallel/PersistentVolumeClaim: integration-test=storage-provisioner healthy within 5.011329167s\n"} +{"Time":"2023-05-31T11:47:23.486188-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:49: (dbg) Run: kubectl --context functional-730000 get storageclass -o=json\n"} +{"Time":"2023-05-31T11:47:23.557347-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:69: (dbg) Run: kubectl --context functional-730000 apply -f testdata/storage-provisioner/pvc.yaml\n"} +{"Time":"2023-05-31T11:47:23.626247-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:76: (dbg) Run: kubectl --context functional-730000 get pvc myclaim -o=json\n"} +{"Time":"2023-05-31T11:47:23.663966-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:125: (dbg) Run: kubectl --context functional-730000 apply -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T11:47:23.729649-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 3m0s for pods matching \"test=storage-provisioner\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:23.732615-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [22bd3bce-833b-41b8-826d-7f980434cfc6] Pending\n"} +{"Time":"2023-05-31T11:47:24.734636-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [22bd3bce-833b-41b8-826d-7f980434cfc6] Pending / Ready:ContainersNotReady (containers with unready status: [myfrontend]) / ContainersReady:ContainersNotReady (containers with unready status: [myfrontend])\n"} +{"Time":"2023-05-31T11:47:27.315378-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" functional_test_tunnel_test.go:216: (dbg) TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup: run=nginx-svc healthy within 10.005656959s\n"} +{"Time":"2023-05-31T11:47:27.31673-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP"} +{"Time":"2023-05-31T11:47:27.316735-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP\n"} +{"Time":"2023-05-31T11:47:27.31683-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP","Output":" functional_test_tunnel_test.go:234: (dbg) Run: kubectl --context functional-730000 get svc nginx-svc -o jsonpath={.status.loadBalancer.ingress[0].ip}\n"} +{"Time":"2023-05-31T11:47:27.352827-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect"} +{"Time":"2023-05-31T11:47:27.352841-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/AccessDirect\n"} +{"Time":"2023-05-31T11:47:27.36445-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":" functional_test_tunnel_test.go:299: tunnel at http://10.102.164.144 is working!\n"} +{"Time":"2023-05-31T11:47:27.364523-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig"} +{"Time":"2023-05-31T11:47:27.364536-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig\n"} +{"Time":"2023-05-31T11:47:27.374712-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":" functional_test_tunnel_test.go:319: (dbg) Run: dig +time=5 +tries=3 @10.96.0.10 nginx-svc.default.svc.cluster.local. A\n"} +{"Time":"2023-05-31T11:47:27.385283-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":" functional_test_tunnel_test.go:327: DNS resolution by dig for nginx-svc.default.svc.cluster.local. is working!\n"} +{"Time":"2023-05-31T11:47:27.385343-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil"} +{"Time":"2023-05-31T11:47:27.385351-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil\n"} +{"Time":"2023-05-31T11:47:27.395255-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":" functional_test_tunnel_test.go:351: (dbg) Run: dscacheutil -q host -a name nginx-svc.default.svc.cluster.local.\n"} +{"Time":"2023-05-31T11:47:27.401505-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":" functional_test_tunnel_test.go:359: DNS resolution by dscacheutil for nginx-svc.default.svc.cluster.local. is working!\n"} +{"Time":"2023-05-31T11:47:27.401567-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS"} +{"Time":"2023-05-31T11:47:27.40157-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS\n"} +{"Time":"2023-05-31T11:47:27.413297-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":" functional_test_tunnel_test.go:424: tunnel at http://nginx-svc.default.svc.cluster.local. is working!\n"} +{"Time":"2023-05-31T11:47:27.413311-07:00","Action":"run","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel"} +{"Time":"2023-05-31T11:47:27.413313-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":"=== RUN TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel\n"} +{"Time":"2023-05-31T11:47:27.423691-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":" functional_test_tunnel_test.go:434: (dbg) stopping [out/minikube-darwin-arm64 -p functional-730000 tunnel --alsologtostderr] ...\n"} +{"Time":"2023-05-31T11:47:27.535346-07:00","Action":"cont","Test":"TestFunctional/parallel/AddonsCmd"} +{"Time":"2023-05-31T11:47:27.535367-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":"=== CONT TestFunctional/parallel/AddonsCmd\n"} +{"Time":"2023-05-31T11:47:27.535457-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" functional_test.go:1688: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 addons list\n"} +{"Time":"2023-05-31T11:47:27.614637-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" functional_test.go:1700: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 addons list -o json\n"} +{"Time":"2023-05-31T11:47:27.658376-07:00","Action":"cont","Test":"TestFunctional/parallel/ServiceCmdConnect"} +{"Time":"2023-05-31T11:47:27.658388-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"=== CONT TestFunctional/parallel/ServiceCmdConnect\n"} +{"Time":"2023-05-31T11:47:27.658467-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1625: (dbg) Run: kubectl --context functional-730000 create deployment hello-node-connect --image=registry.k8s.io/echoserver-arm:1.8\n"} +{"Time":"2023-05-31T11:47:27.696371-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1633: (dbg) Run: kubectl --context functional-730000 expose deployment hello-node-connect --type=NodePort --port=8080\n"} +{"Time":"2023-05-31T11:47:27.744299-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1638: (dbg) TestFunctional/parallel/ServiceCmdConnect: waiting 10m0s for pods matching \"app=hello-node-connect\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:27.746156-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:344: \"hello-node-connect-58d66798bb-stzzj\" [a120ea47-9aab-4f46-a7f1-0defe24bb54b] Pending / Ready:ContainersNotReady (containers with unready status: [echoserver-arm]) / ContainersReady:ContainersNotReady (containers with unready status: [echoserver-arm])\n"} +{"Time":"2023-05-31T11:47:29.737292-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [22bd3bce-833b-41b8-826d-7f980434cfc6] Running\n"} +{"Time":"2023-05-31T11:47:29.749864-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:344: \"hello-node-connect-58d66798bb-stzzj\" [a120ea47-9aab-4f46-a7f1-0defe24bb54b] Running / Ready:ContainersNotReady (containers with unready status: [echoserver-arm]) / ContainersReady:ContainersNotReady (containers with unready status: [echoserver-arm])\n"} +{"Time":"2023-05-31T11:47:34.741818-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: test=storage-provisioner healthy within 11.0122055s\n"} +{"Time":"2023-05-31T11:47:34.742029-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:100: (dbg) Run: kubectl --context functional-730000 exec sp-pod -- touch /tmp/mount/foo\n"} +{"Time":"2023-05-31T11:47:34.753229-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1638: (dbg) TestFunctional/parallel/ServiceCmdConnect: app=hello-node-connect healthy within 7.008971709s\n"} +{"Time":"2023-05-31T11:47:34.753257-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1647: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 service hello-node-connect --url\n"} +{"Time":"2023-05-31T11:47:34.86807-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:106: (dbg) Run: kubectl --context functional-730000 delete -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T11:47:34.900216-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1653: found endpoint for hello-node-connect: http://192.168.105.4:30108\n"} +{"Time":"2023-05-31T11:47:34.90055-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1659: error fetching http://192.168.105.4:30108: Get \"http://192.168.105.4:30108\": dial tcp 192.168.105.4:30108: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:35.587895-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:125: (dbg) Run: kubectl --context functional-730000 apply -f testdata/storage-provisioner/pod.yaml\n"} +{"Time":"2023-05-31T11:47:35.658505-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: waiting 3m0s for pods matching \"test=storage-provisioner\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:35.66068-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [2a69fa5e-f172-4313-a37c-e1a55c4ebbd1] Pending\n"} +{"Time":"2023-05-31T11:47:35.696477-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1659: error fetching http://192.168.105.4:30108: Get \"http://192.168.105.4:30108\": dial tcp 192.168.105.4:30108: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:36.667401-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [2a69fa5e-f172-4313-a37c-e1a55c4ebbd1] Pending / Ready:ContainersNotReady (containers with unready status: [myfrontend]) / ContainersReady:ContainersNotReady (containers with unready status: [myfrontend])\n"} +{"Time":"2023-05-31T11:47:37.5746-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1659: error fetching http://192.168.105.4:30108: Get \"http://192.168.105.4:30108\": dial tcp 192.168.105.4:30108: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:37.666482-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" helpers_test.go:344: \"sp-pod\" [2a69fa5e-f172-4313-a37c-e1a55c4ebbd1] Running\n"} +{"Time":"2023-05-31T11:47:40.235035-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1659: error fetching http://192.168.105.4:30108: Get \"http://192.168.105.4:30108\": dial tcp 192.168.105.4:30108: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:42.056841-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1659: error fetching http://192.168.105.4:30108: Get \"http://192.168.105.4:30108\": dial tcp 192.168.105.4:30108: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:42.671098-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:130: (dbg) TestFunctional/parallel/PersistentVolumeClaim: test=storage-provisioner healthy within 7.01260825s\n"} +{"Time":"2023-05-31T11:47:42.671397-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" functional_test_pvc_test.go:114: (dbg) Run: kubectl --context functional-730000 exec sp-pod -- ls /tmp/mount\n"} +{"Time":"2023-05-31T11:47:42.789152-07:00","Action":"cont","Test":"TestFunctional/parallel/StatusCmd"} +{"Time":"2023-05-31T11:47:42.789165-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":"=== CONT TestFunctional/parallel/StatusCmd\n"} +{"Time":"2023-05-31T11:47:42.789219-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:849: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 status\n"} +{"Time":"2023-05-31T11:47:42.873827-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:855: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 status -f host:{{.Host}},kublet:{{.Kubelet}},apiserver:{{.APIServer}},kubeconfig:{{.Kubeconfig}}\n"} +{"Time":"2023-05-31T11:47:42.956027-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" functional_test.go:867: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 status -o json\n"} +{"Time":"2023-05-31T11:47:43.037699-07:00","Action":"cont","Test":"TestFunctional/parallel/ProfileCmd"} +{"Time":"2023-05-31T11:47:43.037713-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":"=== CONT TestFunctional/parallel/ProfileCmd\n"} +{"Time":"2023-05-31T11:47:43.037717-07:00","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create"} +{"Time":"2023-05-31T11:47:43.037718-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_not_create\n"} +{"Time":"2023-05-31T11:47:43.037785-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" functional_test.go:1268: (dbg) Run: out/minikube-darwin-arm64 profile lis\n"} +{"Time":"2023-05-31T11:47:43.108074-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" functional_test.go:1273: (dbg) Run: out/minikube-darwin-arm64 profile list --output json\n"} +{"Time":"2023-05-31T11:47:43.229275-07:00","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_list"} +{"Time":"2023-05-31T11:47:43.229288-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_list\n"} +{"Time":"2023-05-31T11:47:43.229297-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1308: (dbg) Run: out/minikube-darwin-arm64 profile list\n"} +{"Time":"2023-05-31T11:47:43.347851-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1313: Took \"118.499667ms\" to run \"out/minikube-darwin-arm64 profile list\"\n"} +{"Time":"2023-05-31T11:47:43.347867-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1322: (dbg) Run: out/minikube-darwin-arm64 profile list -l\n"} +{"Time":"2023-05-31T11:47:43.379634-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" functional_test.go:1327: Took \"31.735416ms\" to run \"out/minikube-darwin-arm64 profile list -l\"\n"} +{"Time":"2023-05-31T11:47:43.37968-07:00","Action":"run","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output"} +{"Time":"2023-05-31T11:47:43.379682-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":"=== RUN TestFunctional/parallel/ProfileCmd/profile_json_output\n"} +{"Time":"2023-05-31T11:47:43.379719-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1359: (dbg) Run: out/minikube-darwin-arm64 profile list -o json\n"} +{"Time":"2023-05-31T11:47:43.495977-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1364: Took \"116.218708ms\" to run \"out/minikube-darwin-arm64 profile list -o json\"\n"} +{"Time":"2023-05-31T11:47:43.496133-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1372: (dbg) Run: out/minikube-darwin-arm64 profile list -o json --light\n"} +{"Time":"2023-05-31T11:47:43.528757-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" functional_test.go:1377: Took \"32.5805ms\" to run \"out/minikube-darwin-arm64 profile list -o json --light\"\n"} +{"Time":"2023-05-31T11:47:43.528886-07:00","Action":"cont","Test":"TestFunctional/parallel/MountCmd"} +{"Time":"2023-05-31T11:47:43.528893-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":"=== CONT TestFunctional/parallel/MountCmd\n"} +{"Time":"2023-05-31T11:47:43.528904-07:00","Action":"run","Test":"TestFunctional/parallel/MountCmd/any-port"} +{"Time":"2023-05-31T11:47:43.528905-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":"=== RUN TestFunctional/parallel/MountCmd/any-port\n"} +{"Time":"2023-05-31T11:47:43.529079-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:73: (dbg) daemon: [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdany-port3328431145/001:/mount-9p --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:47:43.531301-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685558863531147000\" to /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdany-port3328431145/001/created-by-test\n"} +{"Time":"2023-05-31T11:47:43.531383-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685558863531147000\" to /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdany-port3328431145/001/created-by-test-removed-by-pod\n"} +{"Time":"2023-05-31T11:47:43.531447-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:107: wrote \"test-1685558863531147000\" to /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdany-port3328431145/001/test-1685558863531147000\n"} +{"Time":"2023-05-31T11:47:43.531471-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T11:47:43.593264-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T /mount-9p | grep 9p\": exit status 1 (61.7145ms)\n"} +{"Time":"2023-05-31T11:47:43.593277-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \n"} +{"Time":"2023-05-31T11:47:43.593279-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:43.593281-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:47:43.593282-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" \n"} +{"Time":"2023-05-31T11:47:43.593284-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:44.160641-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:115: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T11:47:44.239593-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:129: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh -- ls -la /mount-9p\n"} +{"Time":"2023-05-31T11:47:44.314427-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:133: guest mount directory contents\n"} +{"Time":"2023-05-31T11:47:44.314438-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" total 2\r\n"} +{"Time":"2023-05-31T11:47:44.31444-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:47 created-by-test\r\n"} +{"Time":"2023-05-31T11:47:44.314442-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:47 created-by-test-removed-by-pod\r\n"} +{"Time":"2023-05-31T11:47:44.314443-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" -rw-r--r-- 1 docker docker 24 May 31 18:47 test-1685558863531147000\r\n"} +{"Time":"2023-05-31T11:47:44.314454-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:137: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh cat /mount-9p/test-1685558863531147000\n"} +{"Time":"2023-05-31T11:47:44.385517-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:148: (dbg) Run: kubectl --context functional-730000 replace --force -f testdata/busybox-mount-test.yaml\n"} +{"Time":"2023-05-31T11:47:44.453876-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:153: (dbg) TestFunctional/parallel/MountCmd/any-port: waiting 4m0s for pods matching \"integration-test=busybox-mount\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:47:44.455734-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [677d6f33-8625-43e4-854a-fc4cbc188c23] Pending\n"} +{"Time":"2023-05-31T11:47:45.462214-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [677d6f33-8625-43e4-854a-fc4cbc188c23] Pending / Ready:ContainersNotReady (containers with unready status: [mount-munger]) / ContainersReady:ContainersNotReady (containers with unready status: [mount-munger])\n"} +{"Time":"2023-05-31T11:47:46.531363-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1659: error fetching http://192.168.105.4:30108: Get \"http://192.168.105.4:30108\": dial tcp 192.168.105.4:30108: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:48.463096-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [677d6f33-8625-43e4-854a-fc4cbc188c23] Pending: Initialized:PodCompleted / Ready:PodCompleted / ContainersReady:PodCompleted\n"} +{"Time":"2023-05-31T11:47:49.464199-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" helpers_test.go:344: \"busybox-mount\" [677d6f33-8625-43e4-854a-fc4cbc188c23] Succeeded: Initialized:PodCompleted / Ready:PodCompleted / ContainersReady:PodCompleted\n"} +{"Time":"2023-05-31T11:47:49.464238-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:153: (dbg) TestFunctional/parallel/MountCmd/any-port: integration-test=busybox-mount healthy within 5.010393917s\n"} +{"Time":"2023-05-31T11:47:49.46455-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:169: (dbg) Run: kubectl --context functional-730000 logs busybox-mount\n"} +{"Time":"2023-05-31T11:47:49.533645-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:181: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh stat /mount-9p/created-by-test\n"} +{"Time":"2023-05-31T11:47:49.603023-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:181: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh stat /mount-9p/created-by-pod\n"} +{"Time":"2023-05-31T11:47:49.672072-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:90: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo umount -f /mount-9p\"\n"} +{"Time":"2023-05-31T11:47:49.741012-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" functional_test_mount_test.go:94: (dbg) stopping [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdany-port3328431145/001:/mount-9p --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:47:49.852771-07:00","Action":"run","Test":"TestFunctional/parallel/MountCmd/specific-port"} +{"Time":"2023-05-31T11:47:49.852782-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":"=== RUN TestFunctional/parallel/MountCmd/specific-port\n"} +{"Time":"2023-05-31T11:47:49.852915-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:213: (dbg) daemon: [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdspecific-port3017336378/001:/mount-9p --alsologtostderr -v=1 --port 46464]\n"} +{"Time":"2023-05-31T11:47:49.855271-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T11:47:49.917993-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T /mount-9p | grep 9p\": exit status 1 (62.660625ms)\n"} +{"Time":"2023-05-31T11:47:49.918009-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:47:49.918011-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:49.918013-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:47:49.918014-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:47:49.918016-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:50.548973-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:243: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T /mount-9p | grep 9p\"\n"} +{"Time":"2023-05-31T11:47:50.640499-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:257: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh -- ls -la /mount-9p\n"} +{"Time":"2023-05-31T11:47:50.709442-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:261: guest mount directory contents\n"} +{"Time":"2023-05-31T11:47:50.709455-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" total 0\r\n"} +{"Time":"2023-05-31T11:47:50.709458-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:263: (dbg) stopping [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdspecific-port3017336378/001:/mount-9p --alsologtostderr -v=1 --port 46464] ...\n"} +{"Time":"2023-05-31T11:47:50.820167-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:264: reading mount text\n"} +{"Time":"2023-05-31T11:47:50.820198-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:278: done reading mount text\n"} +{"Time":"2023-05-31T11:47:50.820286-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:230: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo umount -f /mount-9p\"\n"} +{"Time":"2023-05-31T11:47:50.885295-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:230: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 ssh \"sudo umount -f /mount-9p\": exit status 1 (64.92975ms)\n"} +{"Time":"2023-05-31T11:47:50.88531-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:47:50.885312-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:47:50.885314-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tumount: /mount-9p: not mounted.\n"} +{"Time":"2023-05-31T11:47:50.885315-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:47:50.885316-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:47:50.885318-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:50.885319-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \tssh: Process exited with status 32\n"} +{"Time":"2023-05-31T11:47:50.88532-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" \n"} +{"Time":"2023-05-31T11:47:50.885342-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:50.885344-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:232: \"out/minikube-darwin-arm64 -p functional-730000 ssh \\\"sudo umount -f /mount-9p\\\"\": exit status 1\n"} +{"Time":"2023-05-31T11:47:50.885347-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" functional_test_mount_test.go:234: (dbg) stopping [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdspecific-port3017336378/001:/mount-9p --alsologtostderr -v=1 --port 46464] ...\n"} +{"Time":"2023-05-31T11:47:50.996195-07:00","Action":"run","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup"} +{"Time":"2023-05-31T11:47:50.996207-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":"=== RUN TestFunctional/parallel/MountCmd/VerifyCleanup\n"} +{"Time":"2023-05-31T11:47:50.99636-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount1 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:47:50.998699-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount2 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:47:50.999641-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:298: (dbg) daemon: [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount3 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:47:51.0006-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T\" /mount1\n"} +{"Time":"2023-05-31T11:47:51.083844-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T\" /mount1: exit status 80 (83.136875ms)\n"} +{"Time":"2023-05-31T11:47:51.083857-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \n"} +{"Time":"2023-05-31T11:47:51.083859-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:47:51.08386-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t\n"} +{"Time":"2023-05-31T11:47:51.083861-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t\n"} +{"Time":"2023-05-31T11:47:51.083863-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \n"} +{"Time":"2023-05-31T11:47:51.083864-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:47:51.083865-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:51.083871-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \tX Exiting due to GUEST_STATUS: Unable to get machine status: state: connect: dial unix /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/functional-730000/monitor: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:51.083874-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:51.083876-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t╭──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:47:51.083882-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:47:51.083884-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:47:51.083885-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:47:51.083887-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:47:51.083888-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:47:51.08389-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T11:47:51.083891-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t│ * - /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube_mount_92a8db3350ab58c6723d8fb08c31d61a4f51c82d_0.log │\n"} +{"Time":"2023-05-31T11:47:51.083894-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:47:51.083896-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \t╰──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:47:51.083898-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" \n"} +{"Time":"2023-05-31T11:47:51.083899-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:51.498629-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T\" /mount1\n"} +{"Time":"2023-05-31T11:47:51.598937-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T\" /mount2\n"} +{"Time":"2023-05-31T11:47:51.665741-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:325: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh \"findmnt -T\" /mount3\n"} +{"Time":"2023-05-31T11:47:51.730776-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:370: (dbg) Run: out/minikube-darwin-arm64 mount -p functional-730000 --kill=true\n"} +{"Time":"2023-05-31T11:47:51.761286-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount1 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:47:51.761302-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T11:47:51.761304-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount2 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:47:51.761306-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T11:47:51.761308-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" functional_test_mount_test.go:313: (dbg) stopping [out/minikube-darwin-arm64 mount -p functional-730000 /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount3 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:47:51.761311-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" helpers_test.go:490: unable to find parent, assuming dead: process does not exist\n"} +{"Time":"2023-05-31T11:47:51.762139-07:00","Action":"cont","Test":"TestFunctional/parallel/DryRun"} +{"Time":"2023-05-31T11:47:51.762153-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"=== CONT TestFunctional/parallel/DryRun\n"} +{"Time":"2023-05-31T11:47:51.762175-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:969: (dbg) Run: out/minikube-darwin-arm64 start -p functional-730000 --dry-run --memory 250MB --alsologtostderr --driver=qemu2 \n"} +{"Time":"2023-05-31T11:47:51.877833-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:969: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p functional-730000 --dry-run --memory 250MB --alsologtostderr --driver=qemu2 : exit status 23 (115.498375ms)\n"} +{"Time":"2023-05-31T11:47:51.877846-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T11:47:51.877847-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:47:51.877849-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t* [functional-730000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:47:51.877851-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:47:51.877852-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:47:51.877854-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:47:51.877855-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:47:51.877856-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:47:51.877858-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:47:51.87786-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T11:47:51.877861-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t\n"} +{"Time":"2023-05-31T11:47:51.877862-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \t\n"} +{"Time":"2023-05-31T11:47:51.877863-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T11:47:51.877865-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:47:51.877866-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:51.877867-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.789473 2133 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:47:51.877869-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.789649 2133 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:51.87787-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.789652 2133 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:47:51.877872-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.789654 2133 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:51.877873-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.789728 2133 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:47:51.877874-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.790789 2133 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:47:51.877876-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.807169 2133 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1042,\"bootTime\":1685557829,\"procs\":399,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:47:51.87788-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tW0531 11:47:51.807250 2133 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:47:51.877881-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.813117 2133 out.go:177] * [functional-730000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:47:51.877883-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.821071 2133 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:47:51.877884-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.821116 2133 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:47:51.877885-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.827994 2133 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:47:51.877887-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.829382 2133 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:47:51.877888-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.832040 2133 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:47:51.877889-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.835080 2133 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:47:51.877891-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.838114 2133 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:47:51.877892-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.841263 2133 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:51.877894-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.841520 2133 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:47:51.877895-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.845966 2133 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T11:47:51.877896-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.855029 2133 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:47:51.8779-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.855034 2133 start.go:875] validating driver \"qemu2\" against \u0026{Name:functional-730000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T11:47:51.877905-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:functional-730000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:apiserver Key:enable-admission-plugins Value:NamespaceAutoProvision}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8441 NodeName:} Nodes:[{Name: IP:192.168.105.4 Port:8441 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false E"} +{"Time":"2023-05-31T11:47:51.877907-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":"xtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:47:51.877909-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.855085 2133 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:47:51.87791-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.862044 2133 out.go:177] \n"} +{"Time":"2023-05-31T11:47:51.877912-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tW0531 11:47:51.864979 2133 out.go:239] X Exiting due to RSRC_INSUFFICIENT_REQ_MEMORY: Requested memory allocation 250MiB is less than the usable minimum of 1800MB\n"} +{"Time":"2023-05-31T11:47:51.877913-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tX Exiting due to RSRC_INSUFFICIENT_REQ_MEMORY: Requested memory allocation 250MiB is less than the usable minimum of 1800MB\n"} +{"Time":"2023-05-31T11:47:51.877914-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \tI0531 11:47:51.869028 2133 out.go:177] \n"} +{"Time":"2023-05-31T11:47:51.87792-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" \n"} +{"Time":"2023-05-31T11:47:51.877922-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:51.877924-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" functional_test.go:986: (dbg) Run: out/minikube-darwin-arm64 start -p functional-730000 --dry-run --alsologtostderr -v=1 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:47:51.978767-07:00","Action":"cont","Test":"TestFunctional/parallel/InternationalLanguage"} +{"Time":"2023-05-31T11:47:51.978779-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"=== CONT TestFunctional/parallel/InternationalLanguage\n"} +{"Time":"2023-05-31T11:47:51.978819-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" functional_test.go:1015: (dbg) Run: out/minikube-darwin-arm64 start -p functional-730000 --dry-run --memory 250MB --alsologtostderr --driver=qemu2 \n"} +{"Time":"2023-05-31T11:47:52.081891-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" functional_test.go:1015: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p functional-730000 --dry-run --memory 250MB --alsologtostderr --driver=qemu2 : exit status 23 (102.934416ms)\n"} +{"Time":"2023-05-31T11:47:52.081905-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T11:47:52.081907-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:47:52.081909-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t* [functional-730000] minikube v1.30.1 sur Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:47:52.081911-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:47:52.081913-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:47:52.081914-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:47:52.081915-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:47:52.081917-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:47:52.081921-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:47:52.08193-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t* Utilisation du pilote qemu2 basé sur le profil existant\n"} +{"Time":"2023-05-31T11:47:52.081932-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t\n"} +{"Time":"2023-05-31T11:47:52.081933-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \t\n"} +{"Time":"2023-05-31T11:47:52.081934-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T11:47:52.081935-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:47:52.081936-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:52.081938-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.001344 2143 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:47:52.081939-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.001455 2143 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:52.081941-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.001457 2143 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:47:52.081942-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.001460 2143 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:52.081944-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.001541 2143 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:47:52.081945-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.002826 2143 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:47:52.081947-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.019924 2143 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1043,\"bootTime\":1685557829,\"procs\":399,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:47:52.08195-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tW0531 11:47:52.020028 2143 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:47:52.081952-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.023120 2143 out.go:177] * [functional-730000] minikube v1.30.1 sur Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:47:52.081953-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.028004 2143 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:47:52.081954-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.028048 2143 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:47:52.081957-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.033062 2143 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:47:52.081958-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.036061 2143 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:47:52.08196-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.039047 2143 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:47:52.081961-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.042094 2143 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:47:52.081963-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.045014 2143 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:47:52.081965-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.048300 2143 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:52.081966-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.048523 2143 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:47:52.081968-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.053079 2143 out.go:177] * Utilisation du pilote qemu2 basé sur le profil existant\n"} +{"Time":"2023-05-31T11:47:52.081969-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.059984 2143 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:47:52.081974-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.059988 2143 start.go:875] validating driver \"qemu2\" against \u0026{Name:functional-730000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T11:47:52.081979-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:functional-730000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:apiserver Key:enable-admission-plugins Value:NamespaceAutoProvision}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8441 NodeName:} Nodes:[{Name: IP:192.168.105.4 Port:8441 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false E"} +{"Time":"2023-05-31T11:47:52.081982-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":"xtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:47:52.081988-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.060026 2143 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:47:52.08199-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.064896 2143 out.go:177] \n"} +{"Time":"2023-05-31T11:47:52.081991-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tW0531 11:47:52.069054 2143 out.go:239] X Fermeture en raison de RSRC_INSUFFICIENT_REQ_MEMORY : L'allocation de mémoire demandée 250 Mio est inférieure au minimum utilisable de 1800 Mo\n"} +{"Time":"2023-05-31T11:47:52.081993-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tX Fermeture en raison de RSRC_INSUFFICIENT_REQ_MEMORY : L'allocation de mémoire demandée 250 Mio est inférieure au minimum utilisable de 1800 Mo\n"} +{"Time":"2023-05-31T11:47:52.081996-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \tI0531 11:47:52.073043 2143 out.go:177] \n"} +{"Time":"2023-05-31T11:47:52.081998-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" \n"} +{"Time":"2023-05-31T11:47:52.082057-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:52.082085-07:00","Action":"cont","Test":"TestFunctional/parallel/DashboardCmd"} +{"Time":"2023-05-31T11:47:52.082088-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":"=== CONT TestFunctional/parallel/DashboardCmd\n"} +{"Time":"2023-05-31T11:47:52.08209-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" functional_test.go:900: (dbg) daemon: [out/minikube-darwin-arm64 dashboard --url --port 36195 -p functional-730000 --alsologtostderr -v=1]\n"} +{"Time":"2023-05-31T11:47:55.056223-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1659: error fetching http://192.168.105.4:30108: Get \"http://192.168.105.4:30108\": dial tcp 192.168.105.4:30108: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:55.056238-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1679: failed to fetch http://192.168.105.4:30108: Get \"http://192.168.105.4:30108\": dial tcp 192.168.105.4:30108: connect: connection refused\n"} +{"Time":"2023-05-31T11:47:55.056242-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1596: service test failed - dumping debug information\n"} +{"Time":"2023-05-31T11:47:55.056244-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1597: -----------------------service failure post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:47:55.056303-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1600: (dbg) Run: kubectl --context functional-730000 describe po hello-node-connect\n"} +{"Time":"2023-05-31T11:47:55.128446-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1604: hello-node pod describe:\n"} +{"Time":"2023-05-31T11:47:55.128463-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Name: hello-node-connect-58d66798bb-stzzj\n"} +{"Time":"2023-05-31T11:47:55.128465-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Namespace: default\n"} +{"Time":"2023-05-31T11:47:55.128467-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Priority: 0\n"} +{"Time":"2023-05-31T11:47:55.128468-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Service Account: default\n"} +{"Time":"2023-05-31T11:47:55.128471-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Node: functional-730000/192.168.105.4\n"} +{"Time":"2023-05-31T11:47:55.128473-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Start Time: Wed, 31 May 2023 11:47:27 -0700\n"} +{"Time":"2023-05-31T11:47:55.128474-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Labels: app=hello-node-connect\n"} +{"Time":"2023-05-31T11:47:55.128477-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" pod-template-hash=58d66798bb\n"} +{"Time":"2023-05-31T11:47:55.128478-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:55.12848-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Status: Running\n"} +{"Time":"2023-05-31T11:47:55.128481-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" IP: 10.244.0.8\n"} +{"Time":"2023-05-31T11:47:55.128482-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" IPs:\n"} +{"Time":"2023-05-31T11:47:55.128483-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" IP: 10.244.0.8\n"} +{"Time":"2023-05-31T11:47:55.128485-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Controlled By: ReplicaSet/hello-node-connect-58d66798bb\n"} +{"Time":"2023-05-31T11:47:55.128486-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Containers:\n"} +{"Time":"2023-05-31T11:47:55.128488-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" echoserver-arm:\n"} +{"Time":"2023-05-31T11:47:55.128512-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Container ID: docker://b37ab09b2fdc56ba62e72f3ac946cc58e87ae29ef3a5321bfd8109b6978e81a0\n"} +{"Time":"2023-05-31T11:47:55.128519-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Image: registry.k8s.io/echoserver-arm:1.8\n"} +{"Time":"2023-05-31T11:47:55.128521-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Image ID: docker-pullable://registry.k8s.io/echoserver-arm@sha256:b33d4cdf6ed097f4e9b77b135d83a596ab73c6268b0342648818eb85f5edfdb5\n"} +{"Time":"2023-05-31T11:47:55.128522-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:55.128524-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:55.128525-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" State: Terminated\n"} +{"Time":"2023-05-31T11:47:55.128526-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Reason: Error\n"} +{"Time":"2023-05-31T11:47:55.128528-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Exit Code: 1\n"} +{"Time":"2023-05-31T11:47:55.128529-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Started: Wed, 31 May 2023 11:47:43 -0700\n"} +{"Time":"2023-05-31T11:47:55.12853-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Finished: Wed, 31 May 2023 11:47:43 -0700\n"} +{"Time":"2023-05-31T11:47:55.128532-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Last State: Terminated\n"} +{"Time":"2023-05-31T11:47:55.128533-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Reason: Error\n"} +{"Time":"2023-05-31T11:47:55.128534-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Exit Code: 1\n"} +{"Time":"2023-05-31T11:47:55.128536-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Started: Wed, 31 May 2023 11:47:29 -0700\n"} +{"Time":"2023-05-31T11:47:55.128537-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Finished: Wed, 31 May 2023 11:47:29 -0700\n"} +{"Time":"2023-05-31T11:47:55.128538-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Ready: False\n"} +{"Time":"2023-05-31T11:47:55.12854-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Restart Count: 2\n"} +{"Time":"2023-05-31T11:47:55.128541-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:55.128543-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Mounts:\n"} +{"Time":"2023-05-31T11:47:55.128544-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-lbqfp (ro)\n"} +{"Time":"2023-05-31T11:47:55.128546-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Conditions:\n"} +{"Time":"2023-05-31T11:47:55.128547-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Type Status\n"} +{"Time":"2023-05-31T11:47:55.128548-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Initialized True \n"} +{"Time":"2023-05-31T11:47:55.128549-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Ready False \n"} +{"Time":"2023-05-31T11:47:55.128551-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" ContainersReady False \n"} +{"Time":"2023-05-31T11:47:55.128552-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" PodScheduled True \n"} +{"Time":"2023-05-31T11:47:55.128553-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Volumes:\n"} +{"Time":"2023-05-31T11:47:55.128555-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" kube-api-access-lbqfp:\n"} +{"Time":"2023-05-31T11:47:55.128556-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T11:47:55.128558-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T11:47:55.128559-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T11:47:55.12856-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:47:55.128562-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" DownwardAPI: true\n"} +{"Time":"2023-05-31T11:47:55.128563-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" QoS Class: BestEffort\n"} +{"Time":"2023-05-31T11:47:55.128564-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Node-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:55.128566-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T11:47:55.128568-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T11:47:55.128569-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Events:\n"} +{"Time":"2023-05-31T11:47:55.12857-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Type Reason Age From Message\n"} +{"Time":"2023-05-31T11:47:55.12858-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T11:47:55.128582-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Normal Scheduled 27s default-scheduler Successfully assigned default/hello-node-connect-58d66798bb-stzzj to functional-730000\n"} +{"Time":"2023-05-31T11:47:55.128584-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Normal Pulled 12s (x3 over 27s) kubelet Container image \"registry.k8s.io/echoserver-arm:1.8\" already present on machine\n"} +{"Time":"2023-05-31T11:47:55.128585-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Normal Created 12s (x3 over 27s) kubelet Created container echoserver-arm\n"} +{"Time":"2023-05-31T11:47:55.128586-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Normal Started 12s (x3 over 27s) kubelet Started container echoserver-arm\n"} +{"Time":"2023-05-31T11:47:55.128589-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Warning BackOff 11s (x3 over 25s) kubelet Back-off restarting failed container echoserver-arm in pod hello-node-connect-58d66798bb-stzzj_default(a120ea47-9aab-4f46-a7f1-0defe24bb54b)\n"} +{"Time":"2023-05-31T11:47:55.128591-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T11:47:55.128594-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1606: (dbg) Run: kubectl --context functional-730000 logs -l app=hello-node-connect\n"} +{"Time":"2023-05-31T11:47:55.172044-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1610: hello-node logs:\n"} +{"Time":"2023-05-31T11:47:55.17206-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" exec /usr/sbin/nginx: exec format error\n"} +{"Time":"2023-05-31T11:47:55.172134-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1612: (dbg) Run: kubectl --context functional-730000 describe svc hello-node-connect\n"} +{"Time":"2023-05-31T11:47:55.209946-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" functional_test.go:1616: hello-node svc describe:\n"} +{"Time":"2023-05-31T11:47:55.20996-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Name: hello-node-connect\n"} +{"Time":"2023-05-31T11:47:55.209962-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Namespace: default\n"} +{"Time":"2023-05-31T11:47:55.209964-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Labels: app=hello-node-connect\n"} +{"Time":"2023-05-31T11:47:55.209965-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Annotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:55.209967-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Selector: app=hello-node-connect\n"} +{"Time":"2023-05-31T11:47:55.209968-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Type: NodePort\n"} +{"Time":"2023-05-31T11:47:55.20997-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" IP Family Policy: SingleStack\n"} +{"Time":"2023-05-31T11:47:55.209971-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" IP Families: IPv4\n"} +{"Time":"2023-05-31T11:47:55.209972-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" IP: 10.100.45.1\n"} +{"Time":"2023-05-31T11:47:55.209974-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" IPs: 10.100.45.1\n"} +{"Time":"2023-05-31T11:47:55.209975-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Port: \u003cunset\u003e 8080/TCP\n"} +{"Time":"2023-05-31T11:47:55.209977-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" TargetPort: 8080/TCP\n"} +{"Time":"2023-05-31T11:47:55.209978-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" NodePort: \u003cunset\u003e 30108/TCP\n"} +{"Time":"2023-05-31T11:47:55.209979-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Endpoints: \n"} +{"Time":"2023-05-31T11:47:55.209981-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Session Affinity: None\n"} +{"Time":"2023-05-31T11:47:55.209982-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" External Traffic Policy: Cluster\n"} +{"Time":"2023-05-31T11:47:55.209983-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" Events: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:55.209997-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:47:55.209999-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p functional-730000 -n functional-730000\n"} +{"Time":"2023-05-31T11:47:55.294048-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:244: \u003c\u003c\u003c TestFunctional/parallel/ServiceCmdConnect FAILED: start of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T11:47:55.294063-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:245: ======\u003e post-mortem[TestFunctional/parallel/ServiceCmdConnect]: minikube logs \u003c======\n"} +{"Time":"2023-05-31T11:47:55.294066-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:247: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 logs -n 25\n"} +{"Time":"2023-05-31T11:47:55.966208-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:252: TestFunctional/parallel/ServiceCmdConnect logs: \n"} +{"Time":"2023-05-31T11:47:55.966225-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:47:55.966227-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.966229-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T11:47:55.966231-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* |-----------|----------------------------------------------------------------------------------------------------------------------|-------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:47:55.966233-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T11:47:55.966236-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t|-----------|----------------------------------------------------------------------------------------------------------------------|-------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:47:55.966246-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966247-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdany-port3328431145/001:/mount-9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966249-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966251-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966252-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -T /mount-9p | grep 9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966254-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966256-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -T /mount-9p | grep 9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966257-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh -- ls | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966319-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -la /mount-9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966337-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh cat | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966352-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | /mount-9p/test-1685558863531147000 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966356-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh stat | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966361-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | /mount-9p/created-by-test | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966365-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh stat | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966371-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | /mount-9p/created-by-pod | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966392-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh sudo | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966398-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | umount -f /mount-9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.96642-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966425-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -T /mount-9p | grep 9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966428-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.96643-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdspecific-port3017336378/001:/mount-9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966431-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --alsologtostderr -v=1 --port 46464 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.96644-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966443-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -T /mount-9p | grep 9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966445-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh -- ls | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966447-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -la /mount-9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966448-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh sudo | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.96645-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | umount -f /mount-9p | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966452-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966454-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount2 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966455-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966458-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.96646-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount3 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966462-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966464-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966466-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -T /mount1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966468-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966472-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966473-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966475-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966477-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -T /mount1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966479-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966481-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -T /mount2 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966482-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:47:55.966484-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -T /mount3 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966486-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966487-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --kill=true | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966489-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| start | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966491-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --dry-run --memory | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966493-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | 250MB --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966495-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966496-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| start | -p functional-730000 --dry-run | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966498-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.9665-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966505-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| start | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966507-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --dry-run --memory | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966511-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | 250MB --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966513-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966515-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| dashboard | --url --port 36195 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:47:55.966517-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | -p functional-730000 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966519-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:47:55.966521-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t|-----------|----------------------------------------------------------------------------------------------------------------------|-------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:47:55.966524-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.966526-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.966527-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T11:47:55.966528-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* Log file created at: 2023/05/31 11:47:52\n"} +{"Time":"2023-05-31T11:47:55.96653-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tRunning on machine: MacOS-M1-Agent-1\n"} +{"Time":"2023-05-31T11:47:55.966531-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tBinary: Built with gc go1.20.4 for darwin/arm64\n"} +{"Time":"2023-05-31T11:47:55.966532-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T11:47:55.966534-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.001344 2143 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:47:55.966535-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.001455 2143 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:55.966537-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.001457 2143 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:47:55.966538-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.001460 2143 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:55.96654-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.001541 2143 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:47:55.966542-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.002826 2143 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:47:55.966543-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.019924 2143 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1043,\"bootTime\":1685557829,\"procs\":399,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:47:55.966547-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 11:47:52.020028 2143 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:47:55.966548-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.023120 2143 out.go:177] * [functional-730000] minikube v1.30.1 sur Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:47:55.96655-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.028004 2143 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:47:55.966552-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.028048 2143 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:47:55.966553-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.033062 2143 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:47:55.966554-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.036061 2143 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:47:55.966556-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.039047 2143 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:47:55.966558-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.042094 2143 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:47:55.96656-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.045014 2143 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:47:55.966561-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.048300 2143 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:55.966563-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.048523 2143 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:47:55.966564-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.053079 2143 out.go:177] * Utilisation du pilote qemu2 basé sur le profil existant\n"} +{"Time":"2023-05-31T11:47:55.966566-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.059984 2143 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:47:55.966569-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.059988 2143 start.go:875] validating driver \"qemu2\" against \u0026{Name:functional-730000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T11:47:55.966573-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:functional-730000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:apiserver Key:enable-admission-plugins Value:NamespaceAutoProvision}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8441 NodeName:} Nodes:[{Name: IP:192.168.105.4 Port:8441 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[default-storageclass:true storage-provisioner:true] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false E"} +{"Time":"2023-05-31T11:47:55.966576-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"xtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:47:55.966578-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.060026 2143 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:47:55.96658-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.064896 2143 out.go:177] \n"} +{"Time":"2023-05-31T11:47:55.966582-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 11:47:52.069054 2143 out.go:239] X Fermeture en raison de RSRC_INSUFFICIENT_REQ_MEMORY : L'allocation de mémoire demandée 250 Mio est inférieure au minimum utilisable de 1800 Mo\n"} +{"Time":"2023-05-31T11:47:55.966584-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 11:47:52.073043 2143 out.go:177] \n"} +{"Time":"2023-05-31T11:47:55.966593-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.966594-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.966596-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e Docker \u003c==\n"} +{"Time":"2023-05-31T11:47:55.966597-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* -- Journal begins at Wed 2023-05-31 18:45:05 UTC, ends at Wed 2023-05-31 18:47:55 UTC. --\n"} +{"Time":"2023-05-31T11:47:55.966599-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:52.746602746Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:47:55.966601-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:52.746609163Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:47:55.966605-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:52.746613538Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:47:55.966607-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 dockerd[6409]: time=\"2023-05-31T18:47:52.796623127Z\" level=info msg=\"ignoring event\" container=ed99806330001ee36b648790874659b678081e3992fb4fba54eb2ea94b54d211 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T11:47:55.966609-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:52.796816791Z\" level=info msg=\"shim disconnected\" id=ed99806330001ee36b648790874659b678081e3992fb4fba54eb2ea94b54d211 namespace=moby\n"} +{"Time":"2023-05-31T11:47:55.966611-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:52.796846791Z\" level=warning msg=\"cleaning up after shim disconnected\" id=ed99806330001ee36b648790874659b678081e3992fb4fba54eb2ea94b54d211 namespace=moby\n"} +{"Time":"2023-05-31T11:47:55.966622-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:52.796851833Z\" level=info msg=\"cleaning up dead shim\" namespace=moby\n"} +{"Time":"2023-05-31T11:47:55.966635-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:52.808136772Z\" level=warning msg=\"cleanup warnings time=\\\"2023-05-31T18:47:52Z\\\" level=warning msg=\\\"failed to remove runc container\\\" error=\\\"runc did not terminate successfully: exit status 255: \\\" runtime=io.containerd.runc.v2\\n\" namespace=moby\n"} +{"Time":"2023-05-31T11:47:55.966642-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:53.051362167Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T11:47:55.966667-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:53.051397958Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:47:55.966674-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:53.051422291Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:47:55.966678-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:53.051427625Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:47:55.966694-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:53.051667456Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T11:47:55.966696-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:53.051687206Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:47:55.966698-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:53.051693456Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:47:55.9667-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:53.051697622Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:47:55.966702-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 cri-dockerd[6670]: time=\"2023-05-31T18:47:53Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/c944fe5735503acb2910209cce1edfb4ea4a87ebb0c376a19be2b020c39184e8/resolv.conf as [nameserver 10.96.0.10 search kubernetes-dashboard.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\n"} +{"Time":"2023-05-31T11:47:55.966705-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 cri-dockerd[6670]: time=\"2023-05-31T18:47:53Z\" level=info msg=\"Will attempt to re-write config file /var/lib/docker/containers/284f13a4477aa037fa4e35fefb5759190e528f1c3a4f3cbbe246cd07fff48bf0/resolv.conf as [nameserver 10.96.0.10 search kubernetes-dashboard.svc.cluster.local svc.cluster.local cluster.local options ndots:5]\"\n"} +{"Time":"2023-05-31T11:47:55.966707-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:53 functional-730000 dockerd[6409]: time=\"2023-05-31T18:47:53.462181398Z\" level=warning msg=\"reference for unknown type: \" digest=\"sha256:76049887f07a0476dc93efc2d3569b9529bf982b22d29f356092ce206e98765c\" remote=\"docker.io/kubernetesui/metrics-scraper@sha256:76049887f07a0476dc93efc2d3569b9529bf982b22d29f356092ce206e98765c\"\n"} +{"Time":"2023-05-31T11:47:55.966709-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:55 functional-730000 cri-dockerd[6670]: time=\"2023-05-31T18:47:55Z\" level=info msg=\"Stop pulling image docker.io/kubernetesui/metrics-scraper:v1.0.8@sha256:76049887f07a0476dc93efc2d3569b9529bf982b22d29f356092ce206e98765c: Status: Downloaded newer image for kubernetesui/metrics-scraper@sha256:76049887f07a0476dc93efc2d3569b9529bf982b22d29f356092ce206e98765c\"\n"} +{"Time":"2023-05-31T11:47:55.966711-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:55 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:55.213790304Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T11:47:55.966713-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:55 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:55.213829262Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:47:55.966716-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:55 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:55.213840887Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:47:55.966718-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:55 functional-730000 dockerd[6416]: time=\"2023-05-31T18:47:55.213847595Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:47:55.96672-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:55 functional-730000 dockerd[6409]: time=\"2023-05-31T18:47:55.373511324Z\" level=warning msg=\"reference for unknown type: \" digest=\"sha256:2e500d29e9d5f4a086b908eb8dfe7ecac57d2ab09d65b24f588b1d449841ef93\" remote=\"docker.io/kubernetesui/dashboard@sha256:2e500d29e9d5f4a086b908eb8dfe7ecac57d2ab09d65b24f588b1d449841ef93\"\n"} +{"Time":"2023-05-31T11:47:55.966722-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.966723-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.966724-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e container status \u003c==\n"} +{"Time":"2023-05-31T11:47:55.966726-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\n"} +{"Time":"2023-05-31T11:47:55.966727-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tcb916b7db3007 kubernetesui/metrics-scraper@sha256:76049887f07a0476dc93efc2d3569b9529bf982b22d29f356092ce206e98765c Less than a second ago Running dashboard-metrics-scraper 0 c944fe5735503\n"} +{"Time":"2023-05-31T11:47:55.966729-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \ted99806330001 72565bf5bbedf 3 seconds ago Exited echoserver-arm 3 91c15783f4de3\n"} +{"Time":"2023-05-31T11:47:55.966731-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t387d64203306d gcr.io/k8s-minikube/busybox@sha256:2d03e6ceeb99250061dd110530b0ece7998cd84121f952adef120ea7c5a6f00e 8 seconds ago Exited mount-munger 0 bc2e6dff9ee8b\n"} +{"Time":"2023-05-31T11:47:55.966732-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tb37ab09b2fdc5 72565bf5bbedf 12 seconds ago Exited echoserver-arm 2 09c9965f5eeb2\n"} +{"Time":"2023-05-31T11:47:55.966734-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tba32bd700e33c nginx@sha256:af296b188c7b7df99ba960ca614439c99cb7cf252ed7bbc23e90cfda59092305 19 seconds ago Running myfrontend 0 697b8fcf14488\n"} +{"Time":"2023-05-31T11:47:55.966736-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t88a6c3163e38d nginx@sha256:2e776a66a3556f001aba13431b26e448fe8acba277bf93d2ab1a785571a46d90 35 seconds ago Running nginx 0 648926570f4ec\n"} +{"Time":"2023-05-31T11:47:55.966738-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \ta95b3c7f02f75 97e04611ad434 About a minute ago Running coredns 2 3a53ab0a3dc82\n"} +{"Time":"2023-05-31T11:47:55.966739-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t3e36a86f06489 ba04bb24b9575 About a minute ago Running storage-provisioner 2 3a5e8b15463b3\n"} +{"Time":"2023-05-31T11:47:55.966741-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tf455352a1d88f 29921a0845422 About a minute ago Running kube-proxy 2 c6f72539304db\n"} +{"Time":"2023-05-31T11:47:55.966743-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t7c026b8450b61 72c9df6be7f1b About a minute ago Running kube-apiserver 0 c749e29fb6dbd\n"} +{"Time":"2023-05-31T11:47:55.966745-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tc299c6a97ce25 24bc64e911039 About a minute ago Running etcd 2 e0dc7403d2089\n"} +{"Time":"2023-05-31T11:47:55.966746-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t27fa0bde23d9e 2ee705380c3c5 About a minute ago Running kube-controller-manager 2 01eab1054e7c0\n"} +{"Time":"2023-05-31T11:47:55.966748-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t0c6723ae1d6f4 305d7ed1dae28 About a minute ago Running kube-scheduler 2 f2411c8ad2093\n"} +{"Time":"2023-05-31T11:47:55.96675-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t45299a343d096 ba04bb24b9575 About a minute ago Exited storage-provisioner 1 458146be43da4\n"} +{"Time":"2023-05-31T11:47:55.966751-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t5095eee524e78 97e04611ad434 About a minute ago Exited coredns 1 5d0ea12322481\n"} +{"Time":"2023-05-31T11:47:55.966753-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t8f54741bc2c0d 29921a0845422 About a minute ago Exited kube-proxy 1 667940fcad8f1\n"} +{"Time":"2023-05-31T11:47:55.966755-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t0ad12502565b1 305d7ed1dae28 About a minute ago Exited kube-scheduler 1 a46c66908f732\n"} +{"Time":"2023-05-31T11:47:55.966756-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t55d5165223483 2ee705380c3c5 About a minute ago Exited kube-controller-manager 1 ebf6dc34a38fc\n"} +{"Time":"2023-05-31T11:47:55.966761-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \ta7036c2a3d0b8 24bc64e911039 About a minute ago Exited etcd 1 7eadd407fe906\n"} +{"Time":"2023-05-31T11:47:55.966762-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.966763-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.966764-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e coredns [5095eee524e7] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.966766-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* [INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T11:47:55.966767-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] plugin/ready: Still waiting on: \"kubernetes\"\n"} +{"Time":"2023-05-31T11:47:55.966769-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T11:47:55.96677-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] plugin/kubernetes: waiting for Kubernetes API before starting server\n"} +{"Time":"2023-05-31T11:47:55.966771-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t.:53\n"} +{"Time":"2023-05-31T11:47:55.966773-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] plugin/reload: Running configuration SHA512 = ea7a0d73d9d208f758b1f67640ef03c58089b9d9366cf3478df3bb369b210e39f213811b46224f8a04380814b6e0890ccd358f5b5e8c80bc22ac19c8601ee35b\n"} +{"Time":"2023-05-31T11:47:55.966774-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tCoreDNS-1.10.1\n"} +{"Time":"2023-05-31T11:47:55.966775-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tlinux/arm64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T11:47:55.966777-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] 127.0.0.1:52752 - 57209 \"HINFO IN 7875390671645935058.6448967527405444882. udp 57 false 512\" NXDOMAIN qr,rd,ra 132 0.004716405s\n"} +{"Time":"2023-05-31T11:47:55.966778-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] SIGTERM: Shutting down servers then terminating\n"} +{"Time":"2023-05-31T11:47:55.96678-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] plugin/health: Going into lameduck mode for 5s\n"} +{"Time":"2023-05-31T11:47:55.966781-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.966782-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.966783-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e coredns [a95b3c7f02f7] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.966785-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* .:53\n"} +{"Time":"2023-05-31T11:47:55.966789-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] plugin/reload: Running configuration SHA512 = ea7a0d73d9d208f758b1f67640ef03c58089b9d9366cf3478df3bb369b210e39f213811b46224f8a04380814b6e0890ccd358f5b5e8c80bc22ac19c8601ee35b\n"} +{"Time":"2023-05-31T11:47:55.96679-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tCoreDNS-1.10.1\n"} +{"Time":"2023-05-31T11:47:55.966791-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tlinux/arm64, go1.20, 055b2c3\n"} +{"Time":"2023-05-31T11:47:55.966793-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] 127.0.0.1:44220 - 50646 \"HINFO IN 4852947524019685056.8356553131542767452. udp 57 false 512\" NXDOMAIN qr,rd,ra 132 0.004723577s\n"} +{"Time":"2023-05-31T11:47:55.966794-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] 10.244.0.1:35130 - 32096 \"A IN nginx-svc.default.svc.cluster.local. udp 64 false 4096\" NOERROR qr,aa,rd 104 0.000124997s\n"} +{"Time":"2023-05-31T11:47:55.966797-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] 10.244.0.1:33705 - 35206 \"AAAA IN nginx-svc.default.svc.cluster.local. udp 53 false 512\" NOERROR qr,aa,rd 146 0.000128914s\n"} +{"Time":"2023-05-31T11:47:55.966799-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] 10.244.0.1:44216 - 12594 \"SVCB IN _dns.resolver.arpa. udp 36 false 512\" NXDOMAIN qr,rd,ra 116 0.001467262s\n"} +{"Time":"2023-05-31T11:47:55.966801-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] 10.244.0.1:8559 - 7176 \"A IN nginx-svc.default.svc.cluster.local. udp 53 false 512\" NOERROR qr,aa,rd 104 0.000035499s\n"} +{"Time":"2023-05-31T11:47:55.966802-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] 10.244.0.1:57570 - 51364 \"AAAA IN nginx-svc.default.svc.cluster.local. udp 64 false 1232\" NOERROR qr,aa,rd 146 0.000053374s\n"} +{"Time":"2023-05-31T11:47:55.966804-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[INFO] 10.244.0.1:4669 - 52881 \"A IN nginx-svc.default.svc.cluster.local. udp 64 false 1232\" NOERROR qr,aa,rd 104 0.000029707s\n"} +{"Time":"2023-05-31T11:47:55.966805-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.966806-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.966807-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e describe nodes \u003c==\n"} +{"Time":"2023-05-31T11:47:55.966809-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* Name: functional-730000\n"} +{"Time":"2023-05-31T11:47:55.966812-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tRoles: control-plane\n"} +{"Time":"2023-05-31T11:47:55.966814-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tLabels: beta.kubernetes.io/arch=arm64\n"} +{"Time":"2023-05-31T11:47:55.966815-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t beta.kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T11:47:55.966816-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kubernetes.io/arch=arm64\n"} +{"Time":"2023-05-31T11:47:55.966818-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kubernetes.io/hostname=functional-730000\n"} +{"Time":"2023-05-31T11:47:55.966819-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T11:47:55.966821-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140\n"} +{"Time":"2023-05-31T11:47:55.966823-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t minikube.k8s.io/name=functional-730000\n"} +{"Time":"2023-05-31T11:47:55.966824-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t minikube.k8s.io/primary=true\n"} +{"Time":"2023-05-31T11:47:55.966825-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t minikube.k8s.io/updated_at=2023_05_31T11_45_25_0700\n"} +{"Time":"2023-05-31T11:47:55.966827-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t minikube.k8s.io/version=v1.30.1\n"} +{"Time":"2023-05-31T11:47:55.966828-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t node-role.kubernetes.io/control-plane=\n"} +{"Time":"2023-05-31T11:47:55.966829-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t node.kubernetes.io/exclude-from-external-load-balancers=\n"} +{"Time":"2023-05-31T11:47:55.966831-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tAnnotations: kubeadm.alpha.kubernetes.io/cri-socket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:47:55.966833-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t node.alpha.kubernetes.io/ttl: 0\n"} +{"Time":"2023-05-31T11:47:55.966834-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t volumes.kubernetes.io/controller-managed-attach-detach: true\n"} +{"Time":"2023-05-31T11:47:55.966838-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tCreationTimestamp: Wed, 31 May 2023 18:45:22 +0000\n"} +{"Time":"2023-05-31T11:47:55.966839-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tTaints: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:55.96684-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tUnschedulable: false\n"} +{"Time":"2023-05-31T11:47:55.966842-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tLease:\n"} +{"Time":"2023-05-31T11:47:55.966843-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t HolderIdentity: functional-730000\n"} +{"Time":"2023-05-31T11:47:55.966844-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t AcquireTime: \u003cunset\u003e\n"} +{"Time":"2023-05-31T11:47:55.966846-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t RenewTime: Wed, 31 May 2023 18:47:54 +0000\n"} +{"Time":"2023-05-31T11:47:55.966847-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tConditions:\n"} +{"Time":"2023-05-31T11:47:55.966849-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Type Status LastHeartbeatTime LastTransitionTime Reason Message\n"} +{"Time":"2023-05-31T11:47:55.96685-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ---- ------ ----------------- ------------------ ------ -------\n"} +{"Time":"2023-05-31T11:47:55.966852-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t MemoryPressure False Wed, 31 May 2023 18:47:43 +0000 Wed, 31 May 2023 18:45:22 +0000 KubeletHasSufficientMemory kubelet has sufficient memory available\n"} +{"Time":"2023-05-31T11:47:55.966854-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t DiskPressure False Wed, 31 May 2023 18:47:43 +0000 Wed, 31 May 2023 18:45:22 +0000 KubeletHasNoDiskPressure kubelet has no disk pressure\n"} +{"Time":"2023-05-31T11:47:55.966855-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t PIDPressure False Wed, 31 May 2023 18:47:43 +0000 Wed, 31 May 2023 18:45:22 +0000 KubeletHasSufficientPID kubelet has sufficient PID available\n"} +{"Time":"2023-05-31T11:47:55.966857-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Ready True Wed, 31 May 2023 18:47:43 +0000 Wed, 31 May 2023 18:45:27 +0000 KubeletReady kubelet is posting ready status\n"} +{"Time":"2023-05-31T11:47:55.966859-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tAddresses:\n"} +{"Time":"2023-05-31T11:47:55.96686-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t InternalIP: 192.168.105.4\n"} +{"Time":"2023-05-31T11:47:55.966861-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Hostname: functional-730000\n"} +{"Time":"2023-05-31T11:47:55.966862-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tCapacity:\n"} +{"Time":"2023-05-31T11:47:55.966864-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t cpu: 2\n"} +{"Time":"2023-05-31T11:47:55.966865-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ephemeral-storage: 17784760Ki\n"} +{"Time":"2023-05-31T11:47:55.966866-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-1Gi: 0\n"} +{"Time":"2023-05-31T11:47:55.966867-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T11:47:55.966869-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-32Mi: 0\n"} +{"Time":"2023-05-31T11:47:55.96687-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-64Ki: 0\n"} +{"Time":"2023-05-31T11:47:55.966871-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t memory: 3905972Ki\n"} +{"Time":"2023-05-31T11:47:55.966873-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T11:47:55.966874-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tAllocatable:\n"} +{"Time":"2023-05-31T11:47:55.966875-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t cpu: 2\n"} +{"Time":"2023-05-31T11:47:55.966877-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ephemeral-storage: 17784760Ki\n"} +{"Time":"2023-05-31T11:47:55.966878-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-1Gi: 0\n"} +{"Time":"2023-05-31T11:47:55.966879-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T11:47:55.966885-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-32Mi: 0\n"} +{"Time":"2023-05-31T11:47:55.966886-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-64Ki: 0\n"} +{"Time":"2023-05-31T11:47:55.966888-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t memory: 3905972Ki\n"} +{"Time":"2023-05-31T11:47:55.96689-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T11:47:55.966891-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tSystem Info:\n"} +{"Time":"2023-05-31T11:47:55.966892-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Machine ID: 08566a2bd5694af89aacb58901fd2069\n"} +{"Time":"2023-05-31T11:47:55.966893-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t System UUID: 08566a2bd5694af89aacb58901fd2069\n"} +{"Time":"2023-05-31T11:47:55.966895-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Boot ID: 327b4b84-94ab-496d-b577-168c3bec70c5\n"} +{"Time":"2023-05-31T11:47:55.966896-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Kernel Version: 5.10.57\n"} +{"Time":"2023-05-31T11:47:55.9669-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t OS Image: Buildroot 2021.02.12\n"} +{"Time":"2023-05-31T11:47:55.966901-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Operating System: linux\n"} +{"Time":"2023-05-31T11:47:55.966902-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Architecture: arm64\n"} +{"Time":"2023-05-31T11:47:55.966904-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Container Runtime Version: docker://24.0.1\n"} +{"Time":"2023-05-31T11:47:55.966905-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Kubelet Version: v1.27.2\n"} +{"Time":"2023-05-31T11:47:55.966906-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Kube-Proxy Version: v1.27.2\n"} +{"Time":"2023-05-31T11:47:55.966907-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tPodCIDR: 10.244.0.0/24\n"} +{"Time":"2023-05-31T11:47:55.966909-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tPodCIDRs: 10.244.0.0/24\n"} +{"Time":"2023-05-31T11:47:55.96691-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tNon-terminated Pods: (13 in total)\n"} +{"Time":"2023-05-31T11:47:55.966911-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Namespace Name CPU Requests CPU Limits Memory Requests Memory Limits Age\n"} +{"Time":"2023-05-31T11:47:55.966913-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t --------- ---- ------------ ---------- --------------- ------------- ---\n"} +{"Time":"2023-05-31T11:47:55.966914-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t default hello-node-7b684b55f9-7pbws 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 50s\n"} +{"Time":"2023-05-31T11:47:55.966916-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t default hello-node-connect-58d66798bb-stzzj 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 28s\n"} +{"Time":"2023-05-31T11:47:55.966917-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t default nginx-svc 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 38s\n"} +{"Time":"2023-05-31T11:47:55.966919-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t default sp-pod 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 20s\n"} +{"Time":"2023-05-31T11:47:55.966921-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kube-system coredns-5d78c9869d-wvnft 100m (5%!)(MISSING) 0 (0%!)(MISSING) 70Mi (1%!)(MISSING) 170Mi (4%!)(MISSING) 2m18s\n"} +{"Time":"2023-05-31T11:47:55.966922-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kube-system etcd-functional-730000 100m (5%!)(MISSING) 0 (0%!)(MISSING) 100Mi (2%!)(MISSING) 0 (0%!)(MISSING) 2m30s\n"} +{"Time":"2023-05-31T11:47:55.966924-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kube-system kube-apiserver-functional-730000 250m (12%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 72s\n"} +{"Time":"2023-05-31T11:47:55.966925-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kube-system kube-controller-manager-functional-730000 200m (10%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 2m31s\n"} +{"Time":"2023-05-31T11:47:55.966927-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kube-system kube-proxy-mdct7 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 2m17s\n"} +{"Time":"2023-05-31T11:47:55.966929-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kube-system kube-scheduler-functional-730000 100m (5%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 2m30s\n"} +{"Time":"2023-05-31T11:47:55.966931-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kube-system storage-provisioner 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 2m17s\n"} +{"Time":"2023-05-31T11:47:55.966932-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kubernetes-dashboard dashboard-metrics-scraper-5dd9cbfd69-f2kgx 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 3s\n"} +{"Time":"2023-05-31T11:47:55.966934-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kubernetes-dashboard kubernetes-dashboard-5c5cfc8747-v249w 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 3s\n"} +{"Time":"2023-05-31T11:47:55.966935-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tAllocated resources:\n"} +{"Time":"2023-05-31T11:47:55.966937-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t (Total limits may be over 100 percent, i.e., overcommitted.)\n"} +{"Time":"2023-05-31T11:47:55.966938-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Resource Requests Limits\n"} +{"Time":"2023-05-31T11:47:55.966939-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t -------- -------- ------\n"} +{"Time":"2023-05-31T11:47:55.96694-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t cpu 750m (37%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:47:55.966955-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t memory 170Mi (4%!)(MISSING) 170Mi (4%!)(MISSING)\n"} +{"Time":"2023-05-31T11:47:55.966959-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ephemeral-storage 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:47:55.966961-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-1Gi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:47:55.966962-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-2Mi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:47:55.966964-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-32Mi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:47:55.966965-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t hugepages-64Ki 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:47:55.966966-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tEvents:\n"} +{"Time":"2023-05-31T11:47:55.966968-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Type Reason Age From Message\n"} +{"Time":"2023-05-31T11:47:55.966969-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T11:47:55.966971-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Starting 2m16s kube-proxy \n"} +{"Time":"2023-05-31T11:47:55.966972-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Starting 71s kube-proxy \n"} +{"Time":"2023-05-31T11:47:55.966973-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Starting 116s kube-proxy \n"} +{"Time":"2023-05-31T11:47:55.966975-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasNoDiskPressure 2m35s (x8 over 2m35s) kubelet Node functional-730000 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T11:47:55.966976-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasSufficientMemory 2m35s (x8 over 2m35s) kubelet Node functional-730000 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T11:47:55.966978-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Starting 2m35s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T11:47:55.96698-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasSufficientPID 2m35s (x7 over 2m35s) kubelet Node functional-730000 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T11:47:55.966981-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeAllocatableEnforced 2m35s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T11:47:55.966983-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasSufficientPID 2m30s kubelet Node functional-730000 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T11:47:55.967044-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeAllocatableEnforced 2m30s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T11:47:55.967046-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasSufficientMemory 2m30s kubelet Node functional-730000 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T11:47:55.967048-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasNoDiskPressure 2m30s kubelet Node functional-730000 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T11:47:55.967049-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Starting 2m30s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T11:47:55.967051-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeReady 2m28s kubelet Node functional-730000 status is now: NodeReady\n"} +{"Time":"2023-05-31T11:47:55.967052-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal RegisteredNode 2m17s node-controller Node functional-730000 event: Registered Node functional-730000 in Controller\n"} +{"Time":"2023-05-31T11:47:55.967054-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal RegisteredNode 104s node-controller Node functional-730000 event: Registered Node functional-730000 in Controller\n"} +{"Time":"2023-05-31T11:47:55.967056-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasNoDiskPressure 76s (x8 over 76s) kubelet Node functional-730000 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T11:47:55.967058-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasSufficientMemory 76s (x8 over 76s) kubelet Node functional-730000 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T11:47:55.967059-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Starting 76s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T11:47:55.96706-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeHasSufficientPID 76s (x7 over 76s) kubelet Node functional-730000 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T11:47:55.967062-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal NodeAllocatableEnforced 76s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T11:47:55.967064-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal RegisteredNode 60s node-controller Node functional-730000 event: Registered Node functional-730000 in Controller\n"} +{"Time":"2023-05-31T11:47:55.967065-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.967066-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.967139-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e dmesg \u003c==\n"} +{"Time":"2023-05-31T11:47:55.967143-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* [ +0.102215] systemd-fstab-generator[3554]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967147-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +5.191188] kauditd_printk_skb: 23 callbacks suppressed\n"} +{"Time":"2023-05-31T11:47:55.967148-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +6.307939] systemd-fstab-generator[4113]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.96715-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.085289] systemd-fstab-generator[4124]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967151-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.082045] systemd-fstab-generator[4135]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967153-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.074722] systemd-fstab-generator[4146]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967154-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.092117] systemd-fstab-generator[4214]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.96716-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[May31 18:46] kauditd_printk_skb: 42 callbacks suppressed\n"} +{"Time":"2023-05-31T11:47:55.967162-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +15.011677] systemd-fstab-generator[5962]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967163-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.164551] systemd-fstab-generator[5994]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967164-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.082325] systemd-fstab-generator[6005]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967166-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.102406] systemd-fstab-generator[6018]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967167-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +11.495093] systemd-fstab-generator[6560]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967168-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.085056] systemd-fstab-generator[6571]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.96717-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.070814] systemd-fstab-generator[6582]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967171-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.083684] systemd-fstab-generator[6593]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967172-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.089940] systemd-fstab-generator[6663]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967243-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +0.857463] systemd-fstab-generator[6910]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:47:55.967249-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +4.419380] kauditd_printk_skb: 45 callbacks suppressed\n"} +{"Time":"2023-05-31T11:47:55.967253-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +11.624805] kauditd_printk_skb: 1 callbacks suppressed\n"} +{"Time":"2023-05-31T11:47:55.967257-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[May31 18:47] TCP: eth0: Driver has suspect GRO implementation, TCP performance may be compromised.\n"} +{"Time":"2023-05-31T11:47:55.967261-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +17.482743] kauditd_printk_skb: 3 callbacks suppressed\n"} +{"Time":"2023-05-31T11:47:55.967265-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +5.227725] kauditd_printk_skb: 4 callbacks suppressed\n"} +{"Time":"2023-05-31T11:47:55.967268-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +15.485589] kauditd_printk_skb: 3 callbacks suppressed\n"} +{"Time":"2023-05-31T11:47:55.967272-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t[ +7.708651] kauditd_printk_skb: 3 callbacks suppressed\n"} +{"Time":"2023-05-31T11:47:55.967275-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.967278-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.967282-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e etcd [a7036c2a3d0b] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.967286-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* {\"level\":\"info\",\"ts\":\"2023-05-31T18:45:57.401Z\",\"caller\":\"embed/etcd.go:558\",\"msg\":\"cmux::serve\",\"address\":\"192.168.105.4:2380\"}\n"} +{"Time":"2023-05-31T11:47:55.967291-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:57.401Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 switched to configuration voters=(527499358918876438)\"}\n"} +{"Time":"2023-05-31T11:47:55.96731-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:57.401Z\",\"caller\":\"membership/cluster.go:421\",\"msg\":\"added member\",\"cluster-id\":\"80e92d98c466b02f\",\"local-member-id\":\"7520ddf439b1d16\",\"added-peer-id\":\"7520ddf439b1d16\",\"added-peer-peer-urls\":[\"https://192.168.105.4:2380\"]}\n"} +{"Time":"2023-05-31T11:47:55.967317-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:57.401Z\",\"caller\":\"membership/cluster.go:584\",\"msg\":\"set initial cluster version\",\"cluster-id\":\"80e92d98c466b02f\",\"local-member-id\":\"7520ddf439b1d16\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T11:47:55.967322-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:57.401Z\",\"caller\":\"api/capability.go:75\",\"msg\":\"enabled capabilities for version\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T11:47:55.967339-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.492Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 is starting a new election at term 2\"}\n"} +{"Time":"2023-05-31T11:47:55.967352-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.492Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 became pre-candidate at term 2\"}\n"} +{"Time":"2023-05-31T11:47:55.967372-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.493Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 received MsgPreVoteResp from 7520ddf439b1d16 at term 2\"}\n"} +{"Time":"2023-05-31T11:47:55.967381-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.493Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 became candidate at term 3\"}\n"} +{"Time":"2023-05-31T11:47:55.967401-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.493Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 received MsgVoteResp from 7520ddf439b1d16 at term 3\"}\n"} +{"Time":"2023-05-31T11:47:55.967406-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.493Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 became leader at term 3\"}\n"} +{"Time":"2023-05-31T11:47:55.967431-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.493Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"raft.node: 7520ddf439b1d16 elected leader 7520ddf439b1d16 at term 3\"}\n"} +{"Time":"2023-05-31T11:47:55.967438-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.494Z\",\"caller\":\"etcdserver/server.go:2062\",\"msg\":\"published local member to cluster through raft\",\"local-member-id\":\"7520ddf439b1d16\",\"local-member-attributes\":\"{Name:functional-730000 ClientURLs:[https://192.168.105.4:2379]}\",\"request-path\":\"/0/members/7520ddf439b1d16/attributes\",\"cluster-id\":\"80e92d98c466b02f\",\"publish-timeout\":\"7s\"}\n"} +{"Time":"2023-05-31T11:47:55.967444-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.494Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T11:47:55.967448-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.494Z\",\"caller\":\"etcdmain/main.go:44\",\"msg\":\"notifying init daemon\"}\n"} +{"Time":"2023-05-31T11:47:55.967452-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.494Z\",\"caller\":\"etcdmain/main.go:50\",\"msg\":\"successfully notified init daemon\"}\n"} +{"Time":"2023-05-31T11:47:55.967456-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.494Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T11:47:55.967461-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.495Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"127.0.0.1:2379\"}\n"} +{"Time":"2023-05-31T11:47:55.967466-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:45:58.495Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"192.168.105.4:2379\"}\n"} +{"Time":"2023-05-31T11:47:55.96747-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:27.011Z\",\"caller\":\"osutil/interrupt_unix.go:64\",\"msg\":\"received signal; shutting down\",\"signal\":\"terminated\"}\n"} +{"Time":"2023-05-31T11:47:55.967489-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:27.012Z\",\"caller\":\"embed/etcd.go:373\",\"msg\":\"closing etcd server\",\"name\":\"functional-730000\",\"data-dir\":\"/var/lib/minikube/etcd\",\"advertise-peer-urls\":[\"https://192.168.105.4:2380\"],\"advertise-client-urls\":[\"https://192.168.105.4:2379\"]}\n"} +{"Time":"2023-05-31T11:47:55.967497-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:27.022Z\",\"caller\":\"etcdserver/server.go:1465\",\"msg\":\"skipped leadership transfer for single voting member cluster\",\"local-member-id\":\"7520ddf439b1d16\",\"current-leader-member-id\":\"7520ddf439b1d16\"}\n"} +{"Time":"2023-05-31T11:47:55.967525-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:27.023Z\",\"caller\":\"embed/etcd.go:568\",\"msg\":\"stopping serving peer traffic\",\"address\":\"192.168.105.4:2380\"}\n"} +{"Time":"2023-05-31T11:47:55.967554-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:27.025Z\",\"caller\":\"embed/etcd.go:573\",\"msg\":\"stopped serving peer traffic\",\"address\":\"192.168.105.4:2380\"}\n"} +{"Time":"2023-05-31T11:47:55.967559-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:27.025Z\",\"caller\":\"embed/etcd.go:375\",\"msg\":\"closed etcd server\",\"name\":\"functional-730000\",\"data-dir\":\"/var/lib/minikube/etcd\",\"advertise-peer-urls\":[\"https://192.168.105.4:2380\"],\"advertise-client-urls\":[\"https://192.168.105.4:2379\"]}\n"} +{"Time":"2023-05-31T11:47:55.967563-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.967566-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.96757-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e etcd [c299c6a97ce2] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.967574-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* {\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.927Z\",\"caller\":\"fileutil/purge.go:44\",\"msg\":\"started to purge file\",\"dir\":\"/var/lib/minikube/etcd/member/snap\",\"suffix\":\"snap\",\"max\":5,\"interval\":\"30s\"}\n"} +{"Time":"2023-05-31T11:47:55.96758-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.927Z\",\"caller\":\"fileutil/purge.go:44\",\"msg\":\"started to purge file\",\"dir\":\"/var/lib/minikube/etcd/member/wal\",\"suffix\":\"wal\",\"max\":5,\"interval\":\"30s\"}\n"} +{"Time":"2023-05-31T11:47:55.967584-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.927Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 switched to configuration voters=(527499358918876438)\"}\n"} +{"Time":"2023-05-31T11:47:55.967589-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.928Z\",\"caller\":\"membership/cluster.go:421\",\"msg\":\"added member\",\"cluster-id\":\"80e92d98c466b02f\",\"local-member-id\":\"7520ddf439b1d16\",\"added-peer-id\":\"7520ddf439b1d16\",\"added-peer-peer-urls\":[\"https://192.168.105.4:2380\"]}\n"} +{"Time":"2023-05-31T11:47:55.967594-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.928Z\",\"caller\":\"membership/cluster.go:584\",\"msg\":\"set initial cluster version\",\"cluster-id\":\"80e92d98c466b02f\",\"local-member-id\":\"7520ddf439b1d16\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T11:47:55.967599-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.928Z\",\"caller\":\"api/capability.go:75\",\"msg\":\"enabled capabilities for version\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T11:47:55.967605-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.932Z\",\"caller\":\"embed/etcd.go:687\",\"msg\":\"starting with client TLS\",\"tls-info\":\"cert = /var/lib/minikube/certs/etcd/server.crt, key = /var/lib/minikube/certs/etcd/server.key, client-cert=, client-key=, trusted-ca = /var/lib/minikube/certs/etcd/ca.crt, client-cert-auth = true, crl-file = \",\"cipher-suites\":[]}\n"} +{"Time":"2023-05-31T11:47:55.96761-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.939Z\",\"caller\":\"embed/etcd.go:275\",\"msg\":\"now serving peer/client/metrics\",\"local-member-id\":\"7520ddf439b1d16\",\"initial-advertise-peer-urls\":[\"https://192.168.105.4:2380\"],\"listen-peer-urls\":[\"https://192.168.105.4:2380\"],\"advertise-client-urls\":[\"https://192.168.105.4:2379\"],\"listen-client-urls\":[\"https://127.0.0.1:2379\",\"https://192.168.105.4:2379\"],\"listen-metrics-urls\":[\"http://127.0.0.1:2381\"]}\n"} +{"Time":"2023-05-31T11:47:55.967616-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.939Z\",\"caller\":\"embed/etcd.go:762\",\"msg\":\"serving metrics\",\"address\":\"http://127.0.0.1:2381\"}\n"} +{"Time":"2023-05-31T11:47:55.96762-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.935Z\",\"caller\":\"embed/etcd.go:586\",\"msg\":\"serving peer traffic\",\"address\":\"192.168.105.4:2380\"}\n"} +{"Time":"2023-05-31T11:47:55.967624-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:40.939Z\",\"caller\":\"embed/etcd.go:558\",\"msg\":\"cmux::serve\",\"address\":\"192.168.105.4:2380\"}\n"} +{"Time":"2023-05-31T11:47:55.967637-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.402Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 is starting a new election at term 3\"}\n"} +{"Time":"2023-05-31T11:47:55.967642-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.402Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 became pre-candidate at term 3\"}\n"} +{"Time":"2023-05-31T11:47:55.967646-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.402Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 received MsgPreVoteResp from 7520ddf439b1d16 at term 3\"}\n"} +{"Time":"2023-05-31T11:47:55.96765-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.402Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 became candidate at term 4\"}\n"} +{"Time":"2023-05-31T11:47:55.967654-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.402Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 received MsgVoteResp from 7520ddf439b1d16 at term 4\"}\n"} +{"Time":"2023-05-31T11:47:55.967659-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.402Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"7520ddf439b1d16 became leader at term 4\"}\n"} +{"Time":"2023-05-31T11:47:55.967663-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.402Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"raft.node: 7520ddf439b1d16 elected leader 7520ddf439b1d16 at term 4\"}\n"} +{"Time":"2023-05-31T11:47:55.967667-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.407Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T11:47:55.967672-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.407Z\",\"caller\":\"etcdserver/server.go:2062\",\"msg\":\"published local member to cluster through raft\",\"local-member-id\":\"7520ddf439b1d16\",\"local-member-attributes\":\"{Name:functional-730000 ClientURLs:[https://192.168.105.4:2379]}\",\"request-path\":\"/0/members/7520ddf439b1d16/attributes\",\"cluster-id\":\"80e92d98c466b02f\",\"publish-timeout\":\"7s\"}\n"} +{"Time":"2023-05-31T11:47:55.967693-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.407Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T11:47:55.967719-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.409Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"192.168.105.4:2379\"}\n"} +{"Time":"2023-05-31T11:47:55.967723-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.410Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"127.0.0.1:2379\"}\n"} +{"Time":"2023-05-31T11:47:55.967728-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.410Z\",\"caller\":\"etcdmain/main.go:44\",\"msg\":\"notifying init daemon\"}\n"} +{"Time":"2023-05-31T11:47:55.967732-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:46:42.410Z\",\"caller\":\"etcdmain/main.go:50\",\"msg\":\"successfully notified init daemon\"}\n"} +{"Time":"2023-05-31T11:47:55.967736-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.967749-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.967753-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kernel \u003c==\n"} +{"Time":"2023-05-31T11:47:55.967756-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* 18:47:55 up 2 min, 0 users, load average: 1.27, 0.39, 0.14\n"} +{"Time":"2023-05-31T11:47:55.96776-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tLinux functional-730000 5.10.57 #1 SMP PREEMPT Wed May 24 00:44:44 UTC 2023 aarch64 GNU/Linux\n"} +{"Time":"2023-05-31T11:47:55.967763-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tPRETTY_NAME=\"Buildroot 2021.02.12\"\n"} +{"Time":"2023-05-31T11:47:55.967767-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.96777-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.967773-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kube-apiserver [7c026b8450b6] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.967777-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:46:43.125207 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T11:47:55.967781-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.143758 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T11:47:55.967785-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.143776 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T11:47:55.967789-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.143831 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T11:47:55.967795-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.143786 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T11:47:55.967799-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.143955 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T11:47:55.967803-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.144154 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T11:47:55.967816-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.144668 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T11:47:55.967822-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.144844 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T11:47:55.967826-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.917656 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T11:47:55.96783-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.048715 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T11:47:55.967833-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.637120 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T11:47:55.967854-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.640296 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T11:47:55.967858-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.651883 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T11:47:55.967861-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.659847 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T11:47:55.967865-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.662107 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T11:47:55.967868-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:55.561861 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T11:47:55.967885-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:55.662299 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T11:47:55.967889-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:05.014682 1 controller.go:624] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T11:47:55.967919-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:05.060460 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/hello-node\" clusterIPs=map[IPv4:10.97.137.90]\n"} +{"Time":"2023-05-31T11:47:55.967925-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:17.403799 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/nginx-svc\" clusterIPs=map[IPv4:10.102.164.144]\n"} +{"Time":"2023-05-31T11:47:55.967929-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:27.838953 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/hello-node-connect\" clusterIPs=map[IPv4:10.100.45.1]\n"} +{"Time":"2023-05-31T11:47:55.967933-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.628047 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T11:47:55.967954-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.717799 1 alloc.go:330] \"allocated clusterIPs\" service=\"kubernetes-dashboard/kubernetes-dashboard\" clusterIPs=map[IPv4:10.103.147.8]\n"} +{"Time":"2023-05-31T11:47:55.967958-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.742078 1 alloc.go:330] \"allocated clusterIPs\" service=\"kubernetes-dashboard/dashboard-metrics-scraper\" clusterIPs=map[IPv4:10.97.200.180]\n"} +{"Time":"2023-05-31T11:47:55.96796-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.967962-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.967963-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kube-controller-manager [27fa0bde23d9] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.967965-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:46:55.613542 1 shared_informer.go:318] Caches are synced for resource quota\n"} +{"Time":"2023-05-31T11:47:55.967967-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:55.703538 1 shared_informer.go:318] Caches are synced for persistent volume\n"} +{"Time":"2023-05-31T11:47:55.967968-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:56.027465 1 shared_informer.go:318] Caches are synced for garbage collector\n"} +{"Time":"2023-05-31T11:47:55.96797-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:56.053039 1 shared_informer.go:318] Caches are synced for garbage collector\n"} +{"Time":"2023-05-31T11:47:55.967971-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:56.053197 1 garbagecollector.go:166] \"All resource monitors have synced. Proceeding to collect garbage\"\n"} +{"Time":"2023-05-31T11:47:55.967973-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:05.017220 1 event.go:307] \"Event occurred\" object=\"default/hello-node\" fieldPath=\"\" kind=\"Deployment\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"ScalingReplicaSet\" message=\"Scaled up replica set hello-node-7b684b55f9 to 1\"\n"} +{"Time":"2023-05-31T11:47:55.967976-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:05.024886 1 event.go:307] \"Event occurred\" object=\"default/hello-node-7b684b55f9\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"SuccessfulCreate\" message=\"Created pod: hello-node-7b684b55f9-7pbws\"\n"} +{"Time":"2023-05-31T11:47:55.967978-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.728364 1 event.go:307] \"Event occurred\" object=\"default/myclaim\" fieldPath=\"\" kind=\"PersistentVolumeClaim\" apiVersion=\"v1\" type=\"Normal\" reason=\"ExternalProvisioning\" message=\"waiting for a volume to be created, either by external provisioner \\\"k8s.io/minikube-hostpath\\\" or manually created by system administrator\"\n"} +{"Time":"2023-05-31T11:47:55.967983-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.728440 1 event.go:307] \"Event occurred\" object=\"default/myclaim\" fieldPath=\"\" kind=\"PersistentVolumeClaim\" apiVersion=\"v1\" type=\"Normal\" reason=\"ExternalProvisioning\" message=\"waiting for a volume to be created, either by external provisioner \\\"k8s.io/minikube-hostpath\\\" or manually created by system administrator\"\n"} +{"Time":"2023-05-31T11:47:55.967985-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:27.793149 1 event.go:307] \"Event occurred\" object=\"default/hello-node-connect\" fieldPath=\"\" kind=\"Deployment\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"ScalingReplicaSet\" message=\"Scaled up replica set hello-node-connect-58d66798bb to 1\"\n"} +{"Time":"2023-05-31T11:47:55.967987-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:27.796976 1 event.go:307] \"Event occurred\" object=\"default/hello-node-connect-58d66798bb\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"SuccessfulCreate\" message=\"Created pod: hello-node-connect-58d66798bb-stzzj\"\n"} +{"Time":"2023-05-31T11:47:55.967989-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.648153 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/dashboard-metrics-scraper\" fieldPath=\"\" kind=\"Deployment\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"ScalingReplicaSet\" message=\"Scaled up replica set dashboard-metrics-scraper-5dd9cbfd69 to 1\"\n"} +{"Time":"2023-05-31T11:47:55.967991-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.651371 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: pods \\\"dashboard-metrics-scraper-5dd9cbfd69-\\\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \\\"kubernetes-dashboard\\\" not found\"\n"} +{"Time":"2023-05-31T11:47:55.967994-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tE0531 18:47:52.655290 1 replica_set.go:544] sync \"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69\" failed with pods \"dashboard-metrics-scraper-5dd9cbfd69-\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \"kubernetes-dashboard\" not found\n"} +{"Time":"2023-05-31T11:47:55.967996-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tE0531 18:47:52.659287 1 replica_set.go:544] sync \"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69\" failed with pods \"dashboard-metrics-scraper-5dd9cbfd69-\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \"kubernetes-dashboard\" not found\n"} +{"Time":"2023-05-31T11:47:55.967999-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.659344 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: pods \\\"dashboard-metrics-scraper-5dd9cbfd69-\\\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \\\"kubernetes-dashboard\\\" not found\"\n"} +{"Time":"2023-05-31T11:47:55.968001-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.663834 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/kubernetes-dashboard\" fieldPath=\"\" kind=\"Deployment\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"ScalingReplicaSet\" message=\"Scaled up replica set kubernetes-dashboard-5c5cfc8747 to 1\"\n"} +{"Time":"2023-05-31T11:47:55.968003-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tE0531 18:47:52.665454 1 replica_set.go:544] sync \"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69\" failed with pods \"dashboard-metrics-scraper-5dd9cbfd69-\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \"kubernetes-dashboard\" not found\n"} +{"Time":"2023-05-31T11:47:55.968005-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.665741 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: pods \\\"dashboard-metrics-scraper-5dd9cbfd69-\\\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \\\"kubernetes-dashboard\\\" not found\"\n"} +{"Time":"2023-05-31T11:47:55.968008-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.668478 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/kubernetes-dashboard-5c5cfc8747\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: pods \\\"kubernetes-dashboard-5c5cfc8747-\\\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \\\"kubernetes-dashboard\\\" not found\"\n"} +{"Time":"2023-05-31T11:47:55.968087-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tE0531 18:47:52.673156 1 replica_set.go:544] sync \"kubernetes-dashboard/kubernetes-dashboard-5c5cfc8747\" failed with pods \"kubernetes-dashboard-5c5cfc8747-\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \"kubernetes-dashboard\" not found\n"} +{"Time":"2023-05-31T11:47:55.968089-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tE0531 18:47:52.675292 1 replica_set.go:544] sync \"kubernetes-dashboard/kubernetes-dashboard-5c5cfc8747\" failed with pods \"kubernetes-dashboard-5c5cfc8747-\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \"kubernetes-dashboard\" not found\n"} +{"Time":"2023-05-31T11:47:55.968091-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.675446 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/kubernetes-dashboard-5c5cfc8747\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Warning\" reason=\"FailedCreate\" message=\"Error creating: pods \\\"kubernetes-dashboard-5c5cfc8747-\\\" is forbidden: error looking up service account kubernetes-dashboard/kubernetes-dashboard: serviceaccount \\\"kubernetes-dashboard\\\" not found\"\n"} +{"Time":"2023-05-31T11:47:55.968094-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.681496 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/kubernetes-dashboard-5c5cfc8747\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"SuccessfulCreate\" message=\"Created pod: kubernetes-dashboard-5c5cfc8747-v249w\"\n"} +{"Time":"2023-05-31T11:47:55.968096-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:52.691308 1 event.go:307] \"Event occurred\" object=\"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69\" fieldPath=\"\" kind=\"ReplicaSet\" apiVersion=\"apps/v1\" type=\"Normal\" reason=\"SuccessfulCreate\" message=\"Created pod: dashboard-metrics-scraper-5dd9cbfd69-f2kgx\"\n"} +{"Time":"2023-05-31T11:47:55.968098-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.968099-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.9681-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kube-controller-manager [55d516522348] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.968102-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:46:11.539380 1 range_allocator.go:178] \"Starting range CIDR allocator\"\n"} +{"Time":"2023-05-31T11:47:55.968103-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.539382 1 shared_informer.go:311] Waiting for caches to sync for cidrallocator\n"} +{"Time":"2023-05-31T11:47:55.968105-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.539385 1 shared_informer.go:318] Caches are synced for cidrallocator\n"} +{"Time":"2023-05-31T11:47:55.968106-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.541465 1 shared_informer.go:318] Caches are synced for ReplicationController\n"} +{"Time":"2023-05-31T11:47:55.968108-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.546996 1 shared_informer.go:318] Caches are synced for ReplicaSet\n"} +{"Time":"2023-05-31T11:47:55.968197-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.554410 1 shared_informer.go:318] Caches are synced for HPA\n"} +{"Time":"2023-05-31T11:47:55.968213-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.556585 1 shared_informer.go:318] Caches are synced for disruption\n"} +{"Time":"2023-05-31T11:47:55.968215-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.558734 1 shared_informer.go:318] Caches are synced for crt configmap\n"} +{"Time":"2023-05-31T11:47:55.96822-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.559866 1 shared_informer.go:318] Caches are synced for ephemeral\n"} +{"Time":"2023-05-31T11:47:55.968221-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.561960 1 shared_informer.go:318] Caches are synced for endpoint_slice_mirroring\n"} +{"Time":"2023-05-31T11:47:55.968223-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.563057 1 shared_informer.go:318] Caches are synced for GC\n"} +{"Time":"2023-05-31T11:47:55.968224-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.564146 1 shared_informer.go:318] Caches are synced for certificate-csrapproving\n"} +{"Time":"2023-05-31T11:47:55.968226-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.566286 1 shared_informer.go:318] Caches are synced for bootstrap_signer\n"} +{"Time":"2023-05-31T11:47:55.968227-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.571659 1 shared_informer.go:318] Caches are synced for job\n"} +{"Time":"2023-05-31T11:47:55.968229-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.573733 1 shared_informer.go:318] Caches are synced for endpoint\n"} +{"Time":"2023-05-31T11:47:55.96823-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.575075 1 shared_informer.go:318] Caches are synced for TTL after finished\n"} +{"Time":"2023-05-31T11:47:55.968232-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.676442 1 shared_informer.go:318] Caches are synced for resource quota\n"} +{"Time":"2023-05-31T11:47:55.968233-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.684732 1 shared_informer.go:318] Caches are synced for resource quota\n"} +{"Time":"2023-05-31T11:47:55.968234-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.686912 1 shared_informer.go:318] Caches are synced for attach detach\n"} +{"Time":"2023-05-31T11:47:55.968236-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.703955 1 shared_informer.go:318] Caches are synced for expand\n"} +{"Time":"2023-05-31T11:47:55.968237-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.718622 1 shared_informer.go:318] Caches are synced for persistent volume\n"} +{"Time":"2023-05-31T11:47:55.968239-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:11.724647 1 shared_informer.go:318] Caches are synced for PV protection\n"} +{"Time":"2023-05-31T11:47:55.96824-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:12.096831 1 shared_informer.go:318] Caches are synced for garbage collector\n"} +{"Time":"2023-05-31T11:47:55.968291-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:12.168970 1 shared_informer.go:318] Caches are synced for garbage collector\n"} +{"Time":"2023-05-31T11:47:55.968297-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:12.169055 1 garbagecollector.go:166] \"All resource monitors have synced. Proceeding to collect garbage\"\n"} +{"Time":"2023-05-31T11:47:55.968301-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.968312-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.968315-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kube-proxy [8f54741bc2c0] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.968319-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:45:59.165025 1 node.go:141] Successfully retrieved node IP: 192.168.105.4\n"} +{"Time":"2023-05-31T11:47:55.968336-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.165077 1 server_others.go:110] \"Detected node IP\" address=\"192.168.105.4\"\n"} +{"Time":"2023-05-31T11:47:55.968339-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.165088 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T11:47:55.968341-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.192827 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T11:47:55.968342-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.192877 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T11:47:55.968344-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.192897 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T11:47:55.968346-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.193477 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T11:47:55.968347-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.193527 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T11:47:55.968349-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.195463 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T11:47:55.96835-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.195480 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T11:47:55.968352-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.195497 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T11:47:55.968353-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.195503 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T11:47:55.968415-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.195716 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T11:47:55.968419-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.195722 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T11:47:55.96842-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.296344 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T11:47:55.968422-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.296360 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T11:47:55.968423-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.296360 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T11:47:55.968424-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.968426-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.968427-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kube-proxy [f455352a1d88] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.968429-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:46:44.300311 1 node.go:141] Successfully retrieved node IP: 192.168.105.4\n"} +{"Time":"2023-05-31T11:47:55.96843-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.300345 1 server_others.go:110] \"Detected node IP\" address=\"192.168.105.4\"\n"} +{"Time":"2023-05-31T11:47:55.968432-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.300357 1 server_others.go:551] \"Using iptables proxy\"\n"} +{"Time":"2023-05-31T11:47:55.968433-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.316124 1 server_others.go:176] \"kube-proxy running in single-stack mode: secondary ipFamily is not supported\" ipFamily=IPv6\n"} +{"Time":"2023-05-31T11:47:55.968435-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.316134 1 server_others.go:190] \"Using iptables Proxier\"\n"} +{"Time":"2023-05-31T11:47:55.968436-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.316161 1 proxier.go:253] \"Setting route_localnet=1 to allow node-ports on localhost; to change this either disable iptables.localhostNodePorts (--iptables-localhost-nodeports) or set nodePortAddresses (--nodeport-addresses) to filter loopback addresses\"\n"} +{"Time":"2023-05-31T11:47:55.968438-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.321896 1 server.go:657] \"Version info\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T11:47:55.96844-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.321906 1 server.go:659] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T11:47:55.968441-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.322303 1 config.go:188] \"Starting service config controller\"\n"} +{"Time":"2023-05-31T11:47:55.968443-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.322321 1 shared_informer.go:311] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T11:47:55.968504-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.322332 1 config.go:97] \"Starting endpoint slice config controller\"\n"} +{"Time":"2023-05-31T11:47:55.968506-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.322334 1 shared_informer.go:311] Waiting for caches to sync for endpoint slice config\n"} +{"Time":"2023-05-31T11:47:55.968508-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.322666 1 config.go:315] \"Starting node config controller\"\n"} +{"Time":"2023-05-31T11:47:55.968512-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.322670 1 shared_informer.go:311] Waiting for caches to sync for node config\n"} +{"Time":"2023-05-31T11:47:55.968513-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.422927 1 shared_informer.go:318] Caches are synced for node config\n"} +{"Time":"2023-05-31T11:47:55.968514-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.422944 1 shared_informer.go:318] Caches are synced for service config\n"} +{"Time":"2023-05-31T11:47:55.968516-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.422957 1 shared_informer.go:318] Caches are synced for endpoint slice config\n"} +{"Time":"2023-05-31T11:47:55.96852-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.968522-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.968523-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kube-scheduler [0ad12502565b] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.968524-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:45:58.068837 1 serving.go:348] Generated self-signed cert in-memory\n"} +{"Time":"2023-05-31T11:47:55.968526-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 18:45:59.113783 1 requestheader_controller.go:193] Unable to get configmap/extension-apiserver-authentication in kube-system. Usually fixed by 'kubectl create rolebinding -n kube-system ROLEBINDING_NAME --role=extension-apiserver-authentication-reader --serviceaccount=YOUR_NS:YOUR_SA'\n"} +{"Time":"2023-05-31T11:47:55.968529-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 18:45:59.113797 1 authentication.go:368] Error looking up in-cluster authentication configuration: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T11:47:55.968531-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 18:45:59.113802 1 authentication.go:369] Continuing without authentication configuration. This may treat all requests as anonymous.\n"} +{"Time":"2023-05-31T11:47:55.968532-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 18:45:59.113805 1 authentication.go:370] To require authentication configuration lookup to succeed, set --authentication-tolerate-lookup-failure=false\n"} +{"Time":"2023-05-31T11:47:55.968534-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.153827 1 server.go:154] \"Starting Kubernetes Scheduler\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T11:47:55.96863-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.153845 1 server.go:156] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T11:47:55.968647-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.155161 1 secure_serving.go:210] Serving securely on 127.0.0.1:10259\n"} +{"Time":"2023-05-31T11:47:55.968651-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.155317 1 configmap_cafile_content.go:202] \"Starting controller\" name=\"client-ca::kube-system::extension-apiserver-authentication::client-ca-file\"\n"} +{"Time":"2023-05-31T11:47:55.968656-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.155326 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T11:47:55.96866-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.155368 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T11:47:55.968664-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.256137 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T11:47:55.968668-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:27.030986 1 secure_serving.go:255] Stopped listening on 127.0.0.1:10259\n"} +{"Time":"2023-05-31T11:47:55.968671-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:27.031008 1 tlsconfig.go:255] \"Shutting down DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T11:47:55.968687-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:27.031068 1 configmap_cafile_content.go:223] \"Shutting down controller\" name=\"client-ca::kube-system::extension-apiserver-authentication::client-ca-file\"\n"} +{"Time":"2023-05-31T11:47:55.968694-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tE0531 18:46:27.031153 1 run.go:74] \"command failed\" err=\"finished without leader elect\"\n"} +{"Time":"2023-05-31T11:47:55.968697-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.968714-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.968736-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kube-scheduler [0c6723ae1d6f] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.968738-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:46:41.026644 1 serving.go:348] Generated self-signed cert in-memory\n"} +{"Time":"2023-05-31T11:47:55.96874-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 18:46:43.068892 1 requestheader_controller.go:193] Unable to get configmap/extension-apiserver-authentication in kube-system. Usually fixed by 'kubectl create rolebinding -n kube-system ROLEBINDING_NAME --role=extension-apiserver-authentication-reader --serviceaccount=YOUR_NS:YOUR_SA'\n"} +{"Time":"2023-05-31T11:47:55.968742-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 18:46:43.068956 1 authentication.go:368] Error looking up in-cluster authentication configuration: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T11:47:55.968744-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 18:46:43.068977 1 authentication.go:369] Continuing without authentication configuration. This may treat all requests as anonymous.\n"} +{"Time":"2023-05-31T11:47:55.968746-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tW0531 18:46:43.068994 1 authentication.go:370] To require authentication configuration lookup to succeed, set --authentication-tolerate-lookup-failure=false\n"} +{"Time":"2023-05-31T11:47:55.968747-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.093916 1 server.go:154] \"Starting Kubernetes Scheduler\" version=\"v1.27.2\"\n"} +{"Time":"2023-05-31T11:47:55.968749-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.094011 1 server.go:156] \"Golang settings\" GOGC=\"\" GOMAXPROCS=\"\" GOTRACEBACK=\"\"\n"} +{"Time":"2023-05-31T11:47:55.96875-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.094905 1 configmap_cafile_content.go:202] \"Starting controller\" name=\"client-ca::kube-system::extension-apiserver-authentication::client-ca-file\"\n"} +{"Time":"2023-05-31T11:47:55.968752-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.094929 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T11:47:55.968754-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.099339 1 secure_serving.go:210] Serving securely on 127.0.0.1:10259\n"} +{"Time":"2023-05-31T11:47:55.968756-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.099383 1 tlsconfig.go:240] \"Starting DynamicServingCertificateController\"\n"} +{"Time":"2023-05-31T11:47:55.968757-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:43.195355 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T11:47:55.968759-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.96876-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.968761-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e kubelet \u003c==\n"} +{"Time":"2023-05-31T11:47:55.968763-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* -- Journal begins at Wed 2023-05-31 18:45:05 UTC, ends at Wed 2023-05-31 18:47:55 UTC. --\n"} +{"Time":"2023-05-31T11:47:55.968765-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:44 functional-730000 kubelet[6916]: I0531 18:47:44.588447 6916 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"test-volume\\\" (UniqueName: \\\"kubernetes.io/host-path/677d6f33-8625-43e4-854a-fc4cbc188c23-test-volume\\\") pod \\\"busybox-mount\\\" (UID: \\\"677d6f33-8625-43e4-854a-fc4cbc188c23\\\") \" pod=\"default/busybox-mount\"\n"} +{"Time":"2023-05-31T11:47:55.968767-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:44 functional-730000 kubelet[6916]: I0531 18:47:44.588581 6916 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-lqgns\\\" (UniqueName: \\\"kubernetes.io/projected/677d6f33-8625-43e4-854a-fc4cbc188c23-kube-api-access-lqgns\\\") pod \\\"busybox-mount\\\" (UID: \\\"677d6f33-8625-43e4-854a-fc4cbc188c23\\\") \" pod=\"default/busybox-mount\"\n"} +{"Time":"2023-05-31T11:47:55.968832-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:44 functional-730000 kubelet[6916]: I0531 18:47:44.830552 6916 scope.go:115] \"RemoveContainer\" containerID=\"2e3db69a2f3f1dc91b037558099c29ecfd94b363cd23134c85049dab9973c50a\"\n"} +{"Time":"2023-05-31T11:47:55.968835-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:44 functional-730000 kubelet[6916]: I0531 18:47:44.830786 6916 scope.go:115] \"RemoveContainer\" containerID=\"b37ab09b2fdc56ba62e72f3ac946cc58e87ae29ef3a5321bfd8109b6978e81a0\"\n"} +{"Time":"2023-05-31T11:47:55.968837-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:44 functional-730000 kubelet[6916]: E0531 18:47:44.830907 6916 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"StartContainer\\\" for \\\"echoserver-arm\\\" with CrashLoopBackOff: \\\"back-off 20s restarting failed container=echoserver-arm pod=hello-node-connect-58d66798bb-stzzj_default(a120ea47-9aab-4f46-a7f1-0defe24bb54b)\\\"\" pod=\"default/hello-node-connect-58d66798bb-stzzj\" podUID=a120ea47-9aab-4f46-a7f1-0defe24bb54b\n"} +{"Time":"2023-05-31T11:47:55.968839-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:49 functional-730000 kubelet[6916]: I0531 18:47:49.129980 6916 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"test-volume\\\" (UniqueName: \\\"kubernetes.io/host-path/677d6f33-8625-43e4-854a-fc4cbc188c23-test-volume\\\") pod \\\"677d6f33-8625-43e4-854a-fc4cbc188c23\\\" (UID: \\\"677d6f33-8625-43e4-854a-fc4cbc188c23\\\") \"\n"} +{"Time":"2023-05-31T11:47:55.968842-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:49 functional-730000 kubelet[6916]: I0531 18:47:49.130026 6916 reconciler_common.go:172] \"operationExecutor.UnmountVolume started for volume \\\"kube-api-access-lqgns\\\" (UniqueName: \\\"kubernetes.io/projected/677d6f33-8625-43e4-854a-fc4cbc188c23-kube-api-access-lqgns\\\") pod \\\"677d6f33-8625-43e4-854a-fc4cbc188c23\\\" (UID: \\\"677d6f33-8625-43e4-854a-fc4cbc188c23\\\") \"\n"} +{"Time":"2023-05-31T11:47:55.968845-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:49 functional-730000 kubelet[6916]: I0531 18:47:49.130219 6916 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/host-path/677d6f33-8625-43e4-854a-fc4cbc188c23-test-volume\" (OuterVolumeSpecName: \"test-volume\") pod \"677d6f33-8625-43e4-854a-fc4cbc188c23\" (UID: \"677d6f33-8625-43e4-854a-fc4cbc188c23\"). InnerVolumeSpecName \"test-volume\". PluginName \"kubernetes.io/host-path\", VolumeGidValue \"\"\n"} +{"Time":"2023-05-31T11:47:55.968847-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:49 functional-730000 kubelet[6916]: I0531 18:47:49.132716 6916 operation_generator.go:878] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/projected/677d6f33-8625-43e4-854a-fc4cbc188c23-kube-api-access-lqgns\" (OuterVolumeSpecName: \"kube-api-access-lqgns\") pod \"677d6f33-8625-43e4-854a-fc4cbc188c23\" (UID: \"677d6f33-8625-43e4-854a-fc4cbc188c23\"). InnerVolumeSpecName \"kube-api-access-lqgns\". PluginName \"kubernetes.io/projected\", VolumeGidValue \"\"\n"} +{"Time":"2023-05-31T11:47:55.968957-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:49 functional-730000 kubelet[6916]: I0531 18:47:49.230592 6916 reconciler_common.go:300] \"Volume detached for volume \\\"test-volume\\\" (UniqueName: \\\"kubernetes.io/host-path/677d6f33-8625-43e4-854a-fc4cbc188c23-test-volume\\\") on node \\\"functional-730000\\\" DevicePath \\\"\\\"\"\n"} +{"Time":"2023-05-31T11:47:55.968959-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:49 functional-730000 kubelet[6916]: I0531 18:47:49.230612 6916 reconciler_common.go:300] \"Volume detached for volume \\\"kube-api-access-lqgns\\\" (UniqueName: \\\"kubernetes.io/projected/677d6f33-8625-43e4-854a-fc4cbc188c23-kube-api-access-lqgns\\\") on node \\\"functional-730000\\\" DevicePath \\\"\\\"\"\n"} +{"Time":"2023-05-31T11:47:55.968962-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:49 functional-730000 kubelet[6916]: I0531 18:47:49.917954 6916 pod_container_deletor.go:80] \"Container not found in pod's containers\" containerID=\"bc2e6dff9ee8b7378b8e04b806e374d29db5346cc7343c2e8d15238df40815dc\"\n"} +{"Time":"2023-05-31T11:47:55.968963-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.684458 6916 topology_manager.go:212] \"Topology Admit Handler\"\n"} +{"Time":"2023-05-31T11:47:55.968965-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: E0531 18:47:52.684491 6916 cpu_manager.go:395] \"RemoveStaleState: removing container\" podUID=\"677d6f33-8625-43e4-854a-fc4cbc188c23\" containerName=\"mount-munger\"\n"} +{"Time":"2023-05-31T11:47:55.968967-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.684506 6916 memory_manager.go:346] \"RemoveStaleState removing state\" podUID=\"677d6f33-8625-43e4-854a-fc4cbc188c23\" containerName=\"mount-munger\"\n"} +{"Time":"2023-05-31T11:47:55.968969-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.695748 6916 topology_manager.go:212] \"Topology Admit Handler\"\n"} +{"Time":"2023-05-31T11:47:55.96897-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.718863 6916 scope.go:115] \"RemoveContainer\" containerID=\"0d5cc7fd69896ae84ca28f568192f1353f60819a6d2ac6aae4ef21eb00decfa9\"\n"} +{"Time":"2023-05-31T11:47:55.968972-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.857815 6916 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp-volume\\\" (UniqueName: \\\"kubernetes.io/empty-dir/4b377b21-be99-4a91-9afd-1ca3c3d586bd-tmp-volume\\\") pod \\\"kubernetes-dashboard-5c5cfc8747-v249w\\\" (UID: \\\"4b377b21-be99-4a91-9afd-1ca3c3d586bd\\\") \" pod=\"kubernetes-dashboard/kubernetes-dashboard-5c5cfc8747-v249w\"\n"} +{"Time":"2023-05-31T11:47:55.968975-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.857842 6916 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-vbz6f\\\" (UniqueName: \\\"kubernetes.io/projected/4b377b21-be99-4a91-9afd-1ca3c3d586bd-kube-api-access-vbz6f\\\") pod \\\"kubernetes-dashboard-5c5cfc8747-v249w\\\" (UID: \\\"4b377b21-be99-4a91-9afd-1ca3c3d586bd\\\") \" pod=\"kubernetes-dashboard/kubernetes-dashboard-5c5cfc8747-v249w\"\n"} +{"Time":"2023-05-31T11:47:55.96903-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.857855 6916 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"tmp-volume\\\" (UniqueName: \\\"kubernetes.io/empty-dir/62599766-31ba-4060-b0d9-f944ca3864ec-tmp-volume\\\") pod \\\"dashboard-metrics-scraper-5dd9cbfd69-f2kgx\\\" (UID: \\\"62599766-31ba-4060-b0d9-f944ca3864ec\\\") \" pod=\"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69-f2kgx\"\n"} +{"Time":"2023-05-31T11:47:55.969046-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.857865 6916 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kube-api-access-mn4kb\\\" (UniqueName: \\\"kubernetes.io/projected/62599766-31ba-4060-b0d9-f944ca3864ec-kube-api-access-mn4kb\\\") pod \\\"dashboard-metrics-scraper-5dd9cbfd69-f2kgx\\\" (UID: \\\"62599766-31ba-4060-b0d9-f944ca3864ec\\\") \" pod=\"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69-f2kgx\"\n"} +{"Time":"2023-05-31T11:47:55.969051-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.938370 6916 scope.go:115] \"RemoveContainer\" containerID=\"0d5cc7fd69896ae84ca28f568192f1353f60819a6d2ac6aae4ef21eb00decfa9\"\n"} +{"Time":"2023-05-31T11:47:55.969057-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: I0531 18:47:52.938552 6916 scope.go:115] \"RemoveContainer\" containerID=\"ed99806330001ee36b648790874659b678081e3992fb4fba54eb2ea94b54d211\"\n"} +{"Time":"2023-05-31T11:47:55.969062-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:52 functional-730000 kubelet[6916]: E0531 18:47:52.938653 6916 pod_workers.go:1294] \"Error syncing pod, skipping\" err=\"failed to \\\"StartContainer\\\" for \\\"echoserver-arm\\\" with CrashLoopBackOff: \\\"back-off 40s restarting failed container=echoserver-arm pod=hello-node-7b684b55f9-7pbws_default(d8491b04-6efb-4030-b764-a46c6a800ab8)\\\"\" pod=\"default/hello-node-7b684b55f9-7pbws\" podUID=d8491b04-6efb-4030-b764-a46c6a800ab8\n"} +{"Time":"2023-05-31T11:47:55.969068-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tMay 31 18:47:55 functional-730000 kubelet[6916]: I0531 18:47:55.980246 6916 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kubernetes-dashboard/dashboard-metrics-scraper-5dd9cbfd69-f2kgx\" podStartSLOduration=2.066983042 podCreationTimestamp=\"2023-05-31 18:47:52 +0000 UTC\" firstStartedPulling=\"2023-05-31 18:47:53.246388873 +0000 UTC m=+73.582479492\" lastFinishedPulling=\"2023-05-31 18:47:55.159628375 +0000 UTC m=+75.495719035\" observedRunningTime=\"2023-05-31 18:47:55.979670839 +0000 UTC m=+76.315761500\" watchObservedRunningTime=\"2023-05-31 18:47:55.980222585 +0000 UTC m=+76.316313245\"\n"} +{"Time":"2023-05-31T11:47:55.969078-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.969081-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.969084-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e storage-provisioner [3e36a86f0648] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.969188-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:46:44.341023 1 storage_provisioner.go:116] Initializing the minikube storage provisioner...\n"} +{"Time":"2023-05-31T11:47:55.969193-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.345277 1 storage_provisioner.go:141] Storage provisioner initialized, now starting service!\n"} +{"Time":"2023-05-31T11:47:55.969197-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:44.345355 1 leaderelection.go:243] attempting to acquire leader lease kube-system/k8s.io-minikube-hostpath...\n"} +{"Time":"2023-05-31T11:47:55.969201-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:01.752951 1 leaderelection.go:253] successfully acquired lease kube-system/k8s.io-minikube-hostpath\n"} +{"Time":"2023-05-31T11:47:55.969205-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:01.753403 1 controller.go:835] Starting provisioner controller k8s.io/minikube-hostpath_functional-730000_0820b921-4b24-44a1-ba2e-ee507ee640b5!\n"} +{"Time":"2023-05-31T11:47:55.969209-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:01.754675 1 event.go:282] Event(v1.ObjectReference{Kind:\"Endpoints\", Namespace:\"kube-system\", Name:\"k8s.io-minikube-hostpath\", UID:\"40568059-af79-4f74-9d88-76e9b9b298ab\", APIVersion:\"v1\", ResourceVersion:\"605\", FieldPath:\"\"}): type: 'Normal' reason: 'LeaderElection' functional-730000_0820b921-4b24-44a1-ba2e-ee507ee640b5 became leader\n"} +{"Time":"2023-05-31T11:47:55.969214-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:01.854154 1 controller.go:884] Started provisioner controller k8s.io/minikube-hostpath_functional-730000_0820b921-4b24-44a1-ba2e-ee507ee640b5!\n"} +{"Time":"2023-05-31T11:47:55.969218-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.729427 1 controller.go:1332] provision \"default/myclaim\" class \"standard\": started\n"} +{"Time":"2023-05-31T11:47:55.969235-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.729456 1 storage_provisioner.go:61] Provisioning volume {\u0026StorageClass{ObjectMeta:{standard 9a347bc9-a6eb-4659-8168-25d5b6ae3e02 382 0 2023-05-31 18:45:38 +0000 UTC \u003cnil\u003e \u003cnil\u003e map[addonmanager.kubernetes.io/mode:EnsureExists] map[kubectl.kubernetes.io/last-applied-configuration:{\"apiVersion\":\"storage.k8s.io/v1\",\"kind\":\"StorageClass\",\"metadata\":{\"annotations\":{\"storageclass.kubernetes.io/is-default-class\":\"true\"},\"labels\":{\"addonmanager.kubernetes.io/mode\":\"EnsureExists\"},\"name\":\"standard\"},\"provisioner\":\"k8s.io/minikube-hostpath\"}\n"} +{"Time":"2023-05-31T11:47:55.969241-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t storageclass.kubernetes.io/is-default-class:true] [] [] [{kubectl-client-side-apply Update storage.k8s.io/v1 2023-05-31 18:45:38 +0000 UTC FieldsV1 {\"f:metadata\":{\"f:annotations\":{\".\":{},\"f:kubectl.kubernetes.io/last-applied-configuration\":{},\"f:storageclass.kubernetes.io/is-default-class\":{}},\"f:labels\":{\".\":{},\"f:addonmanager.kubernetes.io/mode\":{}}},\"f:provisioner\":{},\"f:reclaimPolicy\":{},\"f:volumeBindingMode\":{}}}]},Provisioner:k8s.io/minikube-hostpath,Parameters:map[string]string{},ReclaimPolicy:*Delete,MountOptions:[],AllowVolumeExpansion:nil,VolumeBindingMode:*Immediate,AllowedTopologies:[]TopologySelectorTerm{},} pvc-46f972da-e59f-4ed0-b609-eb99ad89d1a9 \u0026PersistentVolumeClaim{ObjectMeta:{myclaim default 46f972da-e59f-4ed0-b609-eb99ad89d1a9 674 0 2023-05-31 18:47:23 +0000 UTC \u003cnil\u003e \u003cnil\u003e map[] map[kubectl.kubernetes.io/last-applied-configuration:{\"apiVersion\":\"v1\",\"kind\":\"PersistentVolumeClaim\",\"metadata\":{\"annotations\":{},\"name\":\"myclaim\",\"namespace\":\"default\"},\"spec\":{\"accessModes\":[\"Rea"} +{"Time":"2023-05-31T11:47:55.969245-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"dWriteOnce\"],\"resources\":{\"requests\":{\"storage\":\"500Mi\"}},\"volumeMode\":\"Filesystem\"}}\n"} +{"Time":"2023-05-31T11:47:55.969248-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t volume.beta.kubernetes.io/storage-provisioner:k8s.io/minikube-hostpath volume.kubernetes.io/storage-provisioner:k8s.io/minikube-hostpath] [] [kubernetes.io/pvc-protection] [{kube-controller-manager Update v1 2023-05-31 18:47:23 +0000 UTC FieldsV1 {\"f:metadata\":{\"f:annotations\":{\"f:volume.beta.kubernetes.io/storage-provisioner\":{},\"f:volume.kubernetes.io/storage-provisioner\":{}}}}} {kubectl-client-side-apply Update v1 2023-05-31 18:47:23 +0000 UTC FieldsV1 {\"f:metadata\":{\"f:annotations\":{\".\":{},\"f:kubectl.kubernetes.io/last-applied-configuration\":{}}},\"f:spec\":{\"f:accessModes\":{},\"f:resources\":{\"f:requests\":{\".\":{},\"f:storage\":{}}},\"f:volumeMode\":{}}}}]},Spec:PersistentVolumeClaimSpec{AccessModes:[ReadWriteOnce],Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{storage: {{524288000 0} {\u003cnil\u003e} 500Mi BinarySI},},},VolumeName:,Selector:nil,StorageClassName:*standard,VolumeMode:*Filesystem,DataSource:nil,},Status:PersistentVolumeClaimStatus{Phase:Pending,AccessModes:[],Capacity:"} +{"Time":"2023-05-31T11:47:55.96925-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":"ResourceList{},Conditions:[]PersistentVolumeClaimCondition{},},} nil} to /tmp/hostpath-provisioner/default/myclaim\n"} +{"Time":"2023-05-31T11:47:55.969254-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.730312 1 event.go:282] Event(v1.ObjectReference{Kind:\"PersistentVolumeClaim\", Namespace:\"default\", Name:\"myclaim\", UID:\"46f972da-e59f-4ed0-b609-eb99ad89d1a9\", APIVersion:\"v1\", ResourceVersion:\"674\", FieldPath:\"\"}): type: 'Normal' reason: 'Provisioning' External provisioner is provisioning volume for claim \"default/myclaim\"\n"} +{"Time":"2023-05-31T11:47:55.969256-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.730496 1 controller.go:1439] provision \"default/myclaim\" class \"standard\": volume \"pvc-46f972da-e59f-4ed0-b609-eb99ad89d1a9\" provisioned\n"} +{"Time":"2023-05-31T11:47:55.969258-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.730534 1 controller.go:1456] provision \"default/myclaim\" class \"standard\": succeeded\n"} +{"Time":"2023-05-31T11:47:55.96926-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.730542 1 volume_store.go:212] Trying to save persistentvolume \"pvc-46f972da-e59f-4ed0-b609-eb99ad89d1a9\"\n"} +{"Time":"2023-05-31T11:47:55.969261-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.735128 1 volume_store.go:219] persistentvolume \"pvc-46f972da-e59f-4ed0-b609-eb99ad89d1a9\" saved\n"} +{"Time":"2023-05-31T11:47:55.969323-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:47:23.735433 1 event.go:282] Event(v1.ObjectReference{Kind:\"PersistentVolumeClaim\", Namespace:\"default\", Name:\"myclaim\", UID:\"46f972da-e59f-4ed0-b609-eb99ad89d1a9\", APIVersion:\"v1\", ResourceVersion:\"674\", FieldPath:\"\"}): type: 'Normal' reason: 'ProvisioningSucceeded' Successfully provisioned volume pvc-46f972da-e59f-4ed0-b609-eb99ad89d1a9\n"} +{"Time":"2023-05-31T11:47:55.96933-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.969368-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* \n"} +{"Time":"2023-05-31T11:47:55.96937-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* ==\u003e storage-provisioner [45299a343d09] \u003c==\n"} +{"Time":"2023-05-31T11:47:55.969372-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t* I0531 18:45:58.229218 1 storage_provisioner.go:116] Initializing the minikube storage provisioner...\n"} +{"Time":"2023-05-31T11:47:55.969374-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.153554 1 storage_provisioner.go:141] Storage provisioner initialized, now starting service!\n"} +{"Time":"2023-05-31T11:47:55.969375-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:45:59.153578 1 leaderelection.go:243] attempting to acquire leader lease kube-system/k8s.io-minikube-hostpath...\n"} +{"Time":"2023-05-31T11:47:55.969377-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:16.563625 1 leaderelection.go:253] successfully acquired lease kube-system/k8s.io-minikube-hostpath\n"} +{"Time":"2023-05-31T11:47:55.969379-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:16.564304 1 event.go:282] Event(v1.ObjectReference{Kind:\"Endpoints\", Namespace:\"kube-system\", Name:\"k8s.io-minikube-hostpath\", UID:\"40568059-af79-4f74-9d88-76e9b9b298ab\", APIVersion:\"v1\", ResourceVersion:\"507\", FieldPath:\"\"}): type: 'Normal' reason: 'LeaderElection' functional-730000_b8828355-58cb-47e5-882c-e6f188ae8c85 became leader\n"} +{"Time":"2023-05-31T11:47:55.969381-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:16.564422 1 controller.go:835] Starting provisioner controller k8s.io/minikube-hostpath_functional-730000_b8828355-58cb-47e5-882c-e6f188ae8c85!\n"} +{"Time":"2023-05-31T11:47:55.969383-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tI0531 18:46:16.665069 1 controller.go:884] Started provisioner controller k8s.io/minikube-hostpath_functional-730000_b8828355-58cb-47e5-882c-e6f188ae8c85!\n"} +{"Time":"2023-05-31T11:47:55.969384-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t\n"} +{"Time":"2023-05-31T11:47:55.969386-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T11:47:55.969387-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:47:55.969388-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:254: (dbg) Run: out/minikube-darwin-arm64 status --format={{.APIServer}} -p functional-730000 -n functional-730000\n"} +{"Time":"2023-05-31T11:47:56.048695-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:261: (dbg) Run: kubectl --context functional-730000 get po -o=jsonpath={.items[*].metadata.name} -A --field-selector=status.phase!=Running\n"} +{"Time":"2023-05-31T11:47:56.085127-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:272: non-running pods: busybox-mount kubernetes-dashboard-5c5cfc8747-v249w\n"} +{"Time":"2023-05-31T11:47:56.085143-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:274: ======\u003e post-mortem[TestFunctional/parallel/ServiceCmdConnect]: describe non-running pods \u003c======\n"} +{"Time":"2023-05-31T11:47:56.085275-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:277: (dbg) Run: kubectl --context functional-730000 describe pod busybox-mount kubernetes-dashboard-5c5cfc8747-v249w\n"} +{"Time":"2023-05-31T11:47:56.127215-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:277: (dbg) Non-zero exit: kubectl --context functional-730000 describe pod busybox-mount kubernetes-dashboard-5c5cfc8747-v249w: exit status 1 (41.745708ms)\n"} +{"Time":"2023-05-31T11:47:56.12723-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T11:47:56.127232-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:47:56.127234-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tName: busybox-mount\n"} +{"Time":"2023-05-31T11:47:56.127235-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tNamespace: default\n"} +{"Time":"2023-05-31T11:47:56.127237-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tPriority: 0\n"} +{"Time":"2023-05-31T11:47:56.127238-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tService Account: default\n"} +{"Time":"2023-05-31T11:47:56.127239-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tNode: functional-730000/192.168.105.4\n"} +{"Time":"2023-05-31T11:47:56.127241-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tStart Time: Wed, 31 May 2023 11:47:44 -0700\n"} +{"Time":"2023-05-31T11:47:56.127242-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tLabels: integration-test=busybox-mount\n"} +{"Time":"2023-05-31T11:47:56.127244-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tAnnotations: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:56.127245-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tStatus: Succeeded\n"} +{"Time":"2023-05-31T11:47:56.127246-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tIP: 10.244.0.10\n"} +{"Time":"2023-05-31T11:47:56.127247-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tIPs:\n"} +{"Time":"2023-05-31T11:47:56.127249-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t IP: 10.244.0.10\n"} +{"Time":"2023-05-31T11:47:56.12725-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tContainers:\n"} +{"Time":"2023-05-31T11:47:56.127251-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t mount-munger:\n"} +{"Time":"2023-05-31T11:47:56.127252-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Container ID: docker://387d64203306d5df1049d0fe0a626f3aa42d951a063e767e3496cae5b7458bc8\n"} +{"Time":"2023-05-31T11:47:56.127254-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Image: gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T11:47:56.127256-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Image ID: docker-pullable://gcr.io/k8s-minikube/busybox@sha256:2d03e6ceeb99250061dd110530b0ece7998cd84121f952adef120ea7c5a6f00e\n"} +{"Time":"2023-05-31T11:47:56.127257-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:56.127258-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Host Port: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:56.12726-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Command:\n"} +{"Time":"2023-05-31T11:47:56.127261-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t /bin/sh\n"} +{"Time":"2023-05-31T11:47:56.127262-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t -c\n"} +{"Time":"2023-05-31T11:47:56.127269-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t --\n"} +{"Time":"2023-05-31T11:47:56.127271-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Args:\n"} +{"Time":"2023-05-31T11:47:56.127272-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t cat /mount-9p/created-by-test; echo test \u003e /mount-9p/created-by-pod; rm /mount-9p/created-by-test-removed-by-pod; echo test \u003e /mount-9p/created-by-pod-removed-by-test date \u003e\u003e /mount-9p/pod-dates\n"} +{"Time":"2023-05-31T11:47:56.127274-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t State: Terminated\n"} +{"Time":"2023-05-31T11:47:56.127275-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Reason: Completed\n"} +{"Time":"2023-05-31T11:47:56.127276-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Exit Code: 0\n"} +{"Time":"2023-05-31T11:47:56.127278-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Started: Wed, 31 May 2023 11:47:47 -0700\n"} +{"Time":"2023-05-31T11:47:56.127279-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Finished: Wed, 31 May 2023 11:47:47 -0700\n"} +{"Time":"2023-05-31T11:47:56.12728-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Ready: False\n"} +{"Time":"2023-05-31T11:47:56.127282-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Restart Count: 0\n"} +{"Time":"2023-05-31T11:47:56.127283-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Environment: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:56.127284-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Mounts:\n"} +{"Time":"2023-05-31T11:47:56.127286-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t /mount-9p from test-volume (rw)\n"} +{"Time":"2023-05-31T11:47:56.127287-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-lqgns (ro)\n"} +{"Time":"2023-05-31T11:47:56.127289-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tConditions:\n"} +{"Time":"2023-05-31T11:47:56.12729-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Type Status\n"} +{"Time":"2023-05-31T11:47:56.127291-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Initialized True \n"} +{"Time":"2023-05-31T11:47:56.127292-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Ready False \n"} +{"Time":"2023-05-31T11:47:56.127294-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ContainersReady False \n"} +{"Time":"2023-05-31T11:47:56.127295-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t PodScheduled True \n"} +{"Time":"2023-05-31T11:47:56.127296-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tVolumes:\n"} +{"Time":"2023-05-31T11:47:56.127297-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t test-volume:\n"} +{"Time":"2023-05-31T11:47:56.127299-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Type: HostPath (bare host directory volume)\n"} +{"Time":"2023-05-31T11:47:56.1273-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Path: /mount-9p\n"} +{"Time":"2023-05-31T11:47:56.127301-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t HostPathType: \n"} +{"Time":"2023-05-31T11:47:56.127302-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t kube-api-access-lqgns:\n"} +{"Time":"2023-05-31T11:47:56.127304-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Type: Projected (a volume that contains injected data from multiple sources)\n"} +{"Time":"2023-05-31T11:47:56.127305-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t TokenExpirationSeconds: 3607\n"} +{"Time":"2023-05-31T11:47:56.127306-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ConfigMapName: kube-root-ca.crt\n"} +{"Time":"2023-05-31T11:47:56.127308-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ConfigMapOptional: \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:47:56.127309-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t DownwardAPI: true\n"} +{"Time":"2023-05-31T11:47:56.127311-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tQoS Class: BestEffort\n"} +{"Time":"2023-05-31T11:47:56.127312-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tNode-Selectors: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:56.127313-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tTolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T11:47:56.127315-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t node.kubernetes.io/unreachable:NoExecute op=Exists for 300s\n"} +{"Time":"2023-05-31T11:47:56.127316-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tEvents:\n"} +{"Time":"2023-05-31T11:47:56.127317-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Type Reason Age From Message\n"} +{"Time":"2023-05-31T11:47:56.127319-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T11:47:56.12732-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Scheduled 11s default-scheduler Successfully assigned default/busybox-mount to functional-730000\n"} +{"Time":"2023-05-31T11:47:56.127324-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Pulling 11s kubelet Pulling image \"gcr.io/k8s-minikube/busybox:1.28.4-glibc\"\n"} +{"Time":"2023-05-31T11:47:56.127326-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Pulled 9s kubelet Successfully pulled image \"gcr.io/k8s-minikube/busybox:1.28.4-glibc\" in 1.941255856s (1.941264981s including waiting)\n"} +{"Time":"2023-05-31T11:47:56.127327-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Created 9s kubelet Created container mount-munger\n"} +{"Time":"2023-05-31T11:47:56.127329-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \t Normal Started 9s kubelet Started container mount-munger\n"} +{"Time":"2023-05-31T11:47:56.12733-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T11:47:56.127331-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:47:56.127332-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:56.127334-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \tError from server (NotFound): pods \"kubernetes-dashboard-5c5cfc8747-v249w\" not found\n"} +{"Time":"2023-05-31T11:47:56.127335-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" \n"} +{"Time":"2023-05-31T11:47:56.127336-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:56.127338-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" helpers_test.go:279: kubectl --context functional-730000 describe pod busybox-mount kubernetes-dashboard-5c5cfc8747-v249w: exit status 1\n"} +{"Time":"2023-05-31T11:47:56.12734-07:00","Action":"cont","Test":"TestFunctional/parallel/Version/short"} +{"Time":"2023-05-31T11:47:56.127346-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":"=== CONT TestFunctional/parallel/Version/short\n"} +{"Time":"2023-05-31T11:47:56.127349-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":" functional_test.go:2251: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 version --short\n"} +{"Time":"2023-05-31T11:47:56.163941-07:00","Action":"cont","Test":"TestFunctional/parallel/Version/components"} +{"Time":"2023-05-31T11:47:56.163955-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":"=== CONT TestFunctional/parallel/Version/components\n"} +{"Time":"2023-05-31T11:47:56.163971-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":" functional_test.go:2265: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 version -o=json --components\n"} +{"Time":"2023-05-31T11:47:56.329571-07:00","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes"} +{"Time":"2023-05-31T11:47:56.329586-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_changes\n"} +{"Time":"2023-05-31T11:47:56.329647-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":" functional_test.go:2114: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T11:47:56.374476-07:00","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters"} +{"Time":"2023-05-31T11:47:56.37449-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_clusters\n"} +{"Time":"2023-05-31T11:47:56.374696-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":" functional_test.go:2114: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T11:47:56.423572-07:00","Action":"cont","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster"} +{"Time":"2023-05-31T11:47:56.423588-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":"=== CONT TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster\n"} +{"Time":"2023-05-31T11:47:56.423748-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":" functional_test.go:2114: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 update-context --alsologtostderr -v=2\n"} +{"Time":"2023-05-31T11:47:56.473582-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListShort"} +{"Time":"2023-05-31T11:47:56.473595-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListShort\n"} +{"Time":"2023-05-31T11:47:56.473707-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:259: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls --format short --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:56.551621-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-darwin-arm64 -p functional-730000 image ls --format short --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:56.551637-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:47:56.551639-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T11:47:56.551641-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T11:47:56.551642-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T11:47:56.551644-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.551645-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.551647-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.551653-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.551655-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T11:47:56.551656-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/echoserver-arm:1.8\n"} +{"Time":"2023-05-31T11:47:56.551658-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T11:47:56.551663-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:47:56.551664-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T11:47:56.551666-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" gcr.io/google-containers/addon-resizer:functional-730000\n"} +{"Time":"2023-05-31T11:47:56.551685-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/nginx:latest\n"} +{"Time":"2023-05-31T11:47:56.551687-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/nginx:alpine\n"} +{"Time":"2023-05-31T11:47:56.551688-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/library/minikube-local-cache-test:functional-730000\n"} +{"Time":"2023-05-31T11:47:56.55169-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" docker.io/kubernetesui/metrics-scraper:\u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:56.551693-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-darwin-arm64 -p functional-730000 image ls --format short --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:56.551694-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.502095 2171 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:47:56.551696-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.502481 2171 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:56.551697-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.502485 2171 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:47:56.551699-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.502487 2171 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:56.5517-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.502557 2171 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:47:56.551702-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.502948 2171 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.551704-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.503007 2171 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.551705-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.503896 2171 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:47:56.55171-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.503907 2171 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.4 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/functional-730000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:47:56.551712-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" I0531 11:47:56.536630 2171 ssh_runner.go:195] Run: docker images --no-trunc --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:47:56.551735-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListJson"} +{"Time":"2023-05-31T11:47:56.551736-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListJson\n"} +{"Time":"2023-05-31T11:47:56.551774-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:259: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls --format json --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:56.625515-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-darwin-arm64 -p functional-730000 image ls --format json --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:56.625532-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" [{\"id\":\"5ee47dcca7543750b3941b52e98f103bbbae9aaf574ab4dc018e1e7d34e505ad\",\"repoDigests\":[],\"repoTags\":[\"docker.io/library/nginx:alpine\"],\"size\":\"41000000\"},{\"id\":\"305d7ed1dae2877c3a80d434c5fb9f1aac1aa3d2431c36130a3fcd1970e93840\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/kube-scheduler:v1.27.2\"],\"size\":\"56200000\"},{\"id\":\"97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/coredns/coredns:v1.10.1\"],\"size\":\"51400000\"},{\"id\":\"24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/etcd:3.5.7-0\"],\"size\":\"181000000\"},{\"id\":\"ba04bb24b95753201135cbc420b233c1b0b9fa2e1fd21d28319c348c33fbcde6\",\"repoDigests\":[],\"repoTags\":[\"gcr.io/k8s-minikube/storage-provisioner:v5\"],\"size\":\"29000000\"},{\"id\":\"72c9df6be7f1b997e4a31b5cb9aa7262e5278905af97e6a69e341e3f0f9bbaae\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/kube-apiserver:v1.27.2\"],\"size\":\"115000000\"},{\"id\":\"29921a084542255eb81a1a660a603b1a24636d88b"} +{"Time":"2023-05-31T11:47:56.625537-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"202f9010daae75fa32754c0\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/kube-proxy:v1.27.2\"],\"size\":\"66500000\"},{\"id\":\"8057e0500773a37cde2cff041eb13ebd68c748419a2fbfd1dfb5bf38696cc8e5\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:3.1\"],\"size\":\"525000\"},{\"id\":\"a422e0e982356f6c1cf0e5bb7b733363caae3992a07c99951fbcc73e58ed656a\",\"repoDigests\":[],\"repoTags\":[\"docker.io/kubernetesui/metrics-scraper:\\u003cnone\\u003e\"],\"size\":\"42300000\"},{\"id\":\"ffd4cfbbe753e62419e129ee2ac618beb94e51baa7471df5038b0b516b59cf91\",\"repoDigests\":[],\"repoTags\":[\"gcr.io/google-containers/addon-resizer:functional-730000\"],\"size\":\"32900000\"},{\"id\":\"1611cd07b61d57dbbfebe6db242513fd51e1c02d20ba08af17a45837d86a8a8c\",\"repoDigests\":[],\"repoTags\":[\"gcr.io/k8s-minikube/busybox:1.28.4-glibc\"],\"size\":\"3550000\"},{\"id\":\"72565bf5bbedfb62e9d21afa2b1221b2c7a5e05b746dae33430bc550d3f87beb\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/echoserver-arm:1.8\"],\"size\":\"85000000\"},{\"id\":\"8cb2091f603e75187e2f6226c5901d12e00b1d1f778c6471ae4578e8a1c4724a\",\"repoDig"} +{"Time":"2023-05-31T11:47:56.625546-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":"ests\":[],\"repoTags\":[\"registry.k8s.io/pause:latest\"],\"size\":\"240000\"},{\"id\":\"8a6c1b85c0427dbbec58178318e5303e0f104c0da77d16e6996b89b76164db7b\",\"repoDigests\":[],\"repoTags\":[\"docker.io/library/minikube-local-cache-test:functional-730000\"],\"size\":\"30\"},{\"id\":\"c42efe0b54387756e68d167a437aef21451f63eebd9330bb555367d67128386c\",\"repoDigests\":[],\"repoTags\":[\"docker.io/library/nginx:latest\"],\"size\":\"135000000\"},{\"id\":\"2ee705380c3c59a538b853cbe9ae9886ebbd0001a4cea4add5adeea48e5f48d4\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/kube-controller-manager:v1.27.2\"],\"size\":\"107000000\"},{\"id\":\"829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:3.9\"],\"size\":\"514000\"},{\"id\":\"3d18732f8686cc3c878055d99a05fa80289502fa496b36b6a0fe0f77206a7300\",\"repoDigests\":[],\"repoTags\":[\"registry.k8s.io/pause:3.3\"],\"size\":\"484000\"}]\n"} +{"Time":"2023-05-31T11:47:56.625552-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-darwin-arm64 -p functional-730000 image ls --format json --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:56.625553-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.578390 2173 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:47:56.625555-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.578538 2173 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:56.625556-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.578542 2173 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:47:56.625558-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.578544 2173 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:56.62556-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.578618 2173 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:47:56.625562-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.579006 2173 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.625564-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.579063 2173 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.625565-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.579823 2173 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:47:56.625567-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.579832 2173 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.4 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/functional-730000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:47:56.625569-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" I0531 11:47:56.611249 2173 ssh_runner.go:195] Run: docker images --no-trunc --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:47:56.625615-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListTable"} +{"Time":"2023-05-31T11:47:56.625617-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListTable\n"} +{"Time":"2023-05-31T11:47:56.62562-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:259: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls --format table --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:56.714616-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-darwin-arm64 -p functional-730000 image ls --format table --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:56.71463-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|-------------------|---------------|--------|\n"} +{"Time":"2023-05-31T11:47:56.714632-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | Image | Tag | Image ID | Size |\n"} +{"Time":"2023-05-31T11:47:56.714633-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|-------------------|---------------|--------|\n"} +{"Time":"2023-05-31T11:47:56.714635-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-controller-manager | v1.27.2 | 2ee705380c3c5 | 107MB |\n"} +{"Time":"2023-05-31T11:47:56.714636-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-proxy | v1.27.2 | 29921a0845422 | 66.5MB |\n"} +{"Time":"2023-05-31T11:47:56.714638-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/nginx | alpine | 5ee47dcca7543 | 41MB |\n"} +{"Time":"2023-05-31T11:47:56.714639-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-apiserver | v1.27.2 | 72c9df6be7f1b | 115MB |\n"} +{"Time":"2023-05-31T11:47:56.714641-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.9 | 829e9de338bd5 | 514kB |\n"} +{"Time":"2023-05-31T11:47:56.714642-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/k8s-minikube/storage-provisioner | v5 | ba04bb24b9575 | 29MB |\n"} +{"Time":"2023-05-31T11:47:56.714644-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/k8s-minikube/busybox | 1.28.4-glibc | 1611cd07b61d5 | 3.55MB |\n"} +{"Time":"2023-05-31T11:47:56.714645-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/minikube-local-cache-test | functional-730000 | 8a6c1b85c0427 | 30B |\n"} +{"Time":"2023-05-31T11:47:56.714646-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/kube-scheduler | v1.27.2 | 305d7ed1dae28 | 56.2MB |\n"} +{"Time":"2023-05-31T11:47:56.714648-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/etcd | 3.5.7-0 | 24bc64e911039 | 181MB |\n"} +{"Time":"2023-05-31T11:47:56.71465-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | gcr.io/google-containers/addon-resizer | functional-730000 | ffd4cfbbe753e | 32.9MB |\n"} +{"Time":"2023-05-31T11:47:56.714651-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.1 | 8057e0500773a | 525kB |\n"} +{"Time":"2023-05-31T11:47:56.714652-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/echoserver-arm | 1.8 | 72565bf5bbedf | 85MB |\n"} +{"Time":"2023-05-31T11:47:56.714654-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/library/nginx | latest | c42efe0b54387 | 135MB |\n"} +{"Time":"2023-05-31T11:47:56.714655-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/coredns/coredns | v1.10.1 | 97e04611ad434 | 51.4MB |\n"} +{"Time":"2023-05-31T11:47:56.714656-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | docker.io/kubernetesui/metrics-scraper | \u003cnone\u003e | a422e0e982356 | 42.3MB |\n"} +{"Time":"2023-05-31T11:47:56.714658-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | 3.3 | 3d18732f8686c | 484kB |\n"} +{"Time":"2023-05-31T11:47:56.71466-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" | registry.k8s.io/pause | latest | 8cb2091f603e7 | 240kB |\n"} +{"Time":"2023-05-31T11:47:56.714661-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" |---------------------------------------------|-------------------|---------------|--------|\n"} +{"Time":"2023-05-31T11:47:56.714663-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-darwin-arm64 -p functional-730000 image ls --format table --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:56.714665-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.651678 2175 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:47:56.714666-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.651804 2175 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:56.714668-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.651807 2175 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:47:56.714669-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.651810 2175 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:56.714671-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.651894 2175 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:47:56.714672-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.652324 2175 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.714674-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.652385 2175 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.714675-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.653161 2175 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:47:56.714677-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.653173 2175 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.4 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/functional-730000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:47:56.714679-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" I0531 11:47:56.693729 2175 ssh_runner.go:195] Run: docker images --no-trunc --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:47:56.714724-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml"} +{"Time":"2023-05-31T11:47:56.714753-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageListYaml\n"} +{"Time":"2023-05-31T11:47:56.714779-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:259: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls --format yaml --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:56.807471-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:264: (dbg) Stdout: out/minikube-darwin-arm64 -p functional-730000 image ls --format yaml --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:56.807485-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 8057e0500773a37cde2cff041eb13ebd68c748419a2fbfd1dfb5bf38696cc8e5\n"} +{"Time":"2023-05-31T11:47:56.807488-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807489-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807491-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.1\n"} +{"Time":"2023-05-31T11:47:56.807492-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"525000\"\n"} +{"Time":"2023-05-31T11:47:56.807494-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: c42efe0b54387756e68d167a437aef21451f63eebd9330bb555367d67128386c\n"} +{"Time":"2023-05-31T11:47:56.807495-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807497-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807498-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/nginx:latest\n"} +{"Time":"2023-05-31T11:47:56.807499-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"135000000\"\n"} +{"Time":"2023-05-31T11:47:56.807506-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 305d7ed1dae2877c3a80d434c5fb9f1aac1aa3d2431c36130a3fcd1970e93840\n"} +{"Time":"2023-05-31T11:47:56.807508-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807509-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.80751-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.807511-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"56200000\"\n"} +{"Time":"2023-05-31T11:47:56.807513-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\n"} +{"Time":"2023-05-31T11:47:56.807514-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807515-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807516-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T11:47:56.807518-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"181000000\"\n"} +{"Time":"2023-05-31T11:47:56.807519-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\n"} +{"Time":"2023-05-31T11:47:56.807525-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807526-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807527-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T11:47:56.807529-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"514000\"\n"} +{"Time":"2023-05-31T11:47:56.80753-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 5ee47dcca7543750b3941b52e98f103bbbae9aaf574ab4dc018e1e7d34e505ad\n"} +{"Time":"2023-05-31T11:47:56.807532-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807533-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807535-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/nginx:alpine\n"} +{"Time":"2023-05-31T11:47:56.807536-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"41000000\"\n"} +{"Time":"2023-05-31T11:47:56.807537-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 2ee705380c3c59a538b853cbe9ae9886ebbd0001a4cea4add5adeea48e5f48d4\n"} +{"Time":"2023-05-31T11:47:56.807539-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807541-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807542-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.807543-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"107000000\"\n"} +{"Time":"2023-05-31T11:47:56.807544-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 29921a084542255eb81a1a660a603b1a24636d88b202f9010daae75fa32754c0\n"} +{"Time":"2023-05-31T11:47:56.807546-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807547-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807548-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.80755-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"66500000\"\n"} +{"Time":"2023-05-31T11:47:56.807551-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 72565bf5bbedfb62e9d21afa2b1221b2c7a5e05b746dae33430bc550d3f87beb\n"} +{"Time":"2023-05-31T11:47:56.807552-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807553-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807555-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/echoserver-arm:1.8\n"} +{"Time":"2023-05-31T11:47:56.807556-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"85000000\"\n"} +{"Time":"2023-05-31T11:47:56.807557-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 8cb2091f603e75187e2f6226c5901d12e00b1d1f778c6471ae4578e8a1c4724a\n"} +{"Time":"2023-05-31T11:47:56.807558-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.80756-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807561-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:latest\n"} +{"Time":"2023-05-31T11:47:56.807563-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"240000\"\n"} +{"Time":"2023-05-31T11:47:56.807564-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 8a6c1b85c0427dbbec58178318e5303e0f104c0da77d16e6996b89b76164db7b\n"} +{"Time":"2023-05-31T11:47:56.807565-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807566-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807568-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/library/minikube-local-cache-test:functional-730000\n"} +{"Time":"2023-05-31T11:47:56.807569-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"30\"\n"} +{"Time":"2023-05-31T11:47:56.807571-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: ba04bb24b95753201135cbc420b233c1b0b9fa2e1fd21d28319c348c33fbcde6\n"} +{"Time":"2023-05-31T11:47:56.807572-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807573-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807574-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:47:56.807576-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"29000000\"\n"} +{"Time":"2023-05-31T11:47:56.807577-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 3d18732f8686cc3c878055d99a05fa80289502fa496b36b6a0fe0f77206a7300\n"} +{"Time":"2023-05-31T11:47:56.807578-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.80758-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807583-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/pause:3.3\n"} +{"Time":"2023-05-31T11:47:56.807585-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"484000\"\n"} +{"Time":"2023-05-31T11:47:56.807586-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 1611cd07b61d57dbbfebe6db242513fd51e1c02d20ba08af17a45837d86a8a8c\n"} +{"Time":"2023-05-31T11:47:56.807587-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807589-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.80759-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/k8s-minikube/busybox:1.28.4-glibc\n"} +{"Time":"2023-05-31T11:47:56.807591-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"3550000\"\n"} +{"Time":"2023-05-31T11:47:56.807592-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 72c9df6be7f1b997e4a31b5cb9aa7262e5278905af97e6a69e341e3f0f9bbaae\n"} +{"Time":"2023-05-31T11:47:56.807594-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807595-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807596-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.807648-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"115000000\"\n"} +{"Time":"2023-05-31T11:47:56.807651-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: 97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\n"} +{"Time":"2023-05-31T11:47:56.807652-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807654-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807655-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T11:47:56.807656-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"51400000\"\n"} +{"Time":"2023-05-31T11:47:56.807657-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: a422e0e982356f6c1cf0e5bb7b733363caae3992a07c99951fbcc73e58ed656a\n"} +{"Time":"2023-05-31T11:47:56.807659-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.80766-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807661-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - docker.io/kubernetesui/metrics-scraper:\u003cnone\u003e\n"} +{"Time":"2023-05-31T11:47:56.807663-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"42300000\"\n"} +{"Time":"2023-05-31T11:47:56.807664-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - id: ffd4cfbbe753e62419e129ee2ac618beb94e51baa7471df5038b0b516b59cf91\n"} +{"Time":"2023-05-31T11:47:56.807665-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoDigests: []\n"} +{"Time":"2023-05-31T11:47:56.807666-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" repoTags:\n"} +{"Time":"2023-05-31T11:47:56.807668-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" - gcr.io/google-containers/addon-resizer:functional-730000\n"} +{"Time":"2023-05-31T11:47:56.807682-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" size: \"32900000\"\n"} +{"Time":"2023-05-31T11:47:56.807685-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" \n"} +{"Time":"2023-05-31T11:47:56.807688-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" functional_test.go:267: (dbg) Stderr: out/minikube-darwin-arm64 -p functional-730000 image ls --format yaml --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:56.80769-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.743118 2177 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:47:56.807692-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.743255 2177 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:56.807695-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.743258 2177 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:47:56.807696-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.743261 2177 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:56.807698-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.743352 2177 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:47:56.8077-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.743756 2177 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.807701-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.743816 2177 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:56.807707-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.744793 2177 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:47:56.807708-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.744804 2177 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.4 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/functional-730000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:47:56.807711-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" I0531 11:47:56.781692 2177 ssh_runner.go:195] Run: docker images --no-trunc --format \"{{json .}}\"\n"} +{"Time":"2023-05-31T11:47:56.807713-07:00","Action":"cont","Test":"TestFunctional/parallel/ImageCommands/ImageBuild"} +{"Time":"2023-05-31T11:47:56.807715-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"=== CONT TestFunctional/parallel/ImageCommands/ImageBuild\n"} +{"Time":"2023-05-31T11:47:56.807716-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:306: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 ssh pgrep buildkitd\n"} +{"Time":"2023-05-31T11:47:56.873858-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:306: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p functional-730000 ssh pgrep buildkitd: exit status 1 (66.118417ms)\n"} +{"Time":"2023-05-31T11:47:56.873873-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:47:56.873875-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:47:56.873877-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \tssh: Process exited with status 1\n"} +{"Time":"2023-05-31T11:47:56.873878-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:47:56.87388-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:47:56.873882-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:313: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image build -t localhost/my-image:functional-730000 testdata/build --alsologtostderr\n"} +{"Time":"2023-05-31T11:47:59.654304-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:313: (dbg) Done: out/minikube-darwin-arm64 -p functional-730000 image build -t localhost/my-image:functional-730000 testdata/build --alsologtostderr: (2.7803835s)\n"} +{"Time":"2023-05-31T11:47:59.654319-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:318: (dbg) Stdout: out/minikube-darwin-arm64 -p functional-730000 image build -t localhost/my-image:functional-730000 testdata/build --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:59.654321-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Sending build context to Docker daemon 3.072kB\r\r\n"} +{"Time":"2023-05-31T11:47:59.654323-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Step 1/3 : FROM gcr.io/k8s-minikube/busybox\n"} +{"Time":"2023-05-31T11:47:59.654324-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" latest: Pulling from k8s-minikube/busybox\n"} +{"Time":"2023-05-31T11:47:59.654325-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" a01966dde7f8: Pulling fs layer\n"} +{"Time":"2023-05-31T11:47:59.654327-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" a01966dde7f8: Verifying Checksum\n"} +{"Time":"2023-05-31T11:47:59.654336-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" a01966dde7f8: Download complete\n"} +{"Time":"2023-05-31T11:47:59.654338-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" a01966dde7f8: Pull complete\n"} +{"Time":"2023-05-31T11:47:59.654339-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Digest: sha256:ca5ae90100d50772da31f3b5016209e25ad61972404e2ccd83d44f10dee7e79b\n"} +{"Time":"2023-05-31T11:47:59.654341-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Status: Downloaded newer image for gcr.io/k8s-minikube/busybox:latest\n"} +{"Time":"2023-05-31T11:47:59.654344-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ---\u003e 71a676dd070f\n"} +{"Time":"2023-05-31T11:47:59.654346-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Step 2/3 : RUN true\n"} +{"Time":"2023-05-31T11:47:59.654348-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ---\u003e Running in 4ccda4345350\n"} +{"Time":"2023-05-31T11:47:59.65435-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Removing intermediate container 4ccda4345350\n"} +{"Time":"2023-05-31T11:47:59.654351-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ---\u003e 7d734c195ef8\n"} +{"Time":"2023-05-31T11:47:59.654352-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Step 3/3 : ADD content.txt /\n"} +{"Time":"2023-05-31T11:47:59.654354-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" ---\u003e 432460cbd970\n"} +{"Time":"2023-05-31T11:47:59.654355-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Successfully built 432460cbd970\n"} +{"Time":"2023-05-31T11:47:59.654359-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Successfully tagged localhost/my-image:functional-730000\n"} +{"Time":"2023-05-31T11:47:59.654362-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:321: (dbg) Stderr: out/minikube-darwin-arm64 -p functional-730000 image build -t localhost/my-image:functional-730000 testdata/build --alsologtostderr:\n"} +{"Time":"2023-05-31T11:47:59.654364-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.902289 2181 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:47:59.654365-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.902495 2181 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:59.654367-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.902497 2181 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:47:59.654369-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.902500 2181 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:47:59.65437-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.902568 2181 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:47:59.654372-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.902953 2181 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:59.654373-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.903724 2181 config.go:182] Loaded profile config \"functional-730000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:47:59.654385-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.904502 2181 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:47:59.654387-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.904512 2181 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.4 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/functional-730000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:47:59.654389-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.935406 2181 build_images.go:151] Building image from path: /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/build.839737012.tar\n"} +{"Time":"2023-05-31T11:47:59.654391-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.935471 2181 ssh_runner.go:195] Run: sudo mkdir -p /var/lib/minikube/build\n"} +{"Time":"2023-05-31T11:47:59.654392-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.939970 2181 ssh_runner.go:195] Run: stat -c \"%s %y\" /var/lib/minikube/build/build.839737012.tar\n"} +{"Time":"2023-05-31T11:47:59.654397-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.941996 2181 ssh_runner.go:352] existence check for /var/lib/minikube/build/build.839737012.tar: stat -c \"%s %y\" /var/lib/minikube/build/build.839737012.tar: Process exited with status 1\n"} +{"Time":"2023-05-31T11:47:59.654399-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stdout:\n"} +{"Time":"2023-05-31T11:47:59.6544-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:47:59.654402-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stderr:\n"} +{"Time":"2023-05-31T11:47:59.654403-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" stat: cannot statx '/var/lib/minikube/build/build.839737012.tar': No such file or directory\n"} +{"Time":"2023-05-31T11:47:59.654404-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.942013 2181 ssh_runner.go:362] scp /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/build.839737012.tar --\u003e /var/lib/minikube/build/build.839737012.tar (3072 bytes)\n"} +{"Time":"2023-05-31T11:47:59.654406-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.954303 2181 ssh_runner.go:195] Run: sudo mkdir -p /var/lib/minikube/build/build.839737012\n"} +{"Time":"2023-05-31T11:47:59.654408-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.958118 2181 ssh_runner.go:195] Run: sudo tar -C /var/lib/minikube/build/build.839737012 -xf /var/lib/minikube/build/build.839737012.tar\n"} +{"Time":"2023-05-31T11:47:59.654409-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.961789 2181 docker.go:336] Building image: /var/lib/minikube/build/build.839737012\n"} +{"Time":"2023-05-31T11:47:59.654412-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:56.961861 2181 ssh_runner.go:195] Run: docker build -t localhost/my-image:functional-730000 /var/lib/minikube/build/build.839737012\n"} +{"Time":"2023-05-31T11:47:59.654414-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" DEPRECATED: The legacy builder is deprecated and will be removed in a future release.\n"} +{"Time":"2023-05-31T11:47:59.654415-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" Install the buildx component to build images with BuildKit:\n"} +{"Time":"2023-05-31T11:47:59.654417-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" https://docs.docker.com/go/buildx/\n"} +{"Time":"2023-05-31T11:47:59.654418-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" \n"} +{"Time":"2023-05-31T11:47:59.65442-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:59.569495 2181 ssh_runner.go:235] Completed: docker build -t localhost/my-image:functional-730000 /var/lib/minikube/build/build.839737012: (2.607649167s)\n"} +{"Time":"2023-05-31T11:47:59.654421-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:59.569577 2181 ssh_runner.go:195] Run: sudo rm -rf /var/lib/minikube/build/build.839737012\n"} +{"Time":"2023-05-31T11:47:59.654423-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:59.572894 2181 ssh_runner.go:195] Run: sudo rm -f /var/lib/minikube/build/build.839737012.tar\n"} +{"Time":"2023-05-31T11:47:59.654424-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:59.575767 2181 build_images.go:207] Built localhost/my-image:functional-730000 from /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/build.839737012.tar\n"} +{"Time":"2023-05-31T11:47:59.654425-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:59.575782 2181 build_images.go:123] succeeded building to: functional-730000\n"} +{"Time":"2023-05-31T11:47:59.654427-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" I0531 11:47:59.575785 2181 build_images.go:124] failed building to: \n"} +{"Time":"2023-05-31T11:47:59.654428-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" functional_test.go:446: (dbg) Run: out/minikube-darwin-arm64 -p functional-730000 image ls\n"} +{"Time":"2023-05-31T11:48:00.050292-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":"2023/05/31 11:48:00 [DEBUG] GET http://127.0.0.1:36195/api/v1/namespaces/kubernetes-dashboard/services/http:kubernetes-dashboard:/proxy/\n"} +{"Time":"2023-05-31T11:48:00.052722-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" functional_test.go:905: (dbg) stopping [out/minikube-darwin-arm64 dashboard --url --port 36195 -p functional-730000 --alsologtostderr -v=1] ...\n"} +{"Time":"2023-05-31T11:48:00.164248-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" helpers_test.go:508: unable to kill pid 2149: os: process already finished\n"} +{"Time":"2023-05-31T11:48:00.266663-07:00","Action":"run","Test":"TestFunctional/delete_addon-resizer_images"} +{"Time":"2023-05-31T11:48:00.266675-07:00","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":"=== RUN TestFunctional/delete_addon-resizer_images\n"} +{"Time":"2023-05-31T11:48:00.266753-07:00","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" functional_test.go:188: (dbg) Run: docker rmi -f gcr.io/google-containers/addon-resizer:1.8.8\n"} +{"Time":"2023-05-31T11:48:00.409439-07:00","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" functional_test.go:188: (dbg) Run: docker rmi -f gcr.io/google-containers/addon-resizer:functional-730000\n"} +{"Time":"2023-05-31T11:48:00.447987-07:00","Action":"run","Test":"TestFunctional/delete_my-image_image"} +{"Time":"2023-05-31T11:48:00.447998-07:00","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":"=== RUN TestFunctional/delete_my-image_image\n"} +{"Time":"2023-05-31T11:48:00.44808-07:00","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":" functional_test.go:196: (dbg) Run: docker rmi -f localhost/my-image:functional-730000\n"} +{"Time":"2023-05-31T11:48:00.484947-07:00","Action":"run","Test":"TestFunctional/delete_minikube_cached_images"} +{"Time":"2023-05-31T11:48:00.484959-07:00","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":"=== RUN TestFunctional/delete_minikube_cached_images\n"} +{"Time":"2023-05-31T11:48:00.485041-07:00","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":" functional_test.go:204: (dbg) Run: docker rmi -f minikube-local-cache-test:functional-730000\n"} +{"Time":"2023-05-31T11:48:00.521559-07:00","Action":"output","Test":"TestFunctional","Output":" helpers_test.go:175: Cleaning up \"functional-730000\" profile ...\n"} +{"Time":"2023-05-31T11:48:00.521578-07:00","Action":"output","Test":"TestFunctional","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p functional-730000\n"} +{"Time":"2023-05-31T11:48:00.63976-07:00","Action":"output","Test":"TestFunctional","Output":"--- FAIL: TestFunctional (187.22s)\n"} +{"Time":"2023-05-31T11:48:00.639774-07:00","Action":"output","Test":"TestFunctional/serial","Output":" --- PASS: TestFunctional/serial (129.92s)\n"} +{"Time":"2023-05-31T11:48:00.639776-07:00","Action":"output","Test":"TestFunctional/serial/CopySyncFile","Output":" --- PASS: TestFunctional/serial/CopySyncFile (0.00s)\n"} +{"Time":"2023-05-31T11:48:00.639778-07:00","Action":"pass","Test":"TestFunctional/serial/CopySyncFile","Elapsed":0} +{"Time":"2023-05-31T11:48:00.639781-07:00","Action":"output","Test":"TestFunctional/serial/StartWithProxy","Output":" --- PASS: TestFunctional/serial/StartWithProxy (48.42s)\n"} +{"Time":"2023-05-31T11:48:00.639783-07:00","Action":"pass","Test":"TestFunctional/serial/StartWithProxy","Elapsed":48.42} +{"Time":"2023-05-31T11:48:00.639785-07:00","Action":"output","Test":"TestFunctional/serial/AuditLog","Output":" --- PASS: TestFunctional/serial/AuditLog (0.00s)\n"} +{"Time":"2023-05-31T11:48:00.639787-07:00","Action":"pass","Test":"TestFunctional/serial/AuditLog","Elapsed":0} +{"Time":"2023-05-31T11:48:00.639788-07:00","Action":"output","Test":"TestFunctional/serial/SoftStart","Output":" --- PASS: TestFunctional/serial/SoftStart (33.86s)\n"} +{"Time":"2023-05-31T11:48:00.63979-07:00","Action":"pass","Test":"TestFunctional/serial/SoftStart","Elapsed":33.86} +{"Time":"2023-05-31T11:48:00.639791-07:00","Action":"output","Test":"TestFunctional/serial/KubeContext","Output":" --- PASS: TestFunctional/serial/KubeContext (0.03s)\n"} +{"Time":"2023-05-31T11:48:00.639793-07:00","Action":"pass","Test":"TestFunctional/serial/KubeContext","Elapsed":0.03} +{"Time":"2023-05-31T11:48:00.639794-07:00","Action":"output","Test":"TestFunctional/serial/KubectlGetPods","Output":" --- PASS: TestFunctional/serial/KubectlGetPods (0.05s)\n"} +{"Time":"2023-05-31T11:48:00.639795-07:00","Action":"pass","Test":"TestFunctional/serial/KubectlGetPods","Elapsed":0.05} +{"Time":"2023-05-31T11:48:00.639797-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd","Output":" --- PASS: TestFunctional/serial/CacheCmd (8.79s)\n"} +{"Time":"2023-05-31T11:48:00.639798-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache (8.79s)\n"} +{"Time":"2023-05-31T11:48:00.6398-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/add_remote (5.94s)\n"} +{"Time":"2023-05-31T11:48:00.639802-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/add_remote","Elapsed":5.94} +{"Time":"2023-05-31T11:48:00.639804-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/add_local (1.31s)\n"} +{"Time":"2023-05-31T11:48:00.639805-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/add_local","Elapsed":1.31} +{"Time":"2023-05-31T11:48:00.639806-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/CacheDelete (0.03s)\n"} +{"Time":"2023-05-31T11:48:00.639808-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/CacheDelete","Elapsed":0.03} +{"Time":"2023-05-31T11:48:00.639809-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/list","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/list (0.03s)\n"} +{"Time":"2023-05-31T11:48:00.639811-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/list","Elapsed":0.03} +{"Time":"2023-05-31T11:48:00.639812-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node (0.07s)\n"} +{"Time":"2023-05-31T11:48:00.639814-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/verify_cache_inside_node","Elapsed":0.07} +{"Time":"2023-05-31T11:48:00.639815-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/cache_reload (1.34s)\n"} +{"Time":"2023-05-31T11:48:00.639817-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/cache_reload","Elapsed":1.34} +{"Time":"2023-05-31T11:48:00.639818-07:00","Action":"output","Test":"TestFunctional/serial/CacheCmd/cache/delete","Output":" --- PASS: TestFunctional/serial/CacheCmd/cache/delete (0.06s)\n"} +{"Time":"2023-05-31T11:48:00.639819-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache/delete","Elapsed":0.06} +{"Time":"2023-05-31T11:48:00.639821-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd/cache","Elapsed":8.79} +{"Time":"2023-05-31T11:48:00.639822-07:00","Action":"pass","Test":"TestFunctional/serial/CacheCmd","Elapsed":8.79} +{"Time":"2023-05-31T11:48:00.639823-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmd","Output":" --- PASS: TestFunctional/serial/MinikubeKubectlCmd (0.49s)\n"} +{"Time":"2023-05-31T11:48:00.639825-07:00","Action":"pass","Test":"TestFunctional/serial/MinikubeKubectlCmd","Elapsed":0.49} +{"Time":"2023-05-31T11:48:00.639826-07:00","Action":"output","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Output":" --- PASS: TestFunctional/serial/MinikubeKubectlCmdDirectly (0.53s)\n"} +{"Time":"2023-05-31T11:48:00.639828-07:00","Action":"pass","Test":"TestFunctional/serial/MinikubeKubectlCmdDirectly","Elapsed":0.53} +{"Time":"2023-05-31T11:48:00.639829-07:00","Action":"output","Test":"TestFunctional/serial/ExtraConfig","Output":" --- PASS: TestFunctional/serial/ExtraConfig (36.40s)\n"} +{"Time":"2023-05-31T11:48:00.639836-07:00","Action":"pass","Test":"TestFunctional/serial/ExtraConfig","Elapsed":36.4} +{"Time":"2023-05-31T11:48:00.639837-07:00","Action":"output","Test":"TestFunctional/serial/ComponentHealth","Output":" --- PASS: TestFunctional/serial/ComponentHealth (0.04s)\n"} +{"Time":"2023-05-31T11:48:00.639843-07:00","Action":"pass","Test":"TestFunctional/serial/ComponentHealth","Elapsed":0.04} +{"Time":"2023-05-31T11:48:00.639844-07:00","Action":"output","Test":"TestFunctional/serial/LogsCmd","Output":" --- PASS: TestFunctional/serial/LogsCmd (0.64s)\n"} +{"Time":"2023-05-31T11:48:00.639846-07:00","Action":"pass","Test":"TestFunctional/serial/LogsCmd","Elapsed":0.64} +{"Time":"2023-05-31T11:48:00.639847-07:00","Action":"output","Test":"TestFunctional/serial/LogsFileCmd","Output":" --- PASS: TestFunctional/serial/LogsFileCmd (0.65s)\n"} +{"Time":"2023-05-31T11:48:00.639849-07:00","Action":"pass","Test":"TestFunctional/serial/LogsFileCmd","Elapsed":0.65} +{"Time":"2023-05-31T11:48:00.63985-07:00","Action":"pass","Test":"TestFunctional/serial","Elapsed":129.92} +{"Time":"2023-05-31T11:48:00.639851-07:00","Action":"output","Test":"TestFunctional/parallel","Output":" --- FAIL: TestFunctional/parallel (0.00s)\n"} +{"Time":"2023-05-31T11:48:00.639853-07:00","Action":"output","Test":"TestFunctional/parallel/ConfigCmd","Output":" --- PASS: TestFunctional/parallel/ConfigCmd (0.20s)\n"} +{"Time":"2023-05-31T11:48:00.639854-07:00","Action":"pass","Test":"TestFunctional/parallel/ConfigCmd","Elapsed":0.2} +{"Time":"2023-05-31T11:48:00.639856-07:00","Action":"output","Test":"TestFunctional/parallel/CpCmd","Output":" --- PASS: TestFunctional/parallel/CpCmd (0.28s)\n"} +{"Time":"2023-05-31T11:48:00.639857-07:00","Action":"pass","Test":"TestFunctional/parallel/CpCmd","Elapsed":0.28} +{"Time":"2023-05-31T11:48:00.639858-07:00","Action":"output","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Output":" --- PASS: TestFunctional/parallel/NonActiveRuntimeDisabled (0.06s)\n"} +{"Time":"2023-05-31T11:48:00.63986-07:00","Action":"pass","Test":"TestFunctional/parallel/NonActiveRuntimeDisabled","Elapsed":0.06} +{"Time":"2023-05-31T11:48:00.639861-07:00","Action":"output","Test":"TestFunctional/parallel/License","Output":" --- PASS: TestFunctional/parallel/License (0.40s)\n"} +{"Time":"2023-05-31T11:48:00.639863-07:00","Action":"pass","Test":"TestFunctional/parallel/License","Elapsed":0.4} +{"Time":"2023-05-31T11:48:00.639864-07:00","Action":"output","Test":"TestFunctional/parallel/NodeLabels","Output":" --- PASS: TestFunctional/parallel/NodeLabels (0.04s)\n"} +{"Time":"2023-05-31T11:48:00.639866-07:00","Action":"pass","Test":"TestFunctional/parallel/NodeLabels","Elapsed":0.04} +{"Time":"2023-05-31T11:48:00.639867-07:00","Action":"output","Test":"TestFunctional/parallel/PodmanEnv","Output":" --- SKIP: TestFunctional/parallel/PodmanEnv (0.00s)\n"} +{"Time":"2023-05-31T11:48:00.639868-07:00","Action":"skip","Test":"TestFunctional/parallel/PodmanEnv","Elapsed":0} +{"Time":"2023-05-31T11:48:00.639869-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv","Output":" --- PASS: TestFunctional/parallel/DockerEnv (0.41s)\n"} +{"Time":"2023-05-31T11:48:00.639871-07:00","Action":"output","Test":"TestFunctional/parallel/DockerEnv/bash","Output":" --- PASS: TestFunctional/parallel/DockerEnv/bash (0.41s)\n"} +{"Time":"2023-05-31T11:48:00.639872-07:00","Action":"pass","Test":"TestFunctional/parallel/DockerEnv/bash","Elapsed":0.41} +{"Time":"2023-05-31T11:48:00.639874-07:00","Action":"pass","Test":"TestFunctional/parallel/DockerEnv","Elapsed":0.41} +{"Time":"2023-05-31T11:48:00.639875-07:00","Action":"output","Test":"TestFunctional/parallel/CertSync","Output":" --- PASS: TestFunctional/parallel/CertSync (0.41s)\n"} +{"Time":"2023-05-31T11:48:00.639876-07:00","Action":"pass","Test":"TestFunctional/parallel/CertSync","Elapsed":0.41} +{"Time":"2023-05-31T11:48:00.639878-07:00","Action":"output","Test":"TestFunctional/parallel/FileSync","Output":" --- PASS: TestFunctional/parallel/FileSync (0.07s)\n"} +{"Time":"2023-05-31T11:48:00.639879-07:00","Action":"pass","Test":"TestFunctional/parallel/FileSync","Elapsed":0.07} +{"Time":"2023-05-31T11:48:00.639881-07:00","Action":"output","Test":"TestFunctional/parallel/MySQL","Output":" --- SKIP: TestFunctional/parallel/MySQL (0.00s)\n"} +{"Time":"2023-05-31T11:48:00.639882-07:00","Action":"skip","Test":"TestFunctional/parallel/MySQL","Elapsed":0} +{"Time":"2023-05-31T11:48:00.639884-07:00","Action":"output","Test":"TestFunctional/parallel/SSHCmd","Output":" --- PASS: TestFunctional/parallel/SSHCmd (0.15s)\n"} +{"Time":"2023-05-31T11:48:00.639886-07:00","Action":"pass","Test":"TestFunctional/parallel/SSHCmd","Elapsed":0.15} +{"Time":"2023-05-31T11:48:00.639887-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd","Output":" --- PASS: TestFunctional/parallel/ServiceCmd (13.59s)\n"} +{"Time":"2023-05-31T11:48:00.639888-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/DeployApp (13.10s)\n"} +{"Time":"2023-05-31T11:48:00.63989-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/DeployApp","Elapsed":13.1} +{"Time":"2023-05-31T11:48:00.639892-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/List","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/List (0.10s)\n"} +{"Time":"2023-05-31T11:48:00.639893-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/List","Elapsed":0.1} +{"Time":"2023-05-31T11:48:00.639894-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/JSONOutput (0.09s)\n"} +{"Time":"2023-05-31T11:48:00.639896-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/JSONOutput","Elapsed":0.09} +{"Time":"2023-05-31T11:48:00.639897-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/HTTPS (0.10s)\n"} +{"Time":"2023-05-31T11:48:00.639899-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/HTTPS","Elapsed":0.1} +{"Time":"2023-05-31T11:48:00.6399-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/Format","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/Format (0.10s)\n"} +{"Time":"2023-05-31T11:48:00.639901-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/Format","Elapsed":0.1} +{"Time":"2023-05-31T11:48:00.639902-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmd/URL","Output":" --- PASS: TestFunctional/parallel/ServiceCmd/URL (0.10s)\n"} +{"Time":"2023-05-31T11:48:00.639904-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd/URL","Elapsed":0.1} +{"Time":"2023-05-31T11:48:00.639905-07:00","Action":"pass","Test":"TestFunctional/parallel/ServiceCmd","Elapsed":13.59} +{"Time":"2023-05-31T11:48:00.639907-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd","Output":" --- PASS: TestFunctional/parallel/TunnelCmd (10.66s)\n"} +{"Time":"2023-05-31T11:48:00.639908-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial (10.66s)\n"} +{"Time":"2023-05-31T11:48:00.63991-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel (0.21s)\n"} +{"Time":"2023-05-31T11:48:00.639911-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/RunSecondTunnel","Elapsed":0.21} +{"Time":"2023-05-31T11:48:00.639913-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/StartTunnel (0.01s)\n"} +{"Time":"2023-05-31T11:48:00.639914-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/StartTunnel","Elapsed":0.01} +{"Time":"2023-05-31T11:48:00.639916-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/WaitService (10.25s)\n"} +{"Time":"2023-05-31T11:48:00.639919-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup (10.21s)\n"} +{"Time":"2023-05-31T11:48:00.63992-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/Setup","Elapsed":10.21} +{"Time":"2023-05-31T11:48:00.639922-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP (0.04s)\n"} +{"Time":"2023-05-31T11:48:00.639923-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService/IngressIP","Elapsed":0.04} +{"Time":"2023-05-31T11:48:00.639926-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/WaitService","Elapsed":10.25} +{"Time":"2023-05-31T11:48:00.63993-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/AccessDirect (0.01s)\n"} +{"Time":"2023-05-31T11:48:00.639932-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessDirect","Elapsed":0.01} +{"Time":"2023-05-31T11:48:00.639933-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig (0.02s)\n"} +{"Time":"2023-05-31T11:48:00.639935-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDig","Elapsed":0.02} +{"Time":"2023-05-31T11:48:00.639936-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil (0.02s)\n"} +{"Time":"2023-05-31T11:48:00.639938-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/DNSResolutionByDscacheutil","Elapsed":0.02} +{"Time":"2023-05-31T11:48:00.63994-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS (0.01s)\n"} +{"Time":"2023-05-31T11:48:00.639942-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/AccessThroughDNS","Elapsed":0.01} +{"Time":"2023-05-31T11:48:00.639943-07:00","Action":"output","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Output":" --- PASS: TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel (0.12s)\n"} +{"Time":"2023-05-31T11:48:00.639944-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial/DeleteTunnel","Elapsed":0.12} +{"Time":"2023-05-31T11:48:00.639946-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd/serial","Elapsed":10.66} +{"Time":"2023-05-31T11:48:00.639947-07:00","Action":"pass","Test":"TestFunctional/parallel/TunnelCmd","Elapsed":10.66} +{"Time":"2023-05-31T11:48:00.639948-07:00","Action":"output","Test":"TestFunctional/parallel/AddonsCmd","Output":" --- PASS: TestFunctional/parallel/AddonsCmd (0.12s)\n"} +{"Time":"2023-05-31T11:48:00.63995-07:00","Action":"pass","Test":"TestFunctional/parallel/AddonsCmd","Elapsed":0.12} +{"Time":"2023-05-31T11:48:00.639951-07:00","Action":"output","Test":"TestFunctional/parallel/PersistentVolumeClaim","Output":" --- PASS: TestFunctional/parallel/PersistentVolumeClaim (24.32s)\n"} +{"Time":"2023-05-31T11:48:00.639952-07:00","Action":"pass","Test":"TestFunctional/parallel/PersistentVolumeClaim","Elapsed":24.32} +{"Time":"2023-05-31T11:48:00.639954-07:00","Action":"output","Test":"TestFunctional/parallel/StatusCmd","Output":" --- PASS: TestFunctional/parallel/StatusCmd (0.25s)\n"} +{"Time":"2023-05-31T11:48:00.639956-07:00","Action":"pass","Test":"TestFunctional/parallel/StatusCmd","Elapsed":0.25} +{"Time":"2023-05-31T11:48:00.639957-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd","Output":" --- PASS: TestFunctional/parallel/ProfileCmd (0.49s)\n"} +{"Time":"2023-05-31T11:48:00.639959-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_not_create (0.19s)\n"} +{"Time":"2023-05-31T11:48:00.63996-07:00","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_not_create","Elapsed":0.19} +{"Time":"2023-05-31T11:48:00.639962-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_list (0.15s)\n"} +{"Time":"2023-05-31T11:48:00.639963-07:00","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_list","Elapsed":0.15} +{"Time":"2023-05-31T11:48:00.639965-07:00","Action":"output","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Output":" --- PASS: TestFunctional/parallel/ProfileCmd/profile_json_output (0.15s)\n"} +{"Time":"2023-05-31T11:48:00.639966-07:00","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd/profile_json_output","Elapsed":0.15} +{"Time":"2023-05-31T11:48:00.639968-07:00","Action":"pass","Test":"TestFunctional/parallel/ProfileCmd","Elapsed":0.49} +{"Time":"2023-05-31T11:48:00.639969-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd","Output":" --- PASS: TestFunctional/parallel/MountCmd (8.23s)\n"} +{"Time":"2023-05-31T11:48:00.639971-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/any-port","Output":" --- PASS: TestFunctional/parallel/MountCmd/any-port (6.32s)\n"} +{"Time":"2023-05-31T11:48:00.639973-07:00","Action":"pass","Test":"TestFunctional/parallel/MountCmd/any-port","Elapsed":6.32} +{"Time":"2023-05-31T11:48:00.639975-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/specific-port","Output":" --- PASS: TestFunctional/parallel/MountCmd/specific-port (1.14s)\n"} +{"Time":"2023-05-31T11:48:00.639976-07:00","Action":"pass","Test":"TestFunctional/parallel/MountCmd/specific-port","Elapsed":1.14} +{"Time":"2023-05-31T11:48:00.639977-07:00","Action":"output","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Output":" --- PASS: TestFunctional/parallel/MountCmd/VerifyCleanup (0.77s)\n"} +{"Time":"2023-05-31T11:48:00.639979-07:00","Action":"pass","Test":"TestFunctional/parallel/MountCmd/VerifyCleanup","Elapsed":0.77} +{"Time":"2023-05-31T11:48:00.63998-07:00","Action":"pass","Test":"TestFunctional/parallel/MountCmd","Elapsed":8.23} +{"Time":"2023-05-31T11:48:00.639982-07:00","Action":"output","Test":"TestFunctional/parallel/DryRun","Output":" --- PASS: TestFunctional/parallel/DryRun (0.22s)\n"} +{"Time":"2023-05-31T11:48:00.639983-07:00","Action":"pass","Test":"TestFunctional/parallel/DryRun","Elapsed":0.22} +{"Time":"2023-05-31T11:48:00.639984-07:00","Action":"output","Test":"TestFunctional/parallel/InternationalLanguage","Output":" --- PASS: TestFunctional/parallel/InternationalLanguage (0.10s)\n"} +{"Time":"2023-05-31T11:48:00.639986-07:00","Action":"pass","Test":"TestFunctional/parallel/InternationalLanguage","Elapsed":0.1} +{"Time":"2023-05-31T11:48:00.639991-07:00","Action":"output","Test":"TestFunctional/parallel/ServiceCmdConnect","Output":" --- FAIL: TestFunctional/parallel/ServiceCmdConnect (28.47s)\n"} +{"Time":"2023-05-31T11:48:00.639992-07:00","Action":"fail","Test":"TestFunctional/parallel/ServiceCmdConnect","Elapsed":28.47} +{"Time":"2023-05-31T11:48:00.639994-07:00","Action":"output","Test":"TestFunctional/parallel/Version","Output":" --- PASS: TestFunctional/parallel/Version (0.00s)\n"} +{"Time":"2023-05-31T11:48:00.639995-07:00","Action":"output","Test":"TestFunctional/parallel/Version/short","Output":" --- PASS: TestFunctional/parallel/Version/short (0.04s)\n"} +{"Time":"2023-05-31T11:48:00.639997-07:00","Action":"pass","Test":"TestFunctional/parallel/Version/short","Elapsed":0.04} +{"Time":"2023-05-31T11:48:00.639998-07:00","Action":"output","Test":"TestFunctional/parallel/Version/components","Output":" --- PASS: TestFunctional/parallel/Version/components (0.17s)\n"} +{"Time":"2023-05-31T11:48:00.640001-07:00","Action":"pass","Test":"TestFunctional/parallel/Version/components","Elapsed":0.17} +{"Time":"2023-05-31T11:48:00.640002-07:00","Action":"pass","Test":"TestFunctional/parallel/Version","Elapsed":0} +{"Time":"2023-05-31T11:48:00.640003-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd (0.00s)\n"} +{"Time":"2023-05-31T11:48:00.640008-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_changes (0.04s)\n"} +{"Time":"2023-05-31T11:48:00.64001-07:00","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_changes","Elapsed":0.04} +{"Time":"2023-05-31T11:48:00.640012-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_clusters (0.05s)\n"} +{"Time":"2023-05-31T11:48:00.640015-07:00","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_clusters","Elapsed":0.05} +{"Time":"2023-05-31T11:48:00.640017-07:00","Action":"output","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Output":" --- PASS: TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster (0.05s)\n"} +{"Time":"2023-05-31T11:48:00.640018-07:00","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd/no_minikube_cluster","Elapsed":0.05} +{"Time":"2023-05-31T11:48:00.64002-07:00","Action":"pass","Test":"TestFunctional/parallel/UpdateContextCmd","Elapsed":0} +{"Time":"2023-05-31T11:48:00.640021-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands","Output":" --- PASS: TestFunctional/parallel/ImageCommands (13.04s)\n"} +{"Time":"2023-05-31T11:48:00.640023-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/Setup","Output":" --- PASS: TestFunctional/parallel/ImageCommands/Setup (2.19s)\n"} +{"Time":"2023-05-31T11:48:00.640024-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/Setup","Elapsed":2.19} +{"Time":"2023-05-31T11:48:00.640026-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageLoadDaemon (2.16s)\n"} +{"Time":"2023-05-31T11:48:00.640028-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageLoadDaemon","Elapsed":2.16} +{"Time":"2023-05-31T11:48:00.640029-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageReloadDaemon (1.54s)\n"} +{"Time":"2023-05-31T11:48:00.640031-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageReloadDaemon","Elapsed":1.54} +{"Time":"2023-05-31T11:48:00.640033-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon (4.23s)\n"} +{"Time":"2023-05-31T11:48:00.640034-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageTagAndLoadDaemon","Elapsed":4.23} +{"Time":"2023-05-31T11:48:00.640036-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageSaveToFile (0.52s)\n"} +{"Time":"2023-05-31T11:48:00.640038-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageSaveToFile","Elapsed":0.52} +{"Time":"2023-05-31T11:48:00.640039-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageRemove (0.16s)\n"} +{"Time":"2023-05-31T11:48:00.640041-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageRemove","Elapsed":0.16} +{"Time":"2023-05-31T11:48:00.640043-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageLoadFromFile (0.62s)\n"} +{"Time":"2023-05-31T11:48:00.640044-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageLoadFromFile","Elapsed":0.62} +{"Time":"2023-05-31T11:48:00.640046-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageSaveDaemon (1.60s)\n"} +{"Time":"2023-05-31T11:48:00.640047-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageSaveDaemon","Elapsed":1.6} +{"Time":"2023-05-31T11:48:00.640049-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListShort (0.08s)\n"} +{"Time":"2023-05-31T11:48:00.64005-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListShort","Elapsed":0.08} +{"Time":"2023-05-31T11:48:00.640052-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListJson (0.07s)\n"} +{"Time":"2023-05-31T11:48:00.640053-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListJson","Elapsed":0.07} +{"Time":"2023-05-31T11:48:00.640054-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListTable (0.09s)\n"} +{"Time":"2023-05-31T11:48:00.640056-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListTable","Elapsed":0.09} +{"Time":"2023-05-31T11:48:00.640057-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageListYaml (0.09s)\n"} +{"Time":"2023-05-31T11:48:00.640059-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageListYaml","Elapsed":0.09} +{"Time":"2023-05-31T11:48:00.640061-07:00","Action":"output","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Output":" --- PASS: TestFunctional/parallel/ImageCommands/ImageBuild (2.95s)\n"} +{"Time":"2023-05-31T11:48:00.640062-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands/ImageBuild","Elapsed":2.95} +{"Time":"2023-05-31T11:48:00.640063-07:00","Action":"pass","Test":"TestFunctional/parallel/ImageCommands","Elapsed":13.04} +{"Time":"2023-05-31T11:48:00.640065-07:00","Action":"output","Test":"TestFunctional/parallel/DashboardCmd","Output":" --- PASS: TestFunctional/parallel/DashboardCmd (8.18s)\n"} +{"Time":"2023-05-31T11:48:00.640066-07:00","Action":"pass","Test":"TestFunctional/parallel/DashboardCmd","Elapsed":8.18} +{"Time":"2023-05-31T11:48:00.640068-07:00","Action":"fail","Test":"TestFunctional/parallel","Elapsed":0} +{"Time":"2023-05-31T11:48:00.640071-07:00","Action":"output","Test":"TestFunctional/delete_addon-resizer_images","Output":" --- PASS: TestFunctional/delete_addon-resizer_images (0.18s)\n"} +{"Time":"2023-05-31T11:48:00.640072-07:00","Action":"pass","Test":"TestFunctional/delete_addon-resizer_images","Elapsed":0.18} +{"Time":"2023-05-31T11:48:00.640074-07:00","Action":"output","Test":"TestFunctional/delete_my-image_image","Output":" --- PASS: TestFunctional/delete_my-image_image (0.04s)\n"} +{"Time":"2023-05-31T11:48:00.640075-07:00","Action":"pass","Test":"TestFunctional/delete_my-image_image","Elapsed":0.04} +{"Time":"2023-05-31T11:48:00.640076-07:00","Action":"output","Test":"TestFunctional/delete_minikube_cached_images","Output":" --- PASS: TestFunctional/delete_minikube_cached_images (0.04s)\n"} +{"Time":"2023-05-31T11:48:00.640079-07:00","Action":"pass","Test":"TestFunctional/delete_minikube_cached_images","Elapsed":0.04} +{"Time":"2023-05-31T11:48:00.64008-07:00","Action":"fail","Test":"TestFunctional","Elapsed":187.22} +{"Time":"2023-05-31T11:48:00.640082-07:00","Action":"run","Test":"TestGvisorAddon"} +{"Time":"2023-05-31T11:48:00.640083-07:00","Action":"output","Test":"TestGvisorAddon","Output":"=== RUN TestGvisorAddon\n"} +{"Time":"2023-05-31T11:48:00.640084-07:00","Action":"output","Test":"TestGvisorAddon","Output":" gvisor_addon_test.go:34: skipping test because --gvisor=false\n"} +{"Time":"2023-05-31T11:48:00.640086-07:00","Action":"output","Test":"TestGvisorAddon","Output":"--- SKIP: TestGvisorAddon (0.00s)\n"} +{"Time":"2023-05-31T11:48:00.640088-07:00","Action":"skip","Test":"TestGvisorAddon","Elapsed":0} +{"Time":"2023-05-31T11:48:00.64009-07:00","Action":"run","Test":"TestImageBuild"} +{"Time":"2023-05-31T11:48:00.640091-07:00","Action":"output","Test":"TestImageBuild","Output":"=== RUN TestImageBuild\n"} +{"Time":"2023-05-31T11:48:00.640092-07:00","Action":"run","Test":"TestImageBuild/serial"} +{"Time":"2023-05-31T11:48:00.640094-07:00","Action":"output","Test":"TestImageBuild/serial","Output":"=== RUN TestImageBuild/serial\n"} +{"Time":"2023-05-31T11:48:00.640095-07:00","Action":"run","Test":"TestImageBuild/serial/Setup"} +{"Time":"2023-05-31T11:48:00.640096-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":"=== RUN TestImageBuild/serial/Setup\n"} +{"Time":"2023-05-31T11:48:00.640098-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":" image_test.go:69: (dbg) Run: out/minikube-darwin-arm64 start -p image-844000 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:48:30.2457-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":" image_test.go:69: (dbg) Done: out/minikube-darwin-arm64 start -p image-844000 --driver=qemu2 : (29.606145958s)\n"} +{"Time":"2023-05-31T11:48:30.245718-07:00","Action":"run","Test":"TestImageBuild/serial/NormalBuild"} +{"Time":"2023-05-31T11:48:30.245721-07:00","Action":"output","Test":"TestImageBuild/serial/NormalBuild","Output":"=== RUN TestImageBuild/serial/NormalBuild\n"} +{"Time":"2023-05-31T11:48:30.245736-07:00","Action":"output","Test":"TestImageBuild/serial/NormalBuild","Output":" image_test.go:78: (dbg) Run: out/minikube-darwin-arm64 image build -t aaa:latest ./testdata/image-build/test-normal -p image-844000\n"} +{"Time":"2023-05-31T11:48:32.082392-07:00","Action":"output","Test":"TestImageBuild/serial/NormalBuild","Output":" image_test.go:78: (dbg) Done: out/minikube-darwin-arm64 image build -t aaa:latest ./testdata/image-build/test-normal -p image-844000: (1.836611s)\n"} +{"Time":"2023-05-31T11:48:32.082446-07:00","Action":"run","Test":"TestImageBuild/serial/BuildWithBuildArg"} +{"Time":"2023-05-31T11:48:32.082461-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":"=== RUN TestImageBuild/serial/BuildWithBuildArg\n"} +{"Time":"2023-05-31T11:48:32.082498-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" image_test.go:99: (dbg) Run: out/minikube-darwin-arm64 image build -t aaa:latest --build-opt=build-arg=ENV_A=test_env_str --build-opt=no-cache ./testdata/image-build/test-arg -p image-844000\n"} +{"Time":"2023-05-31T11:48:32.451071-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" image_test.go:105: failed to pass build-args with args: \"out/minikube-darwin-arm64 image build -t aaa:latest --build-opt=build-arg=ENV_A=test_env_str --build-opt=no-cache ./testdata/image-build/test-arg -p image-844000\" : \n"} +{"Time":"2023-05-31T11:48:32.451084-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:48:32.451087-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tSending build context to Docker daemon 2.048kB\r\n"} +{"Time":"2023-05-31T11:48:32.451088-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tStep 1/5 : FROM gcr.io/google-containers/alpine-with-bash:1.0\n"} +{"Time":"2023-05-31T11:48:32.45109-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e 822c13824dc2\n"} +{"Time":"2023-05-31T11:48:32.451092-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tStep 2/5 : ARG ENV_A\n"} +{"Time":"2023-05-31T11:48:32.451093-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e [Warning] The requested image's platform (linux/amd64) does not match the detected host platform (linux/arm64/v8) and no specific platform was requested\n"} +{"Time":"2023-05-31T11:48:32.451095-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e Running in ea50917ed91e\n"} +{"Time":"2023-05-31T11:48:32.451097-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRemoving intermediate container ea50917ed91e\n"} +{"Time":"2023-05-31T11:48:32.45111-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e 4cdeb10823de\n"} +{"Time":"2023-05-31T11:48:32.451111-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tStep 3/5 : ARG ENV_B\n"} +{"Time":"2023-05-31T11:48:32.451112-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e [Warning] The requested image's platform (linux/amd64) does not match the detected host platform (linux/arm64/v8) and no specific platform was requested\n"} +{"Time":"2023-05-31T11:48:32.451114-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e Running in 0cdc4c670be7\n"} +{"Time":"2023-05-31T11:48:32.451115-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRemoving intermediate container 0cdc4c670be7\n"} +{"Time":"2023-05-31T11:48:32.451116-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e 5c5d1fcb636e\n"} +{"Time":"2023-05-31T11:48:32.451118-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tStep 4/5 : RUN echo \"test-build-arg\" $ENV_A $ENV_B\n"} +{"Time":"2023-05-31T11:48:32.45112-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e [Warning] The requested image's platform (linux/amd64) does not match the detected host platform (linux/arm64/v8) and no specific platform was requested\n"} +{"Time":"2023-05-31T11:48:32.451121-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---\u003e Running in 3d146fa79121\n"} +{"Time":"2023-05-31T11:48:32.451122-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\u001b[91mexec /bin/sh: exec format error\n"} +{"Time":"2023-05-31T11:48:32.451123-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\u001b[0m\n"} +{"Time":"2023-05-31T11:48:32.451125-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \n"} +{"Time":"2023-05-31T11:48:32.451126-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:48:32.451127-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:48:32.451128-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tDEPRECATED: The legacy builder is deprecated and will be removed in a future release.\n"} +{"Time":"2023-05-31T11:48:32.45113-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Install the buildx component to build images with BuildKit:\n"} +{"Time":"2023-05-31T11:48:32.451131-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t https://docs.docker.com/go/buildx/\n"} +{"Time":"2023-05-31T11:48:32.451132-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.451134-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tThe command '/bin/sh -c echo \"test-build-arg\" $ENV_A $ENV_B' returned a non-zero code: 1\n"} +{"Time":"2023-05-31T11:48:32.451136-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \n"} +{"Time":"2023-05-31T11:48:32.451138-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:48:32.45114-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:48:32.451143-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p image-844000 -n image-844000\n"} +{"Time":"2023-05-31T11:48:32.529247-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:244: \u003c\u003c\u003c TestImageBuild/serial/BuildWithBuildArg FAILED: start of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T11:48:32.529261-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:245: ======\u003e post-mortem[TestImageBuild/serial/BuildWithBuildArg]: minikube logs \u003c======\n"} +{"Time":"2023-05-31T11:48:32.529265-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:247: (dbg) Run: out/minikube-darwin-arm64 -p image-844000 logs -n 25\n"} +{"Time":"2023-05-31T11:48:32.938926-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:252: TestImageBuild/serial/BuildWithBuildArg logs: \n"} +{"Time":"2023-05-31T11:48:32.938939-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:48:32.938942-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.938949-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T11:48:32.938951-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* |----------------|--------------------------------------------------------------------------------------------------------------------|-------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:48:32.938953-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T11:48:32.938954-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t|----------------|--------------------------------------------------------------------------------------------------------------------|-------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:48:32.938956-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:48:32.938958-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount3 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938959-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938961-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:48:32.938963-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | -T /mount1 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938964-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:48:32.938966-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestFunctionalparallelMountCmdVerifyCleanup2736934691/001:/mount1 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938967-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938969-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.938971-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | -T /mount1 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938972-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.938974-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | -T /mount2 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938975-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| ssh | functional-730000 ssh findmnt | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.938977-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | -T /mount3 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938979-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| mount | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:48:32.93898-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --kill=true | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938982-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| start | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:48:32.938984-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --dry-run --memory | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.93899-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | 250MB --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938992-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938993-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| start | -p functional-730000 --dry-run | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:48:32.938995-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938996-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.938998-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| start | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:48:32.938999-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --dry-run --memory | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939001-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | 250MB --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939003-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939004-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| dashboard | --url --port 36195 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939006-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | -p functional-730000 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939007-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939009-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| update-context | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939011-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | update-context | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939012-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr -v=2 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939014-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| update-context | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939015-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | update-context | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939017-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr -v=2 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939018-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| update-context | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.93902-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | update-context | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939022-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr -v=2 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939023-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| image | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939025-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | image ls --format short | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939027-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939028-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| image | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.93903-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | image ls --format json | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939032-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939033-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| image | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939035-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | image ls --format table | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939036-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939038-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| image | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.93904-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | image ls --format yaml | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939041-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939043-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| ssh | functional-730000 ssh pgrep | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:48:32.939045-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | buildkitd | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939046-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| image | functional-730000 image build -t | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939048-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | localhost/my-image:functional-730000 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939049-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | testdata/build --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939051-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| image | functional-730000 image ls | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939053-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| delete | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939054-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| start | -p image-844000 --driver=qemu2 | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939056-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939057-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| image | build -t aaa:latest | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939059-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | ./testdata/image-build/test-normal | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939061-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | -p image-844000 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939062-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| image | build -t aaa:latest | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:48:32.939066-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --build-opt=build-arg=ENV_A=test_env_str | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939068-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | --build-opt=no-cache | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.93907-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | ./testdata/image-build/test-arg -p | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939071-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t| | image-844000 | | | | | |\n"} +{"Time":"2023-05-31T11:48:32.939073-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t|----------------|--------------------------------------------------------------------------------------------------------------------|-------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:48:32.939074-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939076-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.939077-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T11:48:32.939078-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* Log file created at: 2023/05/31 11:48:00\n"} +{"Time":"2023-05-31T11:48:32.93908-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRunning on machine: MacOS-M1-Agent-1\n"} +{"Time":"2023-05-31T11:48:32.939081-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tBinary: Built with gc go1.20.4 for darwin/arm64\n"} +{"Time":"2023-05-31T11:48:32.939082-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T11:48:32.939084-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.671627 2201 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:48:32.939085-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.671758 2201 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:48:32.939086-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.671760 2201 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:48:32.939088-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.671762 2201 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:48:32.939089-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.671835 2201 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:48:32.939092-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.672933 2201 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:48:32.939093-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.689953 2201 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1051,\"bootTime\":1685557829,\"procs\":399,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:48:32.939096-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 11:48:00.690021 2201 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:48:32.939097-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.693644 2201 out.go:177] * [image-844000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:48:32.939099-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.697637 2201 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:48:32.9391-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.700656 2201 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:48:32.939101-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.697695 2201 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:48:32.939103-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.707626 2201 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:48:32.939104-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.710594 2201 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:48:32.939106-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.713622 2201 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:48:32.939107-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.716519 2201 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:48:32.939109-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.719745 2201 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:48:32.93911-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.723629 2201 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:48:32.939112-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.730645 2201 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:48:32.939113-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.730647 2201 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:48:32.939115-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.730653 2201 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:48:32.939116-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.730728 2201 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:48:32.93912-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.733619 2201 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:48:32.939122-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.736794 2201 start_flags.go:382] Using suggested 4000MB memory alloc based on sys=16384MB, container=0MB\n"} +{"Time":"2023-05-31T11:48:32.939123-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.736871 2201 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T11:48:32.939125-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.736883 2201 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:48:32.939126-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.736889 2201 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:48:32.939128-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.736893 2201 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T11:48:32.939129-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.736900 2201 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:48:32.939132-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{Name:image-844000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:image-844000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRIS"} +{"Time":"2023-05-31T11:48:32.939136-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":"ocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:48:32.939138-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.736988 2201 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.93914-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.743649 2201 out.go:177] * Starting control plane node image-844000 in cluster image-844000\n"} +{"Time":"2023-05-31T11:48:32.939141-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.747567 2201 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:48:32.939143-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.747589 2201 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:48:32.939145-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.747601 2201 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:48:32.939146-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.747662 2201 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:48:32.939148-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.747667 2201 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:48:32.939149-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.747862 2201 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/config.json ...\n"} +{"Time":"2023-05-31T11:48:32.939151-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.747872 2201 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/config.json: {Name:mk6e254fe19cad0285ceda0a4a385f2aa86fde6a Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.939152-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.748063 2201 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:48:32.939154-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.748073 2201 start.go:364] acquiring machines lock for image-844000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.939155-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.748100 2201 start.go:368] acquired machines lock for \"image-844000\" in 23.208µs\n"} +{"Time":"2023-05-31T11:48:32.939159-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.748109 2201 start.go:93] Provisioning new machine with config: \u0026{Name:image-844000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig"} +{"Time":"2023-05-31T11:48:32.939164-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":":{KubernetesVersion:v1.27.2 ClusterName:image-844000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: D"} +{"Time":"2023-05-31T11:48:32.939167-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":"isableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:48:32.939168-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.748133 2201 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:48:32.93917-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.755614 2201 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:48:32.939171-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778139 2201 start.go:159] libmachine.API.Create for \"image-844000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:48:32.939173-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778163 2201 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:48:32.939174-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778218 2201 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:48:32.939176-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778368 2201 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:48:32.939177-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778380 2201 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:48:32.939178-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778427 2201 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:48:32.93918-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778521 2201 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:48:32.939181-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778532 2201 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:48:32.939182-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:00.778844 2201 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:48:32.939184-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.132912 2201 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:48:32.939188-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.187666 2201 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:48:32.93919-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.187671 2201 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:48:32.939192-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.187816 2201 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/disk.qcow2\n"} +{"Time":"2023-05-31T11:48:32.939193-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.259514 2201 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:48:32.939195-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.259530 2201 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:48:32.939196-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.259594 2201 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:48:32.939198-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.266815 2201 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:48:32.939199-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.9392-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.266824 2201 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:48:32.939202-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.266844 2201 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/disk.qcow2\n"} +{"Time":"2023-05-31T11:48:32.939203-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.266850 2201 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:48:32.939205-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.266888 2201 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 4000 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/qemu.pid -device virtio-net-pci,netdev=net0,mac=8e:ee:eb:07:18:3e -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/disk.qcow2\n"} +{"Time":"2023-05-31T11:48:32.939208-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.321737 2201 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:48:32.939209-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.321757 2201 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:48:32.93921-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.321761 2201 main.go:141] libmachine: Attempt 0\n"} +{"Time":"2023-05-31T11:48:32.939212-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.321785 2201 main.go:141] libmachine: Searching for 8e:ee:eb:7:18:3e in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:48:32.939213-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.325953 2201 main.go:141] libmachine: Found 3 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:48:32.939214-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.325970 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:48:32.939216-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.325979 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:48:32.939218-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:01.325983 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:48:32.939219-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:03.328107 2201 main.go:141] libmachine: Attempt 1\n"} +{"Time":"2023-05-31T11:48:32.93922-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:03.328165 2201 main.go:141] libmachine: Searching for 8e:ee:eb:7:18:3e in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:48:32.939222-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:03.328635 2201 main.go:141] libmachine: Found 3 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:48:32.939223-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:03.328678 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:48:32.939225-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:03.328705 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:48:32.939226-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:03.328752 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:48:32.939229-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:05.329522 2201 main.go:141] libmachine: Attempt 2\n"} +{"Time":"2023-05-31T11:48:32.93923-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:05.329539 2201 main.go:141] libmachine: Searching for 8e:ee:eb:7:18:3e in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:48:32.939232-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:05.329660 2201 main.go:141] libmachine: Found 3 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:48:32.939233-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:05.329670 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:48:32.939235-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:05.329675 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:48:32.939236-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:05.329680 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:48:32.939238-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:07.331683 2201 main.go:141] libmachine: Attempt 3\n"} +{"Time":"2023-05-31T11:48:32.939242-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:07.331688 2201 main.go:141] libmachine: Searching for 8e:ee:eb:7:18:3e in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:48:32.939244-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:07.331749 2201 main.go:141] libmachine: Found 3 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:48:32.939245-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:07.331760 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:48:32.939247-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:07.331766 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:48:32.939248-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:07.331769 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:48:32.93925-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:09.333780 2201 main.go:141] libmachine: Attempt 4\n"} +{"Time":"2023-05-31T11:48:32.939251-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:09.333790 2201 main.go:141] libmachine: Searching for 8e:ee:eb:7:18:3e in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:48:32.939253-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:09.333838 2201 main.go:141] libmachine: Found 3 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:48:32.939254-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:09.333845 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:48:32.939255-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:09.333858 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:48:32.939257-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:09.333863 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:48:32.939258-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:11.335883 2201 main.go:141] libmachine: Attempt 5\n"} +{"Time":"2023-05-31T11:48:32.93926-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:11.335894 2201 main.go:141] libmachine: Searching for 8e:ee:eb:7:18:3e in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:48:32.939261-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:11.335982 2201 main.go:141] libmachine: Found 3 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:48:32.939263-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:11.335990 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:48:32.939264-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:11.336003 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:48:32.939266-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:11.336008 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:48:32.939267-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:13.338050 2201 main.go:141] libmachine: Attempt 6\n"} +{"Time":"2023-05-31T11:48:32.939268-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:13.338068 2201 main.go:141] libmachine: Searching for 8e:ee:eb:7:18:3e in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:48:32.93927-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:13.338191 2201 main.go:141] libmachine: Found 4 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:48:32.939271-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:13.338207 2201 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.5 HWAddress:8e:ee:eb:7:18:3e ID:1,8e:ee:eb:7:18:3e Lease:0x6478e7ec}\n"} +{"Time":"2023-05-31T11:48:32.939273-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:13.338210 2201 main.go:141] libmachine: Found match: 8e:ee:eb:7:18:3e\n"} +{"Time":"2023-05-31T11:48:32.939274-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:13.338220 2201 main.go:141] libmachine: IP: 192.168.105.5\n"} +{"Time":"2023-05-31T11:48:32.939276-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:13.338224 2201 main.go:141] libmachine: Waiting for VM to start (ssh -p 22 docker@192.168.105.5)...\n"} +{"Time":"2023-05-31T11:48:32.939284-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.357456 2201 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T11:48:32.939286-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.357494 2201 buildroot.go:166] provisioning hostname \"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.939287-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.357774 2201 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:48:32.939289-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.358779 2201 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1011bc6d0] 0x1011bf130 \u003cnil\u003e [] 0s} 192.168.105.5 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.93929-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.358795 2201 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:48:32.939291-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tsudo hostname image-844000 \u0026\u0026 echo \"image-844000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T11:48:32.939293-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.444886 2201 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: image-844000\n"} +{"Time":"2023-05-31T11:48:32.939295-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939296-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.445004 2201 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:48:32.939298-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.445471 2201 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1011bc6d0] 0x1011bf130 \u003cnil\u003e [] 0s} 192.168.105.5 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.939299-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.445482 2201 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:48:32.939303-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939304-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\t\tif ! grep -xq '.*\\simage-844000' /etc/hosts; then\n"} +{"Time":"2023-05-31T11:48:32.939305-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T11:48:32.939307-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 image-844000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T11:48:32.939308-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T11:48:32.93931-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\t\t\t\techo '127.0.1.1 image-844000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T11:48:32.939311-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T11:48:32.939312-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T11:48:32.939314-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.511422 2201 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T11:48:32.939316-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.511437 2201 buildroot.go:172] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1035/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1035/.minikube}\n"} +{"Time":"2023-05-31T11:48:32.939318-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.511449 2201 buildroot.go:174] setting up certificates\n"} +{"Time":"2023-05-31T11:48:32.939319-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.511460 2201 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T11:48:32.939321-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.511465 2201 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T11:48:32.939322-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.511596 2201 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T11:48:32.939324-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.511604 2201 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.pem\n"} +{"Time":"2023-05-31T11:48:32.939325-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.511783 2201 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:48:32.939327-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.512082 2201 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1035/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T11:48:32.939329-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.512085 2201 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1035/.minikube/cert.pem\n"} +{"Time":"2023-05-31T11:48:32.93933-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.512137 2201 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T11:48:32.939332-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.512282 2201 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1035/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T11:48:32.939333-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.512284 2201 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1035/.minikube/key.pem\n"} +{"Time":"2023-05-31T11:48:32.939335-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.512340 2201 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:48:32.939337-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.512906 2201 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem org=jenkins.image-844000 san=[192.168.105.5 192.168.105.5 localhost 127.0.0.1 minikube image-844000]\n"} +{"Time":"2023-05-31T11:48:32.939339-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.624339 2201 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T11:48:32.939341-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.624378 2201 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T11:48:32.939342-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.624386 2201 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.5 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:48:32.939346-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.652667 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:48:32.939347-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.659495 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:48:32.939349-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.666054 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1216 bytes)\n"} +{"Time":"2023-05-31T11:48:32.93935-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.673116 2201 provision.go:86] duration metric: configureAuth took 161.648542ms\n"} +{"Time":"2023-05-31T11:48:32.939352-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.676264 2201 buildroot.go:189] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T11:48:32.939354-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.676405 2201 config.go:182] Loaded profile config \"image-844000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.939355-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.676444 2201 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:48:32.939356-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.676657 2201 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1011bc6d0] 0x1011bf130 \u003cnil\u003e [] 0s} 192.168.105.5 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.939358-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.676660 2201 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:48:32.939359-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T11:48:32.939361-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.726955 2201 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: tmpfs\n"} +{"Time":"2023-05-31T11:48:32.939362-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939363-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.726958 2201 buildroot.go:70] root file system type: tmpfs\n"} +{"Time":"2023-05-31T11:48:32.939365-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.727025 2201 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T11:48:32.939366-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.727078 2201 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:48:32.939368-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.727320 2201 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1011bc6d0] 0x1011bf130 \u003cnil\u003e [] 0s} 192.168.105.5 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.93937-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.727354 2201 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:48:32.939371-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %!s(MISSING) \"[Unit]\n"} +{"Time":"2023-05-31T11:48:32.939373-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:48:32.939374-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:48:32.939375-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tAfter=network.target minikube-automount.service docker.socket\n"} +{"Time":"2023-05-31T11:48:32.939377-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRequires= minikube-automount.service docker.socket \n"} +{"Time":"2023-05-31T11:48:32.939378-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T11:48:32.939379-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:48:32.939382-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939383-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:48:32.939385-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tType=notify\n"} +{"Time":"2023-05-31T11:48:32.939386-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T11:48:32.939387-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939388-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939389-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939391-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:48:32.939392-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:48:32.939394-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:48:32.939395-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:48:32.939396-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:48:32.939398-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:48:32.939399-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:48:32.9394-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939402-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:48:32.939404-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:48:32.939405-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:48:32.939407-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=qemu2 --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:48:32.939409-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T11:48:32.93941-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939412-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:48:32.939413-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:48:32.939414-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T11:48:32.939416-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:48:32.939417-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T11:48:32.939418-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939419-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:48:32.939421-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:48:32.939422-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T11:48:32.939423-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:48:32.939425-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939426-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:48:32.939427-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T11:48:32.939428-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.93943-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:48:32.939431-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T11:48:32.939432-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939433-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:48:32.939434-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:48:32.939436-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T11:48:32.939437-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.783231 2201 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T11:48:32.939438-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:48:32.93944-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:48:32.939441-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tAfter=network.target minikube-automount.service docker.socket\n"} +{"Time":"2023-05-31T11:48:32.939443-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRequires= minikube-automount.service docker.socket \n"} +{"Time":"2023-05-31T11:48:32.939444-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T11:48:32.939445-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:48:32.939446-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939448-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:48:32.939451-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tType=notify\n"} +{"Time":"2023-05-31T11:48:32.939452-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T11:48:32.939453-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939455-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939456-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939457-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:48:32.939458-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:48:32.939461-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:48:32.939462-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:48:32.939463-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:48:32.939481-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:48:32.939485-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:48:32.939487-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939489-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:48:32.93949-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:48:32.939492-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:48:32.939493-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=qemu2 --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:48:32.939495-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T11:48:32.939496-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939498-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:48:32.939499-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:48:32.939501-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T11:48:32.939502-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:48:32.939503-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T11:48:32.939505-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939506-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:48:32.939507-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:48:32.93951-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T11:48:32.939511-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:48:32.939512-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939514-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:48:32.939569-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T11:48:32.939571-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939573-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:48:32.939574-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T11:48:32.939575-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939576-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:48:32.939578-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:48:32.939579-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.93958-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.783271 2201 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:48:32.939582-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.783494 2201 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1011bc6d0] 0x1011bf130 \u003cnil\u003e [] 0s} 192.168.105.5 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.939583-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:15.783500 2201 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:48:32.939585-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T11:48:32.939586-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.110122 2201 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: diff: can't stat '/lib/systemd/system/docker.service': No such file or directory\n"} +{"Time":"2023-05-31T11:48:32.939588-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tCreated symlink /etc/systemd/system/multi-user.target.wants/docker.service → /usr/lib/systemd/system/docker.service.\n"} +{"Time":"2023-05-31T11:48:32.939589-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939591-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.110130 2201 machine.go:91] provisioned docker machine in 752.670125ms\n"} +{"Time":"2023-05-31T11:48:32.939592-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.110134 2201 client.go:171] LocalClient.Create took 15.332185208s\n"} +{"Time":"2023-05-31T11:48:32.939594-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.110146 2201 start.go:167] duration metric: libmachine.API.Create for \"image-844000\" took 15.332226417s\n"} +{"Time":"2023-05-31T11:48:32.939718-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.110152 2201 start.go:300] post-start starting for \"image-844000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:48:32.93974-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.110154 2201 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T11:48:32.939742-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.110213 2201 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:48:32.939744-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.110221 2201 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.5 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:48:32.939745-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.141441 2201 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T11:48:32.939747-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.142851 2201 info.go:137] Remote host: Buildroot 2021.02.12\n"} +{"Time":"2023-05-31T11:48:32.939748-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.142860 2201 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1035/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T11:48:32.93975-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.142929 2201 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1035/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T11:48:32.939751-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.143029 2201 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem -\u003e 14772.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:48:32.939753-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.143143 2201 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:48:32.939754-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.145560 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem --\u003e /etc/ssl/certs/14772.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:48:32.939759-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.152497 2201 start.go:303] post-start completed in 42.342708ms\n"} +{"Time":"2023-05-31T11:48:32.939761-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.152825 2201 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/config.json ...\n"} +{"Time":"2023-05-31T11:48:32.939763-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.152968 2201 start.go:128] duration metric: createHost completed in 15.405050375s\n"} +{"Time":"2023-05-31T11:48:32.939809-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.152994 2201 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:48:32.939813-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.153218 2201 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x1011bc6d0] 0x1011bf130 \u003cnil\u003e [] 0s} 192.168.105.5 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.939815-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.153221 2201 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:48:32.939817-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tdate +%!s(MISSING).%!N(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.939818-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202408 2201 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: 1685558896.494325585\n"} +{"Time":"2023-05-31T11:48:32.93982-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939825-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202411 2201 fix.go:207] guest clock: 1685558896.494325585\n"} +{"Time":"2023-05-31T11:48:32.939827-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202414 2201 fix.go:220] Guest: 2023-05-31 11:48:16.494325585 -0700 PDT Remote: 2023-05-31 11:48:16.15297 -0700 PDT m=+15.503039793 (delta=341.355585ms)\n"} +{"Time":"2023-05-31T11:48:32.939828-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202423 2201 fix.go:191] guest clock delta is within tolerance: 341.355585ms\n"} +{"Time":"2023-05-31T11:48:32.93983-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202425 2201 start.go:83] releasing machines lock for \"image-844000\", held for 15.454541083s\n"} +{"Time":"2023-05-31T11:48:32.939831-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202748 2201 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T11:48:32.939833-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202754 2201 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.5 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:48:32.939834-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202763 2201 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T11:48:32.939836-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.202782 2201 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.5 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:48:32.939837-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.277319 2201 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:48:32.939839-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.279680 2201 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T11:48:32.939881-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 11:48:16.281670 2201 cni.go:208] loopback cni configuration skipped: \"/etc/cni/net.d/*loopback.conf*\" not found\n"} +{"Time":"2023-05-31T11:48:32.939884-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.281701 2201 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f ( ( -name *bridge* -or -name *podman* ) -and -not -name *.mk_disabled ) -printf \"%!p(MISSING), \" -exec sh -c \"sudo mv {} {}.mk_disabled\" ;\n"} +{"Time":"2023-05-31T11:48:32.939885-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.287157 2201 cni.go:261] disabled [/etc/cni/net.d/87-podman-bridge.conflist] bridge cni config(s)\n"} +{"Time":"2023-05-31T11:48:32.939887-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.287164 2201 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:48:32.939888-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.287241 2201 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:48:32.93989-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.295707 2201 docker.go:633] Got preloaded images: \n"} +{"Time":"2023-05-31T11:48:32.939891-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.295711 2201 docker.go:639] registry.k8s.io/kube-apiserver:v1.27.2 wasn't preloaded\n"} +{"Time":"2023-05-31T11:48:32.939892-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.295759 2201 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:48:32.939894-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.298796 2201 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T11:48:32.939895-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.300091 2201 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:48:32.939897-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.301415 2201 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T11:48:32.939898-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:48:32.9399-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.939901-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:48:32.939902-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T11:48:32.939904-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:16.301425 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 --\u003e /preloaded.tar.lz4 (343635669 bytes)\n"} +{"Time":"2023-05-31T11:48:32.939906-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:17.603843 2201 docker.go:597] Took 1.303811 seconds to copy over tarball\n"} +{"Time":"2023-05-31T11:48:32.939982-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:17.603899 2201 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:48:32.939984-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:18.635267 2201 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (1.031371625s)\n"} +{"Time":"2023-05-31T11:48:32.939986-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:18.635276 2201 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:48:32.939987-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:18.650361 2201 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:48:32.939989-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:18.653354 2201 ssh_runner.go:362] scp memory --\u003e /var/lib/docker/image/overlay2/repositories.json (2629 bytes)\n"} +{"Time":"2023-05-31T11:48:32.93999-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:18.658356 2201 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:48:32.939993-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:18.723470 2201 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:48:32.939994-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.138263 2201 ssh_runner.go:235] Completed: sudo systemctl restart docker: (1.414801958s)\n"} +{"Time":"2023-05-31T11:48:32.939996-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.138280 2201 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T11:48:32.939997-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.138356 2201 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T11:48:32.940001-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T11:48:32.940003-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.143544 2201 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.9\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:48:32.940004-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.146276 2201 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:48:32.940006-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.149262 2201 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T11:48:32.940054-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.149287 2201 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:48:32.940081-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.152579 2201 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:48:32.94009-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.155853 2201 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:48:32.94012-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.158757 2201 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:48:32.940122-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.161594 2201 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T11:48:32.940124-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.165034 2201 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:48:32.940126-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.168394 2201 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T11:48:32.940127-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.171214 2201 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T11:48:32.940129-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.173803 2201 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:48:32.94013-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.236262 2201 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T11:48:32.940133-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.242352 2201 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T11:48:32.940134-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.242413 2201 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T11:48:32.940135-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.247659 2201 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service containerd\n"} +{"Time":"2023-05-31T11:48:32.940137-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.252687 2201 ssh_runner.go:195] Run: sudo systemctl stop -f containerd\n"} +{"Time":"2023-05-31T11:48:32.940138-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.263844 2201 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service containerd\n"} +{"Time":"2023-05-31T11:48:32.940164-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.268407 2201 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T11:48:32.940166-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.273105 2201 ssh_runner.go:195] Run: sudo systemctl stop -f crio\n"} +{"Time":"2023-05-31T11:48:32.940167-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.336704 2201 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T11:48:32.940169-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.342553 2201 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:48:32.940171-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T11:48:32.940172-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.348503 2201 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T11:48:32.940173-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.350034 2201 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T11:48:32.940175-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.353089 2201 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T11:48:32.940177-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.358328 2201 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T11:48:32.940178-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.420812 2201 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T11:48:32.940179-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.484474 2201 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T11:48:32.940184-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.484484 2201 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T11:48:32.940185-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.489926 2201 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:48:32.940188-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:20.542924 2201 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:48:32.940189-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:21.705583 2201 ssh_runner.go:235] Completed: sudo systemctl restart docker: (1.162662875s)\n"} +{"Time":"2023-05-31T11:48:32.940191-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:21.705631 2201 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T11:48:32.940192-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:21.762976 2201 ssh_runner.go:195] Run: sudo systemctl unmask cri-docker.socket\n"} +{"Time":"2023-05-31T11:48:32.940247-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:21.827269 2201 ssh_runner.go:195] Run: sudo systemctl enable cri-docker.socket\n"} +{"Time":"2023-05-31T11:48:32.940254-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:21.887946 2201 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:48:32.940269-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:21.949759 2201 ssh_runner.go:195] Run: sudo systemctl restart cri-docker.socket\n"} +{"Time":"2023-05-31T11:48:32.940271-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:21.957529 2201 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:48:32.940273-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.016439 2201 ssh_runner.go:195] Run: sudo systemctl restart cri-docker\n"} +{"Time":"2023-05-31T11:48:32.940274-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.039461 2201 start.go:528] Will wait 60s for socket path /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:48:32.940275-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.039539 2201 ssh_runner.go:195] Run: stat /var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:48:32.940277-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.041722 2201 start.go:549] Will wait 60s for crictl version\n"} +{"Time":"2023-05-31T11:48:32.940281-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.041761 2201 ssh_runner.go:195] Run: which crictl\n"} +{"Time":"2023-05-31T11:48:32.940282-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.043996 2201 ssh_runner.go:195] Run: sudo /usr/bin/crictl version\n"} +{"Time":"2023-05-31T11:48:32.940283-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.067660 2201 start.go:565] Version: 0.1.0\n"} +{"Time":"2023-05-31T11:48:32.940285-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRuntimeName: docker\n"} +{"Time":"2023-05-31T11:48:32.940286-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRuntimeVersion: 24.0.1\n"} +{"Time":"2023-05-31T11:48:32.940287-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRuntimeApiVersion: v1alpha2\n"} +{"Time":"2023-05-31T11:48:32.940289-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.067724 2201 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T11:48:32.94029-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.075079 2201 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T11:48:32.940292-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.090615 2201 out.go:204] * Preparing Kubernetes v1.27.2 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T11:48:32.940293-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.090761 2201 ssh_runner.go:195] Run: grep 192.168.105.1\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T11:48:32.940295-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.092178 2201 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.105.1\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T11:48:32.940344-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.096319 2201 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:48:32.940362-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.096357 2201 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:48:32.940364-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.107494 2201 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T11:48:32.940366-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.940367-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.940369-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.94037-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.940371-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T11:48:32.940372-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T11:48:32.940374-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T11:48:32.940375-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:48:32.940376-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.940378-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:48:32.94038-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.107499 2201 docker.go:563] Images already preloaded, skipping extraction\n"} +{"Time":"2023-05-31T11:48:32.940382-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.107550 2201 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:48:32.940383-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.113022 2201 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T11:48:32.940384-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.940386-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.940387-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.940388-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.94039-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T11:48:32.940428-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T11:48:32.940432-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tregistry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T11:48:32.940434-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:48:32.940436-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.940438-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:48:32.940439-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.113033 2201 cache_images.go:84] Images are preloaded, skipping loading\n"} +{"Time":"2023-05-31T11:48:32.94044-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.113076 2201 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T11:48:32.940442-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.120584 2201 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:48:32.940443-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.120589 2201 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:48:32.940445-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.120593 2201 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T11:48:32.940448-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.120600 2201 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.105.5 APIServerPort:8443 KubernetesVersion:v1.27.2 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:image-844000 NodeName:image-844000 DNSDomain:cluster.local CRISocket:/var/run/cri-dockerd.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.105.5\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.105.5 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/ca.crt StaticPodPath:/etc/kube"} +{"Time":"2023-05-31T11:48:32.940451-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":"rnetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:true}\n"} +{"Time":"2023-05-31T11:48:32.940452-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.120658 2201 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T11:48:32.940454-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T11:48:32.940455-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T11:48:32.940512-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T11:48:32.940518-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t advertiseAddress: 192.168.105.5\n"} +{"Time":"2023-05-31T11:48:32.940519-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T11:48:32.940521-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T11:48:32.940522-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t - groups:\n"} +{"Time":"2023-05-31T11:48:32.940523-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T11:48:32.940524-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T11:48:32.940529-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t usages:\n"} +{"Time":"2023-05-31T11:48:32.94053-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t - signing\n"} +{"Time":"2023-05-31T11:48:32.940531-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t - authentication\n"} +{"Time":"2023-05-31T11:48:32.940538-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T11:48:32.940539-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t criSocket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:48:32.94054-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t name: \"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.940542-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T11:48:32.940543-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t node-ip: 192.168.105.5\n"} +{"Time":"2023-05-31T11:48:32.940544-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t taints: []\n"} +{"Time":"2023-05-31T11:48:32.940546-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t---\n"} +{"Time":"2023-05-31T11:48:32.940547-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tapiVersion: kubeadm.k8s.io/v1beta3\n"} +{"Time":"2023-05-31T11:48:32.940548-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T11:48:32.94055-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T11:48:32.940551-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.105.5\"]\n"} +{"Time":"2023-05-31T11:48:32.940552-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:48:32.940554-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T11:48:32.940555-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T11:48:32.940556-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:48:32.940614-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T11:48:32.94062-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T11:48:32.940624-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T11:48:32.94063-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:48:32.940634-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T11:48:32.940637-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T11:48:32.94064-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T11:48:32.940644-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T11:48:32.940648-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tetcd:\n"} +{"Time":"2023-05-31T11:48:32.940663-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t local:\n"} +{"Time":"2023-05-31T11:48:32.940665-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T11:48:32.940666-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:48:32.940668-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T11:48:32.940669-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tkubernetesVersion: v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.94067-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T11:48:32.940672-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T11:48:32.940674-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T11:48:32.940675-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T11:48:32.940676-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t---\n"} +{"Time":"2023-05-31T11:48:32.940678-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T11:48:32.940679-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T11:48:32.94068-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T11:48:32.940682-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t x509:\n"} +{"Time":"2023-05-31T11:48:32.940683-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T11:48:32.940685-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T11:48:32.940686-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T11:48:32.940688-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T11:48:32.940689-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T11:48:32.940691-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T11:48:32.940692-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T11:48:32.940693-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T11:48:32.940695-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t nodefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.940696-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t nodefs.inodesFree: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.940698-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t imagefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.940699-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T11:48:32.9407-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T11:48:32.940701-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t---\n"} +{"Time":"2023-05-31T11:48:32.940703-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T11:48:32.940704-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T11:48:32.940705-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T11:48:32.940707-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T11:48:32.940708-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T11:48:32.940709-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T11:48:32.940711-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T11:48:32.940712-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T11:48:32.940714-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T11:48:32.940718-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T11:48:32.940719-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.94072-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.120696 2201 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T11:48:32.940791-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T11:48:32.940798-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.940801-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:48:32.940804-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:48:32.940808-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tExecStart=/var/lib/minikube/binaries/v1.27.2/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime-endpoint=unix:///var/run/cri-dockerd.sock --hostname-override=image-844000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.105.5\n"} +{"Time":"2023-05-31T11:48:32.940812-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.940815-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:48:32.940819-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t config:\n"} +{"Time":"2023-05-31T11:48:32.940846-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{KubernetesVersion:v1.27.2 ClusterName:image-844000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T11:48:32.940848-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.120737 2201 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.940851-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.124102 2201 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T11:48:32.940852-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.124133 2201 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T11:48:32.940854-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.126670 2201 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (374 bytes)\n"} +{"Time":"2023-05-31T11:48:32.940856-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.131474 2201 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (352 bytes)\n"} +{"Time":"2023-05-31T11:48:32.940858-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.136664 2201 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2098 bytes)\n"} +{"Time":"2023-05-31T11:48:32.94086-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.141677 2201 ssh_runner.go:195] Run: grep 192.168.105.5\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T11:48:32.940861-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.142872 2201 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.105.5\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T11:48:32.940896-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.146148 2201 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000 for IP: 192.168.105.5\n"} +{"Time":"2023-05-31T11:48:32.940899-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.146156 2201 certs.go:190] acquiring lock for shared ca certs: {Name:mk5d2be9e1df042d7290b2e1516090ac43150ffe Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.940902-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.146284 2201 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key\n"} +{"Time":"2023-05-31T11:48:32.940905-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.146987 2201 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T11:48:32.940906-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.147016 2201 certs.go:319] generating minikube-user signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/client.key\n"} +{"Time":"2023-05-31T11:48:32.940908-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.147022 2201 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/client.crt with IP's: []\n"} +{"Time":"2023-05-31T11:48:32.94091-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.221785 2201 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/client.crt ...\n"} +{"Time":"2023-05-31T11:48:32.940912-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.221792 2201 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/client.crt: {Name:mk0ce128781059615a2ed365e385c04440eb011d Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.940914-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.222051 2201 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/client.key ...\n"} +{"Time":"2023-05-31T11:48:32.940916-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.222053 2201 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/client.key: {Name:mk16fb36ef4c1c9bf5c82608a8c5049e3d74542f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.940919-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.222171 2201 certs.go:319] generating minikube signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.key.e69b33ca\n"} +{"Time":"2023-05-31T11:48:32.940921-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.222176 2201 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.crt.e69b33ca with IP's: [192.168.105.5 10.96.0.1 127.0.0.1 10.0.0.1]\n"} +{"Time":"2023-05-31T11:48:32.941019-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.279215 2201 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.crt.e69b33ca ...\n"} +{"Time":"2023-05-31T11:48:32.941027-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.279217 2201 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.crt.e69b33ca: {Name:mke1c4a0d39d04f2166b73755697f88886874ec1 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.941046-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.279329 2201 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.key.e69b33ca ...\n"} +{"Time":"2023-05-31T11:48:32.941048-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.279331 2201 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.key.e69b33ca: {Name:mk181de0af5488288e185981342599830f15fe84 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.94105-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.279417 2201 certs.go:337] copying /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.crt.e69b33ca -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.crt\n"} +{"Time":"2023-05-31T11:48:32.941052-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.279536 2201 certs.go:341] copying /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.key.e69b33ca -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.key\n"} +{"Time":"2023-05-31T11:48:32.941057-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.279609 2201 certs.go:319] generating aggregator signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/proxy-client.key\n"} +{"Time":"2023-05-31T11:48:32.941058-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.279613 2201 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/proxy-client.crt with IP's: []\n"} +{"Time":"2023-05-31T11:48:32.94106-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.310943 2201 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/proxy-client.crt ...\n"} +{"Time":"2023-05-31T11:48:32.941062-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.310945 2201 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/proxy-client.crt: {Name:mk19e6afe24e7ac9de3cf0bfa24c8e46ca1fef8f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.941063-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311055 2201 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/proxy-client.key ...\n"} +{"Time":"2023-05-31T11:48:32.941065-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311056 2201 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/proxy-client.key: {Name:mk5b9e053c9093d7020319bf51c8eabb23d8e479 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.941139-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311285 2201 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/1477.pem (1338 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941141-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 11:48:22.311496 2201 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/1477_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T11:48:32.941143-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311504 2201 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941145-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311528 2201 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941147-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311546 2201 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941148-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311565 2201 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:48:32.94115-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311604 2201 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941152-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.311889 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941153-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.319560 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941155-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.326273 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941157-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.333049 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/image-844000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:48:32.94125-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.340446 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941253-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.347534 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941254-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.354313 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941259-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.361104 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:48:32.94126-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.368367 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem --\u003e /usr/share/ca-certificates/14772.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941262-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.375557 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941265-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.382236 2201 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/1477.pem --\u003e /usr/share/ca-certificates/1477.pem (1338 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941267-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.389066 2201 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T11:48:32.941268-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.394135 2201 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T11:48:32.94127-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.396187 2201 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/14772.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/14772.pem /etc/ssl/certs/14772.pem\"\n"} +{"Time":"2023-05-31T11:48:32.941271-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.399532 2201 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/14772.pem\n"} +{"Time":"2023-05-31T11:48:32.941273-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.401267 2201 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:44 /usr/share/ca-certificates/14772.pem\n"} +{"Time":"2023-05-31T11:48:32.941274-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.401285 2201 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/14772.pem\n"} +{"Time":"2023-05-31T11:48:32.941276-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.403127 2201 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/14772.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T11:48:32.941315-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.406006 2201 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T11:48:32.941317-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.409248 2201 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:48:32.941319-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.410930 2201 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:43 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:48:32.94132-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.410947 2201 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:48:32.941322-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.412860 2201 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T11:48:32.941324-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.416090 2201 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1477.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1477.pem /etc/ssl/certs/1477.pem\"\n"} +{"Time":"2023-05-31T11:48:32.941326-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.419063 2201 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1477.pem\n"} +{"Time":"2023-05-31T11:48:32.941327-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.420528 2201 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:44 /usr/share/ca-certificates/1477.pem\n"} +{"Time":"2023-05-31T11:48:32.941328-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.420548 2201 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1477.pem\n"} +{"Time":"2023-05-31T11:48:32.94133-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.422677 2201 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1477.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T11:48:32.941332-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.425632 2201 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T11:48:32.941333-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.427189 2201 certs.go:353] certs directory doesn't exist, likely first start: ls /var/lib/minikube/certs/etcd: Process exited with status 2\n"} +{"Time":"2023-05-31T11:48:32.941335-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:48:32.941336-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.941337-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:48:32.941404-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tls: cannot access '/var/lib/minikube/certs/etcd': No such file or directory\n"} +{"Time":"2023-05-31T11:48:32.941435-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.427219 2201 kubeadm.go:404] StartCluster: {Name:image-844000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4000 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1"} +{"Time":"2023-05-31T11:48:32.941453-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":".27.2 ClusterName:image-844000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.105.5 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOpt"} +{"Time":"2023-05-31T11:48:32.941457-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":"imizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:48:32.941459-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.427287 2201 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T11:48:32.941461-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.432759 2201 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T11:48:32.941462-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.436155 2201 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T11:48:32.941464-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.438881 2201 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T11:48:32.941466-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.441579 2201 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T11:48:32.941519-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:48:32.941521-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.941523-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:48:32.941524-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:48:32.941525-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:48:32.941527-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:48:32.941528-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:48:32.94153-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.441591 2201 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.27.2:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU,Mem\"\n"} +{"Time":"2023-05-31T11:48:32.941533-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.462356 2201 kubeadm.go:322] [init] Using Kubernetes version: v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.941534-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.462380 2201 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:48:32.941535-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.515770 2201 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:48:32.941537-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.515817 2201 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:48:32.941538-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.515871 2201 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:48:32.94154-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.571985 2201 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:48:32.941541-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.580192 2201 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T11:48:32.941544-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.580233 2201 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:48:32.941634-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.580267 2201 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:48:32.94164-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.647690 2201 kubeadm.go:322] [certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941644-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.825751 2201 kubeadm.go:322] [certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941648-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:22.950435 2201 kubeadm.go:322] [certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941652-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:23.156438 2201 kubeadm.go:322] [certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941656-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:23.265979 2201 kubeadm.go:322] [certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941659-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:23.266046 2201 kubeadm.go:322] [certs] etcd/server serving cert is signed for DNS names [image-844000 localhost] and IPs [192.168.105.5 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:48:32.941663-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:23.454162 2201 kubeadm.go:322] [certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941667-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:23.454235 2201 kubeadm.go:322] [certs] etcd/peer serving cert is signed for DNS names [image-844000 localhost] and IPs [192.168.105.5 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:48:32.941671-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:23.583185 2201 kubeadm.go:322] [certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941685-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.007078 2201 kubeadm.go:322] [certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941705-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.065303 2201 kubeadm.go:322] [certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T11:48:32.941708-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.065333 2201 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:48:32.941709-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.145985 2201 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:48:32.941711-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.205187 2201 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:48:32.941712-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.378741 2201 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:48:32.941714-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.504209 2201 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:48:32.941715-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.511044 2201 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:48:32.941717-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.511094 2201 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:48:32.941718-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.511124 2201 kubeadm.go:322] [kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:48:32.94172-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.579748 2201 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:48:32.941721-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.582969 2201 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T11:48:32.941723-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.583022 2201 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:48:32.941725-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.583099 2201 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:48:32.941726-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.583138 2201 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:48:32.941728-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.583181 2201 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:48:32.94173-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:24.583278 2201 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:48:32.941731-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:28.085036 2201 kubeadm.go:322] [apiclient] All control plane components are healthy after 3.501705 seconds\n"} +{"Time":"2023-05-31T11:48:32.941733-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:28.085098 2201 kubeadm.go:322] [upload-config] Storing the configuration used in ConfigMap \"kubeadm-config\" in the \"kube-system\" Namespace\n"} +{"Time":"2023-05-31T11:48:32.941734-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:28.092797 2201 kubeadm.go:322] [kubelet] Creating a ConfigMap \"kubelet-config\" in namespace kube-system with the configuration for the kubelets in the cluster\n"} +{"Time":"2023-05-31T11:48:32.941736-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:28.614486 2201 kubeadm.go:322] [upload-certs] Skipping phase. Please see --upload-certs\n"} +{"Time":"2023-05-31T11:48:32.941832-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:28.614792 2201 kubeadm.go:322] [mark-control-plane] Marking the node image-844000 as control-plane by adding the labels: [node-role.kubernetes.io/control-plane node.kubernetes.io/exclude-from-external-load-balancers]\n"} +{"Time":"2023-05-31T11:48:32.941858-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.119633 2201 kubeadm.go:322] [bootstrap-token] Using token: 3fn1x3.gh357o86s01mv5ry\n"} +{"Time":"2023-05-31T11:48:32.94186-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.125768 2201 out.go:204] - Configuring RBAC rules ...\n"} +{"Time":"2023-05-31T11:48:32.941861-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.125828 2201 kubeadm.go:322] [bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles\n"} +{"Time":"2023-05-31T11:48:32.941863-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.126627 2201 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to get nodes\n"} +{"Time":"2023-05-31T11:48:32.941864-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.131748 2201 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials\n"} +{"Time":"2023-05-31T11:48:32.941866-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.133002 2201 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token\n"} +{"Time":"2023-05-31T11:48:32.941868-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.134331 2201 kubeadm.go:322] [bootstrap-token] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster\n"} +{"Time":"2023-05-31T11:48:32.941869-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.135864 2201 kubeadm.go:322] [bootstrap-token] Creating the \"cluster-info\" ConfigMap in the \"kube-public\" namespace\n"} +{"Time":"2023-05-31T11:48:32.941871-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.139852 2201 kubeadm.go:322] [kubelet-finalize] Updating \"/etc/kubernetes/kubelet.conf\" to point to a rotatable kubelet client certificate and key\n"} +{"Time":"2023-05-31T11:48:32.941872-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.320674 2201 kubeadm.go:322] [addons] Applied essential addon: CoreDNS\n"} +{"Time":"2023-05-31T11:48:32.941874-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.530587 2201 kubeadm.go:322] [addons] Applied essential addon: kube-proxy\n"} +{"Time":"2023-05-31T11:48:32.941875-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.530951 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.941877-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.530984 2201 kubeadm.go:322] Your Kubernetes control-plane has initialized successfully!\n"} +{"Time":"2023-05-31T11:48:32.941878-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.530986 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.941925-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531023 2201 kubeadm.go:322] To start using your cluster, you need to run the following as a regular user:\n"} +{"Time":"2023-05-31T11:48:32.941932-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531025 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.941947-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531036 2201 kubeadm.go:322] mkdir -p $HOME/.kube\n"} +{"Time":"2023-05-31T11:48:32.941951-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531067 2201 kubeadm.go:322] sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config\n"} +{"Time":"2023-05-31T11:48:32.941952-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531107 2201 kubeadm.go:322] sudo chown $(id -u):$(id -g) $HOME/.kube/config\n"} +{"Time":"2023-05-31T11:48:32.941954-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531110 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.941955-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531140 2201 kubeadm.go:322] Alternatively, if you are the root user, you can run:\n"} +{"Time":"2023-05-31T11:48:32.941957-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531143 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.941959-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531169 2201 kubeadm.go:322] export KUBECONFIG=/etc/kubernetes/admin.conf\n"} +{"Time":"2023-05-31T11:48:32.94196-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531171 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.941961-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531193 2201 kubeadm.go:322] You should now deploy a pod network to the cluster.\n"} +{"Time":"2023-05-31T11:48:32.941963-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531235 2201 kubeadm.go:322] Run \"kubectl apply -f [podnetwork].yaml\" with one of the options listed at:\n"} +{"Time":"2023-05-31T11:48:32.941964-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531268 2201 kubeadm.go:322] https://kubernetes.io/docs/concepts/cluster-administration/addons/\n"} +{"Time":"2023-05-31T11:48:32.941966-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531269 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.941967-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531316 2201 kubeadm.go:322] You can now join any number of control-plane nodes by copying certificate authorities\n"} +{"Time":"2023-05-31T11:48:32.941968-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531353 2201 kubeadm.go:322] and service account keys on each node and then running the following as root:\n"} +{"Time":"2023-05-31T11:48:32.94197-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531354 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.941971-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531395 2201 kubeadm.go:322] kubeadm join control-plane.minikube.internal:8443 --token 3fn1x3.gh357o86s01mv5ry \\\n"} +{"Time":"2023-05-31T11:48:32.941973-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531446 2201 kubeadm.go:322] \t--discovery-token-ca-cert-hash sha256:c0b872ca59dfdea0de4508a70b7bc5477f2020e7d748dccf465015401d65b410 \\\n"} +{"Time":"2023-05-31T11:48:32.942011-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531457 2201 kubeadm.go:322] \t--control-plane \n"} +{"Time":"2023-05-31T11:48:32.942013-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531459 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.942014-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531507 2201 kubeadm.go:322] Then you can join any number of worker nodes by running the following on each as root:\n"} +{"Time":"2023-05-31T11:48:32.942015-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531509 2201 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:48:32.942017-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531552 2201 kubeadm.go:322] kubeadm join control-plane.minikube.internal:8443 --token 3fn1x3.gh357o86s01mv5ry \\\n"} +{"Time":"2023-05-31T11:48:32.942018-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531604 2201 kubeadm.go:322] \t--discovery-token-ca-cert-hash sha256:c0b872ca59dfdea0de4508a70b7bc5477f2020e7d748dccf465015401d65b410 \n"} +{"Time":"2023-05-31T11:48:32.94202-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531668 2201 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:48:32.942021-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531751 2201 kubeadm.go:322] W0531 18:48:22.807625 1333 images.go:80] could not find officially supported version of etcd for Kubernetes v1.27.2, falling back to the nearest etcd version (3.5.7-0)\n"} +{"Time":"2023-05-31T11:48:32.942023-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531838 2201 kubeadm.go:322] W0531 18:48:24.873873 1333 images.go:80] could not find officially supported version of etcd for Kubernetes v1.27.2, falling back to the nearest etcd version (3.5.7-0)\n"} +{"Time":"2023-05-31T11:48:32.942024-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531846 2201 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:48:32.942026-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.531852 2201 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:48:32.942027-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.540167 2201 out.go:177] * Configuring bridge CNI (Container Networking Interface) ...\n"} +{"Time":"2023-05-31T11:48:32.942029-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.544071 2201 ssh_runner.go:195] Run: sudo mkdir -p /etc/cni/net.d\n"} +{"Time":"2023-05-31T11:48:32.94203-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.547352 2201 ssh_runner.go:362] scp memory --\u003e /etc/cni/net.d/1-k8s.conflist (457 bytes)\n"} +{"Time":"2023-05-31T11:48:32.942032-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.552177 2201 ssh_runner.go:195] Run: /bin/bash -c \"cat /proc/$(pgrep kube-apiserver)/oom_adj\"\n"} +{"Time":"2023-05-31T11:48:32.94213-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.552214 2201 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl create clusterrolebinding minikube-rbac --clusterrole=cluster-admin --serviceaccount=kube-system:default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:48:32.942161-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.552246 2201 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.27.2/kubectl label nodes minikube.k8s.io/version=v1.30.1 minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140 minikube.k8s.io/name=image-844000 minikube.k8s.io/updated_at=2023_05_31T11_48_29_0700 minikube.k8s.io/primary=true --all --overwrite --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:48:32.942164-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.611779 2201 ops.go:34] apiserver oom_adj: -16\n"} +{"Time":"2023-05-31T11:48:32.942165-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.611777 2201 kubeadm.go:1076] duration metric: took 59.597625ms to wait for elevateKubeSystemPrivileges.\n"} +{"Time":"2023-05-31T11:48:32.942171-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.611791 2201 kubeadm.go:406] StartCluster complete in 7.184671625s\n"} +{"Time":"2023-05-31T11:48:32.942172-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.611804 2201 settings.go:142] acquiring lock: {Name:mk21b0706c1b317cf69100362f2296fa879c00d7 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.942174-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.611888 2201 settings.go:150] Updating kubeconfig: /Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:48:32.942176-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612273 2201 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/kubeconfig: {Name:mk798616fa7d82f2defe425781279f8a2840bc7d Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:48:32.942179-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612435 2201 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml\"\n"} +{"Time":"2023-05-31T11:48:32.942183-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612468 2201 addons.go:496] enable addons start: toEnable=map[ambassador:false auto-pause:false cloud-spanner:false csi-hostpath-driver:false dashboard:false default-storageclass:true efk:false freshpod:false gcp-auth:false gvisor:false headlamp:false helm-tiller:false inaccel:false ingress:false ingress-dns:false inspektor-gadget:false istio:false istio-provisioner:false kong:false kubevirt:false logviewer:false metallb:false metrics-server:false nvidia-driver-installer:false nvidia-gpu-device-plugin:false olm:false pod-security-policy:false portainer:false registry:false registry-aliases:false registry-creds:false storage-provisioner:true storage-provisioner-gluster:false volumesnapshots:false]\n"} +{"Time":"2023-05-31T11:48:32.942186-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612499 2201 addons.go:66] Setting storage-provisioner=true in profile \"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.942235-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612502 2201 addons.go:66] Setting default-storageclass=true in profile \"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.942252-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612508 2201 addons.go:228] Setting addon storage-provisioner=true in \"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.942255-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612509 2201 addons_storage_classes.go:33] enableOrDisableStorageClasses default-storageclass=true on \"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.942257-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612529 2201 host.go:66] Checking if \"image-844000\" exists ...\n"} +{"Time":"2023-05-31T11:48:32.942259-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.612541 2201 config.go:182] Loaded profile config \"image-844000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.94226-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.617142 2201 out.go:177] - Using image gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:48:32.942262-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.621172 2201 addons.go:420] installing /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T11:48:32.942263-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.621177 2201 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storage-provisioner.yaml (2676 bytes)\n"} +{"Time":"2023-05-31T11:48:32.942268-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.621184 2201 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.5 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:48:32.942269-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.625060 2201 addons.go:228] Setting addon default-storageclass=true in \"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.942271-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.625075 2201 host.go:66] Checking if \"image-844000\" exists ...\n"} +{"Time":"2023-05-31T11:48:32.942272-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.625772 2201 addons.go:420] installing /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T11:48:32.942274-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.625775 2201 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storageclass.yaml (271 bytes)\n"} +{"Time":"2023-05-31T11:48:32.942275-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.625780 2201 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.5 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/image-844000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:48:32.942277-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.662463 2201 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml | sed -e '/^ forward . \\/etc\\/resolv.conf.*/i \\ hosts {\\n 192.168.105.1 host.minikube.internal\\n fallthrough\\n }' -e '/^ errors *$/i \\ log' | sudo /var/lib/minikube/binaries/v1.27.2/kubectl --kubeconfig=/var/lib/minikube/kubeconfig replace -f -\"\n"} +{"Time":"2023-05-31T11:48:32.942389-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.668597 2201 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T11:48:32.942426-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:29.671710 2201 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.27.2/kubectl apply -f /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T11:48:32.94243-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.078158 2201 start.go:916] {\"host.minikube.internal\": 192.168.105.1} host record injected into CoreDNS's ConfigMap\n"} +{"Time":"2023-05-31T11:48:32.942432-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.130731 2201 kapi.go:248] \"coredns\" deployment in \"kube-system\" namespace and \"image-844000\" context rescaled to 1 replicas\n"} +{"Time":"2023-05-31T11:48:32.942433-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.130744 2201 start.go:223] Will wait 6m0s for node \u0026{Name: IP:192.168.105.5 Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:48:32.942435-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.138600 2201 out.go:177] * Verifying Kubernetes components...\n"} +{"Time":"2023-05-31T11:48:32.942437-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.144658 2201 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T11:48:32.942438-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.168555 2201 out.go:177] * Enabled addons: storage-provisioner, default-storageclass\n"} +{"Time":"2023-05-31T11:48:32.94244-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.161499 2201 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T11:48:32.942441-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.172677 2201 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T11:48:32.942443-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.172675 2201 addons.go:499] enable addons completed in 560.217625ms: enabled=[storage-provisioner default-storageclass]\n"} +{"Time":"2023-05-31T11:48:32.942444-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.176741 2201 api_server.go:72] duration metric: took 45.988333ms to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T11:48:32.942446-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.176744 2201 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T11:48:32.942447-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.176748 2201 api_server.go:253] Checking apiserver healthz at https://192.168.105.5:8443/healthz ...\n"} +{"Time":"2023-05-31T11:48:32.9425-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.180135 2201 api_server.go:279] https://192.168.105.5:8443/healthz returned 200:\n"} +{"Time":"2023-05-31T11:48:32.942502-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tok\n"} +{"Time":"2023-05-31T11:48:32.942504-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.180869 2201 api_server.go:141] control plane version: v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.942505-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.180874 2201 api_server.go:131] duration metric: took 4.128292ms to wait for apiserver health ...\n"} +{"Time":"2023-05-31T11:48:32.942507-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.180878 2201 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T11:48:32.942509-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183723 2201 system_pods.go:59] 5 kube-system pods found\n"} +{"Time":"2023-05-31T11:48:32.942511-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183730 2201 system_pods.go:61] \"etcd-image-844000\" [d8e83a9e-afc6-4823-a54a-9ed82bd13eb0] Pending\n"} +{"Time":"2023-05-31T11:48:32.942512-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183732 2201 system_pods.go:61] \"kube-apiserver-image-844000\" [0d43e2b2-e599-4e84-b3f9-cd1821cdbd57] Pending\n"} +{"Time":"2023-05-31T11:48:32.942514-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183734 2201 system_pods.go:61] \"kube-controller-manager-image-844000\" [512b0191-0957-414f-8aa9-913ad11310da] Pending\n"} +{"Time":"2023-05-31T11:48:32.942515-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183736 2201 system_pods.go:61] \"kube-scheduler-image-844000\" [baf85789-d550-4463-8c34-8e50ba753354] Pending\n"} +{"Time":"2023-05-31T11:48:32.942517-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183738 2201 system_pods.go:61] \"storage-provisioner\" [83f34eb7-d7bb-4983-b69b-0b6f10716039] Pending\n"} +{"Time":"2023-05-31T11:48:32.942518-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183740 2201 system_pods.go:74] duration metric: took 2.860125ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T11:48:32.94252-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183743 2201 kubeadm.go:581] duration metric: took 52.991041ms to wait for : map[apiserver:true system_pods:true] ...\n"} +{"Time":"2023-05-31T11:48:32.942524-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.183748 2201 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T11:48:32.942525-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.185249 2201 node_conditions.go:122] node storage ephemeral capacity is 17784760Ki\n"} +{"Time":"2023-05-31T11:48:32.942527-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.185256 2201 node_conditions.go:123] node cpu capacity is 2\n"} +{"Time":"2023-05-31T11:48:32.942528-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.185260 2201 node_conditions.go:105] duration metric: took 1.510666ms to run NodePressure ...\n"} +{"Time":"2023-05-31T11:48:32.942653-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.185264 2201 start.go:228] waiting for startup goroutines ...\n"} +{"Time":"2023-05-31T11:48:32.942655-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.185266 2201 start.go:233] waiting for cluster config update ...\n"} +{"Time":"2023-05-31T11:48:32.942657-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.185270 2201 start.go:242] writing updated cluster config ...\n"} +{"Time":"2023-05-31T11:48:32.942658-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.185585 2201 ssh_runner.go:195] Run: rm -f paused\n"} +{"Time":"2023-05-31T11:48:32.94266-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.213834 2201 start.go:573] kubectl: 1.25.9, cluster: 1.27.2 (minor skew: 2)\n"} +{"Time":"2023-05-31T11:48:32.942661-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.217605 2201 out.go:177] \n"} +{"Time":"2023-05-31T11:48:32.942663-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 11:48:30.221712 2201 out.go:239] ! /usr/local/bin/kubectl is version 1.25.9, which may have incompatibilities with Kubernetes 1.27.2.\n"} +{"Time":"2023-05-31T11:48:32.942664-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.224507 2201 out.go:177] - Want kubectl v1.27.2? Try 'minikube kubectl -- get pods -A'\n"} +{"Time":"2023-05-31T11:48:32.942665-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 11:48:30.232640 2201 out.go:177] * Done! kubectl is now configured to use \"image-844000\" cluster and \"default\" namespace by default\n"} +{"Time":"2023-05-31T11:48:32.942667-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.942668-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.94267-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e Docker \u003c==\n"} +{"Time":"2023-05-31T11:48:32.942671-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* -- Journal begins at Wed 2023-05-31 18:48:12 UTC, ends at Wed 2023-05-31 18:48:32 UTC. --\n"} +{"Time":"2023-05-31T11:48:32.942673-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.784118631Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:48:32.942675-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.784123298Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.942677-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.796322715Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T11:48:32.942679-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.796394881Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.942708-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.796405090Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:48:32.942711-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.796417506Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.942713-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.802401590Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T11:48:32.942715-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.802454465Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.942718-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.802460631Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:48:32.94272-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.803979881Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.942722-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.852352131Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T11:48:32.942723-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.852381715Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.942725-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.852389256Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:48:32.942727-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:25 image-844000 dockerd[943]: time=\"2023-05-31T18:48:25.852393673Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.942729-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[937]: time=\"2023-05-31T18:48:32.352619718Z\" level=info msg=\"Layer sha256:5e5d01bb2a8d3e34816f24ff1a055b5d084e5a5a1919cd77684120916d61c3eb cleaned up\"\n"} +{"Time":"2023-05-31T11:48:32.942778-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[937]: time=\"2023-05-31T18:48:32.468695343Z\" level=info msg=\"Layer sha256:5e5d01bb2a8d3e34816f24ff1a055b5d084e5a5a1919cd77684120916d61c3eb cleaned up\"\n"} +{"Time":"2023-05-31T11:48:32.942781-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[937]: time=\"2023-05-31T18:48:32.483309635Z\" level=info msg=\"Layer sha256:5e5d01bb2a8d3e34816f24ff1a055b5d084e5a5a1919cd77684120916d61c3eb cleaned up\"\n"} +{"Time":"2023-05-31T11:48:32.942783-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[943]: time=\"2023-05-31T18:48:32.509578051Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T11:48:32.942785-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[943]: time=\"2023-05-31T18:48:32.509604426Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.942787-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[943]: time=\"2023-05-31T18:48:32.509613551Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:48:32.942789-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[943]: time=\"2023-05-31T18:48:32.509695135Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:48:32.94279-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[937]: time=\"2023-05-31T18:48:32.653713343Z\" level=info msg=\"ignoring event\" container=3d146fa79121c78d0d2338bcd2a321107d319647a0591528f154820d120294bd module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T11:48:32.942792-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[943]: time=\"2023-05-31T18:48:32.653798801Z\" level=info msg=\"shim disconnected\" id=3d146fa79121c78d0d2338bcd2a321107d319647a0591528f154820d120294bd namespace=moby\n"} +{"Time":"2023-05-31T11:48:32.942794-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[943]: time=\"2023-05-31T18:48:32.653834426Z\" level=warning msg=\"cleaning up after shim disconnected\" id=3d146fa79121c78d0d2338bcd2a321107d319647a0591528f154820d120294bd namespace=moby\n"} +{"Time":"2023-05-31T11:48:32.942795-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 dockerd[943]: time=\"2023-05-31T18:48:32.653839010Z\" level=info msg=\"cleaning up dead shim\" namespace=moby\n"} +{"Time":"2023-05-31T11:48:32.942797-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.942798-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.942799-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e container status \u003c==\n"} +{"Time":"2023-05-31T11:48:32.942865-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\n"} +{"Time":"2023-05-31T11:48:32.942884-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t81c9246269886 305d7ed1dae28 8 seconds ago Running kube-scheduler 0 689d8d0083022\n"} +{"Time":"2023-05-31T11:48:32.942901-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t5ac954bb67b23 72c9df6be7f1b 8 seconds ago Running kube-apiserver 0 32885a0f3e54e\n"} +{"Time":"2023-05-31T11:48:32.942903-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t8ee7ff34b0318 2ee705380c3c5 8 seconds ago Running kube-controller-manager 0 57f95041d2a46\n"} +{"Time":"2023-05-31T11:48:32.942905-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tfc6adc4987c23 24bc64e911039 8 seconds ago Running etcd 0 339b30019c67a\n"} +{"Time":"2023-05-31T11:48:32.942906-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.942907-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.942909-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e describe nodes \u003c==\n"} +{"Time":"2023-05-31T11:48:32.94291-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* Name: image-844000\n"} +{"Time":"2023-05-31T11:48:32.942911-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tRoles: control-plane\n"} +{"Time":"2023-05-31T11:48:32.942913-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLabels: beta.kubernetes.io/arch=arm64\n"} +{"Time":"2023-05-31T11:48:32.942917-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t beta.kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T11:48:32.942919-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t kubernetes.io/arch=arm64\n"} +{"Time":"2023-05-31T11:48:32.94292-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t kubernetes.io/hostname=image-844000\n"} +{"Time":"2023-05-31T11:48:32.942922-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T11:48:32.942923-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140\n"} +{"Time":"2023-05-31T11:48:32.942924-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t minikube.k8s.io/name=image-844000\n"} +{"Time":"2023-05-31T11:48:32.942926-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t minikube.k8s.io/primary=true\n"} +{"Time":"2023-05-31T11:48:32.942927-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t minikube.k8s.io/updated_at=2023_05_31T11_48_29_0700\n"} +{"Time":"2023-05-31T11:48:32.942928-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t minikube.k8s.io/version=v1.30.1\n"} +{"Time":"2023-05-31T11:48:32.94293-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t node-role.kubernetes.io/control-plane=\n"} +{"Time":"2023-05-31T11:48:32.942931-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t node.kubernetes.io/exclude-from-external-load-balancers=\n"} +{"Time":"2023-05-31T11:48:32.942933-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tAnnotations: kubeadm.alpha.kubernetes.io/cri-socket: unix:///var/run/cri-dockerd.sock\n"} +{"Time":"2023-05-31T11:48:32.942934-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t volumes.kubernetes.io/controller-managed-attach-detach: true\n"} +{"Time":"2023-05-31T11:48:32.942935-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tCreationTimestamp: Wed, 31 May 2023 18:48:27 +0000\n"} +{"Time":"2023-05-31T11:48:32.942937-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tTaints: node.kubernetes.io/not-ready:NoSchedule\n"} +{"Time":"2023-05-31T11:48:32.942938-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tUnschedulable: false\n"} +{"Time":"2023-05-31T11:48:32.942939-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLease:\n"} +{"Time":"2023-05-31T11:48:32.94294-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t HolderIdentity: image-844000\n"} +{"Time":"2023-05-31T11:48:32.942942-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t AcquireTime: \u003cunset\u003e\n"} +{"Time":"2023-05-31T11:48:32.942943-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t RenewTime: Wed, 31 May 2023 18:48:29 +0000\n"} +{"Time":"2023-05-31T11:48:32.942945-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tConditions:\n"} +{"Time":"2023-05-31T11:48:32.942946-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Type Status LastHeartbeatTime LastTransitionTime Reason Message\n"} +{"Time":"2023-05-31T11:48:32.942948-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---- ------ ----------------- ------------------ ------ -------\n"} +{"Time":"2023-05-31T11:48:32.942949-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t MemoryPressure False Wed, 31 May 2023 18:48:32 +0000 Wed, 31 May 2023 18:48:26 +0000 KubeletHasSufficientMemory kubelet has sufficient memory available\n"} +{"Time":"2023-05-31T11:48:32.942951-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t DiskPressure False Wed, 31 May 2023 18:48:32 +0000 Wed, 31 May 2023 18:48:26 +0000 KubeletHasNoDiskPressure kubelet has no disk pressure\n"} +{"Time":"2023-05-31T11:48:32.942953-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t PIDPressure False Wed, 31 May 2023 18:48:32 +0000 Wed, 31 May 2023 18:48:26 +0000 KubeletHasSufficientPID kubelet has sufficient PID available\n"} +{"Time":"2023-05-31T11:48:32.942955-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Ready True Wed, 31 May 2023 18:48:32 +0000 Wed, 31 May 2023 18:48:32 +0000 KubeletReady kubelet is posting ready status\n"} +{"Time":"2023-05-31T11:48:32.942956-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tAddresses:\n"} +{"Time":"2023-05-31T11:48:32.943012-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t InternalIP: 192.168.105.5\n"} +{"Time":"2023-05-31T11:48:32.943018-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Hostname: image-844000\n"} +{"Time":"2023-05-31T11:48:32.943021-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tCapacity:\n"} +{"Time":"2023-05-31T11:48:32.943043-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t cpu: 2\n"} +{"Time":"2023-05-31T11:48:32.943045-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ephemeral-storage: 17784760Ki\n"} +{"Time":"2023-05-31T11:48:32.943047-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-1Gi: 0\n"} +{"Time":"2023-05-31T11:48:32.943048-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T11:48:32.943049-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-32Mi: 0\n"} +{"Time":"2023-05-31T11:48:32.94305-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-64Ki: 0\n"} +{"Time":"2023-05-31T11:48:32.943052-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t memory: 3905972Ki\n"} +{"Time":"2023-05-31T11:48:32.943053-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T11:48:32.943054-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tAllocatable:\n"} +{"Time":"2023-05-31T11:48:32.943055-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t cpu: 2\n"} +{"Time":"2023-05-31T11:48:32.943057-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ephemeral-storage: 17784760Ki\n"} +{"Time":"2023-05-31T11:48:32.943058-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-1Gi: 0\n"} +{"Time":"2023-05-31T11:48:32.943059-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T11:48:32.943061-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-32Mi: 0\n"} +{"Time":"2023-05-31T11:48:32.943062-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-64Ki: 0\n"} +{"Time":"2023-05-31T11:48:32.943064-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t memory: 3905972Ki\n"} +{"Time":"2023-05-31T11:48:32.943065-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T11:48:32.943066-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tSystem Info:\n"} +{"Time":"2023-05-31T11:48:32.943068-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Machine ID: c053348c688f44b7b69564f1baf55df9\n"} +{"Time":"2023-05-31T11:48:32.943069-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t System UUID: c053348c688f44b7b69564f1baf55df9\n"} +{"Time":"2023-05-31T11:48:32.94307-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Boot ID: d4d155b4-dcab-425b-90a0-70e112518b6e\n"} +{"Time":"2023-05-31T11:48:32.943072-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Kernel Version: 5.10.57\n"} +{"Time":"2023-05-31T11:48:32.943073-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t OS Image: Buildroot 2021.02.12\n"} +{"Time":"2023-05-31T11:48:32.943074-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Operating System: linux\n"} +{"Time":"2023-05-31T11:48:32.943076-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Architecture: arm64\n"} +{"Time":"2023-05-31T11:48:32.943077-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Container Runtime Version: docker://24.0.1\n"} +{"Time":"2023-05-31T11:48:32.943079-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Kubelet Version: v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.94308-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Kube-Proxy Version: v1.27.2\n"} +{"Time":"2023-05-31T11:48:32.943081-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tNon-terminated Pods: (4 in total)\n"} +{"Time":"2023-05-31T11:48:32.943083-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Namespace Name CPU Requests CPU Limits Memory Requests Memory Limits Age\n"} +{"Time":"2023-05-31T11:48:32.943084-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t --------- ---- ------------ ---------- --------------- ------------- ---\n"} +{"Time":"2023-05-31T11:48:32.943085-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t kube-system etcd-image-844000 100m (5%!)(MISSING) 0 (0%!)(MISSING) 100Mi (2%!)(MISSING) 0 (0%!)(MISSING) 4s\n"} +{"Time":"2023-05-31T11:48:32.943087-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t kube-system kube-apiserver-image-844000 250m (12%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 4s\n"} +{"Time":"2023-05-31T11:48:32.943089-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t kube-system kube-controller-manager-image-844000 200m (10%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 5s\n"} +{"Time":"2023-05-31T11:48:32.943091-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t kube-system kube-scheduler-image-844000 100m (5%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 4s\n"} +{"Time":"2023-05-31T11:48:32.943094-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tAllocated resources:\n"} +{"Time":"2023-05-31T11:48:32.943175-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t (Total limits may be over 100 percent, i.e., overcommitted.)\n"} +{"Time":"2023-05-31T11:48:32.943178-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Resource Requests Limits\n"} +{"Time":"2023-05-31T11:48:32.943179-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t -------- -------- ------\n"} +{"Time":"2023-05-31T11:48:32.94318-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t cpu 650m (32%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.943182-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t memory 100Mi (2%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.943183-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ephemeral-storage 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.943185-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-1Gi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.943186-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-2Mi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.943187-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-32Mi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.943188-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t hugepages-64Ki 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:48:32.94319-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tEvents:\n"} +{"Time":"2023-05-31T11:48:32.943191-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Type Reason Age From Message\n"} +{"Time":"2023-05-31T11:48:32.943192-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T11:48:32.943195-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Normal Starting 4s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T11:48:32.943196-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Normal NodeAllocatableEnforced 4s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T11:48:32.943198-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Normal NodeHasSufficientMemory 4s kubelet Node image-844000 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T11:48:32.943199-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Normal NodeHasNoDiskPressure 4s kubelet Node image-844000 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T11:48:32.943201-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Normal NodeHasSufficientPID 4s kubelet Node image-844000 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T11:48:32.943203-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t Normal NodeReady 1s kubelet Node image-844000 status is now: NodeReady\n"} +{"Time":"2023-05-31T11:48:32.943204-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.943205-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.943243-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e dmesg \u003c==\n"} +{"Time":"2023-05-31T11:48:32.943245-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* [May31 18:48] ACPI: SRAT not present\n"} +{"Time":"2023-05-31T11:48:32.943246-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.000000] KASLR disabled due to lack of seed\n"} +{"Time":"2023-05-31T11:48:32.943248-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.636930] EINJ: EINJ table not found.\n"} +{"Time":"2023-05-31T11:48:32.943249-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.515837] systemd-fstab-generator[114]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943251-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.044293] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.\n"} +{"Time":"2023-05-31T11:48:32.943252-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.000797] systemd[1]: (This warning is only shown for the first unit using IP firewalling.)\n"} +{"Time":"2023-05-31T11:48:32.943254-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +4.130490] systemd-fstab-generator[473]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943255-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.062937] systemd-fstab-generator[484]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943257-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +2.754022] systemd-fstab-generator[698]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943258-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +1.513871] systemd-fstab-generator[870]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943259-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.186911] systemd-fstab-generator[906]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943261-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.062423] systemd-fstab-generator[917]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943262-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.059164] systemd-fstab-generator[930]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943263-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +1.146503] kauditd_printk_skb: 53 callbacks suppressed\n"} +{"Time":"2023-05-31T11:48:32.943265-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.074750] systemd-fstab-generator[1089]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943266-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.062458] systemd-fstab-generator[1100]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943268-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.062515] systemd-fstab-generator[1111]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943269-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.061079] systemd-fstab-generator[1122]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943367-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +0.064583] systemd-fstab-generator[1148]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943374-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +2.560663] systemd-fstab-generator[1421]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943378-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +4.626695] systemd-fstab-generator[2265]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:48:32.943381-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t[ +3.038308] kauditd_printk_skb: 41 callbacks suppressed\n"} +{"Time":"2023-05-31T11:48:32.943385-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.943388-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.943391-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e etcd [fc6adc4987c2] \u003c==\n"} +{"Time":"2023-05-31T11:48:32.943415-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* {\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.034Z\",\"caller\":\"fileutil/purge.go:44\",\"msg\":\"started to purge file\",\"dir\":\"/var/lib/minikube/etcd/member/snap\",\"suffix\":\"snap\",\"max\":5,\"interval\":\"30s\"}\n"} +{"Time":"2023-05-31T11:48:32.943427-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.034Z\",\"caller\":\"fileutil/purge.go:44\",\"msg\":\"started to purge file\",\"dir\":\"/var/lib/minikube/etcd/member/wal\",\"suffix\":\"wal\",\"max\":5,\"interval\":\"30s\"}\n"} +{"Time":"2023-05-31T11:48:32.943433-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.038Z\",\"caller\":\"embed/etcd.go:687\",\"msg\":\"starting with client TLS\",\"tls-info\":\"cert = /var/lib/minikube/certs/etcd/server.crt, key = /var/lib/minikube/certs/etcd/server.key, client-cert=, client-key=, trusted-ca = /var/lib/minikube/certs/etcd/ca.crt, client-cert-auth = true, crl-file = \",\"cipher-suites\":[]}\n"} +{"Time":"2023-05-31T11:48:32.943466-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.038Z\",\"caller\":\"embed/etcd.go:586\",\"msg\":\"serving peer traffic\",\"address\":\"192.168.105.5:2380\"}\n"} +{"Time":"2023-05-31T11:48:32.943474-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.038Z\",\"caller\":\"embed/etcd.go:558\",\"msg\":\"cmux::serve\",\"address\":\"192.168.105.5:2380\"}\n"} +{"Time":"2023-05-31T11:48:32.943477-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.038Z\",\"caller\":\"embed/etcd.go:275\",\"msg\":\"now serving peer/client/metrics\",\"local-member-id\":\"58de0efec1d86300\",\"initial-advertise-peer-urls\":[\"https://192.168.105.5:2380\"],\"listen-peer-urls\":[\"https://192.168.105.5:2380\"],\"advertise-client-urls\":[\"https://192.168.105.5:2379\"],\"listen-client-urls\":[\"https://127.0.0.1:2379\",\"https://192.168.105.5:2379\"],\"listen-metrics-urls\":[\"http://127.0.0.1:2381\"]}\n"} +{"Time":"2023-05-31T11:48:32.94348-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.038Z\",\"caller\":\"embed/etcd.go:762\",\"msg\":\"serving metrics\",\"address\":\"http://127.0.0.1:2381\"}\n"} +{"Time":"2023-05-31T11:48:32.943482-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.198Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"58de0efec1d86300 is starting a new election at term 1\"}\n"} +{"Time":"2023-05-31T11:48:32.943484-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.198Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"58de0efec1d86300 became pre-candidate at term 1\"}\n"} +{"Time":"2023-05-31T11:48:32.943486-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.198Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"58de0efec1d86300 received MsgPreVoteResp from 58de0efec1d86300 at term 1\"}\n"} +{"Time":"2023-05-31T11:48:32.943488-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.198Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"58de0efec1d86300 became candidate at term 2\"}\n"} +{"Time":"2023-05-31T11:48:32.94349-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.198Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"58de0efec1d86300 received MsgVoteResp from 58de0efec1d86300 at term 2\"}\n"} +{"Time":"2023-05-31T11:48:32.943492-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.198Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"58de0efec1d86300 became leader at term 2\"}\n"} +{"Time":"2023-05-31T11:48:32.943493-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.198Z\",\"logger\":\"raft\",\"caller\":\"etcdserver/zap_raft.go:77\",\"msg\":\"raft.node: 58de0efec1d86300 elected leader 58de0efec1d86300 at term 2\"}\n"} +{"Time":"2023-05-31T11:48:32.943495-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.200Z\",\"caller\":\"etcdserver/server.go:2062\",\"msg\":\"published local member to cluster through raft\",\"local-member-id\":\"58de0efec1d86300\",\"local-member-attributes\":\"{Name:image-844000 ClientURLs:[https://192.168.105.5:2379]}\",\"request-path\":\"/0/members/58de0efec1d86300/attributes\",\"cluster-id\":\"cd5c0afff2184bea\",\"publish-timeout\":\"7s\"}\n"} +{"Time":"2023-05-31T11:48:32.943498-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.200Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T11:48:32.943499-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.201Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"127.0.0.1:2379\"}\n"} +{"Time":"2023-05-31T11:48:32.943501-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.201Z\",\"caller\":\"etcdserver/server.go:2571\",\"msg\":\"setting up initial cluster version using v2 API\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T11:48:32.943503-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.202Z\",\"caller\":\"membership/cluster.go:584\",\"msg\":\"set initial cluster version\",\"cluster-id\":\"cd5c0afff2184bea\",\"local-member-id\":\"58de0efec1d86300\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T11:48:32.943675-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.202Z\",\"caller\":\"api/capability.go:75\",\"msg\":\"enabled capabilities for version\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T11:48:32.943678-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.202Z\",\"caller\":\"etcdserver/server.go:2595\",\"msg\":\"cluster version is updated\",\"cluster-version\":\"3.5\"}\n"} +{"Time":"2023-05-31T11:48:32.94368-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.206Z\",\"caller\":\"embed/serve.go:100\",\"msg\":\"ready to serve client requests\"}\n"} +{"Time":"2023-05-31T11:48:32.943681-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.206Z\",\"caller\":\"embed/serve.go:198\",\"msg\":\"serving client traffic securely\",\"address\":\"192.168.105.5:2379\"}\n"} +{"Time":"2023-05-31T11:48:32.943683-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.206Z\",\"caller\":\"etcdmain/main.go:44\",\"msg\":\"notifying init daemon\"}\n"} +{"Time":"2023-05-31T11:48:32.943685-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t{\"level\":\"info\",\"ts\":\"2023-05-31T18:48:26.206Z\",\"caller\":\"etcdmain/main.go:50\",\"msg\":\"successfully notified init daemon\"}\n"} +{"Time":"2023-05-31T11:48:32.943686-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.943688-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.943689-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e kernel \u003c==\n"} +{"Time":"2023-05-31T11:48:32.94369-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* 18:48:33 up 0 min, 0 users, load average: 1.40, 0.31, 0.10\n"} +{"Time":"2023-05-31T11:48:32.943692-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tLinux image-844000 5.10.57 #1 SMP PREEMPT Wed May 24 00:44:44 UTC 2023 aarch64 GNU/Linux\n"} +{"Time":"2023-05-31T11:48:32.943696-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tPRETTY_NAME=\"Buildroot 2021.02.12\"\n"} +{"Time":"2023-05-31T11:48:32.943697-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.943699-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.9437-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e kube-apiserver [5ac954bb67b2] \u003c==\n"} +{"Time":"2023-05-31T11:48:32.943702-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* I0531 18:48:27.215165 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T11:48:32.943704-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.215248 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T11:48:32.943705-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.215291 1 apf_controller.go:366] Running API Priority and Fairness config worker\n"} +{"Time":"2023-05-31T11:48:32.943707-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.215308 1 apf_controller.go:369] Running API Priority and Fairness periodic rebalancing process\n"} +{"Time":"2023-05-31T11:48:32.943754-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.215334 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T11:48:32.94376-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.215363 1 shared_informer.go:318] Caches are synced for configmaps\n"} +{"Time":"2023-05-31T11:48:32.943764-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.215970 1 controller.go:624] quota admission added evaluator for: namespaces\n"} +{"Time":"2023-05-31T11:48:32.943778-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.216128 1 shared_informer.go:318] Caches are synced for cluster_authentication_trust_controller\n"} +{"Time":"2023-05-31T11:48:32.943794-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.216264 1 shared_informer.go:318] Caches are synced for crd-autoregister\n"} +{"Time":"2023-05-31T11:48:32.943798-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.229953 1 shared_informer.go:318] Caches are synced for node_authorizer\n"} +{"Time":"2023-05-31T11:48:32.943799-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.410330 1 controller.go:624] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T11:48:32.943801-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:27.973762 1 controller.go:132] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T11:48:32.943802-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:28.121984 1 storage_scheduling.go:95] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T11:48:32.943804-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:28.126165 1 storage_scheduling.go:95] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T11:48:32.943805-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:28.126196 1 storage_scheduling.go:111] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T11:48:32.943807-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:28.305451 1 controller.go:624] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T11:48:32.943808-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:28.316144 1 controller.go:624] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T11:48:32.94381-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:28.346724 1 alloc.go:330] \"allocated clusterIPs\" service=\"default/kubernetes\" clusterIPs=map[IPv4:10.96.0.1]\n"} +{"Time":"2023-05-31T11:48:32.943811-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:28.348743 1 lease.go:251] Resetting endpoints for master service \"kubernetes\" to [192.168.105.5]\n"} +{"Time":"2023-05-31T11:48:32.943826-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:28.349157 1 controller.go:624] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T11:48:32.943852-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:28.350545 1 controller.go:624] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T11:48:32.943888-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.149671 1 controller.go:624] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T11:48:32.943923-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.608742 1 controller.go:624] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T11:48:32.943937-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.612390 1 alloc.go:330] \"allocated clusterIPs\" service=\"kube-system/kube-dns\" clusterIPs=map[IPv4:10.96.0.10]\n"} +{"Time":"2023-05-31T11:48:32.943954-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.616038 1 controller.go:624] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T11:48:32.943956-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.943957-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.943959-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e kube-controller-manager [8ee7ff34b031] \u003c==\n"} +{"Time":"2023-05-31T11:48:32.94396-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* I0531 18:48:29.182615 1 resource_quota_monitor.go:223] \"QuotaMonitor created object count evaluator\" resource=\"horizontalpodautoscalers.autoscaling\"\n"} +{"Time":"2023-05-31T11:48:32.943962-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.182622 1 resource_quota_monitor.go:223] \"QuotaMonitor created object count evaluator\" resource=\"leases.coordination.k8s.io\"\n"} +{"Time":"2023-05-31T11:48:32.943964-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.182629 1 resource_quota_monitor.go:223] \"QuotaMonitor created object count evaluator\" resource=\"roles.rbac.authorization.k8s.io\"\n"} +{"Time":"2023-05-31T11:48:32.943965-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.182650 1 resource_quota_monitor.go:223] \"QuotaMonitor created object count evaluator\" resource=\"csistoragecapacities.storage.k8s.io\"\n"} +{"Time":"2023-05-31T11:48:32.943967-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.182662 1 controllermanager.go:638] \"Started controller\" controller=\"resourcequota\"\n"} +{"Time":"2023-05-31T11:48:32.943969-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.182723 1 resource_quota_controller.go:295] \"Starting resource quota controller\"\n"} +{"Time":"2023-05-31T11:48:32.94397-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.182729 1 shared_informer.go:311] Waiting for caches to sync for resource quota\n"} +{"Time":"2023-05-31T11:48:32.943971-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.182772 1 resource_quota_monitor.go:304] \"QuotaMonitor running\"\n"} +{"Time":"2023-05-31T11:48:32.943973-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.245476 1 shared_informer.go:318] Caches are synced for tokens\n"} +{"Time":"2023-05-31T11:48:32.943974-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.246928 1 controllermanager.go:638] \"Started controller\" controller=\"serviceaccount\"\n"} +{"Time":"2023-05-31T11:48:32.943976-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.247008 1 serviceaccounts_controller.go:111] \"Starting service account controller\"\n"} +{"Time":"2023-05-31T11:48:32.943977-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.247015 1 shared_informer.go:311] Waiting for caches to sync for service account\n"} +{"Time":"2023-05-31T11:48:32.943979-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.400888 1 controllermanager.go:638] \"Started controller\" controller=\"csrsigning\"\n"} +{"Time":"2023-05-31T11:48:32.94398-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.400935 1 certificate_controller.go:112] Starting certificate controller \"csrsigning-legacy-unknown\"\n"} +{"Time":"2023-05-31T11:48:32.943982-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.400943 1 shared_informer.go:311] Waiting for caches to sync for certificate-csrsigning-legacy-unknown\n"} +{"Time":"2023-05-31T11:48:32.943984-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.400978 1 certificate_controller.go:112] Starting certificate controller \"csrsigning-kubelet-serving\"\n"} +{"Time":"2023-05-31T11:48:32.943985-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.400980 1 shared_informer.go:311] Waiting for caches to sync for certificate-csrsigning-kubelet-serving\n"} +{"Time":"2023-05-31T11:48:32.943988-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.400990 1 certificate_controller.go:112] Starting certificate controller \"csrsigning-kubelet-client\"\n"} +{"Time":"2023-05-31T11:48:32.94399-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.400993 1 shared_informer.go:311] Waiting for caches to sync for certificate-csrsigning-kubelet-client\n"} +{"Time":"2023-05-31T11:48:32.943994-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.401002 1 certificate_controller.go:112] Starting certificate controller \"csrsigning-kube-apiserver-client\"\n"} +{"Time":"2023-05-31T11:48:32.943996-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.401015 1 shared_informer.go:311] Waiting for caches to sync for certificate-csrsigning-kube-apiserver-client\n"} +{"Time":"2023-05-31T11:48:32.943997-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.401033 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"csr-controller::/var/lib/minikube/certs/ca.crt::/var/lib/minikube/certs/ca.key\"\n"} +{"Time":"2023-05-31T11:48:32.943999-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.401068 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"csr-controller::/var/lib/minikube/certs/ca.crt::/var/lib/minikube/certs/ca.key\"\n"} +{"Time":"2023-05-31T11:48:32.944-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.401091 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"csr-controller::/var/lib/minikube/certs/ca.crt::/var/lib/minikube/certs/ca.key\"\n"} +{"Time":"2023-05-31T11:48:32.944002-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:29.401113 1 dynamic_serving_content.go:132] \"Starting controller\" name=\"csr-controller::/var/lib/minikube/certs/ca.crt::/var/lib/minikube/certs/ca.key\"\n"} +{"Time":"2023-05-31T11:48:32.944003-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.944005-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.944006-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e kube-scheduler [81c924626988] \u003c==\n"} +{"Time":"2023-05-31T11:48:32.944007-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* W0531 18:48:27.188225 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944009-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:27.188246 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944012-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:27.188257 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.StorageClass: storageclasses.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"storageclasses\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944014-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:27.188300 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Pod: pods is forbidden: User \"system:kube-scheduler\" cannot list resource \"pods\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944016-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:27.188310 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Pod: failed to list *v1.Pod: pods is forbidden: User \"system:kube-scheduler\" cannot list resource \"pods\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944018-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:27.188301 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.StorageClass: failed to list *v1.StorageClass: storageclasses.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"storageclasses\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.94402-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:27.188333 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSINode: csinodes.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csinodes\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944022-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:27.188341 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSINode: failed to list *v1.CSINode: csinodes.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csinodes\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944086-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:27.188238 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.StatefulSet: statefulsets.apps is forbidden: User \"system:kube-scheduler\" cannot list resource \"statefulsets\" in API group \"apps\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.94409-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:27.188347 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.StatefulSet: failed to list *v1.StatefulSet: statefulsets.apps is forbidden: User \"system:kube-scheduler\" cannot list resource \"statefulsets\" in API group \"apps\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944092-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:27.188413 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.PersistentVolumeClaim: persistentvolumeclaims is forbidden: User \"system:kube-scheduler\" cannot list resource \"persistentvolumeclaims\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944094-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:27.188438 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.PersistentVolumeClaim: failed to list *v1.PersistentVolumeClaim: persistentvolumeclaims is forbidden: User \"system:kube-scheduler\" cannot list resource \"persistentvolumeclaims\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944096-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:28.012217 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIStorageCapacity: csistoragecapacities.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csistoragecapacities\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944098-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:28.012285 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIStorageCapacity: failed to list *v1.CSIStorageCapacity: csistoragecapacities.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csistoragecapacities\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944102-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:28.039085 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User \"system:kube-scheduler\" cannot list resource \"services\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944103-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:28.039149 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User \"system:kube-scheduler\" cannot list resource \"services\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944105-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:28.051257 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.ReplicationController: replicationcontrollers is forbidden: User \"system:kube-scheduler\" cannot list resource \"replicationcontrollers\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944218-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:28.051298 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.ReplicationController: failed to list *v1.ReplicationController: replicationcontrollers is forbidden: User \"system:kube-scheduler\" cannot list resource \"replicationcontrollers\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944221-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:28.064145 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944223-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:28.064175 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csidrivers\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944225-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:28.207834 1 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSINode: csinodes.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csinodes\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944227-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:28.207854 1 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSINode: failed to list *v1.CSINode: csinodes.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csinodes\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:48:32.944232-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tW0531 18:48:28.262797 1 reflector.go:533] pkg/server/dynamiccertificates/configmap_cafile_content.go:206: failed to list *v1.ConfigMap: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T11:48:32.944234-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tE0531 18:48:28.262886 1 reflector.go:148] pkg/server/dynamiccertificates/configmap_cafile_content.go:206: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T11:48:32.944236-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tI0531 18:48:31.384454 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T11:48:32.944237-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.944238-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* \n"} +{"Time":"2023-05-31T11:48:32.944239-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* ==\u003e kubelet \u003c==\n"} +{"Time":"2023-05-31T11:48:32.944299-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t* -- Journal begins at Wed 2023-05-31 18:48:12 UTC, ends at Wed 2023-05-31 18:48:33 UTC. --\n"} +{"Time":"2023-05-31T11:48:32.944301-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.802971 2284 kubelet_node_status.go:108] \"Node was previously registered\" node=\"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944303-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.803069 2284 kubelet_node_status.go:73] \"Successfully registered node\" node=\"image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944305-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851726 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/734f4f918a14e3d27cfbf2b12fc195b3-kubeconfig\\\") pod \\\"kube-controller-manager-image-844000\\\" (UID: \\\"734f4f918a14e3d27cfbf2b12fc195b3\\\") \" pod=\"kube-system/kube-controller-manager-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944308-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851757 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"kubeconfig\\\" (UniqueName: \\\"kubernetes.io/host-path/191bf0b5d0f8914e602be8569e0de3e2-kubeconfig\\\") pod \\\"kube-scheduler-image-844000\\\" (UID: \\\"191bf0b5d0f8914e602be8569e0de3e2\\\") \" pod=\"kube-system/kube-scheduler-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944311-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851770 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/e86860e48585e3621467bb8e5144284e-etcd-certs\\\") pod \\\"etcd-image-844000\\\" (UID: \\\"e86860e48585e3621467bb8e5144284e\\\") \" pod=\"kube-system/etcd-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944313-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851779 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/8da251045f5778636e403a21a1675b48-k8s-certs\\\") pod \\\"kube-apiserver-image-844000\\\" (UID: \\\"8da251045f5778636e403a21a1675b48\\\") \" pod=\"kube-system/kube-apiserver-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944315-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851791 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"flexvolume-dir\\\" (UniqueName: \\\"kubernetes.io/host-path/734f4f918a14e3d27cfbf2b12fc195b3-flexvolume-dir\\\") pod \\\"kube-controller-manager-image-844000\\\" (UID: \\\"734f4f918a14e3d27cfbf2b12fc195b3\\\") \" pod=\"kube-system/kube-controller-manager-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944317-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851800 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"k8s-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/734f4f918a14e3d27cfbf2b12fc195b3-k8s-certs\\\") pod \\\"kube-controller-manager-image-844000\\\" (UID: \\\"734f4f918a14e3d27cfbf2b12fc195b3\\\") \" pod=\"kube-system/kube-controller-manager-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944393-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851810 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/734f4f918a14e3d27cfbf2b12fc195b3-usr-share-ca-certificates\\\") pod \\\"kube-controller-manager-image-844000\\\" (UID: \\\"734f4f918a14e3d27cfbf2b12fc195b3\\\") \" pod=\"kube-system/kube-controller-manager-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944402-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851819 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"etcd-data\\\" (UniqueName: \\\"kubernetes.io/host-path/e86860e48585e3621467bb8e5144284e-etcd-data\\\") pod \\\"etcd-image-844000\\\" (UID: \\\"e86860e48585e3621467bb8e5144284e\\\") \" pod=\"kube-system/etcd-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944408-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851829 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/8da251045f5778636e403a21a1675b48-ca-certs\\\") pod \\\"kube-apiserver-image-844000\\\" (UID: \\\"8da251045f5778636e403a21a1675b48\\\") \" pod=\"kube-system/kube-apiserver-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944414-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851839 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"usr-share-ca-certificates\\\" (UniqueName: \\\"kubernetes.io/host-path/8da251045f5778636e403a21a1675b48-usr-share-ca-certificates\\\") pod \\\"kube-apiserver-image-844000\\\" (UID: \\\"8da251045f5778636e403a21a1675b48\\\") \" pod=\"kube-system/kube-apiserver-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944419-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:29 image-844000 kubelet[2284]: I0531 18:48:29.851849 2284 reconciler_common.go:258] \"operationExecutor.VerifyControllerAttachedVolume started for volume \\\"ca-certs\\\" (UniqueName: \\\"kubernetes.io/host-path/734f4f918a14e3d27cfbf2b12fc195b3-ca-certs\\\") pod \\\"kube-controller-manager-image-844000\\\" (UID: \\\"734f4f918a14e3d27cfbf2b12fc195b3\\\") \" pod=\"kube-system/kube-controller-manager-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944435-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: I0531 18:48:30.637083 2284 apiserver.go:52] \"Watching apiserver\"\n"} +{"Time":"2023-05-31T11:48:32.944437-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: I0531 18:48:30.650538 2284 desired_state_of_world_populator.go:153] \"Finished populating initial desired state of world\"\n"} +{"Time":"2023-05-31T11:48:32.944439-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: I0531 18:48:30.654745 2284 reconciler.go:41] \"Reconciler: start to sync state\"\n"} +{"Time":"2023-05-31T11:48:32.944497-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: E0531 18:48:30.707260 2284 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-controller-manager-image-844000\\\" already exists\" pod=\"kube-system/kube-controller-manager-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944503-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: E0531 18:48:30.707322 2284 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-apiserver-image-844000\\\" already exists\" pod=\"kube-system/kube-apiserver-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944505-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: E0531 18:48:30.707684 2284 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"etcd-image-844000\\\" already exists\" pod=\"kube-system/etcd-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944507-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: E0531 18:48:30.707722 2284 kubelet.go:1856] \"Failed creating a mirror pod for\" err=\"pods \\\"kube-scheduler-image-844000\\\" already exists\" pod=\"kube-system/kube-scheduler-image-844000\"\n"} +{"Time":"2023-05-31T11:48:32.944509-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: I0531 18:48:30.714415 2284 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-controller-manager-image-844000\" podStartSLOduration=2.7143948 podCreationTimestamp=\"2023-05-31 18:48:28 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 18:48:30.714332425 +0000 UTC m=+1.126031877\" watchObservedRunningTime=\"2023-05-31 18:48:30.7143948 +0000 UTC m=+1.126094252\"\n"} +{"Time":"2023-05-31T11:48:32.944512-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: I0531 18:48:30.718492 2284 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/etcd-image-844000\" podStartSLOduration=1.718451592 podCreationTimestamp=\"2023-05-31 18:48:29 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 18:48:30.7183738 +0000 UTC m=+1.130073252\" watchObservedRunningTime=\"2023-05-31 18:48:30.718451592 +0000 UTC m=+1.130151044\"\n"} +{"Time":"2023-05-31T11:48:32.944515-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: I0531 18:48:30.727029 2284 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-scheduler-image-844000\" podStartSLOduration=1.727007884 podCreationTimestamp=\"2023-05-31 18:48:29 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 18:48:30.722595425 +0000 UTC m=+1.134294835\" watchObservedRunningTime=\"2023-05-31 18:48:30.727007884 +0000 UTC m=+1.138707294\"\n"} +{"Time":"2023-05-31T11:48:32.944517-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:30 image-844000 kubelet[2284]: I0531 18:48:30.731165 2284 pod_startup_latency_tracker.go:102] \"Observed pod startup duration\" pod=\"kube-system/kube-apiserver-image-844000\" podStartSLOduration=1.7311524249999999 podCreationTimestamp=\"2023-05-31 18:48:29 +0000 UTC\" firstStartedPulling=\"0001-01-01 00:00:00 +0000 UTC\" lastFinishedPulling=\"0001-01-01 00:00:00 +0000 UTC\" observedRunningTime=\"2023-05-31 18:48:30.727173925 +0000 UTC m=+1.138873377\" watchObservedRunningTime=\"2023-05-31 18:48:30.731152425 +0000 UTC m=+1.142851877\"\n"} +{"Time":"2023-05-31T11:48:32.944569-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tMay 31 18:48:32 image-844000 kubelet[2284]: I0531 18:48:32.416317 2284 kubelet_node_status.go:493] \"Fast updating node status as it just became ready\"\n"} +{"Time":"2023-05-31T11:48:32.944571-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \t\n"} +{"Time":"2023-05-31T11:48:32.944572-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \n"} +{"Time":"2023-05-31T11:48:32.944574-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:48:32.944575-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:254: (dbg) Run: out/minikube-darwin-arm64 status --format={{.APIServer}} -p image-844000 -n image-844000\n"} +{"Time":"2023-05-31T11:48:33.016517-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:261: (dbg) Run: kubectl --context image-844000 get po -o=jsonpath={.items[*].metadata.name} -A --field-selector=status.phase!=Running\n"} +{"Time":"2023-05-31T11:48:33.053731-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:272: non-running pods: storage-provisioner\n"} +{"Time":"2023-05-31T11:48:33.053744-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:274: ======\u003e post-mortem[TestImageBuild/serial/BuildWithBuildArg]: describe non-running pods \u003c======\n"} +{"Time":"2023-05-31T11:48:33.053817-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:277: (dbg) Run: kubectl --context image-844000 describe pod storage-provisioner\n"} +{"Time":"2023-05-31T11:48:33.0916-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:277: (dbg) Non-zero exit: kubectl --context image-844000 describe pod storage-provisioner: exit status 1 (37.7125ms)\n"} +{"Time":"2023-05-31T11:48:33.091615-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \n"} +{"Time":"2023-05-31T11:48:33.091626-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:48:33.091628-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \tError from server (NotFound): pods \"storage-provisioner\" not found\n"} +{"Time":"2023-05-31T11:48:33.09163-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" \n"} +{"Time":"2023-05-31T11:48:33.091632-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:48:33.091634-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" helpers_test.go:279: kubectl --context image-844000 describe pod storage-provisioner: exit status 1\n"} +{"Time":"2023-05-31T11:48:33.091637-07:00","Action":"run","Test":"TestImageBuild/serial/BuildWithDockerIgnore"} +{"Time":"2023-05-31T11:48:33.091639-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithDockerIgnore","Output":"=== RUN TestImageBuild/serial/BuildWithDockerIgnore\n"} +{"Time":"2023-05-31T11:48:33.091711-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithDockerIgnore","Output":" image_test.go:133: (dbg) Run: out/minikube-darwin-arm64 image build -t aaa:latest ./testdata/image-build/test-normal --build-opt=no-cache -p image-844000\n"} +{"Time":"2023-05-31T11:48:33.199852-07:00","Action":"run","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile"} +{"Time":"2023-05-31T11:48:33.199864-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile","Output":"=== RUN TestImageBuild/serial/BuildWithSpecifiedDockerfile\n"} +{"Time":"2023-05-31T11:48:33.199916-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile","Output":" image_test.go:88: (dbg) Run: out/minikube-darwin-arm64 image build -t aaa:latest -f inner/Dockerfile ./testdata/image-build/test-f -p image-844000\n"} +{"Time":"2023-05-31T11:48:33.295711-07:00","Action":"run","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv"} +{"Time":"2023-05-31T11:48:33.295725-07:00","Action":"output","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv","Output":"=== RUN TestImageBuild/serial/validateImageBuildWithBuildEnv\n"} +{"Time":"2023-05-31T11:48:33.295729-07:00","Action":"output","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv","Output":" image_test.go:114: skipping due to https://github.com/kubernetes/minikube/issues/12431\n"} +{"Time":"2023-05-31T11:48:33.295793-07:00","Action":"output","Test":"TestImageBuild","Output":" helpers_test.go:175: Cleaning up \"image-844000\" profile ...\n"} +{"Time":"2023-05-31T11:48:33.295814-07:00","Action":"output","Test":"TestImageBuild","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p image-844000\n"} +{"Time":"2023-05-31T11:48:33.407772-07:00","Action":"output","Test":"TestImageBuild","Output":"--- FAIL: TestImageBuild (32.77s)\n"} +{"Time":"2023-05-31T11:48:33.407787-07:00","Action":"output","Test":"TestImageBuild/serial","Output":" --- FAIL: TestImageBuild/serial (32.66s)\n"} +{"Time":"2023-05-31T11:48:33.40779-07:00","Action":"output","Test":"TestImageBuild/serial/Setup","Output":" --- PASS: TestImageBuild/serial/Setup (29.61s)\n"} +{"Time":"2023-05-31T11:48:33.407792-07:00","Action":"pass","Test":"TestImageBuild/serial/Setup","Elapsed":29.61} +{"Time":"2023-05-31T11:48:33.407796-07:00","Action":"output","Test":"TestImageBuild/serial/NormalBuild","Output":" --- PASS: TestImageBuild/serial/NormalBuild (1.84s)\n"} +{"Time":"2023-05-31T11:48:33.407799-07:00","Action":"pass","Test":"TestImageBuild/serial/NormalBuild","Elapsed":1.84} +{"Time":"2023-05-31T11:48:33.407801-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithBuildArg","Output":" --- FAIL: TestImageBuild/serial/BuildWithBuildArg (1.01s)\n"} +{"Time":"2023-05-31T11:48:33.407802-07:00","Action":"fail","Test":"TestImageBuild/serial/BuildWithBuildArg","Elapsed":1.01} +{"Time":"2023-05-31T11:48:33.407804-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithDockerIgnore","Output":" --- PASS: TestImageBuild/serial/BuildWithDockerIgnore (0.11s)\n"} +{"Time":"2023-05-31T11:48:33.407806-07:00","Action":"pass","Test":"TestImageBuild/serial/BuildWithDockerIgnore","Elapsed":0.11} +{"Time":"2023-05-31T11:48:33.407807-07:00","Action":"output","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile","Output":" --- PASS: TestImageBuild/serial/BuildWithSpecifiedDockerfile (0.10s)\n"} +{"Time":"2023-05-31T11:48:33.407809-07:00","Action":"pass","Test":"TestImageBuild/serial/BuildWithSpecifiedDockerfile","Elapsed":0.1} +{"Time":"2023-05-31T11:48:33.40781-07:00","Action":"output","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv","Output":" --- SKIP: TestImageBuild/serial/validateImageBuildWithBuildEnv (0.00s)\n"} +{"Time":"2023-05-31T11:48:33.407813-07:00","Action":"skip","Test":"TestImageBuild/serial/validateImageBuildWithBuildEnv","Elapsed":0} +{"Time":"2023-05-31T11:48:33.407814-07:00","Action":"fail","Test":"TestImageBuild/serial","Elapsed":32.66} +{"Time":"2023-05-31T11:48:33.407815-07:00","Action":"fail","Test":"TestImageBuild","Elapsed":32.77} +{"Time":"2023-05-31T11:48:33.407816-07:00","Action":"run","Test":"TestIngressAddonLegacy"} +{"Time":"2023-05-31T11:48:33.407818-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":"=== RUN TestIngressAddonLegacy\n"} +{"Time":"2023-05-31T11:48:33.407819-07:00","Action":"run","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster"} +{"Time":"2023-05-31T11:48:33.407821-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":"=== RUN TestIngressAddonLegacy/StartLegacyK8sCluster\n"} +{"Time":"2023-05-31T11:48:33.407888-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ingress_addon_legacy_test.go:39: (dbg) Run: out/minikube-darwin-arm64 start -p ingress-addon-legacy-798000 --kubernetes-version=v1.18.20 --memory=4096 --wait=true --alsologtostderr -v=5 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:50:00.407564-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" ingress_addon_legacy_test.go:39: (dbg) Done: out/minikube-darwin-arm64 start -p ingress-addon-legacy-798000 --kubernetes-version=v1.18.20 --memory=4096 --wait=true --alsologtostderr -v=5 --driver=qemu2 : (1m27.000869667s)\n"} +{"Time":"2023-05-31T11:50:00.407585-07:00","Action":"run","Test":"TestIngressAddonLegacy/serial"} +{"Time":"2023-05-31T11:50:00.407587-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial","Output":"=== RUN TestIngressAddonLegacy/serial\n"} +{"Time":"2023-05-31T11:50:00.407608-07:00","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation"} +{"Time":"2023-05-31T11:50:00.407612-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressAddonActivation\n"} +{"Time":"2023-05-31T11:50:00.407638-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ingress_addon_legacy_test.go:70: (dbg) Run: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 addons enable ingress --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T11:50:18.252635-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" ingress_addon_legacy_test.go:70: (dbg) Done: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 addons enable ingress --alsologtostderr -v=5: (17.845075167s)\n"} +{"Time":"2023-05-31T11:50:18.253001-07:00","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation"} +{"Time":"2023-05-31T11:50:18.253011-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation\n"} +{"Time":"2023-05-31T11:50:18.253018-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" ingress_addon_legacy_test.go:79: (dbg) Run: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 addons enable ingress-dns --alsologtostderr -v=5\n"} +{"Time":"2023-05-31T11:50:18.45422-07:00","Action":"run","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons"} +{"Time":"2023-05-31T11:50:18.454236-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"=== RUN TestIngressAddonLegacy/serial/ValidateIngressAddons\n"} +{"Time":"2023-05-31T11:50:18.455127-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:183: (dbg) Run: kubectl --context ingress-addon-legacy-798000 wait --for=condition=ready --namespace=ingress-nginx pod --selector=app.kubernetes.io/component=controller --timeout=90s\n"} +{"Time":"2023-05-31T11:50:35.878341-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:183: (dbg) Done: kubectl --context ingress-addon-legacy-798000 wait --for=condition=ready --namespace=ingress-nginx pod --selector=app.kubernetes.io/component=controller --timeout=90s: (17.423275125s)\n"} +{"Time":"2023-05-31T11:50:35.893731-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:208: (dbg) Run: kubectl --context ingress-addon-legacy-798000 replace --force -f testdata/nginx-ingress-v1beta1.yaml\n"} +{"Time":"2023-05-31T11:50:36.051274-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:221: (dbg) Run: kubectl --context ingress-addon-legacy-798000 replace --force -f testdata/nginx-pod-svc.yaml\n"} +{"Time":"2023-05-31T11:50:36.133188-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:226: (dbg) TestIngressAddonLegacy/serial/ValidateIngressAddons: waiting 8m0s for pods matching \"run=nginx\" in namespace \"default\" ...\n"} +{"Time":"2023-05-31T11:50:36.135948-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:344: \"nginx\" [c031b6d9-1ad1-4fe1-ba62-4f541133408d] Pending / Ready:ContainersNotReady (containers with unready status: [nginx]) / ContainersReady:ContainersNotReady (containers with unready status: [nginx])\n"} +{"Time":"2023-05-31T11:50:41.146217-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:344: \"nginx\" [c031b6d9-1ad1-4fe1-ba62-4f541133408d] Running\n"} +{"Time":"2023-05-31T11:50:47.147426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:226: (dbg) TestIngressAddonLegacy/serial/ValidateIngressAddons: run=nginx healthy within 11.014317417s\n"} +{"Time":"2023-05-31T11:50:47.151096-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:238: (dbg) Run: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 ssh \"curl -s http://127.0.0.1/ -H 'Host: nginx.example.com'\"\n"} +{"Time":"2023-05-31T11:50:47.255459-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:262: (dbg) Run: kubectl --context ingress-addon-legacy-798000 replace --force -f testdata/ingress-dns-example-v1beta1.yaml\n"} +{"Time":"2023-05-31T11:50:47.370141-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:267: (dbg) Run: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 ip\n"} +{"Time":"2023-05-31T11:50:47.420546-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:273: (dbg) Run: nslookup hello-john.test 192.168.105.6\n"} +{"Time":"2023-05-31T11:51:02.461359-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:273: (dbg) Non-zero exit: nslookup hello-john.test 192.168.105.6: exit status 1 (15.040665541s)\n"} +{"Time":"2023-05-31T11:51:02.461416-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T11:51:02.461426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:51:02.461469-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t;; connection timed out; no servers could be reached\n"} +{"Time":"2023-05-31T11:51:02.461477-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:02.461483-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T11:51:02.46149-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:51:02.461497-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:275: failed to nslookup hello-john.test host. args \"nslookup hello-john.test 192.168.105.6\" : exit status 1\n"} +{"Time":"2023-05-31T11:51:02.461514-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:279: unexpected output from nslookup. stdout: ;; connection timed out; no servers could be reached\n"} +{"Time":"2023-05-31T11:51:02.461521-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T11:51:02.461528-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T11:51:02.461535-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" stderr: \n"} +{"Time":"2023-05-31T11:51:02.461542-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:282: (dbg) Run: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 addons disable ingress-dns --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T11:51:10.592427-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:282: (dbg) Done: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 addons disable ingress-dns --alsologtostderr -v=1: (8.131016208s)\n"} +{"Time":"2023-05-31T11:51:10.592452-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:287: (dbg) Run: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 addons disable ingress --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T11:51:17.652868-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" addons_test.go:287: (dbg) Done: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 addons disable ingress --alsologtostderr -v=1: (7.060365583s)\n"} +{"Time":"2023-05-31T11:51:17.652913-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:51:17.65292-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p ingress-addon-legacy-798000 -n ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:17.761744-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:244: \u003c\u003c\u003c TestIngressAddonLegacy/serial/ValidateIngressAddons FAILED: start of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T11:51:17.76176-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:245: ======\u003e post-mortem[TestIngressAddonLegacy/serial/ValidateIngressAddons]: minikube logs \u003c======\n"} +{"Time":"2023-05-31T11:51:17.761762-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:247: (dbg) Run: out/minikube-darwin-arm64 -p ingress-addon-legacy-798000 logs -n 25\n"} +{"Time":"2023-05-31T11:51:18.264708-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:252: TestIngressAddonLegacy/serial/ValidateIngressAddons logs: \n"} +{"Time":"2023-05-31T11:51:18.264733-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:51:18.264735-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.264736-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T11:51:18.264738-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* |----------------|------------------------------------------|-----------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:51:18.26474-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T11:51:18.264741-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t|----------------|------------------------------------------|-----------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:51:18.264743-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| dashboard | --url --port 36195 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264745-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | -p functional-730000 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264746-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264748-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| update-context | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264749-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | update-context | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.26475-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=2 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264752-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| update-context | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264754-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | update-context | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264755-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=2 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264757-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| update-context | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264758-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | update-context | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264759-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=2 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264761-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264762-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | image ls --format short | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264764-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264765-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264767-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | image ls --format json | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264768-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.26477-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264772-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | image ls --format table | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264775-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264776-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264778-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | image ls --format yaml | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264779-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264781-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| ssh | functional-730000 ssh pgrep | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | |\n"} +{"Time":"2023-05-31T11:51:18.264782-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | buildkitd | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264783-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | functional-730000 image build -t | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264785-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | localhost/my-image:functional-730000 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264786-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | testdata/build --alsologtostderr | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264788-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | functional-730000 image ls | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:47 PDT | 31 May 23 11:47 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264789-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| delete | -p functional-730000 | functional-730000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264791-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| start | -p image-844000 --driver=qemu2 | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264792-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264794-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | build -t aaa:latest | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264795-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | ./testdata/image-build/test-normal | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264797-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | -p image-844000 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264798-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | build -t aaa:latest | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264799-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --build-opt=build-arg=ENV_A=test_env_str | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264801-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --build-opt=no-cache | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264802-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | ./testdata/image-build/test-arg -p | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264804-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | image-844000 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264805-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | build -t aaa:latest | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264807-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | ./testdata/image-build/test-normal | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264808-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --build-opt=no-cache -p | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264812-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | image-844000 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264821-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| image | build -t aaa:latest | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264823-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | -f inner/Dockerfile | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264824-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | ./testdata/image-build/test-f | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264826-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | -p image-844000 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264827-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| delete | -p image-844000 | image-844000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:48 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264829-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| start | -p ingress-addon-legacy-798000 | ingress-addon-legacy-798000 | jenkins | v1.30.1 | 31 May 23 11:48 PDT | 31 May 23 11:50 PDT |\n"} +{"Time":"2023-05-31T11:51:18.26483-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --kubernetes-version=v1.18.20 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264832-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --memory=4096 --wait=true | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264833-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=5 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264835-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264836-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| addons | ingress-addon-legacy-798000 | ingress-addon-legacy-798000 | jenkins | v1.30.1 | 31 May 23 11:50 PDT | 31 May 23 11:50 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264838-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | addons enable ingress | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264839-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=5 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264842-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| addons | ingress-addon-legacy-798000 | ingress-addon-legacy-798000 | jenkins | v1.30.1 | 31 May 23 11:50 PDT | 31 May 23 11:50 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264846-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | addons enable ingress-dns | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264848-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=5 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.26485-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| ssh | ingress-addon-legacy-798000 | ingress-addon-legacy-798000 | jenkins | v1.30.1 | 31 May 23 11:50 PDT | 31 May 23 11:50 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264851-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | ssh curl -s http://127.0.0.1/ | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264853-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | -H 'Host: nginx.example.com' | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264854-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| ip | ingress-addon-legacy-798000 ip | ingress-addon-legacy-798000 | jenkins | v1.30.1 | 31 May 23 11:50 PDT | 31 May 23 11:50 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264856-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| addons | ingress-addon-legacy-798000 | ingress-addon-legacy-798000 | jenkins | v1.30.1 | 31 May 23 11:51 PDT | 31 May 23 11:51 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264857-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | addons disable ingress-dns | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264859-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.26486-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| addons | ingress-addon-legacy-798000 | ingress-addon-legacy-798000 | jenkins | v1.30.1 | 31 May 23 11:51 PDT | 31 May 23 11:51 PDT |\n"} +{"Time":"2023-05-31T11:51:18.264862-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | addons disable ingress | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264864-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t| | --alsologtostderr -v=1 | | | | | |\n"} +{"Time":"2023-05-31T11:51:18.264865-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t|----------------|------------------------------------------|-----------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T11:51:18.264867-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.264868-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.264869-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T11:51:18.264871-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* Log file created at: 2023/05/31 11:48:33\n"} +{"Time":"2023-05-31T11:51:18.264873-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tRunning on machine: MacOS-M1-Agent-1\n"} +{"Time":"2023-05-31T11:51:18.264874-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tBinary: Built with gc go1.20.4 for darwin/arm64\n"} +{"Time":"2023-05-31T11:51:18.264876-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T11:51:18.264877-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.436495 2237 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:51:18.264879-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.436624 2237 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:51:18.26488-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.436627 2237 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:51:18.264882-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.436630 2237 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:51:18.264883-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.436696 2237 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:51:18.264885-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.437707 2237 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:51:18.264886-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.453082 2237 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1084,\"bootTime\":1685557829,\"procs\":397,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:51:18.264894-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:48:33.453152 2237 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:51:18.264896-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.455931 2237 out.go:177] * [ingress-addon-legacy-798000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:51:18.264897-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.462721 2237 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:51:18.264899-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.466859 2237 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.2649-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.462811 2237 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:51:18.264901-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.483855 2237 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:51:18.264903-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.487004 2237 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:51:18.264904-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.489935 2237 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:51:18.264905-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.491098 2237 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:51:18.264907-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.494049 2237 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:51:18.264911-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.497897 2237 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:51:18.264914-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.502878 2237 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:51:18.264915-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.502883 2237 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:51:18.264917-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.502890 2237 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:51:18.264918-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.504817 2237 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:51:18.26492-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.507886 2237 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:51:18.264921-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.511018 2237 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T11:51:18.264923-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.511039 2237 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:51:18.264924-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.511049 2237 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T11:51:18.264926-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.511054 2237 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:51:18.264929-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t{Name:ingress-addon-legacy-798000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4096 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.18.20 ClusterName:ingress-addon-legacy-798000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.loc"} +{"Time":"2023-05-31T11:51:18.264933-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"al ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP"} +{"Time":"2023-05-31T11:51:18.264935-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":":}\n"} +{"Time":"2023-05-31T11:51:18.264937-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.511161 2237 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.264938-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.518874 2237 out.go:177] * Starting control plane node ingress-addon-legacy-798000 in cluster ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.26494-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.522877 2237 preload.go:132] Checking if preload exists for k8s version v1.18.20 and runtime docker\n"} +{"Time":"2023-05-31T11:51:18.264941-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.645537 2237 preload.go:119] Found remote preload: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.18.20/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.264943-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.645575 2237 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:51:18.264945-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.645939 2237 preload.go:132] Checking if preload exists for k8s version v1.18.20 and runtime docker\n"} +{"Time":"2023-05-31T11:51:18.264946-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.650676 2237 out.go:177] * Downloading Kubernetes v1.18.20 preload ...\n"} +{"Time":"2023-05-31T11:51:18.264948-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.657516 2237 preload.go:238] getting checksum for preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:51:18.264949-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:33.794668 2237 download.go:107] Downloading: https://storage.googleapis.com/minikube-preloaded-volume-tarballs/v18/v1.18.20/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4?checksum=md5:c8c260b886393123ce9d312d8ac2379e -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.264951-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.150451 2237 preload.go:249] saving checksum for preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:51:18.264953-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.150575 2237 preload.go:256] verifying checksum of /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4 ...\n"} +{"Time":"2023-05-31T11:51:18.264954-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.899023 2237 cache.go:60] Finished verifying existence of preloaded tar for v1.18.20 on docker\n"} +{"Time":"2023-05-31T11:51:18.264956-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.899201 2237 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/config.json ...\n"} +{"Time":"2023-05-31T11:51:18.264958-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.899222 2237 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/config.json: {Name:mkcc876d570b2eeefeb48541bafbaf1c7de48e27 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.264959-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.899457 2237 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:51:18.264961-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.899469 2237 start.go:364] acquiring machines lock for ingress-addon-legacy-798000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.264966-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.899496 2237 start.go:368] acquired machines lock for \"ingress-addon-legacy-798000\" in 23µs\n"} +{"Time":"2023-05-31T11:51:18.264969-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.899506 2237 start.go:93] Provisioning new machine with config: \u0026{Name:ingress-addon-legacy-798000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4096 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 K"} +{"Time":"2023-05-31T11:51:18.264972-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"ubernetesConfig:{KubernetesVersion:v1.18.20 ClusterName:ingress-addon-legacy-798000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.18.20 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:doc"} +{"Time":"2023-05-31T11:51:18.264975-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"ker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.18.20 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:51:18.264977-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.899547 2237 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:51:18.264979-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.908248 2237 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=4096MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:51:18.26498-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.922953 2237 start.go:159] libmachine.API.Create for \"ingress-addon-legacy-798000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:51:18.264982-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.922971 2237 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:51:18.264983-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.923062 2237 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:51:18.264985-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.923080 2237 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:51:18.264986-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.923093 2237 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:51:18.264988-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.923133 2237 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:51:18.264989-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.923147 2237 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:51:18.264991-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.923157 2237 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:51:18.264992-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:50.923528 2237 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:51:18.264994-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.153466 2237 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:51:18.264995-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.183503 2237 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:51:18.264997-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.183509 2237 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:51:18.264998-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.183648 2237 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/disk.qcow2\n"} +{"Time":"2023-05-31T11:51:18.265-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.192053 2237 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:51:18.265001-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.192070 2237 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:51:18.265003-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.192123 2237 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:51:18.265004-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.199231 2237 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:51:18.265005-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265006-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.199257 2237 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:51:18.265008-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.199280 2237 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/disk.qcow2\n"} +{"Time":"2023-05-31T11:51:18.26501-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.199286 2237 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:51:18.265012-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.199325 2237 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 4096 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/qemu.pid -device virtio-net-pci,netdev=net0,mac=ae:3b:87:5d:47:b2 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/disk.qcow2\n"} +{"Time":"2023-05-31T11:51:18.265014-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234027 2237 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:51:18.265018-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234054 2237 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:51:18.265019-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234067 2237 main.go:141] libmachine: Attempt 0\n"} +{"Time":"2023-05-31T11:51:18.265021-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234082 2237 main.go:141] libmachine: Searching for ae:3b:87:5d:47:b2 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:51:18.265022-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234153 2237 main.go:141] libmachine: Found 4 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:51:18.265024-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234185 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.5 HWAddress:8e:ee:eb:7:18:3e ID:1,8e:ee:eb:7:18:3e Lease:0x6478e7ec}\n"} +{"Time":"2023-05-31T11:51:18.265025-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234191 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:51:18.265027-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234198 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:51:18.265028-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:51.234204 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:51:18.26503-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:53.236323 2237 main.go:141] libmachine: Attempt 1\n"} +{"Time":"2023-05-31T11:51:18.265031-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:53.236405 2237 main.go:141] libmachine: Searching for ae:3b:87:5d:47:b2 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:51:18.265033-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:53.236764 2237 main.go:141] libmachine: Found 4 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:51:18.265035-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:53.236810 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.5 HWAddress:8e:ee:eb:7:18:3e ID:1,8e:ee:eb:7:18:3e Lease:0x6478e7ec}\n"} +{"Time":"2023-05-31T11:51:18.265036-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:53.236923 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:51:18.265038-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:53.236955 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:51:18.265039-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:53.236983 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:51:18.265041-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:55.239154 2237 main.go:141] libmachine: Attempt 2\n"} +{"Time":"2023-05-31T11:51:18.265042-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:55.239182 2237 main.go:141] libmachine: Searching for ae:3b:87:5d:47:b2 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:51:18.265043-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:55.239302 2237 main.go:141] libmachine: Found 4 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:51:18.265045-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:55.239314 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.5 HWAddress:8e:ee:eb:7:18:3e ID:1,8e:ee:eb:7:18:3e Lease:0x6478e7ec}\n"} +{"Time":"2023-05-31T11:51:18.265046-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:55.239319 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:51:18.265048-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:55.239335 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:51:18.265049-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:55.239356 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:51:18.265051-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:57.241363 2237 main.go:141] libmachine: Attempt 3\n"} +{"Time":"2023-05-31T11:51:18.265052-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:57.241375 2237 main.go:141] libmachine: Searching for ae:3b:87:5d:47:b2 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:51:18.265053-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:57.241406 2237 main.go:141] libmachine: Found 4 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:51:18.265055-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:57.241413 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.5 HWAddress:8e:ee:eb:7:18:3e ID:1,8e:ee:eb:7:18:3e Lease:0x6478e7ec}\n"} +{"Time":"2023-05-31T11:51:18.265056-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:57.241418 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:51:18.265058-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:57.241423 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:51:18.26506-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:57.241429 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:51:18.265061-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:59.243420 2237 main.go:141] libmachine: Attempt 4\n"} +{"Time":"2023-05-31T11:51:18.265062-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:59.243432 2237 main.go:141] libmachine: Searching for ae:3b:87:5d:47:b2 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:51:18.265064-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:59.243464 2237 main.go:141] libmachine: Found 4 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:51:18.265065-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:59.243469 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.5 HWAddress:8e:ee:eb:7:18:3e ID:1,8e:ee:eb:7:18:3e Lease:0x6478e7ec}\n"} +{"Time":"2023-05-31T11:51:18.265067-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:59.243474 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:51:18.265069-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:59.243480 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:51:18.265071-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:48:59.243486 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:51:18.265072-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:01.245499 2237 main.go:141] libmachine: Attempt 5\n"} +{"Time":"2023-05-31T11:51:18.265073-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:01.245519 2237 main.go:141] libmachine: Searching for ae:3b:87:5d:47:b2 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:51:18.265075-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:01.245603 2237 main.go:141] libmachine: Found 4 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:51:18.265079-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:01.245612 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.5 HWAddress:8e:ee:eb:7:18:3e ID:1,8e:ee:eb:7:18:3e Lease:0x6478e7ec}\n"} +{"Time":"2023-05-31T11:51:18.265081-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:01.245616 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.4 HWAddress:96:fd:9e:f9:3:60 ID:1,96:fd:9e:f9:3:60 Lease:0x6478e731}\n"} +{"Time":"2023-05-31T11:51:18.265082-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:01.245624 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.3 HWAddress:8a:b4:e0:d9:40:4 ID:1,8a:b4:e0:d9:40:4 Lease:0x647795a4}\n"} +{"Time":"2023-05-31T11:51:18.265084-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:01.245638 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.2 HWAddress:56:da:28:8:b0:67 ID:1,56:da:28:8:b0:67 Lease:0x6478e6d9}\n"} +{"Time":"2023-05-31T11:51:18.265085-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:03.247702 2237 main.go:141] libmachine: Attempt 6\n"} +{"Time":"2023-05-31T11:51:18.265089-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:03.247751 2237 main.go:141] libmachine: Searching for ae:3b:87:5d:47:b2 in /var/db/dhcpd_leases ...\n"} +{"Time":"2023-05-31T11:51:18.26509-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:03.247903 2237 main.go:141] libmachine: Found 5 entries in /var/db/dhcpd_leases!\n"} +{"Time":"2023-05-31T11:51:18.265092-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:03.247913 2237 main.go:141] libmachine: dhcp entry: {Name:minikube IPAddress:192.168.105.6 HWAddress:ae:3b:87:5d:47:b2 ID:1,ae:3b:87:5d:47:b2 Lease:0x6478e81e}\n"} +{"Time":"2023-05-31T11:51:18.265093-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:03.247917 2237 main.go:141] libmachine: Found match: ae:3b:87:5d:47:b2\n"} +{"Time":"2023-05-31T11:51:18.265095-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:03.247929 2237 main.go:141] libmachine: IP: 192.168.105.6\n"} +{"Time":"2023-05-31T11:51:18.265096-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:03.247935 2237 main.go:141] libmachine: Waiting for VM to start (ssh -p 22 docker@192.168.105.6)...\n"} +{"Time":"2023-05-31T11:51:18.265098-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.255455 2237 machine.go:88] provisioning docker machine ...\n"} +{"Time":"2023-05-31T11:51:18.265099-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.255480 2237 buildroot.go:166] provisioning hostname \"ingress-addon-legacy-798000\"\n"} +{"Time":"2023-05-31T11:51:18.265101-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.255536 2237 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:51:18.265102-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.255864 2237 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x10117c6d0] 0x10117f130 \u003cnil\u003e [] 0s} 192.168.105.6 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.265104-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.255871 2237 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:51:18.265105-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tsudo hostname ingress-addon-legacy-798000 \u0026\u0026 echo \"ingress-addon-legacy-798000\" | sudo tee /etc/hostname\n"} +{"Time":"2023-05-31T11:51:18.265107-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.314182 2237 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.265108-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.26511-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.314241 2237 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:51:18.265111-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.314516 2237 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x10117c6d0] 0x10117f130 \u003cnil\u003e [] 0s} 192.168.105.6 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.265113-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.314526 2237 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:51:18.265114-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265115-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\t\tif ! grep -xq '.*\\singress-addon-legacy-798000' /etc/hosts; then\n"} +{"Time":"2023-05-31T11:51:18.265116-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\t\t\tif grep -xq '127.0.1.1\\s.*' /etc/hosts; then\n"} +{"Time":"2023-05-31T11:51:18.265118-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\t\t\t\tsudo sed -i 's/^127.0.1.1\\s.*/127.0.1.1 ingress-addon-legacy-798000/g' /etc/hosts;\n"} +{"Time":"2023-05-31T11:51:18.265119-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\t\t\telse \n"} +{"Time":"2023-05-31T11:51:18.265121-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\t\t\t\techo '127.0.1.1 ingress-addon-legacy-798000' | sudo tee -a /etc/hosts; \n"} +{"Time":"2023-05-31T11:51:18.265122-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\t\t\tfi\n"} +{"Time":"2023-05-31T11:51:18.265123-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\t\tfi\n"} +{"Time":"2023-05-31T11:51:18.265124-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370532 2237 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: \n"} +{"Time":"2023-05-31T11:51:18.265127-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370546 2237 buildroot.go:172] set auth options {CertDir:/Users/jenkins/minikube-integration/16569-1035/.minikube CaCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem CaPrivateKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem CaCertRemotePath:/etc/docker/ca.pem ServerCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem ServerKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server-key.pem ClientKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem ServerCertRemotePath:/etc/docker/server.pem ServerKeyRemotePath:/etc/docker/server-key.pem ClientCertPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem ServerCertSANs:[] StorePath:/Users/jenkins/minikube-integration/16569-1035/.minikube}\n"} +{"Time":"2023-05-31T11:51:18.265131-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370554 2237 buildroot.go:174] setting up certificates\n"} +{"Time":"2023-05-31T11:51:18.265133-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370562 2237 provision.go:83] configureAuth start\n"} +{"Time":"2023-05-31T11:51:18.265134-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370569 2237 provision.go:138] copyHostCerts\n"} +{"Time":"2023-05-31T11:51:18.265136-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370596 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.pem\n"} +{"Time":"2023-05-31T11:51:18.265139-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370640 2237 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.pem, removing ...\n"} +{"Time":"2023-05-31T11:51:18.26514-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370645 2237 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.pem\n"} +{"Time":"2023-05-31T11:51:18.265142-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370777 2237 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:51:18.265144-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370953 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cert.pem\n"} +{"Time":"2023-05-31T11:51:18.265145-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370981 2237 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1035/.minikube/cert.pem, removing ...\n"} +{"Time":"2023-05-31T11:51:18.265147-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.370984 2237 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1035/.minikube/cert.pem\n"} +{"Time":"2023-05-31T11:51:18.265148-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.371036 2237 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T11:51:18.26515-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.371119 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/key.pem\n"} +{"Time":"2023-05-31T11:51:18.265152-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.371148 2237 exec_runner.go:144] found /Users/jenkins/minikube-integration/16569-1035/.minikube/key.pem, removing ...\n"} +{"Time":"2023-05-31T11:51:18.265153-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.371152 2237 exec_runner.go:203] rm: /Users/jenkins/minikube-integration/16569-1035/.minikube/key.pem\n"} +{"Time":"2023-05-31T11:51:18.265155-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.371202 2237 exec_runner.go:151] cp: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem --\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:51:18.265157-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.371280 2237 provision.go:112] generating server cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem ca-key=/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem private-key=/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem org=jenkins.ingress-addon-legacy-798000 san=[192.168.105.6 192.168.105.6 localhost 127.0.0.1 minikube ingress-addon-legacy-798000]\n"} +{"Time":"2023-05-31T11:51:18.265159-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.447082 2237 provision.go:172] copyRemoteCerts\n"} +{"Time":"2023-05-31T11:51:18.26516-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.447121 2237 ssh_runner.go:195] Run: sudo mkdir -p /etc/docker /etc/docker /etc/docker\n"} +{"Time":"2023-05-31T11:51:18.265162-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.447128 2237 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.6 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:51:18.265164-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.474749 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem -\u003e /etc/docker/ca.pem\n"} +{"Time":"2023-05-31T11:51:18.265165-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.474803 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem --\u003e /etc/docker/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:51:18.265167-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.481657 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem -\u003e /etc/docker/server.pem\n"} +{"Time":"2023-05-31T11:51:18.265168-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.481694 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server.pem --\u003e /etc/docker/server.pem (1253 bytes)\n"} +{"Time":"2023-05-31T11:51:18.26517-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.488212 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server-key.pem -\u003e /etc/docker/server-key.pem\n"} +{"Time":"2023-05-31T11:51:18.265172-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.488246 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/server-key.pem --\u003e /etc/docker/server-key.pem (1679 bytes)\n"} +{"Time":"2023-05-31T11:51:18.265173-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.495531 2237 provision.go:86] duration metric: configureAuth took 124.959167ms\n"} +{"Time":"2023-05-31T11:51:18.265175-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.495538 2237 buildroot.go:189] setting minikube options for container-runtime\n"} +{"Time":"2023-05-31T11:51:18.265176-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.495635 2237 config.go:182] Loaded profile config \"ingress-addon-legacy-798000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.265178-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.495665 2237 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:51:18.265179-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.495890 2237 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x10117c6d0] 0x10117f130 \u003cnil\u003e [] 0s} 192.168.105.6 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.265181-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.495895 2237 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:51:18.265182-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tdf --output=fstype / | tail -n 1\n"} +{"Time":"2023-05-31T11:51:18.265183-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.548127 2237 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: tmpfs\n"} +{"Time":"2023-05-31T11:51:18.265185-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265186-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.548135 2237 buildroot.go:70] root file system type: tmpfs\n"} +{"Time":"2023-05-31T11:51:18.265187-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.548188 2237 provision.go:309] Updating docker unit: /lib/systemd/system/docker.service ...\n"} +{"Time":"2023-05-31T11:51:18.265189-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.548232 2237 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:51:18.26519-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.548459 2237 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x10117c6d0] 0x10117f130 \u003cnil\u003e [] 0s} 192.168.105.6 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.265192-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.548511 2237 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:51:18.265193-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tsudo mkdir -p /lib/systemd/system \u0026\u0026 printf %!s(MISSING) \"[Unit]\n"} +{"Time":"2023-05-31T11:51:18.265195-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:51:18.265196-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:51:18.265197-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tAfter=network.target minikube-automount.service docker.socket\n"} +{"Time":"2023-05-31T11:51:18.265199-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tRequires= minikube-automount.service docker.socket \n"} +{"Time":"2023-05-31T11:51:18.265203-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T11:51:18.265204-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:51:18.265205-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265207-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:51:18.265224-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tType=notify\n"} +{"Time":"2023-05-31T11:51:18.265228-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T11:51:18.26523-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265231-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265232-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265233-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:51:18.265235-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:51:18.265237-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:51:18.265238-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:51:18.26524-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:51:18.265241-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:51:18.265243-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:51:18.265244-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265245-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:51:18.265246-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:51:18.265248-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:51:18.265249-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=qemu2 --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:51:18.265251-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tExecReload=/bin/kill -s HUP \\$MAINPID\n"} +{"Time":"2023-05-31T11:51:18.265252-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265313-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:51:18.265317-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:51:18.265319-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T11:51:18.26532-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:51:18.265321-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T11:51:18.265323-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265324-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:51:18.265325-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:51:18.265328-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T11:51:18.265329-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:51:18.265331-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265332-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:51:18.265333-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T11:51:18.265335-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265336-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:51:18.265337-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T11:51:18.265338-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.26534-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:51:18.265341-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:51:18.265342-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\" | sudo tee /lib/systemd/system/docker.service.new\n"} +{"Time":"2023-05-31T11:51:18.265344-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.605903 2237 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: [Unit]\n"} +{"Time":"2023-05-31T11:51:18.265345-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tDescription=Docker Application Container Engine\n"} +{"Time":"2023-05-31T11:51:18.265437-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tDocumentation=https://docs.docker.com\n"} +{"Time":"2023-05-31T11:51:18.26544-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tAfter=network.target minikube-automount.service docker.socket\n"} +{"Time":"2023-05-31T11:51:18.265441-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tRequires= minikube-automount.service docker.socket \n"} +{"Time":"2023-05-31T11:51:18.265442-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tStartLimitBurst=3\n"} +{"Time":"2023-05-31T11:51:18.265444-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tStartLimitIntervalSec=60\n"} +{"Time":"2023-05-31T11:51:18.265445-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265446-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:51:18.265448-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tType=notify\n"} +{"Time":"2023-05-31T11:51:18.265449-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tRestart=on-failure\n"} +{"Time":"2023-05-31T11:51:18.26545-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265451-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265453-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265454-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# This file is a systemd drop-in unit that inherits from the base dockerd configuration.\n"} +{"Time":"2023-05-31T11:51:18.265455-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# The base configuration already specifies an 'ExecStart=...' command. The first directive\n"} +{"Time":"2023-05-31T11:51:18.265457-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# here is to clear out that command inherited from the base configuration. Without this,\n"} +{"Time":"2023-05-31T11:51:18.265458-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# the command from the base configuration and the command specified here are treated as\n"} +{"Time":"2023-05-31T11:51:18.265462-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# a sequence of commands, which is not the desired behavior, nor is it valid -- systemd\n"} +{"Time":"2023-05-31T11:51:18.265464-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# will catch this invalid input and refuse to start the service with an error like:\n"} +{"Time":"2023-05-31T11:51:18.265465-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Service has more than one ExecStart= setting, which is only allowed for Type=oneshot services.\n"} +{"Time":"2023-05-31T11:51:18.265466-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265468-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# NOTE: default-ulimit=nofile is set to an arbitrary number for consistency with other\n"} +{"Time":"2023-05-31T11:51:18.265526-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# container runtimes. If left unlimited, it may result in OOM issues with MySQL.\n"} +{"Time":"2023-05-31T11:51:18.265546-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:51:18.265547-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tExecStart=/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock --default-ulimit=nofile=1048576:1048576 --tlsverify --tlscacert /etc/docker/ca.pem --tlscert /etc/docker/server.pem --tlskey /etc/docker/server-key.pem --label provider=qemu2 --insecure-registry 10.96.0.0/12 \n"} +{"Time":"2023-05-31T11:51:18.265549-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tExecReload=/bin/kill -s HUP $MAINPID\n"} +{"Time":"2023-05-31T11:51:18.26555-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265552-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Having non-zero Limit*s causes performance problems due to accounting overhead\n"} +{"Time":"2023-05-31T11:51:18.265553-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# in the kernel. We recommend using cgroups to do container-local accounting.\n"} +{"Time":"2023-05-31T11:51:18.265555-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLimitNOFILE=infinity\n"} +{"Time":"2023-05-31T11:51:18.265556-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLimitNPROC=infinity\n"} +{"Time":"2023-05-31T11:51:18.265557-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLimitCORE=infinity\n"} +{"Time":"2023-05-31T11:51:18.265558-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265559-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Uncomment TasksMax if your systemd version supports it.\n"} +{"Time":"2023-05-31T11:51:18.265561-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Only systemd 226 and above support this version.\n"} +{"Time":"2023-05-31T11:51:18.265562-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tTasksMax=infinity\n"} +{"Time":"2023-05-31T11:51:18.265563-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tTimeoutStartSec=0\n"} +{"Time":"2023-05-31T11:51:18.265564-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265566-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# set delegate yes so that systemd does not reset the cgroups of docker containers\n"} +{"Time":"2023-05-31T11:51:18.265567-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tDelegate=yes\n"} +{"Time":"2023-05-31T11:51:18.265568-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.26557-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# kill only the docker process, not all processes in the cgroup\n"} +{"Time":"2023-05-31T11:51:18.265571-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tKillMode=process\n"} +{"Time":"2023-05-31T11:51:18.265625-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265627-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:51:18.265629-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tWantedBy=multi-user.target\n"} +{"Time":"2023-05-31T11:51:18.26563-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265631-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.605944 2237 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:51:18.265633-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.606187 2237 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x10117c6d0] 0x10117f130 \u003cnil\u003e [] 0s} 192.168.105.6 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.265635-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.606196 2237 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:51:18.265636-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tsudo diff -u /lib/systemd/system/docker.service /lib/systemd/system/docker.service.new || { sudo mv /lib/systemd/system/docker.service.new /lib/systemd/system/docker.service; sudo systemctl -f daemon-reload \u0026\u0026 sudo systemctl -f enable docker \u0026\u0026 sudo systemctl -f restart docker; }\n"} +{"Time":"2023-05-31T11:51:18.265638-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.957414 2237 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: diff: can't stat '/lib/systemd/system/docker.service': No such file or directory\n"} +{"Time":"2023-05-31T11:51:18.26564-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tCreated symlink /etc/systemd/system/multi-user.target.wants/docker.service → /usr/lib/systemd/system/docker.service.\n"} +{"Time":"2023-05-31T11:51:18.265641-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265642-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.957430 2237 machine.go:91] provisioned docker machine in 701.974125ms\n"} +{"Time":"2023-05-31T11:51:18.265644-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.957435 2237 client.go:171] LocalClient.Create took 14.034664083s\n"} +{"Time":"2023-05-31T11:51:18.265646-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.957455 2237 start.go:167] duration metric: libmachine.API.Create for \"ingress-addon-legacy-798000\" took 14.03470575s\n"} +{"Time":"2023-05-31T11:51:18.265647-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.957461 2237 start.go:300] post-start starting for \"ingress-addon-legacy-798000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:51:18.265689-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.957465 2237 start.go:328] creating required directories: [/etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs]\n"} +{"Time":"2023-05-31T11:51:18.26571-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.957529 2237 ssh_runner.go:195] Run: sudo mkdir -p /etc/kubernetes/addons /etc/kubernetes/manifests /var/tmp/minikube /var/lib/minikube /var/lib/minikube/certs /var/lib/minikube/images /var/lib/minikube/binaries /tmp/gvisor /usr/share/ca-certificates /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:51:18.265717-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.957538 2237 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.6 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:51:18.265718-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.987093 2237 ssh_runner.go:195] Run: cat /etc/os-release\n"} +{"Time":"2023-05-31T11:51:18.26572-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.988406 2237 info.go:137] Remote host: Buildroot 2021.02.12\n"} +{"Time":"2023-05-31T11:51:18.265721-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.988416 2237 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1035/.minikube/addons for local assets ...\n"} +{"Time":"2023-05-31T11:51:18.265723-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.988483 2237 filesync.go:126] Scanning /Users/jenkins/minikube-integration/16569-1035/.minikube/files for local assets ...\n"} +{"Time":"2023-05-31T11:51:18.265724-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.988584 2237 filesync.go:149] local asset: /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem -\u003e 14772.pem in /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:51:18.265726-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.988589 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem -\u003e /etc/ssl/certs/14772.pem\n"} +{"Time":"2023-05-31T11:51:18.265727-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.988695 2237 ssh_runner.go:195] Run: sudo mkdir -p /etc/ssl/certs\n"} +{"Time":"2023-05-31T11:51:18.265729-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.991305 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem --\u003e /etc/ssl/certs/14772.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:51:18.26573-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.998062 2237 start.go:303] post-start completed in 40.596125ms\n"} +{"Time":"2023-05-31T11:51:18.265732-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.998476 2237 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/config.json ...\n"} +{"Time":"2023-05-31T11:51:18.26577-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.998638 2237 start.go:128] duration metric: createHost completed in 14.099291209s\n"} +{"Time":"2023-05-31T11:51:18.265773-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.998660 2237 main.go:141] libmachine: Using SSH client type: native\n"} +{"Time":"2023-05-31T11:51:18.265775-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.998892 2237 main.go:141] libmachine: \u0026{{{\u003cnil\u003e 0 [] [] []} docker [0x10117c6d0] 0x10117f130 \u003cnil\u003e [] 0s} 192.168.105.6 22 \u003cnil\u003e \u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.265776-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:04.998896 2237 main.go:141] libmachine: About to run SSH command:\n"} +{"Time":"2023-05-31T11:51:18.265778-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tdate +%!s(MISSING).%!N(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.265779-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049139 2237 main.go:141] libmachine: SSH cmd err, output: \u003cnil\u003e: 1685558945.458723376\n"} +{"Time":"2023-05-31T11:51:18.265781-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.265782-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049149 2237 fix.go:207] guest clock: 1685558945.458723376\n"} +{"Time":"2023-05-31T11:51:18.265784-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049153 2237 fix.go:220] Guest: 2023-05-31 11:49:05.458723376 -0700 PDT Remote: 2023-05-31 11:49:04.99864 -0700 PDT m=+31.582336376 (delta=460.083376ms)\n"} +{"Time":"2023-05-31T11:51:18.265785-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049165 2237 fix.go:191] guest clock delta is within tolerance: 460.083376ms\n"} +{"Time":"2023-05-31T11:51:18.265786-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049168 2237 start.go:83] releasing machines lock for \"ingress-addon-legacy-798000\", held for 14.149872709s\n"} +{"Time":"2023-05-31T11:51:18.265788-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049504 2237 ssh_runner.go:195] Run: cat /version.json\n"} +{"Time":"2023-05-31T11:51:18.265789-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049512 2237 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.6 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:51:18.265791-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049566 2237 ssh_runner.go:195] Run: curl -sS -m 2 https://registry.k8s.io/\n"} +{"Time":"2023-05-31T11:51:18.265793-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.049591 2237 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.6 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:51:18.265853-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.120658 2237 ssh_runner.go:195] Run: systemctl --version\n"} +{"Time":"2023-05-31T11:51:18.265876-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.122815 2237 ssh_runner.go:195] Run: sh -c \"stat /etc/cni/net.d/*loopback.conf*\"\n"} +{"Time":"2023-05-31T11:51:18.265884-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:05.124731 2237 cni.go:208] loopback cni configuration skipped: \"/etc/cni/net.d/*loopback.conf*\" not found\n"} +{"Time":"2023-05-31T11:51:18.265899-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.124763 2237 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *bridge* -not -name *podman* -not -name *.mk_disabled -printf \"%!p(MISSING), \" -exec sh -c \"sudo sed -i -r -e '/\"dst\": \".*:.*\"/d' -e 's|^(.*)\"dst\": (.*)[,*]$|\\1\"dst\": \\2|g' -e '/\"subnet\": \".*:.*\"/d' -e 's|^(.*)\"subnet\": \".*\"(.*)[,*]$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T11:51:18.265918-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.128133 2237 ssh_runner.go:195] Run: sudo find /etc/cni/net.d -maxdepth 1 -type f -name *podman* -not -name *.mk_disabled -printf \"%!p(MISSING), \" -exec sh -c \"sudo sed -i -r -e 's|^(.*)\"subnet\": \".*\"(.*)$|\\1\"subnet\": \"10.244.0.0/16\"\\2|g' -e 's|^(.*)\"gateway\": \".*\"(.*)$|\\1\"gateway\": \"10.244.0.1\"\\2|g' {}\" ;\n"} +{"Time":"2023-05-31T11:51:18.265923-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.133265 2237 cni.go:307] configured [/etc/cni/net.d/87-podman-bridge.conflist] bridge cni config(s)\n"} +{"Time":"2023-05-31T11:51:18.265925-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.133273 2237 preload.go:132] Checking if preload exists for k8s version v1.18.20 and runtime docker\n"} +{"Time":"2023-05-31T11:51:18.265926-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.133344 2237 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:51:18.265928-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.150104 2237 docker.go:633] Got preloaded images: \n"} +{"Time":"2023-05-31T11:51:18.265929-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.150116 2237 docker.go:639] registry.k8s.io/kube-apiserver:v1.18.20 wasn't preloaded\n"} +{"Time":"2023-05-31T11:51:18.265931-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.150169 2237 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:51:18.265932-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.153186 2237 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T11:51:18.265934-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.154420 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4 -\u003e /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.265944-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.154516 2237 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.265946-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.155740 2237 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T11:51:18.265947-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:51:18.265949-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.26595-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:51:18.265951-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T11:51:18.265953-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:05.155751 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4 --\u003e /preloaded.tar.lz4 (459739018 bytes)\n"} +{"Time":"2023-05-31T11:51:18.265955-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:06.859692 2237 docker.go:597] Took 1.705238 seconds to copy over tarball\n"} +{"Time":"2023-05-31T11:51:18.265957-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:06.859749 2237 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.26596-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:08.182679 2237 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (1.322933708s)\n"} +{"Time":"2023-05-31T11:51:18.265962-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:08.182693 2237 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.265963-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:08.203714 2237 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:51:18.265965-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:08.208142 2237 ssh_runner.go:362] scp memory --\u003e /var/lib/docker/image/overlay2/repositories.json (2502 bytes)\n"} +{"Time":"2023-05-31T11:51:18.265966-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:08.215917 2237 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:51:18.265968-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:08.302591 2237 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:51:18.265969-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.850303 2237 ssh_runner.go:235] Completed: sudo systemctl restart docker: (1.54771825s)\n"} +{"Time":"2023-05-31T11:51:18.266037-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.850331 2237 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T11:51:18.266055-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.850402 2237 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///run/containerd/containerd.sock\n"} +{"Time":"2023-05-31T11:51:18.266057-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T11:51:18.266059-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.855938 2237 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)sandbox_image = .*$|\\1sandbox_image = \"registry.k8s.io/pause:3.2\"|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:51:18.266061-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.859465 2237 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)restrict_oom_score_adj = .*$|\\1restrict_oom_score_adj = false|' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:51:18.266062-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.862921 2237 containerd.go:145] configuring containerd to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T11:51:18.266064-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.862955 2237 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)SystemdCgroup = .*$|\\1SystemdCgroup = false|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:51:18.266066-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.865934 2237 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runtime.v1.linux\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:51:18.266067-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.868744 2237 ssh_runner.go:195] Run: sh -c \"sudo sed -i '/systemd_cgroup/d' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:51:18.266069-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.871974 2237 ssh_runner.go:195] Run: sh -c \"sudo sed -i 's|\"io.containerd.runc.v1\"|\"io.containerd.runc.v2\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:51:18.26607-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.875475 2237 ssh_runner.go:195] Run: sh -c \"sudo rm -rf /etc/cni/net.mk\"\n"} +{"Time":"2023-05-31T11:51:18.266072-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.879115 2237 ssh_runner.go:195] Run: sh -c \"sudo sed -i -r 's|^( *)conf_dir = .*$|\\1conf_dir = \"/etc/cni/net.d\"|g' /etc/containerd/config.toml\"\n"} +{"Time":"2023-05-31T11:51:18.266073-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.882389 2237 ssh_runner.go:195] Run: sudo sysctl net.bridge.bridge-nf-call-iptables\n"} +{"Time":"2023-05-31T11:51:18.266075-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.884978 2237 ssh_runner.go:195] Run: sudo sh -c \"echo 1 \u003e /proc/sys/net/ipv4/ip_forward\"\n"} +{"Time":"2023-05-31T11:51:18.266149-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.887944 2237 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:51:18.266152-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.945227 2237 ssh_runner.go:195] Run: sudo systemctl restart containerd\n"} +{"Time":"2023-05-31T11:51:18.266154-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.955346 2237 start.go:481] detecting cgroup driver to use...\n"} +{"Time":"2023-05-31T11:51:18.266155-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.955411 2237 ssh_runner.go:195] Run: sudo systemctl cat docker.service\n"} +{"Time":"2023-05-31T11:51:18.266157-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.961603 2237 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service containerd\n"} +{"Time":"2023-05-31T11:51:18.266158-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.969416 2237 ssh_runner.go:195] Run: sudo systemctl stop -f containerd\n"} +{"Time":"2023-05-31T11:51:18.26616-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.975287 2237 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service containerd\n"} +{"Time":"2023-05-31T11:51:18.266161-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.979915 2237 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T11:51:18.266162-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:09.984679 2237 ssh_runner.go:195] Run: sudo systemctl stop -f crio\n"} +{"Time":"2023-05-31T11:51:18.266164-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.036412 2237 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service crio\n"} +{"Time":"2023-05-31T11:51:18.266165-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.042107 2237 ssh_runner.go:195] Run: /bin/bash -c \"sudo mkdir -p /etc \u0026\u0026 printf %!s(MISSING) \"runtime-endpoint: unix:///var/run/dockershim.sock\n"} +{"Time":"2023-05-31T11:51:18.266167-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\" | sudo tee /etc/crictl.yaml\"\n"} +{"Time":"2023-05-31T11:51:18.266168-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.047687 2237 ssh_runner.go:195] Run: which cri-dockerd\n"} +{"Time":"2023-05-31T11:51:18.26617-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.049055 2237 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/cri-docker.service.d\n"} +{"Time":"2023-05-31T11:51:18.266171-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.051877 2237 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/cri-docker.service.d/10-cni.conf (189 bytes)\n"} +{"Time":"2023-05-31T11:51:18.266173-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.056928 2237 ssh_runner.go:195] Run: sudo systemctl unmask docker.service\n"} +{"Time":"2023-05-31T11:51:18.266214-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.123360 2237 ssh_runner.go:195] Run: sudo systemctl enable docker.socket\n"} +{"Time":"2023-05-31T11:51:18.266216-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.209615 2237 docker.go:532] configuring docker to use \"cgroupfs\" as cgroup driver...\n"} +{"Time":"2023-05-31T11:51:18.266218-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.209632 2237 ssh_runner.go:362] scp memory --\u003e /etc/docker/daemon.json (144 bytes)\n"} +{"Time":"2023-05-31T11:51:18.266219-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.214813 2237 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:51:18.266221-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:10.278186 2237 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:51:18.266222-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.443744 2237 ssh_runner.go:235] Completed: sudo systemctl restart docker: (1.165559083s)\n"} +{"Time":"2023-05-31T11:51:18.266223-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.443813 2237 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T11:51:18.266225-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.451381 2237 ssh_runner.go:195] Run: docker version --format {{.Server.Version}}\n"} +{"Time":"2023-05-31T11:51:18.266226-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.462512 2237 out.go:204] * Preparing Kubernetes v1.18.20 on Docker 24.0.1 ...\n"} +{"Time":"2023-05-31T11:51:18.266228-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.462607 2237 ssh_runner.go:195] Run: grep 192.168.105.1\thost.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T11:51:18.26623-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.464002 2237 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\thost.minikube.internal$' \"/etc/hosts\"; echo \"192.168.105.1\thost.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T11:51:18.266232-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.467824 2237 preload.go:132] Checking if preload exists for k8s version v1.18.20 and runtime docker\n"} +{"Time":"2023-05-31T11:51:18.266233-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.467865 2237 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:51:18.266235-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.473618 2237 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T11:51:18.266236-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266238-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266239-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266327-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.26633-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:51:18.266331-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/pause:3.2\n"} +{"Time":"2023-05-31T11:51:18.266333-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:51:18.266334-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:51:18.266335-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.266337-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:51:18.266339-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.473624 2237 docker.go:639] registry.k8s.io/kube-apiserver:v1.18.20 wasn't preloaded\n"} +{"Time":"2023-05-31T11:51:18.26634-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.473662 2237 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:51:18.266342-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.476667 2237 ssh_runner.go:195] Run: which lz4\n"} +{"Time":"2023-05-31T11:51:18.266343-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.477895 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4 -\u003e /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.266346-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.477982 2237 ssh_runner.go:195] Run: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.266348-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.479141 2237 ssh_runner.go:352] existence check for /preloaded.tar.lz4: stat -c \"%!s(MISSING) %!y(MISSING)\" /preloaded.tar.lz4: Process exited with status 1\n"} +{"Time":"2023-05-31T11:51:18.266349-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:51:18.266351-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.266352-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:51:18.266353-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstat: cannot statx '/preloaded.tar.lz4': No such file or directory\n"} +{"Time":"2023-05-31T11:51:18.266355-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:11.479152 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.18.20-docker-overlay2-arm64.tar.lz4 --\u003e /preloaded.tar.lz4 (459739018 bytes)\n"} +{"Time":"2023-05-31T11:51:18.266415-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:13.171853 2237 docker.go:597] Took 1.693942 seconds to copy over tarball\n"} +{"Time":"2023-05-31T11:51:18.266418-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:13.171909 2237 ssh_runner.go:195] Run: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.266419-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:14.614111 2237 ssh_runner.go:235] Completed: sudo tar -I lz4 -C /var -xf /preloaded.tar.lz4: (1.442209s)\n"} +{"Time":"2023-05-31T11:51:18.266423-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:14.614127 2237 ssh_runner.go:146] rm: /preloaded.tar.lz4\n"} +{"Time":"2023-05-31T11:51:18.266425-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:14.637258 2237 ssh_runner.go:195] Run: sudo cat /var/lib/docker/image/overlay2/repositories.json\n"} +{"Time":"2023-05-31T11:51:18.266426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:14.640812 2237 ssh_runner.go:362] scp memory --\u003e /var/lib/docker/image/overlay2/repositories.json (2502 bytes)\n"} +{"Time":"2023-05-31T11:51:18.266428-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:14.645878 2237 ssh_runner.go:195] Run: sudo systemctl daemon-reload\n"} +{"Time":"2023-05-31T11:51:18.266429-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:14.714181 2237 ssh_runner.go:195] Run: sudo systemctl restart docker\n"} +{"Time":"2023-05-31T11:51:18.266431-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.285490 2237 ssh_runner.go:235] Completed: sudo systemctl restart docker: (1.57131575s)\n"} +{"Time":"2023-05-31T11:51:18.266432-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.285577 2237 ssh_runner.go:195] Run: docker images --format {{.Repository}}:{{.Tag}}\n"} +{"Time":"2023-05-31T11:51:18.266434-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.291386 2237 docker.go:633] Got preloaded images: -- stdout --\n"} +{"Time":"2023-05-31T11:51:18.266437-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266439-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.26644-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266442-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266443-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tgcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:51:18.266445-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/pause:3.2\n"} +{"Time":"2023-05-31T11:51:18.266446-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:51:18.266519-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tk8s.gcr.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:51:18.266543-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.266545-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t-- /stdout --\n"} +{"Time":"2023-05-31T11:51:18.266547-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.291393 2237 docker.go:639] registry.k8s.io/kube-apiserver:v1.18.20 wasn't preloaded\n"} +{"Time":"2023-05-31T11:51:18.266549-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.291397 2237 cache_images.go:88] LoadImages start: [registry.k8s.io/kube-apiserver:v1.18.20 registry.k8s.io/kube-controller-manager:v1.18.20 registry.k8s.io/kube-scheduler:v1.18.20 registry.k8s.io/kube-proxy:v1.18.20 registry.k8s.io/pause:3.2 registry.k8s.io/etcd:3.4.3-0 registry.k8s.io/coredns:1.6.7 gcr.io/k8s-minikube/storage-provisioner:v5]\n"} +{"Time":"2023-05-31T11:51:18.266551-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.300159 2237 image.go:134] retrieving image: registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266552-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.300211 2237 image.go:134] retrieving image: registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:51:18.266557-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.300269 2237 image.go:134] retrieving image: registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266559-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.300310 2237 image.go:134] retrieving image: registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.26656-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.300392 2237 image.go:134] retrieving image: registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:51:18.266562-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.300818 2237 image.go:134] retrieving image: registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:51:18.266563-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.300865 2237 image.go:134] retrieving image: registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266569-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.301135 2237 image.go:134] retrieving image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:51:18.266571-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.311084 2237 image.go:177] daemon lookup for registry.k8s.io/kube-scheduler:v1.18.20: Error response from daemon: No such image: registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266572-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.312079 2237 image.go:177] daemon lookup for registry.k8s.io/etcd:3.4.3-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:51:18.266598-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.312084 2237 image.go:177] daemon lookup for registry.k8s.io/kube-controller-manager:v1.18.20: Error response from daemon: No such image: registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266603-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.312445 2237 image.go:177] daemon lookup for gcr.io/k8s-minikube/storage-provisioner:v5: Error response from daemon: No such image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:51:18.266604-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.312480 2237 image.go:177] daemon lookup for registry.k8s.io/pause:3.2: Error response from daemon: No such image: registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:51:18.266606-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.312535 2237 image.go:177] daemon lookup for registry.k8s.io/coredns:1.6.7: Error response from daemon: No such image: registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:51:18.266607-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.312617 2237 image.go:177] daemon lookup for registry.k8s.io/kube-proxy:v1.18.20: Error response from daemon: No such image: registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266609-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:16.312714 2237 image.go:177] daemon lookup for registry.k8s.io/kube-apiserver:v1.18.20: Error response from daemon: No such image: registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266611-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:17.620147 2237 image.go:265] image registry.k8s.io/etcd:3.4.3-0 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:51:18.266614-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.620264 2237 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:51:18.266615-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.626082 2237 cache_images.go:116] \"registry.k8s.io/etcd:3.4.3-0\" needs transfer: \"registry.k8s.io/etcd:3.4.3-0\" does not exist at hash \"29dd247b2572efbe28fcaea3fef1c5d72593da59f7350e3f6d2e6618983f9c03\" in container runtime\n"} +{"Time":"2023-05-31T11:51:18.266617-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.626102 2237 docker.go:313] Removing image: registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:51:18.266619-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.626146 2237 ssh_runner.go:195] Run: docker rmi registry.k8s.io/etcd:3.4.3-0\n"} +{"Time":"2023-05-31T11:51:18.26662-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.631227 2237 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/etcd_3.4.3-0\n"} +{"Time":"2023-05-31T11:51:18.266622-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:17.680746 2237 image.go:265] image registry.k8s.io/kube-scheduler:v1.18.20 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:51:18.266684-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.680853 2237 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266686-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.693969 2237 cache_images.go:116] \"registry.k8s.io/kube-scheduler:v1.18.20\" needs transfer: \"registry.k8s.io/kube-scheduler:v1.18.20\" does not exist at hash \"177548d745cb87f773d02f41d453af2f2a1479dbe3c32e749cf6d8145c005e79\" in container runtime\n"} +{"Time":"2023-05-31T11:51:18.266688-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.693993 2237 docker.go:313] Removing image: registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.26669-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.694040 2237 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-scheduler:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266691-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.705817 2237 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266693-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:17.734546 2237 image.go:265] image registry.k8s.io/kube-controller-manager:v1.18.20 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:51:18.266695-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.734647 2237 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266696-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.740634 2237 cache_images.go:116] \"registry.k8s.io/kube-controller-manager:v1.18.20\" needs transfer: \"registry.k8s.io/kube-controller-manager:v1.18.20\" does not exist at hash \"297c79afbdb81ceb4cf857e0c54a0de7b6ce7ebe01e6cab68fc8baf342be3ea7\" in container runtime\n"} +{"Time":"2023-05-31T11:51:18.266698-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.740656 2237 docker.go:313] Removing image: registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.2667-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.740696 2237 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-controller-manager:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266701-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.746434 2237 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266703-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.879294 2237 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:51:18.266704-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.885826 2237 cache_images.go:116] \"registry.k8s.io/pause:3.2\" needs transfer: \"registry.k8s.io/pause:3.2\" does not exist at hash \"2a060e2e7101d419352bf82c613158587400be743482d9a537ec4a9d1b4eb93c\" in container runtime\n"} +{"Time":"2023-05-31T11:51:18.266817-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.885851 2237 docker.go:313] Removing image: registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:51:18.26682-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.885896 2237 ssh_runner.go:195] Run: docker rmi registry.k8s.io/pause:3.2\n"} +{"Time":"2023-05-31T11:51:18.266822-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:17.891946 2237 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.2\n"} +{"Time":"2023-05-31T11:51:18.266825-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:18.081564 2237 image.go:265] image registry.k8s.io/coredns:1.6.7 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:51:18.266826-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.081704 2237 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:51:18.266828-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.087838 2237 cache_images.go:116] \"registry.k8s.io/coredns:1.6.7\" needs transfer: \"registry.k8s.io/coredns:1.6.7\" does not exist at hash \"ff3af22d8878afc6985d3fec3e066d00ef431aa166c3a01ac58f1990adc92a2c\" in container runtime\n"} +{"Time":"2023-05-31T11:51:18.26683-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.087858 2237 docker.go:313] Removing image: registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:51:18.266831-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.087913 2237 ssh_runner.go:195] Run: docker rmi registry.k8s.io/coredns:1.6.7\n"} +{"Time":"2023-05-31T11:51:18.266833-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.093245 2237 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns_1.6.7\n"} +{"Time":"2023-05-31T11:51:18.266835-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:18.131273 2237 image.go:265] image gcr.io/k8s-minikube/storage-provisioner:v5 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:51:18.266836-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.131368 2237 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:51:18.266838-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.137395 2237 cache_images.go:116] \"gcr.io/k8s-minikube/storage-provisioner:v5\" needs transfer: \"gcr.io/k8s-minikube/storage-provisioner:v5\" does not exist at hash \"66749159455b3f08c8318fe0233122f54d0f5889f9c5fdfb73c3fd9d99895b51\" in container runtime\n"} +{"Time":"2023-05-31T11:51:18.266839-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.137414 2237 docker.go:313] Removing image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:51:18.266841-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.137455 2237 ssh_runner.go:195] Run: docker rmi gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:51:18.26692-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.147431 2237 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5\n"} +{"Time":"2023-05-31T11:51:18.266923-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:18.265216 2237 image.go:265] image registry.k8s.io/kube-proxy:v1.18.20 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:51:18.266924-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.265453 2237 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266929-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.276491 2237 cache_images.go:116] \"registry.k8s.io/kube-proxy:v1.18.20\" needs transfer: \"registry.k8s.io/kube-proxy:v1.18.20\" does not exist at hash \"b11cdc97ac6ac4ef2b3b0662edbe16597084b17cbc8e3d61fcaf4ef827a7ed18\" in container runtime\n"} +{"Time":"2023-05-31T11:51:18.266931-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.276519 2237 docker.go:313] Removing image: registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266935-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.276579 2237 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-proxy:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266936-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.285044 2237 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266938-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:18.454881 2237 image.go:265] image registry.k8s.io/kube-apiserver:v1.18.20 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:51:18.266939-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.455359 2237 ssh_runner.go:195] Run: docker image inspect --format {{.Id}} registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266941-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.477416 2237 cache_images.go:116] \"registry.k8s.io/kube-apiserver:v1.18.20\" needs transfer: \"registry.k8s.io/kube-apiserver:v1.18.20\" does not exist at hash \"d353007847ec85700463981309a5846c8d9c93fbcd1323104266212926d68257\" in container runtime\n"} +{"Time":"2023-05-31T11:51:18.266942-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.477486 2237 docker.go:313] Removing image: registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266944-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.477713 2237 ssh_runner.go:195] Run: docker rmi registry.k8s.io/kube-apiserver:v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266945-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.493542 2237 cache_images.go:286] Loading image from: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.266947-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.493615 2237 cache_images.go:92] LoadImages completed in 2.202242125s\n"} +{"Time":"2023-05-31T11:51:18.267047-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:18.493708 2237 out.go:239] X Unable to load cached images: loading cached images: stat /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/etcd_3.4.3-0: no such file or directory\n"} +{"Time":"2023-05-31T11:51:18.26705-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.493811 2237 ssh_runner.go:195] Run: docker info --format {{.CgroupDriver}}\n"} +{"Time":"2023-05-31T11:51:18.267051-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.511115 2237 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:51:18.267054-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.511133 2237 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T11:51:18.267055-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.511141 2237 kubeadm.go:87] Using pod CIDR: 10.244.0.0/16\n"} +{"Time":"2023-05-31T11:51:18.267058-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.511156 2237 kubeadm.go:176] kubeadm options: {CertDir:/var/lib/minikube/certs ServiceCIDR:10.96.0.0/12 PodSubnet:10.244.0.0/16 AdvertiseAddress:192.168.105.6 APIServerPort:8443 KubernetesVersion:v1.18.20 EtcdDataDir:/var/lib/minikube/etcd EtcdExtraArgs:map[] ClusterName:ingress-addon-legacy-798000 NodeName:ingress-addon-legacy-798000 DNSDomain:cluster.local CRISocket:/var/run/dockershim.sock ImageRepository: ComponentOptions:[{Component:apiServer ExtraArgs:map[enable-admission-plugins:NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota] Pairs:map[certSANs:[\"127.0.0.1\", \"localhost\", \"192.168.105.6\"]]} {Component:controllerManager ExtraArgs:map[allocate-node-cidrs:true leader-elect:false] Pairs:map[]} {Component:scheduler ExtraArgs:map[leader-elect:false] Pairs:map[]}] FeatureArgs:map[] NodeIP:192.168.105.6 CgroupDriver:cgroupfs ClientCAFile:/var/lib/minikube/certs/"} +{"Time":"2023-05-31T11:51:18.26706-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"ca.crt StaticPodPath:/etc/kubernetes/manifests ControlPlaneAddress:control-plane.minikube.internal KubeProxyOptions:map[] ResolvConfSearchRegression:false KubeletConfigOpts:map[hairpinMode:hairpin-veth runtimeRequestTimeout:15m] PrependCriSocketUnix:false}\n"} +{"Time":"2023-05-31T11:51:18.267062-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.511333 2237 kubeadm.go:181] kubeadm config:\n"} +{"Time":"2023-05-31T11:51:18.267063-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tapiVersion: kubeadm.k8s.io/v1beta2\n"} +{"Time":"2023-05-31T11:51:18.267064-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tkind: InitConfiguration\n"} +{"Time":"2023-05-31T11:51:18.26707-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tlocalAPIEndpoint:\n"} +{"Time":"2023-05-31T11:51:18.267071-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t advertiseAddress: 192.168.105.6\n"} +{"Time":"2023-05-31T11:51:18.267157-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t bindPort: 8443\n"} +{"Time":"2023-05-31T11:51:18.267159-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tbootstrapTokens:\n"} +{"Time":"2023-05-31T11:51:18.26716-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t - groups:\n"} +{"Time":"2023-05-31T11:51:18.267162-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t - system:bootstrappers:kubeadm:default-node-token\n"} +{"Time":"2023-05-31T11:51:18.267163-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ttl: 24h0m0s\n"} +{"Time":"2023-05-31T11:51:18.267164-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t usages:\n"} +{"Time":"2023-05-31T11:51:18.267166-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t - signing\n"} +{"Time":"2023-05-31T11:51:18.267167-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t - authentication\n"} +{"Time":"2023-05-31T11:51:18.267168-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tnodeRegistration:\n"} +{"Time":"2023-05-31T11:51:18.26717-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t criSocket: /var/run/dockershim.sock\n"} +{"Time":"2023-05-31T11:51:18.267171-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t name: \"ingress-addon-legacy-798000\"\n"} +{"Time":"2023-05-31T11:51:18.267172-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kubeletExtraArgs:\n"} +{"Time":"2023-05-31T11:51:18.267174-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t node-ip: 192.168.105.6\n"} +{"Time":"2023-05-31T11:51:18.267175-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t taints: []\n"} +{"Time":"2023-05-31T11:51:18.267179-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t---\n"} +{"Time":"2023-05-31T11:51:18.267181-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tapiVersion: kubeadm.k8s.io/v1beta2\n"} +{"Time":"2023-05-31T11:51:18.267182-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tkind: ClusterConfiguration\n"} +{"Time":"2023-05-31T11:51:18.267183-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tapiServer:\n"} +{"Time":"2023-05-31T11:51:18.267185-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t certSANs: [\"127.0.0.1\", \"localhost\", \"192.168.105.6\"]\n"} +{"Time":"2023-05-31T11:51:18.267186-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:51:18.267188-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t enable-admission-plugins: \"NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota\"\n"} +{"Time":"2023-05-31T11:51:18.267189-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tcontrollerManager:\n"} +{"Time":"2023-05-31T11:51:18.267191-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:51:18.267193-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t allocate-node-cidrs: \"true\"\n"} +{"Time":"2023-05-31T11:51:18.267304-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T11:51:18.267307-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tscheduler:\n"} +{"Time":"2023-05-31T11:51:18.267308-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:51:18.267309-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t leader-elect: \"false\"\n"} +{"Time":"2023-05-31T11:51:18.267311-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tcertificatesDir: /var/lib/minikube/certs\n"} +{"Time":"2023-05-31T11:51:18.267312-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tclusterName: mk\n"} +{"Time":"2023-05-31T11:51:18.267313-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tcontrolPlaneEndpoint: control-plane.minikube.internal:8443\n"} +{"Time":"2023-05-31T11:51:18.267315-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tdns:\n"} +{"Time":"2023-05-31T11:51:18.267316-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t type: CoreDNS\n"} +{"Time":"2023-05-31T11:51:18.267317-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tetcd:\n"} +{"Time":"2023-05-31T11:51:18.267318-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t local:\n"} +{"Time":"2023-05-31T11:51:18.26732-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t dataDir: /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T11:51:18.267321-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t extraArgs:\n"} +{"Time":"2023-05-31T11:51:18.267322-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t proxy-refresh-interval: \"70000\"\n"} +{"Time":"2023-05-31T11:51:18.267324-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tkubernetesVersion: v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.267325-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tnetworking:\n"} +{"Time":"2023-05-31T11:51:18.267326-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t dnsDomain: cluster.local\n"} +{"Time":"2023-05-31T11:51:18.267327-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t podSubnet: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T11:51:18.267329-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t serviceSubnet: 10.96.0.0/12\n"} +{"Time":"2023-05-31T11:51:18.26733-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t---\n"} +{"Time":"2023-05-31T11:51:18.267331-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tapiVersion: kubelet.config.k8s.io/v1beta1\n"} +{"Time":"2023-05-31T11:51:18.267333-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tkind: KubeletConfiguration\n"} +{"Time":"2023-05-31T11:51:18.267334-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tauthentication:\n"} +{"Time":"2023-05-31T11:51:18.267335-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t x509:\n"} +{"Time":"2023-05-31T11:51:18.2674-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t clientCAFile: /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T11:51:18.267403-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tcgroupDriver: cgroupfs\n"} +{"Time":"2023-05-31T11:51:18.267404-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \thairpinMode: hairpin-veth\n"} +{"Time":"2023-05-31T11:51:18.267406-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \truntimeRequestTimeout: 15m\n"} +{"Time":"2023-05-31T11:51:18.267407-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tclusterDomain: \"cluster.local\"\n"} +{"Time":"2023-05-31T11:51:18.267408-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# disable disk resource management by default\n"} +{"Time":"2023-05-31T11:51:18.26741-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \timageGCHighThresholdPercent: 100\n"} +{"Time":"2023-05-31T11:51:18.267411-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tevictionHard:\n"} +{"Time":"2023-05-31T11:51:18.267412-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t nodefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.267413-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t nodefs.inodesFree: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.267415-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t imagefs.available: \"0%!\"(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.267416-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tfailSwapOn: false\n"} +{"Time":"2023-05-31T11:51:18.267417-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstaticPodPath: /etc/kubernetes/manifests\n"} +{"Time":"2023-05-31T11:51:18.267419-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t---\n"} +{"Time":"2023-05-31T11:51:18.26742-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tapiVersion: kubeproxy.config.k8s.io/v1alpha1\n"} +{"Time":"2023-05-31T11:51:18.267421-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tkind: KubeProxyConfiguration\n"} +{"Time":"2023-05-31T11:51:18.267423-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tclusterCIDR: \"10.244.0.0/16\"\n"} +{"Time":"2023-05-31T11:51:18.267424-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tmetricsBindAddress: 0.0.0.0:10249\n"} +{"Time":"2023-05-31T11:51:18.267425-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tconntrack:\n"} +{"Time":"2023-05-31T11:51:18.267426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t maxPerCore: 0\n"} +{"Time":"2023-05-31T11:51:18.267428-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_established\"\n"} +{"Time":"2023-05-31T11:51:18.267429-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t tcpEstablishedTimeout: 0s\n"} +{"Time":"2023-05-31T11:51:18.26743-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t# Skip setting \"net.netfilter.nf_conntrack_tcp_timeout_close\"\n"} +{"Time":"2023-05-31T11:51:18.267493-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t tcpCloseWaitTimeout: 0s\n"} +{"Time":"2023-05-31T11:51:18.267496-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.267498-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.511418 2237 kubeadm.go:971] kubelet [Unit]\n"} +{"Time":"2023-05-31T11:51:18.267499-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tWants=docker.socket\n"} +{"Time":"2023-05-31T11:51:18.2675-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.267502-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[Service]\n"} +{"Time":"2023-05-31T11:51:18.267503-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tExecStart=\n"} +{"Time":"2023-05-31T11:51:18.267504-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tExecStart=/var/lib/minikube/binaries/v1.18.20/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --config=/var/lib/kubelet/config.yaml --container-runtime=docker --hostname-override=ingress-addon-legacy-798000 --kubeconfig=/etc/kubernetes/kubelet.conf --node-ip=192.168.105.6\n"} +{"Time":"2023-05-31T11:51:18.267506-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.267507-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[Install]\n"} +{"Time":"2023-05-31T11:51:18.267509-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t config:\n"} +{"Time":"2023-05-31T11:51:18.26751-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t{KubernetesVersion:v1.18.20 ClusterName:ingress-addon-legacy-798000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:}\n"} +{"Time":"2023-05-31T11:51:18.267512-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.511505 2237 ssh_runner.go:195] Run: sudo ls /var/lib/minikube/binaries/v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.267513-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.516834 2237 binaries.go:44] Found k8s binaries, skipping transfer\n"} +{"Time":"2023-05-31T11:51:18.267515-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.516872 2237 ssh_runner.go:195] Run: sudo mkdir -p /etc/systemd/system/kubelet.service.d /lib/systemd/system /var/tmp/minikube\n"} +{"Time":"2023-05-31T11:51:18.267516-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.520879 2237 ssh_runner.go:362] scp memory --\u003e /etc/systemd/system/kubelet.service.d/10-kubeadm.conf (355 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267518-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.528125 2237 ssh_runner.go:362] scp memory --\u003e /lib/systemd/system/kubelet.service (353 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267568-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.534712 2237 ssh_runner.go:362] scp memory --\u003e /var/tmp/minikube/kubeadm.yaml.new (2127 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267571-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.540804 2237 ssh_runner.go:195] Run: grep 192.168.105.6\tcontrol-plane.minikube.internal$ /etc/hosts\n"} +{"Time":"2023-05-31T11:51:18.267572-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.542198 2237 ssh_runner.go:195] Run: /bin/bash -c \"{ grep -v $'\\tcontrol-plane.minikube.internal$' \"/etc/hosts\"; echo \"192.168.105.6\tcontrol-plane.minikube.internal\"; } \u003e /tmp/h.$$; sudo cp /tmp/h.$$ \"/etc/hosts\"\"\n"} +{"Time":"2023-05-31T11:51:18.267574-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.546146 2237 certs.go:56] Setting up /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000 for IP: 192.168.105.6\n"} +{"Time":"2023-05-31T11:51:18.267576-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.546164 2237 certs.go:190] acquiring lock for shared ca certs: {Name:mk5d2be9e1df042d7290b2e1516090ac43150ffe Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.267578-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.546536 2237 certs.go:199] skipping minikubeCA CA generation: /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key\n"} +{"Time":"2023-05-31T11:51:18.267579-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.546675 2237 certs.go:199] skipping proxyClientCA CA generation: /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key\n"} +{"Time":"2023-05-31T11:51:18.267581-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.546706 2237 certs.go:319] generating minikube-user signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.key\n"} +{"Time":"2023-05-31T11:51:18.267582-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.546716 2237 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt with IP's: []\n"} +{"Time":"2023-05-31T11:51:18.267584-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.623852 2237 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt ...\n"} +{"Time":"2023-05-31T11:51:18.267586-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.623858 2237 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: {Name:mk4ff10302fa13422a35432eca247680ca2b6530 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.267587-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.624074 2237 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.key ...\n"} +{"Time":"2023-05-31T11:51:18.267676-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.624078 2237 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.key: {Name:mk03ff16b91ea2a680c7a800c85188f5a06ab6c2 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.267679-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.624196 2237 certs.go:319] generating minikube signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.key.b354f644\n"} +{"Time":"2023-05-31T11:51:18.267681-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.624205 2237 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.crt.b354f644 with IP's: [192.168.105.6 10.96.0.1 127.0.0.1 10.0.0.1]\n"} +{"Time":"2023-05-31T11:51:18.267683-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.673179 2237 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.crt.b354f644 ...\n"} +{"Time":"2023-05-31T11:51:18.267685-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.673183 2237 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.crt.b354f644: {Name:mkc226043e8d7635a5cd5ff58965cbcdfe214ce7 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.267686-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.673318 2237 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.key.b354f644 ...\n"} +{"Time":"2023-05-31T11:51:18.267688-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.673321 2237 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.key.b354f644: {Name:mkbbdc9612b296854cb72351bcfacd7b5a1d2bc9 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.267693-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.673443 2237 certs.go:337] copying /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.crt.b354f644 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.crt\n"} +{"Time":"2023-05-31T11:51:18.267695-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.673530 2237 certs.go:341] copying /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.key.b354f644 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.key\n"} +{"Time":"2023-05-31T11:51:18.267696-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.673617 2237 certs.go:319] generating aggregator signed cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.key\n"} +{"Time":"2023-05-31T11:51:18.267698-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.673623 2237 crypto.go:68] Generating cert /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.crt with IP's: []\n"} +{"Time":"2023-05-31T11:51:18.26778-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.749856 2237 crypto.go:156] Writing cert to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.crt ...\n"} +{"Time":"2023-05-31T11:51:18.267782-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.749860 2237 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.crt: {Name:mk3d44d3f7b57ed10956256a37198f9a00ad47c8 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.267784-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750011 2237 crypto.go:164] Writing key to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.key ...\n"} +{"Time":"2023-05-31T11:51:18.267786-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750014 2237 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.key: {Name:mk4740ff80aaccfc58a76713b476cb557c62d91a Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.267788-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750117 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.crt -\u003e /var/lib/minikube/certs/apiserver.crt\n"} +{"Time":"2023-05-31T11:51:18.267791-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750133 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.key -\u003e /var/lib/minikube/certs/apiserver.key\n"} +{"Time":"2023-05-31T11:51:18.267792-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750144 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.crt -\u003e /var/lib/minikube/certs/proxy-client.crt\n"} +{"Time":"2023-05-31T11:51:18.267794-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750156 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.key -\u003e /var/lib/minikube/certs/proxy-client.key\n"} +{"Time":"2023-05-31T11:51:18.267796-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750168 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt -\u003e /var/lib/minikube/certs/ca.crt\n"} +{"Time":"2023-05-31T11:51:18.267797-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750179 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key -\u003e /var/lib/minikube/certs/ca.key\n"} +{"Time":"2023-05-31T11:51:18.267799-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750190 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.crt -\u003e /var/lib/minikube/certs/proxy-client-ca.crt\n"} +{"Time":"2023-05-31T11:51:18.267877-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750203 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key -\u003e /var/lib/minikube/certs/proxy-client-ca.key\n"} +{"Time":"2023-05-31T11:51:18.267879-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750263 2237 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/1477.pem (1338 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267884-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:49:18.750637 2237 certs.go:433] ignoring /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/1477_empty.pem, impossibly tiny 0 bytes\n"} +{"Time":"2023-05-31T11:51:18.267886-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750650 2237 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca-key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267887-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750676 2237 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem (1078 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267889-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750696 2237 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem (1123 bytes)\n"} +{"Time":"2023-05-31T11:51:18.26789-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750716 2237 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/certs/key.pem (1675 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267892-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750767 2237 certs.go:437] found cert: /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267894-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750790 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt -\u003e /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:51:18.267895-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750801 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/1477.pem -\u003e /usr/share/ca-certificates/1477.pem\n"} +{"Time":"2023-05-31T11:51:18.267897-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.750812 2237 vm_assets.go:163] NewFileAsset: /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem -\u003e /usr/share/ca-certificates/14772.pem\n"} +{"Time":"2023-05-31T11:51:18.267899-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.751122 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.crt --\u003e /var/lib/minikube/certs/apiserver.crt (1399 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267979-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.758855 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/apiserver.key --\u003e /var/lib/minikube/certs/apiserver.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267982-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.765806 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.crt --\u003e /var/lib/minikube/certs/proxy-client.crt (1147 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267984-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.772506 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/proxy-client.key --\u003e /var/lib/minikube/certs/proxy-client.key (1679 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267986-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.779613 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt --\u003e /var/lib/minikube/certs/ca.crt (1111 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267987-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.787092 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.key --\u003e /var/lib/minikube/certs/ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267989-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.794262 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.crt --\u003e /var/lib/minikube/certs/proxy-client-ca.crt (1119 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267991-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.801158 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/proxy-client-ca.key --\u003e /var/lib/minikube/certs/proxy-client-ca.key (1675 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267992-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.807898 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt --\u003e /usr/share/ca-certificates/minikubeCA.pem (1111 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267994-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.815177 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/1477.pem --\u003e /usr/share/ca-certificates/1477.pem (1338 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267995-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.822334 2237 ssh_runner.go:362] scp /Users/jenkins/minikube-integration/16569-1035/.minikube/files/etc/ssl/certs/14772.pem --\u003e /usr/share/ca-certificates/14772.pem (1708 bytes)\n"} +{"Time":"2023-05-31T11:51:18.267997-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.828925 2237 ssh_runner.go:362] scp memory --\u003e /var/lib/minikube/kubeconfig (738 bytes)\n"} +{"Time":"2023-05-31T11:51:18.268108-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.833672 2237 ssh_runner.go:195] Run: openssl version\n"} +{"Time":"2023-05-31T11:51:18.268111-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.835486 2237 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/14772.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/14772.pem /etc/ssl/certs/14772.pem\"\n"} +{"Time":"2023-05-31T11:51:18.268114-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.838819 2237 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/14772.pem\n"} +{"Time":"2023-05-31T11:51:18.268118-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.840304 2237 certs.go:480] hashing: -rw-r--r-- 1 root root 1708 May 31 18:44 /usr/share/ca-certificates/14772.pem\n"} +{"Time":"2023-05-31T11:51:18.26812-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.840329 2237 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/14772.pem\n"} +{"Time":"2023-05-31T11:51:18.268121-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.842256 2237 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/3ec20f2e.0 || ln -fs /etc/ssl/certs/14772.pem /etc/ssl/certs/3ec20f2e.0\"\n"} +{"Time":"2023-05-31T11:51:18.268123-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.845024 2237 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/minikubeCA.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/minikubeCA.pem /etc/ssl/certs/minikubeCA.pem\"\n"} +{"Time":"2023-05-31T11:51:18.268124-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.848088 2237 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:51:18.268126-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.849496 2237 certs.go:480] hashing: -rw-r--r-- 1 root root 1111 May 31 18:43 /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:51:18.268127-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.849533 2237 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/minikubeCA.pem\n"} +{"Time":"2023-05-31T11:51:18.26813-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.851170 2237 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/b5213941.0 || ln -fs /etc/ssl/certs/minikubeCA.pem /etc/ssl/certs/b5213941.0\"\n"} +{"Time":"2023-05-31T11:51:18.268131-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.854096 2237 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -s /usr/share/ca-certificates/1477.pem \u0026\u0026 ln -fs /usr/share/ca-certificates/1477.pem /etc/ssl/certs/1477.pem\"\n"} +{"Time":"2023-05-31T11:51:18.268133-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.856975 2237 ssh_runner.go:195] Run: ls -la /usr/share/ca-certificates/1477.pem\n"} +{"Time":"2023-05-31T11:51:18.268187-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.858371 2237 certs.go:480] hashing: -rw-r--r-- 1 root root 1338 May 31 18:44 /usr/share/ca-certificates/1477.pem\n"} +{"Time":"2023-05-31T11:51:18.268189-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.858393 2237 ssh_runner.go:195] Run: openssl x509 -hash -noout -in /usr/share/ca-certificates/1477.pem\n"} +{"Time":"2023-05-31T11:51:18.26819-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.860267 2237 ssh_runner.go:195] Run: sudo /bin/bash -c \"test -L /etc/ssl/certs/51391683.0 || ln -fs /etc/ssl/certs/1477.pem /etc/ssl/certs/51391683.0\"\n"} +{"Time":"2023-05-31T11:51:18.268192-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.863551 2237 ssh_runner.go:195] Run: ls /var/lib/minikube/certs/etcd\n"} +{"Time":"2023-05-31T11:51:18.268193-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.864833 2237 certs.go:353] certs directory doesn't exist, likely first start: ls /var/lib/minikube/certs/etcd: Process exited with status 2\n"} +{"Time":"2023-05-31T11:51:18.268195-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:51:18.268196-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.268197-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:51:18.268198-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tls: cannot access '/var/lib/minikube/certs/etcd': No such file or directory\n"} +{"Time":"2023-05-31T11:51:18.268206-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.864860 2237 kubeadm.go:404] StartCluster: {Name:ingress-addon-legacy-798000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:4096 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{Kuber"} +{"Time":"2023-05-31T11:51:18.268208-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"netesVersion:v1.18.20 ClusterName:ingress-addon-legacy-798000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP:192.168.105.6 Port:8443 KubernetesVersion:v1.18.20 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker Mount"} +{"Time":"2023-05-31T11:51:18.26831-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"IP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:51:18.268317-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.864926 2237 ssh_runner.go:195] Run: docker ps --filter status=paused --filter=name=k8s_.*_(kube-system)_ --format={{.ID}}\n"} +{"Time":"2023-05-31T11:51:18.268322-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.873898 2237 ssh_runner.go:195] Run: sudo ls /var/lib/kubelet/kubeadm-flags.env /var/lib/kubelet/config.yaml /var/lib/minikube/etcd\n"} +{"Time":"2023-05-31T11:51:18.268338-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.876831 2237 ssh_runner.go:195] Run: sudo cp /var/tmp/minikube/kubeadm.yaml.new /var/tmp/minikube/kubeadm.yaml\n"} +{"Time":"2023-05-31T11:51:18.268342-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.879768 2237 ssh_runner.go:195] Run: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf\n"} +{"Time":"2023-05-31T11:51:18.268344-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.882790 2237 kubeadm.go:152] config check failed, skipping stale config cleanup: sudo ls -la /etc/kubernetes/admin.conf /etc/kubernetes/kubelet.conf /etc/kubernetes/controller-manager.conf /etc/kubernetes/scheduler.conf: Process exited with status 2\n"} +{"Time":"2023-05-31T11:51:18.268346-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstdout:\n"} +{"Time":"2023-05-31T11:51:18.268347-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.268348-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tstderr:\n"} +{"Time":"2023-05-31T11:51:18.26835-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tls: cannot access '/etc/kubernetes/admin.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:51:18.268351-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tls: cannot access '/etc/kubernetes/kubelet.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:51:18.268353-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tls: cannot access '/etc/kubernetes/controller-manager.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:51:18.268354-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tls: cannot access '/etc/kubernetes/scheduler.conf': No such file or directory\n"} +{"Time":"2023-05-31T11:51:18.268357-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.882809 2237 ssh_runner.go:286] Start: /bin/bash -c \"sudo env PATH=\"/var/lib/minikube/binaries/v1.18.20:$PATH\" kubeadm init --config /var/tmp/minikube/kubeadm.yaml --ignore-preflight-errors=DirAvailable--etc-kubernetes-manifests,DirAvailable--var-lib-minikube,DirAvailable--var-lib-minikube-etcd,FileAvailable--etc-kubernetes-manifests-kube-scheduler.yaml,FileAvailable--etc-kubernetes-manifests-kube-apiserver.yaml,FileAvailable--etc-kubernetes-manifests-kube-controller-manager.yaml,FileAvailable--etc-kubernetes-manifests-etcd.yaml,Port-10250,Swap,NumCPU\"\n"} +{"Time":"2023-05-31T11:51:18.268405-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.908676 2237 kubeadm.go:322] [init] Using Kubernetes version: v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.268411-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.908738 2237 kubeadm.go:322] [preflight] Running pre-flight checks\n"} +{"Time":"2023-05-31T11:51:18.268426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.989987 2237 kubeadm.go:322] [preflight] Pulling images required for setting up a Kubernetes cluster\n"} +{"Time":"2023-05-31T11:51:18.268428-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.990046 2237 kubeadm.go:322] [preflight] This might take a minute or two, depending on the speed of your internet connection\n"} +{"Time":"2023-05-31T11:51:18.26843-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:18.990095 2237 kubeadm.go:322] [preflight] You can also perform this action in beforehand using 'kubeadm config images pull'\n"} +{"Time":"2023-05-31T11:51:18.268431-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.035049 2237 kubeadm.go:322] [kubelet-start] Writing kubelet environment file with flags to file \"/var/lib/kubelet/kubeadm-flags.env\"\n"} +{"Time":"2023-05-31T11:51:18.268433-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.036620 2237 kubeadm.go:322] [kubelet-start] Writing kubelet configuration to file \"/var/lib/kubelet/config.yaml\"\n"} +{"Time":"2023-05-31T11:51:18.268435-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.036697 2237 kubeadm.go:322] [kubelet-start] Starting the kubelet\n"} +{"Time":"2023-05-31T11:51:18.268436-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.123194 2237 kubeadm.go:322] [certs] Using certificateDir folder \"/var/lib/minikube/certs\"\n"} +{"Time":"2023-05-31T11:51:18.268438-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.129334 2237 out.go:204] - Generating certificates and keys ...\n"} +{"Time":"2023-05-31T11:51:18.268439-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.129378 2237 kubeadm.go:322] [certs] Using existing ca certificate authority\n"} +{"Time":"2023-05-31T11:51:18.26844-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.129411 2237 kubeadm.go:322] [certs] Using existing apiserver certificate and key on disk\n"} +{"Time":"2023-05-31T11:51:18.268442-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.227320 2237 kubeadm.go:322] [certs] Generating \"apiserver-kubelet-client\" certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268444-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.297965 2237 kubeadm.go:322] [certs] Generating \"front-proxy-ca\" certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268494-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.402210 2237 kubeadm.go:322] [certs] Generating \"front-proxy-client\" certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268497-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.470053 2237 kubeadm.go:322] [certs] Generating \"etcd/ca\" certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268499-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.559649 2237 kubeadm.go:322] [certs] Generating \"etcd/server\" certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268501-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.559739 2237 kubeadm.go:322] [certs] etcd/server serving cert is signed for DNS names [ingress-addon-legacy-798000 localhost] and IPs [192.168.105.6 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:51:18.268502-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.647588 2237 kubeadm.go:322] [certs] Generating \"etcd/peer\" certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268506-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.647760 2237 kubeadm.go:322] [certs] etcd/peer serving cert is signed for DNS names [ingress-addon-legacy-798000 localhost] and IPs [192.168.105.6 127.0.0.1 ::1]\n"} +{"Time":"2023-05-31T11:51:18.268508-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:19.820297 2237 kubeadm.go:322] [certs] Generating \"etcd/healthcheck-client\" certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268509-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.076389 2237 kubeadm.go:322] [certs] Generating \"apiserver-etcd-client\" certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268511-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.236957 2237 kubeadm.go:322] [certs] Generating \"sa\" key and public key\n"} +{"Time":"2023-05-31T11:51:18.268512-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.237051 2237 kubeadm.go:322] [kubeconfig] Using kubeconfig folder \"/etc/kubernetes\"\n"} +{"Time":"2023-05-31T11:51:18.268514-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.280992 2237 kubeadm.go:322] [kubeconfig] Writing \"admin.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:51:18.268515-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.328391 2237 kubeadm.go:322] [kubeconfig] Writing \"kubelet.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:51:18.268516-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.451054 2237 kubeadm.go:322] [kubeconfig] Writing \"controller-manager.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:51:18.268518-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.516730 2237 kubeadm.go:322] [kubeconfig] Writing \"scheduler.conf\" kubeconfig file\n"} +{"Time":"2023-05-31T11:51:18.26852-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.517011 2237 kubeadm.go:322] [control-plane] Using manifest folder \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:51:18.268575-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.521398 2237 out.go:204] - Booting up control plane ...\n"} +{"Time":"2023-05-31T11:51:18.268578-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.521466 2237 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-apiserver\"\n"} +{"Time":"2023-05-31T11:51:18.268579-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.521510 2237 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-controller-manager\"\n"} +{"Time":"2023-05-31T11:51:18.268581-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.521593 2237 kubeadm.go:322] [control-plane] Creating static Pod manifest for \"kube-scheduler\"\n"} +{"Time":"2023-05-31T11:51:18.268583-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.522081 2237 kubeadm.go:322] [etcd] Creating static Pod manifest for local etcd in \"/etc/kubernetes/manifests\"\n"} +{"Time":"2023-05-31T11:51:18.268584-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:20.523459 2237 kubeadm.go:322] [wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory \"/etc/kubernetes/manifests\". This can take up to 4m0s\n"} +{"Time":"2023-05-31T11:51:18.26859-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:32.529298 2237 kubeadm.go:322] [apiclient] All control plane components are healthy after 12.005328 seconds\n"} +{"Time":"2023-05-31T11:51:18.268592-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:32.529468 2237 kubeadm.go:322] [upload-config] Storing the configuration used in ConfigMap \"kubeadm-config\" in the \"kube-system\" Namespace\n"} +{"Time":"2023-05-31T11:51:18.268593-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:32.551432 2237 kubeadm.go:322] [kubelet] Creating a ConfigMap \"kubelet-config-1.18\" in namespace kube-system with the configuration for the kubelets in the cluster\n"} +{"Time":"2023-05-31T11:51:18.268595-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.096377 2237 kubeadm.go:322] [upload-certs] Skipping phase. Please see --upload-certs\n"} +{"Time":"2023-05-31T11:51:18.268596-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.096647 2237 kubeadm.go:322] [mark-control-plane] Marking the node ingress-addon-legacy-798000 as control-plane by adding the label \"node-role.kubernetes.io/master=''\"\n"} +{"Time":"2023-05-31T11:51:18.268598-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.600775 2237 kubeadm.go:322] [bootstrap-token] Using token: pal1im.n0kp7sc78d4pvs5q\n"} +{"Time":"2023-05-31T11:51:18.268599-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.603558 2237 out.go:204] - Configuring RBAC rules ...\n"} +{"Time":"2023-05-31T11:51:18.268601-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.603621 2237 kubeadm.go:322] [bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles\n"} +{"Time":"2023-05-31T11:51:18.268683-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.603985 2237 kubeadm.go:322] [bootstrap-token] configured RBAC rules to allow Node Bootstrap tokens to get nodes\n"} +{"Time":"2023-05-31T11:51:18.26869-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.609495 2237 kubeadm.go:322] [bootstrap-token] configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials\n"} +{"Time":"2023-05-31T11:51:18.268694-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.610534 2237 kubeadm.go:322] [bootstrap-token] configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token\n"} +{"Time":"2023-05-31T11:51:18.268715-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.612025 2237 kubeadm.go:322] [bootstrap-token] configured RBAC rules to allow certificate rotation for all node client certificates in the cluster\n"} +{"Time":"2023-05-31T11:51:18.268731-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.613398 2237 kubeadm.go:322] [bootstrap-token] Creating the \"cluster-info\" ConfigMap in the \"kube-public\" namespace\n"} +{"Time":"2023-05-31T11:51:18.268733-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.617451 2237 kubeadm.go:322] [kubelet-finalize] Updating \"/etc/kubernetes/kubelet.conf\" to point to a rotatable kubelet client certificate and key\n"} +{"Time":"2023-05-31T11:51:18.268735-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:33.817997 2237 kubeadm.go:322] [addons] Applied essential addon: CoreDNS\n"} +{"Time":"2023-05-31T11:51:18.268736-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.011749 2237 kubeadm.go:322] [addons] Applied essential addon: kube-proxy\n"} +{"Time":"2023-05-31T11:51:18.268737-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012423 2237 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:51:18.268739-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012460 2237 kubeadm.go:322] Your Kubernetes control-plane has initialized successfully!\n"} +{"Time":"2023-05-31T11:51:18.26874-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012463 2237 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:51:18.268742-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012536 2237 kubeadm.go:322] To start using your cluster, you need to run the following as a regular user:\n"} +{"Time":"2023-05-31T11:51:18.268743-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012542 2237 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:51:18.268744-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012568 2237 kubeadm.go:322] mkdir -p $HOME/.kube\n"} +{"Time":"2023-05-31T11:51:18.268746-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012614 2237 kubeadm.go:322] sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config\n"} +{"Time":"2023-05-31T11:51:18.268778-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012648 2237 kubeadm.go:322] sudo chown $(id -u):$(id -g) $HOME/.kube/config\n"} +{"Time":"2023-05-31T11:51:18.26878-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012654 2237 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:51:18.268782-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012687 2237 kubeadm.go:322] You should now deploy a pod network to the cluster.\n"} +{"Time":"2023-05-31T11:51:18.268783-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012749 2237 kubeadm.go:322] Run \"kubectl apply -f [podnetwork].yaml\" with one of the options listed at:\n"} +{"Time":"2023-05-31T11:51:18.268785-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012802 2237 kubeadm.go:322] https://kubernetes.io/docs/concepts/cluster-administration/addons/\n"} +{"Time":"2023-05-31T11:51:18.268786-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012812 2237 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:51:18.268788-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012861 2237 kubeadm.go:322] You can now join any number of control-plane nodes by copying certificate authorities\n"} +{"Time":"2023-05-31T11:51:18.268789-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012914 2237 kubeadm.go:322] and service account keys on each node and then running the following as root:\n"} +{"Time":"2023-05-31T11:51:18.268791-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012918 2237 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:51:18.268792-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.012990 2237 kubeadm.go:322] kubeadm join control-plane.minikube.internal:8443 --token pal1im.n0kp7sc78d4pvs5q \\\n"} +{"Time":"2023-05-31T11:51:18.268794-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013067 2237 kubeadm.go:322] --discovery-token-ca-cert-hash sha256:c0b872ca59dfdea0de4508a70b7bc5477f2020e7d748dccf465015401d65b410 \\\n"} +{"Time":"2023-05-31T11:51:18.268795-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013082 2237 kubeadm.go:322] --control-plane \n"} +{"Time":"2023-05-31T11:51:18.268796-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013086 2237 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:51:18.268799-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013169 2237 kubeadm.go:322] Then you can join any number of worker nodes by running the following on each as root:\n"} +{"Time":"2023-05-31T11:51:18.2688-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013172 2237 kubeadm.go:322] \n"} +{"Time":"2023-05-31T11:51:18.268948-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013250 2237 kubeadm.go:322] kubeadm join control-plane.minikube.internal:8443 --token pal1im.n0kp7sc78d4pvs5q \\\n"} +{"Time":"2023-05-31T11:51:18.268951-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013355 2237 kubeadm.go:322] --discovery-token-ca-cert-hash sha256:c0b872ca59dfdea0de4508a70b7bc5477f2020e7d748dccf465015401d65b410 \n"} +{"Time":"2023-05-31T11:51:18.268953-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013477 2237 kubeadm.go:322] W0531 18:49:19.318340 1586 configset.go:202] WARNING: kubeadm cannot validate component configs for API groups [kubelet.config.k8s.io kubeproxy.config.k8s.io]\n"} +{"Time":"2023-05-31T11:51:18.268954-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013631 2237 kubeadm.go:322] \t[WARNING IsDockerSystemdCheck]: detected \"cgroupfs\" as the Docker cgroup driver. The recommended driver is \"systemd\". Please follow the guide at https://kubernetes.io/docs/setup/cri/\n"} +{"Time":"2023-05-31T11:51:18.268956-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013725 2237 kubeadm.go:322] \t[WARNING SystemVerification]: this Docker version is not on the list of validated versions: 24.0.1. Latest validated version: 19.03\n"} +{"Time":"2023-05-31T11:51:18.268961-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013801 2237 kubeadm.go:322] \t[WARNING Service-Kubelet]: kubelet service is not enabled, please run 'systemctl enable kubelet.service'\n"} +{"Time":"2023-05-31T11:51:18.268963-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013884 2237 kubeadm.go:322] W0531 18:49:20.930605 1586 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:51:18.268964-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013961 2237 kubeadm.go:322] W0531 18:49:20.931465 1586 manifests.go:225] the default kube-apiserver authorization-mode is \"Node,RBAC\"; using \"Node,RBAC\"\n"} +{"Time":"2023-05-31T11:51:18.268966-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013969 2237 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:51:18.268967-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.013978 2237 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T11:51:18.268969-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.014001 2237 ssh_runner.go:195] Run: /bin/bash -c \"cat /proc/$(pgrep kube-apiserver)/oom_adj\"\n"} +{"Time":"2023-05-31T11:51:18.268971-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.014070 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl create clusterrolebinding minikube-rbac --clusterrole=cluster-admin --serviceaccount=kube-system:default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.268973-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.014070 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl label nodes minikube.k8s.io/version=v1.30.1 minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140 minikube.k8s.io/name=ingress-addon-legacy-798000 minikube.k8s.io/updated_at=2023_05_31T11_49_34_0700 minikube.k8s.io/primary=true --all --overwrite --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269084-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.018169 2237 ops.go:34] apiserver oom_adj: -16\n"} +{"Time":"2023-05-31T11:51:18.269088-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.128006 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269094-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:34.665546 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269096-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:35.165522 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269098-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:35.665501 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269099-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:36.165514 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269101-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:36.663703 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269102-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:37.165242 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269104-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:37.665600 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269105-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:38.165487 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269107-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:38.665479 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269108-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:39.165288 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.26911-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:39.665446 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269246-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:40.165522 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269265-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:40.663437 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269267-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:41.165455 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269269-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:41.665488 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269271-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:42.165416 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269272-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:42.664092 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269274-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:43.165417 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269275-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:43.665387 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269277-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:44.165373 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269278-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:44.665427 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.26928-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:45.165367 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269281-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:45.665348 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269283-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:46.165320 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.26941-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:46.665382 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269413-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:47.165352 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269415-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:47.665389 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269417-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:48.165382 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269418-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:48.665281 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.26942-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:49.165313 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269421-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:49.665372 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269423-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.165308 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269424-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.664715 2237 ssh_runner.go:195] Run: sudo /var/lib/minikube/binaries/v1.18.20/kubectl get sa default --kubeconfig=/var/lib/minikube/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269426-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.721271 2237 kubeadm.go:1076] duration metric: took 16.707509042s to wait for elevateKubeSystemPrivileges.\n"} +{"Time":"2023-05-31T11:51:18.269427-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.721291 2237 kubeadm.go:406] StartCluster complete in 31.8568875s\n"} +{"Time":"2023-05-31T11:51:18.269429-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.721303 2237 settings.go:142] acquiring lock: {Name:mk21b0706c1b317cf69100362f2296fa879c00d7 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.269431-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.721389 2237 settings.go:150] Updating kubeconfig: /Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:51:18.269493-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.721926 2237 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/kubeconfig: {Name:mk798616fa7d82f2defe425781279f8a2840bc7d Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:51:18.269496-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722093 2237 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.18.20/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml\"\n"} +{"Time":"2023-05-31T11:51:18.269498-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722124 2237 addons.go:496] enable addons start: toEnable=map[ambassador:false auto-pause:false cloud-spanner:false csi-hostpath-driver:false dashboard:false default-storageclass:true efk:false freshpod:false gcp-auth:false gvisor:false headlamp:false helm-tiller:false inaccel:false ingress:false ingress-dns:false inspektor-gadget:false istio:false istio-provisioner:false kong:false kubevirt:false logviewer:false metallb:false metrics-server:false nvidia-driver-installer:false nvidia-gpu-device-plugin:false olm:false pod-security-policy:false portainer:false registry:false registry-aliases:false registry-creds:false storage-provisioner:true storage-provisioner-gluster:false volumesnapshots:false]\n"} +{"Time":"2023-05-31T11:51:18.269501-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722177 2237 addons.go:66] Setting storage-provisioner=true in profile \"ingress-addon-legacy-798000\"\n"} +{"Time":"2023-05-31T11:51:18.269502-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722184 2237 addons.go:228] Setting addon storage-provisioner=true in \"ingress-addon-legacy-798000\"\n"} +{"Time":"2023-05-31T11:51:18.269504-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722213 2237 host.go:66] Checking if \"ingress-addon-legacy-798000\" exists ...\n"} +{"Time":"2023-05-31T11:51:18.269505-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722223 2237 addons.go:66] Setting default-storageclass=true in profile \"ingress-addon-legacy-798000\"\n"} +{"Time":"2023-05-31T11:51:18.269507-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722250 2237 addons_storage_classes.go:33] enableOrDisableStorageClasses default-storageclass=true on \"ingress-addon-legacy-798000\"\n"} +{"Time":"2023-05-31T11:51:18.26951-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722336 2237 kapi.go:59] client config for ingress-addon-legacy-798000: \u0026rest.Config{Host:\"https://192.168.105.6:8443\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt\", KeyFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.key\", CAFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint"} +{"Time":"2023-05-31T11:51:18.269582-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"8(nil), CAData:[]uint8(nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x1021d1550), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T11:51:18.269607-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722480 2237 config.go:182] Loaded profile config \"ingress-addon-legacy-798000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.269611-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.722708 2237 cert_rotation.go:137] Starting client certificate rotation controller\n"} +{"Time":"2023-05-31T11:51:18.269617-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.723291 2237 kapi.go:59] client config for ingress-addon-legacy-798000: \u0026rest.Config{Host:\"https://192.168.105.6:8443\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt\", KeyFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.key\", CAFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint"} +{"Time":"2023-05-31T11:51:18.269621-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"8(nil), CAData:[]uint8(nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x1021d1550), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T11:51:18.269623-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.728125 2237 out.go:177] - Using image gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:51:18.269625-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.732035 2237 addons.go:420] installing /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T11:51:18.269626-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.732043 2237 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storage-provisioner.yaml (2676 bytes)\n"} +{"Time":"2023-05-31T11:51:18.269628-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.732057 2237 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.6 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:51:18.269637-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.736988 2237 addons.go:228] Setting addon default-storageclass=true in \"ingress-addon-legacy-798000\"\n"} +{"Time":"2023-05-31T11:51:18.269638-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.737008 2237 host.go:66] Checking if \"ingress-addon-legacy-798000\" exists ...\n"} +{"Time":"2023-05-31T11:51:18.26964-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.737711 2237 addons.go:420] installing /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T11:51:18.269641-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.737719 2237 ssh_runner.go:362] scp memory --\u003e /etc/kubernetes/addons/storageclass.yaml (271 bytes)\n"} +{"Time":"2023-05-31T11:51:18.269643-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.737726 2237 sshutil.go:53] new ssh client: \u0026{IP:192.168.105.6 Port:22 SSHKeyPath:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/ingress-addon-legacy-798000/id_rsa Username:docker}\n"} +{"Time":"2023-05-31T11:51:18.269645-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.848476 2237 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply -f /etc/kubernetes/addons/storageclass.yaml\n"} +{"Time":"2023-05-31T11:51:18.269646-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.850811 2237 ssh_runner.go:195] Run: sudo KUBECONFIG=/var/lib/minikube/kubeconfig /var/lib/minikube/binaries/v1.18.20/kubectl apply -f /etc/kubernetes/addons/storage-provisioner.yaml\n"} +{"Time":"2023-05-31T11:51:18.269648-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:50.899111 2237 ssh_runner.go:195] Run: /bin/bash -c \"sudo /var/lib/minikube/binaries/v1.18.20/kubectl --kubeconfig=/var/lib/minikube/kubeconfig -n kube-system get configmap coredns -o yaml | sed -e '/^ forward . \\/etc\\/resolv.conf.*/i \\ hosts {\\n 192.168.105.1 host.minikube.internal\\n fallthrough\\n }' -e '/^ errors *$/i \\ log' | sudo /var/lib/minikube/binaries/v1.18.20/kubectl --kubeconfig=/var/lib/minikube/kubeconfig replace -f -\"\n"} +{"Time":"2023-05-31T11:51:18.269651-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.242793 2237 kapi.go:248] \"coredns\" deployment in \"kube-system\" namespace and \"ingress-addon-legacy-798000\" context rescaled to 1 replicas\n"} +{"Time":"2023-05-31T11:51:18.269652-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.242814 2237 start.go:223] Will wait 6m0s for node \u0026{Name: IP:192.168.105.6 Port:8443 KubernetesVersion:v1.18.20 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:51:18.269654-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.246291 2237 out.go:177] * Verifying Kubernetes components...\n"} +{"Time":"2023-05-31T11:51:18.26972-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.257370 2237 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T11:51:18.269722-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.287339 2237 out.go:177] * Enabled addons: default-storageclass, storage-provisioner\n"} +{"Time":"2023-05-31T11:51:18.269723-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.295257 2237 addons.go:499] enable addons completed in 573.15075ms: enabled=[default-storageclass storage-provisioner]\n"} +{"Time":"2023-05-31T11:51:18.269725-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.305100 2237 start.go:916] {\"host.minikube.internal\": 192.168.105.1} host record injected into CoreDNS's ConfigMap\n"} +{"Time":"2023-05-31T11:51:18.269728-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.305455 2237 kapi.go:59] client config for ingress-addon-legacy-798000: \u0026rest.Config{Host:\"https://192.168.105.6:8443\", APIPath:\"\", ContentConfig:rest.ContentConfig{AcceptContentTypes:\"\", ContentType:\"\", GroupVersion:(*schema.GroupVersion)(nil), NegotiatedSerializer:runtime.NegotiatedSerializer(nil)}, Username:\"\", Password:\"\", BearerToken:\"\", BearerTokenFile:\"\", Impersonate:rest.ImpersonationConfig{UserName:\"\", UID:\"\", Groups:[]string(nil), Extra:map[string][]string(nil)}, AuthProvider:\u003cnil\u003e, AuthConfigPersister:rest.AuthProviderConfigPersister(nil), ExecProvider:\u003cnil\u003e, TLSClientConfig:rest.sanitizedTLSClientConfig{Insecure:false, ServerName:\"\", CertFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt\", KeyFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.key\", CAFile:\"/Users/jenkins/minikube-integration/16569-1035/.minikube/ca.crt\", CertData:[]uint8(nil), KeyData:[]uint"} +{"Time":"2023-05-31T11:51:18.269733-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"8(nil), CAData:[]uint8(nil), NextProtos:[]string(nil)}, UserAgent:\"\", DisableCompression:false, Transport:http.RoundTripper(nil), WrapTransport:(transport.WrapperFunc)(0x1021d1550), QPS:0, Burst:0, RateLimiter:flowcontrol.RateLimiter(nil), WarningHandler:rest.WarningHandler(nil), Timeout:0, Dial:(func(context.Context, string, string) (net.Conn, error))(nil), Proxy:(func(*http.Request) (*url.URL, error))(nil)}\n"} +{"Time":"2023-05-31T11:51:18.269735-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.305585 2237 node_ready.go:35] waiting up to 6m0s for node \"ingress-addon-legacy-798000\" to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269736-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.306885 2237 node_ready.go:49] node \"ingress-addon-legacy-798000\" has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T11:51:18.269738-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.306890 2237 node_ready.go:38] duration metric: took 1.297916ms waiting for node \"ingress-addon-legacy-798000\" to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.26974-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.306893 2237 pod_ready.go:35] extra waiting up to 6m0s for all system-critical pods including labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.2698-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:51.310529 2237 pod_ready.go:78] waiting up to 6m0s for pod \"coredns-66bff467f8-c2tzr\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269803-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:53.328336 2237 pod_ready.go:102] pod \"coredns-66bff467f8-c2tzr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T11:51:18.269805-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:55.826727 2237 pod_ready.go:102] pod \"coredns-66bff467f8-c2tzr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T11:51:18.269806-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:57.827150 2237 pod_ready.go:102] pod \"coredns-66bff467f8-c2tzr\" in \"kube-system\" namespace has status \"Ready\":\"False\"\n"} +{"Time":"2023-05-31T11:51:18.269808-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.827305 2237 pod_ready.go:92] pod \"coredns-66bff467f8-c2tzr\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T11:51:18.269809-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.827340 2237 pod_ready.go:81] duration metric: took 7.5169105s waiting for pod \"coredns-66bff467f8-c2tzr\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269811-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.827356 2237 pod_ready.go:78] waiting up to 6m0s for pod \"coredns-66bff467f8-r6flc\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269813-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.830141 2237 pod_ready.go:97] error getting pod \"coredns-66bff467f8-r6flc\" in \"kube-system\" namespace (skipping!): pods \"coredns-66bff467f8-r6flc\" not found\n"} +{"Time":"2023-05-31T11:51:18.269814-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.830164 2237 pod_ready.go:81] duration metric: took 2.799833ms waiting for pod \"coredns-66bff467f8-r6flc\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269816-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 11:49:58.830175 2237 pod_ready.go:66] WaitExtra: waitPodCondition: error getting pod \"coredns-66bff467f8-r6flc\" in \"kube-system\" namespace (skipping!): pods \"coredns-66bff467f8-r6flc\" not found\n"} +{"Time":"2023-05-31T11:51:18.269817-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.830184 2237 pod_ready.go:78] waiting up to 6m0s for pod \"etcd-ingress-addon-legacy-798000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269819-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.836606 2237 pod_ready.go:92] pod \"etcd-ingress-addon-legacy-798000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T11:51:18.269929-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.836639 2237 pod_ready.go:81] duration metric: took 6.4435ms waiting for pod \"etcd-ingress-addon-legacy-798000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269932-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.836653 2237 pod_ready.go:78] waiting up to 6m0s for pod \"kube-apiserver-ingress-addon-legacy-798000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269933-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.843388 2237 pod_ready.go:92] pod \"kube-apiserver-ingress-addon-legacy-798000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T11:51:18.269935-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.843402 2237 pod_ready.go:81] duration metric: took 6.736042ms waiting for pod \"kube-apiserver-ingress-addon-legacy-798000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269937-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.843412 2237 pod_ready.go:78] waiting up to 6m0s for pod \"kube-controller-manager-ingress-addon-legacy-798000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.26994-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.848290 2237 pod_ready.go:92] pod \"kube-controller-manager-ingress-addon-legacy-798000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T11:51:18.269942-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.848301 2237 pod_ready.go:81] duration metric: took 4.880625ms waiting for pod \"kube-controller-manager-ingress-addon-legacy-798000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269944-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:58.848311 2237 pod_ready.go:78] waiting up to 6m0s for pod \"kube-proxy-x7hkk\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.269945-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.016867 2237 request.go:628] Waited for 166.085417ms due to client-side throttling, not priority and fairness, request: GET:https://192.168.105.6:8443/api/v1/nodes/ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.269947-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.023240 2237 pod_ready.go:92] pod \"kube-proxy-x7hkk\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T11:51:18.269949-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.023272 2237 pod_ready.go:81] duration metric: took 174.954209ms waiting for pod \"kube-proxy-x7hkk\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.26995-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.023297 2237 pod_ready.go:78] waiting up to 6m0s for pod \"kube-scheduler-ingress-addon-legacy-798000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.270014-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.216823 2237 request.go:628] Waited for 193.443125ms due to client-side throttling, not priority and fairness, request: GET:https://192.168.105.6:8443/api/v1/namespaces/kube-system/pods/kube-scheduler-ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.270017-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.416841 2237 request.go:628] Waited for 194.332666ms due to client-side throttling, not priority and fairness, request: GET:https://192.168.105.6:8443/api/v1/nodes/ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.270019-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.423389 2237 pod_ready.go:92] pod \"kube-scheduler-ingress-addon-legacy-798000\" in \"kube-system\" namespace has status \"Ready\":\"True\"\n"} +{"Time":"2023-05-31T11:51:18.270021-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.423418 2237 pod_ready.go:81] duration metric: took 400.109208ms waiting for pod \"kube-scheduler-ingress-addon-legacy-798000\" in \"kube-system\" namespace to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.270022-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.423446 2237 pod_ready.go:38] duration metric: took 8.116659833s for extra waiting for all system-critical and pods with labels [k8s-app=kube-dns component=etcd component=kube-apiserver component=kube-controller-manager k8s-app=kube-proxy component=kube-scheduler] to be \"Ready\" ...\n"} +{"Time":"2023-05-31T11:51:18.270024-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.423493 2237 api_server.go:52] waiting for apiserver process to appear ...\n"} +{"Time":"2023-05-31T11:51:18.270026-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.423807 2237 ssh_runner.go:195] Run: sudo pgrep -xnf kube-apiserver.*minikube.*\n"} +{"Time":"2023-05-31T11:51:18.270027-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.442251 2237 api_server.go:72] duration metric: took 8.199537625s to wait for apiserver process to appear ...\n"} +{"Time":"2023-05-31T11:51:18.270028-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.442279 2237 api_server.go:88] waiting for apiserver healthz status ...\n"} +{"Time":"2023-05-31T11:51:18.27003-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.442297 2237 api_server.go:253] Checking apiserver healthz at https://192.168.105.6:8443/healthz ...\n"} +{"Time":"2023-05-31T11:51:18.270031-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.451525 2237 api_server.go:279] https://192.168.105.6:8443/healthz returned 200:\n"} +{"Time":"2023-05-31T11:51:18.270033-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tok\n"} +{"Time":"2023-05-31T11:51:18.270034-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.452487 2237 api_server.go:141] control plane version: v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.270035-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.452502 2237 api_server.go:131] duration metric: took 10.215334ms to wait for apiserver health ...\n"} +{"Time":"2023-05-31T11:51:18.270102-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.452508 2237 system_pods.go:43] waiting for kube-system pods to appear ...\n"} +{"Time":"2023-05-31T11:51:18.270108-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.616841 2237 request.go:628] Waited for 164.254667ms due to client-side throttling, not priority and fairness, request: GET:https://192.168.105.6:8443/api/v1/namespaces/kube-system/pods\n"} +{"Time":"2023-05-31T11:51:18.270112-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634592 2237 system_pods.go:59] 7 kube-system pods found\n"} +{"Time":"2023-05-31T11:51:18.270116-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634630 2237 system_pods.go:61] \"coredns-66bff467f8-c2tzr\" [f824f930-47ac-4c0b-8a96-b1cc88d8b678] Running\n"} +{"Time":"2023-05-31T11:51:18.27012-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634638 2237 system_pods.go:61] \"etcd-ingress-addon-legacy-798000\" [6391cee3-0c0e-4461-ab8f-cd2c0f894ba2] Running\n"} +{"Time":"2023-05-31T11:51:18.270124-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634646 2237 system_pods.go:61] \"kube-apiserver-ingress-addon-legacy-798000\" [bd936996-fb98-4a02-a995-2636d60f4d15] Running\n"} +{"Time":"2023-05-31T11:51:18.270129-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634654 2237 system_pods.go:61] \"kube-controller-manager-ingress-addon-legacy-798000\" [a6886036-c2c7-4f1e-a50e-7b5f94cef17a] Running\n"} +{"Time":"2023-05-31T11:51:18.270133-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634667 2237 system_pods.go:61] \"kube-proxy-x7hkk\" [75eb3b99-f85d-42e9-a6fe-bc25ee0b5718] Running\n"} +{"Time":"2023-05-31T11:51:18.270148-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634677 2237 system_pods.go:61] \"kube-scheduler-ingress-addon-legacy-798000\" [152599fd-aba4-4c42-886e-861ac760b89b] Running\n"} +{"Time":"2023-05-31T11:51:18.27015-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634684 2237 system_pods.go:61] \"storage-provisioner\" [c4d46756-76e1-4de4-a766-bd266102f174] Running\n"} +{"Time":"2023-05-31T11:51:18.270151-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634698 2237 system_pods.go:74] duration metric: took 182.185791ms to wait for pod list to return data ...\n"} +{"Time":"2023-05-31T11:51:18.270153-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.634714 2237 default_sa.go:34] waiting for default service account to be created ...\n"} +{"Time":"2023-05-31T11:51:18.270155-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.816824 2237 request.go:628] Waited for 182.010458ms due to client-side throttling, not priority and fairness, request: GET:https://192.168.105.6:8443/api/v1/namespaces/default/serviceaccounts\n"} +{"Time":"2023-05-31T11:51:18.270156-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.823580 2237 default_sa.go:45] found service account: \"default\"\n"} +{"Time":"2023-05-31T11:51:18.270158-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.823612 2237 default_sa.go:55] duration metric: took 188.888209ms for default service account to be created ...\n"} +{"Time":"2023-05-31T11:51:18.270162-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:49:59.823629 2237 system_pods.go:116] waiting for k8s-apps to be running ...\n"} +{"Time":"2023-05-31T11:51:18.270164-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.016269 2237 request.go:628] Waited for 192.541167ms due to client-side throttling, not priority and fairness, request: GET:https://192.168.105.6:8443/api/v1/namespaces/kube-system/pods\n"} +{"Time":"2023-05-31T11:51:18.270166-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030171 2237 system_pods.go:86] 7 kube-system pods found\n"} +{"Time":"2023-05-31T11:51:18.270167-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030201 2237 system_pods.go:89] \"coredns-66bff467f8-c2tzr\" [f824f930-47ac-4c0b-8a96-b1cc88d8b678] Running\n"} +{"Time":"2023-05-31T11:51:18.270169-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030213 2237 system_pods.go:89] \"etcd-ingress-addon-legacy-798000\" [6391cee3-0c0e-4461-ab8f-cd2c0f894ba2] Running\n"} +{"Time":"2023-05-31T11:51:18.27017-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030222 2237 system_pods.go:89] \"kube-apiserver-ingress-addon-legacy-798000\" [bd936996-fb98-4a02-a995-2636d60f4d15] Running\n"} +{"Time":"2023-05-31T11:51:18.270172-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030232 2237 system_pods.go:89] \"kube-controller-manager-ingress-addon-legacy-798000\" [a6886036-c2c7-4f1e-a50e-7b5f94cef17a] Running\n"} +{"Time":"2023-05-31T11:51:18.270173-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030243 2237 system_pods.go:89] \"kube-proxy-x7hkk\" [75eb3b99-f85d-42e9-a6fe-bc25ee0b5718] Running\n"} +{"Time":"2023-05-31T11:51:18.270175-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030265 2237 system_pods.go:89] \"kube-scheduler-ingress-addon-legacy-798000\" [152599fd-aba4-4c42-886e-861ac760b89b] Running\n"} +{"Time":"2023-05-31T11:51:18.270177-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030278 2237 system_pods.go:89] \"storage-provisioner\" [c4d46756-76e1-4de4-a766-bd266102f174] Running\n"} +{"Time":"2023-05-31T11:51:18.270178-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030293 2237 system_pods.go:126] duration metric: took 206.658167ms to wait for k8s-apps to be running ...\n"} +{"Time":"2023-05-31T11:51:18.27018-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030315 2237 system_svc.go:44] waiting for kubelet service to be running ....\n"} +{"Time":"2023-05-31T11:51:18.270181-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.030476 2237 ssh_runner.go:195] Run: sudo systemctl is-active --quiet service kubelet\n"} +{"Time":"2023-05-31T11:51:18.270183-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.046926 2237 system_svc.go:56] duration metric: took 16.608875ms WaitForService to wait for kubelet.\n"} +{"Time":"2023-05-31T11:51:18.270309-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.046953 2237 kubeadm.go:581] duration metric: took 8.804249791s to wait for : map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] ...\n"} +{"Time":"2023-05-31T11:51:18.270312-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.046981 2237 node_conditions.go:102] verifying NodePressure condition ...\n"} +{"Time":"2023-05-31T11:51:18.270314-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.216824 2237 request.go:628] Waited for 169.74775ms due to client-side throttling, not priority and fairness, request: GET:https://192.168.105.6:8443/api/v1/nodes\n"} +{"Time":"2023-05-31T11:51:18.270315-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.224516 2237 node_conditions.go:122] node storage ephemeral capacity is 17784760Ki\n"} +{"Time":"2023-05-31T11:51:18.270317-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.224562 2237 node_conditions.go:123] node cpu capacity is 2\n"} +{"Time":"2023-05-31T11:51:18.270318-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.224589 2237 node_conditions.go:105] duration metric: took 177.598709ms to run NodePressure ...\n"} +{"Time":"2023-05-31T11:51:18.27032-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.224610 2237 start.go:228] waiting for startup goroutines ...\n"} +{"Time":"2023-05-31T11:51:18.270322-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.224626 2237 start.go:233] waiting for cluster config update ...\n"} +{"Time":"2023-05-31T11:51:18.270324-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.224660 2237 start.go:242] writing updated cluster config ...\n"} +{"Time":"2023-05-31T11:51:18.270326-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.226080 2237 ssh_runner.go:195] Run: rm -f paused\n"} +{"Time":"2023-05-31T11:51:18.270327-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.372183 2237 start.go:573] kubectl: 1.25.9, cluster: 1.18.20 (minor skew: 7)\n"} +{"Time":"2023-05-31T11:51:18.270328-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.375021 2237 out.go:177] \n"} +{"Time":"2023-05-31T11:51:18.27033-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 11:50:00.378999 2237 out.go:239] ! /usr/local/bin/kubectl is version 1.25.9, which may have incompatibilities with Kubernetes 1.18.20.\n"} +{"Time":"2023-05-31T11:51:18.270332-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.382852 2237 out.go:177] - Want kubectl v1.18.20? Try 'minikube kubectl -- get pods -A'\n"} +{"Time":"2023-05-31T11:51:18.270333-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 11:50:00.390948 2237 out.go:177] * Done! kubectl is now configured to use \"ingress-addon-legacy-798000\" cluster and \"default\" namespace by default\n"} +{"Time":"2023-05-31T11:51:18.270432-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.270439-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.270457-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e Docker \u003c==\n"} +{"Time":"2023-05-31T11:51:18.270465-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* -- Journal begins at Wed 2023-05-31 18:49:02 UTC, ends at Wed 2023-05-31 18:51:18 UTC. --\n"} +{"Time":"2023-05-31T11:51:18.270504-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:50:50 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:50:50.513368787Z\" level=warning msg=\"cleaning up after shim disconnected\" id=f574a77ef1d3c9bc42345e3d5fea9ab0e7ff8a70a5d77d9ebd6459c24e828cc2 namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270526-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:50:50 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:50:50.513372995Z\" level=info msg=\"cleaning up dead shim\" namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270529-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:04 ingress-addon-legacy-798000 dockerd[1239]: time=\"2023-05-31T18:51:04.701860783Z\" level=info msg=\"ignoring event\" container=1e200e6dc3eadbe55797a599cc8cf3ae236678e9ce8c63788a07a3ba47e5cb1d module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T11:51:18.270531-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:04 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:04.702796588Z\" level=info msg=\"shim disconnected\" id=1e200e6dc3eadbe55797a599cc8cf3ae236678e9ce8c63788a07a3ba47e5cb1d namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270532-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:04 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:04.702943298Z\" level=warning msg=\"cleaning up after shim disconnected\" id=1e200e6dc3eadbe55797a599cc8cf3ae236678e9ce8c63788a07a3ba47e5cb1d namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270534-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:04 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:04.702957882Z\" level=info msg=\"cleaning up dead shim\" namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270536-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:05.710317511Z\" level=info msg=\"loading plugin \\\"io.containerd.internal.v1.shutdown\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.internal.v1\n"} +{"Time":"2023-05-31T11:51:18.270538-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:05.710385929Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.pause\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:51:18.27054-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:05.710405137Z\" level=info msg=\"loading plugin \\\"io.containerd.event.v1.publisher\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.event.v1\n"} +{"Time":"2023-05-31T11:51:18.270542-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:05.710418763Z\" level=info msg=\"loading plugin \\\"io.containerd.ttrpc.v1.task\\\"...\" runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1\n"} +{"Time":"2023-05-31T11:51:18.270544-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 dockerd[1239]: time=\"2023-05-31T18:51:05.767255875Z\" level=info msg=\"ignoring event\" container=764f1b0ff29b34a3ac470d99253bcd3d68ec74b3cd72794005372cadc312fdca module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T11:51:18.270545-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:05.767395085Z\" level=info msg=\"shim disconnected\" id=764f1b0ff29b34a3ac470d99253bcd3d68ec74b3cd72794005372cadc312fdca namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270547-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:05.767423169Z\" level=warning msg=\"cleaning up after shim disconnected\" id=764f1b0ff29b34a3ac470d99253bcd3d68ec74b3cd72794005372cadc312fdca namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270549-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:05.767427169Z\" level=info msg=\"cleaning up dead shim\" namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270551-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1239]: time=\"2023-05-31T18:51:13.097766824Z\" level=info msg=\"Container failed to exit within 2s of signal 15 - using the force\" container=e3ee3494147366b9823bb9104d9be7247e0563e89a17a1c2a80c83d7d3943aee\n"} +{"Time":"2023-05-31T11:51:18.270554-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1239]: time=\"2023-05-31T18:51:13.103345044Z\" level=info msg=\"Container failed to exit within 2s of signal 15 - using the force\" container=e3ee3494147366b9823bb9104d9be7247e0563e89a17a1c2a80c83d7d3943aee\n"} +{"Time":"2023-05-31T11:51:18.270556-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1239]: time=\"2023-05-31T18:51:13.176352272Z\" level=info msg=\"ignoring event\" container=e3ee3494147366b9823bb9104d9be7247e0563e89a17a1c2a80c83d7d3943aee module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T11:51:18.270558-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:13.176669598Z\" level=info msg=\"shim disconnected\" id=e3ee3494147366b9823bb9104d9be7247e0563e89a17a1c2a80c83d7d3943aee namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.27056-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:13.176714681Z\" level=warning msg=\"cleaning up after shim disconnected\" id=e3ee3494147366b9823bb9104d9be7247e0563e89a17a1c2a80c83d7d3943aee namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270683-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:13.176723472Z\" level=info msg=\"cleaning up dead shim\" namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.27069-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1239]: time=\"2023-05-31T18:51:13.215975593Z\" level=info msg=\"ignoring event\" container=6626de1d842f52700cee997a3463a605892cc67cb20b1af79f7e4269c4b2a1b4 module=libcontainerd namespace=moby topic=/tasks/delete type=\"*events.TaskDelete\"\n"} +{"Time":"2023-05-31T11:51:18.270715-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:13.216432792Z\" level=info msg=\"shim disconnected\" id=6626de1d842f52700cee997a3463a605892cc67cb20b1af79f7e4269c4b2a1b4 namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270719-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:13.216482958Z\" level=warning msg=\"cleaning up after shim disconnected\" id=6626de1d842f52700cee997a3463a605892cc67cb20b1af79f7e4269c4b2a1b4 namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.27072-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:13.216489833Z\" level=info msg=\"cleaning up dead shim\" namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270722-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 dockerd[1245]: time=\"2023-05-31T18:51:13.223715353Z\" level=warning msg=\"cleanup warnings time=\\\"2023-05-31T18:51:13Z\\\" level=warning msg=\\\"failed to remove runc container\\\" error=\\\"runc did not terminate successfully: exit status 255: \\\" runtime=io.containerd.runc.v2\\n\" namespace=moby\n"} +{"Time":"2023-05-31T11:51:18.270724-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.270726-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.270727-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e container status \u003c==\n"} +{"Time":"2023-05-31T11:51:18.270729-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* CONTAINER IMAGE CREATED STATE NAME ATTEMPT POD ID\n"} +{"Time":"2023-05-31T11:51:18.27073-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t764f1b0ff29b3 13753a81eccfd 13 seconds ago Exited hello-world-app 2 99552f2a79768\n"} +{"Time":"2023-05-31T11:51:18.270732-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t9a035b6c6e0aa nginx@sha256:2e776a66a3556f001aba13431b26e448fe8acba277bf93d2ab1a785571a46d90 39 seconds ago Running nginx 0 2361429af26cd\n"} +{"Time":"2023-05-31T11:51:18.270861-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \te3ee349414736 registry.k8s.io/ingress-nginx/controller@sha256:35fe394c82164efa8f47f3ed0be981b3f23da77175bbb8268a9ae438851c8324 About a minute ago Exited controller 0 6626de1d842f5\n"} +{"Time":"2023-05-31T11:51:18.270864-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \te5a61adc9725e jettech/kube-webhook-certgen@sha256:950833e19ade18cd389d647efb88992a7cc077abedef343fa59e012d376d79b7 About a minute ago Exited patch 0 8bd1a6631b6c5\n"} +{"Time":"2023-05-31T11:51:18.270866-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t56d6a641dc644 jettech/kube-webhook-certgen@sha256:950833e19ade18cd389d647efb88992a7cc077abedef343fa59e012d376d79b7 About a minute ago Exited create 0 30e8fe119498e\n"} +{"Time":"2023-05-31T11:51:18.270868-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tb6fc3d2ad50cc gcr.io/k8s-minikube/storage-provisioner@sha256:18eb69d1418e854ad5a19e399310e52808a8321e4c441c1dddad8977a0d7a944 About a minute ago Running storage-provisioner 0 8211d3af3e96f\n"} +{"Time":"2023-05-31T11:51:18.27087-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t1cde38c3bc15d 6e17ba78cf3eb About a minute ago Running coredns 0 bf35d2b694ebf\n"} +{"Time":"2023-05-31T11:51:18.270871-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tf53b0f28a3e7b 565297bc6f7d4 About a minute ago Running kube-proxy 0 4a297288bcadb\n"} +{"Time":"2023-05-31T11:51:18.270873-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t6516182cabeab 095f37015706d About a minute ago Running kube-scheduler 0 c253c7fe705de\n"} +{"Time":"2023-05-31T11:51:18.270875-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tca93f9807f1b3 2694cf044d665 About a minute ago Running kube-apiserver 0 d9ce6995429f8\n"} +{"Time":"2023-05-31T11:51:18.270877-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t83654b4c59cdc ab707b0a0ea33 About a minute ago Running etcd 0 c20027bde5b5b\n"} +{"Time":"2023-05-31T11:51:18.270878-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t5ef230356113f 68a4fac29a865 About a minute ago Running kube-controller-manager 0 07a8bf1ea6425\n"} +{"Time":"2023-05-31T11:51:18.270996-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.271001-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.271005-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e coredns [1cde38c3bc15] \u003c==\n"} +{"Time":"2023-05-31T11:51:18.271009-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* [INFO] 172.17.0.1:4776 - 62460 \"A IN hello-world-app.default.svc.cluster.local.svc.cluster.local. udp 77 false 512\" NXDOMAIN qr,aa,rd 170 0.000045584s\n"} +{"Time":"2023-05-31T11:51:18.271013-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:13170 - 50457 \"AAAA IN hello-world-app.default.svc.cluster.local.ingress-nginx.svc.cluster.local. udp 91 false 512\" NXDOMAIN qr,aa,rd 184 0.000016167s\n"} +{"Time":"2023-05-31T11:51:18.271017-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:4776 - 48631 \"AAAA IN hello-world-app.default.svc.cluster.local.svc.cluster.local. udp 77 false 512\" NXDOMAIN qr,aa,rd 170 0.000106044s\n"} +{"Time":"2023-05-31T11:51:18.271021-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:13170 - 28356 \"A IN hello-world-app.default.svc.cluster.local.svc.cluster.local. udp 77 false 512\" NXDOMAIN qr,aa,rd 170 0.000014541s\n"} +{"Time":"2023-05-31T11:51:18.271025-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:13170 - 14908 \"AAAA IN hello-world-app.default.svc.cluster.local.svc.cluster.local. udp 77 false 512\" NXDOMAIN qr,aa,rd 170 0.000017625s\n"} +{"Time":"2023-05-31T11:51:18.271029-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:4776 - 49706 \"A IN hello-world-app.default.svc.cluster.local.cluster.local. udp 73 false 512\" NXDOMAIN qr,aa,rd 166 0.000043s\n"} +{"Time":"2023-05-31T11:51:18.271032-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:4776 - 46447 \"AAAA IN hello-world-app.default.svc.cluster.local.cluster.local. udp 73 false 512\" NXDOMAIN qr,aa,rd 166 0.000034583s\n"} +{"Time":"2023-05-31T11:51:18.271036-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:13170 - 19653 \"A IN hello-world-app.default.svc.cluster.local.cluster.local. udp 73 false 512\" NXDOMAIN qr,aa,rd 166 0.000009584s\n"} +{"Time":"2023-05-31T11:51:18.27104-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:49011 - 1911 \"A IN hello-world-app.default.svc.cluster.local.ingress-nginx.svc.cluster.local. udp 91 false 512\" NXDOMAIN qr,aa,rd 184 0.000023667s\n"} +{"Time":"2023-05-31T11:51:18.271043-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:4776 - 52457 \"A IN hello-world-app.default.svc.cluster.local. udp 59 false 512\" NOERROR qr,aa,rd 116 0.000040417s\n"} +{"Time":"2023-05-31T11:51:18.271051-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:13170 - 8679 \"AAAA IN hello-world-app.default.svc.cluster.local.cluster.local. udp 73 false 512\" NXDOMAIN qr,aa,rd 166 0.000018751s\n"} +{"Time":"2023-05-31T11:51:18.271055-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:49011 - 21065 \"AAAA IN hello-world-app.default.svc.cluster.local.ingress-nginx.svc.cluster.local. udp 91 false 512\" NXDOMAIN qr,aa,rd 184 0.000015709s\n"} +{"Time":"2023-05-31T11:51:18.27108-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:13170 - 36514 \"A IN hello-world-app.default.svc.cluster.local. udp 59 false 512\" NOERROR qr,aa,rd 116 0.000012501s\n"} +{"Time":"2023-05-31T11:51:18.271097-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:49011 - 42887 \"A IN hello-world-app.default.svc.cluster.local.svc.cluster.local. udp 77 false 512\" NXDOMAIN qr,aa,rd 170 0.000013792s\n"} +{"Time":"2023-05-31T11:51:18.271105-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:49011 - 56743 \"AAAA IN hello-world-app.default.svc.cluster.local.svc.cluster.local. udp 77 false 512\" NXDOMAIN qr,aa,rd 170 0.000012917s\n"} +{"Time":"2023-05-31T11:51:18.27111-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:50193 - 54083 \"A IN hello-world-app.default.svc.cluster.local.ingress-nginx.svc.cluster.local. udp 91 false 512\" NXDOMAIN qr,aa,rd 184 0.000043501s\n"} +{"Time":"2023-05-31T11:51:18.271114-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:49011 - 63647 \"A IN hello-world-app.default.svc.cluster.local.cluster.local. udp 73 false 512\" NXDOMAIN qr,aa,rd 166 0.000010667s\n"} +{"Time":"2023-05-31T11:51:18.271118-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:50193 - 34804 \"AAAA IN hello-world-app.default.svc.cluster.local.ingress-nginx.svc.cluster.local. udp 91 false 512\" NXDOMAIN qr,aa,rd 184 0.000009208s\n"} +{"Time":"2023-05-31T11:51:18.271125-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:49011 - 41851 \"AAAA IN hello-world-app.default.svc.cluster.local.cluster.local. udp 73 false 512\" NXDOMAIN qr,aa,rd 166 0.000008334s\n"} +{"Time":"2023-05-31T11:51:18.271129-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:50193 - 37441 \"A IN hello-world-app.default.svc.cluster.local.svc.cluster.local. udp 77 false 512\" NXDOMAIN qr,aa,rd 170 0.000009709s\n"} +{"Time":"2023-05-31T11:51:18.271133-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:49011 - 19235 \"A IN hello-world-app.default.svc.cluster.local. udp 59 false 512\" NOERROR qr,aa,rd 116 0.00000975s\n"} +{"Time":"2023-05-31T11:51:18.271136-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:50193 - 14982 \"AAAA IN hello-world-app.default.svc.cluster.local.svc.cluster.local. udp 77 false 512\" NXDOMAIN qr,aa,rd 170 0.000011792s\n"} +{"Time":"2023-05-31T11:51:18.271153-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:50193 - 33058 \"A IN hello-world-app.default.svc.cluster.local.cluster.local. udp 73 false 512\" NXDOMAIN qr,aa,rd 166 0.000012251s\n"} +{"Time":"2023-05-31T11:51:18.271169-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:50193 - 3936 \"AAAA IN hello-world-app.default.svc.cluster.local.cluster.local. udp 73 false 512\" NXDOMAIN qr,aa,rd 166 0.000008959s\n"} +{"Time":"2023-05-31T11:51:18.271173-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[INFO] 172.17.0.1:50193 - 57225 \"A IN hello-world-app.default.svc.cluster.local. udp 59 false 512\" NOERROR qr,aa,rd 116 0.000008958s\n"} +{"Time":"2023-05-31T11:51:18.271188-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.271193-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.271197-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e describe nodes \u003c==\n"} +{"Time":"2023-05-31T11:51:18.271214-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* Name: ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.271216-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tRoles: master\n"} +{"Time":"2023-05-31T11:51:18.271218-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLabels: beta.kubernetes.io/arch=arm64\n"} +{"Time":"2023-05-31T11:51:18.271219-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t beta.kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T11:51:18.271221-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kubernetes.io/arch=arm64\n"} +{"Time":"2023-05-31T11:51:18.271222-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kubernetes.io/hostname=ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.271224-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kubernetes.io/os=linux\n"} +{"Time":"2023-05-31T11:51:18.271225-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t minikube.k8s.io/commit=7022875d4a054c2d518e5e5a7b9d500799d50140\n"} +{"Time":"2023-05-31T11:51:18.271227-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t minikube.k8s.io/name=ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.271228-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t minikube.k8s.io/primary=true\n"} +{"Time":"2023-05-31T11:51:18.27123-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t minikube.k8s.io/updated_at=2023_05_31T11_49_34_0700\n"} +{"Time":"2023-05-31T11:51:18.271231-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t minikube.k8s.io/version=v1.30.1\n"} +{"Time":"2023-05-31T11:51:18.271233-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t node-role.kubernetes.io/master=\n"} +{"Time":"2023-05-31T11:51:18.271234-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tAnnotations: kubeadm.alpha.kubernetes.io/cri-socket: /var/run/dockershim.sock\n"} +{"Time":"2023-05-31T11:51:18.271235-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t node.alpha.kubernetes.io/ttl: 0\n"} +{"Time":"2023-05-31T11:51:18.271237-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t volumes.kubernetes.io/controller-managed-attach-detach: true\n"} +{"Time":"2023-05-31T11:51:18.271238-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tCreationTimestamp: Wed, 31 May 2023 18:49:31 +0000\n"} +{"Time":"2023-05-31T11:51:18.271315-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tTaints: \u003cnone\u003e\n"} +{"Time":"2023-05-31T11:51:18.271317-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tUnschedulable: false\n"} +{"Time":"2023-05-31T11:51:18.271322-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLease:\n"} +{"Time":"2023-05-31T11:51:18.271323-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t HolderIdentity: ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.271324-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t AcquireTime: \u003cunset\u003e\n"} +{"Time":"2023-05-31T11:51:18.271326-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t RenewTime: Wed, 31 May 2023 18:51:10 +0000\n"} +{"Time":"2023-05-31T11:51:18.271327-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tConditions:\n"} +{"Time":"2023-05-31T11:51:18.271328-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Type Status LastHeartbeatTime LastTransitionTime Reason Message\n"} +{"Time":"2023-05-31T11:51:18.27133-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ---- ------ ----------------- ------------------ ------ -------\n"} +{"Time":"2023-05-31T11:51:18.271332-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t MemoryPressure False Wed, 31 May 2023 18:51:10 +0000 Wed, 31 May 2023 18:49:29 +0000 KubeletHasSufficientMemory kubelet has sufficient memory available\n"} +{"Time":"2023-05-31T11:51:18.271334-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t DiskPressure False Wed, 31 May 2023 18:51:10 +0000 Wed, 31 May 2023 18:49:29 +0000 KubeletHasNoDiskPressure kubelet has no disk pressure\n"} +{"Time":"2023-05-31T11:51:18.271335-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t PIDPressure False Wed, 31 May 2023 18:51:10 +0000 Wed, 31 May 2023 18:49:29 +0000 KubeletHasSufficientPID kubelet has sufficient PID available\n"} +{"Time":"2023-05-31T11:51:18.271337-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Ready True Wed, 31 May 2023 18:51:10 +0000 Wed, 31 May 2023 18:49:40 +0000 KubeletReady kubelet is posting ready status\n"} +{"Time":"2023-05-31T11:51:18.271338-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tAddresses:\n"} +{"Time":"2023-05-31T11:51:18.271339-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t InternalIP: 192.168.105.6\n"} +{"Time":"2023-05-31T11:51:18.27134-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Hostname: ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.271342-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tCapacity:\n"} +{"Time":"2023-05-31T11:51:18.271343-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t cpu: 2\n"} +{"Time":"2023-05-31T11:51:18.271395-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ephemeral-storage: 17784760Ki\n"} +{"Time":"2023-05-31T11:51:18.271397-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-1Gi: 0\n"} +{"Time":"2023-05-31T11:51:18.271398-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T11:51:18.2714-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-32Mi: 0\n"} +{"Time":"2023-05-31T11:51:18.271401-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-64Ki: 0\n"} +{"Time":"2023-05-31T11:51:18.271402-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t memory: 4004084Ki\n"} +{"Time":"2023-05-31T11:51:18.271404-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T11:51:18.271406-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tAllocatable:\n"} +{"Time":"2023-05-31T11:51:18.271434-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t cpu: 2\n"} +{"Time":"2023-05-31T11:51:18.271436-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ephemeral-storage: 17784760Ki\n"} +{"Time":"2023-05-31T11:51:18.271437-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-1Gi: 0\n"} +{"Time":"2023-05-31T11:51:18.271438-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-2Mi: 0\n"} +{"Time":"2023-05-31T11:51:18.271439-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-32Mi: 0\n"} +{"Time":"2023-05-31T11:51:18.271441-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-64Ki: 0\n"} +{"Time":"2023-05-31T11:51:18.271442-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t memory: 4004084Ki\n"} +{"Time":"2023-05-31T11:51:18.271443-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t pods: 110\n"} +{"Time":"2023-05-31T11:51:18.271444-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tSystem Info:\n"} +{"Time":"2023-05-31T11:51:18.271446-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Machine ID: 2999d8bae6934aaa9f1b60ec5ace70b2\n"} +{"Time":"2023-05-31T11:51:18.271447-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t System UUID: 2999d8bae6934aaa9f1b60ec5ace70b2\n"} +{"Time":"2023-05-31T11:51:18.271449-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Boot ID: a9e19d70-666c-4510-aa71-36b12f00dd3a\n"} +{"Time":"2023-05-31T11:51:18.27145-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Kernel Version: 5.10.57\n"} +{"Time":"2023-05-31T11:51:18.271451-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t OS Image: Buildroot 2021.02.12\n"} +{"Time":"2023-05-31T11:51:18.271453-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Operating System: linux\n"} +{"Time":"2023-05-31T11:51:18.271483-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Architecture: arm64\n"} +{"Time":"2023-05-31T11:51:18.271488-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Container Runtime Version: docker://24.0.1\n"} +{"Time":"2023-05-31T11:51:18.271492-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Kubelet Version: v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.271495-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Kube-Proxy Version: v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.271498-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tPodCIDR: 10.244.0.0/24\n"} +{"Time":"2023-05-31T11:51:18.271502-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tPodCIDRs: 10.244.0.0/24\n"} +{"Time":"2023-05-31T11:51:18.271518-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tNon-terminated Pods: (9 in total)\n"} +{"Time":"2023-05-31T11:51:18.271521-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Namespace Name CPU Requests CPU Limits Memory Requests Memory Limits AGE\n"} +{"Time":"2023-05-31T11:51:18.271523-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t --------- ---- ------------ ---------- --------------- ------------- ---\n"} +{"Time":"2023-05-31T11:51:18.271525-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t default hello-world-app-5f5d8b66bb-d5gjf 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 31s\n"} +{"Time":"2023-05-31T11:51:18.271526-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t default nginx 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 42s\n"} +{"Time":"2023-05-31T11:51:18.271528-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kube-system coredns-66bff467f8-c2tzr 100m (5%!)(MISSING) 0 (0%!)(MISSING) 70Mi (1%!)(MISSING) 170Mi (4%!)(MISSING) 88s\n"} +{"Time":"2023-05-31T11:51:18.271529-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kube-system etcd-ingress-addon-legacy-798000 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 98s\n"} +{"Time":"2023-05-31T11:51:18.271531-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kube-system kube-apiserver-ingress-addon-legacy-798000 250m (12%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 98s\n"} +{"Time":"2023-05-31T11:51:18.271533-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kube-system kube-controller-manager-ingress-addon-legacy-798000 200m (10%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 98s\n"} +{"Time":"2023-05-31T11:51:18.271562-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kube-system kube-proxy-x7hkk 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 88s\n"} +{"Time":"2023-05-31T11:51:18.271565-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kube-system kube-scheduler-ingress-addon-legacy-798000 100m (5%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 97s\n"} +{"Time":"2023-05-31T11:51:18.271568-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t kube-system storage-provisioner 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 0 (0%!)(MISSING) 87s\n"} +{"Time":"2023-05-31T11:51:18.27157-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tAllocated resources:\n"} +{"Time":"2023-05-31T11:51:18.271571-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t (Total limits may be over 100 percent, i.e., overcommitted.)\n"} +{"Time":"2023-05-31T11:51:18.271572-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Resource Requests Limits\n"} +{"Time":"2023-05-31T11:51:18.271574-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t -------- -------- ------\n"} +{"Time":"2023-05-31T11:51:18.271575-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t cpu 650m (32%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.271576-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t memory 70Mi (1%!)(MISSING) 170Mi (4%!)(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.271578-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ephemeral-storage 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.271579-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-1Gi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.27158-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-2Mi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.271582-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-32Mi 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.271583-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t hugepages-64Ki 0 (0%!)(MISSING) 0 (0%!)(MISSING)\n"} +{"Time":"2023-05-31T11:51:18.271584-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tEvents:\n"} +{"Time":"2023-05-31T11:51:18.271585-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Type Reason Age From Message\n"} +{"Time":"2023-05-31T11:51:18.271587-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t ---- ------ ---- ---- -------\n"} +{"Time":"2023-05-31T11:51:18.271588-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Normal Starting 98s kubelet Starting kubelet.\n"} +{"Time":"2023-05-31T11:51:18.271697-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Normal NodeAllocatableEnforced 98s kubelet Updated Node Allocatable limit across pods\n"} +{"Time":"2023-05-31T11:51:18.271731-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Normal NodeHasSufficientMemory 98s kubelet Node ingress-addon-legacy-798000 status is now: NodeHasSufficientMemory\n"} +{"Time":"2023-05-31T11:51:18.271734-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Normal NodeHasNoDiskPressure 98s kubelet Node ingress-addon-legacy-798000 status is now: NodeHasNoDiskPressure\n"} +{"Time":"2023-05-31T11:51:18.271736-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Normal NodeHasSufficientPID 98s kubelet Node ingress-addon-legacy-798000 status is now: NodeHasSufficientPID\n"} +{"Time":"2023-05-31T11:51:18.271737-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Normal NodeReady 98s kubelet Node ingress-addon-legacy-798000 status is now: NodeReady\n"} +{"Time":"2023-05-31T11:51:18.271739-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t Normal Starting 87s kube-proxy Starting kube-proxy.\n"} +{"Time":"2023-05-31T11:51:18.271741-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.271742-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.271743-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e dmesg \u003c==\n"} +{"Time":"2023-05-31T11:51:18.271745-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* [May31 18:49] ACPI: SRAT not present\n"} +{"Time":"2023-05-31T11:51:18.271746-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.000000] KASLR disabled due to lack of seed\n"} +{"Time":"2023-05-31T11:51:18.271747-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.630831] EINJ: EINJ table not found.\n"} +{"Time":"2023-05-31T11:51:18.271749-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.501597] systemd-fstab-generator[114]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.27175-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.044305] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.\n"} +{"Time":"2023-05-31T11:51:18.271752-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.000794] systemd[1]: (This warning is only shown for the first unit using IP firewalling.)\n"} +{"Time":"2023-05-31T11:51:18.271753-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +3.106346] systemd-fstab-generator[472]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271755-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.079146] systemd-fstab-generator[483]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271802-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +3.475377] systemd-fstab-generator[782]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271808-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +1.526862] kauditd_printk_skb: 17 callbacks suppressed\n"} +{"Time":"2023-05-31T11:51:18.271812-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.117066] systemd-fstab-generator[954]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271816-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.176552] systemd-fstab-generator[990]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271819-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.088287] systemd-fstab-generator[1001]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271823-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.066837] systemd-fstab-generator[1014]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271843-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +4.437418] systemd-fstab-generator[1232]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271846-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +1.551168] kauditd_printk_skb: 68 callbacks suppressed\n"} +{"Time":"2023-05-31T11:51:18.271851-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +2.848221] systemd-fstab-generator[1704]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271852-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +8.212706] kauditd_printk_skb: 29 callbacks suppressed\n"} +{"Time":"2023-05-31T11:51:18.271854-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +0.093174] kmem.limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.\n"} +{"Time":"2023-05-31T11:51:18.271855-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +6.266801] systemd-fstab-generator[2778]: Ignoring \"noauto\" for root device\n"} +{"Time":"2023-05-31T11:51:18.271857-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +17.147728] kauditd_printk_skb: 7 callbacks suppressed\n"} +{"Time":"2023-05-31T11:51:18.271859-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +7.586295] kauditd_printk_skb: 11 callbacks suppressed\n"} +{"Time":"2023-05-31T11:51:18.27186-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[May31 18:50] TCP: eth0: Driver has suspect GRO implementation, TCP performance may be compromised.\n"} +{"Time":"2023-05-31T11:51:18.271861-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t[ +41.357107] kauditd_printk_skb: 1 callbacks suppressed\n"} +{"Time":"2023-05-31T11:51:18.271863-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.271864-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.271865-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e etcd [83654b4c59cd] \u003c==\n"} +{"Time":"2023-05-31T11:51:18.271873-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* raft2023/05/31 18:49:29 INFO: ed054832bd1917e1 became follower at term 0\n"} +{"Time":"2023-05-31T11:51:18.271874-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: newRaft ed054832bd1917e1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]\n"} +{"Time":"2023-05-31T11:51:18.271876-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: ed054832bd1917e1 became follower at term 1\n"} +{"Time":"2023-05-31T11:51:18.271877-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: ed054832bd1917e1 switched to configuration voters=(17079136544630577121)\n"} +{"Time":"2023-05-31T11:51:18.271879-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.023131 W | auth: simple token is not cryptographically signed\n"} +{"Time":"2023-05-31T11:51:18.27188-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.059246 I | etcdserver: starting server... [version: 3.4.3, cluster version: to_be_decided]\n"} +{"Time":"2023-05-31T11:51:18.271884-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.066643 I | embed: ClientTLS: cert = /var/lib/minikube/certs/etcd/server.crt, key = /var/lib/minikube/certs/etcd/server.key, trusted-ca = /var/lib/minikube/certs/etcd/ca.crt, client-cert-auth = true, crl-file = \n"} +{"Time":"2023-05-31T11:51:18.271885-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.066719 I | embed: listening for metrics on http://127.0.0.1:2381\n"} +{"Time":"2023-05-31T11:51:18.271887-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.066775 I | etcdserver: ed054832bd1917e1 as single-node; fast-forwarding 9 ticks (election ticks 10)\n"} +{"Time":"2023-05-31T11:51:18.271888-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.066961 I | embed: listening for peers on 192.168.105.6:2380\n"} +{"Time":"2023-05-31T11:51:18.27189-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: ed054832bd1917e1 switched to configuration voters=(17079136544630577121)\n"} +{"Time":"2023-05-31T11:51:18.271891-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.067159 I | etcdserver/membership: added member ed054832bd1917e1 [https://192.168.105.6:2380] to cluster 45a39c2c59b0edf4\n"} +{"Time":"2023-05-31T11:51:18.271892-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: ed054832bd1917e1 is starting a new election at term 1\n"} +{"Time":"2023-05-31T11:51:18.271894-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: ed054832bd1917e1 became candidate at term 2\n"} +{"Time":"2023-05-31T11:51:18.271895-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: ed054832bd1917e1 received MsgVoteResp from ed054832bd1917e1 at term 2\n"} +{"Time":"2023-05-31T11:51:18.271897-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: ed054832bd1917e1 became leader at term 2\n"} +{"Time":"2023-05-31T11:51:18.271972-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \traft2023/05/31 18:49:29 INFO: raft.node: ed054832bd1917e1 elected leader ed054832bd1917e1 at term 2\n"} +{"Time":"2023-05-31T11:51:18.271974-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.904304 I | etcdserver: published {Name:ingress-addon-legacy-798000 ClientURLs:[https://192.168.105.6:2379]} to cluster 45a39c2c59b0edf4\n"} +{"Time":"2023-05-31T11:51:18.271976-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.904576 I | embed: ready to serve client requests\n"} +{"Time":"2023-05-31T11:51:18.271977-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.906139 I | embed: serving client requests on 127.0.0.1:2379\n"} +{"Time":"2023-05-31T11:51:18.271978-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.906199 I | embed: ready to serve client requests\n"} +{"Time":"2023-05-31T11:51:18.27198-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.906347 I | etcdserver: setting up the initial cluster version to 3.4\n"} +{"Time":"2023-05-31T11:51:18.271981-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.906828 N | etcdserver/membership: set the initial cluster version to 3.4\n"} +{"Time":"2023-05-31T11:51:18.271982-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.906942 I | etcdserver/api: enabled capabilities for version 3.4\n"} +{"Time":"2023-05-31T11:51:18.271984-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t2023-05-31 18:49:29.907410 I | embed: serving client requests on 192.168.105.6:2379\n"} +{"Time":"2023-05-31T11:51:18.271987-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.271989-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.27199-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e kernel \u003c==\n"} +{"Time":"2023-05-31T11:51:18.271992-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* 18:51:18 up 2 min, 0 users, load average: 0.90, 0.35, 0.13\n"} +{"Time":"2023-05-31T11:51:18.271993-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tLinux ingress-addon-legacy-798000 5.10.57 #1 SMP PREEMPT Wed May 24 00:44:44 UTC 2023 aarch64 GNU/Linux\n"} +{"Time":"2023-05-31T11:51:18.271995-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tPRETTY_NAME=\"Buildroot 2021.02.12\"\n"} +{"Time":"2023-05-31T11:51:18.271996-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.271997-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.271998-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e kube-apiserver [ca93f9807f1b] \u003c==\n"} +{"Time":"2023-05-31T11:51:18.272-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* I0531 18:49:31.490732 1 dynamic_cafile_content.go:167] Starting request-header::/var/lib/minikube/certs/front-proxy-ca.crt\n"} +{"Time":"2023-05-31T11:51:18.272094-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.511716 1 controller.go:152] Unable to remove old endpoints from kubernetes service: StorageError: key not found, Code: 1, Key: /registry/masterleases/192.168.105.6, ResourceVersion: 0, AdditionalErrorMsg: \n"} +{"Time":"2023-05-31T11:51:18.272097-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.588986 1 cache.go:39] Caches are synced for APIServiceRegistrationController controller\n"} +{"Time":"2023-05-31T11:51:18.272099-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.589031 1 shared_informer.go:230] Caches are synced for cluster_authentication_trust_controller \n"} +{"Time":"2023-05-31T11:51:18.2721-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.589051 1 cache.go:39] Caches are synced for AvailableConditionController controller\n"} +{"Time":"2023-05-31T11:51:18.272102-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.591062 1 shared_informer.go:230] Caches are synced for crd-autoregister \n"} +{"Time":"2023-05-31T11:51:18.272103-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.591098 1 cache.go:39] Caches are synced for autoregister controller\n"} +{"Time":"2023-05-31T11:51:18.272105-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.487016 1 controller.go:130] OpenAPI AggregationController: action for item : Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T11:51:18.272106-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.487189 1 controller.go:130] OpenAPI AggregationController: action for item k8s_internal_local_delegation_chain_0000000000: Nothing (removed from the queue).\n"} +{"Time":"2023-05-31T11:51:18.272108-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.498052 1 storage_scheduling.go:134] created PriorityClass system-node-critical with value 2000001000\n"} +{"Time":"2023-05-31T11:51:18.272109-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.504072 1 storage_scheduling.go:134] created PriorityClass system-cluster-critical with value 2000000000\n"} +{"Time":"2023-05-31T11:51:18.272111-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.504101 1 storage_scheduling.go:143] all system priority classes are created successfully or already exist.\n"} +{"Time":"2023-05-31T11:51:18.272115-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.665619 1 controller.go:609] quota admission added evaluator for: roles.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T11:51:18.272117-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.676040 1 controller.go:609] quota admission added evaluator for: rolebindings.rbac.authorization.k8s.io\n"} +{"Time":"2023-05-31T11:51:18.272118-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 18:49:32.753213 1 lease.go:224] Resetting endpoints for master service \"kubernetes\" to [192.168.105.6]\n"} +{"Time":"2023-05-31T11:51:18.272163-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.753755 1 controller.go:609] quota admission added evaluator for: endpoints\n"} +{"Time":"2023-05-31T11:51:18.272165-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:32.755500 1 controller.go:609] quota admission added evaluator for: endpointslices.discovery.k8s.io\n"} +{"Time":"2023-05-31T11:51:18.272167-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:33.784972 1 controller.go:609] quota admission added evaluator for: serviceaccounts\n"} +{"Time":"2023-05-31T11:51:18.272168-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:34.215249 1 controller.go:609] quota admission added evaluator for: deployments.apps\n"} +{"Time":"2023-05-31T11:51:18.27217-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:34.416958 1 controller.go:609] quota admission added evaluator for: daemonsets.apps\n"} +{"Time":"2023-05-31T11:51:18.272171-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:40.612519 1 controller.go:609] quota admission added evaluator for: leases.coordination.k8s.io\n"} +{"Time":"2023-05-31T11:51:18.272173-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.488015 1 controller.go:609] quota admission added evaluator for: controllerrevisions.apps\n"} +{"Time":"2023-05-31T11:51:18.272174-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.542177 1 controller.go:609] quota admission added evaluator for: replicasets.apps\n"} +{"Time":"2023-05-31T11:51:18.272176-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:00.752951 1 controller.go:609] quota admission added evaluator for: jobs.batch\n"} +{"Time":"2023-05-31T11:51:18.272177-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:36.143900 1 controller.go:609] quota admission added evaluator for: ingresses.networking.k8s.io\n"} +{"Time":"2023-05-31T11:51:18.272178-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.27218-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.272181-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e kube-controller-manager [5ef230356113] \u003c==\n"} +{"Time":"2023-05-31T11:51:18.272182-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* I0531 18:49:50.531321 1 disruption.go:339] Sending events to api server.\n"} +{"Time":"2023-05-31T11:51:18.272184-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.541001 1 shared_informer.go:230] Caches are synced for deployment \n"} +{"Time":"2023-05-31T11:51:18.272185-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.543754 1 event.go:278] Event(v1.ObjectReference{Kind:\"Deployment\", Namespace:\"kube-system\", Name:\"coredns\", UID:\"61cea30b-191d-44ba-9a38-b0d93909bf85\", APIVersion:\"apps/v1\", ResourceVersion:\"200\", FieldPath:\"\"}): type: 'Normal' reason: 'ScalingReplicaSet' Scaled up replica set coredns-66bff467f8 to 2\n"} +{"Time":"2023-05-31T11:51:18.272286-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.546340 1 event.go:278] Event(v1.ObjectReference{Kind:\"ReplicaSet\", Namespace:\"kube-system\", Name:\"coredns-66bff467f8\", UID:\"bd4822a4-f97a-489e-a44e-9a2fb6c18774\", APIVersion:\"apps/v1\", ResourceVersion:\"321\", FieldPath:\"\"}): type: 'Normal' reason: 'SuccessfulCreate' Created pod: coredns-66bff467f8-c2tzr\n"} +{"Time":"2023-05-31T11:51:18.272288-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.551365 1 event.go:278] Event(v1.ObjectReference{Kind:\"ReplicaSet\", Namespace:\"kube-system\", Name:\"coredns-66bff467f8\", UID:\"bd4822a4-f97a-489e-a44e-9a2fb6c18774\", APIVersion:\"apps/v1\", ResourceVersion:\"321\", FieldPath:\"\"}): type: 'Normal' reason: 'SuccessfulCreate' Created pod: coredns-66bff467f8-r6flc\n"} +{"Time":"2023-05-31T11:51:18.272291-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.637024 1 shared_informer.go:230] Caches are synced for HPA \n"} +{"Time":"2023-05-31T11:51:18.272292-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.692314 1 shared_informer.go:230] Caches are synced for persistent volume \n"} +{"Time":"2023-05-31T11:51:18.272294-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.730939 1 shared_informer.go:230] Caches are synced for bootstrap_signer \n"} +{"Time":"2023-05-31T11:51:18.272295-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.877253 1 event.go:278] Event(v1.ObjectReference{Kind:\"Deployment\", Namespace:\"kube-system\", Name:\"coredns\", UID:\"61cea30b-191d-44ba-9a38-b0d93909bf85\", APIVersion:\"apps/v1\", ResourceVersion:\"340\", FieldPath:\"\"}): type: 'Normal' reason: 'ScalingReplicaSet' Scaled down replica set coredns-66bff467f8 to 1\n"} +{"Time":"2023-05-31T11:51:18.272298-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.881216 1 shared_informer.go:230] Caches are synced for endpoint \n"} +{"Time":"2023-05-31T11:51:18.2723-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.881825 1 shared_informer.go:230] Caches are synced for endpoint_slice \n"} +{"Time":"2023-05-31T11:51:18.272302-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.885706 1 event.go:278] Event(v1.ObjectReference{Kind:\"ReplicaSet\", Namespace:\"kube-system\", Name:\"coredns-66bff467f8\", UID:\"bd4822a4-f97a-489e-a44e-9a2fb6c18774\", APIVersion:\"apps/v1\", ResourceVersion:\"341\", FieldPath:\"\"}): type: 'Normal' reason: 'SuccessfulDelete' Deleted pod: coredns-66bff467f8-r6flc\n"} +{"Time":"2023-05-31T11:51:18.272304-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.996840 1 shared_informer.go:230] Caches are synced for garbage collector \n"} +{"Time":"2023-05-31T11:51:18.272305-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.997629 1 shared_informer.go:230] Caches are synced for garbage collector \n"} +{"Time":"2023-05-31T11:51:18.272309-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:50.997634 1 garbagecollector.go:142] Garbage collector: all resource monitors have synced. Proceeding to collect garbage\n"} +{"Time":"2023-05-31T11:51:18.272361-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.082413 1 shared_informer.go:230] Caches are synced for resource quota \n"} +{"Time":"2023-05-31T11:51:18.272368-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.092321 1 shared_informer.go:230] Caches are synced for resource quota \n"} +{"Time":"2023-05-31T11:51:18.272372-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:00.741134 1 event.go:278] Event(v1.ObjectReference{Kind:\"Deployment\", Namespace:\"ingress-nginx\", Name:\"ingress-nginx-controller\", UID:\"584e8796-557e-49e9-9fce-b1ac5657ac9e\", APIVersion:\"apps/v1\", ResourceVersion:\"434\", FieldPath:\"\"}): type: 'Normal' reason: 'ScalingReplicaSet' Scaled up replica set ingress-nginx-controller-7fcf777cb7 to 1\n"} +{"Time":"2023-05-31T11:51:18.272382-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:00.745391 1 event.go:278] Event(v1.ObjectReference{Kind:\"ReplicaSet\", Namespace:\"ingress-nginx\", Name:\"ingress-nginx-controller-7fcf777cb7\", UID:\"b1943739-4d5d-4852-9d4e-2b2277e58e2f\", APIVersion:\"apps/v1\", ResourceVersion:\"435\", FieldPath:\"\"}): type: 'Normal' reason: 'SuccessfulCreate' Created pod: ingress-nginx-controller-7fcf777cb7-grs57\n"} +{"Time":"2023-05-31T11:51:18.272388-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:00.761872 1 event.go:278] Event(v1.ObjectReference{Kind:\"Job\", Namespace:\"ingress-nginx\", Name:\"ingress-nginx-admission-create\", UID:\"7afa2847-c18a-497a-bd5b-5d28b3958391\", APIVersion:\"batch/v1\", ResourceVersion:\"442\", FieldPath:\"\"}): type: 'Normal' reason: 'SuccessfulCreate' Created pod: ingress-nginx-admission-create-4jld9\n"} +{"Time":"2023-05-31T11:51:18.272393-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:00.790174 1 event.go:278] Event(v1.ObjectReference{Kind:\"Job\", Namespace:\"ingress-nginx\", Name:\"ingress-nginx-admission-patch\", UID:\"28ab319f-fa1c-4d2f-a146-785ca63d0810\", APIVersion:\"batch/v1\", ResourceVersion:\"453\", FieldPath:\"\"}): type: 'Normal' reason: 'SuccessfulCreate' Created pod: ingress-nginx-admission-patch-rlffn\n"} +{"Time":"2023-05-31T11:51:18.272421-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:03.874243 1 event.go:278] Event(v1.ObjectReference{Kind:\"Job\", Namespace:\"ingress-nginx\", Name:\"ingress-nginx-admission-patch\", UID:\"28ab319f-fa1c-4d2f-a146-785ca63d0810\", APIVersion:\"batch/v1\", ResourceVersion:\"460\", FieldPath:\"\"}): type: 'Normal' reason: 'Completed' Job completed\n"} +{"Time":"2023-05-31T11:51:18.272439-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:03.888603 1 event.go:278] Event(v1.ObjectReference{Kind:\"Job\", Namespace:\"ingress-nginx\", Name:\"ingress-nginx-admission-create\", UID:\"7afa2847-c18a-497a-bd5b-5d28b3958391\", APIVersion:\"batch/v1\", ResourceVersion:\"451\", FieldPath:\"\"}): type: 'Normal' reason: 'Completed' Job completed\n"} +{"Time":"2023-05-31T11:51:18.272446-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:47.429007 1 event.go:278] Event(v1.ObjectReference{Kind:\"Deployment\", Namespace:\"default\", Name:\"hello-world-app\", UID:\"40aa7949-8648-441c-9e05-69ca648e1499\", APIVersion:\"apps/v1\", ResourceVersion:\"582\", FieldPath:\"\"}): type: 'Normal' reason: 'ScalingReplicaSet' Scaled up replica set hello-world-app-5f5d8b66bb to 1\n"} +{"Time":"2023-05-31T11:51:18.272451-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:50:47.441594 1 event.go:278] Event(v1.ObjectReference{Kind:\"ReplicaSet\", Namespace:\"default\", Name:\"hello-world-app-5f5d8b66bb\", UID:\"3f3c48de-0322-49f8-bdcd-95c2567b34d7\", APIVersion:\"apps/v1\", ResourceVersion:\"583\", FieldPath:\"\"}): type: 'Normal' reason: 'SuccessfulCreate' Created pod: hello-world-app-5f5d8b66bb-d5gjf\n"} +{"Time":"2023-05-31T11:51:18.272467-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.272472-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.272475-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e kube-proxy [f53b0f28a3e7] \u003c==\n"} +{"Time":"2023-05-31T11:51:18.272479-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* W0531 18:49:51.137794 1 server_others.go:559] Unknown proxy mode \"\", assuming iptables proxy\n"} +{"Time":"2023-05-31T11:51:18.272483-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.145070 1 node.go:136] Successfully retrieved node IP: 192.168.105.6\n"} +{"Time":"2023-05-31T11:51:18.272486-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.145084 1 server_others.go:186] Using iptables Proxier.\n"} +{"Time":"2023-05-31T11:51:18.27249-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.145212 1 server.go:583] Version: v1.18.20\n"} +{"Time":"2023-05-31T11:51:18.272494-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.145657 1 config.go:133] Starting endpoints config controller\n"} +{"Time":"2023-05-31T11:51:18.272497-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.145662 1 shared_informer.go:223] Waiting for caches to sync for endpoints config\n"} +{"Time":"2023-05-31T11:51:18.272508-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.145722 1 config.go:315] Starting service config controller\n"} +{"Time":"2023-05-31T11:51:18.272513-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.145724 1 shared_informer.go:223] Waiting for caches to sync for service config\n"} +{"Time":"2023-05-31T11:51:18.272516-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.251116 1 shared_informer.go:230] Caches are synced for service config \n"} +{"Time":"2023-05-31T11:51:18.27252-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:51.251176 1 shared_informer.go:230] Caches are synced for endpoints config \n"} +{"Time":"2023-05-31T11:51:18.272523-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.272526-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.272529-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e kube-scheduler [6516182cabea] \u003c==\n"} +{"Time":"2023-05-31T11:51:18.272533-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* W0531 18:49:31.513976 1 authentication.go:349] Unable to get configmap/extension-apiserver-authentication in kube-system. Usually fixed by 'kubectl create rolebinding -n kube-system ROLEBINDING_NAME --role=extension-apiserver-authentication-reader --serviceaccount=YOUR_NS:YOUR_SA'\n"} +{"Time":"2023-05-31T11:51:18.272537-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 18:49:31.513987 1 authentication.go:297] Error looking up in-cluster authentication configuration: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot get resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T11:51:18.272541-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 18:49:31.513991 1 authentication.go:298] Continuing without authentication configuration. This may treat all requests as anonymous.\n"} +{"Time":"2023-05-31T11:51:18.272545-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tW0531 18:49:31.513994 1 authentication.go:299] To require authentication configuration lookup to succeed, set --authentication-tolerate-lookup-failure=false\n"} +{"Time":"2023-05-31T11:51:18.272549-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.524912 1 registry.go:150] Registering EvenPodsSpread predicate and priority function\n"} +{"Time":"2023-05-31T11:51:18.272552-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.524998 1 registry.go:150] Registering EvenPodsSpread predicate and priority function\n"} +{"Time":"2023-05-31T11:51:18.272565-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.527471 1 secure_serving.go:178] Serving securely on 127.0.0.1:10259\n"} +{"Time":"2023-05-31T11:51:18.272569-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.528248 1 configmap_cafile_content.go:202] Starting client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T11:51:18.272572-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.528281 1 shared_informer.go:223] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file\n"} +{"Time":"2023-05-31T11:51:18.272576-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:31.528318 1 tlsconfig.go:240] Starting DynamicServingCertificateController\n"} +{"Time":"2023-05-31T11:51:18.27258-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533246 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.Service: services is forbidden: User \"system:kube-scheduler\" cannot list resource \"services\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272584-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533342 1 reflector.go:178] k8s.io/kubernetes/cmd/kube-scheduler/app/server.go:233: Failed to list *v1.Pod: pods is forbidden: User \"system:kube-scheduler\" cannot list resource \"pods\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272616-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533392 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.PersistentVolume: persistentvolumes is forbidden: User \"system:kube-scheduler\" cannot list resource \"persistentvolumes\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272622-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533446 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.CSINode: csinodes.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"csinodes\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272627-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533509 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.ReplicationController: replicationcontrollers is forbidden: User \"system:kube-scheduler\" cannot list resource \"replicationcontrollers\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272631-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533558 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.StatefulSet: statefulsets.apps is forbidden: User \"system:kube-scheduler\" cannot list resource \"statefulsets\" in API group \"apps\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272637-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533608 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1beta1.PodDisruptionBudget: poddisruptionbudgets.policy is forbidden: User \"system:kube-scheduler\" cannot list resource \"poddisruptionbudgets\" in API group \"policy\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272648-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533651 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.StorageClass: storageclasses.storage.k8s.io is forbidden: User \"system:kube-scheduler\" cannot list resource \"storageclasses\" in API group \"storage.k8s.io\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272663-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.533701 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.PersistentVolumeClaim: persistentvolumeclaims is forbidden: User \"system:kube-scheduler\" cannot list resource \"persistentvolumeclaims\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272665-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.540415 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.Node: nodes is forbidden: User \"system:kube-scheduler\" cannot list resource \"nodes\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272667-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.540484 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.ReplicaSet: replicasets.apps is forbidden: User \"system:kube-scheduler\" cannot list resource \"replicasets\" in API group \"apps\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.27271-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:31.540568 1 reflector.go:178] k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:206: Failed to list *v1.ConfigMap: configmaps \"extension-apiserver-authentication\" is forbidden: User \"system:kube-scheduler\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\"\n"} +{"Time":"2023-05-31T11:51:18.272713-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:32.524201 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.Service: services is forbidden: User \"system:kube-scheduler\" cannot list resource \"services\" in API group \"\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272715-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tE0531 18:49:32.600096 1 reflector.go:178] k8s.io/client-go/informers/factory.go:135: Failed to list *v1.ReplicaSet: replicasets.apps is forbidden: User \"system:kube-scheduler\" cannot list resource \"replicasets\" in API group \"apps\" at the cluster scope\n"} +{"Time":"2023-05-31T11:51:18.272717-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:33.228514 1 shared_informer.go:230] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file \n"} +{"Time":"2023-05-31T11:51:18.272718-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.27272-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.272721-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e kubelet \u003c==\n"} +{"Time":"2023-05-31T11:51:18.272723-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* -- Journal begins at Wed 2023-05-31 18:49:02 UTC, ends at Wed 2023-05-31 18:51:18 UTC. --\n"} +{"Time":"2023-05-31T11:51:18.272724-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:50:52 ingress-addon-legacy-798000 kubelet[2784]: E0531 18:50:52.483949 2784 pod_workers.go:191] Error syncing pod 0959bc71-9880-4367-a221-4306bb1c0ccc (\"hello-world-app-5f5d8b66bb-d5gjf_default(0959bc71-9880-4367-a221-4306bb1c0ccc)\"), skipping: failed to \"StartContainer\" for \"hello-world-app\" with CrashLoopBackOff: \"back-off 10s restarting failed container=hello-world-app pod=hello-world-app-5f5d8b66bb-d5gjf_default(0959bc71-9880-4367-a221-4306bb1c0ccc)\"\n"} +{"Time":"2023-05-31T11:51:18.272727-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:50:53 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:50:53.635396 2784 topology_manager.go:221] [topologymanager] RemoveContainer - Container ID: 668f0bc568ded3016a66b31402b12a487cd25a1f0377d1d83efc6afd493a659c\n"} +{"Time":"2023-05-31T11:51:18.272729-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:50:53 ingress-addon-legacy-798000 kubelet[2784]: E0531 18:50:53.636176 2784 pod_workers.go:191] Error syncing pod 3ac20b44-3cd5-49cf-a46e-59e79bf77285 (\"kube-ingress-dns-minikube_kube-system(3ac20b44-3cd5-49cf-a46e-59e79bf77285)\"), skipping: failed to \"StartContainer\" for \"minikube-ingress-dns\" with CrashLoopBackOff: \"back-off 20s restarting failed container=minikube-ingress-dns pod=kube-ingress-dns-minikube_kube-system(3ac20b44-3cd5-49cf-a46e-59e79bf77285)\"\n"} +{"Time":"2023-05-31T11:51:18.272856-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:02 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:02.845079 2784 reconciler.go:196] operationExecutor.UnmountVolume started for volume \"minikube-ingress-dns-token-mdrtn\" (UniqueName: \"kubernetes.io/secret/3ac20b44-3cd5-49cf-a46e-59e79bf77285-minikube-ingress-dns-token-mdrtn\") pod \"3ac20b44-3cd5-49cf-a46e-59e79bf77285\" (UID: \"3ac20b44-3cd5-49cf-a46e-59e79bf77285\")\n"} +{"Time":"2023-05-31T11:51:18.272859-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:02 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:02.846801 2784 operation_generator.go:782] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/secret/3ac20b44-3cd5-49cf-a46e-59e79bf77285-minikube-ingress-dns-token-mdrtn\" (OuterVolumeSpecName: \"minikube-ingress-dns-token-mdrtn\") pod \"3ac20b44-3cd5-49cf-a46e-59e79bf77285\" (UID: \"3ac20b44-3cd5-49cf-a46e-59e79bf77285\"). InnerVolumeSpecName \"minikube-ingress-dns-token-mdrtn\". PluginName \"kubernetes.io/secret\", VolumeGidValue \"\"\n"} +{"Time":"2023-05-31T11:51:18.272862-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:02 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:02.946578 2784 reconciler.go:319] Volume detached for volume \"minikube-ingress-dns-token-mdrtn\" (UniqueName: \"kubernetes.io/secret/3ac20b44-3cd5-49cf-a46e-59e79bf77285-minikube-ingress-dns-token-mdrtn\") on node \"ingress-addon-legacy-798000\" DevicePath \"\"\n"} +{"Time":"2023-05-31T11:51:18.272864-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:05.635434 2784 topology_manager.go:221] [topologymanager] RemoveContainer - Container ID: f574a77ef1d3c9bc42345e3d5fea9ab0e7ff8a70a5d77d9ebd6459c24e828cc2\n"} +{"Time":"2023-05-31T11:51:18.272866-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:05.706662 2784 topology_manager.go:221] [topologymanager] RemoveContainer - Container ID: 668f0bc568ded3016a66b31402b12a487cd25a1f0377d1d83efc6afd493a659c\n"} +{"Time":"2023-05-31T11:51:18.272868-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 kubelet[2784]: W0531 18:51:05.709496 2784 docker_sandbox.go:400] failed to read pod IP from plugin/docker: Couldn't find network status for default/hello-world-app-5f5d8b66bb-d5gjf through plugin: invalid network status for\n"} +{"Time":"2023-05-31T11:51:18.27287-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:05 ingress-addon-legacy-798000 kubelet[2784]: W0531 18:51:05.778126 2784 container.go:412] Failed to create summary reader for \"/kubepods/besteffort/pod0959bc71-9880-4367-a221-4306bb1c0ccc/764f1b0ff29b34a3ac470d99253bcd3d68ec74b3cd72794005372cadc312fdca\": none of the resources are being tracked.\n"} +{"Time":"2023-05-31T11:51:18.272872-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:06 ingress-addon-legacy-798000 kubelet[2784]: W0531 18:51:06.789725 2784 docker_sandbox.go:400] failed to read pod IP from plugin/docker: Couldn't find network status for default/hello-world-app-5f5d8b66bb-d5gjf through plugin: invalid network status for\n"} +{"Time":"2023-05-31T11:51:18.27298-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:06 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:06.797827 2784 topology_manager.go:221] [topologymanager] RemoveContainer - Container ID: f574a77ef1d3c9bc42345e3d5fea9ab0e7ff8a70a5d77d9ebd6459c24e828cc2\n"} +{"Time":"2023-05-31T11:51:18.273013-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:06 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:06.798174 2784 topology_manager.go:221] [topologymanager] RemoveContainer - Container ID: 764f1b0ff29b34a3ac470d99253bcd3d68ec74b3cd72794005372cadc312fdca\n"} +{"Time":"2023-05-31T11:51:18.27302-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:06 ingress-addon-legacy-798000 kubelet[2784]: E0531 18:51:06.798462 2784 pod_workers.go:191] Error syncing pod 0959bc71-9880-4367-a221-4306bb1c0ccc (\"hello-world-app-5f5d8b66bb-d5gjf_default(0959bc71-9880-4367-a221-4306bb1c0ccc)\"), skipping: failed to \"StartContainer\" for \"hello-world-app\" with CrashLoopBackOff: \"back-off 20s restarting failed container=hello-world-app pod=hello-world-app-5f5d8b66bb-d5gjf_default(0959bc71-9880-4367-a221-4306bb1c0ccc)\"\n"} +{"Time":"2023-05-31T11:51:18.273026-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:07 ingress-addon-legacy-798000 kubelet[2784]: W0531 18:51:07.832554 2784 docker_sandbox.go:400] failed to read pod IP from plugin/docker: Couldn't find network status for default/hello-world-app-5f5d8b66bb-d5gjf through plugin: invalid network status for\n"} +{"Time":"2023-05-31T11:51:18.273034-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:11 ingress-addon-legacy-798000 kubelet[2784]: E0531 18:51:11.090569 2784 event.go:260] Server rejected event '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"ingress-nginx-controller-7fcf777cb7-grs57.17644f0b703b95d8\", GenerateName:\"\", Namespace:\"ingress-nginx\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ClusterName:\"\", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Pod\", Namespace:\"ingress-nginx\", Name:\"ingress-nginx-controller-7fcf777cb7-grs57\", UID:\"f31a3724-6513-446f-b096-76dabcddde1c\", APIVersion:\"v1\", ResourceVersion:\"439\", FieldPath:\"spec.containers{controller}\"}, Reason:\"Killing\", Message:\"Stoppi"} +{"Time":"2023-05-31T11:51:18.273042-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"ng container controller\", Source:v1.EventSource{Component:\"kubelet\", Host:\"ingress-addon-legacy-798000\"}, FirstTimestamp:v1.Time{Time:time.Time{wall:0xc11603a7c5571fd8, ext:96900915184, loc:(*time.Location)(0x6a0ef20)}}, LastTimestamp:v1.Time{Time:time.Time{wall:0xc11603a7c5571fd8, ext:96900915184, loc:(*time.Location)(0x6a0ef20)}}, Count:1, Type:\"Normal\", EventTime:v1.MicroTime{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'events \"ingress-nginx-controller-7fcf777cb7-grs57.17644f0b703b95d8\" is forbidden: unable to create new content in namespace ingress-nginx because it is being terminated' (will not retry!)\n"} +{"Time":"2023-05-31T11:51:18.273051-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:11 ingress-addon-legacy-798000 kubelet[2784]: E0531 18:51:11.097505 2784 event.go:260] Server rejected event '\u0026v1.Event{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"ingress-nginx-controller-7fcf777cb7-grs57.17644f0b703b95d8\", GenerateName:\"\", Namespace:\"ingress-nginx\", SelfLink:\"\", UID:\"\", ResourceVersion:\"\", Generation:0, CreationTimestamp:v1.Time{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, DeletionTimestamp:(*v1.Time)(nil), DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ClusterName:\"\", ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:\"Pod\", Namespace:\"ingress-nginx\", Name:\"ingress-nginx-controller-7fcf777cb7-grs57\", UID:\"f31a3724-6513-446f-b096-76dabcddde1c\", APIVersion:\"v1\", ResourceVersion:\"439\", FieldPath:\"spec.containers{controller}\"}, Reason:\"Killing\", Message:\"Stoppi"} +{"Time":"2023-05-31T11:51:18.273108-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":"ng container controller\", Source:v1.EventSource{Component:\"kubelet\", Host:\"ingress-addon-legacy-798000\"}, FirstTimestamp:v1.Time{Time:time.Time{wall:0xc11603a7c5571fd8, ext:96900915184, loc:(*time.Location)(0x6a0ef20)}}, LastTimestamp:v1.Time{Time:time.Time{wall:0xc11603a7c59527c8, ext:96904980489, loc:(*time.Location)(0x6a0ef20)}}, Count:2, Type:\"Normal\", EventTime:v1.MicroTime{Time:time.Time{wall:0x0, ext:0, loc:(*time.Location)(nil)}}, Series:(*v1.EventSeries)(nil), Action:\"\", Related:(*v1.ObjectReference)(nil), ReportingController:\"\", ReportingInstance:\"\"}': 'events \"ingress-nginx-controller-7fcf777cb7-grs57.17644f0b703b95d8\" is forbidden: unable to create new content in namespace ingress-nginx because it is being terminated' (will not retry!)\n"} +{"Time":"2023-05-31T11:51:18.273117-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:13.300705 2784 reconciler.go:196] operationExecutor.UnmountVolume started for volume \"ingress-nginx-token-j8jzr\" (UniqueName: \"kubernetes.io/secret/f31a3724-6513-446f-b096-76dabcddde1c-ingress-nginx-token-j8jzr\") pod \"f31a3724-6513-446f-b096-76dabcddde1c\" (UID: \"f31a3724-6513-446f-b096-76dabcddde1c\")\n"} +{"Time":"2023-05-31T11:51:18.273122-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:13.300729 2784 reconciler.go:196] operationExecutor.UnmountVolume started for volume \"webhook-cert\" (UniqueName: \"kubernetes.io/secret/f31a3724-6513-446f-b096-76dabcddde1c-webhook-cert\") pod \"f31a3724-6513-446f-b096-76dabcddde1c\" (UID: \"f31a3724-6513-446f-b096-76dabcddde1c\")\n"} +{"Time":"2023-05-31T11:51:18.273128-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:13.305702 2784 operation_generator.go:782] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/secret/f31a3724-6513-446f-b096-76dabcddde1c-webhook-cert\" (OuterVolumeSpecName: \"webhook-cert\") pod \"f31a3724-6513-446f-b096-76dabcddde1c\" (UID: \"f31a3724-6513-446f-b096-76dabcddde1c\"). InnerVolumeSpecName \"webhook-cert\". PluginName \"kubernetes.io/secret\", VolumeGidValue \"\"\n"} +{"Time":"2023-05-31T11:51:18.273135-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:13.305855 2784 operation_generator.go:782] UnmountVolume.TearDown succeeded for volume \"kubernetes.io/secret/f31a3724-6513-446f-b096-76dabcddde1c-ingress-nginx-token-j8jzr\" (OuterVolumeSpecName: \"ingress-nginx-token-j8jzr\") pod \"f31a3724-6513-446f-b096-76dabcddde1c\" (UID: \"f31a3724-6513-446f-b096-76dabcddde1c\"). InnerVolumeSpecName \"ingress-nginx-token-j8jzr\". PluginName \"kubernetes.io/secret\", VolumeGidValue \"\"\n"} +{"Time":"2023-05-31T11:51:18.273286-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:13.404264 2784 reconciler.go:319] Volume detached for volume \"webhook-cert\" (UniqueName: \"kubernetes.io/secret/f31a3724-6513-446f-b096-76dabcddde1c-webhook-cert\") on node \"ingress-addon-legacy-798000\" DevicePath \"\"\n"} +{"Time":"2023-05-31T11:51:18.273293-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 kubelet[2784]: I0531 18:51:13.404287 2784 reconciler.go:319] Volume detached for volume \"ingress-nginx-token-j8jzr\" (UniqueName: \"kubernetes.io/secret/f31a3724-6513-446f-b096-76dabcddde1c-ingress-nginx-token-j8jzr\") on node \"ingress-addon-legacy-798000\" DevicePath \"\"\n"} +{"Time":"2023-05-31T11:51:18.273298-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:13 ingress-addon-legacy-798000 kubelet[2784]: W0531 18:51:13.931886 2784 pod_container_deletor.go:77] Container \"6626de1d842f52700cee997a3463a605892cc67cb20b1af79f7e4269c4b2a1b4\" not found in pod's containers\n"} +{"Time":"2023-05-31T11:51:18.273302-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tMay 31 18:51:14 ingress-addon-legacy-798000 kubelet[2784]: W0531 18:51:14.661239 2784 kubelet_getters.go:297] Path \"/var/lib/kubelet/pods/f31a3724-6513-446f-b096-76dabcddde1c/volumes\" does not exist\n"} +{"Time":"2023-05-31T11:51:18.273306-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.273309-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* \n"} +{"Time":"2023-05-31T11:51:18.273312-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* ==\u003e storage-provisioner [b6fc3d2ad50c] \u003c==\n"} +{"Time":"2023-05-31T11:51:18.273315-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t* I0531 18:49:54.653454 1 storage_provisioner.go:116] Initializing the minikube storage provisioner...\n"} +{"Time":"2023-05-31T11:51:18.273331-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:54.658323 1 storage_provisioner.go:141] Storage provisioner initialized, now starting service!\n"} +{"Time":"2023-05-31T11:51:18.273337-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:54.658340 1 leaderelection.go:243] attempting to acquire leader lease kube-system/k8s.io-minikube-hostpath...\n"} +{"Time":"2023-05-31T11:51:18.273341-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:54.660943 1 leaderelection.go:253] successfully acquired lease kube-system/k8s.io-minikube-hostpath\n"} +{"Time":"2023-05-31T11:51:18.273345-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:54.661026 1 controller.go:835] Starting provisioner controller k8s.io/minikube-hostpath_ingress-addon-legacy-798000_b3966c1c-7cfb-42ae-a1ca-cd881144a5f2!\n"} +{"Time":"2023-05-31T11:51:18.273362-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:54.661459 1 event.go:282] Event(v1.ObjectReference{Kind:\"Endpoints\", Namespace:\"kube-system\", Name:\"k8s.io-minikube-hostpath\", UID:\"430358a2-44fc-48af-b293-84743ea4630a\", APIVersion:\"v1\", ResourceVersion:\"389\", FieldPath:\"\"}): type: 'Normal' reason: 'LeaderElection' ingress-addon-legacy-798000_b3966c1c-7cfb-42ae-a1ca-cd881144a5f2 became leader\n"} +{"Time":"2023-05-31T11:51:18.273367-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \tI0531 18:49:54.761980 1 controller.go:884] Started provisioner controller k8s.io/minikube-hostpath_ingress-addon-legacy-798000_b3966c1c-7cfb-42ae-a1ca-cd881144a5f2!\n"} +{"Time":"2023-05-31T11:51:18.273371-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \t\n"} +{"Time":"2023-05-31T11:51:18.273388-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" \n"} +{"Time":"2023-05-31T11:51:18.27339-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:51:18.273392-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:254: (dbg) Run: out/minikube-darwin-arm64 status --format={{.APIServer}} -p ingress-addon-legacy-798000 -n ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.349088-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:261: (dbg) Run: kubectl --context ingress-addon-legacy-798000 get po -o=jsonpath={.items[*].metadata.name} -A --field-selector=status.phase!=Running\n"} +{"Time":"2023-05-31T11:51:18.385257-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:285: \u003c\u003c\u003c TestIngressAddonLegacy/serial/ValidateIngressAddons FAILED: end of post-mortem logs \u003c\u003c\u003c\n"} +{"Time":"2023-05-31T11:51:18.385273-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" helpers_test.go:286: ---------------------/post-mortem---------------------------------\n"} +{"Time":"2023-05-31T11:51:18.385311-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":" helpers_test.go:175: Cleaning up \"ingress-addon-legacy-798000\" profile ...\n"} +{"Time":"2023-05-31T11:51:18.385392-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p ingress-addon-legacy-798000\n"} +{"Time":"2023-05-31T11:51:18.561985-07:00","Action":"output","Test":"TestIngressAddonLegacy","Output":"--- FAIL: TestIngressAddonLegacy (165.16s)\n"} +{"Time":"2023-05-31T11:51:18.562002-07:00","Action":"output","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Output":" --- PASS: TestIngressAddonLegacy/StartLegacyK8sCluster (87.00s)\n"} +{"Time":"2023-05-31T11:51:18.562004-07:00","Action":"pass","Test":"TestIngressAddonLegacy/StartLegacyK8sCluster","Elapsed":87} +{"Time":"2023-05-31T11:51:18.562007-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial","Output":" --- FAIL: TestIngressAddonLegacy/serial (77.98s)\n"} +{"Time":"2023-05-31T11:51:18.56201-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Output":" --- PASS: TestIngressAddonLegacy/serial/ValidateIngressAddonActivation (17.85s)\n"} +{"Time":"2023-05-31T11:51:18.562013-07:00","Action":"pass","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddonActivation","Elapsed":17.85} +{"Time":"2023-05-31T11:51:18.562015-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Output":" --- PASS: TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation (0.20s)\n"} +{"Time":"2023-05-31T11:51:18.562017-07:00","Action":"pass","Test":"TestIngressAddonLegacy/serial/ValidateIngressDNSAddonActivation","Elapsed":0.2} +{"Time":"2023-05-31T11:51:18.562019-07:00","Action":"output","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Output":" --- FAIL: TestIngressAddonLegacy/serial/ValidateIngressAddons (59.93s)\n"} +{"Time":"2023-05-31T11:51:18.562029-07:00","Action":"fail","Test":"TestIngressAddonLegacy/serial/ValidateIngressAddons","Elapsed":59.93} +{"Time":"2023-05-31T11:51:18.562031-07:00","Action":"fail","Test":"TestIngressAddonLegacy/serial","Elapsed":77.98} +{"Time":"2023-05-31T11:51:18.562032-07:00","Action":"fail","Test":"TestIngressAddonLegacy","Elapsed":165.16} +{"Time":"2023-05-31T11:51:18.562034-07:00","Action":"run","Test":"TestJSONOutput"} +{"Time":"2023-05-31T11:51:18.562035-07:00","Action":"output","Test":"TestJSONOutput","Output":"=== RUN TestJSONOutput\n"} +{"Time":"2023-05-31T11:51:18.562037-07:00","Action":"run","Test":"TestJSONOutput/start"} +{"Time":"2023-05-31T11:51:18.56204-07:00","Action":"output","Test":"TestJSONOutput/start","Output":"=== RUN TestJSONOutput/start\n"} +{"Time":"2023-05-31T11:51:18.562077-07:00","Action":"run","Test":"TestJSONOutput/start/Command"} +{"Time":"2023-05-31T11:51:18.56208-07:00","Action":"output","Test":"TestJSONOutput/start/Command","Output":"=== RUN TestJSONOutput/start/Command\n"} +{"Time":"2023-05-31T11:51:18.562128-07:00","Action":"output","Test":"TestJSONOutput/start/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-darwin-arm64 start -p json-output-012000 --output=json --user=testUser --memory=2200 --wait=true --driver=qemu2 \n"} +{"Time":"2023-05-31T11:52:03.941256-07:00","Action":"output","Test":"TestJSONOutput/start/Command","Output":" json_output_test.go:63: (dbg) Done: out/minikube-darwin-arm64 start -p json-output-012000 --output=json --user=testUser --memory=2200 --wait=true --driver=qemu2 : (45.379731042s)\n"} +{"Time":"2023-05-31T11:52:03.941639-07:00","Action":"run","Test":"TestJSONOutput/start/Audit"} +{"Time":"2023-05-31T11:52:03.941645-07:00","Action":"output","Test":"TestJSONOutput/start/Audit","Output":"=== RUN TestJSONOutput/start/Audit\n"} +{"Time":"2023-05-31T11:52:03.941838-07:00","Action":"run","Test":"TestJSONOutput/start/parallel"} +{"Time":"2023-05-31T11:52:03.941842-07:00","Action":"output","Test":"TestJSONOutput/start/parallel","Output":"=== RUN TestJSONOutput/start/parallel\n"} +{"Time":"2023-05-31T11:52:03.941845-07:00","Action":"run","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:03.941847-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:03.941855-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:03.941856-07:00","Action":"pause","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:03.941859-07:00","Action":"run","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:03.941861-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:03.941863-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:03.941865-07:00","Action":"pause","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:03.941868-07:00","Action":"cont","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:03.941869-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/start/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:03.941917-07:00","Action":"cont","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:03.941931-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/start/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:03.941939-07:00","Action":"run","Test":"TestJSONOutput/pause"} +{"Time":"2023-05-31T11:52:03.941943-07:00","Action":"output","Test":"TestJSONOutput/pause","Output":"=== RUN TestJSONOutput/pause\n"} +{"Time":"2023-05-31T11:52:03.941949-07:00","Action":"run","Test":"TestJSONOutput/pause/Command"} +{"Time":"2023-05-31T11:52:03.941952-07:00","Action":"output","Test":"TestJSONOutput/pause/Command","Output":"=== RUN TestJSONOutput/pause/Command\n"} +{"Time":"2023-05-31T11:52:03.941993-07:00","Action":"output","Test":"TestJSONOutput/pause/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-darwin-arm64 pause -p json-output-012000 --output=json --user=testUser\n"} +{"Time":"2023-05-31T11:52:04.271923-07:00","Action":"run","Test":"TestJSONOutput/pause/Audit"} +{"Time":"2023-05-31T11:52:04.271937-07:00","Action":"output","Test":"TestJSONOutput/pause/Audit","Output":"=== RUN TestJSONOutput/pause/Audit\n"} +{"Time":"2023-05-31T11:52:04.272097-07:00","Action":"run","Test":"TestJSONOutput/pause/parallel"} +{"Time":"2023-05-31T11:52:04.272114-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel","Output":"=== RUN TestJSONOutput/pause/parallel\n"} +{"Time":"2023-05-31T11:52:04.272119-07:00","Action":"run","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:04.272122-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.272129-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.272132-07:00","Action":"pause","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:04.272135-07:00","Action":"run","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:04.272138-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.272142-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.272144-07:00","Action":"pause","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:04.272147-07:00","Action":"cont","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:04.27215-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/pause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.272169-07:00","Action":"cont","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:04.272172-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/pause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.272176-07:00","Action":"run","Test":"TestJSONOutput/unpause"} +{"Time":"2023-05-31T11:52:04.272178-07:00","Action":"output","Test":"TestJSONOutput/unpause","Output":"=== RUN TestJSONOutput/unpause\n"} +{"Time":"2023-05-31T11:52:04.27218-07:00","Action":"run","Test":"TestJSONOutput/unpause/Command"} +{"Time":"2023-05-31T11:52:04.272182-07:00","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":"=== RUN TestJSONOutput/unpause/Command\n"} +{"Time":"2023-05-31T11:52:04.272184-07:00","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-darwin-arm64 unpause -p json-output-012000 --output=json --user=testUser\n"} +{"Time":"2023-05-31T11:52:04.501755-07:00","Action":"run","Test":"TestJSONOutput/unpause/Audit"} +{"Time":"2023-05-31T11:52:04.501771-07:00","Action":"output","Test":"TestJSONOutput/unpause/Audit","Output":"=== RUN TestJSONOutput/unpause/Audit\n"} +{"Time":"2023-05-31T11:52:04.501952-07:00","Action":"run","Test":"TestJSONOutput/unpause/parallel"} +{"Time":"2023-05-31T11:52:04.501992-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel","Output":"=== RUN TestJSONOutput/unpause/parallel\n"} +{"Time":"2023-05-31T11:52:04.502017-07:00","Action":"run","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:04.50202-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.502023-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.502025-07:00","Action":"pause","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:04.502026-07:00","Action":"run","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:04.502027-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.502074-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.502144-07:00","Action":"pause","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:04.502153-07:00","Action":"cont","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:04.502157-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/unpause/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.502161-07:00","Action":"cont","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:04.502164-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/unpause/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:04.502182-07:00","Action":"run","Test":"TestJSONOutput/stop"} +{"Time":"2023-05-31T11:52:04.502185-07:00","Action":"output","Test":"TestJSONOutput/stop","Output":"=== RUN TestJSONOutput/stop\n"} +{"Time":"2023-05-31T11:52:04.502187-07:00","Action":"run","Test":"TestJSONOutput/stop/Command"} +{"Time":"2023-05-31T11:52:04.502189-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"=== RUN TestJSONOutput/stop/Command\n"} +{"Time":"2023-05-31T11:52:04.502212-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" json_output_test.go:63: (dbg) Run: out/minikube-darwin-arm64 stop -p json-output-012000 --output=json --user=testUser\n"} +{"Time":"2023-05-31T11:52:04.965094-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:04.965013 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:04.972349-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:04.972323 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:04.984435-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:04.984406 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:05.006575-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:05.006515 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:05.048766-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:05.048673 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:05.130068-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:05.130008 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:05.292204-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:05.292131 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:05.614378-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:05.614307 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:06.256444-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:06.256362 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:07.537404-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:07.537284 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:10.099703-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:10.099597 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:15.222077-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":"E0531 11:52:15.221968 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:16.579133-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" json_output_test.go:63: (dbg) Done: out/minikube-darwin-arm64 stop -p json-output-012000 --output=json --user=testUser: (12.076917917s)\n"} +{"Time":"2023-05-31T11:52:16.579334-07:00","Action":"run","Test":"TestJSONOutput/stop/Audit"} +{"Time":"2023-05-31T11:52:16.579342-07:00","Action":"output","Test":"TestJSONOutput/stop/Audit","Output":"=== RUN TestJSONOutput/stop/Audit\n"} +{"Time":"2023-05-31T11:52:16.579918-07:00","Action":"run","Test":"TestJSONOutput/stop/parallel"} +{"Time":"2023-05-31T11:52:16.579929-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel","Output":"=== RUN TestJSONOutput/stop/parallel\n"} +{"Time":"2023-05-31T11:52:16.579953-07:00","Action":"run","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:16.579959-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== RUN TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:16.579992-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== PAUSE TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:16.579997-07:00","Action":"pause","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:16.580055-07:00","Action":"run","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:16.580062-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== RUN TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:16.58007-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== PAUSE TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:16.580075-07:00","Action":"pause","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:16.58008-07:00","Action":"cont","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps"} +{"Time":"2023-05-31T11:52:16.580084-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":"=== CONT TestJSONOutput/stop/parallel/DistinctCurrentSteps\n"} +{"Time":"2023-05-31T11:52:16.580089-07:00","Action":"cont","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps"} +{"Time":"2023-05-31T11:52:16.580093-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":"=== CONT TestJSONOutput/stop/parallel/IncreasingCurrentSteps\n"} +{"Time":"2023-05-31T11:52:16.580152-07:00","Action":"output","Test":"TestJSONOutput","Output":" helpers_test.go:175: Cleaning up \"json-output-012000\" profile ...\n"} +{"Time":"2023-05-31T11:52:16.580242-07:00","Action":"output","Test":"TestJSONOutput","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p json-output-012000\n"} +{"Time":"2023-05-31T11:52:16.730586-07:00","Action":"output","Test":"TestJSONOutput","Output":"--- PASS: TestJSONOutput (58.17s)\n"} +{"Time":"2023-05-31T11:52:16.730599-07:00","Action":"output","Test":"TestJSONOutput/start","Output":" --- PASS: TestJSONOutput/start (45.38s)\n"} +{"Time":"2023-05-31T11:52:16.730602-07:00","Action":"output","Test":"TestJSONOutput/start/Command","Output":" --- PASS: TestJSONOutput/start/Command (45.38s)\n"} +{"Time":"2023-05-31T11:52:16.730611-07:00","Action":"pass","Test":"TestJSONOutput/start/Command","Elapsed":45.38} +{"Time":"2023-05-31T11:52:16.730615-07:00","Action":"output","Test":"TestJSONOutput/start/Audit","Output":" --- PASS: TestJSONOutput/start/Audit (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730616-07:00","Action":"pass","Test":"TestJSONOutput/start/Audit","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730618-07:00","Action":"output","Test":"TestJSONOutput/start/parallel","Output":" --- PASS: TestJSONOutput/start/parallel (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.73062-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/start/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730622-07:00","Action":"pass","Test":"TestJSONOutput/start/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730623-07:00","Action":"output","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/start/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730625-07:00","Action":"pass","Test":"TestJSONOutput/start/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730626-07:00","Action":"pass","Test":"TestJSONOutput/start/parallel","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730627-07:00","Action":"pass","Test":"TestJSONOutput/start","Elapsed":45.38} +{"Time":"2023-05-31T11:52:16.730628-07:00","Action":"output","Test":"TestJSONOutput/pause","Output":" --- PASS: TestJSONOutput/pause (0.33s)\n"} +{"Time":"2023-05-31T11:52:16.73063-07:00","Action":"output","Test":"TestJSONOutput/pause/Command","Output":" --- PASS: TestJSONOutput/pause/Command (0.33s)\n"} +{"Time":"2023-05-31T11:52:16.730633-07:00","Action":"pass","Test":"TestJSONOutput/pause/Command","Elapsed":0.33} +{"Time":"2023-05-31T11:52:16.730634-07:00","Action":"output","Test":"TestJSONOutput/pause/Audit","Output":" --- PASS: TestJSONOutput/pause/Audit (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730636-07:00","Action":"pass","Test":"TestJSONOutput/pause/Audit","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730637-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel","Output":" --- PASS: TestJSONOutput/pause/parallel (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730639-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/pause/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.73064-07:00","Action":"pass","Test":"TestJSONOutput/pause/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730641-07:00","Action":"output","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/pause/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730643-07:00","Action":"pass","Test":"TestJSONOutput/pause/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730644-07:00","Action":"pass","Test":"TestJSONOutput/pause/parallel","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730645-07:00","Action":"pass","Test":"TestJSONOutput/pause","Elapsed":0.33} +{"Time":"2023-05-31T11:52:16.730647-07:00","Action":"output","Test":"TestJSONOutput/unpause","Output":" --- PASS: TestJSONOutput/unpause (0.23s)\n"} +{"Time":"2023-05-31T11:52:16.730648-07:00","Action":"output","Test":"TestJSONOutput/unpause/Command","Output":" --- PASS: TestJSONOutput/unpause/Command (0.23s)\n"} +{"Time":"2023-05-31T11:52:16.73065-07:00","Action":"pass","Test":"TestJSONOutput/unpause/Command","Elapsed":0.23} +{"Time":"2023-05-31T11:52:16.730651-07:00","Action":"output","Test":"TestJSONOutput/unpause/Audit","Output":" --- PASS: TestJSONOutput/unpause/Audit (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730653-07:00","Action":"pass","Test":"TestJSONOutput/unpause/Audit","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730654-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel","Output":" --- PASS: TestJSONOutput/unpause/parallel (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730655-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/unpause/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730657-07:00","Action":"pass","Test":"TestJSONOutput/unpause/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730658-07:00","Action":"output","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/unpause/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.73066-07:00","Action":"pass","Test":"TestJSONOutput/unpause/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730661-07:00","Action":"pass","Test":"TestJSONOutput/unpause/parallel","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730662-07:00","Action":"pass","Test":"TestJSONOutput/unpause","Elapsed":0.23} +{"Time":"2023-05-31T11:52:16.730664-07:00","Action":"output","Test":"TestJSONOutput/stop","Output":" --- PASS: TestJSONOutput/stop (12.08s)\n"} +{"Time":"2023-05-31T11:52:16.730665-07:00","Action":"output","Test":"TestJSONOutput/stop/Command","Output":" --- PASS: TestJSONOutput/stop/Command (12.08s)\n"} +{"Time":"2023-05-31T11:52:16.730667-07:00","Action":"pass","Test":"TestJSONOutput/stop/Command","Elapsed":12.08} +{"Time":"2023-05-31T11:52:16.730668-07:00","Action":"output","Test":"TestJSONOutput/stop/Audit","Output":" --- PASS: TestJSONOutput/stop/Audit (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.73067-07:00","Action":"pass","Test":"TestJSONOutput/stop/Audit","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730671-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel","Output":" --- PASS: TestJSONOutput/stop/parallel (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730673-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Output":" --- PASS: TestJSONOutput/stop/parallel/DistinctCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730674-07:00","Action":"pass","Test":"TestJSONOutput/stop/parallel/DistinctCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730676-07:00","Action":"output","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Output":" --- PASS: TestJSONOutput/stop/parallel/IncreasingCurrentSteps (0.00s)\n"} +{"Time":"2023-05-31T11:52:16.730678-07:00","Action":"pass","Test":"TestJSONOutput/stop/parallel/IncreasingCurrentSteps","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730679-07:00","Action":"pass","Test":"TestJSONOutput/stop/parallel","Elapsed":0} +{"Time":"2023-05-31T11:52:16.730681-07:00","Action":"pass","Test":"TestJSONOutput/stop","Elapsed":12.08} +{"Time":"2023-05-31T11:52:16.730682-07:00","Action":"pass","Test":"TestJSONOutput","Elapsed":58.17} +{"Time":"2023-05-31T11:52:16.730683-07:00","Action":"run","Test":"TestErrorJSONOutput"} +{"Time":"2023-05-31T11:52:16.730685-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":"=== RUN TestErrorJSONOutput\n"} +{"Time":"2023-05-31T11:52:16.730686-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" json_output_test.go:160: (dbg) Run: out/minikube-darwin-arm64 start -p json-output-error-614000 --memory=2200 --output=json --wait=true --driver=fail\n"} +{"Time":"2023-05-31T11:52:16.820689-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" json_output_test.go:160: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p json-output-error-614000 --memory=2200 --output=json --wait=true --driver=fail: exit status 56 (89.904417ms)\n"} +{"Time":"2023-05-31T11:52:16.820702-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \n"} +{"Time":"2023-05-31T11:52:16.820705-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:52:16.820707-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"6ef89ca1-7f00-4b9b-9de2-d13bb6555a22\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.step\",\"datacontenttype\":\"application/json\",\"data\":{\"currentstep\":\"0\",\"message\":\"[json-output-error-614000] minikube v1.30.1 on Darwin 13.4 (arm64)\",\"name\":\"Initial Minikube Setup\",\"totalsteps\":\"19\"}}\n"} +{"Time":"2023-05-31T11:52:16.82071-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"af2f5106-b72a-4981-9bcf-cfa2caae3377\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_LOCATION=16569\"}}\n"} +{"Time":"2023-05-31T11:52:16.82072-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"f0a25387-6103-48aa-b28e-fd3e71f10890\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\"}}\n"} +{"Time":"2023-05-31T11:52:16.820724-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"5014db0f-c129-4b06-838b-4c86c8e2612d\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_BIN=out/minikube-darwin-arm64\"}}\n"} +{"Time":"2023-05-31T11:52:16.820726-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"1d7b7b39-2fd2-49ac-84be-f6e94389a8d8\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\"}}\n"} +{"Time":"2023-05-31T11:52:16.820728-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"846a06a4-70a8-4103-8d3a-baba093ae48b\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\"}}\n"} +{"Time":"2023-05-31T11:52:16.82073-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"1e82b24b-8320-4389-aab8-c0d3082d1f15\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.info\",\"datacontenttype\":\"application/json\",\"data\":{\"message\":\"MINIKUBE_FORCE_SYSTEMD=\"}}\n"} +{"Time":"2023-05-31T11:52:16.820733-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \t{\"specversion\":\"1.0\",\"id\":\"4989f327-2411-437f-956a-722ff826fcb1\",\"source\":\"https://minikube.sigs.k8s.io/\",\"type\":\"io.k8s.sigs.minikube.error\",\"datacontenttype\":\"application/json\",\"data\":{\"advice\":\"\",\"exitcode\":\"56\",\"issues\":\"\",\"message\":\"The driver 'fail' is not supported on darwin/arm64\",\"name\":\"DRV_UNSUPPORTED_OS\",\"url\":\"\"}}\n"} +{"Time":"2023-05-31T11:52:16.820735-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" \n"} +{"Time":"2023-05-31T11:52:16.820737-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:52:16.820766-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" helpers_test.go:175: Cleaning up \"json-output-error-614000\" profile ...\n"} +{"Time":"2023-05-31T11:52:16.820794-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p json-output-error-614000\n"} +{"Time":"2023-05-31T11:52:17.059484-07:00","Action":"output","Test":"TestErrorJSONOutput","Output":"--- PASS: TestErrorJSONOutput (0.33s)\n"} +{"Time":"2023-05-31T11:52:17.059514-07:00","Action":"pass","Test":"TestErrorJSONOutput","Elapsed":0.33} +{"Time":"2023-05-31T11:52:17.05952-07:00","Action":"run","Test":"TestKicCustomNetwork"} +{"Time":"2023-05-31T11:52:17.059522-07:00","Action":"output","Test":"TestKicCustomNetwork","Output":"=== RUN TestKicCustomNetwork\n"} +{"Time":"2023-05-31T11:52:17.059552-07:00","Action":"output","Test":"TestKicCustomNetwork","Output":" kic_custom_network_test.go:34: only runs with docker driver\n"} +{"Time":"2023-05-31T11:52:17.059564-07:00","Action":"output","Test":"TestKicCustomNetwork","Output":"--- SKIP: TestKicCustomNetwork (0.00s)\n"} +{"Time":"2023-05-31T11:52:17.059578-07:00","Action":"skip","Test":"TestKicCustomNetwork","Elapsed":0} +{"Time":"2023-05-31T11:52:17.05958-07:00","Action":"run","Test":"TestKicExistingNetwork"} +{"Time":"2023-05-31T11:52:17.059581-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":"=== RUN TestKicExistingNetwork\n"} +{"Time":"2023-05-31T11:52:17.059609-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":" kic_custom_network_test.go:73: only runs with docker driver\n"} +{"Time":"2023-05-31T11:52:17.059612-07:00","Action":"output","Test":"TestKicExistingNetwork","Output":"--- SKIP: TestKicExistingNetwork (0.00s)\n"} +{"Time":"2023-05-31T11:52:17.059614-07:00","Action":"skip","Test":"TestKicExistingNetwork","Elapsed":0} +{"Time":"2023-05-31T11:52:17.059615-07:00","Action":"run","Test":"TestKicCustomSubnet"} +{"Time":"2023-05-31T11:52:17.059616-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":"=== RUN TestKicCustomSubnet\n"} +{"Time":"2023-05-31T11:52:17.059618-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":" kic_custom_network_test.go:102: only runs with docker/podman driver\n"} +{"Time":"2023-05-31T11:52:17.059627-07:00","Action":"output","Test":"TestKicCustomSubnet","Output":"--- SKIP: TestKicCustomSubnet (0.00s)\n"} +{"Time":"2023-05-31T11:52:17.059629-07:00","Action":"skip","Test":"TestKicCustomSubnet","Elapsed":0} +{"Time":"2023-05-31T11:52:17.05963-07:00","Action":"run","Test":"TestKicStaticIP"} +{"Time":"2023-05-31T11:52:17.059631-07:00","Action":"output","Test":"TestKicStaticIP","Output":"=== RUN TestKicStaticIP\n"} +{"Time":"2023-05-31T11:52:17.059633-07:00","Action":"output","Test":"TestKicStaticIP","Output":" kic_custom_network_test.go:123: only run with docker/podman driver\n"} +{"Time":"2023-05-31T11:52:17.059636-07:00","Action":"output","Test":"TestKicStaticIP","Output":"--- SKIP: TestKicStaticIP (0.00s)\n"} +{"Time":"2023-05-31T11:52:17.059637-07:00","Action":"skip","Test":"TestKicStaticIP","Elapsed":0} +{"Time":"2023-05-31T11:52:17.059639-07:00","Action":"run","Test":"TestMainNoArgs"} +{"Time":"2023-05-31T11:52:17.05964-07:00","Action":"output","Test":"TestMainNoArgs","Output":"=== RUN TestMainNoArgs\n"} +{"Time":"2023-05-31T11:52:17.059672-07:00","Action":"output","Test":"TestMainNoArgs","Output":" main_test.go:68: (dbg) Run: out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:52:17.092409-07:00","Action":"output","Test":"TestMainNoArgs","Output":"--- PASS: TestMainNoArgs (0.03s)\n"} +{"Time":"2023-05-31T11:52:17.092423-07:00","Action":"pass","Test":"TestMainNoArgs","Elapsed":0.03} +{"Time":"2023-05-31T11:52:17.092427-07:00","Action":"run","Test":"TestMinikubeProfile"} +{"Time":"2023-05-31T11:52:17.092429-07:00","Action":"output","Test":"TestMinikubeProfile","Output":"=== RUN TestMinikubeProfile\n"} +{"Time":"2023-05-31T11:52:17.092507-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Run: out/minikube-darwin-arm64 start -p first-438000 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:52:25.46411-07:00","Action":"output","Test":"TestMinikubeProfile","Output":"E0531 11:52:25.464061 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:52:45.73794-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Done: out/minikube-darwin-arm64 start -p first-438000 --driver=qemu2 : (28.645805s)\n"} +{"Time":"2023-05-31T11:52:45.737959-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Run: out/minikube-darwin-arm64 start -p second-440000 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:52:45.946005-07:00","Action":"output","Test":"TestMinikubeProfile","Output":"E0531 11:52:45.945975 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:53:18.363099-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:44: (dbg) Done: out/minikube-darwin-arm64 start -p second-440000 --driver=qemu2 : (32.625563125s)\n"} +{"Time":"2023-05-31T11:53:18.363115-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:51: (dbg) Run: out/minikube-darwin-arm64 profile first-438000\n"} +{"Time":"2023-05-31T11:53:18.500285-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:55: (dbg) Run: out/minikube-darwin-arm64 profile list -ojson\n"} +{"Time":"2023-05-31T11:53:18.668105-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:51: (dbg) Run: out/minikube-darwin-arm64 profile second-440000\n"} +{"Time":"2023-05-31T11:53:18.747703-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" minikube_profile_test.go:55: (dbg) Run: out/minikube-darwin-arm64 profile list -ojson\n"} +{"Time":"2023-05-31T11:53:18.921857-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:175: Cleaning up \"second-440000\" profile ...\n"} +{"Time":"2023-05-31T11:53:18.921884-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p second-440000\n"} +{"Time":"2023-05-31T11:53:19.01947-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:175: Cleaning up \"first-438000\" profile ...\n"} +{"Time":"2023-05-31T11:53:19.019487-07:00","Action":"output","Test":"TestMinikubeProfile","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p first-438000\n"} +{"Time":"2023-05-31T11:53:19.116768-07:00","Action":"output","Test":"TestMinikubeProfile","Output":"--- PASS: TestMinikubeProfile (62.03s)\n"} +{"Time":"2023-05-31T11:53:19.116787-07:00","Action":"pass","Test":"TestMinikubeProfile","Elapsed":62.03} +{"Time":"2023-05-31T11:53:19.11679-07:00","Action":"run","Test":"TestMountStart"} +{"Time":"2023-05-31T11:53:19.116793-07:00","Action":"output","Test":"TestMountStart","Output":"=== RUN TestMountStart\n"} +{"Time":"2023-05-31T11:53:19.116865-07:00","Action":"run","Test":"TestMountStart/serial"} +{"Time":"2023-05-31T11:53:19.116867-07:00","Action":"output","Test":"TestMountStart/serial","Output":"=== RUN TestMountStart/serial\n"} +{"Time":"2023-05-31T11:53:19.116869-07:00","Action":"run","Test":"TestMountStart/serial/StartWithMountFirst"} +{"Time":"2023-05-31T11:53:19.11687-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":"=== RUN TestMountStart/serial/StartWithMountFirst\n"} +{"Time":"2023-05-31T11:53:19.11694-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" mount_start_test.go:98: (dbg) Run: out/minikube-darwin-arm64 start -p mount-start-1-810000 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46464 --mount-uid 0 --no-kubernetes --driver=qemu2 \n"} +{"Time":"2023-05-31T11:53:26.907722-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":"E0531 11:53:26.907605 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:53:29.39541-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" mount_start_test.go:98: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p mount-start-1-810000 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46464 --mount-uid 0 --no-kubernetes --driver=qemu2 : exit status 80 (10.277990208s)\n"} +{"Time":"2023-05-31T11:53:29.395467-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \n"} +{"Time":"2023-05-31T11:53:29.395476-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:29.395485-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* [mount-start-1-810000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:53:29.395492-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:53:29.3955-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:53:29.395508-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:53:29.395516-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:53:29.395523-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:53:29.395531-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:53:29.395538-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:53:29.395545-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:53:29.395552-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* Starting minikube without Kubernetes in cluster mount-start-1-810000\n"} +{"Time":"2023-05-31T11:53:29.395559-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:53:29.395566-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:53:29.395573-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:53:29.39558-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t\n"} +{"Time":"2023-05-31T11:53:29.395587-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* Deleting \"mount-start-1-810000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:53:29.395594-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:53:29.395601-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:53:29.395608-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:53:29.395615-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t\n"} +{"Time":"2023-05-31T11:53:29.395621-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t\n"} +{"Time":"2023-05-31T11:53:29.395627-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t\n"} +{"Time":"2023-05-31T11:53:29.395633-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \n"} +{"Time":"2023-05-31T11:53:29.395639-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:29.395645-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:29.395653-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:29.395666-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p mount-start-1-810000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:29.395675-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:29.395683-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t* \n"} +{"Time":"2023-05-31T11:53:29.39569-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:53:29.395704-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:29.395713-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:53:29.39572-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:53:29.395727-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:29.395734-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:53:29.395742-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:29.39575-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:53:29.395758-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \n"} +{"Time":"2023-05-31T11:53:29.395767-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:29.395778-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" mount_start_test.go:100: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p mount-start-1-810000 --memory=2048 --mount --mount-gid 0 --mount-msize 6543 --mount-port 46464 --mount-uid 0 --no-kubernetes --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:53:29.39579-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:53:29.395798-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p mount-start-1-810000 -n mount-start-1-810000\n"} +{"Time":"2023-05-31T11:53:29.46509-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p mount-start-1-810000 -n mount-start-1-810000: exit status 7 (69.449667ms)\n"} +{"Time":"2023-05-31T11:53:29.465112-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \n"} +{"Time":"2023-05-31T11:53:29.465115-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:29.465117-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:53:29.465119-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" \n"} +{"Time":"2023-05-31T11:53:29.465121-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:29.465123-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:53:29.465125-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" helpers_test.go:241: \"mount-start-1-810000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:53:29.46513-07:00","Action":"output","Test":"TestMountStart/serial","Output":" mount_start_test.go:79: Previous test failed, not running dependent tests\n"} +{"Time":"2023-05-31T11:53:29.465157-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:175: Cleaning up \"mount-start-2-813000\" profile ...\n"} +{"Time":"2023-05-31T11:53:29.465193-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p mount-start-2-813000\n"} +{"Time":"2023-05-31T11:53:29.707001-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:175: Cleaning up \"mount-start-1-810000\" profile ...\n"} +{"Time":"2023-05-31T11:53:29.707016-07:00","Action":"output","Test":"TestMountStart","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p mount-start-1-810000\n"} +{"Time":"2023-05-31T11:53:29.796037-07:00","Action":"output","Test":"TestMountStart","Output":"--- FAIL: TestMountStart (10.68s)\n"} +{"Time":"2023-05-31T11:53:29.796049-07:00","Action":"output","Test":"TestMountStart/serial","Output":" --- FAIL: TestMountStart/serial (10.35s)\n"} +{"Time":"2023-05-31T11:53:29.796052-07:00","Action":"output","Test":"TestMountStart/serial/StartWithMountFirst","Output":" --- FAIL: TestMountStart/serial/StartWithMountFirst (10.35s)\n"} +{"Time":"2023-05-31T11:53:29.796055-07:00","Action":"fail","Test":"TestMountStart/serial/StartWithMountFirst","Elapsed":10.35} +{"Time":"2023-05-31T11:53:29.796058-07:00","Action":"fail","Test":"TestMountStart/serial","Elapsed":10.35} +{"Time":"2023-05-31T11:53:29.796059-07:00","Action":"fail","Test":"TestMountStart","Elapsed":10.68} +{"Time":"2023-05-31T11:53:29.796064-07:00","Action":"run","Test":"TestMultiNode"} +{"Time":"2023-05-31T11:53:29.796065-07:00","Action":"output","Test":"TestMultiNode","Output":"=== RUN TestMultiNode\n"} +{"Time":"2023-05-31T11:53:29.796089-07:00","Action":"run","Test":"TestMultiNode/serial"} +{"Time":"2023-05-31T11:53:29.796091-07:00","Action":"output","Test":"TestMultiNode/serial","Output":"=== RUN TestMultiNode/serial\n"} +{"Time":"2023-05-31T11:53:29.796106-07:00","Action":"run","Test":"TestMultiNode/serial/FreshStart2Nodes"} +{"Time":"2023-05-31T11:53:29.796111-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"=== RUN TestMultiNode/serial/FreshStart2Nodes\n"} +{"Time":"2023-05-31T11:53:29.796166-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:85: (dbg) Run: out/minikube-darwin-arm64 start -p multinode-073000 --wait=true --memory=2200 --nodes=2 -v=8 --alsologtostderr --driver=qemu2 \n"} +{"Time":"2023-05-31T11:53:39.870353-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:85: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p multinode-073000 --wait=true --memory=2200 --nodes=2 -v=8 --alsologtostderr --driver=qemu2 : exit status 80 (10.072063916s)\n"} +{"Time":"2023-05-31T11:53:39.870407-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:39.870417-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:39.870454-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* [multinode-073000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:53:39.870463-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:53:39.870474-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:53:39.870482-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:53:39.870489-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:53:39.870496-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:53:39.870503-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:53:39.87051-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:53:39.870517-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:53:39.870523-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* Starting control plane node multinode-073000 in cluster multinode-073000\n"} +{"Time":"2023-05-31T11:53:39.87053-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:53:39.870548-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:53:39.870555-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:53:39.870562-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t\n"} +{"Time":"2023-05-31T11:53:39.870572-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* Deleting \"multinode-073000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:53:39.87058-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:53:39.870587-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:53:39.870594-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:53:39.8706-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t\n"} +{"Time":"2023-05-31T11:53:39.870606-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t\n"} +{"Time":"2023-05-31T11:53:39.870612-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t\n"} +{"Time":"2023-05-31T11:53:39.870618-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:39.870624-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:39.87063-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:39.870636-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.823246 2551 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:53:39.870644-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.823382 2551 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:53:39.870652-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.823385 2551 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:53:39.870658-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.823388 2551 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:53:39.870666-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.823458 2551 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:53:39.870676-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.824475 2551 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:53:39.870684-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.839525 2551 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1380,\"bootTime\":1685557829,\"procs\":399,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:53:39.870698-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tW0531 11:53:29.839593 2551 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:53:39.870705-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.844423 2551 out.go:177] * [multinode-073000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:53:39.870722-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.850338 2551 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:53:39.87073-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.854337 2551 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:53:39.870738-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.850393 2551 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:53:39.870744-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.860349 2551 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:53:39.870753-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.863348 2551 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:53:39.87076-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.864742 2551 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:53:39.870767-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.868341 2551 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:53:39.870774-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.871514 2551 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:53:39.870781-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.875190 2551 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:53:39.870789-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.882325 2551 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:53:39.870796-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.882330 2551 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:53:39.870804-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.882337 2551 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:53:39.870812-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.884209 2551 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:53:39.870819-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.887324 2551 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:53:39.87083-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.890444 2551 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T11:53:39.870837-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.890462 2551 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:53:39.870844-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.890470 2551 cni.go:136] 0 nodes found, recommending kindnet\n"} +{"Time":"2023-05-31T11:53:39.870851-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.890476 2551 start_flags.go:314] Found \"CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T11:53:39.870858-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.890482 2551 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:53:39.870871-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t{Name:multinode-073000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:multinode-073000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:doc"} +{"Time":"2023-05-31T11:53:39.870886-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"ker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:true ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:53:39.870898-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.890573 2551 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:53:39.870905-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.897220 2551 out.go:177] * Starting control plane node multinode-073000 in cluster multinode-073000\n"} +{"Time":"2023-05-31T11:53:39.870912-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905355 2551 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:53:39.87092-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905379 2551 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:53:39.870928-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905394 2551 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:53:39.870935-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905449 2551 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:53:39.870943-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905455 2551 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:53:39.87095-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905672 2551 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/multinode-073000/config.json ...\n"} +{"Time":"2023-05-31T11:53:39.870958-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905687 2551 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/multinode-073000/config.json: {Name:mkb1f7254c091065ff9491988bf2b20d12d2f716 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:53:39.870968-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905901 2551 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:53:39.870975-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905915 2551 start.go:364] acquiring machines lock for multinode-073000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:53:39.870983-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905945 2551 start.go:368] acquired machines lock for \"multinode-073000\" in 24.667µs\n"} +{"Time":"2023-05-31T11:53:39.871001-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905956 2551 start.go:93] Provisioning new machine with config: \u0026{Name:multinode-073000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesCo"} +{"Time":"2023-05-31T11:53:39.871014-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"nfig:{KubernetesVersion:v1.27.2 ClusterName:multinode-073000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:true ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSiz"} +{"Time":"2023-05-31T11:53:39.871043-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"e:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:53:39.871053-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.905988 2551 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:53:39.871061-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.914340 2551 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:53:39.871073-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.931581 2551 start.go:159] libmachine.API.Create for \"multinode-073000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:53:39.87108-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.931612 2551 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:53:39.871088-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.931676 2551 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:53:39.871096-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.931696 2551 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:53:39.871103-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.931706 2551 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:53:39.87111-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.931749 2551 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:53:39.871118-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.931763 2551 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:53:39.871125-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.931770 2551 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:53:39.871134-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:29.932086 2551 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:53:39.871151-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.182598 2551 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:53:39.871159-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.379574 2551 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:53:39.871166-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.379582 2551 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:53:39.871174-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.379744 2551 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:53:39.871182-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.388525 2551 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:53:39.871189-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.388539 2551 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:53:39.871197-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.388590 2551 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:53:39.871204-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.395849 2551 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:53:39.87121-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t\n"} +{"Time":"2023-05-31T11:53:39.871217-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.395862 2551 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:53:39.871225-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.395877 2551 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:53:39.871233-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.395883 2551 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:53:39.871243-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.395924 2551 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/qemu.pid -device virtio-net-pci,netdev=net0,mac=22:99:10:4e:19:e1 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:53:39.871267-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.397431 2551 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:53:39.871275-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.397445 2551 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:53:39.871283-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t\n"} +{"Time":"2023-05-31T11:53:39.871289-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:30.397461 2551 client.go:171] LocalClient.Create took 465.851459ms\n"} +{"Time":"2023-05-31T11:53:39.871298-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:32.399621 2551 start.go:128] duration metric: createHost completed in 2.493647708s\n"} +{"Time":"2023-05-31T11:53:39.871305-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:32.399679 2551 start.go:83] releasing machines lock for \"multinode-073000\", held for 2.493761459s\n"} +{"Time":"2023-05-31T11:53:39.871312-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tW0531 11:53:32.399771 2551 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:39.871324-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:32.411011 2551 out.go:177] * Deleting \"multinode-073000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:53:39.871331-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tW0531 11:53:32.430337 2551 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:39.871339-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:39.871347-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:32.430365 2551 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T11:53:39.871354-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.432562 2551 start.go:364] acquiring machines lock for multinode-073000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:53:39.871362-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.433250 2551 start.go:368] acquired machines lock for \"multinode-073000\" in 567.083µs\n"} +{"Time":"2023-05-31T11:53:39.871376-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.433376 2551 start.go:93] Provisioning new machine with config: \u0026{Name:multinode-073000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesCo"} +{"Time":"2023-05-31T11:53:39.87139-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"nfig:{KubernetesVersion:v1.27.2 ClusterName:multinode-073000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:true ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSiz"} +{"Time":"2023-05-31T11:53:39.871401-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":"e:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:53:39.871409-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.433667 2551 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:53:39.871417-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.439418 2551 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:53:39.871544-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.486377 2551 start.go:159] libmachine.API.Create for \"multinode-073000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:53:39.871552-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.486437 2551 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:53:39.871557-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.486546 2551 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:53:39.871563-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.486584 2551 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:53:39.871568-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.486616 2551 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:53:39.87159-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.486686 2551 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:53:39.871596-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.486713 2551 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:53:39.871601-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.486730 2551 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:53:39.871607-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.487302 2551 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:53:39.871613-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.696730 2551 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:53:39.871618-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.813231 2551 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:53:39.871624-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.813237 2551 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:53:39.87163-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.813392 2551 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:53:39.871635-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.821783 2551 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:53:39.87164-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.821798 2551 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:53:39.871646-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.821862 2551 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:53:39.871651-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.828948 2551 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:53:39.871656-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t\n"} +{"Time":"2023-05-31T11:53:39.871661-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.828970 2551 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:53:39.871666-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.828985 2551 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:53:39.871672-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.828993 2551 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:53:39.87168-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.829031 2551 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/qemu.pid -device virtio-net-pci,netdev=net0,mac=2e:65:d5:b8:e1:91 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:53:39.871688-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.830573 2551 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:53:39.8717-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.830587 2551 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:53:39.871705-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t\n"} +{"Time":"2023-05-31T11:53:39.87171-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:37.830601 2551 client.go:171] LocalClient.Create took 344.162959ms\n"} +{"Time":"2023-05-31T11:53:39.871715-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:39.831950 2551 start.go:128] duration metric: createHost completed in 2.39825375s\n"} +{"Time":"2023-05-31T11:53:39.87172-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:39.832014 2551 start.go:83] releasing machines lock for \"multinode-073000\", held for 2.398771791s\n"} +{"Time":"2023-05-31T11:53:39.871726-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tW0531 11:53:39.832428 2551 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p multinode-073000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:39.871732-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p multinode-073000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:39.871737-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:39.839710 2551 out.go:177] \n"} +{"Time":"2023-05-31T11:53:39.871743-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tW0531 11:53:39.843569 2551 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:39.871749-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:53:39.871755-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tW0531 11:53:39.843608 2551 out.go:239] * \n"} +{"Time":"2023-05-31T11:53:39.87176-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t* \n"} +{"Time":"2023-05-31T11:53:39.871765-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tW0531 11:53:39.846230 2551 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:53:39.871773-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:39.871779-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:53:39.871784-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:53:39.871789-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:39.871794-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:53:39.871799-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:39.871805-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:53:39.871812-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:53:39.871819-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:39.871825-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:53:39.87183-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:53:39.871835-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:39.87184-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:53:39.871845-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:53:39.871851-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:53:39.871858-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tI0531 11:53:39.854660 2551 out.go:177] \n"} +{"Time":"2023-05-31T11:53:39.871863-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:39.871867-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:39.871872-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" multinode_test.go:87: failed to start cluster. args \"out/minikube-darwin-arm64 start -p multinode-073000 --wait=true --memory=2200 --nodes=2 -v=8 --alsologtostderr --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:53:39.871882-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:53:39.871888-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:53:39.938122-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (67.583917ms)\n"} +{"Time":"2023-05-31T11:53:39.938142-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:39.938145-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:53:39.938147-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:53:39.938149-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:39.938151-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:53:39.938154-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:53:39.938158-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:53:39.938216-07:00","Action":"run","Test":"TestMultiNode/serial/DeployApp2Nodes"} +{"Time":"2023-05-31T11:53:39.938219-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"=== RUN TestMultiNode/serial/DeployApp2Nodes\n"} +{"Time":"2023-05-31T11:53:39.938321-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:481: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- apply -f ./testdata/multinodes/multinode-pod-dns-test.yaml\n"} +{"Time":"2023-05-31T11:53:40.056541-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:481: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- apply -f ./testdata/multinodes/multinode-pod-dns-test.yaml: exit status 1 (118.14425ms)\n"} +{"Time":"2023-05-31T11:53:40.056554-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:40.056556-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:40.056557-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: cluster \"multinode-073000\" does not exist\n"} +{"Time":"2023-05-31T11:53:40.056559-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:40.05656-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:40.056562-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:483: failed to create busybox deployment to multinode cluster\n"} +{"Time":"2023-05-31T11:53:40.056564-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:486: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- rollout status deployment/busybox\n"} +{"Time":"2023-05-31T11:53:40.110375-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:486: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- rollout status deployment/busybox: exit status 1 (53.759916ms)\n"} +{"Time":"2023-05-31T11:53:40.110394-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:40.110396-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:40.110398-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:53:40.1104-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:40.110401-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:40.110402-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:488: failed to deploy busybox to multinode cluster\n"} +{"Time":"2023-05-31T11:53:40.110405-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:53:40.165106-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (54.631875ms)\n"} +{"Time":"2023-05-31T11:53:40.165126-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:40.165128-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:40.16513-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:53:40.165131-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:40.165133-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:40.165134-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:53:41.149755-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:53:41.252668-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (102.874875ms)\n"} +{"Time":"2023-05-31T11:53:41.252682-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:41.252684-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:41.252686-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:53:41.252687-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:41.252688-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:41.25269-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:53:43.204325-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:53:43.306558-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (102.206792ms)\n"} +{"Time":"2023-05-31T11:53:43.306571-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:43.306573-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:43.306574-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:53:43.306576-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:43.306577-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:43.306578-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:53:46.130887-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:53:46.234497-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (103.617542ms)\n"} +{"Time":"2023-05-31T11:53:46.234511-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:46.234513-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:46.234515-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:53:46.234516-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:46.234518-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:46.234519-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:53:49.184227-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:53:49.287049-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (102.803167ms)\n"} +{"Time":"2023-05-31T11:53:49.287063-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:49.287065-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:49.287067-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:53:49.287068-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:49.28707-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:49.287071-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:53:55.82008-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:53:55.923657-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (103.535208ms)\n"} +{"Time":"2023-05-31T11:53:55.923672-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:55.923674-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:53:55.923675-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:53:55.923677-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:53:55.923678-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:53:55.92368-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:54:04.50455-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:54:04.607515-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (102.937334ms)\n"} +{"Time":"2023-05-31T11:54:04.607532-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:54:04.607534-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:54:04.607535-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:54:04.607537-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:54:04.607538-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:54:04.607544-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:54:21.625171-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:54:21.727451-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (102.2385ms)\n"} +{"Time":"2023-05-31T11:54:21.727466-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:54:21.727468-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:54:21.72747-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:54:21.727472-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:54:21.727473-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:54:21.727474-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:54:46.374041-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:54:46.478336-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (104.271667ms)\n"} +{"Time":"2023-05-31T11:54:46.47835-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:54:46.478352-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:54:46.478354-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:54:46.478355-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:54:46.478357-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:54:46.478358-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:54:48.829025-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:54:48.828943 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:02.227813-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:55:02.330312-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (102.489459ms)\n"} +{"Time":"2023-05-31T11:55:02.330326-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:02.330328-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:02.330334-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:02.330338-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:02.33034-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:02.330342-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:55:18.454396-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:18.454285 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:18.461098-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:18.461017 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:18.471577-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:18.471507 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:18.493627-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:18.493593 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:18.535703-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:18.535658 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:18.617801-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:18.617734 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:18.779919-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:18.779852 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:19.102106-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:19.102036 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:19.744357-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:19.744294 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:21.026722-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:21.026625 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:23.589097-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:23.588993 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:28.711424-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":"E0531 11:55:28.711320 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:31.452783-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}'\n"} +{"Time":"2023-05-31T11:55:31.555579-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:493: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].status.podIP}': exit status 1 (102.738042ms)\n"} +{"Time":"2023-05-31T11:55:31.555591-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.555593-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:31.555595-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:31.555597-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.555598-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:31.555599-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:496: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:55:31.555601-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:512: failed to resolve pod IPs: failed to retrieve Pod IPs (may be temporary): exit status 1\n"} +{"Time":"2023-05-31T11:55:31.555602-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:516: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].metadata.name}'\n"} +{"Time":"2023-05-31T11:55:31.609421-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:516: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].metadata.name}': exit status 1 (53.78425ms)\n"} +{"Time":"2023-05-31T11:55:31.609435-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.609437-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:31.609438-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:31.60944-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.609442-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:31.609443-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:518: failed get Pod names\n"} +{"Time":"2023-05-31T11:55:31.609446-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:524: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- exec -- nslookup kubernetes.io\n"} +{"Time":"2023-05-31T11:55:31.663341-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:524: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- exec -- nslookup kubernetes.io: exit status 1 (53.82225ms)\n"} +{"Time":"2023-05-31T11:55:31.663353-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.663355-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:31.663357-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:31.663358-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.663359-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:31.66336-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:526: Pod could not resolve 'kubernetes.io': exit status 1\n"} +{"Time":"2023-05-31T11:55:31.663362-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:534: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- exec -- nslookup kubernetes.default\n"} +{"Time":"2023-05-31T11:55:31.717583-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:534: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- exec -- nslookup kubernetes.default: exit status 1 (54.167209ms)\n"} +{"Time":"2023-05-31T11:55:31.717596-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.717598-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:31.717599-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:31.717601-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.717602-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:31.717604-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:536: Pod could not resolve 'kubernetes.default': exit status 1\n"} +{"Time":"2023-05-31T11:55:31.717613-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:542: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- exec -- nslookup kubernetes.default.svc.cluster.local\n"} +{"Time":"2023-05-31T11:55:31.771534-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:542: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- exec -- nslookup kubernetes.default.svc.cluster.local: exit status 1 (53.868042ms)\n"} +{"Time":"2023-05-31T11:55:31.77155-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.771552-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:31.771554-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:31.771556-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.771557-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:31.771558-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" multinode_test.go:544: Pod could not resolve local service (kubernetes.default.svc.cluster.local): exit status 1\n"} +{"Time":"2023-05-31T11:55:31.771561-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:31.771562-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:31.800319-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.670833ms)\n"} +{"Time":"2023-05-31T11:55:31.800332-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.800334-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:31.800336-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:31.800337-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" \n"} +{"Time":"2023-05-31T11:55:31.800338-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:31.800339-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:31.800342-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:31.800366-07:00","Action":"run","Test":"TestMultiNode/serial/PingHostFrom2Pods"} +{"Time":"2023-05-31T11:55:31.800368-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":"=== RUN TestMultiNode/serial/PingHostFrom2Pods\n"} +{"Time":"2023-05-31T11:55:31.800438-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:552: (dbg) Run: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].metadata.name}'\n"} +{"Time":"2023-05-31T11:55:31.855094-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:552: (dbg) Non-zero exit: out/minikube-darwin-arm64 kubectl -p multinode-073000 -- get pods -o jsonpath='{.items[*].metadata.name}': exit status 1 (54.590292ms)\n"} +{"Time":"2023-05-31T11:55:31.855107-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" \n"} +{"Time":"2023-05-31T11:55:31.855109-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:31.85511-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" \terror: no server found for cluster \"multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:31.855112-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" \n"} +{"Time":"2023-05-31T11:55:31.855114-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:31.855115-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" multinode_test.go:554: failed to get Pod names: exit status 1\n"} +{"Time":"2023-05-31T11:55:31.855118-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:31.855119-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:31.884144-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.946458ms)\n"} +{"Time":"2023-05-31T11:55:31.884158-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" \n"} +{"Time":"2023-05-31T11:55:31.88416-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:31.884161-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:31.884163-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" \n"} +{"Time":"2023-05-31T11:55:31.884164-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:31.884166-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:31.884169-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:31.884189-07:00","Action":"run","Test":"TestMultiNode/serial/AddNode"} +{"Time":"2023-05-31T11:55:31.884193-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":"=== RUN TestMultiNode/serial/AddNode\n"} +{"Time":"2023-05-31T11:55:31.884281-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:110: (dbg) Run: out/minikube-darwin-arm64 node add -p multinode-073000 -v 3 --alsologtostderr\n"} +{"Time":"2023-05-31T11:55:31.92322-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:110: (dbg) Non-zero exit: out/minikube-darwin-arm64 node add -p multinode-073000 -v 3 --alsologtostderr: exit status 89 (38.863625ms)\n"} +{"Time":"2023-05-31T11:55:31.923231-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \n"} +{"Time":"2023-05-31T11:55:31.923233-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:31.923235-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:55:31.923237-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \t To start a cluster, run: \"minikube start -p multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:31.923238-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \n"} +{"Time":"2023-05-31T11:55:31.923239-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:31.923241-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:31.923242-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.911347 2636 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:31.923244-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.911544 2636 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:31.92325-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.911547 2636 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:31.923251-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.911549 2636 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:31.923253-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.911612 2636 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:31.923254-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.911829 2636 mustload.go:65] Loading cluster: multinode-073000\n"} +{"Time":"2023-05-31T11:55:31.923256-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.911997 2636 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:31.923257-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.916591 2636 out.go:177] * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:55:31.923259-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tI0531 11:55:31.919649 2636 out.go:177] To start a cluster, run: \"minikube start -p multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:31.92326-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \n"} +{"Time":"2023-05-31T11:55:31.923261-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:31.923263-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" multinode_test.go:112: failed to add node to current cluster. args \"out/minikube-darwin-arm64 node add -p multinode-073000 -v 3 --alsologtostderr\" : exit status 89\n"} +{"Time":"2023-05-31T11:55:31.923265-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:31.923266-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:31.952199-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.883334ms)\n"} +{"Time":"2023-05-31T11:55:31.952211-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \n"} +{"Time":"2023-05-31T11:55:31.952212-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:31.952214-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:31.952215-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" \n"} +{"Time":"2023-05-31T11:55:31.952224-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:31.952225-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:31.952228-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:31.95225-07:00","Action":"run","Test":"TestMultiNode/serial/ProfileList"} +{"Time":"2023-05-31T11:55:31.952254-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":"=== RUN TestMultiNode/serial/ProfileList\n"} +{"Time":"2023-05-31T11:55:31.952293-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" multinode_test.go:132: (dbg) Run: out/minikube-darwin-arm64 profile list --output json\n"} +{"Time":"2023-05-31T11:55:32.02442-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" multinode_test.go:155: expected profile \"multinode-073000\" in json of 'profile list' include 3 nodes but have 1 nodes. got *\"{\\\"invalid\\\":[],\\\"valid\\\":[{\\\"Name\\\":\\\"multinode-073000\\\",\\\"Status\\\":\\\"Stopped\\\",\\\"Config\\\":{\\\"Name\\\":\\\"multinode-073000\\\",\\\"KeepContext\\\":false,\\\"EmbedCerts\\\":false,\\\"MinikubeISO\\\":\\\"https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso\\\",\\\"KicBaseImage\\\":\\\"gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8\\\",\\\"Memory\\\":2200,\\\"CPUs\\\":2,\\\"DiskSize\\\":20000,\\\"VMDriver\\\":\\\"\\\",\\\"Driver\\\":\\\"qemu2\\\",\\\"HyperkitVpnKitSock\\\":\\\"\\\",\\\"HyperkitVSockPorts\\\":[],\\\"DockerEnv\\\":null,\\\"ContainerVolumeMounts\\\":null,\\\"InsecureRegistry\\\":null,\\\"RegistryMirror\\\":[],\\\"HostOnlyCIDR\\\":\\\"192.168.59.1/24\\\",\\\"HypervVirtualSwitch\\\":\\\"\\\",\\\"HypervUseExternalSwitch\\\":false,\\\"HypervExternalAdapter\\\":\\\"\\\",\\\"KVMNetwork\\\":\\\"default\\\",\\\"KVMQemuURI\\\":\\\"qemu:///system\\\",\\\"KVMGPU\\\":false,\\\"KVMHidd"} +{"Time":"2023-05-31T11:55:32.02444-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":"en\\\":false,\\\"KVMNUMACount\\\":1,\\\"APIServerPort\\\":0,\\\"DockerOpt\\\":null,\\\"DisableDriverMounts\\\":false,\\\"NFSShare\\\":[],\\\"NFSSharesRoot\\\":\\\"/nfsshares\\\",\\\"UUID\\\":\\\"\\\",\\\"NoVTXCheck\\\":false,\\\"DNSProxy\\\":false,\\\"HostDNSResolver\\\":true,\\\"HostOnlyNicType\\\":\\\"virtio\\\",\\\"NatNicType\\\":\\\"virtio\\\",\\\"SSHIPAddress\\\":\\\"\\\",\\\"SSHUser\\\":\\\"root\\\",\\\"SSHKey\\\":\\\"\\\",\\\"SSHPort\\\":22,\\\"KubernetesConfig\\\":{\\\"KubernetesVersion\\\":\\\"v1.27.2\\\",\\\"ClusterName\\\":\\\"multinode-073000\\\",\\\"Namespace\\\":\\\"default\\\",\\\"APIServerName\\\":\\\"minikubeCA\\\",\\\"APIServerNames\\\":null,\\\"APIServerIPs\\\":null,\\\"DNSDomain\\\":\\\"cluster.local\\\",\\\"ContainerRuntime\\\":\\\"docker\\\",\\\"CRISocket\\\":\\\"\\\",\\\"NetworkPlugin\\\":\\\"cni\\\",\\\"FeatureGates\\\":\\\"\\\",\\\"ServiceCIDR\\\":\\\"10.96.0.0/12\\\",\\\"ImageRepository\\\":\\\"\\\",\\\"LoadBalancerStartIP\\\":\\\"\\\",\\\"LoadBalancerEndIP\\\":\\\"\\\",\\\"CustomIngressCert\\\":\\\"\\\",\\\"RegistryAliases\\\":\\\"\\\",\\\"ExtraOptions\\\":null,\\\"ShouldLoadCachedImages\\\":true,\\\"EnableDefaultCNI\\\":false,\\\"CNI\\\":\\\"\\\",\\\"NodeIP\\\":\\\"\\\",\\\"NodePort\\\":8443,\\\"NodeName\\\":\\\"\\\"},\\\"Nodes\\\":[{\\\"Name\\\":\\\"\\"} +{"Time":"2023-05-31T11:55:32.024449-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":"\",\\\"IP\\\":\\\"\\\",\\\"Port\\\":8443,\\\"KubernetesVersion\\\":\\\"v1.27.2\\\",\\\"ContainerRuntime\\\":\\\"docker\\\",\\\"ControlPlane\\\":true,\\\"Worker\\\":true}],\\\"Addons\\\":null,\\\"CustomAddonImages\\\":null,\\\"CustomAddonRegistries\\\":null,\\\"VerifyComponents\\\":{\\\"apiserver\\\":true,\\\"apps_running\\\":true,\\\"default_sa\\\":true,\\\"extra\\\":true,\\\"kubelet\\\":true,\\\"node_ready\\\":true,\\\"system_pods\\\":true},\\\"StartHostTimeout\\\":360000000000,\\\"ScheduledStop\\\":null,\\\"ExposedPorts\\\":[],\\\"ListenAddress\\\":\\\"\\\",\\\"Network\\\":\\\"socket_vmnet\\\",\\\"Subnet\\\":\\\"\\\",\\\"MultiNodeRequested\\\":true,\\\"ExtraDisks\\\":0,\\\"CertExpiration\\\":94608000000000000,\\\"Mount\\\":false,\\\"MountString\\\":\\\"/Users:/minikube-host\\\",\\\"Mount9PVersion\\\":\\\"9p2000.L\\\",\\\"MountGID\\\":\\\"docker\\\",\\\"MountIP\\\":\\\"\\\",\\\"MountMSize\\\":262144,\\\"MountOptions\\\":[],\\\"MountPort\\\":0,\\\"MountType\\\":\\\"9p\\\",\\\"MountUID\\\":\\\"docker\\\",\\\"BinaryMirror\\\":\\\"\\\",\\\"DisableOptimizations\\\":false,\\\"DisableMetrics\\\":false,\\\"CustomQemuFirmwarePath\\\":\\\"\\\",\\\"SocketVMnetClientPath\\\":\\\"/opt/socket_vmnet/bin/socket_vmnet_client\\\",\\\"SocketVMnetPat"} +{"Time":"2023-05-31T11:55:32.024455-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":"h\\\":\\\"/var/run/socket_vmnet\\\",\\\"StaticIP\\\":\\\"\\\"},\\\"Active\\\":false}]}\"*. args: \"out/minikube-darwin-arm64 profile list --output json\"\n"} +{"Time":"2023-05-31T11:55:32.024457-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:32.02446-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.053044-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.549417ms)\n"} +{"Time":"2023-05-31T11:55:32.053056-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" \n"} +{"Time":"2023-05-31T11:55:32.053058-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.05306-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:32.053061-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" \n"} +{"Time":"2023-05-31T11:55:32.053063-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.053064-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:32.053067-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:32.053089-07:00","Action":"run","Test":"TestMultiNode/serial/CopyFile"} +{"Time":"2023-05-31T11:55:32.05309-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":"=== RUN TestMultiNode/serial/CopyFile\n"} +{"Time":"2023-05-31T11:55:32.053152-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" multinode_test.go:173: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 status --output json --alsologtostderr\n"} +{"Time":"2023-05-31T11:55:32.081742-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" multinode_test.go:173: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 status --output json --alsologtostderr: exit status 7 (28.51775ms)\n"} +{"Time":"2023-05-31T11:55:32.081757-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \n"} +{"Time":"2023-05-31T11:55:32.081759-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.081761-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \t{\"Name\":\"multinode-073000\",\"Host\":\"Stopped\",\"Kubelet\":\"Stopped\",\"APIServer\":\"Stopped\",\"Kubeconfig\":\"Stopped\",\"Worker\":false}\n"} +{"Time":"2023-05-31T11:55:32.081763-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \n"} +{"Time":"2023-05-31T11:55:32.081764-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.081765-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:32.081774-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080324 2646 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:32.081775-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080481 2646 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:32.081777-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080484 2646 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:32.081778-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080487 2646 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:32.082252-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080560 2646 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:32.082272-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080677 2646 out.go:303] Setting JSON to true\n"} +{"Time":"2023-05-31T11:55:32.082275-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080694 2646 mustload.go:65] Loading cluster: multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.082278-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080755 2646 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:55:32.082281-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080866 2646 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:32.082285-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.080871 2646 status.go:255] checking status of multinode-073000 ...\n"} +{"Time":"2023-05-31T11:55:32.082288-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.081064 2646 status.go:330] multinode-073000 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:55:32.08229-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.081067 2646 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T11:55:32.082294-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tI0531 11:55:32.081070 2646 status.go:257] multinode-073000 status: \u0026{Name:multinode-073000 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:false TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T11:55:32.082296-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \n"} +{"Time":"2023-05-31T11:55:32.082297-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:32.082302-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" multinode_test.go:180: failed to decode json from status: args \"out/minikube-darwin-arm64 -p multinode-073000 status --output json --alsologtostderr\": json: cannot unmarshal object into Go value of type []cmd.Status\n"} +{"Time":"2023-05-31T11:55:32.082304-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:32.082305-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.110589-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.620875ms)\n"} +{"Time":"2023-05-31T11:55:32.110614-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \n"} +{"Time":"2023-05-31T11:55:32.110616-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.110618-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:32.11062-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" \n"} +{"Time":"2023-05-31T11:55:32.110621-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.110623-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:32.110625-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:32.110822-07:00","Action":"run","Test":"TestMultiNode/serial/StopNode"} +{"Time":"2023-05-31T11:55:32.110829-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":"=== RUN TestMultiNode/serial/StopNode\n"} +{"Time":"2023-05-31T11:55:32.110855-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:210: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 node stop m03\n"} +{"Time":"2023-05-31T11:55:32.156204-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:210: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 node stop m03: exit status 85 (45.253875ms)\n"} +{"Time":"2023-05-31T11:55:32.156217-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.156219-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.15622-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:32.156222-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:32.156223-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.156224-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.156226-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:32.15623-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tX Exiting due to GUEST_NODE_RETRIEVE: retrieving node: Could not find node m03\n"} +{"Time":"2023-05-31T11:55:32.156232-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t* \n"} +{"Time":"2023-05-31T11:55:32.156234-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:32.156239-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.15624-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:32.156242-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:32.156243-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.156245-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:32.156246-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T11:55:32.156248-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t│ * - /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube_node_295f67d8757edd996fe5c1e7ccde72c355ccf4dc_0.log │\n"} +{"Time":"2023-05-31T11:55:32.156249-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.156251-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:32.156253-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.156254-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:32.156255-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:212: node stop returned an error. args \"out/minikube-darwin-arm64 -p multinode-073000 node stop m03\": exit status 85\n"} +{"Time":"2023-05-31T11:55:32.156258-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:216: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 status\n"} +{"Time":"2023-05-31T11:55:32.18537-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:216: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 status: exit status 7 (29.057875ms)\n"} +{"Time":"2023-05-31T11:55:32.185382-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.185384-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.185386-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-073000\n"} +{"Time":"2023-05-31T11:55:32.185388-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T11:55:32.185389-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T11:55:32.18539-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:32.185391-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:32.185393-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:32.185394-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:32.185395-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.185396-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.185399-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:223: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr\n"} +{"Time":"2023-05-31T11:55:32.214139-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:223: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr: exit status 7 (28.625292ms)\n"} +{"Time":"2023-05-31T11:55:32.214151-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.214153-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.214155-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tmultinode-073000\n"} +{"Time":"2023-05-31T11:55:32.214157-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T11:55:32.214158-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T11:55:32.214159-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:32.21416-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:32.214162-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:32.214163-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:32.214164-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.214165-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.214166-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:32.214168-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.212669 2654 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:32.214169-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.212792 2654 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:32.214171-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.212799 2654 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:32.214174-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.212802 2654 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:32.214175-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.212872 2654 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:32.214177-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.212987 2654 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:55:32.214178-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.213005 2654 mustload.go:65] Loading cluster: multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.214179-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.213044 2654 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:55:32.214181-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.213181 2654 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:32.214183-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.213188 2654 status.go:255] checking status of multinode-073000 ...\n"} +{"Time":"2023-05-31T11:55:32.214184-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.213366 2654 status.go:330] multinode-073000 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:55:32.214187-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.213372 2654 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T11:55:32.214188-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tI0531 11:55:32.213375 2654 status.go:257] multinode-073000 status: \u0026{Name:multinode-073000 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:false TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T11:55:32.21419-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.214191-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:32.214193-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" multinode_test.go:229: incorrect number of running kubelets: args \"out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr\": multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.214194-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" type: Control Plane\n"} +{"Time":"2023-05-31T11:55:32.214195-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" host: Stopped\n"} +{"Time":"2023-05-31T11:55:32.214197-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" kubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:32.214198-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" apiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:32.214199-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" kubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:32.2142-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.214201-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:32.214204-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.242863-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.613834ms)\n"} +{"Time":"2023-05-31T11:55:32.242875-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.242877-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.242879-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:32.24288-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" \n"} +{"Time":"2023-05-31T11:55:32.242882-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.242884-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:32.242886-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:32.242938-07:00","Action":"run","Test":"TestMultiNode/serial/StartAfterStop"} +{"Time":"2023-05-31T11:55:32.242941-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":"=== RUN TestMultiNode/serial/StartAfterStop\n"} +{"Time":"2023-05-31T11:55:32.243003-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:254: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 node start m03 --alsologtostderr\n"} +{"Time":"2023-05-31T11:55:32.286298-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:254: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 node start m03 --alsologtostderr: exit status 85 (43.206375ms)\n"} +{"Time":"2023-05-31T11:55:32.28631-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \n"} +{"Time":"2023-05-31T11:55:32.286311-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.286313-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T11:55:32.286315-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T11:55:32.286318-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \n"} +{"Time":"2023-05-31T11:55:32.286319-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.286323-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:32.286325-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.270505 2658 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:32.286326-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.270712 2658 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:32.286328-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.270714 2658 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:32.28633-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.270717 2658 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:32.286331-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.270785 2658 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:32.286333-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.271034 2658 mustload.go:65] Loading cluster: multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.286334-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.271211 2658 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:32.286336-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.274735 2658 out.go:177] \n"} +{"Time":"2023-05-31T11:55:32.286337-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tW0531 11:55:32.277547 2658 out.go:239] X Exiting due to GUEST_NODE_RETRIEVE: retrieving node: Could not find node m03\n"} +{"Time":"2023-05-31T11:55:32.286339-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tX Exiting due to GUEST_NODE_RETRIEVE: retrieving node: Could not find node m03\n"} +{"Time":"2023-05-31T11:55:32.28634-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tW0531 11:55:32.277551 2658 out.go:239] * \n"} +{"Time":"2023-05-31T11:55:32.286341-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t* \n"} +{"Time":"2023-05-31T11:55:32.286343-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tW0531 11:55:32.279113 2658 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:32.286346-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.286347-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:32.286349-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:32.28635-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.286352-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:32.286353-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T11:55:32.286355-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ * - /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube_node_1c3a1297795327375b61f3ff5a4ef34c9b2fc69b_0.log │\n"} +{"Time":"2023-05-31T11:55:32.286356-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.286358-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:32.28636-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:32.286362-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.286364-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:32.286366-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:32.286367-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.286369-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:32.28637-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T11:55:32.286372-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ * - /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube_node_1c3a1297795327375b61f3ff5a4ef34c9b2fc69b_0.log │\n"} +{"Time":"2023-05-31T11:55:32.286373-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:32.286375-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:32.286377-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tI0531 11:55:32.282478 2658 out.go:177] \n"} +{"Time":"2023-05-31T11:55:32.286378-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \n"} +{"Time":"2023-05-31T11:55:32.286379-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:32.286382-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:256: I0531 11:55:32.270505 2658 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:32.286384-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" I0531 11:55:32.270712 2658 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:32.286385-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" I0531 11:55:32.270714 2658 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:32.286387-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" I0531 11:55:32.270717 2658 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:32.286388-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" I0531 11:55:32.270785 2658 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:32.28639-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" I0531 11:55:32.271034 2658 mustload.go:65] Loading cluster: multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.286391-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" I0531 11:55:32.271211 2658 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:32.286392-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" I0531 11:55:32.274735 2658 out.go:177] \n"} +{"Time":"2023-05-31T11:55:32.286395-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" W0531 11:55:32.277547 2658 out.go:239] X Exiting due to GUEST_NODE_RETRIEVE: retrieving node: Could not find node m03\n"} +{"Time":"2023-05-31T11:55:32.286396-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" X Exiting due to GUEST_NODE_RETRIEVE: retrieving node: Could not find node m03\n"} +{"Time":"2023-05-31T11:55:32.286398-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" W0531 11:55:32.277551 2658 out.go:239] * \n"} +{"Time":"2023-05-31T11:55:32.286399-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" * \n"} +{"Time":"2023-05-31T11:55:32.286401-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" W0531 11:55:32.279113 2658 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:32.286403-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ │\n"} +{"Time":"2023-05-31T11:55:32.286404-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:32.286408-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:32.286409-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ │\n"} +{"Time":"2023-05-31T11:55:32.28641-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:32.286412-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T11:55:32.286413-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ * - /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube_node_1c3a1297795327375b61f3ff5a4ef34c9b2fc69b_0.log │\n"} +{"Time":"2023-05-31T11:55:32.286415-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ │\n"} +{"Time":"2023-05-31T11:55:32.286417-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" ╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:32.286419-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" ╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:32.286421-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ │\n"} +{"Time":"2023-05-31T11:55:32.286434-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:32.286436-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:32.286437-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ │\n"} +{"Time":"2023-05-31T11:55:32.286439-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:32.28644-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ * Please also attach the following file to the GitHub issue: │\n"} +{"Time":"2023-05-31T11:55:32.286442-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ * - /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube_node_1c3a1297795327375b61f3ff5a4ef34c9b2fc69b_0.log │\n"} +{"Time":"2023-05-31T11:55:32.286443-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" │ │\n"} +{"Time":"2023-05-31T11:55:32.286445-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" ╰─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:32.286453-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" I0531 11:55:32.282478 2658 out.go:177] \n"} +{"Time":"2023-05-31T11:55:32.286455-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:257: node start returned an error. args \"out/minikube-darwin-arm64 -p multinode-073000 node start m03 --alsologtostderr\": exit status 85\n"} +{"Time":"2023-05-31T11:55:32.286456-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:261: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 status\n"} +{"Time":"2023-05-31T11:55:32.315028-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:261: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 status: exit status 7 (28.62125ms)\n"} +{"Time":"2023-05-31T11:55:32.315041-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \n"} +{"Time":"2023-05-31T11:55:32.315043-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.315045-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tmultinode-073000\n"} +{"Time":"2023-05-31T11:55:32.315046-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T11:55:32.315048-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T11:55:32.31505-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:32.315051-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:32.315053-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:32.315054-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \t\n"} +{"Time":"2023-05-31T11:55:32.315055-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \n"} +{"Time":"2023-05-31T11:55:32.315057-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.315058-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" multinode_test.go:263: failed to run minikube status. args \"out/minikube-darwin-arm64 -p multinode-073000 status\" : exit status 7\n"} +{"Time":"2023-05-31T11:55:32.315061-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:32.315062-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.343813-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.673959ms)\n"} +{"Time":"2023-05-31T11:55:32.343832-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \n"} +{"Time":"2023-05-31T11:55:32.343834-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:32.343836-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:32.343837-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" \n"} +{"Time":"2023-05-31T11:55:32.343839-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:32.34384-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:32.343843-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:32.343866-07:00","Action":"run","Test":"TestMultiNode/serial/RestartKeepsNodes"} +{"Time":"2023-05-31T11:55:32.343867-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"=== RUN TestMultiNode/serial/RestartKeepsNodes\n"} +{"Time":"2023-05-31T11:55:32.343957-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:283: (dbg) Run: out/minikube-darwin-arm64 node list -p multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.372532-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:290: (dbg) Run: out/minikube-darwin-arm64 stop -p multinode-073000\n"} +{"Time":"2023-05-31T11:55:32.431272-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:295: (dbg) Run: out/minikube-darwin-arm64 start -p multinode-073000 --wait=true -v=8 --alsologtostderr\n"} +{"Time":"2023-05-31T11:55:37.605844-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:295: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p multinode-073000 --wait=true -v=8 --alsologtostderr: exit status 80 (5.173323375s)\n"} +{"Time":"2023-05-31T11:55:37.605903-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \n"} +{"Time":"2023-05-31T11:55:37.605913-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:37.60592-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t* [multinode-073000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:55:37.605929-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:55:37.605952-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:55:37.60596-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:55:37.605967-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:55:37.605974-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:55:37.60598-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:55:37.605988-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T11:55:37.605995-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t* Starting control plane node multinode-073000 in cluster multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.606002-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t* Restarting existing qemu2 VM for \"multinode-073000\" ...\n"} +{"Time":"2023-05-31T11:55:37.606009-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:55:37.606015-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:37.606022-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.606029-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t* Restarting existing qemu2 VM for \"multinode-073000\" ...\n"} +{"Time":"2023-05-31T11:55:37.606036-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:55:37.606043-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:37.60605-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.606056-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.606062-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.606094-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \n"} +{"Time":"2023-05-31T11:55:37.606104-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:37.606111-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:37.606121-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.458384 2668 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:37.606128-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.458484 2668 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:37.606136-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.458488 2668 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:37.606143-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.458491 2668 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:37.60615-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.458567 2668 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:37.606158-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.459528 2668 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:55:37.606167-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.474328 2668 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1503,\"bootTime\":1685557829,\"procs\":393,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:55:37.60618-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:32.474386 2668 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:55:37.606187-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.478501 2668 out.go:177] * [multinode-073000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:55:37.606204-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.485529 2668 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:55:37.606221-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.489497 2668 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:55:37.606229-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.485585 2668 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:55:37.606241-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.495516 2668 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:55:37.606248-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.498522 2668 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:55:37.606255-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.501485 2668 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:55:37.606262-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.504555 2668 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:55:37.606345-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.506193 2668 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:37.606359-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.506245 2668 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:55:37.606368-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.510489 2668 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T11:55:37.60638-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.517325 2668 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:55:37.606397-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.517330 2668 start.go:875] validating driver \"qemu2\" against \u0026{Name:multinode-073000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfi"} +{"Time":"2023-05-31T11:55:37.606459-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"g:{KubernetesVersion:v1.27.2 ClusterName:multinode-073000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:true ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:2"} +{"Time":"2023-05-31T11:55:37.606472-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"62144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:55:37.606483-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.517409 2668 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:55:37.606493-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.519260 2668 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T11:55:37.606501-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.519284 2668 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:55:37.606509-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.519290 2668 cni.go:136] 1 nodes found, recommending kindnet\n"} +{"Time":"2023-05-31T11:55:37.606517-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.519295 2668 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:55:37.606534-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t{Name:multinode-073000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:multinode-073000 Namespace:default API"} +{"Time":"2023-05-31T11:55:37.606547-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"ServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:true ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: Di"} +{"Time":"2023-05-31T11:55:37.606559-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":"sableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:55:37.606568-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.519398 2668 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:55:37.606576-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.526500 2668 out.go:177] * Starting control plane node multinode-073000 in cluster multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.606585-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530469 2668 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:55:37.606592-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530490 2668 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:55:37.6066-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530498 2668 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:55:37.606608-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530545 2668 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:55:37.606617-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530551 2668 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:55:37.606625-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530610 2668 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/multinode-073000/config.json ...\n"} +{"Time":"2023-05-31T11:55:37.606632-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530899 2668 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:55:37.60664-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530910 2668 start.go:364] acquiring machines lock for multinode-073000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:55:37.606649-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530944 2668 start.go:368] acquired machines lock for \"multinode-073000\" in 28.5µs\n"} +{"Time":"2023-05-31T11:55:37.606657-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530954 2668 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T11:55:37.606665-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.530957 2668 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T11:55:37.606673-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.531071 2668 fix.go:103] recreateIfNeeded on multinode-073000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T11:55:37.60668-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:32.531079 2668 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:55:37.606688-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.538460 2668 out.go:177] * Restarting existing qemu2 VM for \"multinode-073000\" ...\n"} +{"Time":"2023-05-31T11:55:37.606699-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.542522 2668 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/qemu.pid -device virtio-net-pci,netdev=net0,mac=2e:65:d5:b8:e1:91 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:55:37.606721-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.544326 2668 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:55:37.60673-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.544344 2668 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:37.606737-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.606744-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.544371 2668 fix.go:57] fixHost completed within 13.41275ms\n"} +{"Time":"2023-05-31T11:55:37.606752-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.544376 2668 start.go:83] releasing machines lock for \"multinode-073000\", held for 13.4285ms\n"} +{"Time":"2023-05-31T11:55:37.60676-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:32.544382 2668 start.go:687] error starting host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:37.60677-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:32.544409 2668 out.go:239] ! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:37.606778-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:37.606786-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:32.544414 2668 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T11:55:37.606796-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.546560 2668 start.go:364] acquiring machines lock for multinode-073000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:55:37.606805-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.547024 2668 start.go:368] acquired machines lock for \"multinode-073000\" in 341.458µs\n"} +{"Time":"2023-05-31T11:55:37.606813-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.547198 2668 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T11:55:37.60682-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.547217 2668 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T11:55:37.606827-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.548004 2668 fix.go:103] recreateIfNeeded on multinode-073000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T11:55:37.606834-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:37.548030 2668 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:55:37.606845-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.553432 2668 out.go:177] * Restarting existing qemu2 VM for \"multinode-073000\" ...\n"} +{"Time":"2023-05-31T11:55:37.606856-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.561628 2668 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/qemu.pid -device virtio-net-pci,netdev=net0,mac=2e:65:d5:b8:e1:91 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:55:37.606867-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.571017 2668 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:55:37.606874-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.571074 2668 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:37.606881-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.606889-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.571174 2668 fix.go:57] fixHost completed within 23.956959ms\n"} +{"Time":"2023-05-31T11:55:37.606896-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.571194 2668 start.go:83] releasing machines lock for \"multinode-073000\", held for 24.1375ms\n"} +{"Time":"2023-05-31T11:55:37.606905-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:37.571365 2668 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p multinode-073000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:37.606913-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p multinode-073000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:37.606921-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.577435 2668 out.go:177] \n"} +{"Time":"2023-05-31T11:55:37.606929-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:37.581304 2668 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:37.606941-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:37.606962-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:37.581328 2668 out.go:239] * \n"} +{"Time":"2023-05-31T11:55:37.607073-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t* \n"} +{"Time":"2023-05-31T11:55:37.607085-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tW0531 11:55:37.584157 2668 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:37.607099-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:37.607107-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:37.607114-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:37.607122-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:37.607129-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:37.607137-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:37.607146-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:37.607234-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:37.607245-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:37.607256-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:37.607264-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:37.607271-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:37.607278-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:37.607285-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:37.607293-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:37.607303-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tI0531 11:55:37.592411 2668 out.go:177] \n"} +{"Time":"2023-05-31T11:55:37.60731-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \n"} +{"Time":"2023-05-31T11:55:37.607317-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:37.607324-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:297: failed to run minikube start. args \"out/minikube-darwin-arm64 node list -p multinode-073000\" : exit status 80\n"} +{"Time":"2023-05-31T11:55:37.607337-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" multinode_test.go:300: (dbg) Run: out/minikube-darwin-arm64 node list -p multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.673974-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:37.673994-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.706607-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (32.543791ms)\n"} +{"Time":"2023-05-31T11:55:37.706623-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \n"} +{"Time":"2023-05-31T11:55:37.706625-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:37.706627-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:37.706628-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" \n"} +{"Time":"2023-05-31T11:55:37.70663-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:37.706631-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:37.706634-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:37.706657-07:00","Action":"run","Test":"TestMultiNode/serial/DeleteNode"} +{"Time":"2023-05-31T11:55:37.706661-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":"=== RUN TestMultiNode/serial/DeleteNode\n"} +{"Time":"2023-05-31T11:55:37.706752-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:394: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 node delete m03\n"} +{"Time":"2023-05-31T11:55:37.743579-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:394: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 node delete m03: exit status 89 (36.795667ms)\n"} +{"Time":"2023-05-31T11:55:37.74359-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.743592-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:37.743594-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:55:37.743598-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \t To start a cluster, run: \"minikube start -p multinode-073000\"\n"} +{"Time":"2023-05-31T11:55:37.743599-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.743604-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:37.743606-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:396: node stop returned an error. args \"out/minikube-darwin-arm64 -p multinode-073000 node delete m03\": exit status 89\n"} +{"Time":"2023-05-31T11:55:37.743608-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:400: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr\n"} +{"Time":"2023-05-31T11:55:37.772248-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:400: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr: exit status 7 (28.509791ms)\n"} +{"Time":"2023-05-31T11:55:37.772261-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.772263-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:37.772265-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tmultinode-073000\n"} +{"Time":"2023-05-31T11:55:37.772267-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T11:55:37.772269-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T11:55:37.77227-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:37.772271-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:37.772272-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:37.772274-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.772275-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.772289-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:37.772292-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:37.772294-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.770762 2683 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:37.772296-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.770904 2683 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:37.772297-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.770907 2683 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:37.772299-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.770909 2683 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:37.772301-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.770976 2683 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:37.772302-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.771085 2683 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:55:37.772304-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.771096 2683 mustload.go:65] Loading cluster: multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.772305-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.771156 2683 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:55:37.772307-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.771273 2683 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:37.772308-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.771279 2683 status.go:255] checking status of multinode-073000 ...\n"} +{"Time":"2023-05-31T11:55:37.77231-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.771480 2683 status.go:330] multinode-073000 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:55:37.772312-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.771483 2683 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T11:55:37.772315-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tI0531 11:55:37.771485 2683 status.go:257] multinode-073000 status: \u0026{Name:multinode-073000 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:false TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T11:55:37.772317-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.772318-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:37.77232-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" multinode_test.go:402: failed to run minikube status. args \"out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr\" : exit status 7\n"} +{"Time":"2023-05-31T11:55:37.772321-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:37.772324-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.800846-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.511125ms)\n"} +{"Time":"2023-05-31T11:55:37.800861-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.800863-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:37.800865-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:37.800866-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.800867-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:37.800869-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:37.800871-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:37.800889-07:00","Action":"run","Test":"TestMultiNode/serial/StopMultiNode"} +{"Time":"2023-05-31T11:55:37.800892-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":"=== RUN TestMultiNode/serial/StopMultiNode\n"} +{"Time":"2023-05-31T11:55:37.800918-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:314: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 stop\n"} +{"Time":"2023-05-31T11:55:37.859641-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:320: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 status\n"} +{"Time":"2023-05-31T11:55:37.888941-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:320: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 status: exit status 7 (29.210417ms)\n"} +{"Time":"2023-05-31T11:55:37.888952-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.888954-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:37.888956-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-073000\n"} +{"Time":"2023-05-31T11:55:37.888957-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T11:55:37.888959-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T11:55:37.88896-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:37.888962-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:37.888963-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:37.888972-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.888976-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.888978-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:37.888979-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:327: (dbg) Run: out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr\n"} +{"Time":"2023-05-31T11:55:37.917827-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:327: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr: exit status 7 (28.757292ms)\n"} +{"Time":"2023-05-31T11:55:37.917843-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.917844-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:37.917846-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tmultinode-073000\n"} +{"Time":"2023-05-31T11:55:37.917847-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \ttype: Control Plane\n"} +{"Time":"2023-05-31T11:55:37.917849-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \thost: Stopped\n"} +{"Time":"2023-05-31T11:55:37.91785-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917852-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tapiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917853-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tkubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917854-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:37.917856-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.917857-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:37.917861-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:37.917863-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916355 2691 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:37.917864-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916502 2691 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:37.917865-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916504 2691 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:37.917867-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916507 2691 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:37.917868-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916579 2691 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:37.91787-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916700 2691 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:55:37.917871-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916711 2691 mustload.go:65] Loading cluster: multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.917876-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916781 2691 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:55:37.917878-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916905 2691 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:37.917879-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.916910 2691 status.go:255] checking status of multinode-073000 ...\n"} +{"Time":"2023-05-31T11:55:37.917881-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.917102 2691 status.go:330] multinode-073000 host status = \"Stopped\" (err=\u003cnil\u003e)\n"} +{"Time":"2023-05-31T11:55:37.917883-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.917105 2691 status.go:343] host is not running, skipping remaining checks\n"} +{"Time":"2023-05-31T11:55:37.917884-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tI0531 11:55:37.917107 2691 status.go:257] multinode-073000 status: \u0026{Name:multinode-073000 Host:Stopped Kubelet:Stopped APIServer:Stopped Kubeconfig:Stopped Worker:false TimeToStop: DockerEnv: PodManEnv:}\n"} +{"Time":"2023-05-31T11:55:37.917886-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.917887-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:37.917888-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:333: incorrect number of stopped hosts: args \"out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr\": multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.91789-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" type: Control Plane\n"} +{"Time":"2023-05-31T11:55:37.917891-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" host: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917892-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" kubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917893-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" apiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917895-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" kubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917896-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.917898-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" multinode_test.go:337: incorrect number of stopped kubelets: args \"out/minikube-darwin-arm64 -p multinode-073000 status --alsologtostderr\": multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.9179-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" type: Control Plane\n"} +{"Time":"2023-05-31T11:55:37.917901-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" host: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917902-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" kubelet: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917903-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" apiserver: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917905-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" kubeconfig: Stopped\n"} +{"Time":"2023-05-31T11:55:37.917906-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.917907-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:37.917909-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:37.946027-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.06225ms)\n"} +{"Time":"2023-05-31T11:55:37.946039-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.946041-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:37.946042-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:37.946044-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:37.946045-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:37.946047-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:37.946049-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:37.946066-07:00","Action":"run","Test":"TestMultiNode/serial/RestartMultiNode"} +{"Time":"2023-05-31T11:55:37.946069-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"=== RUN TestMultiNode/serial/RestartMultiNode\n"} +{"Time":"2023-05-31T11:55:37.946105-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:354: (dbg) Run: out/minikube-darwin-arm64 start -p multinode-073000 --wait=true -v=8 --alsologtostderr --driver=qemu2 \n"} +{"Time":"2023-05-31T11:55:38.953802-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"E0531 11:55:38.953673 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:55:43.110024-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:354: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p multinode-073000 --wait=true -v=8 --alsologtostderr --driver=qemu2 : exit status 80 (5.162821167s)\n"} +{"Time":"2023-05-31T11:55:43.110058-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:43.110067-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:43.110074-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t* [multinode-073000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:55:43.110082-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:55:43.110103-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:55:43.110112-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:55:43.110119-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:55:43.110126-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:55:43.110133-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:55:43.110147-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T11:55:43.110154-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t* Starting control plane node multinode-073000 in cluster multinode-073000\n"} +{"Time":"2023-05-31T11:55:43.110161-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t* Restarting existing qemu2 VM for \"multinode-073000\" ...\n"} +{"Time":"2023-05-31T11:55:43.110168-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:55:43.110175-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:43.110181-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:43.110188-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t* Restarting existing qemu2 VM for \"multinode-073000\" ...\n"} +{"Time":"2023-05-31T11:55:43.110195-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:55:43.110202-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:43.110209-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:43.110215-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:43.110221-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:43.110227-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:43.110236-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:43.110242-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:43.110251-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.972892 2695 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:55:43.110258-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.972998 2695 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:43.110267-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.973001 2695 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:55:43.110275-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.973004 2695 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:55:43.110282-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.973075 2695 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:55:43.11029-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.974000 2695 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:55:43.110298-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.988861 2695 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1508,\"bootTime\":1685557829,\"procs\":395,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:55:43.110312-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:37.989331 2695 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:55:43.11032-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.993921 2695 out.go:177] * [multinode-073000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:55:43.110327-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.998882 2695 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:55:43.110333-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:37.998910 2695 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:55:43.110341-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.001896 2695 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:55:43.110348-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.004745 2695 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:55:43.110356-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.007806 2695 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:55:43.110364-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.010829 2695 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:55:43.110371-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.012286 2695 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:55:43.11038-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.016082 2695 config.go:182] Loaded profile config \"multinode-073000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:55:43.110388-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.016327 2695 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:55:43.110395-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.020827 2695 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T11:55:43.110406-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.025814 2695 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:55:43.110423-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.025824 2695 start.go:875] validating driver \"qemu2\" against \u0026{Name:multinode-073000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfi"} +{"Time":"2023-05-31T11:55:43.11044-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"g:{KubernetesVersion:v1.27.2 ClusterName:multinode-073000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:true ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:2"} +{"Time":"2023-05-31T11:55:43.110453-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"62144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:55:43.110461-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.025878 2695 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:55:43.11047-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.027802 2695 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T11:55:43.110477-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.027830 2695 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:55:43.110484-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.027835 2695 cni.go:136] 1 nodes found, recommending kindnet\n"} +{"Time":"2023-05-31T11:55:43.110491-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.027840 2695 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:55:43.110508-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t{Name:multinode-073000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:multinode-073000 Namespace:default API"} +{"Time":"2023-05-31T11:55:43.110521-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"ServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:true ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: Di"} +{"Time":"2023-05-31T11:55:43.110532-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":"sableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:55:43.11054-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.027955 2695 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:55:43.110547-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.035810 2695 out.go:177] * Starting control plane node multinode-073000 in cluster multinode-073000\n"} +{"Time":"2023-05-31T11:55:43.110555-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.039818 2695 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:55:43.110563-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.039835 2695 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:55:43.110571-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.039847 2695 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:55:43.110578-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.039902 2695 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:55:43.110586-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.039908 2695 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:55:43.110594-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.039967 2695 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/multinode-073000/config.json ...\n"} +{"Time":"2023-05-31T11:55:43.110602-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.040326 2695 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:55:43.110609-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.040337 2695 start.go:364] acquiring machines lock for multinode-073000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:55:43.110617-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.040363 2695 start.go:368] acquired machines lock for \"multinode-073000\" in 20.083µs\n"} +{"Time":"2023-05-31T11:55:43.110625-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.040373 2695 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T11:55:43.110633-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.040376 2695 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T11:55:43.110641-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.040489 2695 fix.go:103] recreateIfNeeded on multinode-073000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T11:55:43.110649-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:38.040497 2695 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:55:43.110657-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.048849 2695 out.go:177] * Restarting existing qemu2 VM for \"multinode-073000\" ...\n"} +{"Time":"2023-05-31T11:55:43.110667-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.052879 2695 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/qemu.pid -device virtio-net-pci,netdev=net0,mac=2e:65:d5:b8:e1:91 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:55:43.110678-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.054689 2695 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:55:43.110686-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.054705 2695 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:43.110693-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:43.1107-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.054733 2695 fix.go:57] fixHost completed within 14.356166ms\n"} +{"Time":"2023-05-31T11:55:43.110707-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.054742 2695 start.go:83] releasing machines lock for \"multinode-073000\", held for 14.375541ms\n"} +{"Time":"2023-05-31T11:55:43.110715-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:38.054750 2695 start.go:687] error starting host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:43.110724-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:38.054790 2695 out.go:239] ! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:43.110733-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:43.110742-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:38.054795 2695 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T11:55:43.110831-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.056855 2695 start.go:364] acquiring machines lock for multinode-073000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:55:43.11084-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.057101 2695 start.go:368] acquired machines lock for \"multinode-073000\" in 180.25µs\n"} +{"Time":"2023-05-31T11:55:43.110849-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.057177 2695 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T11:55:43.110856-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.057188 2695 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T11:55:43.110864-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.057559 2695 fix.go:103] recreateIfNeeded on multinode-073000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T11:55:43.110872-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:43.057575 2695 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:55:43.11088-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.061399 2695 out.go:177] * Restarting existing qemu2 VM for \"multinode-073000\" ...\n"} +{"Time":"2023-05-31T11:55:43.110891-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.068620 2695 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/qemu.pid -device virtio-net-pci,netdev=net0,mac=2e:65:d5:b8:e1:91 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/multinode-073000/disk.qcow2\n"} +{"Time":"2023-05-31T11:55:43.110903-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.076731 2695 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:55:43.110911-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.076797 2695 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:43.110919-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t\n"} +{"Time":"2023-05-31T11:55:43.110926-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.076906 2695 fix.go:57] fixHost completed within 19.715291ms\n"} +{"Time":"2023-05-31T11:55:43.110933-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.076959 2695 start.go:83] releasing machines lock for \"multinode-073000\", held for 19.84175ms\n"} +{"Time":"2023-05-31T11:55:43.110941-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:43.077220 2695 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p multinode-073000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:43.11095-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p multinode-073000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:43.110958-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.084451 2695 out.go:177] \n"} +{"Time":"2023-05-31T11:55:43.110965-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:43.087396 2695 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:43.110974-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:43.110981-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:43.087442 2695 out.go:239] * \n"} +{"Time":"2023-05-31T11:55:43.110988-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t* \n"} +{"Time":"2023-05-31T11:55:43.110996-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tW0531 11:55:43.089829 2695 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:43.111006-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:43.111014-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:43.111021-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:43.111029-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:43.111036-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:43.111043-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:43.11105-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:43.111063-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:43.111073-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:43.11108-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:43.111088-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:43.111095-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:43.111102-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:43.11111-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:43.111118-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:43.111128-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tI0531 11:55:43.098348 2695 out.go:177] \n"} +{"Time":"2023-05-31T11:55:43.111135-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:43.111142-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:43.11115-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" multinode_test.go:356: failed to start cluster. args \"out/minikube-darwin-arm64 start -p multinode-073000 --wait=true -v=8 --alsologtostderr --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:55:43.111162-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:55:43.11117-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:55:43.16827-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (58.0765ms)\n"} +{"Time":"2023-05-31T11:55:43.168284-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:43.168286-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:43.168288-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:55:43.168289-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:55:43.168291-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:43.168292-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:55:43.168299-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:55:43.168322-07:00","Action":"run","Test":"TestMultiNode/serial/ValidateNameConflict"} +{"Time":"2023-05-31T11:55:43.168324-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":"=== RUN TestMultiNode/serial/ValidateNameConflict\n"} +{"Time":"2023-05-31T11:55:43.168366-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:443: (dbg) Run: out/minikube-darwin-arm64 node list -p multinode-073000\n"} +{"Time":"2023-05-31T11:55:43.199203-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:452: (dbg) Run: out/minikube-darwin-arm64 start -p multinode-073000-m01 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:55:53.078713-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:452: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p multinode-073000-m01 --driver=qemu2 : exit status 80 (9.879078875s)\n"} +{"Time":"2023-05-31T11:55:53.07877-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:55:53.07878-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:55:53.078788-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* [multinode-073000-m01] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:55:53.078796-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:55:53.078805-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:55:53.078814-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:55:53.078821-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:55:53.078828-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:55:53.078836-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:55:53.078843-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:55:53.07885-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:55:53.078857-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Starting control plane node multinode-073000-m01 in cluster multinode-073000-m01\n"} +{"Time":"2023-05-31T11:55:53.078864-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:55:53.07887-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:55:53.078877-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:53.078883-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T11:55:53.07889-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Deleting \"multinode-073000-m01\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:55:53.078897-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:55:53.078904-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:55:53.078924-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:55:53.078931-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T11:55:53.078937-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T11:55:53.078943-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T11:55:53.078949-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:55:53.078956-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:55:53.078962-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:55:53.078969-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:53.078979-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p multinode-073000-m01\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:53.078988-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:55:53.078995-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* \n"} +{"Time":"2023-05-31T11:55:53.079004-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:55:53.079014-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:53.079027-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:55:53.079034-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:55:53.079042-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:53.079049-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:55:53.079057-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:55:53.079065-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:55:53.079074-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:55:53.07908-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:55:53.079091-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:460: (dbg) Run: out/minikube-darwin-arm64 start -p multinode-073000-m02 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:55:59.436224-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":"E0531 11:55:59.436099 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:56:02.901142-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:460: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p multinode-073000-m02 --driver=qemu2 : exit status 80 (9.822059666s)\n"} +{"Time":"2023-05-31T11:56:02.901203-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:56:02.901213-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:02.901222-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* [multinode-073000-m02] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:02.90123-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:02.901238-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:02.901262-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:02.90127-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:02.901277-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:02.901285-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:02.901291-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:02.901299-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:02.901334-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Starting control plane node multinode-073000-m02 in cluster multinode-073000-m02\n"} +{"Time":"2023-05-31T11:56:02.901342-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:02.901348-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:02.901356-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:02.901363-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T11:56:02.901369-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Deleting \"multinode-073000-m02\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:02.901377-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:02.901383-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:02.901391-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:02.901399-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T11:56:02.901405-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T11:56:02.901411-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t\n"} +{"Time":"2023-05-31T11:56:02.901417-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:56:02.901423-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:02.90143-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:56:02.901437-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:02.901446-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p multinode-073000-m02\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:02.901455-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:02.901462-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* \n"} +{"Time":"2023-05-31T11:56:02.901473-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:02.901485-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:02.901493-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:02.901501-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:02.901508-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:02.901515-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:02.901523-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:02.901531-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:02.90154-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:56:02.901547-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:56:02.901558-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:462: failed to start profile. args \"out/minikube-darwin-arm64 start -p multinode-073000-m02 --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:56:02.901566-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:467: (dbg) Run: out/minikube-darwin-arm64 node add -p multinode-073000\n"} +{"Time":"2023-05-31T11:56:02.980849-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:467: (dbg) Non-zero exit: out/minikube-darwin-arm64 node add -p multinode-073000: exit status 89 (79.507959ms)\n"} +{"Time":"2023-05-31T11:56:02.980876-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:56:02.980879-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:02.980881-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:56:02.980884-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \t To start a cluster, run: \"minikube start -p multinode-073000\"\n"} +{"Time":"2023-05-31T11:56:02.980886-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:56:02.980887-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:02.980891-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" multinode_test.go:472: (dbg) Run: out/minikube-darwin-arm64 delete -p multinode-073000-m02\n"} +{"Time":"2023-05-31T11:56:03.078397-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:56:03.078415-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:56:03.107059-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (28.555083ms)\n"} +{"Time":"2023-05-31T11:56:03.107075-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:56:03.107077-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:03.107079-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:56:03.107081-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" \n"} +{"Time":"2023-05-31T11:56:03.107082-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:03.107083-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:56:03.107085-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:56:03.107089-07:00","Action":"output","Test":"TestMultiNode","Output":" multinode_test.go:79: *** TestMultiNode FAILED at 2023-05-31 11:56:03.107065 -0700 PDT m=+797.287881167\n"} +{"Time":"2023-05-31T11:56:03.107099-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:56:03.107131-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000\n"} +{"Time":"2023-05-31T11:56:03.134763-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p multinode-073000 -n multinode-073000: exit status 7 (27.556584ms)\n"} +{"Time":"2023-05-31T11:56:03.134777-07:00","Action":"output","Test":"TestMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:56:03.134779-07:00","Action":"output","Test":"TestMultiNode","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:03.134781-07:00","Action":"output","Test":"TestMultiNode","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:56:03.134782-07:00","Action":"output","Test":"TestMultiNode","Output":" \n"} +{"Time":"2023-05-31T11:56:03.134784-07:00","Action":"output","Test":"TestMultiNode","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:03.134785-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:56:03.134787-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:241: \"multinode-073000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:56:03.134789-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:175: Cleaning up \"multinode-073000\" profile ...\n"} +{"Time":"2023-05-31T11:56:03.134791-07:00","Action":"output","Test":"TestMultiNode","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p multinode-073000\n"} +{"Time":"2023-05-31T11:56:03.227575-07:00","Action":"output","Test":"TestMultiNode","Output":"--- FAIL: TestMultiNode (153.43s)\n"} +{"Time":"2023-05-31T11:56:03.227588-07:00","Action":"output","Test":"TestMultiNode/serial","Output":" --- FAIL: TestMultiNode/serial (153.31s)\n"} +{"Time":"2023-05-31T11:56:03.227591-07:00","Action":"output","Test":"TestMultiNode/serial/FreshStart2Nodes","Output":" --- FAIL: TestMultiNode/serial/FreshStart2Nodes (10.14s)\n"} +{"Time":"2023-05-31T11:56:03.227593-07:00","Action":"fail","Test":"TestMultiNode/serial/FreshStart2Nodes","Elapsed":10.14} +{"Time":"2023-05-31T11:56:03.227597-07:00","Action":"output","Test":"TestMultiNode/serial/DeployApp2Nodes","Output":" --- FAIL: TestMultiNode/serial/DeployApp2Nodes (111.86s)\n"} +{"Time":"2023-05-31T11:56:03.227598-07:00","Action":"fail","Test":"TestMultiNode/serial/DeployApp2Nodes","Elapsed":111.86} +{"Time":"2023-05-31T11:56:03.2276-07:00","Action":"output","Test":"TestMultiNode/serial/PingHostFrom2Pods","Output":" --- FAIL: TestMultiNode/serial/PingHostFrom2Pods (0.08s)\n"} +{"Time":"2023-05-31T11:56:03.227603-07:00","Action":"fail","Test":"TestMultiNode/serial/PingHostFrom2Pods","Elapsed":0.08} +{"Time":"2023-05-31T11:56:03.227604-07:00","Action":"output","Test":"TestMultiNode/serial/AddNode","Output":" --- FAIL: TestMultiNode/serial/AddNode (0.07s)\n"} +{"Time":"2023-05-31T11:56:03.227606-07:00","Action":"fail","Test":"TestMultiNode/serial/AddNode","Elapsed":0.07} +{"Time":"2023-05-31T11:56:03.227608-07:00","Action":"output","Test":"TestMultiNode/serial/ProfileList","Output":" --- FAIL: TestMultiNode/serial/ProfileList (0.10s)\n"} +{"Time":"2023-05-31T11:56:03.227609-07:00","Action":"fail","Test":"TestMultiNode/serial/ProfileList","Elapsed":0.1} +{"Time":"2023-05-31T11:56:03.227611-07:00","Action":"output","Test":"TestMultiNode/serial/CopyFile","Output":" --- FAIL: TestMultiNode/serial/CopyFile (0.06s)\n"} +{"Time":"2023-05-31T11:56:03.227612-07:00","Action":"fail","Test":"TestMultiNode/serial/CopyFile","Elapsed":0.06} +{"Time":"2023-05-31T11:56:03.227614-07:00","Action":"output","Test":"TestMultiNode/serial/StopNode","Output":" --- FAIL: TestMultiNode/serial/StopNode (0.13s)\n"} +{"Time":"2023-05-31T11:56:03.227615-07:00","Action":"fail","Test":"TestMultiNode/serial/StopNode","Elapsed":0.13} +{"Time":"2023-05-31T11:56:03.227616-07:00","Action":"output","Test":"TestMultiNode/serial/StartAfterStop","Output":" --- FAIL: TestMultiNode/serial/StartAfterStop (0.10s)\n"} +{"Time":"2023-05-31T11:56:03.227618-07:00","Action":"fail","Test":"TestMultiNode/serial/StartAfterStop","Elapsed":0.1} +{"Time":"2023-05-31T11:56:03.227619-07:00","Action":"output","Test":"TestMultiNode/serial/RestartKeepsNodes","Output":" --- FAIL: TestMultiNode/serial/RestartKeepsNodes (5.36s)\n"} +{"Time":"2023-05-31T11:56:03.227621-07:00","Action":"fail","Test":"TestMultiNode/serial/RestartKeepsNodes","Elapsed":5.36} +{"Time":"2023-05-31T11:56:03.227622-07:00","Action":"output","Test":"TestMultiNode/serial/DeleteNode","Output":" --- FAIL: TestMultiNode/serial/DeleteNode (0.09s)\n"} +{"Time":"2023-05-31T11:56:03.227624-07:00","Action":"fail","Test":"TestMultiNode/serial/DeleteNode","Elapsed":0.09} +{"Time":"2023-05-31T11:56:03.227625-07:00","Action":"output","Test":"TestMultiNode/serial/StopMultiNode","Output":" --- FAIL: TestMultiNode/serial/StopMultiNode (0.15s)\n"} +{"Time":"2023-05-31T11:56:03.227626-07:00","Action":"fail","Test":"TestMultiNode/serial/StopMultiNode","Elapsed":0.15} +{"Time":"2023-05-31T11:56:03.227628-07:00","Action":"output","Test":"TestMultiNode/serial/RestartMultiNode","Output":" --- FAIL: TestMultiNode/serial/RestartMultiNode (5.22s)\n"} +{"Time":"2023-05-31T11:56:03.227629-07:00","Action":"fail","Test":"TestMultiNode/serial/RestartMultiNode","Elapsed":5.22} +{"Time":"2023-05-31T11:56:03.227631-07:00","Action":"output","Test":"TestMultiNode/serial/ValidateNameConflict","Output":" --- FAIL: TestMultiNode/serial/ValidateNameConflict (19.94s)\n"} +{"Time":"2023-05-31T11:56:03.227635-07:00","Action":"fail","Test":"TestMultiNode/serial/ValidateNameConflict","Elapsed":19.94} +{"Time":"2023-05-31T11:56:03.227636-07:00","Action":"fail","Test":"TestMultiNode/serial","Elapsed":153.31} +{"Time":"2023-05-31T11:56:03.227637-07:00","Action":"fail","Test":"TestMultiNode","Elapsed":153.43} +{"Time":"2023-05-31T11:56:03.227639-07:00","Action":"run","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T11:56:03.227641-07:00","Action":"output","Test":"TestNetworkPlugins","Output":"=== RUN TestNetworkPlugins\n"} +{"Time":"2023-05-31T11:56:03.227642-07:00","Action":"output","Test":"TestNetworkPlugins","Output":"=== PAUSE TestNetworkPlugins\n"} +{"Time":"2023-05-31T11:56:03.227643-07:00","Action":"pause","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T11:56:03.227645-07:00","Action":"run","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T11:56:03.227646-07:00","Action":"output","Test":"TestNoKubernetes","Output":"=== RUN TestNoKubernetes\n"} +{"Time":"2023-05-31T11:56:03.227648-07:00","Action":"output","Test":"TestNoKubernetes","Output":"=== PAUSE TestNoKubernetes\n"} +{"Time":"2023-05-31T11:56:03.227649-07:00","Action":"pause","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T11:56:03.227651-07:00","Action":"run","Test":"TestPause"} +{"Time":"2023-05-31T11:56:03.227658-07:00","Action":"output","Test":"TestPause","Output":"=== RUN TestPause\n"} +{"Time":"2023-05-31T11:56:03.22766-07:00","Action":"output","Test":"TestPause","Output":"=== PAUSE TestPause\n"} +{"Time":"2023-05-31T11:56:03.227662-07:00","Action":"pause","Test":"TestPause"} +{"Time":"2023-05-31T11:56:03.227663-07:00","Action":"run","Test":"TestPreload"} +{"Time":"2023-05-31T11:56:03.227664-07:00","Action":"output","Test":"TestPreload","Output":"=== RUN TestPreload\n"} +{"Time":"2023-05-31T11:56:03.227723-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:44: (dbg) Run: out/minikube-darwin-arm64 start -p test-preload-670000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.912334-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:44: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p test-preload-670000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.24.4: exit status 80 (9.680734s)\n"} +{"Time":"2023-05-31T11:56:12.912386-07:00","Action":"output","Test":"TestPreload","Output":" \n"} +{"Time":"2023-05-31T11:56:12.912394-07:00","Action":"output","Test":"TestPreload","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:12.9124-07:00","Action":"output","Test":"TestPreload","Output":" \t* [test-preload-670000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:12.912406-07:00","Action":"output","Test":"TestPreload","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:12.912412-07:00","Action":"output","Test":"TestPreload","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:12.912418-07:00","Action":"output","Test":"TestPreload","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:12.912456-07:00","Action":"output","Test":"TestPreload","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:12.912462-07:00","Action":"output","Test":"TestPreload","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:12.912471-07:00","Action":"output","Test":"TestPreload","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:12.912476-07:00","Action":"output","Test":"TestPreload","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:12.912483-07:00","Action":"output","Test":"TestPreload","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:12.912488-07:00","Action":"output","Test":"TestPreload","Output":" \t* Starting control plane node test-preload-670000 in cluster test-preload-670000\n"} +{"Time":"2023-05-31T11:56:12.912493-07:00","Action":"output","Test":"TestPreload","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:12.912498-07:00","Action":"output","Test":"TestPreload","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:12.912503-07:00","Action":"output","Test":"TestPreload","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:12.912508-07:00","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T11:56:12.912513-07:00","Action":"output","Test":"TestPreload","Output":" \t* Deleting \"test-preload-670000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:12.912519-07:00","Action":"output","Test":"TestPreload","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:12.912523-07:00","Action":"output","Test":"TestPreload","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:12.912528-07:00","Action":"output","Test":"TestPreload","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:12.912533-07:00","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T11:56:12.912537-07:00","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T11:56:12.912542-07:00","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T11:56:12.912546-07:00","Action":"output","Test":"TestPreload","Output":" \n"} +{"Time":"2023-05-31T11:56:12.91255-07:00","Action":"output","Test":"TestPreload","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:12.912555-07:00","Action":"output","Test":"TestPreload","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:56:12.912559-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.255133 2748 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:56:12.912564-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.255259 2748 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:56:12.91257-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.255262 2748 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:56:12.912575-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.255264 2748 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:56:12.91258-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.255349 2748 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:56:12.912586-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.256386 2748 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:56:12.912592-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.272687 2748 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1534,\"bootTime\":1685557829,\"procs\":395,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:56:12.912606-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:03.272769 2748 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:56:12.912612-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.277829 2748 out.go:177] * [test-preload-670000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:12.912625-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.284739 2748 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:12.91263-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.284783 2748 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:56:12.912635-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.288786 2748 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:12.912643-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.291697 2748 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:12.912648-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.294745 2748 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:12.912653-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.297745 2748 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:12.912658-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.300720 2748 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:12.912663-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.304104 2748 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:56:12.912669-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.304159 2748 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:56:12.912674-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.308760 2748 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:12.912679-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.315728 2748 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:56:12.912684-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.315732 2748 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:56:12.91269-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.315739 2748 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:56:12.912697-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.317724 2748 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:56:12.912703-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.320753 2748 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:12.912708-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.322301 2748 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T11:56:12.912717-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.322321 2748 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:56:12.912722-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.322338 2748 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:56:12.912728-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.322342 2748 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T11:56:12.912736-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.322348 2748 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:56:12.912746-07:00","Action":"output","Test":"TestPreload","Output":" \t{Name:test-preload-670000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.24.4 ClusterName:test-preload-670000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRunti"} +{"Time":"2023-05-31T11:56:12.912757-07:00","Action":"output","Test":"TestPreload","Output":"me:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:56:12.912765-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.322444 2748 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912771-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.325759 2748 out.go:177] * Starting control plane node test-preload-670000 in cluster test-preload-670000\n"} +{"Time":"2023-05-31T11:56:12.912777-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.333764 2748 preload.go:132] Checking if preload exists for k8s version v1.24.4 and runtime docker\n"} +{"Time":"2023-05-31T11:56:12.912782-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.333890 2748 cache.go:107] acquiring lock: {Name:mkacf8fbbf11b6085b8f8b174458d19be6a371f6 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912787-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.333898 2748 cache.go:107] acquiring lock: {Name:mk8806405f390f3cec717bbe4f9b348a64d9d691 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912793-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.333913 2748 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/test-preload-670000/config.json ...\n"} +{"Time":"2023-05-31T11:56:12.912799-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.333911 2748 cache.go:107] acquiring lock: {Name:mk388546a22ef69258c2ea51c037b5253866d7e5 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912806-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.333928 2748 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/test-preload-670000/config.json: {Name:mk7df3889d67643f56761840ae5dcd8cfb1eb841 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912812-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334057 2748 cache.go:107] acquiring lock: {Name:mk07836831ba4e3d8a06627d78de75bd69d47e2e Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912818-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334086 2748 image.go:134] retrieving image: registry.k8s.io/kube-apiserver:v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.912823-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334098 2748 image.go:134] retrieving image: registry.k8s.io/kube-controller-manager:v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.912828-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334140 2748 cache.go:107] acquiring lock: {Name:mk4d318610bb1dc2f2601eb15b5b67be21bbf832 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912834-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334120 2748 cache.go:107] acquiring lock: {Name:mk8fef8c24ee17f49648b829fa661de004c3f333 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.91284-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334215 2748 cache.go:107] acquiring lock: {Name:mk4c9fb7cf2869fe4b7db77d9782b183ef358b3a Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912845-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334236 2748 image.go:134] retrieving image: registry.k8s.io/coredns/coredns:v1.8.6\n"} +{"Time":"2023-05-31T11:56:12.912851-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334241 2748 image.go:134] retrieving image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:56:12.912855-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334251 2748 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:56:12.912861-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334267 2748 start.go:364] acquiring machines lock for test-preload-670000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912867-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334266 2748 cache.go:107] acquiring lock: {Name:mk0d7cb783b331811a1f56e709f89325db7869a0 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.912872-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334299 2748 start.go:368] acquired machines lock for \"test-preload-670000\" in 26.75µs\n"} +{"Time":"2023-05-31T11:56:12.912887-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334327 2748 start.go:93] Provisioning new machine with config: \u0026{Name:test-preload-670000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kubernete"} +{"Time":"2023-05-31T11:56:12.912898-07:00","Action":"output","Test":"TestPreload","Output":"sConfig:{KubernetesVersion:v1.24.4 ClusterName:test-preload-670000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.24.4 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: Mo"} +{"Time":"2023-05-31T11:56:12.912918-07:00","Action":"output","Test":"TestPreload","Output":"untMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.24.4 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:56:12.912925-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334358 2748 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:12.912931-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334371 2748 image.go:134] retrieving image: registry.k8s.io/etcd:3.5.3-0\n"} +{"Time":"2023-05-31T11:56:12.912936-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334354 2748 image.go:134] retrieving image: registry.k8s.io/kube-scheduler:v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.912942-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.342710 2748 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:12.912947-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334465 2748 image.go:134] retrieving image: registry.k8s.io/pause:3.7\n"} +{"Time":"2023-05-31T11:56:12.912952-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.334509 2748 image.go:134] retrieving image: registry.k8s.io/kube-proxy:v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.912958-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.350065 2748 image.go:177] daemon lookup for registry.k8s.io/kube-controller-manager:v1.24.4: Error response from daemon: No such image: registry.k8s.io/kube-controller-manager:v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.912964-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.350687 2748 image.go:177] daemon lookup for registry.k8s.io/kube-scheduler:v1.24.4: Error response from daemon: No such image: registry.k8s.io/kube-scheduler:v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.91297-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.350816 2748 image.go:177] daemon lookup for registry.k8s.io/kube-apiserver:v1.24.4: Error response from daemon: No such image: registry.k8s.io/kube-apiserver:v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.912976-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.350860 2748 image.go:177] daemon lookup for gcr.io/k8s-minikube/storage-provisioner:v5: Error response from daemon: No such image: gcr.io/k8s-minikube/storage-provisioner:v5\n"} +{"Time":"2023-05-31T11:56:12.912981-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.350887 2748 image.go:177] daemon lookup for registry.k8s.io/coredns/coredns:v1.8.6: Error response from daemon: No such image: registry.k8s.io/coredns/coredns:v1.8.6\n"} +{"Time":"2023-05-31T11:56:12.91299-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.354141 2748 image.go:177] daemon lookup for registry.k8s.io/kube-proxy:v1.24.4: Error response from daemon: No such image: registry.k8s.io/kube-proxy:v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.912996-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.354184 2748 image.go:177] daemon lookup for registry.k8s.io/etcd:3.5.3-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.5.3-0\n"} +{"Time":"2023-05-31T11:56:12.913001-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.354285 2748 image.go:177] daemon lookup for registry.k8s.io/pause:3.7: Error response from daemon: No such image: registry.k8s.io/pause:3.7\n"} +{"Time":"2023-05-31T11:56:12.913007-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.358570 2748 start.go:159] libmachine.API.Create for \"test-preload-670000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:12.913012-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.358583 2748 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:56:12.913018-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.358638 2748 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:56:12.913023-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.358658 2748 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:12.913028-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.358666 2748 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:12.913034-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.358714 2748 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:56:12.91304-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.358729 2748 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:12.913045-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.358738 2748 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:12.913051-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.359045 2748 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:56:12.913057-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.481134 2748 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:56:12.913062-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.550159 2748 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:56:12.913068-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.550169 2748 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:56:12.913073-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.550304 2748 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:12.91308-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.559504 2748 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:12.913085-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.559525 2748 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:12.91309-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.559593 2748 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:56:12.913095-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.567653 2748 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:56:12.9131-07:00","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T11:56:12.913105-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.567669 2748 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:12.913111-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.567686 2748 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:12.913117-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.567694 2748 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:56:12.913125-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.567728 2748 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/qemu.pid -device virtio-net-pci,netdev=net0,mac=a2:5a:33:3b:77:75 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:12.913134-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.569543 2748 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:12.91314-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.569557 2748 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:12.913145-07:00","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T11:56:12.913151-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:03.569575 2748 client.go:171] LocalClient.Create took 210.99025ms\n"} +{"Time":"2023-05-31T11:56:12.913156-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:04.628712 2748 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.913162-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:04.786843 2748 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.913168-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:04.792304 2748 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.913174-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:04.981709 2748 image.go:265] image registry.k8s.io/coredns/coredns:v1.8.6 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:56:12.913179-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:04.981743 2748 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.8.6\n"} +{"Time":"2023-05-31T11:56:12.913186-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:05.102910 2748 image.go:265] image gcr.io/k8s-minikube/storage-provisioner:v5 arch mismatch: want arm64 got amd64. fixing\n"} +{"Time":"2023-05-31T11:56:12.913192-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.102936 2748 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5\n"} +{"Time":"2023-05-31T11:56:12.913198-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.180087 2748 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.24.4\n"} +{"Time":"2023-05-31T11:56:12.913204-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.306673 2748 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/etcd_3.5.3-0\n"} +{"Time":"2023-05-31T11:56:12.913209-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.534755 2748 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.7\n"} +{"Time":"2023-05-31T11:56:12.913214-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.569758 2748 start.go:128] duration metric: createHost completed in 2.23541025s\n"} +{"Time":"2023-05-31T11:56:12.91322-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.569804 2748 start.go:83] releasing machines lock for \"test-preload-670000\", held for 2.23552575s\n"} +{"Time":"2023-05-31T11:56:12.913225-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:05.569870 2748 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:12.913231-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.581894 2748 out.go:177] * Deleting \"test-preload-670000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:12.913236-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:05.598502 2748 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:12.913242-07:00","Action":"output","Test":"TestPreload","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:12.913247-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.598537 2748 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T11:56:12.913254-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.674677 2748 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5 exists\n"} +{"Time":"2023-05-31T11:56:12.91326-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.674719 2748 cache.go:96] cache image \"gcr.io/k8s-minikube/storage-provisioner:v5\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5\" took 2.340851791s\n"} +{"Time":"2023-05-31T11:56:12.913266-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.674766 2748 cache.go:80] save to tar file gcr.io/k8s-minikube/storage-provisioner:v5 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5 succeeded\n"} +{"Time":"2023-05-31T11:56:12.913275-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.679465 2748 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.7 exists\n"} +{"Time":"2023-05-31T11:56:12.91328-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.679493 2748 cache.go:96] cache image \"registry.k8s.io/pause:3.7\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.7\" took 2.345490209s\n"} +{"Time":"2023-05-31T11:56:12.913287-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:05.679514 2748 cache.go:80] save to tar file registry.k8s.io/pause:3.7 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.7 succeeded\n"} +{"Time":"2023-05-31T11:56:12.913293-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:07.251452 2748 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.24.4 exists\n"} +{"Time":"2023-05-31T11:56:12.913299-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:07.251500 2748 cache.go:96] cache image \"registry.k8s.io/kube-scheduler:v1.24.4\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.24.4\" took 3.91734325s\n"} +{"Time":"2023-05-31T11:56:12.913306-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:07.251538 2748 cache.go:80] save to tar file registry.k8s.io/kube-scheduler:v1.24.4 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.24.4 succeeded\n"} +{"Time":"2023-05-31T11:56:12.913312-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:07.611692 2748 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.8.6 exists\n"} +{"Time":"2023-05-31T11:56:12.913318-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:07.611764 2748 cache.go:96] cache image \"registry.k8s.io/coredns/coredns:v1.8.6\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.8.6\" took 4.277763875s\n"} +{"Time":"2023-05-31T11:56:12.913325-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:07.611798 2748 cache.go:80] save to tar file registry.k8s.io/coredns/coredns:v1.8.6 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.8.6 succeeded\n"} +{"Time":"2023-05-31T11:56:12.913331-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:08.288827 2748 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.24.4 exists\n"} +{"Time":"2023-05-31T11:56:12.913337-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:08.288871 2748 cache.go:96] cache image \"registry.k8s.io/kube-controller-manager:v1.24.4\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.24.4\" took 4.955040083s\n"} +{"Time":"2023-05-31T11:56:12.913344-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:08.288931 2748 cache.go:80] save to tar file registry.k8s.io/kube-controller-manager:v1.24.4 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.24.4 succeeded\n"} +{"Time":"2023-05-31T11:56:12.913351-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:09.528913 2748 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.24.4 exists\n"} +{"Time":"2023-05-31T11:56:12.913357-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:09.528964 2748 cache.go:96] cache image \"registry.k8s.io/kube-apiserver:v1.24.4\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.24.4\" took 6.195174667s\n"} +{"Time":"2023-05-31T11:56:12.913363-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:09.528990 2748 cache.go:80] save to tar file registry.k8s.io/kube-apiserver:v1.24.4 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.24.4 succeeded\n"} +{"Time":"2023-05-31T11:56:12.913369-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.346106 2748 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.24.4 exists\n"} +{"Time":"2023-05-31T11:56:12.913375-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.346175 2748 cache.go:96] cache image \"registry.k8s.io/kube-proxy:v1.24.4\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.24.4\" took 7.012052333s\n"} +{"Time":"2023-05-31T11:56:12.913382-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.346202 2748 cache.go:80] save to tar file registry.k8s.io/kube-proxy:v1.24.4 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.24.4 succeeded\n"} +{"Time":"2023-05-31T11:56:12.913388-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.598637 2748 start.go:364] acquiring machines lock for test-preload-670000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:12.913394-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.599020 2748 start.go:368] acquired machines lock for \"test-preload-670000\" in 307.792µs\n"} +{"Time":"2023-05-31T11:56:12.913405-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.599145 2748 start.go:93] Provisioning new machine with config: \u0026{Name:test-preload-670000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kubernete"} +{"Time":"2023-05-31T11:56:12.913484-07:00","Action":"output","Test":"TestPreload","Output":"sConfig:{KubernetesVersion:v1.24.4 ClusterName:test-preload-670000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.24.4 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: Mo"} +{"Time":"2023-05-31T11:56:12.913496-07:00","Action":"output","Test":"TestPreload","Output":"untMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.24.4 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:56:12.913503-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.599432 2748 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:12.913508-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.607993 2748 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:12.913514-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.655079 2748 start.go:159] libmachine.API.Create for \"test-preload-670000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:12.913519-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.655110 2748 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:56:12.913525-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.655273 2748 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:56:12.91353-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.655313 2748 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:12.913535-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.655333 2748 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:12.913541-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.655407 2748 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:56:12.913546-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.655434 2748 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:12.913551-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.655452 2748 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:12.913557-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.658013 2748 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:56:12.913562-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.813521 2748 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:56:12.913567-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.849240 2748 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:56:12.913573-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.849247 2748 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:56:12.913579-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.849409 2748 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:12.913585-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.857996 2748 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:12.913591-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.858013 2748 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:12.913604-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.858070 2748 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:56:12.913611-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.865465 2748 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:56:12.913616-07:00","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T11:56:12.913621-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.865482 2748 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:12.913627-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.865499 2748 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:12.913634-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.865503 2748 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:56:12.913642-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.865542 2748 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/qemu.pid -device virtio-net-pci,netdev=net0,mac=7a:5c:30:5e:43:16 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/test-preload-670000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:12.913651-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.867184 2748 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:12.913656-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.867206 2748 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:12.913662-07:00","Action":"output","Test":"TestPreload","Output":" \t\n"} +{"Time":"2023-05-31T11:56:12.913667-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:10.867217 2748 client.go:171] LocalClient.Create took 212.104667ms\n"} +{"Time":"2023-05-31T11:56:12.913672-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:12.868421 2748 start.go:128] duration metric: createHost completed in 2.268976458s\n"} +{"Time":"2023-05-31T11:56:12.913677-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:12.868493 2748 start.go:83] releasing machines lock for \"test-preload-670000\", held for 2.269469s\n"} +{"Time":"2023-05-31T11:56:12.913683-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:12.868739 2748 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p test-preload-670000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:12.913695-07:00","Action":"output","Test":"TestPreload","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p test-preload-670000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:12.913701-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:12.878146 2748 out.go:177] \n"} +{"Time":"2023-05-31T11:56:12.913707-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:12.882280 2748 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:12.913714-07:00","Action":"output","Test":"TestPreload","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:12.91372-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:12.882319 2748 out.go:239] * \n"} +{"Time":"2023-05-31T11:56:12.913725-07:00","Action":"output","Test":"TestPreload","Output":" \t* \n"} +{"Time":"2023-05-31T11:56:12.913731-07:00","Action":"output","Test":"TestPreload","Output":" \tW0531 11:56:12.884803 2748 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:12.913739-07:00","Action":"output","Test":"TestPreload","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:12.913744-07:00","Action":"output","Test":"TestPreload","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:12.91375-07:00","Action":"output","Test":"TestPreload","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:12.913755-07:00","Action":"output","Test":"TestPreload","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:12.913761-07:00","Action":"output","Test":"TestPreload","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:12.913766-07:00","Action":"output","Test":"TestPreload","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:12.913772-07:00","Action":"output","Test":"TestPreload","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:12.913781-07:00","Action":"output","Test":"TestPreload","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:12.913789-07:00","Action":"output","Test":"TestPreload","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:12.913794-07:00","Action":"output","Test":"TestPreload","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:12.913799-07:00","Action":"output","Test":"TestPreload","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:12.913805-07:00","Action":"output","Test":"TestPreload","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:12.91381-07:00","Action":"output","Test":"TestPreload","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:12.913815-07:00","Action":"output","Test":"TestPreload","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:12.913821-07:00","Action":"output","Test":"TestPreload","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:12.913828-07:00","Action":"output","Test":"TestPreload","Output":" \tI0531 11:56:12.895267 2748 out.go:177] \n"} +{"Time":"2023-05-31T11:56:12.913833-07:00","Action":"output","Test":"TestPreload","Output":" \n"} +{"Time":"2023-05-31T11:56:12.913838-07:00","Action":"output","Test":"TestPreload","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:56:12.913844-07:00","Action":"output","Test":"TestPreload","Output":" preload_test.go:46: out/minikube-darwin-arm64 start -p test-preload-670000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.24.4 failed: exit status 80\n"} +{"Time":"2023-05-31T11:56:12.913849-07:00","Action":"output","Test":"TestPreload","Output":" panic.go:522: *** TestPreload FAILED at 2023-05-31 11:56:12.912282 -0700 PDT m=+807.093240001\n"} +{"Time":"2023-05-31T11:56:12.913855-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:56:12.91386-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p test-preload-670000 -n test-preload-670000\n"} +{"Time":"2023-05-31T11:56:12.978581-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p test-preload-670000 -n test-preload-670000: exit status 7 (65.978417ms)\n"} +{"Time":"2023-05-31T11:56:12.978604-07:00","Action":"output","Test":"TestPreload","Output":" \n"} +{"Time":"2023-05-31T11:56:12.978607-07:00","Action":"output","Test":"TestPreload","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:12.97861-07:00","Action":"output","Test":"TestPreload","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:56:12.978618-07:00","Action":"output","Test":"TestPreload","Output":" \n"} +{"Time":"2023-05-31T11:56:12.978619-07:00","Action":"output","Test":"TestPreload","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:12.978622-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:56:12.978624-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:241: \"test-preload-670000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:56:12.978628-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:175: Cleaning up \"test-preload-670000\" profile ...\n"} +{"Time":"2023-05-31T11:56:12.978632-07:00","Action":"output","Test":"TestPreload","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p test-preload-670000\n"} +{"Time":"2023-05-31T11:56:13.072122-07:00","Action":"output","Test":"TestPreload","Output":"--- FAIL: TestPreload (9.84s)\n"} +{"Time":"2023-05-31T11:56:13.072147-07:00","Action":"fail","Test":"TestPreload","Elapsed":9.84} +{"Time":"2023-05-31T11:56:13.072151-07:00","Action":"run","Test":"TestScheduledStopWindows"} +{"Time":"2023-05-31T11:56:13.072152-07:00","Action":"output","Test":"TestScheduledStopWindows","Output":"=== RUN TestScheduledStopWindows\n"} +{"Time":"2023-05-31T11:56:13.072191-07:00","Action":"output","Test":"TestScheduledStopWindows","Output":" scheduled_stop_test.go:42: test only runs on windows\n"} +{"Time":"2023-05-31T11:56:13.072203-07:00","Action":"output","Test":"TestScheduledStopWindows","Output":"--- SKIP: TestScheduledStopWindows (0.00s)\n"} +{"Time":"2023-05-31T11:56:13.072207-07:00","Action":"skip","Test":"TestScheduledStopWindows","Elapsed":0} +{"Time":"2023-05-31T11:56:13.072208-07:00","Action":"run","Test":"TestScheduledStopUnix"} +{"Time":"2023-05-31T11:56:13.07221-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":"=== RUN TestScheduledStopUnix\n"} +{"Time":"2023-05-31T11:56:13.072302-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:128: (dbg) Run: out/minikube-darwin-arm64 start -p scheduled-stop-208000 --memory=2048 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:56:23.005052-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:128: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p scheduled-stop-208000 --memory=2048 --driver=qemu2 : exit status 80 (9.93227725s)\n"} +{"Time":"2023-05-31T11:56:23.00511-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T11:56:23.00512-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:23.005128-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* [scheduled-stop-208000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:23.005149-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:23.005158-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:23.005165-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:23.005172-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:23.005179-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:23.005187-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:23.005195-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:23.005201-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:23.005209-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Starting control plane node scheduled-stop-208000 in cluster scheduled-stop-208000\n"} +{"Time":"2023-05-31T11:56:23.005216-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:23.005223-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:23.005231-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:23.005238-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T11:56:23.005245-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Deleting \"scheduled-stop-208000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:23.005252-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:23.005259-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:23.00527-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:23.005277-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T11:56:23.005284-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T11:56:23.00529-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T11:56:23.005297-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T11:56:23.005303-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:23.00531-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:56:23.005317-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:23.005326-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p scheduled-stop-208000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:23.005335-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:23.005343-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* \n"} +{"Time":"2023-05-31T11:56:23.005351-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:23.005361-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:23.005371-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:23.005378-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:23.005386-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:23.005394-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:23.005402-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:23.00541-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:23.005419-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T11:56:23.005426-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:56:23.005438-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" scheduled_stop_test.go:130: starting minikube: exit status 80\n"} +{"Time":"2023-05-31T11:56:23.005446-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T11:56:23.005452-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:23.005459-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* [scheduled-stop-208000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:23.005466-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:23.005472-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:23.005479-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:23.005556-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:23.005571-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:23.00558-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:23.005587-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:23.005594-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:23.005601-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Starting control plane node scheduled-stop-208000 in cluster scheduled-stop-208000\n"} +{"Time":"2023-05-31T11:56:23.005608-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:23.005615-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:23.005622-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:23.00563-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T11:56:23.005636-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Deleting \"scheduled-stop-208000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:23.005643-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:23.00565-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:23.005656-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:23.005664-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T11:56:23.00567-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T11:56:23.005677-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t\n"} +{"Time":"2023-05-31T11:56:23.005684-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T11:56:23.00569-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:23.005696-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:56:23.005703-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:23.005711-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p scheduled-stop-208000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:23.00572-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:23.005727-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t* \n"} +{"Time":"2023-05-31T11:56:23.005735-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:23.005745-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:23.005752-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:23.005759-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:23.005767-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:23.005775-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:23.005782-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:23.00579-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:23.005807-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T11:56:23.005814-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:56:23.005821-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" panic.go:522: *** TestScheduledStopUnix FAILED at 2023-05-31 11:56:23.005166 -0700 PDT m=+817.186270292\n"} +{"Time":"2023-05-31T11:56:23.005828-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:56:23.005835-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p scheduled-stop-208000 -n scheduled-stop-208000\n"} +{"Time":"2023-05-31T11:56:23.073367-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p scheduled-stop-208000 -n scheduled-stop-208000: exit status 7 (67.9285ms)\n"} +{"Time":"2023-05-31T11:56:23.073385-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T11:56:23.073388-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:23.07339-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:56:23.073392-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" \n"} +{"Time":"2023-05-31T11:56:23.073393-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:23.073395-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:56:23.073397-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:241: \"scheduled-stop-208000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:56:23.073401-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:175: Cleaning up \"scheduled-stop-208000\" profile ...\n"} +{"Time":"2023-05-31T11:56:23.073403-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p scheduled-stop-208000\n"} +{"Time":"2023-05-31T11:56:23.167008-07:00","Action":"output","Test":"TestScheduledStopUnix","Output":"--- FAIL: TestScheduledStopUnix (10.09s)\n"} +{"Time":"2023-05-31T11:56:23.167027-07:00","Action":"fail","Test":"TestScheduledStopUnix","Elapsed":10.09} +{"Time":"2023-05-31T11:56:23.167031-07:00","Action":"run","Test":"TestSkaffold"} +{"Time":"2023-05-31T11:56:23.167039-07:00","Action":"output","Test":"TestSkaffold","Output":"=== RUN TestSkaffold\n"} +{"Time":"2023-05-31T11:56:26.298541-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:59: (dbg) Run: /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/skaffold.exe3388129960 version\n"} +{"Time":"2023-05-31T11:56:26.948564-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:63: skaffold version: v2.5.0\n"} +{"Time":"2023-05-31T11:56:26.94858-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:66: (dbg) Run: out/minikube-darwin-arm64 start -p skaffold-039000 --memory=2600 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:56:36.806112-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:66: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p skaffold-039000 --memory=2600 --driver=qemu2 : exit status 80 (9.857149291s)\n"} +{"Time":"2023-05-31T11:56:36.806167-07:00","Action":"output","Test":"TestSkaffold","Output":" \n"} +{"Time":"2023-05-31T11:56:36.806176-07:00","Action":"output","Test":"TestSkaffold","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:36.806186-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* [skaffold-039000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:36.806194-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:36.806202-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:36.80621-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:36.806218-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:36.806225-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:36.806231-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:36.806238-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:36.806245-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:36.806252-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Starting control plane node skaffold-039000 in cluster skaffold-039000\n"} +{"Time":"2023-05-31T11:56:36.80626-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2600MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:36.806266-07:00","Action":"output","Test":"TestSkaffold","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:36.806273-07:00","Action":"output","Test":"TestSkaffold","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:36.80628-07:00","Action":"output","Test":"TestSkaffold","Output":" \t\n"} +{"Time":"2023-05-31T11:56:36.806286-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Deleting \"skaffold-039000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:36.806293-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2600MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:36.8063-07:00","Action":"output","Test":"TestSkaffold","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:36.806306-07:00","Action":"output","Test":"TestSkaffold","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:36.806313-07:00","Action":"output","Test":"TestSkaffold","Output":" \t\n"} +{"Time":"2023-05-31T11:56:36.806319-07:00","Action":"output","Test":"TestSkaffold","Output":" \t\n"} +{"Time":"2023-05-31T11:56:36.806325-07:00","Action":"output","Test":"TestSkaffold","Output":" \t\n"} +{"Time":"2023-05-31T11:56:36.806331-07:00","Action":"output","Test":"TestSkaffold","Output":" \n"} +{"Time":"2023-05-31T11:56:36.806337-07:00","Action":"output","Test":"TestSkaffold","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:36.806343-07:00","Action":"output","Test":"TestSkaffold","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:56:36.806351-07:00","Action":"output","Test":"TestSkaffold","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:36.806359-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p skaffold-039000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:36.806368-07:00","Action":"output","Test":"TestSkaffold","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:36.806375-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* \n"} +{"Time":"2023-05-31T11:56:36.806382-07:00","Action":"output","Test":"TestSkaffold","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:36.806405-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:36.806413-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:36.80642-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:36.806428-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:36.806434-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:36.806441-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:36.806449-07:00","Action":"output","Test":"TestSkaffold","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:36.806458-07:00","Action":"output","Test":"TestSkaffold","Output":" \n"} +{"Time":"2023-05-31T11:56:36.806467-07:00","Action":"output","Test":"TestSkaffold","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:56:36.806478-07:00","Action":"output","Test":"TestSkaffold","Output":" skaffold_test.go:68: starting minikube: exit status 80\n"} +{"Time":"2023-05-31T11:56:36.806484-07:00","Action":"output","Test":"TestSkaffold","Output":" \n"} +{"Time":"2023-05-31T11:56:36.80649-07:00","Action":"output","Test":"TestSkaffold","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:36.806497-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* [skaffold-039000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:36.806503-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:36.80651-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:36.806516-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:36.806523-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:36.806529-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:36.806536-07:00","Action":"output","Test":"TestSkaffold","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:36.806542-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:36.806549-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:36.806557-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Starting control plane node skaffold-039000 in cluster skaffold-039000\n"} +{"Time":"2023-05-31T11:56:36.806564-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2600MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:36.80657-07:00","Action":"output","Test":"TestSkaffold","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:36.806577-07:00","Action":"output","Test":"TestSkaffold","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:36.806583-07:00","Action":"output","Test":"TestSkaffold","Output":" \t\n"} +{"Time":"2023-05-31T11:56:36.80659-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Deleting \"skaffold-039000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:36.806597-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2600MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:36.806603-07:00","Action":"output","Test":"TestSkaffold","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:36.80661-07:00","Action":"output","Test":"TestSkaffold","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:36.806617-07:00","Action":"output","Test":"TestSkaffold","Output":" \t\n"} +{"Time":"2023-05-31T11:56:36.806622-07:00","Action":"output","Test":"TestSkaffold","Output":" \t\n"} +{"Time":"2023-05-31T11:56:36.806629-07:00","Action":"output","Test":"TestSkaffold","Output":" \t\n"} +{"Time":"2023-05-31T11:56:36.806635-07:00","Action":"output","Test":"TestSkaffold","Output":" \n"} +{"Time":"2023-05-31T11:56:36.806642-07:00","Action":"output","Test":"TestSkaffold","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:36.806648-07:00","Action":"output","Test":"TestSkaffold","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:56:36.806654-07:00","Action":"output","Test":"TestSkaffold","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:36.806663-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p skaffold-039000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:36.806671-07:00","Action":"output","Test":"TestSkaffold","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:36.806677-07:00","Action":"output","Test":"TestSkaffold","Output":" \t* \n"} +{"Time":"2023-05-31T11:56:36.806685-07:00","Action":"output","Test":"TestSkaffold","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:36.806694-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:36.806701-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:36.806712-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:36.806719-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:36.806726-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:36.806732-07:00","Action":"output","Test":"TestSkaffold","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:36.80674-07:00","Action":"output","Test":"TestSkaffold","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:36.806748-07:00","Action":"output","Test":"TestSkaffold","Output":" \n"} +{"Time":"2023-05-31T11:56:36.806754-07:00","Action":"output","Test":"TestSkaffold","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:56:36.813685-07:00","Action":"output","Test":"TestSkaffold","Output":" panic.go:522: *** TestSkaffold FAILED at 2023-05-31 11:56:36.813575 -0700 PDT m=+830.994878917\n"} +{"Time":"2023-05-31T11:56:36.813706-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:56:36.813752-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p skaffold-039000 -n skaffold-039000\n"} +{"Time":"2023-05-31T11:56:36.877349-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p skaffold-039000 -n skaffold-039000: exit status 7 (63.484708ms)\n"} +{"Time":"2023-05-31T11:56:36.877376-07:00","Action":"output","Test":"TestSkaffold","Output":" \n"} +{"Time":"2023-05-31T11:56:36.877379-07:00","Action":"output","Test":"TestSkaffold","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:36.877386-07:00","Action":"output","Test":"TestSkaffold","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:56:36.877388-07:00","Action":"output","Test":"TestSkaffold","Output":" \n"} +{"Time":"2023-05-31T11:56:36.87739-07:00","Action":"output","Test":"TestSkaffold","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:36.877391-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:56:36.877395-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:241: \"skaffold-039000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:56:36.877397-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:175: Cleaning up \"skaffold-039000\" profile ...\n"} +{"Time":"2023-05-31T11:56:36.877399-07:00","Action":"output","Test":"TestSkaffold","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p skaffold-039000\n"} +{"Time":"2023-05-31T11:56:36.97306-07:00","Action":"output","Test":"TestSkaffold","Output":"--- FAIL: TestSkaffold (13.81s)\n"} +{"Time":"2023-05-31T11:56:36.973075-07:00","Action":"fail","Test":"TestSkaffold","Elapsed":13.81} +{"Time":"2023-05-31T11:56:36.973079-07:00","Action":"run","Test":"TestStartStop"} +{"Time":"2023-05-31T11:56:36.973083-07:00","Action":"output","Test":"TestStartStop","Output":"=== RUN TestStartStop\n"} +{"Time":"2023-05-31T11:56:36.973105-07:00","Action":"output","Test":"TestStartStop","Output":"=== PAUSE TestStartStop\n"} +{"Time":"2023-05-31T11:56:36.973107-07:00","Action":"pause","Test":"TestStartStop"} +{"Time":"2023-05-31T11:56:36.973127-07:00","Action":"run","Test":"TestInsufficientStorage"} +{"Time":"2023-05-31T11:56:36.973131-07:00","Action":"output","Test":"TestInsufficientStorage","Output":"=== RUN TestInsufficientStorage\n"} +{"Time":"2023-05-31T11:56:36.973149-07:00","Action":"output","Test":"TestInsufficientStorage","Output":" status_test.go:38: only runs with docker driver\n"} +{"Time":"2023-05-31T11:56:36.973163-07:00","Action":"output","Test":"TestInsufficientStorage","Output":"--- SKIP: TestInsufficientStorage (0.00s)\n"} +{"Time":"2023-05-31T11:56:36.973205-07:00","Action":"skip","Test":"TestInsufficientStorage","Elapsed":0} +{"Time":"2023-05-31T11:56:36.973208-07:00","Action":"run","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T11:56:36.973209-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== RUN TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T11:56:36.973211-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== PAUSE TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T11:56:36.973212-07:00","Action":"pause","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T11:56:36.973214-07:00","Action":"run","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T11:56:36.973215-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== RUN TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T11:56:36.973232-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== PAUSE TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T11:56:36.973234-07:00","Action":"pause","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T11:56:36.973236-07:00","Action":"run","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T11:56:36.973237-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== RUN TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T11:56:36.973238-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== PAUSE TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T11:56:36.97324-07:00","Action":"pause","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T11:56:36.973241-07:00","Action":"run","Test":"TestMissingContainerUpgrade"} +{"Time":"2023-05-31T11:56:36.973242-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"=== RUN TestMissingContainerUpgrade\n"} +{"Time":"2023-05-31T11:56:36.973244-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":" version_upgrade_test.go:296: This test is only for Docker\n"} +{"Time":"2023-05-31T11:56:36.973246-07:00","Action":"output","Test":"TestMissingContainerUpgrade","Output":"--- SKIP: TestMissingContainerUpgrade (0.00s)\n"} +{"Time":"2023-05-31T11:56:36.973248-07:00","Action":"skip","Test":"TestMissingContainerUpgrade","Elapsed":0} +{"Time":"2023-05-31T11:56:36.973249-07:00","Action":"cont","Test":"TestOffline"} +{"Time":"2023-05-31T11:56:36.973251-07:00","Action":"output","Test":"TestOffline","Output":"=== CONT TestOffline\n"} +{"Time":"2023-05-31T11:56:36.973296-07:00","Action":"cont","Test":"TestNetworkPlugins"} +{"Time":"2023-05-31T11:56:36.97331-07:00","Action":"output","Test":"TestNetworkPlugins","Output":"=== CONT TestNetworkPlugins\n"} +{"Time":"2023-05-31T11:56:36.97332-07:00","Action":"output","Test":"TestOffline","Output":" aab_offline_test.go:55: (dbg) Run: out/minikube-darwin-arm64 start -p offline-docker-224000 --alsologtostderr -v=1 --memory=2048 --wait=true --driver=qemu2 \n"} +{"Time":"2023-05-31T11:56:36.97334-07:00","Action":"run","Test":"TestNetworkPlugins/group"} +{"Time":"2023-05-31T11:56:36.973342-07:00","Action":"output","Test":"TestNetworkPlugins/group","Output":"=== RUN TestNetworkPlugins/group\n"} +{"Time":"2023-05-31T11:56:36.973345-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T11:56:36.973347-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== RUN TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T11:56:36.973348-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== PAUSE TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T11:56:36.973349-07:00","Action":"pause","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T11:56:36.973351-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet"} +{"Time":"2023-05-31T11:56:36.973352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"=== RUN TestNetworkPlugins/group/kubenet\n"} +{"Time":"2023-05-31T11:56:36.973354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"=== PAUSE TestNetworkPlugins/group/kubenet\n"} +{"Time":"2023-05-31T11:56:36.973355-07:00","Action":"pause","Test":"TestNetworkPlugins/group/kubenet"} +{"Time":"2023-05-31T11:56:36.973357-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T11:56:36.973361-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== RUN TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T11:56:36.973384-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== PAUSE TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T11:56:36.973386-07:00","Action":"pause","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T11:56:36.973389-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T11:56:36.97339-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T11:56:36.973392-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== PAUSE TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T11:56:36.973393-07:00","Action":"pause","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T11:56:36.973394-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T11:56:36.973396-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== RUN TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T11:56:36.973397-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== PAUSE TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T11:56:36.973398-07:00","Action":"pause","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T11:56:36.973401-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T11:56:36.973402-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== RUN TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T11:56:36.973403-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== PAUSE TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T11:56:36.973405-07:00","Action":"pause","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T11:56:36.973406-07:00","Action":"run","Test":"TestNetworkPlugins/group/false"} +{"Time":"2023-05-31T11:56:36.973407-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"=== RUN TestNetworkPlugins/group/false\n"} +{"Time":"2023-05-31T11:56:36.97341-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"=== PAUSE TestNetworkPlugins/group/false\n"} +{"Time":"2023-05-31T11:56:36.973411-07:00","Action":"pause","Test":"TestNetworkPlugins/group/false"} +{"Time":"2023-05-31T11:56:36.973421-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T11:56:36.973422-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== RUN TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T11:56:36.974622-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== PAUSE TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T11:56:36.974625-07:00","Action":"pause","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T11:56:36.974701-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T11:56:36.974705-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== RUN TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T11:56:36.974752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== PAUSE TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T11:56:36.97477-07:00","Action":"pause","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T11:56:36.974774-07:00","Action":"run","Test":"TestNetworkPlugins/group/cilium"} +{"Time":"2023-05-31T11:56:36.974776-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":"=== RUN TestNetworkPlugins/group/cilium\n"} +{"Time":"2023-05-31T11:56:36.974849-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" net_test.go:101: Skipping the test as it's interfering with other tests and is outdated\n"} +{"Time":"2023-05-31T11:56:39.104499-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" panic.go:522: \n"} +{"Time":"2023-05-31T11:56:39.104512-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" ----------------------- debugLogs start: cilium-602000 [pass: true] --------------------------------\n"} +{"Time":"2023-05-31T11:56:39.104514-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T11:56:39.104516-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104518-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10452-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104521-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T11:56:39.104523-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104527-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104528-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10453-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T11:56:39.104531-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104533-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104534-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104535-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T11:56:39.104536-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104538-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104539-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10454-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T11:56:39.104541-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104543-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104547-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104548-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T11:56:39.104549-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104551-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104552-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104553-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T11:56:39.104554-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104556-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104557-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104559-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T11:56:39.10456-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104561-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104562-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104564-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T11:56:39.104565-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104567-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104568-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104569-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T11:56:39.10457-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104572-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104573-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104574-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T11:56:39.104575-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104577-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104578-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10458-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104581-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T11:56:39.104583-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104584-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104585-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104587-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104588-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T11:56:39.104589-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104591-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104592-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104593-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104594-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T11:56:39.104596-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104597-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104598-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104599-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T11:56:39.104601-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104602-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104603-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104605-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104606-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T11:56:39.104607-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104608-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.10461-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104611-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104612-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T11:56:39.104613-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104615-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104616-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104617-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T11:56:39.104618-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.10462-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104621-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104622-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T11:56:39.104624-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104625-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104626-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104627-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T11:56:39.104629-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.10463-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104631-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104632-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T11:56:39.104633-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104635-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104636-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104637-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T11:56:39.104638-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.10464-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104641-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104642-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T11:56:39.10465-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104651-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104652-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104653-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T11:56:39.104655-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104656-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104657-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104658-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T11:56:39.104659-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104661-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104662-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104664-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104665-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T11:56:39.104667-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104668-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104669-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104671-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104672-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T11:56:39.104673-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104675-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104676-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104677-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104678-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T11:56:39.10468-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104681-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104682-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104684-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104685-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T11:56:39.104686-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104687-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104689-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10469-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104691-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium daemon set:\n"} +{"Time":"2023-05-31T11:56:39.104693-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104694-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104695-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104699-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium daemon set pod(s):\n"} +{"Time":"2023-05-31T11:56:39.104701-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104702-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104703-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104704-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium daemon set container(s) logs (current):\n"} +{"Time":"2023-05-31T11:56:39.104706-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104707-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104709-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104711-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium daemon set container(s) logs (previous):\n"} +{"Time":"2023-05-31T11:56:39.104712-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104713-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104715-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104716-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium deployment:\n"} +{"Time":"2023-05-31T11:56:39.104717-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104719-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10472-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104721-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe cilium deployment pod(s):\n"} +{"Time":"2023-05-31T11:56:39.104724-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104725-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104726-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104727-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium deployment container(s) logs (current):\n"} +{"Time":"2023-05-31T11:56:39.104729-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.10473-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104731-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104732-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cilium deployment container(s) logs (previous):\n"} +{"Time":"2023-05-31T11:56:39.104734-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104735-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104736-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104737-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T11:56:39.104739-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104741-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104742-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104743-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T11:56:39.104744-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104746-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104747-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104748-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T11:56:39.104749-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" error: context \"cilium-602000\" does not exist\n"} +{"Time":"2023-05-31T11:56:39.104751-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104752-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104753-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T11:56:39.104755-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104757-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104758-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10476-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104761-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T11:56:39.104763-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104764-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104766-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104767-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104768-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T11:56:39.10477-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104772-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104773-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104774-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104775-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T11:56:39.104777-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104778-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104779-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104781-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104782-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T11:56:39.104784-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104785-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104787-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104788-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104789-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T11:56:39.104791-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T11:56:39.104792-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" clusters: null\n"} +{"Time":"2023-05-31T11:56:39.104793-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" contexts: null\n"} +{"Time":"2023-05-31T11:56:39.104795-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T11:56:39.104796-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" kind: Config\n"} +{"Time":"2023-05-31T11:56:39.104797-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" preferences: {}\n"} +{"Time":"2023-05-31T11:56:39.104799-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" users: null\n"} +{"Time":"2023-05-31T11:56:39.1048-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104801-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104802-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T11:56:39.104804-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" Error in configuration: context was not found for specified context: cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.104805-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104806-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104807-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T11:56:39.104809-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.10481-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104811-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104813-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104814-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T11:56:39.104817-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104818-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104819-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104821-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104822-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T11:56:39.104824-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104825-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104826-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104827-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104829-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T11:56:39.10483-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104832-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104833-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104834-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104836-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T11:56:39.104838-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104839-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104841-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104842-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104844-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T11:56:39.104845-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104847-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104848-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104849-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10485-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T11:56:39.104852-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104853-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104855-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104856-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104857-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T11:56:39.104859-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104861-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104862-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104863-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104864-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T11:56:39.104865-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104867-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104868-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104869-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10487-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T11:56:39.104872-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104873-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104875-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104876-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104877-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T11:56:39.104878-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.10488-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104881-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104882-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104884-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T11:56:39.104885-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104886-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104888-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104889-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.10489-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T11:56:39.104891-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104893-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104895-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104896-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104897-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T11:56:39.104899-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104901-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104902-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104904-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104905-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T11:56:39.104906-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104908-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104909-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104911-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104912-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T11:56:39.104914-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104915-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104917-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104918-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104919-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T11:56:39.104921-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.104923-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104924-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104926-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104927-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T11:56:39.104928-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" * Profile \"cilium-602000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T11:56:39.10493-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" To start a cluster, run: \"minikube start -p cilium-602000\"\n"} +{"Time":"2023-05-31T11:56:39.104931-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" \n"} +{"Time":"2023-05-31T11:56:39.104933-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" ----------------------- debugLogs end: cilium-602000 [took: 2.129621625s] --------------------------------\n"} +{"Time":"2023-05-31T11:56:39.104936-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" helpers_test.go:175: Cleaning up \"cilium-602000\" profile ...\n"} +{"Time":"2023-05-31T11:56:39.104938-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p cilium-602000\n"} +{"Time":"2023-05-31T11:56:39.333476-07:00","Action":"cont","Test":"TestHyperkitDriverSkipUpgrade"} +{"Time":"2023-05-31T11:56:39.333489-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"=== CONT TestHyperkitDriverSkipUpgrade\n"} +{"Time":"2023-05-31T11:56:39.333542-07:00","Action":"run","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current"} +{"Time":"2023-05-31T11:56:39.333544-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"=== RUN TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current\n"} +{"Time":"2023-05-31T11:56:40.397842-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"E0531 11:56:40.397792 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:56:40.720755-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"* minikube v1.30.1 on darwin (arm64)\n"} +{"Time":"2023-05-31T11:56:40.726688-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:40.733699-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:40.741671-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:40.74577-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:40.749673-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:40.753703-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" - MINIKUBE_HOME=/var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.11.0-to-current930085204/001\n"} +{"Time":"2023-05-31T11:56:40.76165-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"* Using the hyperkit driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:40.771632-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"\n"} +{"Time":"2023-05-31T11:56:40.775719-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"X Exiting due to DRV_UNSUPPORTED_OS: The driver 'hyperkit' is not supported on darwin/arm64\n"} +{"Time":"2023-05-31T11:56:40.778681-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":"\n"} +{"Time":"2023-05-31T11:56:40.787511-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" driver_install_or_update_test.go:209: failed to run minikube. got: exit status 56\n"} +{"Time":"2023-05-31T11:56:40.823532-07:00","Action":"run","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current"} +{"Time":"2023-05-31T11:56:40.823546-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"=== RUN TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current\n"} +{"Time":"2023-05-31T11:56:42.011701-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* minikube v1.30.1 on darwin (arm64)\n"} +{"Time":"2023-05-31T11:56:42.022663-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:42.029607-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:42.037686-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:42.045632-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:42.049678-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:42.057648-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" - MINIKUBE_HOME=/var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/TestHyperkitDriverSkipUpgradeupgrade-v1.2.0-to-current595676939/001\n"} +{"Time":"2023-05-31T11:56:42.065652-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"* Using the hyperkit driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:42.074675-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"\n"} +{"Time":"2023-05-31T11:56:42.078649-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"X Exiting due to DRV_UNSUPPORTED_OS: The driver 'hyperkit' is not supported on darwin/arm64\n"} +{"Time":"2023-05-31T11:56:42.082647-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":"\n"} +{"Time":"2023-05-31T11:56:42.091809-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" driver_install_or_update_test.go:209: failed to run minikube. got: exit status 56\n"} +{"Time":"2023-05-31T11:56:42.127506-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade","Output":"--- FAIL: TestHyperkitDriverSkipUpgrade (2.79s)\n"} +{"Time":"2023-05-31T11:56:42.127525-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Output":" --- FAIL: TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current (1.49s)\n"} +{"Time":"2023-05-31T11:56:42.127527-07:00","Action":"fail","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.11.0-to-current","Elapsed":1.49} +{"Time":"2023-05-31T11:56:42.127531-07:00","Action":"output","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Output":" --- FAIL: TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current (1.30s)\n"} +{"Time":"2023-05-31T11:56:42.127533-07:00","Action":"fail","Test":"TestHyperkitDriverSkipUpgrade/upgrade-v1.2.0-to-current","Elapsed":1.3} +{"Time":"2023-05-31T11:56:42.127535-07:00","Action":"fail","Test":"TestHyperkitDriverSkipUpgrade","Elapsed":2.79} +{"Time":"2023-05-31T11:56:42.127536-07:00","Action":"cont","Test":"TestHyperKitDriverInstallOrUpdate"} +{"Time":"2023-05-31T11:56:42.127538-07:00","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"=== CONT TestHyperKitDriverInstallOrUpdate\n"} +{"Time":"2023-05-31T11:56:46.764612-07:00","Action":"output","Test":"TestOffline","Output":" aab_offline_test.go:55: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p offline-docker-224000 --alsologtostderr -v=1 --memory=2048 --wait=true --driver=qemu2 : exit status 80 (9.788856917s)\n"} +{"Time":"2023-05-31T11:56:46.764633-07:00","Action":"output","Test":"TestOffline","Output":" \n"} +{"Time":"2023-05-31T11:56:46.764637-07:00","Action":"output","Test":"TestOffline","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:46.76464-07:00","Action":"output","Test":"TestOffline","Output":" \t* [offline-docker-224000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:46.764645-07:00","Action":"output","Test":"TestOffline","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:46.764648-07:00","Action":"output","Test":"TestOffline","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:46.764651-07:00","Action":"output","Test":"TestOffline","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:46.764654-07:00","Action":"output","Test":"TestOffline","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:46.764656-07:00","Action":"output","Test":"TestOffline","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:46.764659-07:00","Action":"output","Test":"TestOffline","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:46.764661-07:00","Action":"output","Test":"TestOffline","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:46.764664-07:00","Action":"output","Test":"TestOffline","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:46.764667-07:00","Action":"output","Test":"TestOffline","Output":" \t* Starting control plane node offline-docker-224000 in cluster offline-docker-224000\n"} +{"Time":"2023-05-31T11:56:46.764671-07:00","Action":"output","Test":"TestOffline","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:46.764676-07:00","Action":"output","Test":"TestOffline","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:46.764679-07:00","Action":"output","Test":"TestOffline","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:46.764681-07:00","Action":"output","Test":"TestOffline","Output":" \t\n"} +{"Time":"2023-05-31T11:56:46.764691-07:00","Action":"output","Test":"TestOffline","Output":" \t* Deleting \"offline-docker-224000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:46.764693-07:00","Action":"output","Test":"TestOffline","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:46.764696-07:00","Action":"output","Test":"TestOffline","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:46.764698-07:00","Action":"output","Test":"TestOffline","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:46.764701-07:00","Action":"output","Test":"TestOffline","Output":" \t\n"} +{"Time":"2023-05-31T11:56:46.764703-07:00","Action":"output","Test":"TestOffline","Output":" \t\n"} +{"Time":"2023-05-31T11:56:46.764706-07:00","Action":"output","Test":"TestOffline","Output":" \t\n"} +{"Time":"2023-05-31T11:56:46.764708-07:00","Action":"output","Test":"TestOffline","Output":" \n"} +{"Time":"2023-05-31T11:56:46.76471-07:00","Action":"output","Test":"TestOffline","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:46.764713-07:00","Action":"output","Test":"TestOffline","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:56:46.764716-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.001798 2924 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:56:46.764719-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.001947 2924 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:56:46.764723-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.001950 2924 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:56:46.764727-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.001952 2924 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:56:46.764729-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.002033 2924 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:56:46.764733-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.003404 2924 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:56:46.764736-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.019970 2924 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1568,\"bootTime\":1685557829,\"procs\":396,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:56:46.764741-07:00","Action":"output","Test":"TestOffline","Output":" \tW0531 11:56:37.020041 2924 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:56:46.764744-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.024347 2924 out.go:177] * [offline-docker-224000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:46.764747-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.034122 2924 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:46.76475-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.030277 2924 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:56:46.764753-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.038208 2924 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:46.764757-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.041218 2924 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:46.76476-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.044201 2924 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:46.764763-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.051191 2924 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:46.764766-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.059299 2924 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:56:46.764769-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.063572 2924 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:56:46.764772-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.063628 2924 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:56:46.764775-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.067171 2924 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:46.764777-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.074307 2924 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:56:46.76478-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.074315 2924 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:56:46.764784-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.074322 2924 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:56:46.76479-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.076256 2924 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:56:46.764794-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.079202 2924 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:46.764797-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.082190 2924 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T11:56:46.7648-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.082208 2924 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:56:46.764803-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.082215 2924 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:56:46.764807-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.082218 2924 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T11:56:46.76481-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.082224 2924 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:56:46.764817-07:00","Action":"output","Test":"TestOffline","Output":" \t{Name:offline-docker-224000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:offline-docker-224000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerR"} +{"Time":"2023-05-31T11:56:46.764828-07:00","Action":"output","Test":"TestOffline","Output":"untime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:56:46.764833-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.082322 2924 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:46.764837-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.087401 2924 out.go:177] * Starting control plane node offline-docker-224000 in cluster offline-docker-224000\n"} +{"Time":"2023-05-31T11:56:46.76484-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091169 2924 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:56:46.764844-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091205 2924 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:56:46.764848-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091214 2924 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:56:46.764863-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091281 2924 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:56:46.764867-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091286 2924 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:56:46.764872-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091338 2924 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/offline-docker-224000/config.json ...\n"} +{"Time":"2023-05-31T11:56:46.764875-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091355 2924 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/offline-docker-224000/config.json: {Name:mkd90901da69fbc65a3f2d348beb92db4c0a6f04 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:46.76488-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091535 2924 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:56:46.764884-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091549 2924 start.go:364] acquiring machines lock for offline-docker-224000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:46.764891-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091577 2924 start.go:368] acquired machines lock for \"offline-docker-224000\" in 24.166µs\n"} +{"Time":"2023-05-31T11:56:46.764899-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091589 2924 start.go:93] Provisioning new machine with config: \u0026{Name:offline-docker-224000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kuberne"} +{"Time":"2023-05-31T11:56:46.764906-07:00","Action":"output","Test":"TestOffline","Output":"tesConfig:{KubernetesVersion:v1.27.2 ClusterName:offline-docker-224000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP"} +{"Time":"2023-05-31T11:56:46.764911-07:00","Action":"output","Test":"TestOffline","Output":": MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:56:46.764915-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.091614 2924 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:46.764918-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.099178 2924 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:46.764921-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113297 2924 start.go:159] libmachine.API.Create for \"offline-docker-224000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:46.764924-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113327 2924 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:56:46.764927-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113386 2924 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:56:46.76493-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113406 2924 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:46.764933-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113416 2924 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:46.764936-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113478 2924 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:56:46.764939-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113492 2924 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:46.764942-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113501 2924 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:46.764945-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.113835 2924 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:56:46.764948-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.277172 2924 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:56:46.764951-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.387798 2924 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:56:46.764953-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.387808 2924 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:56:46.764957-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.388000 2924 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:46.76496-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.396460 2924 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:46.764963-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.396483 2924 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:46.764966-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.396548 2924 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:56:46.764969-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.404597 2924 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:56:46.764971-07:00","Action":"output","Test":"TestOffline","Output":" \t\n"} +{"Time":"2023-05-31T11:56:46.764974-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.404616 2924 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:46.764977-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.404635 2924 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:46.764981-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.404645 2924 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:56:46.764985-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.404688 2924 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2048 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/qemu.pid -device virtio-net-pci,netdev=net0,mac=82:d0:24:90:72:ec -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:46.76499-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.406411 2924 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:46.764993-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.406426 2924 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:46.764996-07:00","Action":"output","Test":"TestOffline","Output":" \t\n"} +{"Time":"2023-05-31T11:56:46.764999-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:37.406446 2924 client.go:171] LocalClient.Create took 293.116917ms\n"} +{"Time":"2023-05-31T11:56:46.765001-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:39.407789 2924 start.go:128] duration metric: createHost completed in 2.31620175s\n"} +{"Time":"2023-05-31T11:56:46.765005-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:39.407808 2924 start.go:83] releasing machines lock for \"offline-docker-224000\", held for 2.31626075s\n"} +{"Time":"2023-05-31T11:56:46.765008-07:00","Action":"output","Test":"TestOffline","Output":" \tW0531 11:56:39.407825 2924 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:46.765011-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:39.416756 2924 out.go:177] * Deleting \"offline-docker-224000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:46.765015-07:00","Action":"output","Test":"TestOffline","Output":" \tW0531 11:56:39.426901 2924 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:46.76502-07:00","Action":"output","Test":"TestOffline","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:46.765023-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:39.426915 2924 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T11:56:46.765026-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.429022 2924 start.go:364] acquiring machines lock for offline-docker-224000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:46.765029-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.429410 2924 start.go:368] acquired machines lock for \"offline-docker-224000\" in 308.958µs\n"} +{"Time":"2023-05-31T11:56:46.765037-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.429533 2924 start.go:93] Provisioning new machine with config: \u0026{Name:offline-docker-224000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kuberne"} +{"Time":"2023-05-31T11:56:46.765044-07:00","Action":"output","Test":"TestOffline","Output":"tesConfig:{KubernetesVersion:v1.27.2 ClusterName:offline-docker-224000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP"} +{"Time":"2023-05-31T11:56:46.765049-07:00","Action":"output","Test":"TestOffline","Output":": MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:56:46.765053-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.429889 2924 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:46.765056-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.438857 2924 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:46.76506-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.483930 2924 start.go:159] libmachine.API.Create for \"offline-docker-224000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:46.765065-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.483977 2924 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:56:46.765071-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.484091 2924 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:56:46.765078-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.484134 2924 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:46.765081-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.484152 2924 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:46.765085-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.484247 2924 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:56:46.765088-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.484275 2924 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:46.765091-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.484306 2924 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:46.765096-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.484785 2924 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:56:46.7651-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.664103 2924 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:56:46.765102-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.711349 2924 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:56:46.765106-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.711355 2924 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:56:46.765109-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.711496 2924 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:46.765112-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.720050 2924 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:46.765115-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.720070 2924 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:46.765118-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.720120 2924 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:56:46.765121-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.727257 2924 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:56:46.765124-07:00","Action":"output","Test":"TestOffline","Output":" \t\n"} +{"Time":"2023-05-31T11:56:46.765127-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.727271 2924 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:46.76513-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.727292 2924 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:46.7652-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.727299 2924 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:56:46.765222-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.727339 2924 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2048 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/qemu.pid -device virtio-net-pci,netdev=net0,mac=5e:d1:20:c4:94:ee -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/offline-docker-224000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:46.765232-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.728903 2924 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:46.765241-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.728916 2924 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:46.765248-07:00","Action":"output","Test":"TestOffline","Output":" \t\n"} +{"Time":"2023-05-31T11:56:46.765253-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:44.728930 2924 client.go:171] LocalClient.Create took 244.952208ms\n"} +{"Time":"2023-05-31T11:56:46.765256-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:46.731019 2924 start.go:128] duration metric: createHost completed in 2.301141333s\n"} +{"Time":"2023-05-31T11:56:46.76526-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:46.731077 2924 start.go:83] releasing machines lock for \"offline-docker-224000\", held for 2.301679417s\n"} +{"Time":"2023-05-31T11:56:46.765267-07:00","Action":"output","Test":"TestOffline","Output":" \tW0531 11:56:46.731364 2924 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p offline-docker-224000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:46.765271-07:00","Action":"output","Test":"TestOffline","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p offline-docker-224000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:46.765276-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:46.737745 2924 out.go:177] \n"} +{"Time":"2023-05-31T11:56:46.765281-07:00","Action":"output","Test":"TestOffline","Output":" \tW0531 11:56:46.741811 2924 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:46.765287-07:00","Action":"output","Test":"TestOffline","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:46.765291-07:00","Action":"output","Test":"TestOffline","Output":" \tW0531 11:56:46.741835 2924 out.go:239] * \n"} +{"Time":"2023-05-31T11:56:46.765294-07:00","Action":"output","Test":"TestOffline","Output":" \t* \n"} +{"Time":"2023-05-31T11:56:46.7653-07:00","Action":"output","Test":"TestOffline","Output":" \tW0531 11:56:46.743120 2924 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:46.765305-07:00","Action":"output","Test":"TestOffline","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:46.765309-07:00","Action":"output","Test":"TestOffline","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:46.765313-07:00","Action":"output","Test":"TestOffline","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:46.765316-07:00","Action":"output","Test":"TestOffline","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:46.765319-07:00","Action":"output","Test":"TestOffline","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:46.765324-07:00","Action":"output","Test":"TestOffline","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:46.765327-07:00","Action":"output","Test":"TestOffline","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:46.765333-07:00","Action":"output","Test":"TestOffline","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:46.765337-07:00","Action":"output","Test":"TestOffline","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:46.765341-07:00","Action":"output","Test":"TestOffline","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:46.765345-07:00","Action":"output","Test":"TestOffline","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:46.765348-07:00","Action":"output","Test":"TestOffline","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:46.765351-07:00","Action":"output","Test":"TestOffline","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:46.765355-07:00","Action":"output","Test":"TestOffline","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:46.765359-07:00","Action":"output","Test":"TestOffline","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:46.765388-07:00","Action":"output","Test":"TestOffline","Output":" \tI0531 11:56:46.752668 2924 out.go:177] \n"} +{"Time":"2023-05-31T11:56:46.765398-07:00","Action":"output","Test":"TestOffline","Output":" \n"} +{"Time":"2023-05-31T11:56:46.765402-07:00","Action":"output","Test":"TestOffline","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:56:46.765406-07:00","Action":"output","Test":"TestOffline","Output":" aab_offline_test.go:58: out/minikube-darwin-arm64 start -p offline-docker-224000 --alsologtostderr -v=1 --memory=2048 --wait=true --driver=qemu2 failed: exit status 80\n"} +{"Time":"2023-05-31T11:56:46.765413-07:00","Action":"output","Test":"TestOffline","Output":" panic.go:522: *** TestOffline FAILED at 2023-05-31 11:56:46.764604 -0700 PDT m=+840.946051459\n"} +{"Time":"2023-05-31T11:56:46.765417-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:56:46.76542-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p offline-docker-224000 -n offline-docker-224000\n"} +{"Time":"2023-05-31T11:56:46.80552-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p offline-docker-224000 -n offline-docker-224000: exit status 7 (40.7525ms)\n"} +{"Time":"2023-05-31T11:56:46.805535-07:00","Action":"output","Test":"TestOffline","Output":" \n"} +{"Time":"2023-05-31T11:56:46.805537-07:00","Action":"output","Test":"TestOffline","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:46.805539-07:00","Action":"output","Test":"TestOffline","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:56:46.805541-07:00","Action":"output","Test":"TestOffline","Output":" \n"} +{"Time":"2023-05-31T11:56:46.805543-07:00","Action":"output","Test":"TestOffline","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:46.805544-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:56:46.805551-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:241: \"offline-docker-224000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:56:46.805553-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:175: Cleaning up \"offline-docker-224000\" profile ...\n"} +{"Time":"2023-05-31T11:56:46.805555-07:00","Action":"output","Test":"TestOffline","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p offline-docker-224000\n"} +{"Time":"2023-05-31T11:56:46.901423-07:00","Action":"output","Test":"TestOffline","Output":"--- FAIL: TestOffline (9.93s)\n"} +{"Time":"2023-05-31T11:56:46.901436-07:00","Action":"fail","Test":"TestOffline","Elapsed":9.93} +{"Time":"2023-05-31T11:56:46.90144-07:00","Action":"cont","Test":"TestForceSystemdEnv"} +{"Time":"2023-05-31T11:56:46.901441-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"=== CONT TestForceSystemdEnv\n"} +{"Time":"2023-05-31T11:56:46.901524-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:149: (dbg) Run: out/minikube-darwin-arm64 start -p force-systemd-env-429000 --memory=2048 --alsologtostderr -v=5 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:56:50.297931-07:00","Action":"output","Test":"TestHyperKitDriverInstallOrUpdate","Output":"--- PASS: TestHyperKitDriverInstallOrUpdate (8.17s)\n"} +{"Time":"2023-05-31T11:56:50.297943-07:00","Action":"pass","Test":"TestHyperKitDriverInstallOrUpdate","Elapsed":8.17} +{"Time":"2023-05-31T11:56:50.297947-07:00","Action":"cont","Test":"TestForceSystemdFlag"} +{"Time":"2023-05-31T11:56:50.297948-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"=== CONT TestForceSystemdFlag\n"} +{"Time":"2023-05-31T11:56:50.297997-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:85: (dbg) Run: out/minikube-darwin-arm64 start -p force-systemd-flag-925000 --memory=2048 --force-systemd --alsologtostderr -v=5 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:56:56.799147-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:149: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p force-systemd-env-429000 --memory=2048 --alsologtostderr -v=5 --driver=qemu2 : exit status 80 (9.895521709s)\n"} +{"Time":"2023-05-31T11:56:56.799203-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \n"} +{"Time":"2023-05-31T11:56:56.799212-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:56.799234-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* [force-systemd-env-429000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:56.799242-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:56.799251-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:56.799258-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:56.799265-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:56.799272-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:56.799279-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t - MINIKUBE_FORCE_SYSTEMD=true\n"} +{"Time":"2023-05-31T11:56:56.799285-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:56.799292-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:56.799299-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* Starting control plane node force-systemd-env-429000 in cluster force-systemd-env-429000\n"} +{"Time":"2023-05-31T11:56:56.799306-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:56.799313-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:56.79932-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:56.799327-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t\n"} +{"Time":"2023-05-31T11:56:56.799333-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* Deleting \"force-systemd-env-429000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:56.79934-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:56.799346-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:56:56.799353-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:56.79936-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t\n"} +{"Time":"2023-05-31T11:56:56.799366-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t\n"} +{"Time":"2023-05-31T11:56:56.799372-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t\n"} +{"Time":"2023-05-31T11:56:56.799378-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \n"} +{"Time":"2023-05-31T11:56:56.799384-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:56.79939-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:56:56.799397-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.930066 3083 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:56:56.799403-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.930213 3083 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:56:56.79941-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.930216 3083 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:56:56.799417-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.930219 3083 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:56:56.799424-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.930291 3083 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:56:56.799432-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.931312 3083 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:56:56.79944-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.946751 3083 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1577,\"bootTime\":1685557829,\"procs\":402,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:56:56.799453-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tW0531 11:56:46.946823 3083 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:56:56.79946-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.951744 3083 out.go:177] * [force-systemd-env-429000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:56:56.79947-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.958716 3083 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:56:56.799477-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.962576 3083 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:56:56.799484-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.958797 3083 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:56:56.799491-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.968728 3083 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:56:56.799498-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.971751 3083 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:56:56.799506-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.974674 3083 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:56:56.799516-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.977708 3083 out.go:177] - MINIKUBE_FORCE_SYSTEMD=true\n"} +{"Time":"2023-05-31T11:56:56.799523-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.981065 3083 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:56:56.799532-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.981125 3083 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:56:56.799541-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.985689 3083 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:56:56.799549-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.992739 3083 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:56:56.799556-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.992755 3083 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:56:56.799564-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.992762 3083 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:56:56.799575-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.994675 3083 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:56:56.799582-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:46.999704 3083 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:56:56.799589-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.002771 3083 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T11:56:56.799596-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.002784 3083 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:56:56.799604-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.002790 3083 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:56:56.799613-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.002793 3083 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T11:56:56.79962-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.002796 3083 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:56:56.799634-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t{Name:force-systemd-env-429000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:force-systemd-env-429000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Cont"} +{"Time":"2023-05-31T11:56:56.799648-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"ainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:56:56.799659-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.002869 3083 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:56.799667-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.010725 3083 out.go:177] * Starting control plane node force-systemd-env-429000 in cluster force-systemd-env-429000\n"} +{"Time":"2023-05-31T11:56:56.799674-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.014696 3083 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:56:56.799682-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.014716 3083 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:56:56.799692-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.014725 3083 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:56:56.799701-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.014772 3083 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:56:56.799708-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.014776 3083 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:56:56.799716-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.014824 3083 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/force-systemd-env-429000/config.json ...\n"} +{"Time":"2023-05-31T11:56:56.799725-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.014835 3083 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/force-systemd-env-429000/config.json: {Name:mkd0a2decbae202a090bec19cdacd5a02d523059 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:56.799735-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.015029 3083 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:56:56.799742-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.015040 3083 start.go:364] acquiring machines lock for force-systemd-env-429000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:56.79975-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.015065 3083 start.go:368] acquired machines lock for \"force-systemd-env-429000\" in 19.834µs\n"} +{"Time":"2023-05-31T11:56:56.799766-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.015075 3083 start.go:93] Provisioning new machine with config: \u0026{Name:force-systemd-env-429000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kube"} +{"Time":"2023-05-31T11:56:56.799781-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"rnetesConfig:{KubernetesVersion:v1.27.2 ClusterName:force-systemd-env-429000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUI"} +{"Time":"2023-05-31T11:56:56.799792-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"D:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:56:56.799801-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.015098 3083 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:56.799808-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.023702 3083 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:56.799816-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037516 3083 start.go:159] libmachine.API.Create for \"force-systemd-env-429000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:56.799823-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037537 3083 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:56:56.79983-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037604 3083 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:56:56.799838-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037622 3083 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:56.799845-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037631 3083 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:56.799852-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037654 3083 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:56:56.79986-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037672 3083 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:56.79987-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037679 3083 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:56.799879-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.037983 3083 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:56:56.799887-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.186129 3083 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:56:56.799894-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.358662 3083 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:56:56.799901-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.358672 3083 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:56:56.799909-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.358873 3083 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:56.799917-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.368240 3083 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:56.799926-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.368268 3083 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:56.799934-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.368363 3083 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:56:56.799942-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.376624 3083 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:56:56.799949-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t\n"} +{"Time":"2023-05-31T11:56:56.799955-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.376649 3083 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:56.799963-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.376681 3083 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:56.79997-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.376697 3083 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:56:56.799981-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.376737 3083 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2048 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/qemu.pid -device virtio-net-pci,netdev=net0,mac=ce:58:5e:a0:ed:87 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:56.799993-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.378711 3083 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:56.800001-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.378727 3083 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:56.800008-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t\n"} +{"Time":"2023-05-31T11:56:56.800015-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:47.378746 3083 client.go:171] LocalClient.Create took 341.21ms\n"} +{"Time":"2023-05-31T11:56:56.800022-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:49.380996 3083 start.go:128] duration metric: createHost completed in 2.365900125s\n"} +{"Time":"2023-05-31T11:56:56.800029-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:49.381073 3083 start.go:83] releasing machines lock for \"force-systemd-env-429000\", held for 2.366032833s\n"} +{"Time":"2023-05-31T11:56:56.800037-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tW0531 11:56:49.381171 3083 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:56.800044-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:49.387611 3083 out.go:177] * Deleting \"force-systemd-env-429000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:56:56.8001-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tW0531 11:56:49.407979 3083 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:56.800111-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:56.800118-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:49.408011 3083 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T11:56:56.800127-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.410281 3083 start.go:364] acquiring machines lock for force-systemd-env-429000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:56:56.800135-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.410748 3083 start.go:368] acquired machines lock for \"force-systemd-env-429000\" in 357.125µs\n"} +{"Time":"2023-05-31T11:56:56.80015-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.410882 3083 start.go:93] Provisioning new machine with config: \u0026{Name:force-systemd-env-429000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kube"} +{"Time":"2023-05-31T11:56:56.800163-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"rnetesConfig:{KubernetesVersion:v1.27.2 ClusterName:force-systemd-env-429000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUI"} +{"Time":"2023-05-31T11:56:56.800177-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"D:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:56:56.800198-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.411148 3083 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:56.800207-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.419676 3083 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:56:56.800215-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.465961 3083 start.go:159] libmachine.API.Create for \"force-systemd-env-429000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:56:56.800223-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.466002 3083 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:56:56.80023-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.466117 3083 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:56:56.800237-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.466157 3083 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:56.800244-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.466178 3083 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:56.800252-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.466266 3083 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:56:56.80026-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.466293 3083 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:56:56.800267-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.466317 3083 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:56:56.800273-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.466952 3083 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:56:56.80028-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.639796 3083 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:56:56.800285-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.735866 3083 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:56:56.80029-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.735872 3083 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:56:56.800296-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.736035 3083 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:56.800301-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.744920 3083 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:56.800307-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.744940 3083 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:56.800312-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.744998 3083 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:56:56.800317-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.752080 3083 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:56:56.800322-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t\n"} +{"Time":"2023-05-31T11:56:56.800327-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.752094 3083 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:56:56.800333-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.752105 3083 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:56.800338-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.752116 3083 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:56:56.800346-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.752159 3083 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2048 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/qemu.pid -device virtio-net-pci,netdev=net0,mac=9e:f8:90:da:5f:18 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-env-429000/disk.qcow2\n"} +{"Time":"2023-05-31T11:56:56.800354-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.753691 3083 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:56:56.800359-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.753703 3083 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:56:56.800365-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t\n"} +{"Time":"2023-05-31T11:56:56.80037-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:54.753714 3083 client.go:171] LocalClient.Create took 287.71175ms\n"} +{"Time":"2023-05-31T11:56:56.800375-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:56.755886 3083 start.go:128] duration metric: createHost completed in 2.344716458s\n"} +{"Time":"2023-05-31T11:56:56.80038-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:56.755987 3083 start.go:83] releasing machines lock for \"force-systemd-env-429000\", held for 2.345250375s\n"} +{"Time":"2023-05-31T11:56:56.800386-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tW0531 11:56:56.756454 3083 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p force-systemd-env-429000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:56.800392-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p force-systemd-env-429000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:56.800399-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:56.767128 3083 out.go:177] \n"} +{"Time":"2023-05-31T11:56:56.800405-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tW0531 11:56:56.771178 3083 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:56.800412-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:56:56.800418-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tW0531 11:56:56.771205 3083 out.go:239] * \n"} +{"Time":"2023-05-31T11:56:56.800422-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* \n"} +{"Time":"2023-05-31T11:56:56.800429-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tW0531 11:56:56.774107 3083 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:56.800437-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:56.800443-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:56.800448-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:56.800454-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:56.80046-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:56.800465-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:56.800471-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:56.800479-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:56:56.800486-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:56.800492-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:56:56.800497-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:56:56.800502-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:56.800509-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:56:56.800514-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:56:56.80052-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:56:56.800538-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tI0531 11:56:56.783264 3083 out.go:177] \n"} +{"Time":"2023-05-31T11:56:56.800543-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \n"} +{"Time":"2023-05-31T11:56:56.800548-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:56:56.800553-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:151: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p force-systemd-env-429000 --memory=2048 --alsologtostderr -v=5 --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:56:56.800563-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:104: (dbg) Run: out/minikube-darwin-arm64 -p force-systemd-env-429000 ssh \"docker info --format {{.CgroupDriver}}\"\n"} +{"Time":"2023-05-31T11:56:56.878315-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:104: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p force-systemd-env-429000 ssh \"docker info --format {{.CgroupDriver}}\": exit status 89 (79.036583ms)\n"} +{"Time":"2023-05-31T11:56:56.878331-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \n"} +{"Time":"2023-05-31T11:56:56.878333-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:56.878336-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:56:56.878338-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \t To start a cluster, run: \"minikube start -p force-systemd-env-429000\"\n"} +{"Time":"2023-05-31T11:56:56.87834-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \n"} +{"Time":"2023-05-31T11:56:56.878342-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:56.878344-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:106: failed to get docker cgroup driver. args \"out/minikube-darwin-arm64 -p force-systemd-env-429000 ssh \\\"docker info --format {{.CgroupDriver}}\\\"\": exit status 89\n"} +{"Time":"2023-05-31T11:56:56.878348-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" docker_test.go:160: *** TestForceSystemdEnv FAILED at 2023-05-31 11:56:56.878315 -0700 PDT m=+851.059908334\n"} +{"Time":"2023-05-31T11:56:56.87835-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:56:56.878366-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p force-systemd-env-429000 -n force-systemd-env-429000\n"} +{"Time":"2023-05-31T11:56:56.910949-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p force-systemd-env-429000 -n force-systemd-env-429000: exit status 7 (32.511417ms)\n"} +{"Time":"2023-05-31T11:56:56.910963-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \n"} +{"Time":"2023-05-31T11:56:56.910965-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:56:56.910967-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:56:56.910969-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" \n"} +{"Time":"2023-05-31T11:56:56.91097-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:56:56.910972-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:56:56.910975-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:241: \"force-systemd-env-429000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:56:56.910976-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:175: Cleaning up \"force-systemd-env-429000\" profile ...\n"} +{"Time":"2023-05-31T11:56:56.910981-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p force-systemd-env-429000\n"} +{"Time":"2023-05-31T11:56:57.006236-07:00","Action":"output","Test":"TestForceSystemdEnv","Output":"--- FAIL: TestForceSystemdEnv (10.10s)\n"} +{"Time":"2023-05-31T11:56:57.006251-07:00","Action":"fail","Test":"TestForceSystemdEnv","Elapsed":10.1} +{"Time":"2023-05-31T11:56:57.006254-07:00","Action":"cont","Test":"TestDockerFlags"} +{"Time":"2023-05-31T11:56:57.006256-07:00","Action":"output","Test":"TestDockerFlags","Output":"=== CONT TestDockerFlags\n"} +{"Time":"2023-05-31T11:56:57.00631-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:45: (dbg) Run: out/minikube-darwin-arm64 start -p docker-flags-240000 --cache-images=false --memory=2048 --install-addons=false --wait=false --docker-env=FOO=BAR --docker-env=BAZ=BAT --docker-opt=debug --docker-opt=icc=true --alsologtostderr -v=5 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:57:01.988201-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:85: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p force-systemd-flag-925000 --memory=2048 --force-systemd --alsologtostderr -v=5 --driver=qemu2 : exit status 80 (11.687983584s)\n"} +{"Time":"2023-05-31T11:57:01.988255-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \n"} +{"Time":"2023-05-31T11:57:01.988264-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:01.988271-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* [force-systemd-flag-925000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:57:01.988279-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:57:01.988286-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:57:01.988295-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:57:01.988304-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:57:01.988311-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:57:01.988331-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:57:01.988337-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:57:01.988344-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:57:01.988351-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* Starting control plane node force-systemd-flag-925000 in cluster force-systemd-flag-925000\n"} +{"Time":"2023-05-31T11:57:01.988358-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:01.988366-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:57:01.988372-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:01.988379-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t\n"} +{"Time":"2023-05-31T11:57:01.988385-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* Deleting \"force-systemd-flag-925000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:57:01.988392-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:01.988399-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:57:01.988406-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:01.988412-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t\n"} +{"Time":"2023-05-31T11:57:01.988418-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t\n"} +{"Time":"2023-05-31T11:57:01.988424-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t\n"} +{"Time":"2023-05-31T11:57:01.98843-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \n"} +{"Time":"2023-05-31T11:57:01.988437-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:01.988444-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:57:01.98845-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.323575 3101 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:57:01.988458-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.323708 3101 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:57:01.988465-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.323711 3101 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:57:01.988472-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.323714 3101 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:57:01.988479-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.323779 3101 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:57:01.988487-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.324782 3101 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:57:01.988497-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.339477 3101 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1581,\"bootTime\":1685557829,\"procs\":400,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:57:01.988511-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tW0531 11:56:50.339540 3101 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:57:01.988542-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.348900 3101 out.go:177] * [force-systemd-flag-925000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:57:01.98855-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.351953 3101 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:57:01.988557-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.355927 3101 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:57:01.988564-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.352005 3101 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:57:01.988573-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.361862 3101 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:57:01.988582-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.364913 3101 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:57:01.988589-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.367915 3101 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:57:01.988597-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.370885 3101 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:57:01.988604-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.374245 3101 config.go:182] Loaded profile config \"force-systemd-env-429000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:57:01.988613-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.374311 3101 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:57:01.988621-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.374366 3101 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:57:01.988628-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.378913 3101 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:57:01.988634-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.385922 3101 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:57:01.988642-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.385928 3101 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:57:01.988654-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.385933 3101 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:57:01.988661-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.387791 3101 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:57:01.988669-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.390922 3101 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:57:01.988675-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.392299 3101 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T11:57:01.988682-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.392311 3101 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:57:01.98869-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.392319 3101 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:57:01.988698-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.392324 3101 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T11:57:01.988705-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.392330 3101 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:57:01.988718-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t{Name:force-systemd-flag-925000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:force-systemd-flag-925000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Co"} +{"Time":"2023-05-31T11:57:01.988732-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"ntainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:57:01.988743-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.392399 3101 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:57:01.988751-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.399924 3101 out.go:177] * Starting control plane node force-systemd-flag-925000 in cluster force-systemd-flag-925000\n"} +{"Time":"2023-05-31T11:57:01.988758-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.403915 3101 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:57:01.988766-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.403936 3101 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:57:01.988774-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.403947 3101 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:57:01.98881-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404005 3101 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:57:01.98882-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404010 3101 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:57:01.988829-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404061 3101 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/force-systemd-flag-925000/config.json ...\n"} +{"Time":"2023-05-31T11:57:01.988837-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404072 3101 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/force-systemd-flag-925000/config.json: {Name:mkd5da7a96e33763c161ce5f70ae8b1ca475e265 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:57:01.988846-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404254 3101 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:57:01.988854-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404267 3101 start.go:364] acquiring machines lock for force-systemd-flag-925000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:57:01.988862-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404298 3101 start.go:368] acquired machines lock for \"force-systemd-flag-925000\" in 25.125µs\n"} +{"Time":"2023-05-31T11:57:01.988878-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404309 3101 start.go:93] Provisioning new machine with config: \u0026{Name:force-systemd-flag-925000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kub"} +{"Time":"2023-05-31T11:57:01.988892-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"ernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:force-systemd-flag-925000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p Mount"} +{"Time":"2023-05-31T11:57:01.988903-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"UID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:57:01.988912-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.404334 3101 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:57:01.98892-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.412896 3101 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:01.988927-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.429979 3101 start.go:159] libmachine.API.Create for \"force-systemd-flag-925000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:57:01.988935-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.430011 3101 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:57:01.988942-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.430070 3101 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:57:01.988949-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.430089 3101 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:57:01.988957-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.430099 3101 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:57:01.988968-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.430146 3101 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:57:01.988975-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.430161 3101 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:57:01.988983-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.430168 3101 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:57:01.988991-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.430479 3101 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:57:01.988999-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.577723 3101 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:57:01.989005-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.611743 3101 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:57:01.989012-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.611753 3101 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:57:01.98902-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.611886 3101 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:01.989028-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.620341 3101 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:57:01.989034-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.620357 3101 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:57:01.989042-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.620407 3101 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:57:01.989049-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.627518 3101 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:57:01.989056-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t\n"} +{"Time":"2023-05-31T11:57:01.989062-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.627530 3101 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:57:01.98907-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.627551 3101 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:01.989078-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.627559 3101 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:57:01.989089-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.627598 3101 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2048 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/qemu.pid -device virtio-net-pci,netdev=net0,mac=1a:3e:a9:97:b8:26 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:01.989101-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.629117 3101 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:57:01.989109-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.629133 3101 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:01.989116-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t\n"} +{"Time":"2023-05-31T11:57:01.989123-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:50.629149 3101 client.go:171] LocalClient.Create took 199.13825ms\n"} +{"Time":"2023-05-31T11:57:01.98913-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:52.631308 3101 start.go:128] duration metric: createHost completed in 2.226987833s\n"} +{"Time":"2023-05-31T11:57:01.989138-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:52.631384 3101 start.go:83] releasing machines lock for \"force-systemd-flag-925000\", held for 2.227088458s\n"} +{"Time":"2023-05-31T11:57:01.989147-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tW0531 11:56:52.631432 3101 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:01.989157-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:52.642527 3101 out.go:177] * Deleting \"force-systemd-flag-925000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:57:01.989164-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tW0531 11:56:52.662581 3101 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:01.989173-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:01.98918-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:52.662602 3101 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T11:57:01.989188-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:57.664709 3101 start.go:364] acquiring machines lock for force-systemd-flag-925000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:57:01.989196-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.556725 3101 start.go:368] acquired machines lock for \"force-systemd-flag-925000\" in 1.89200675s\n"} +{"Time":"2023-05-31T11:57:01.989211-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.556871 3101 start.go:93] Provisioning new machine with config: \u0026{Name:force-systemd-flag-925000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kub"} +{"Time":"2023-05-31T11:57:01.989225-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"ernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:force-systemd-flag-925000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p Mount"} +{"Time":"2023-05-31T11:57:01.989236-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"UID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:57:01.989244-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.557198 3101 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:57:01.989251-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.562776 3101 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:01.989258-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.610971 3101 start.go:159] libmachine.API.Create for \"force-systemd-flag-925000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:57:01.989265-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.611018 3101 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:57:01.989273-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.611187 3101 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:57:01.989293-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.611236 3101 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:57:01.989301-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.611261 3101 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:57:01.989309-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.611350 3101 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:57:01.989316-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.611382 3101 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:57:01.989323-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.611407 3101 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:57:01.989332-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.611902 3101 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:57:01.989341-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.777128 3101 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:57:01.989349-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.920804 3101 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:57:01.989357-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.920810 3101 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:57:01.989365-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.921007 3101 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:01.989373-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.929922 3101 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:57:01.98938-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.929940 3101 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:57:01.989388-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.929994 3101 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:57:01.989396-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.937139 3101 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:57:01.989405-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t\n"} +{"Time":"2023-05-31T11:57:01.989412-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.937155 3101 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:57:01.989419-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.937169 3101 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:01.98943-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.937177 3101 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:57:01.98944-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.937211 3101 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2048 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/qemu.pid -device virtio-net-pci,netdev=net0,mac=de:c6:61:06:34:34 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/force-systemd-flag-925000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:01.989451-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.938769 3101 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:57:01.989458-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.938785 3101 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:01.989465-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t\n"} +{"Time":"2023-05-31T11:57:01.989472-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:56:59.938796 3101 client.go:171] LocalClient.Create took 327.77525ms\n"} +{"Time":"2023-05-31T11:57:01.989478-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:57:01.940931 3101 start.go:128] duration metric: createHost completed in 2.3837425s\n"} +{"Time":"2023-05-31T11:57:01.989486-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:57:01.941043 3101 start.go:83] releasing machines lock for \"force-systemd-flag-925000\", held for 2.384279667s\n"} +{"Time":"2023-05-31T11:57:01.989494-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tW0531 11:57:01.941453 3101 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p force-systemd-flag-925000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:01.989503-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p force-systemd-flag-925000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:01.989511-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:57:01.957983 3101 out.go:177] \n"} +{"Time":"2023-05-31T11:57:01.989518-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tW0531 11:57:01.962098 3101 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:01.989528-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:01.989536-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tW0531 11:57:01.962179 3101 out.go:239] * \n"} +{"Time":"2023-05-31T11:57:01.989543-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* \n"} +{"Time":"2023-05-31T11:57:01.98955-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tW0531 11:57:01.964889 3101 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:57:01.98956-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:01.989567-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:57:01.989575-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:57:01.989582-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:01.989647-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:57:01.989656-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:01.989665-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:57:01.989675-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:57:01.989685-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:01.989692-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:57:01.9897-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:57:01.989707-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:01.989715-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:57:01.989724-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:01.989732-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:57:01.989741-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tI0531 11:57:01.973005 3101 out.go:177] \n"} +{"Time":"2023-05-31T11:57:01.989748-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \n"} +{"Time":"2023-05-31T11:57:01.989754-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:57:01.989762-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:87: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p force-systemd-flag-925000 --memory=2048 --force-systemd --alsologtostderr -v=5 --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:57:01.989776-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:104: (dbg) Run: out/minikube-darwin-arm64 -p force-systemd-flag-925000 ssh \"docker info --format {{.CgroupDriver}}\"\n"} +{"Time":"2023-05-31T11:57:02.066969-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:104: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p force-systemd-flag-925000 ssh \"docker info --format {{.CgroupDriver}}\": exit status 89 (78.644458ms)\n"} +{"Time":"2023-05-31T11:57:02.066985-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \n"} +{"Time":"2023-05-31T11:57:02.066988-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:02.066991-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:57:02.066993-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \t To start a cluster, run: \"minikube start -p force-systemd-flag-925000\"\n"} +{"Time":"2023-05-31T11:57:02.066995-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \n"} +{"Time":"2023-05-31T11:57:02.066997-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:02.067-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:106: failed to get docker cgroup driver. args \"out/minikube-darwin-arm64 -p force-systemd-flag-925000 ssh \\\"docker info --format {{.CgroupDriver}}\\\"\": exit status 89\n"} +{"Time":"2023-05-31T11:57:02.067039-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" docker_test.go:100: *** TestForceSystemdFlag FAILED at 2023-05-31 11:57:02.066985 -0700 PDT m=+856.248653251\n"} +{"Time":"2023-05-31T11:57:02.067043-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:57:02.067062-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p force-systemd-flag-925000 -n force-systemd-flag-925000\n"} +{"Time":"2023-05-31T11:57:02.101433-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p force-systemd-flag-925000 -n force-systemd-flag-925000: exit status 7 (34.304833ms)\n"} +{"Time":"2023-05-31T11:57:02.10145-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \n"} +{"Time":"2023-05-31T11:57:02.101452-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:02.101454-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:57:02.101455-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" \n"} +{"Time":"2023-05-31T11:57:02.101457-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:02.101458-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:57:02.101461-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:241: \"force-systemd-flag-925000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:57:02.101463-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:175: Cleaning up \"force-systemd-flag-925000\" profile ...\n"} +{"Time":"2023-05-31T11:57:02.101479-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p force-systemd-flag-925000\n"} +{"Time":"2023-05-31T11:57:02.195749-07:00","Action":"output","Test":"TestForceSystemdFlag","Output":"--- FAIL: TestForceSystemdFlag (11.90s)\n"} +{"Time":"2023-05-31T11:57:02.195764-07:00","Action":"fail","Test":"TestForceSystemdFlag","Elapsed":11.9} +{"Time":"2023-05-31T11:57:02.195767-07:00","Action":"cont","Test":"TestCertExpiration"} +{"Time":"2023-05-31T11:57:02.195769-07:00","Action":"output","Test":"TestCertExpiration","Output":"=== CONT TestCertExpiration\n"} +{"Time":"2023-05-31T11:57:02.195828-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:123: (dbg) Run: out/minikube-darwin-arm64 start -p cert-expiration-741000 --memory=2048 --cert-expiration=3m --driver=qemu2 \n"} +{"Time":"2023-05-31T11:57:04.960546-07:00","Action":"output","Test":"TestCertExpiration","Output":"E0531 11:57:04.960506 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:57:06.91815-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:45: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p docker-flags-240000 --cache-images=false --memory=2048 --install-addons=false --wait=false --docker-env=FOO=BAR --docker-env=BAZ=BAT --docker-opt=debug --docker-opt=icc=true --alsologtostderr -v=5 --driver=qemu2 : exit status 80 (9.909517917s)\n"} +{"Time":"2023-05-31T11:57:06.918211-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:06.91822-07:00","Action":"output","Test":"TestDockerFlags","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:06.918229-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* [docker-flags-240000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:57:06.918237-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:57:06.918245-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:57:06.918252-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:57:06.91826-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:57:06.918268-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:57:06.918274-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:57:06.918281-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:57:06.918288-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:57:06.918294-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* Starting control plane node docker-flags-240000 in cluster docker-flags-240000\n"} +{"Time":"2023-05-31T11:57:06.918313-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:06.918321-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:57:06.91833-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:06.918337-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t\n"} +{"Time":"2023-05-31T11:57:06.918343-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* Deleting \"docker-flags-240000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:57:06.918354-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:06.918362-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:57:06.918368-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:06.918375-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t\n"} +{"Time":"2023-05-31T11:57:06.918381-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t\n"} +{"Time":"2023-05-31T11:57:06.918387-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t\n"} +{"Time":"2023-05-31T11:57:06.918393-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:06.9184-07:00","Action":"output","Test":"TestDockerFlags","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:06.918406-07:00","Action":"output","Test":"TestDockerFlags","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:57:06.918412-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.033547 3122 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T11:57:06.918419-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.033677 3122 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:57:06.918426-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.033680 3122 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T11:57:06.918434-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.033682 3122 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T11:57:06.918441-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.033752 3122 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T11:57:06.918449-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.034770 3122 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T11:57:06.918457-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.049808 3122 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1588,\"bootTime\":1685557829,\"procs\":395,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T11:57:06.918471-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tW0531 11:56:57.049894 3122 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T11:57:06.918479-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.055464 3122 out.go:177] * [docker-flags-240000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:57:06.918488-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.061380 3122 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:57:06.918495-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.061419 3122 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T11:57:06.918502-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.065458 3122 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:57:06.91851-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.068406 3122 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:57:06.918517-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.071387 3122 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:57:06.918524-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.074394 3122 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:57:06.918531-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.075817 3122 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:57:06.918538-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.079697 3122 config.go:182] Loaded profile config \"force-systemd-flag-925000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:57:06.918547-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.079758 3122 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T11:57:06.918555-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.079800 3122 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T11:57:06.918562-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.084360 3122 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:57:06.918569-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.089382 3122 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T11:57:06.918577-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.089390 3122 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T11:57:06.918587-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.089396 3122 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T11:57:06.918595-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.091207 3122 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T11:57:06.918603-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.094361 3122 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:57:06.91861-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.097471 3122 start_flags.go:914] Waiting for no components: map[apiserver:false apps_running:false default_sa:false extra:false kubelet:false node_ready:false system_pods:false]\n"} +{"Time":"2023-05-31T11:57:06.918618-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.097487 3122 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T11:57:06.918625-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.097498 3122 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T11:57:06.918636-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.097504 3122 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T11:57:06.918643-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.097511 3122 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T11:57:06.918657-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t{Name:docker-flags-240000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[FOO=BAR BAZ=BAT] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[debug icc=true] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:docker-flags-240000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain"} +{"Time":"2023-05-31T11:57:06.918674-07:00","Action":"output","Test":"TestDockerFlags","Output":":cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:false EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:false apps_running:false default_sa:false extra:false kubelet:false node_ready:false system_pods:false] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/ru"} +{"Time":"2023-05-31T11:57:06.918685-07:00","Action":"output","Test":"TestDockerFlags","Output":"n/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T11:57:06.918692-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.097603 3122 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:57:06.9187-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.105408 3122 out.go:177] * Starting control plane node docker-flags-240000 in cluster docker-flags-240000\n"} +{"Time":"2023-05-31T11:57:06.918707-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109374 3122 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T11:57:06.918715-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109396 3122 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T11:57:06.918723-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109408 3122 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T11:57:06.918731-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109470 3122 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T11:57:06.91874-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109476 3122 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T11:57:06.918748-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109534 3122 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/docker-flags-240000/config.json ...\n"} +{"Time":"2023-05-31T11:57:06.918756-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109546 3122 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/docker-flags-240000/config.json: {Name:mk669dc6cbad2e0c8693bbb27aeee897381c014f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:57:06.918764-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109747 3122 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T11:57:06.918771-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109760 3122 start.go:364] acquiring machines lock for docker-flags-240000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:57:06.91878-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109788 3122 start.go:368] acquired machines lock for \"docker-flags-240000\" in 23.291µs\n"} +{"Time":"2023-05-31T11:57:06.918795-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109799 3122 start.go:93] Provisioning new machine with config: \u0026{Name:docker-flags-240000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[FOO=BAR BAZ=BAT] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[debug icc=true] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root"} +{"Time":"2023-05-31T11:57:06.918809-07:00","Action":"output","Test":"TestDockerFlags","Output":" SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:docker-flags-240000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:false EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:false apps_running:false default_sa:false extra:false kubelet:false node_ready:false system_pods:false] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion"} +{"Time":"2023-05-31T11:57:06.918821-07:00","Action":"output","Test":"TestDockerFlags","Output":":9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:57:06.91883-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.109823 3122 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:57:06.918838-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.117370 3122 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:06.918845-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133280 3122 start.go:159] libmachine.API.Create for \"docker-flags-240000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:57:06.918852-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133307 3122 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:57:06.918859-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133370 3122 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:57:06.918867-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133391 3122 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:57:06.918875-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133400 3122 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:57:06.918882-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133439 3122 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:57:06.918889-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133453 3122 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:57:06.918899-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133459 3122 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:57:06.918907-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.133767 3122 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:57:06.918916-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.304590 3122 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:57:06.918923-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.535700 3122 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:57:06.91893-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.535712 3122 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:57:06.918938-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.535919 3122 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:06.918945-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.545242 3122 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:57:06.918953-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.545261 3122 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:57:06.91896-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.545327 3122 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:57:06.918968-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.552641 3122 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:57:06.918975-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t\n"} +{"Time":"2023-05-31T11:57:06.918981-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.552654 3122 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:57:06.918989-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.552675 3122 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:06.918997-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.552688 3122 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:57:06.919007-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.552726 3122 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2048 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/qemu.pid -device virtio-net-pci,netdev=net0,mac=92:13:39:e5:15:ff -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:06.919018-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.554320 3122 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:57:06.919025-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.554338 3122 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:06.919031-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t\n"} +{"Time":"2023-05-31T11:57:06.919038-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:57.554357 3122 client.go:171] LocalClient.Create took 421.05ms\n"} +{"Time":"2023-05-31T11:57:06.919045-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:59.556540 3122 start.go:128] duration metric: createHost completed in 2.4467345s\n"} +{"Time":"2023-05-31T11:57:06.919052-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:59.556599 3122 start.go:83] releasing machines lock for \"docker-flags-240000\", held for 2.446837542s\n"} +{"Time":"2023-05-31T11:57:06.919059-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tW0531 11:56:59.556662 3122 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:06.919067-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:59.574671 3122 out.go:177] * Deleting \"docker-flags-240000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:57:06.919077-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tW0531 11:56:59.589577 3122 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:06.919084-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:06.91909-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:56:59.589597 3122 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T11:57:06.919095-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.591782 3122 start.go:364] acquiring machines lock for docker-flags-240000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T11:57:06.9191-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.598695 3122 start.go:368] acquired machines lock for \"docker-flags-240000\" in 6.793625ms\n"} +{"Time":"2023-05-31T11:57:06.919111-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.598810 3122 start.go:93] Provisioning new machine with config: \u0026{Name:docker-flags-240000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2048 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[FOO=BAR BAZ=BAT] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[debug icc=true] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root"} +{"Time":"2023-05-31T11:57:06.919122-07:00","Action":"output","Test":"TestDockerFlags","Output":" SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:docker-flags-240000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:false EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:false apps_running:false default_sa:false extra:false kubelet:false node_ready:false system_pods:false] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion"} +{"Time":"2023-05-31T11:57:06.919131-07:00","Action":"output","Test":"TestDockerFlags","Output":":9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T11:57:06.919143-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.599080 3122 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:57:06.919149-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.606665 3122 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:06.919154-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.653295 3122 start.go:159] libmachine.API.Create for \"docker-flags-240000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T11:57:06.91916-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.653354 3122 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T11:57:06.919165-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.653511 3122 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T11:57:06.919171-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.653554 3122 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:57:06.919176-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.653575 3122 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:57:06.919182-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.653683 3122 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T11:57:06.919189-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.653718 3122 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T11:57:06.919195-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.653732 3122 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T11:57:06.919201-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.654236 3122 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T11:57:06.919206-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.807654 3122 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T11:57:06.919211-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.858140 3122 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T11:57:06.919216-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.858147 3122 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T11:57:06.919222-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.858296 3122 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:06.919227-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.866842 3122 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:57:06.919232-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.866855 3122 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:57:06.91924-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.866895 3122 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T11:57:06.919245-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.874021 3122 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T11:57:06.91925-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t\n"} +{"Time":"2023-05-31T11:57:06.919254-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.874035 3122 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T11:57:06.91926-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.874045 3122 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:06.919266-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.874054 3122 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T11:57:06.919274-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.874100 3122 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2048 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/qemu.pid -device virtio-net-pci,netdev=net0,mac=fa:f5:2f:a4:f1:80 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/docker-flags-240000/disk.qcow2\n"} +{"Time":"2023-05-31T11:57:06.919282-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.875617 3122 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T11:57:06.919287-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.875633 3122 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:06.919292-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t\n"} +{"Time":"2023-05-31T11:57:06.919297-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:04.875643 3122 client.go:171] LocalClient.Create took 222.287125ms\n"} +{"Time":"2023-05-31T11:57:06.919302-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:06.877820 3122 start.go:128] duration metric: createHost completed in 2.278727958s\n"} +{"Time":"2023-05-31T11:57:06.919307-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:06.877917 3122 start.go:83] releasing machines lock for \"docker-flags-240000\", held for 2.279228667s\n"} +{"Time":"2023-05-31T11:57:06.919316-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tW0531 11:57:06.878396 3122 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p docker-flags-240000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:06.919323-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p docker-flags-240000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:06.919329-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:06.886999 3122 out.go:177] \n"} +{"Time":"2023-05-31T11:57:06.919335-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tW0531 11:57:06.890788 3122 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:06.919342-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:06.919348-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tW0531 11:57:06.890816 3122 out.go:239] * \n"} +{"Time":"2023-05-31T11:57:06.919352-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* \n"} +{"Time":"2023-05-31T11:57:06.919359-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tW0531 11:57:06.893491 3122 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:57:06.919367-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:06.919375-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:57:06.91938-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:57:06.919386-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:06.919392-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:57:06.919397-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:06.919403-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:57:06.919411-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:57:06.919418-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:06.919423-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:57:06.91943-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:57:06.919435-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:06.91944-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:57:06.919445-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:06.919451-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:57:06.919459-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tI0531 11:57:06.901809 3122 out.go:177] \n"} +{"Time":"2023-05-31T11:57:06.919464-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:06.919468-07:00","Action":"output","Test":"TestDockerFlags","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:57:06.919477-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:47: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p docker-flags-240000 --cache-images=false --memory=2048 --install-addons=false --wait=false --docker-env=FOO=BAR --docker-env=BAZ=BAT --docker-opt=debug --docker-opt=icc=true --alsologtostderr -v=5 --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:57:06.919484-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:50: (dbg) Run: out/minikube-darwin-arm64 -p docker-flags-240000 ssh \"sudo systemctl show docker --property=Environment --no-pager\"\n"} +{"Time":"2023-05-31T11:57:06.994996-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:50: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p docker-flags-240000 ssh \"sudo systemctl show docker --property=Environment --no-pager\": exit status 89 (76.68925ms)\n"} +{"Time":"2023-05-31T11:57:06.995011-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:06.995014-07:00","Action":"output","Test":"TestDockerFlags","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:06.995016-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:57:06.995018-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t To start a cluster, run: \"minikube start -p docker-flags-240000\"\n"} +{"Time":"2023-05-31T11:57:06.99502-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:06.995022-07:00","Action":"output","Test":"TestDockerFlags","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:06.995024-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:52: failed to 'systemctl show docker' inside minikube. args \"out/minikube-darwin-arm64 -p docker-flags-240000 ssh \\\"sudo systemctl show docker --property=Environment --no-pager\\\"\": exit status 89\n"} +{"Time":"2023-05-31T11:57:06.995029-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:57: expected env key/value \"FOO=BAR\" to be passed to minikube's docker and be included in: *\"* The control plane node must be running for this command\\n To start a cluster, run: \\\"minikube start -p docker-flags-240000\\\"\\n\"*.\n"} +{"Time":"2023-05-31T11:57:06.995032-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:57: expected env key/value \"BAZ=BAT\" to be passed to minikube's docker and be included in: *\"* The control plane node must be running for this command\\n To start a cluster, run: \\\"minikube start -p docker-flags-240000\\\"\\n\"*.\n"} +{"Time":"2023-05-31T11:57:06.995035-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:61: (dbg) Run: out/minikube-darwin-arm64 -p docker-flags-240000 ssh \"sudo systemctl show docker --property=ExecStart --no-pager\"\n"} +{"Time":"2023-05-31T11:57:07.037925-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:61: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p docker-flags-240000 ssh \"sudo systemctl show docker --property=ExecStart --no-pager\": exit status 89 (42.800666ms)\n"} +{"Time":"2023-05-31T11:57:07.037938-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:07.03794-07:00","Action":"output","Test":"TestDockerFlags","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:07.037941-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:57:07.037943-07:00","Action":"output","Test":"TestDockerFlags","Output":" \t To start a cluster, run: \"minikube start -p docker-flags-240000\"\n"} +{"Time":"2023-05-31T11:57:07.037945-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:07.037946-07:00","Action":"output","Test":"TestDockerFlags","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:07.037948-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:63: failed on the second 'systemctl show docker' inside minikube. args \"out/minikube-darwin-arm64 -p docker-flags-240000 ssh \\\"sudo systemctl show docker --property=ExecStart --no-pager\\\"\": exit status 89\n"} +{"Time":"2023-05-31T11:57:07.037951-07:00","Action":"output","Test":"TestDockerFlags","Output":" docker_test.go:67: expected \"out/minikube-darwin-arm64 -p docker-flags-240000 ssh \\\"sudo systemctl show docker --property=ExecStart --no-pager\\\"\" output to have include *--debug* . output: \"* The control plane node must be running for this command\\n To start a cluster, run: \\\"minikube start -p docker-flags-240000\\\"\\n\"\n"} +{"Time":"2023-05-31T11:57:07.037976-07:00","Action":"output","Test":"TestDockerFlags","Output":" panic.go:522: *** TestDockerFlags FAILED at 2023-05-31 11:57:07.037952 -0700 PDT m=+861.219692167\n"} +{"Time":"2023-05-31T11:57:07.037979-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:57:07.038044-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p docker-flags-240000 -n docker-flags-240000\n"} +{"Time":"2023-05-31T11:57:07.066158-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p docker-flags-240000 -n docker-flags-240000: exit status 7 (28.073792ms)\n"} +{"Time":"2023-05-31T11:57:07.066169-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:07.066171-07:00","Action":"output","Test":"TestDockerFlags","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:07.066173-07:00","Action":"output","Test":"TestDockerFlags","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:57:07.066174-07:00","Action":"output","Test":"TestDockerFlags","Output":" \n"} +{"Time":"2023-05-31T11:57:07.066176-07:00","Action":"output","Test":"TestDockerFlags","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:07.066177-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:57:07.066179-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:241: \"docker-flags-240000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:57:07.066181-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:175: Cleaning up \"docker-flags-240000\" profile ...\n"} +{"Time":"2023-05-31T11:57:07.066191-07:00","Action":"output","Test":"TestDockerFlags","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p docker-flags-240000\n"} +{"Time":"2023-05-31T11:57:07.15995-07:00","Action":"cont","Test":"TestCertOptions"} +{"Time":"2023-05-31T11:57:07.159974-07:00","Action":"output","Test":"TestCertOptions","Output":"=== CONT TestCertOptions\n"} +{"Time":"2023-05-31T11:57:07.159983-07:00","Action":"output","Test":"TestDockerFlags","Output":"--- FAIL: TestDockerFlags (10.15s)\n"} +{"Time":"2023-05-31T11:57:07.160052-07:00","Action":"fail","Test":"TestDockerFlags","Elapsed":10.15} +{"Time":"2023-05-31T11:57:07.160059-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:49: (dbg) Run: out/minikube-darwin-arm64 start -p cert-options-941000 --memory=2048 --apiserver-ips=127.0.0.1 --apiserver-ips=192.168.15.15 --apiserver-names=localhost --apiserver-names=www.google.com --apiserver-port=8555 --driver=qemu2 \n"} +{"Time":"2023-05-31T11:57:11.976929-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:123: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p cert-expiration-741000 --memory=2048 --cert-expiration=3m --driver=qemu2 : exit status 80 (9.7805625s)\n"} +{"Time":"2023-05-31T11:57:11.97699-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T11:57:11.977-07:00","Action":"output","Test":"TestCertExpiration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:11.977008-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* [cert-expiration-741000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:57:11.977028-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:57:11.977041-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:57:11.977049-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:57:11.977056-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:57:11.977064-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:57:11.97707-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:57:11.977077-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:57:11.977084-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:57:11.977091-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Starting control plane node cert-expiration-741000 in cluster cert-expiration-741000\n"} +{"Time":"2023-05-31T11:57:11.977099-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:11.977105-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:57:11.977112-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:11.97712-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T11:57:11.977127-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Deleting \"cert-expiration-741000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:57:11.977135-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:11.977141-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:57:11.977147-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:11.977155-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T11:57:11.977161-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T11:57:11.977168-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T11:57:11.977174-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T11:57:11.97718-07:00","Action":"output","Test":"TestCertExpiration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:11.977187-07:00","Action":"output","Test":"TestCertExpiration","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:57:11.977194-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:11.977203-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p cert-expiration-741000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:11.977213-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:11.97722-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* \n"} +{"Time":"2023-05-31T11:57:11.977228-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:57:11.977277-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:11.977286-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:57:11.977293-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:57:11.9773-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:11.977307-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:57:11.977314-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:11.977322-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:57:11.977331-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T11:57:11.977337-07:00","Action":"output","Test":"TestCertExpiration","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:57:11.977344-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:125: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p cert-expiration-741000 --memory=2048 --cert-expiration=3m --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:57:16.853227-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:49: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p cert-options-941000 --memory=2048 --apiserver-ips=127.0.0.1 --apiserver-ips=192.168.15.15 --apiserver-names=localhost --apiserver-names=www.google.com --apiserver-port=8555 --driver=qemu2 : exit status 80 (9.692682417s)\n"} +{"Time":"2023-05-31T11:57:16.853284-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:16.853294-07:00","Action":"output","Test":"TestCertOptions","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:16.853302-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* [cert-options-941000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T11:57:16.853309-07:00","Action":"output","Test":"TestCertOptions","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T11:57:16.853317-07:00","Action":"output","Test":"TestCertOptions","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T11:57:16.853325-07:00","Action":"output","Test":"TestCertOptions","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T11:57:16.853334-07:00","Action":"output","Test":"TestCertOptions","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T11:57:16.853341-07:00","Action":"output","Test":"TestCertOptions","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T11:57:16.853348-07:00","Action":"output","Test":"TestCertOptions","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T11:57:16.853354-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T11:57:16.853361-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T11:57:16.853368-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* Starting control plane node cert-options-941000 in cluster cert-options-941000\n"} +{"Time":"2023-05-31T11:57:16.853375-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:16.853381-07:00","Action":"output","Test":"TestCertOptions","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:57:16.853388-07:00","Action":"output","Test":"TestCertOptions","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:16.853394-07:00","Action":"output","Test":"TestCertOptions","Output":" \t\n"} +{"Time":"2023-05-31T11:57:16.853401-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* Deleting \"cert-options-941000\" in qemu2 ...\n"} +{"Time":"2023-05-31T11:57:16.853409-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T11:57:16.853416-07:00","Action":"output","Test":"TestCertOptions","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T11:57:16.853422-07:00","Action":"output","Test":"TestCertOptions","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T11:57:16.853429-07:00","Action":"output","Test":"TestCertOptions","Output":" \t\n"} +{"Time":"2023-05-31T11:57:16.853435-07:00","Action":"output","Test":"TestCertOptions","Output":" \t\n"} +{"Time":"2023-05-31T11:57:16.853441-07:00","Action":"output","Test":"TestCertOptions","Output":" \t\n"} +{"Time":"2023-05-31T11:57:16.853461-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:16.853467-07:00","Action":"output","Test":"TestCertOptions","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:16.853474-07:00","Action":"output","Test":"TestCertOptions","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T11:57:16.85348-07:00","Action":"output","Test":"TestCertOptions","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:16.853489-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p cert-options-941000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:16.85353-07:00","Action":"output","Test":"TestCertOptions","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T11:57:16.853539-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* \n"} +{"Time":"2023-05-31T11:57:16.853547-07:00","Action":"output","Test":"TestCertOptions","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T11:57:16.85356-07:00","Action":"output","Test":"TestCertOptions","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:16.853569-07:00","Action":"output","Test":"TestCertOptions","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T11:57:16.853576-07:00","Action":"output","Test":"TestCertOptions","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T11:57:16.853583-07:00","Action":"output","Test":"TestCertOptions","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:16.85359-07:00","Action":"output","Test":"TestCertOptions","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T11:57:16.853597-07:00","Action":"output","Test":"TestCertOptions","Output":" \t│ │\n"} +{"Time":"2023-05-31T11:57:16.853605-07:00","Action":"output","Test":"TestCertOptions","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T11:57:16.853614-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:16.85362-07:00","Action":"output","Test":"TestCertOptions","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T11:57:16.853633-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:51: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p cert-options-941000 --memory=2048 --apiserver-ips=127.0.0.1 --apiserver-ips=192.168.15.15 --apiserver-names=localhost --apiserver-names=www.google.com --apiserver-port=8555 --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T11:57:16.853641-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:60: (dbg) Run: out/minikube-darwin-arm64 -p cert-options-941000 ssh \"openssl x509 -text -noout -in /var/lib/minikube/certs/apiserver.crt\"\n"} +{"Time":"2023-05-31T11:57:16.934304-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:60: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p cert-options-941000 ssh \"openssl x509 -text -noout -in /var/lib/minikube/certs/apiserver.crt\": exit status 89 (80.924417ms)\n"} +{"Time":"2023-05-31T11:57:16.934324-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:16.934327-07:00","Action":"output","Test":"TestCertOptions","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:16.93433-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:57:16.934332-07:00","Action":"output","Test":"TestCertOptions","Output":" \t To start a cluster, run: \"minikube start -p cert-options-941000\"\n"} +{"Time":"2023-05-31T11:57:16.934334-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:16.934336-07:00","Action":"output","Test":"TestCertOptions","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:16.93434-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:62: failed to read apiserver cert inside minikube. args \"out/minikube-darwin-arm64 -p cert-options-941000 ssh \\\"openssl x509 -text -noout -in /var/lib/minikube/certs/apiserver.crt\\\"\": exit status 89\n"} +{"Time":"2023-05-31T11:57:16.934343-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:69: apiserver cert does not include 127.0.0.1 in SAN.\n"} +{"Time":"2023-05-31T11:57:16.934345-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:69: apiserver cert does not include 192.168.15.15 in SAN.\n"} +{"Time":"2023-05-31T11:57:16.934347-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:69: apiserver cert does not include localhost in SAN.\n"} +{"Time":"2023-05-31T11:57:16.93435-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:69: apiserver cert does not include www.google.com in SAN.\n"} +{"Time":"2023-05-31T11:57:16.934545-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:88: (dbg) Run: kubectl --context cert-options-941000 config view\n"} +{"Time":"2023-05-31T11:57:16.966011-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:93: Kubeconfig apiserver server port incorrect. Output of \n"} +{"Time":"2023-05-31T11:57:16.966024-07:00","Action":"output","Test":"TestCertOptions","Output":" 'kubectl config view' = \"\\n-- stdout --\\n\\tapiVersion: v1\\n\\tclusters: null\\n\\tcontexts: null\\n\\tcurrent-context: \\\"\\\"\\n\\tkind: Config\\n\\tpreferences: {}\\n\\tusers: null\\n\\n-- /stdout --\"\n"} +{"Time":"2023-05-31T11:57:16.966027-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:100: (dbg) Run: out/minikube-darwin-arm64 ssh -p cert-options-941000 -- \"sudo cat /etc/kubernetes/admin.conf\"\n"} +{"Time":"2023-05-31T11:57:17.00521-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:100: (dbg) Non-zero exit: out/minikube-darwin-arm64 ssh -p cert-options-941000 -- \"sudo cat /etc/kubernetes/admin.conf\": exit status 89 (39.109916ms)\n"} +{"Time":"2023-05-31T11:57:17.005224-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:17.005227-07:00","Action":"output","Test":"TestCertOptions","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:17.005229-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:57:17.005234-07:00","Action":"output","Test":"TestCertOptions","Output":" \t To start a cluster, run: \"minikube start -p cert-options-941000\"\n"} +{"Time":"2023-05-31T11:57:17.005236-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:17.005237-07:00","Action":"output","Test":"TestCertOptions","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:17.005239-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:102: failed to SSH to minikube with args: \"out/minikube-darwin-arm64 ssh -p cert-options-941000 -- \\\"sudo cat /etc/kubernetes/admin.conf\\\"\" : exit status 89\n"} +{"Time":"2023-05-31T11:57:17.005249-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:106: Internal minikube kubeconfig (admin.conf) does not contains the right api port. \n"} +{"Time":"2023-05-31T11:57:17.00525-07:00","Action":"output","Test":"TestCertOptions","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:17.005251-07:00","Action":"output","Test":"TestCertOptions","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T11:57:17.005253-07:00","Action":"output","Test":"TestCertOptions","Output":" \t To start a cluster, run: \"minikube start -p cert-options-941000\"\n"} +{"Time":"2023-05-31T11:57:17.005255-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:17.005256-07:00","Action":"output","Test":"TestCertOptions","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:17.005268-07:00","Action":"output","Test":"TestCertOptions","Output":" cert_options_test.go:109: *** TestCertOptions FAILED at 2023-05-31 11:57:17.00525 -0700 PDT m=+871.187133876\n"} +{"Time":"2023-05-31T11:57:17.00527-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T11:57:17.005286-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p cert-options-941000 -n cert-options-941000\n"} +{"Time":"2023-05-31T11:57:17.034394-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p cert-options-941000 -n cert-options-941000: exit status 7 (29.013958ms)\n"} +{"Time":"2023-05-31T11:57:17.034405-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:17.034407-07:00","Action":"output","Test":"TestCertOptions","Output":" -- stdout --\n"} +{"Time":"2023-05-31T11:57:17.034409-07:00","Action":"output","Test":"TestCertOptions","Output":" \tStopped\n"} +{"Time":"2023-05-31T11:57:17.03441-07:00","Action":"output","Test":"TestCertOptions","Output":" \n"} +{"Time":"2023-05-31T11:57:17.034411-07:00","Action":"output","Test":"TestCertOptions","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T11:57:17.034413-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T11:57:17.034415-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:241: \"cert-options-941000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T11:57:17.034426-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:175: Cleaning up \"cert-options-941000\" profile ...\n"} +{"Time":"2023-05-31T11:57:17.034434-07:00","Action":"output","Test":"TestCertOptions","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p cert-options-941000\n"} +{"Time":"2023-05-31T11:57:17.126167-07:00","Action":"output","Test":"TestCertOptions","Output":"--- FAIL: TestCertOptions (9.97s)\n"} +{"Time":"2023-05-31T11:57:17.126179-07:00","Action":"fail","Test":"TestCertOptions","Elapsed":9.97} +{"Time":"2023-05-31T11:57:17.126183-07:00","Action":"cont","Test":"TestRunningBinaryUpgrade"} +{"Time":"2023-05-31T11:57:17.126184-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"=== CONT TestRunningBinaryUpgrade\n"} +{"Time":"2023-05-31T11:57:32.669097-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"E0531 11:57:32.668999 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T11:58:02.319226-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"E0531 11:58:02.319110 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:00:11.976637-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:131: (dbg) Run: out/minikube-darwin-arm64 start -p cert-expiration-741000 --memory=2048 --cert-expiration=8760h --driver=qemu2 \n"} +{"Time":"2023-05-31T12:00:12.959108-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" version_upgrade_test.go:106: v1.6.2 release installation failed: bad response code: 404\n"} +{"Time":"2023-05-31T12:00:12.959183-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" panic.go:522: *** TestRunningBinaryUpgrade FAILED at 2023-05-31 12:00:12.959046 -0700 PDT m=+1047.143472251\n"} +{"Time":"2023-05-31T12:00:12.959205-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:00:12.959215-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p running-upgrade-168000 -n running-upgrade-168000\n"} +{"Time":"2023-05-31T12:00:13.042142-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p running-upgrade-168000 -n running-upgrade-168000: exit status 85 (82.771583ms)\n"} +{"Time":"2023-05-31T12:00:13.04218-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:13.042183-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:13.042187-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t* Profile \"running-upgrade-168000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:00:13.04219-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \t To start a cluster, run: \"minikube start -p running-upgrade-168000\"\n"} +{"Time":"2023-05-31T12:00:13.042194-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:13.042195-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:13.042197-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:239: status error: exit status 85 (may be ok)\n"} +{"Time":"2023-05-31T12:00:13.042203-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:241: \"running-upgrade-168000\" host is not running, skipping log retrieval (state=\"* Profile \\\"running-upgrade-168000\\\" not found. Run \\\"minikube profile list\\\" to view all profiles.\\n To start a cluster, run: \\\"minikube start -p running-upgrade-168000\\\"\")\n"} +{"Time":"2023-05-31T12:00:13.042207-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:175: Cleaning up \"running-upgrade-168000\" profile ...\n"} +{"Time":"2023-05-31T12:00:13.04221-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p running-upgrade-168000\n"} +{"Time":"2023-05-31T12:00:13.281663-07:00","Action":"cont","Test":"TestKubernetesUpgrade"} +{"Time":"2023-05-31T12:00:13.281677-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"=== CONT TestKubernetesUpgrade\n"} +{"Time":"2023-05-31T12:00:13.281683-07:00","Action":"output","Test":"TestRunningBinaryUpgrade","Output":"--- FAIL: TestRunningBinaryUpgrade (176.16s)\n"} +{"Time":"2023-05-31T12:00:13.281722-07:00","Action":"fail","Test":"TestRunningBinaryUpgrade","Elapsed":176.16} +{"Time":"2023-05-31T12:00:13.28173-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:234: (dbg) Run: out/minikube-darwin-arm64 start -p kubernetes-upgrade-654000 --memory=2200 --kubernetes-version=v1.16.0 --alsologtostderr -v=1 --driver=qemu2 \n"} +{"Time":"2023-05-31T12:00:17.205715-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:131: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p cert-expiration-741000 --memory=2048 --cert-expiration=8760h --driver=qemu2 : exit status 80 (5.228636167s)\n"} +{"Time":"2023-05-31T12:00:17.20577-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T12:00:17.205779-07:00","Action":"output","Test":"TestCertExpiration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:17.205787-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* [cert-expiration-741000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:17.205796-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:17.205803-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:17.20581-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:17.205818-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:17.205825-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:17.205832-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:17.205839-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:00:17.205847-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Starting control plane node cert-expiration-741000 in cluster cert-expiration-741000\n"} +{"Time":"2023-05-31T12:00:17.205854-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Restarting existing qemu2 VM for \"cert-expiration-741000\" ...\n"} +{"Time":"2023-05-31T12:00:17.205861-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:17.205868-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:17.205875-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T12:00:17.205881-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Restarting existing qemu2 VM for \"cert-expiration-741000\" ...\n"} +{"Time":"2023-05-31T12:00:17.205888-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:17.205895-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:17.205901-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T12:00:17.205907-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T12:00:17.205913-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T12:00:17.205919-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T12:00:17.205925-07:00","Action":"output","Test":"TestCertExpiration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:17.205931-07:00","Action":"output","Test":"TestCertExpiration","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:17.205938-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:17.205947-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p cert-expiration-741000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:17.205955-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:17.205962-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* \n"} +{"Time":"2023-05-31T12:00:17.20597-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:17.205981-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:17.205988-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:17.205995-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:17.206003-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:17.20601-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:17.206017-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:17.206026-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:17.206061-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T12:00:17.20608-07:00","Action":"output","Test":"TestCertExpiration","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:17.206089-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:133: failed to start minikube after cert expiration: \"out/minikube-darwin-arm64 start -p cert-expiration-741000 --memory=2048 --cert-expiration=8760h --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T12:00:17.206122-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:136: minikube start output did not warn about expired certs: \n"} +{"Time":"2023-05-31T12:00:17.206132-07:00","Action":"output","Test":"TestCertExpiration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:17.206139-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* [cert-expiration-741000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:17.20615-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:17.206158-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:17.206165-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:17.206172-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:17.206179-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:17.206211-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:17.206227-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:00:17.206241-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Starting control plane node cert-expiration-741000 in cluster cert-expiration-741000\n"} +{"Time":"2023-05-31T12:00:17.206249-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Restarting existing qemu2 VM for \"cert-expiration-741000\" ...\n"} +{"Time":"2023-05-31T12:00:17.206257-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:17.206263-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:17.206271-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T12:00:17.206278-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Restarting existing qemu2 VM for \"cert-expiration-741000\" ...\n"} +{"Time":"2023-05-31T12:00:17.206285-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:17.206292-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:17.206299-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T12:00:17.206305-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T12:00:17.206312-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t\n"} +{"Time":"2023-05-31T12:00:17.206318-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T12:00:17.206325-07:00","Action":"output","Test":"TestCertExpiration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:17.206403-07:00","Action":"output","Test":"TestCertExpiration","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:17.206413-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:17.206424-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p cert-expiration-741000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:17.206433-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:17.206441-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t* \n"} +{"Time":"2023-05-31T12:00:17.206448-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:17.206458-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:17.206466-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:17.206473-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:17.20648-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:17.206488-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:17.206495-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:17.206503-07:00","Action":"output","Test":"TestCertExpiration","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:17.206519-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T12:00:17.206526-07:00","Action":"output","Test":"TestCertExpiration","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:17.206533-07:00","Action":"output","Test":"TestCertExpiration","Output":" cert_options_test.go:138: *** TestCertExpiration FAILED at 2023-05-31 12:00:17.205898 -0700 PDT m=+1051.390386417\n"} +{"Time":"2023-05-31T12:00:17.20654-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:00:17.206548-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p cert-expiration-741000 -n cert-expiration-741000\n"} +{"Time":"2023-05-31T12:00:17.274805-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p cert-expiration-741000 -n cert-expiration-741000: exit status 7 (68.666208ms)\n"} +{"Time":"2023-05-31T12:00:17.274819-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T12:00:17.274821-07:00","Action":"output","Test":"TestCertExpiration","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:17.274823-07:00","Action":"output","Test":"TestCertExpiration","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:00:17.274825-07:00","Action":"output","Test":"TestCertExpiration","Output":" \n"} +{"Time":"2023-05-31T12:00:17.274826-07:00","Action":"output","Test":"TestCertExpiration","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:17.274828-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:00:17.274831-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:241: \"cert-expiration-741000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:00:17.274833-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:175: Cleaning up \"cert-expiration-741000\" profile ...\n"} +{"Time":"2023-05-31T12:00:17.274835-07:00","Action":"output","Test":"TestCertExpiration","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p cert-expiration-741000\n"} +{"Time":"2023-05-31T12:00:17.36842-07:00","Action":"cont","Test":"TestStoppedBinaryUpgrade"} +{"Time":"2023-05-31T12:00:17.368433-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"=== CONT TestStoppedBinaryUpgrade\n"} +{"Time":"2023-05-31T12:00:17.368438-07:00","Action":"output","Test":"TestCertExpiration","Output":"--- FAIL: TestCertExpiration (195.18s)\n"} +{"Time":"2023-05-31T12:00:17.368459-07:00","Action":"fail","Test":"TestCertExpiration","Elapsed":195.18} +{"Time":"2023-05-31T12:00:17.368462-07:00","Action":"run","Test":"TestStoppedBinaryUpgrade/Setup"} +{"Time":"2023-05-31T12:00:17.368464-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Setup","Output":"=== RUN TestStoppedBinaryUpgrade/Setup\n"} +{"Time":"2023-05-31T12:00:18.448771-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Setup","Output":"E0531 12:00:18.448683 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:00:23.023211-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:234: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p kubernetes-upgrade-654000 --memory=2200 --kubernetes-version=v1.16.0 --alsologtostderr -v=1 --driver=qemu2 : exit status 80 (9.739598792s)\n"} +{"Time":"2023-05-31T12:00:23.023265-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:23.023274-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:23.023281-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* [kubernetes-upgrade-654000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:23.02329-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:23.023298-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:23.023306-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:23.023327-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:23.023335-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:23.023342-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:23.023348-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:00:23.023356-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:00:23.023363-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Starting control plane node kubernetes-upgrade-654000 in cluster kubernetes-upgrade-654000\n"} +{"Time":"2023-05-31T12:00:23.023372-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:00:23.023378-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:23.023385-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:23.023392-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:23.023398-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Deleting \"kubernetes-upgrade-654000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:00:23.023405-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:00:23.023412-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:23.023418-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:23.023425-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:23.023431-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:23.023438-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:23.023444-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:23.02345-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:23.023456-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:23.023463-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.307645 3250 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:00:23.023478-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.307769 3250 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:00:23.023487-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.307772 3250 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:00:23.023493-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.307774 3250 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:00:23.023501-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.307835 3250 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:00:23.023523-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.308819 3250 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:00:23.023532-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.323595 3250 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1784,\"bootTime\":1685557829,\"procs\":406,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:00:23.02355-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:13.323656 3250 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:00:23.023558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.328838 3250 out.go:177] * [kubernetes-upgrade-654000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:23.023565-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.335876 3250 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:23.023573-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.339697 3250 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:23.02358-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.335892 3250 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:00:23.023587-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.345804 3250 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:23.023594-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.348912 3250 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:23.023601-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.351900 3250 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:23.023609-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.354809 3250 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:23.023617-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.358192 3250 config.go:182] Loaded profile config \"cert-expiration-741000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:00:23.023625-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.358269 3250 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:00:23.023633-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.358309 3250 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:00:23.02364-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.362780 3250 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:00:23.023647-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.369830 3250 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:00:23.023654-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.369835 3250 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:00:23.023664-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.369842 3250 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:00:23.023672-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.371742 3250 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:00:23.02368-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.379840 3250 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:00:23.023687-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.382953 3250 start_flags.go:901] Wait components to verify : map[apiserver:true system_pods:true]\n"} +{"Time":"2023-05-31T12:00:23.023697-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.382971 3250 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:00:23.023704-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.382979 3250 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:00:23.023711-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.382983 3250 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:00:23.023728-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{Name:kubernetes-upgrade-654000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:kubernetes-upgrade-654000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Co"} +{"Time":"2023-05-31T12:00:23.023747-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"ntainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:00:23.023759-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.383065 3250 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:00:23.023767-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.390807 3250 out.go:177] * Starting control plane node kubernetes-upgrade-654000 in cluster kubernetes-upgrade-654000\n"} +{"Time":"2023-05-31T12:00:23.023787-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.394815 3250 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:00:23.023796-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.394840 3250 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:00:23.023804-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.394852 3250 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:00:23.023812-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.394926 3250 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:00:23.02382-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.394932 3250 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T12:00:23.023828-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.394990 3250 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/kubernetes-upgrade-654000/config.json ...\n"} +{"Time":"2023-05-31T12:00:23.02384-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.395002 3250 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/kubernetes-upgrade-654000/config.json: {Name:mk295abba2b49f37aa03479b4166f6e3a4b3ac25 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:00:23.023849-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.395198 3250 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:00:23.023857-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.395213 3250 start.go:364] acquiring machines lock for kubernetes-upgrade-654000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:00:23.023869-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.395241 3250 start.go:368] acquired machines lock for \"kubernetes-upgrade-654000\" in 22.083µs\n"} +{"Time":"2023-05-31T12:00:23.023884-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.395258 3250 start.go:93] Provisioning new machine with config: \u0026{Name:kubernetes-upgrade-654000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kub"} +{"Time":"2023-05-31T12:00:23.023898-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"ernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:kubernetes-upgrade-654000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID"} +{"Time":"2023-05-31T12:00:23.02391-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":":docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:00:23.023923-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.395285 3250 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:00:23.023931-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.402815 3250 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:00:23.023939-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.419565 3250 start.go:159] libmachine.API.Create for \"kubernetes-upgrade-654000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:00:23.023947-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.419584 3250 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:00:23.023958-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.419646 3250 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:00:23.023966-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.419665 3250 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:00:23.023973-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.419673 3250 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:00:23.023981-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.419699 3250 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:00:23.023988-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.419714 3250 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:00:23.023997-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.419720 3250 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:00:23.024005-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.420105 3250 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:00:23.024013-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.531238 3250 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:00:23.024021-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.671848 3250 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:00:23.024028-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.671855 3250 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:00:23.024036-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.671999 3250 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2\n"} +{"Time":"2023-05-31T12:00:23.024045-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.680684 3250 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:00:23.024051-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.680698 3250 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:00:23.024059-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.680747 3250 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:00:23.024067-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.687752 3250 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:00:23.024074-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:23.024081-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.687775 3250 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:00:23.024089-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.687797 3250 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2\n"} +{"Time":"2023-05-31T12:00:23.024097-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.687806 3250 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:00:23.024107-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.687846 3250 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/qemu.pid -device virtio-net-pci,netdev=net0,mac=12:53:d4:2f:61:f6 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2\n"} +{"Time":"2023-05-31T12:00:23.024118-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.689370 3250 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:00:23.024126-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.689383 3250 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:23.024133-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:23.02414-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:13.689400 3250 client.go:171] LocalClient.Create took 269.815708ms\n"} +{"Time":"2023-05-31T12:00:23.024147-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:15.691547 3250 start.go:128] duration metric: createHost completed in 2.296274125s\n"} +{"Time":"2023-05-31T12:00:23.024154-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:15.691602 3250 start.go:83] releasing machines lock for \"kubernetes-upgrade-654000\", held for 2.296384417s\n"} +{"Time":"2023-05-31T12:00:23.024162-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:15.691737 3250 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:23.024171-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:15.697912 3250 out.go:177] * Deleting \"kubernetes-upgrade-654000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:00:23.024179-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:15.721315 3250 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:23.024187-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:23.024195-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:15.721353 3250 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:00:23.024207-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.723588 3250 start.go:364] acquiring machines lock for kubernetes-upgrade-654000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:00:23.024217-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.724079 3250 start.go:368] acquired machines lock for \"kubernetes-upgrade-654000\" in 379.625µs\n"} +{"Time":"2023-05-31T12:00:23.024232-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.724229 3250 start.go:93] Provisioning new machine with config: \u0026{Name:kubernetes-upgrade-654000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kub"} +{"Time":"2023-05-31T12:00:23.024247-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"ernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:kubernetes-upgrade-654000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID"} +{"Time":"2023-05-31T12:00:23.02426-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":":docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:00:23.024269-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.724505 3250 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:00:23.024276-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.733928 3250 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:00:23.024284-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.783568 3250 start.go:159] libmachine.API.Create for \"kubernetes-upgrade-654000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:00:23.024292-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.783615 3250 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:00:23.0243-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.783810 3250 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:00:23.024307-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.783873 3250 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:00:23.024314-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.783901 3250 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:00:23.024321-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.784001 3250 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:00:23.024329-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.784032 3250 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:00:23.024335-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.784043 3250 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:00:23.024344-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.784626 3250 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:00:23.024353-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.903165 3250 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:00:23.02436-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.961935 3250 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:00:23.02437-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.961940 3250 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:00:23.024378-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.962097 3250 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2\n"} +{"Time":"2023-05-31T12:00:23.024387-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.970862 3250 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:00:23.024394-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.970876 3250 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:00:23.024401-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.970939 3250 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:00:23.024409-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.978243 3250 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:00:23.024416-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:23.024422-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.978261 3250 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:00:23.02443-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.978273 3250 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2\n"} +{"Time":"2023-05-31T12:00:23.024438-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.978281 3250 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:00:23.024449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.978317 3250 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/qemu.pid -device virtio-net-pci,netdev=net0,mac=9e:be:18:3f:73:c8 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2\n"} +{"Time":"2023-05-31T12:00:23.02446-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.979830 3250 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:00:23.024467-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.979843 3250 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:23.024475-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:23.024482-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:20.979855 3250 client.go:171] LocalClient.Create took 196.237083ms\n"} +{"Time":"2023-05-31T12:00:23.02449-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:22.981986 3250 start.go:128] duration metric: createHost completed in 2.257490791s\n"} +{"Time":"2023-05-31T12:00:23.024498-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:22.982084 3250 start.go:83] releasing machines lock for \"kubernetes-upgrade-654000\", held for 2.257979042s\n"} +{"Time":"2023-05-31T12:00:23.024506-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:22.982646 3250 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p kubernetes-upgrade-654000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:23.024516-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p kubernetes-upgrade-654000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:23.024524-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:22.992246 3250 out.go:177] \n"} +{"Time":"2023-05-31T12:00:23.024532-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:22.996262 3250 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:23.024542-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:23.02455-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:22.996314 3250 out.go:239] * \n"} +{"Time":"2023-05-31T12:00:23.024557-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:00:23.024566-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:22.998589 3250 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:23.024577-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:23.024584-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:23.024592-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:23.0246-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:23.024608-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:23.024616-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:23.024624-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:23.024635-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:23.024644-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:23.024651-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:23.02466-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:23.024667-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:23.024679-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:23.024686-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:23.024695-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:23.024704-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.009162 3250 out.go:177] \n"} +{"Time":"2023-05-31T12:00:23.02471-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:23.024717-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:23.024724-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:236: failed to start minikube HEAD with oldest k8s version: out/minikube-darwin-arm64 start -p kubernetes-upgrade-654000 --memory=2200 --kubernetes-version=v1.16.0 --alsologtostderr -v=1 --driver=qemu2 : exit status 80\n"} +{"Time":"2023-05-31T12:00:23.024736-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:239: (dbg) Run: out/minikube-darwin-arm64 stop -p kubernetes-upgrade-654000\n"} +{"Time":"2023-05-31T12:00:23.126842-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:244: (dbg) Run: out/minikube-darwin-arm64 -p kubernetes-upgrade-654000 status --format={{.Host}}\n"} +{"Time":"2023-05-31T12:00:23.163017-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:244: (dbg) Non-zero exit: out/minikube-darwin-arm64 -p kubernetes-upgrade-654000 status --format={{.Host}}: exit status 7 (36.096292ms)\n"} +{"Time":"2023-05-31T12:00:23.163029-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:23.163032-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:23.163033-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:00:23.163034-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:23.163037-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:23.163039-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:246: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:00:23.163041-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:255: (dbg) Run: out/minikube-darwin-arm64 start -p kubernetes-upgrade-654000 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=qemu2 \n"} +{"Time":"2023-05-31T12:00:28.337814-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:255: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p kubernetes-upgrade-654000 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=qemu2 : exit status 80 (5.173666583s)\n"} +{"Time":"2023-05-31T12:00:28.337868-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:28.337877-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:28.337886-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* [kubernetes-upgrade-654000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:28.337894-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:28.337903-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:28.337911-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:28.337918-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:28.337926-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:28.337933-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:28.33794-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:00:28.337947-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Starting control plane node kubernetes-upgrade-654000 in cluster kubernetes-upgrade-654000\n"} +{"Time":"2023-05-31T12:00:28.337956-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Restarting existing qemu2 VM for \"kubernetes-upgrade-654000\" ...\n"} +{"Time":"2023-05-31T12:00:28.337963-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:28.33797-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:28.337977-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:28.337984-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Restarting existing qemu2 VM for \"kubernetes-upgrade-654000\" ...\n"} +{"Time":"2023-05-31T12:00:28.338008-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:28.338015-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:28.338022-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:28.338028-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:28.338034-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:28.338042-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:28.338048-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:28.338054-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:28.338064-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.190024 3274 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:00:28.338071-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.190138 3274 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:00:28.338079-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.190141 3274 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:00:28.338086-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.190143 3274 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:00:28.338093-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.190210 3274 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:00:28.338101-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.191133 3274 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:00:28.338109-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.206195 3274 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1794,\"bootTime\":1685557829,\"procs\":405,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:00:28.338123-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:23.206289 3274 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:00:28.33813-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.210871 3274 out.go:177] * [kubernetes-upgrade-654000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:28.338137-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.217829 3274 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:28.338144-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.221799 3274 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:28.338151-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.217891 3274 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:00:28.338159-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.224913 3274 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:28.338166-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.227771 3274 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:28.338174-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.230818 3274 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:28.338181-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.233803 3274 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:28.338188-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.237063 3274 config.go:182] Loaded profile config \"kubernetes-upgrade-654000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T12:00:28.338197-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.237307 3274 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:00:28.338207-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.241744 3274 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:00:28.338215-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.248763 3274 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:00:28.338232-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.248768 3274 start.go:875] validating driver \"qemu2\" against \u0026{Name:kubernetes-upgrade-654000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kubern"} +{"Time":"2023-05-31T12:00:28.33825-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"etesConfig:{KubernetesVersion:v1.16.0 ClusterName:kubernetes-upgrade-654000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:do"} +{"Time":"2023-05-31T12:00:28.338265-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"cker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:00:28.338275-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.248836 3274 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:00:28.338283-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.250693 3274 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:00:28.338291-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.250711 3274 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:00:28.338301-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.250717 3274 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:00:28.338319-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t{Name:kubernetes-upgrade-654000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:kubernetes-upgrade-654000 Nam"} +{"Time":"2023-05-31T12:00:28.338461-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"espace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFi"} +{"Time":"2023-05-31T12:00:28.338475-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"rmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:00:28.338487-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.250795 3274 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:00:28.338495-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.257603 3274 out.go:177] * Starting control plane node kubernetes-upgrade-654000 in cluster kubernetes-upgrade-654000\n"} +{"Time":"2023-05-31T12:00:28.338503-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.261748 3274 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:00:28.338511-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.261769 3274 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:00:28.338519-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.261781 3274 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:00:28.338527-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.261833 3274 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:00:28.338535-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.261838 3274 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:00:28.338542-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.261895 3274 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/kubernetes-upgrade-654000/config.json ...\n"} +{"Time":"2023-05-31T12:00:28.33855-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.262238 3274 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:00:28.338558-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.262248 3274 start.go:364] acquiring machines lock for kubernetes-upgrade-654000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:00:28.338567-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.262272 3274 start.go:368] acquired machines lock for \"kubernetes-upgrade-654000\" in 19.208µs\n"} +{"Time":"2023-05-31T12:00:28.338575-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.262282 3274 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:00:28.338583-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.262286 3274 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:00:28.338591-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.262390 3274 fix.go:103] recreateIfNeeded on kubernetes-upgrade-654000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:00:28.338599-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:23.262398 3274 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:00:28.338606-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.270772 3274 out.go:177] * Restarting existing qemu2 VM for \"kubernetes-upgrade-654000\" ...\n"} +{"Time":"2023-05-31T12:00:28.338617-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.274869 3274 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/qemu.pid -device virtio-net-pci,netdev=net0,mac=9e:be:18:3f:73:c8 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2\n"} +{"Time":"2023-05-31T12:00:28.338628-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.276686 3274 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:00:28.338636-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.276707 3274 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:28.338643-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:28.338652-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.276740 3274 fix.go:57] fixHost completed within 14.453667ms\n"} +{"Time":"2023-05-31T12:00:28.33866-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.276745 3274 start.go:83] releasing machines lock for \"kubernetes-upgrade-654000\", held for 14.469541ms\n"} +{"Time":"2023-05-31T12:00:28.338667-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:23.276752 3274 start.go:687] error starting host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:28.338676-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:23.276786 3274 out.go:239] ! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:28.338684-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:28.338691-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:23.276791 3274 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:00:28.338699-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.278953 3274 start.go:364] acquiring machines lock for kubernetes-upgrade-654000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:00:28.338707-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.279391 3274 start.go:368] acquired machines lock for \"kubernetes-upgrade-654000\" in 348.167µs\n"} +{"Time":"2023-05-31T12:00:28.338715-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.279531 3274 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:00:28.338722-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.279552 3274 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:00:28.338729-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.280276 3274 fix.go:103] recreateIfNeeded on kubernetes-upgrade-654000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:00:28.338737-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:28.280303 3274 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:00:28.338745-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.288374 3274 out.go:177] * Restarting existing qemu2 VM for \"kubernetes-upgrade-654000\" ...\n"} +{"Time":"2023-05-31T12:00:28.338756-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.292634 3274 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/qemu.pid -device virtio-net-pci,netdev=net0,mac=9e:be:18:3f:73:c8 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubernetes-upgrade-654000/disk.qcow2\n"} +{"Time":"2023-05-31T12:00:28.338768-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.301852 3274 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:00:28.338776-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.301899 3274 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:28.338785-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t\n"} +{"Time":"2023-05-31T12:00:28.338792-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.301983 3274 fix.go:57] fixHost completed within 22.429958ms\n"} +{"Time":"2023-05-31T12:00:28.338799-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.302033 3274 start.go:83] releasing machines lock for \"kubernetes-upgrade-654000\", held for 22.588ms\n"} +{"Time":"2023-05-31T12:00:28.338808-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:28.302217 3274 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p kubernetes-upgrade-654000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:28.338817-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p kubernetes-upgrade-654000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:28.338825-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.309592 3274 out.go:177] \n"} +{"Time":"2023-05-31T12:00:28.338833-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:28.313639 3274 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:28.338844-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:28.338852-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:28.313699 3274 out.go:239] * \n"} +{"Time":"2023-05-31T12:00:28.338859-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t* \n"} +{"Time":"2023-05-31T12:00:28.338866-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tW0531 12:00:28.316093 3274 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:28.338877-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:28.338884-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:28.338892-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:28.3389-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:28.338908-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:28.338916-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:28.338924-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:28.338934-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:28.338943-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:28.33895-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:28.338957-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:28.338965-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:28.338972-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:28.338979-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:28.338987-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:28.338997-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tI0531 12:00:28.324499 3274 out.go:177] \n"} +{"Time":"2023-05-31T12:00:28.339003-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:28.33901-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:28.339022-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:257: failed to upgrade with newest k8s version. args: out/minikube-darwin-arm64 start -p kubernetes-upgrade-654000 --memory=2200 --kubernetes-version=v1.27.2 --alsologtostderr -v=1 --driver=qemu2 : exit status 80\n"} +{"Time":"2023-05-31T12:00:28.339031-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:260: (dbg) Run: kubectl --context kubernetes-upgrade-654000 version --output=json\n"} +{"Time":"2023-05-31T12:00:28.403942-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:260: (dbg) Non-zero exit: kubectl --context kubernetes-upgrade-654000 version --output=json: exit status 1 (65.733584ms)\n"} +{"Time":"2023-05-31T12:00:28.403956-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:28.403959-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:28.403961-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \terror: context \"kubernetes-upgrade-654000\" does not exist\n"} +{"Time":"2023-05-31T12:00:28.403963-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:28.403965-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:28.403967-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" version_upgrade_test.go:262: error running kubectl: exit status 1\n"} +{"Time":"2023-05-31T12:00:28.40397-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" panic.go:522: *** TestKubernetesUpgrade FAILED at 2023-05-31 12:00:28.403931 -0700 PDT m=+1062.588580709\n"} +{"Time":"2023-05-31T12:00:28.403972-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:00:28.403998-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p kubernetes-upgrade-654000 -n kubernetes-upgrade-654000\n"} +{"Time":"2023-05-31T12:00:28.436947-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p kubernetes-upgrade-654000 -n kubernetes-upgrade-654000: exit status 7 (32.8835ms)\n"} +{"Time":"2023-05-31T12:00:28.436963-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:28.436965-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:28.436966-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:00:28.436968-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:00:28.436969-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:28.436971-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:00:28.436973-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:241: \"kubernetes-upgrade-654000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:00:28.436975-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:175: Cleaning up \"kubernetes-upgrade-654000\" profile ...\n"} +{"Time":"2023-05-31T12:00:28.436977-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p kubernetes-upgrade-654000\n"} +{"Time":"2023-05-31T12:00:28.532625-07:00","Action":"output","Test":"TestKubernetesUpgrade","Output":"--- FAIL: TestKubernetesUpgrade (15.25s)\n"} +{"Time":"2023-05-31T12:00:28.532639-07:00","Action":"fail","Test":"TestKubernetesUpgrade","Elapsed":15.25} +{"Time":"2023-05-31T12:00:28.532643-07:00","Action":"cont","Test":"TestPause"} +{"Time":"2023-05-31T12:00:28.532646-07:00","Action":"output","Test":"TestPause","Output":"=== CONT TestPause\n"} +{"Time":"2023-05-31T12:00:28.532659-07:00","Action":"run","Test":"TestPause/serial"} +{"Time":"2023-05-31T12:00:28.532662-07:00","Action":"output","Test":"TestPause/serial","Output":"=== RUN TestPause/serial\n"} +{"Time":"2023-05-31T12:00:28.532685-07:00","Action":"run","Test":"TestPause/serial/Start"} +{"Time":"2023-05-31T12:00:28.532686-07:00","Action":"output","Test":"TestPause/serial/Start","Output":"=== RUN TestPause/serial/Start\n"} +{"Time":"2023-05-31T12:00:28.532745-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" pause_test.go:80: (dbg) Run: out/minikube-darwin-arm64 start -p pause-620000 --memory=2048 --install-addons=false --wait=all --driver=qemu2 \n"} +{"Time":"2023-05-31T12:00:38.350349-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" pause_test.go:80: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p pause-620000 --memory=2048 --install-addons=false --wait=all --driver=qemu2 : exit status 80 (9.817304209s)\n"} +{"Time":"2023-05-31T12:00:38.35043-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:38.350441-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:38.350448-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* [pause-620000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:38.350457-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:38.350466-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:38.350474-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:38.350482-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:38.35049-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:38.350498-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:38.350506-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:00:38.350513-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:00:38.35052-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* Starting control plane node pause-620000 in cluster pause-620000\n"} +{"Time":"2023-05-31T12:00:38.350527-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:00:38.350534-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:38.350541-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:38.350548-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:00:38.350555-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* Deleting \"pause-620000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:00:38.350562-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2048MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:00:38.350569-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:38.350577-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:38.350584-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:00:38.35059-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:00:38.350597-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:00:38.350603-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:38.35061-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:38.350617-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:38.350625-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:38.350633-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p pause-620000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:38.350642-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:38.35065-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:00:38.350658-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:38.350678-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:38.350687-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:38.350695-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:38.350703-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:38.350717-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:38.350725-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:38.350735-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:38.350744-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:38.350751-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:38.350759-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" pause_test.go:82: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p pause-620000 --memory=2048 --install-addons=false --wait=all --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T12:00:38.350771-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:00:38.35078-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p pause-620000 -n pause-620000\n"} +{"Time":"2023-05-31T12:00:38.420556-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p pause-620000 -n pause-620000: exit status 7 (70.020833ms)\n"} +{"Time":"2023-05-31T12:00:38.42057-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:38.420572-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:38.420574-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:00:38.420578-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:38.42058-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:38.420582-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:00:38.420585-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" helpers_test.go:241: \"pause-620000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:00:38.420608-07:00","Action":"output","Test":"TestPause/serial","Output":" pause_test.go:62: Previous test failed, not running dependent tests\n"} +{"Time":"2023-05-31T12:00:38.420644-07:00","Action":"output","Test":"TestPause","Output":" helpers_test.go:175: Cleaning up \"pause-620000\" profile ...\n"} +{"Time":"2023-05-31T12:00:38.420712-07:00","Action":"output","Test":"TestPause","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p pause-620000\n"} +{"Time":"2023-05-31T12:00:38.516994-07:00","Action":"output","Test":"TestPause","Output":"--- FAIL: TestPause (9.98s)\n"} +{"Time":"2023-05-31T12:00:38.517008-07:00","Action":"output","Test":"TestPause/serial","Output":" --- FAIL: TestPause/serial (9.89s)\n"} +{"Time":"2023-05-31T12:00:38.51701-07:00","Action":"output","Test":"TestPause/serial/Start","Output":" --- FAIL: TestPause/serial/Start (9.89s)\n"} +{"Time":"2023-05-31T12:00:38.517012-07:00","Action":"fail","Test":"TestPause/serial/Start","Elapsed":9.89} +{"Time":"2023-05-31T12:00:38.517015-07:00","Action":"fail","Test":"TestPause/serial","Elapsed":9.89} +{"Time":"2023-05-31T12:00:38.517016-07:00","Action":"fail","Test":"TestPause","Elapsed":9.98} +{"Time":"2023-05-31T12:00:38.517018-07:00","Action":"cont","Test":"TestStartStop"} +{"Time":"2023-05-31T12:00:38.517019-07:00","Action":"output","Test":"TestStartStop","Output":"=== CONT TestStartStop\n"} +{"Time":"2023-05-31T12:00:38.517021-07:00","Action":"run","Test":"TestStartStop/group"} +{"Time":"2023-05-31T12:00:38.517022-07:00","Action":"output","Test":"TestStartStop/group","Output":"=== RUN TestStartStop/group\n"} +{"Time":"2023-05-31T12:00:38.517041-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T12:00:38.517045-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== RUN TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T12:00:38.517051-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== PAUSE TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T12:00:38.517053-07:00","Action":"pause","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T12:00:38.517067-07:00","Action":"run","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T12:00:38.517068-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== RUN TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T12:00:38.51707-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== PAUSE TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T12:00:38.517071-07:00","Action":"pause","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T12:00:38.517073-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T12:00:38.517074-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== RUN TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T12:00:38.517076-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== PAUSE TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T12:00:38.517077-07:00","Action":"pause","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T12:00:38.517088-07:00","Action":"run","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T12:00:38.517092-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== RUN TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T12:00:38.517094-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== PAUSE TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T12:00:38.517095-07:00","Action":"pause","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T12:00:38.517097-07:00","Action":"run","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T12:00:38.517098-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== RUN TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T12:00:38.517105-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== PAUSE TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T12:00:38.517112-07:00","Action":"pause","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T12:00:38.517114-07:00","Action":"run","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T12:00:38.517115-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== RUN TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T12:00:38.517146-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== PAUSE TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T12:00:38.517148-07:00","Action":"pause","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T12:00:38.517149-07:00","Action":"cont","Test":"TestNoKubernetes"} +{"Time":"2023-05-31T12:00:38.517151-07:00","Action":"output","Test":"TestNoKubernetes","Output":"=== CONT TestNoKubernetes\n"} +{"Time":"2023-05-31T12:00:38.517152-07:00","Action":"run","Test":"TestNoKubernetes/serial"} +{"Time":"2023-05-31T12:00:38.517153-07:00","Action":"output","Test":"TestNoKubernetes/serial","Output":"=== RUN TestNoKubernetes/serial\n"} +{"Time":"2023-05-31T12:00:38.517155-07:00","Action":"run","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion"} +{"Time":"2023-05-31T12:00:38.517156-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":"=== RUN TestNoKubernetes/serial/StartNoK8sWithVersion\n"} +{"Time":"2023-05-31T12:00:38.517217-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" no_kubernetes_test.go:83: (dbg) Run: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --no-kubernetes --kubernetes-version=1.20 --driver=qemu2 \n"} +{"Time":"2023-05-31T12:00:38.610221-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" no_kubernetes_test.go:83: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --no-kubernetes --kubernetes-version=1.20 --driver=qemu2 : exit status 14 (92.931542ms)\n"} +{"Time":"2023-05-31T12:00:38.610234-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T12:00:38.610237-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:38.610239-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t* [NoKubernetes-124000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:38.610246-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:38.610248-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:38.61025-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:38.610252-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:38.610254-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:38.610255-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:38.610257-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T12:00:38.610258-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T12:00:38.61026-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T12:00:38.610261-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:38.610263-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:38.610264-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \tX Exiting due to MK_USAGE: cannot specify --kubernetes-version with --no-kubernetes,\n"} +{"Time":"2023-05-31T12:00:38.610266-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \tto unset a global config run:\n"} +{"Time":"2023-05-31T12:00:38.610267-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t\n"} +{"Time":"2023-05-31T12:00:38.610269-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \t$ minikube config unset kubernetes-version\n"} +{"Time":"2023-05-31T12:00:38.61027-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" \n"} +{"Time":"2023-05-31T12:00:38.610272-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:38.610275-07:00","Action":"run","Test":"TestNoKubernetes/serial/StartWithK8s"} +{"Time":"2023-05-31T12:00:38.610277-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":"=== RUN TestNoKubernetes/serial/StartWithK8s\n"} +{"Time":"2023-05-31T12:00:38.610279-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:95: (dbg) Run: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --driver=qemu2 \n"} +{"Time":"2023-05-31T12:00:46.159001-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":"E0531 12:00:46.158962 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/ingress-addon-legacy-798000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:00:48.514898-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:95: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --driver=qemu2 : exit status 80 (9.904418458s)\n"} +{"Time":"2023-05-31T12:00:48.514948-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:48.514955-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:48.514961-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* [NoKubernetes-124000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:48.514968-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:48.514974-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:48.51498-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:48.514985-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:48.515002-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:48.515008-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:48.515013-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:00:48.515018-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:00:48.515023-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* Starting control plane node NoKubernetes-124000 in cluster NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:00:48.515041-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:00:48.515046-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:48.515051-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:48.515058-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t\n"} +{"Time":"2023-05-31T12:00:48.515062-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* Deleting \"NoKubernetes-124000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:00:48.515067-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=4000MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:00:48.515072-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:48.515078-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:48.515083-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t\n"} +{"Time":"2023-05-31T12:00:48.515087-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t\n"} +{"Time":"2023-05-31T12:00:48.515092-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t\n"} +{"Time":"2023-05-31T12:00:48.515097-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:48.515101-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:48.515113-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:48.515119-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:48.515125-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p NoKubernetes-124000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:48.515131-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:48.515137-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t* \n"} +{"Time":"2023-05-31T12:00:48.515143-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:48.515155-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:48.515161-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:48.515167-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:48.515176-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:48.515182-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:48.515188-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:48.515194-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:48.515201-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:48.515205-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:48.51521-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" no_kubernetes_test.go:97: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p NoKubernetes-124000 --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T12:00:48.51522-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:00:48.515226-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p NoKubernetes-124000 -n NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:00:48.581406-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p NoKubernetes-124000 -n NoKubernetes-124000: exit status 7 (66.342958ms)\n"} +{"Time":"2023-05-31T12:00:48.581426-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:48.581429-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:48.581431-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:00:48.581433-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:48.581435-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:48.581436-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:00:48.581438-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" helpers_test.go:241: \"NoKubernetes-124000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:00:48.581443-07:00","Action":"run","Test":"TestNoKubernetes/serial/StartWithStopK8s"} +{"Time":"2023-05-31T12:00:48.581445-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":"=== RUN TestNoKubernetes/serial/StartWithStopK8s\n"} +{"Time":"2023-05-31T12:00:48.581495-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:112: (dbg) Run: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --no-kubernetes --driver=qemu2 \n"} +{"Time":"2023-05-31T12:00:53.872552-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:112: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --no-kubernetes --driver=qemu2 : exit status 80 (5.290441708s)\n"} +{"Time":"2023-05-31T12:00:53.872609-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:53.872619-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:53.872628-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t* [NoKubernetes-124000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:53.872638-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:53.872646-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:53.872654-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:53.872661-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:53.872668-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:53.872676-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:53.872683-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:00:53.872709-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t* Starting minikube without Kubernetes in cluster NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:00:53.872717-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t* Restarting existing qemu2 VM for \"NoKubernetes-124000\" ...\n"} +{"Time":"2023-05-31T12:00:53.872725-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:53.872732-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:53.87274-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t\n"} +{"Time":"2023-05-31T12:00:53.872747-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t* Restarting existing qemu2 VM for \"NoKubernetes-124000\" ...\n"} +{"Time":"2023-05-31T12:00:53.872754-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:53.872761-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:53.872768-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t\n"} +{"Time":"2023-05-31T12:00:53.872775-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t\n"} +{"Time":"2023-05-31T12:00:53.872801-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t\n"} +{"Time":"2023-05-31T12:00:53.872809-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:53.872815-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:53.872822-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:53.87283-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:53.872839-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p NoKubernetes-124000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:53.87285-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:53.872858-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t* \n"} +{"Time":"2023-05-31T12:00:53.872866-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:53.872878-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:53.872886-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:53.872893-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:53.8729-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:53.872909-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:53.872916-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:53.872926-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:53.872935-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:53.872942-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:53.87295-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" no_kubernetes_test.go:114: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p NoKubernetes-124000 --no-kubernetes --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T12:00:53.872962-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:00:53.872971-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p NoKubernetes-124000 -n NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:00:53.939469-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p NoKubernetes-124000 -n NoKubernetes-124000: exit status 7 (66.698084ms)\n"} +{"Time":"2023-05-31T12:00:53.939488-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:53.93949-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:53.9395-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:00:53.939502-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" \n"} +{"Time":"2023-05-31T12:00:53.939504-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:53.939506-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:00:53.93951-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" helpers_test.go:241: \"NoKubernetes-124000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:00:53.939562-07:00","Action":"run","Test":"TestNoKubernetes/serial/Start"} +{"Time":"2023-05-31T12:00:53.939567-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":"=== RUN TestNoKubernetes/serial/Start\n"} +{"Time":"2023-05-31T12:00:53.939618-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" no_kubernetes_test.go:136: (dbg) Run: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --no-kubernetes --driver=qemu2 \n"} +{"Time":"2023-05-31T12:00:59.243626-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" no_kubernetes_test.go:136: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --no-kubernetes --driver=qemu2 : exit status 80 (5.303586834s)\n"} +{"Time":"2023-05-31T12:00:59.243712-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:59.243722-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:59.243731-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t* [NoKubernetes-124000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:00:59.243739-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:00:59.243746-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:00:59.243754-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:00:59.243762-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:00:59.243769-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:00:59.243776-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:00:59.243783-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:00:59.24379-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t* Starting minikube without Kubernetes in cluster NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:00:59.243798-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t* Restarting existing qemu2 VM for \"NoKubernetes-124000\" ...\n"} +{"Time":"2023-05-31T12:00:59.243805-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:59.243815-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:59.243823-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:00:59.243829-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t* Restarting existing qemu2 VM for \"NoKubernetes-124000\" ...\n"} +{"Time":"2023-05-31T12:00:59.243837-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:00:59.243844-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:00:59.243851-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:00:59.243862-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:00:59.243869-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:00:59.243875-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:59.243882-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:59.24389-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:00:59.243897-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:59.243906-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p NoKubernetes-124000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:59.243915-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:00:59.243923-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:00:59.243931-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:00:59.243941-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:59.243949-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:00:59.243957-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:00:59.243964-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:59.243972-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:00:59.243979-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:00:59.243987-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:00:59.243995-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:59.244001-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:00:59.244009-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" no_kubernetes_test.go:138: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p NoKubernetes-124000 --no-kubernetes --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T12:00:59.244022-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:00:59.244064-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p NoKubernetes-124000 -n NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:00:59.314096-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p NoKubernetes-124000 -n NoKubernetes-124000: exit status 7 (70.2805ms)\n"} +{"Time":"2023-05-31T12:00:59.314111-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:59.314113-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:59.314115-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:00:59.314118-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" \n"} +{"Time":"2023-05-31T12:00:59.31412-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:59.314122-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:00:59.314125-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" helpers_test.go:241: \"NoKubernetes-124000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:00:59.314138-07:00","Action":"run","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning"} +{"Time":"2023-05-31T12:00:59.31414-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":"=== RUN TestNoKubernetes/serial/VerifyK8sNotRunning\n"} +{"Time":"2023-05-31T12:00:59.314178-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" no_kubernetes_test.go:147: (dbg) Run: out/minikube-darwin-arm64 ssh -p NoKubernetes-124000 \"sudo systemctl is-active --quiet service kubelet\"\n"} +{"Time":"2023-05-31T12:00:59.356612-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" no_kubernetes_test.go:147: (dbg) Non-zero exit: out/minikube-darwin-arm64 ssh -p NoKubernetes-124000 \"sudo systemctl is-active --quiet service kubelet\": exit status 89 (42.349917ms)\n"} +{"Time":"2023-05-31T12:00:59.356624-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \n"} +{"Time":"2023-05-31T12:00:59.356626-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:00:59.356628-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:00:59.35663-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \t To start a cluster, run: \"minikube start -p NoKubernetes-124000\"\n"} +{"Time":"2023-05-31T12:00:59.356631-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" \n"} +{"Time":"2023-05-31T12:00:59.356633-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:00:59.356636-07:00","Action":"run","Test":"TestNoKubernetes/serial/ProfileList"} +{"Time":"2023-05-31T12:00:59.356638-07:00","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":"=== RUN TestNoKubernetes/serial/ProfileList\n"} +{"Time":"2023-05-31T12:00:59.356664-07:00","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" no_kubernetes_test.go:169: (dbg) Run: out/minikube-darwin-arm64 profile list\n"} +{"Time":"2023-05-31T12:00:59.426412-07:00","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" no_kubernetes_test.go:179: (dbg) Run: out/minikube-darwin-arm64 profile list --output=json\n"} +{"Time":"2023-05-31T12:00:59.496342-07:00","Action":"run","Test":"TestNoKubernetes/serial/Stop"} +{"Time":"2023-05-31T12:00:59.496354-07:00","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":"=== RUN TestNoKubernetes/serial/Stop\n"} +{"Time":"2023-05-31T12:00:59.496374-07:00","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":" no_kubernetes_test.go:158: (dbg) Run: out/minikube-darwin-arm64 stop -p NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:00:59.557268-07:00","Action":"run","Test":"TestNoKubernetes/serial/StartNoArgs"} +{"Time":"2023-05-31T12:00:59.557279-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":"=== RUN TestNoKubernetes/serial/StartNoArgs\n"} +{"Time":"2023-05-31T12:00:59.557309-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" no_kubernetes_test.go:191: (dbg) Run: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --driver=qemu2 \n"} +{"Time":"2023-05-31T12:01:04.84848-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" no_kubernetes_test.go:191: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p NoKubernetes-124000 --driver=qemu2 : exit status 80 (5.290623875s)\n"} +{"Time":"2023-05-31T12:01:04.848538-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \n"} +{"Time":"2023-05-31T12:01:04.848548-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:04.848556-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t* [NoKubernetes-124000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:04.848564-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:04.848573-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:04.84858-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:04.848604-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:04.848612-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:04.848619-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:04.848627-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:01:04.848634-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t* Starting minikube without Kubernetes in cluster NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:01:04.848642-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t* Restarting existing qemu2 VM for \"NoKubernetes-124000\" ...\n"} +{"Time":"2023-05-31T12:01:04.848651-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:04.848658-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:04.848665-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t\n"} +{"Time":"2023-05-31T12:01:04.848672-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t* Restarting existing qemu2 VM for \"NoKubernetes-124000\" ...\n"} +{"Time":"2023-05-31T12:01:04.848679-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:04.848686-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:04.848693-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t\n"} +{"Time":"2023-05-31T12:01:04.8487-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t\n"} +{"Time":"2023-05-31T12:01:04.848707-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t\n"} +{"Time":"2023-05-31T12:01:04.848713-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \n"} +{"Time":"2023-05-31T12:01:04.84872-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:04.848726-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:01:04.848733-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:04.848742-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p NoKubernetes-124000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:04.848751-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:04.848759-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t* \n"} +{"Time":"2023-05-31T12:01:04.848766-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:04.848778-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:04.848786-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:04.848794-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:04.848801-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:04.848808-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:04.848815-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:04.848824-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:04.848832-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \n"} +{"Time":"2023-05-31T12:01:04.848839-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:01:04.848846-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" no_kubernetes_test.go:193: failed to start minikube with args: \"out/minikube-darwin-arm64 start -p NoKubernetes-124000 --driver=qemu2 \" : exit status 80\n"} +{"Time":"2023-05-31T12:01:04.848857-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:01:04.848866-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p NoKubernetes-124000 -n NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:01:04.916585-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p NoKubernetes-124000 -n NoKubernetes-124000: exit status 7 (67.876583ms)\n"} +{"Time":"2023-05-31T12:01:04.916602-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \n"} +{"Time":"2023-05-31T12:01:04.916605-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:04.916607-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:01:04.916609-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" \n"} +{"Time":"2023-05-31T12:01:04.91661-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:04.916612-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:01:04.916616-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" helpers_test.go:241: \"NoKubernetes-124000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:01:04.916652-07:00","Action":"run","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond"} +{"Time":"2023-05-31T12:01:04.916655-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":"=== RUN TestNoKubernetes/serial/VerifyK8sNotRunningSecond\n"} +{"Time":"2023-05-31T12:01:04.916748-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" no_kubernetes_test.go:147: (dbg) Run: out/minikube-darwin-arm64 ssh -p NoKubernetes-124000 \"sudo systemctl is-active --quiet service kubelet\"\n"} +{"Time":"2023-05-31T12:01:04.957552-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" no_kubernetes_test.go:147: (dbg) Non-zero exit: out/minikube-darwin-arm64 ssh -p NoKubernetes-124000 \"sudo systemctl is-active --quiet service kubelet\": exit status 89 (40.747292ms)\n"} +{"Time":"2023-05-31T12:01:04.957563-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \n"} +{"Time":"2023-05-31T12:01:04.957565-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:04.957567-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:04.957569-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \t To start a cluster, run: \"minikube start -p NoKubernetes-124000\"\n"} +{"Time":"2023-05-31T12:01:04.95757-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" \n"} +{"Time":"2023-05-31T12:01:04.957571-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:04.957592-07:00","Action":"output","Test":"TestNoKubernetes","Output":" helpers_test.go:175: Cleaning up \"NoKubernetes-124000\" profile ...\n"} +{"Time":"2023-05-31T12:01:04.957633-07:00","Action":"output","Test":"TestNoKubernetes","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p NoKubernetes-124000\n"} +{"Time":"2023-05-31T12:01:05.051204-07:00","Action":"output","Test":"TestNoKubernetes","Output":"--- FAIL: TestNoKubernetes (26.53s)\n"} +{"Time":"2023-05-31T12:01:05.051218-07:00","Action":"output","Test":"TestNoKubernetes/serial","Output":" --- FAIL: TestNoKubernetes/serial (26.44s)\n"} +{"Time":"2023-05-31T12:01:05.051226-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Output":" --- PASS: TestNoKubernetes/serial/StartNoK8sWithVersion (0.09s)\n"} +{"Time":"2023-05-31T12:01:05.051228-07:00","Action":"pass","Test":"TestNoKubernetes/serial/StartNoK8sWithVersion","Elapsed":0.09} +{"Time":"2023-05-31T12:01:05.051231-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithK8s","Output":" --- FAIL: TestNoKubernetes/serial/StartWithK8s (9.97s)\n"} +{"Time":"2023-05-31T12:01:05.051233-07:00","Action":"fail","Test":"TestNoKubernetes/serial/StartWithK8s","Elapsed":9.97} +{"Time":"2023-05-31T12:01:05.051235-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartWithStopK8s","Output":" --- FAIL: TestNoKubernetes/serial/StartWithStopK8s (5.36s)\n"} +{"Time":"2023-05-31T12:01:05.051236-07:00","Action":"fail","Test":"TestNoKubernetes/serial/StartWithStopK8s","Elapsed":5.36} +{"Time":"2023-05-31T12:01:05.051238-07:00","Action":"output","Test":"TestNoKubernetes/serial/Start","Output":" --- FAIL: TestNoKubernetes/serial/Start (5.37s)\n"} +{"Time":"2023-05-31T12:01:05.051239-07:00","Action":"fail","Test":"TestNoKubernetes/serial/Start","Elapsed":5.37} +{"Time":"2023-05-31T12:01:05.051241-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Output":" --- PASS: TestNoKubernetes/serial/VerifyK8sNotRunning (0.04s)\n"} +{"Time":"2023-05-31T12:01:05.051242-07:00","Action":"pass","Test":"TestNoKubernetes/serial/VerifyK8sNotRunning","Elapsed":0.04} +{"Time":"2023-05-31T12:01:05.051244-07:00","Action":"output","Test":"TestNoKubernetes/serial/ProfileList","Output":" --- PASS: TestNoKubernetes/serial/ProfileList (0.14s)\n"} +{"Time":"2023-05-31T12:01:05.051245-07:00","Action":"pass","Test":"TestNoKubernetes/serial/ProfileList","Elapsed":0.14} +{"Time":"2023-05-31T12:01:05.051247-07:00","Action":"output","Test":"TestNoKubernetes/serial/Stop","Output":" --- PASS: TestNoKubernetes/serial/Stop (0.06s)\n"} +{"Time":"2023-05-31T12:01:05.051248-07:00","Action":"pass","Test":"TestNoKubernetes/serial/Stop","Elapsed":0.06} +{"Time":"2023-05-31T12:01:05.05125-07:00","Action":"output","Test":"TestNoKubernetes/serial/StartNoArgs","Output":" --- FAIL: TestNoKubernetes/serial/StartNoArgs (5.36s)\n"} +{"Time":"2023-05-31T12:01:05.051251-07:00","Action":"fail","Test":"TestNoKubernetes/serial/StartNoArgs","Elapsed":5.36} +{"Time":"2023-05-31T12:01:05.051253-07:00","Action":"output","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Output":" --- PASS: TestNoKubernetes/serial/VerifyK8sNotRunningSecond (0.04s)\n"} +{"Time":"2023-05-31T12:01:05.051254-07:00","Action":"pass","Test":"TestNoKubernetes/serial/VerifyK8sNotRunningSecond","Elapsed":0.04} +{"Time":"2023-05-31T12:01:05.051256-07:00","Action":"fail","Test":"TestNoKubernetes/serial","Elapsed":26.44} +{"Time":"2023-05-31T12:01:05.051257-07:00","Action":"fail","Test":"TestNoKubernetes","Elapsed":26.53} +{"Time":"2023-05-31T12:01:05.051258-07:00","Action":"cont","Test":"TestNetworkPlugins/group/auto"} +{"Time":"2023-05-31T12:01:05.051259-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":"=== CONT TestNetworkPlugins/group/auto\n"} +{"Time":"2023-05-31T12:01:05.051262-07:00","Action":"run","Test":"TestNetworkPlugins/group/auto/Start"} +{"Time":"2023-05-31T12:01:05.051263-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"=== RUN TestNetworkPlugins/group/auto/Start\n"} +{"Time":"2023-05-31T12:01:05.051297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p auto-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --driver=qemu2 \n"} +{"Time":"2023-05-31T12:01:14.728935-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p auto-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --driver=qemu2 : exit status 80 (9.675990041s)\n"} +{"Time":"2023-05-31T12:01:14.728996-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:14.729006-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:14.729014-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* [auto-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:14.729022-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:14.72903-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:14.729039-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:14.729068-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:14.729076-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:14.729083-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:14.72909-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:01:14.729097-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:01:14.729103-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* Starting control plane node auto-602000 in cluster auto-602000\n"} +{"Time":"2023-05-31T12:01:14.72911-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:14.729116-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:14.729123-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:14.72913-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:14.729136-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* Deleting \"auto-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:01:14.729143-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:14.72915-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:14.729156-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:14.729163-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:14.72917-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:14.729176-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:14.729182-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:14.729193-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:14.729199-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:01:14.729206-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.079084 3373 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:01:14.729213-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.079211 3373 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:14.729221-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.079214 3373 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:01:14.729229-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.079216 3373 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:14.729236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.079283 3373 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:01:14.729246-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.080344 3373 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:01:14.72926-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.095275 3373 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1836,\"bootTime\":1685557829,\"procs\":394,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:01:14.729277-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tW0531 12:01:05.095360 3373 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:01:14.729285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.100496 3373 out.go:177] * [auto-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:14.729292-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.107495 3373 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:14.729299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.107576 3373 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:01:14.729307-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.111472 3373 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:14.729314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.114481 3373 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:14.729322-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.117479 3373 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:14.72933-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.120437 3373 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:14.729337-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.123487 3373 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:14.729344-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.126794 3373 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:01:14.729353-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.126835 3373 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:01:14.72936-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.131450 3373 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:01:14.729368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.138456 3373 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:01:14.729375-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.138461 3373 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:01:14.729384-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.138466 3373 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:01:14.729393-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.140390 3373 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:01:14.729403-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.143457 3373 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:01:14.729411-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.146544 3373 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:01:14.729418-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.146563 3373 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:01:14.729425-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.146579 3373 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:01:14.729433-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.146584 3373 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:01:14.729441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.146591 3373 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:01:14.729454-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t{Name:auto-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:auto-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISoc"} +{"Time":"2023-05-31T12:01:14.729469-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"ket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:01:14.729481-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.146669 3373 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:14.729488-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.155424 3373 out.go:177] * Starting control plane node auto-602000 in cluster auto-602000\n"} +{"Time":"2023-05-31T12:01:14.729496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159468 3373 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:01:14.729503-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159494 3373 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:01:14.729515-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159505 3373 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:01:14.729523-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159566 3373 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:01:14.729535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159572 3373 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:01:14.729543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159624 3373 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/auto-602000/config.json ...\n"} +{"Time":"2023-05-31T12:01:14.729552-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159636 3373 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/auto-602000/config.json: {Name:mkd8522d3b8c8afbb6a10858dff1c5dc5973f678 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:14.729561-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159829 3373 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:01:14.729569-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159842 3373 start.go:364] acquiring machines lock for auto-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:14.729577-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159872 3373 start.go:368] acquired machines lock for \"auto-602000\" in 24.917µs\n"} +{"Time":"2023-05-31T12:01:14.729593-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159884 3373 start.go:93] Provisioning new machine with config: \u0026{Name:auto-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:"} +{"Time":"2023-05-31T12:01:14.729607-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"{KubernetesVersion:v1.27.2 ClusterName:auto-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144"} +{"Time":"2023-05-31T12:01:14.729624-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:01:14.729633-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.159908 3373 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:14.729641-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.167507 3373 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:14.729649-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.184735 3373 start.go:159] libmachine.API.Create for \"auto-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:14.729656-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.184761 3373 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:01:14.729663-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.184823 3373 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:01:14.729671-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.184845 3373 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:14.729678-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.184853 3373 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:14.729686-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.184875 3373 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:01:14.729693-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.184894 3373 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:14.729701-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.184900 3373 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:14.729709-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.185200 3373 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:01:14.729718-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.293807 3373 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:01:14.729725-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.357908 3373 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:01:14.729732-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.357915 3373 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:01:14.72974-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.358065 3373 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:14.729749-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.366704 3373 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:14.729756-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.366721 3373 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:14.729763-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.366771 3373 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:01:14.729771-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.373933 3373 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:01:14.729778-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:14.729785-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.373961 3373 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:14.729793-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.373985 3373 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:14.729801-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.373994 3373 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:01:14.729812-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.374045 3373 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=c2:bb:58:28:73:82 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:14.729824-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.375611 3373 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:14.729831-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.375624 3373 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:14.729838-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:14.729845-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:05.375641 3373 client.go:171] LocalClient.Create took 190.875416ms\n"} +{"Time":"2023-05-31T12:01:14.729852-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:07.377811 3373 start.go:128] duration metric: createHost completed in 2.217904125s\n"} +{"Time":"2023-05-31T12:01:14.72986-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:07.377899 3373 start.go:83] releasing machines lock for \"auto-602000\", held for 2.218049875s\n"} +{"Time":"2023-05-31T12:01:14.729867-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tW0531 12:01:07.377967 3373 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:14.729875-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:07.389316 3373 out.go:177] * Deleting \"auto-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:01:14.729883-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tW0531 12:01:07.409651 3373 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:14.729891-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:14.729899-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:07.409684 3373 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:01:14.729907-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.411923 3373 start.go:364] acquiring machines lock for auto-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:14.729916-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.412348 3373 start.go:368] acquired machines lock for \"auto-602000\" in 327.583µs\n"} +{"Time":"2023-05-31T12:01:14.729931-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.412469 3373 start.go:93] Provisioning new machine with config: \u0026{Name:auto-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:"} +{"Time":"2023-05-31T12:01:14.729949-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":"{KubernetesVersion:v1.27.2 ClusterName:auto-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144"} +{"Time":"2023-05-31T12:01:14.729961-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:01:14.72997-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.412793 3373 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:14.729978-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.422425 3373 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:14.729989-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.469364 3373 start.go:159] libmachine.API.Create for \"auto-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:14.729996-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.469432 3373 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:01:14.730003-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.469548 3373 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:01:14.730011-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.469584 3373 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:14.730018-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.469598 3373 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:14.730026-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.469684 3373 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:01:14.730033-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.469710 3373 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:14.73004-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.469722 3373 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:14.730049-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.470215 3373 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:01:14.730057-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.606073 3373 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:01:14.730064-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.667954 3373 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:01:14.730073-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.667962 3373 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:01:14.730081-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.668100 3373 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:14.73009-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.676900 3373 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:14.730097-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.676918 3373 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:14.730106-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.676995 3373 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:01:14.730114-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.684241 3373 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:01:14.73012-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:14.730127-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.684254 3373 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:14.730135-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.684266 3373 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:14.730143-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.684282 3373 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:01:14.730153-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.684317 3373 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=4a:4f:d0:0f:90:e5 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/auto-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:14.730164-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.685791 3373 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:14.730171-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.685803 3373 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:14.730183-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:14.73019-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:12.685814 3373 client.go:171] LocalClient.Create took 216.380041ms\n"} +{"Time":"2023-05-31T12:01:14.730197-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:14.687949 3373 start.go:128] duration metric: createHost completed in 2.275157292s\n"} +{"Time":"2023-05-31T12:01:14.730205-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:14.688056 3373 start.go:83] releasing machines lock for \"auto-602000\", held for 2.275683292s\n"} +{"Time":"2023-05-31T12:01:14.730213-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tW0531 12:01:14.688394 3373 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p auto-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:14.730223-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p auto-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:14.730232-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:14.698084 3373 out.go:177] \n"} +{"Time":"2023-05-31T12:01:14.73024-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tW0531 12:01:14.702135 3373 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:14.730248-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:14.730256-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tW0531 12:01:14.702190 3373 out.go:239] * \n"} +{"Time":"2023-05-31T12:01:14.730263-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:01:14.730272-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tW0531 12:01:14.704989 3373 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:14.730286-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:14.730295-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:14.730303-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:14.73031-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:14.730317-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:14.730324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:14.730332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:14.730342-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:14.730356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:14.730469-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:14.730486-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:14.730493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:14.730501-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:14.730509-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:14.730517-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:14.730534-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \tI0531 12:01:14.715066 3373 out.go:177] \n"} +{"Time":"2023-05-31T12:01:14.730542-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:14.73055-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:01:14.730557-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:01:14.730575-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" net_test.go:209: \"auto\" test finished in 4m37.759646041s, failed=true\n"} +{"Time":"2023-05-31T12:01:16.689186-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:01:16.689198-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ----------------------- debugLogs start: auto-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:01:16.6892-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:01:16.689202-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689204-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689205-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689207-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:01:16.689208-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.68921-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689211-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689212-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:01:16.689214-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689215-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689216-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689218-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:01:16.689219-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.68922-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689222-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689223-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:01:16.689224-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689225-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689227-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689228-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:01:16.689229-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689234-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689235-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689236-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:01:16.689237-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689239-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68924-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689241-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:01:16.689242-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689244-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689248-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689249-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:01:16.689251-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689252-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689254-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689255-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:01:16.689256-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689257-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689259-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68926-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:01:16.689261-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689263-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689264-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689266-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:01:16.689269-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.68927-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689272-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689273-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689275-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:01:16.689276-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689277-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689279-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68928-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689282-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:01:16.689283-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689284-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689285-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689287-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:01:16.689288-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689289-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689291-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689292-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689293-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:01:16.689295-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689296-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689297-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689298-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689299-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:01:16.689301-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689302-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689303-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689304-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:01:16.689306-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689307-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689308-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68931-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:01:16.689311-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689312-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689313-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689314-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:01:16.689316-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689319-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68932-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689322-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:01:16.689323-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689324-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689325-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689327-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:01:16.689328-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689329-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68933-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689332-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:01:16.689334-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689335-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689336-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689338-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:01:16.689339-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.68934-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689342-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689343-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:01:16.689344-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689346-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689347-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689348-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689349-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:01:16.689351-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689352-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689353-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689355-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689356-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:01:16.689358-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689359-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.68936-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689362-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689363-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:01:16.689364-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689366-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689367-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689368-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689369-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:01:16.68937-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689372-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689373-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689374-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689375-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:01:16.689376-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689378-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689379-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68938-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:01:16.689381-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689383-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689384-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689385-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:01:16.689387-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" error: context \"auto-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:16.689389-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689391-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689393-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:01:16.689394-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689396-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689398-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689399-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.6894-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:01:16.689402-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689404-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689405-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689406-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689407-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:01:16.689408-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689409-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689411-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689412-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689413-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:01:16.689415-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689416-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689418-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689419-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68942-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:01:16.689421-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689423-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689425-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689427-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689428-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:01:16.68943-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:01:16.689431-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:01:16.689432-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:01:16.689433-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:01:16.689435-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:01:16.689436-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:01:16.689437-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" users: null\n"} +{"Time":"2023-05-31T12:01:16.689438-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689439-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689441-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:01:16.689442-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" Error in configuration: context was not found for specified context: auto-602000\n"} +{"Time":"2023-05-31T12:01:16.689443-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689445-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689446-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:01:16.689447-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689449-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689451-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689452-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689453-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:01:16.689455-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689456-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689457-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689459-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68946-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:01:16.689462-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689463-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689465-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689466-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689468-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:01:16.689469-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689471-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689472-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689474-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689475-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:01:16.689476-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689478-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689479-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68948-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689482-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:01:16.689485-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689486-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689487-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689489-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68949-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:01:16.689491-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689493-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689495-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689496-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689497-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:01:16.689499-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689501-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689502-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689504-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689505-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:01:16.689507-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689508-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689509-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689511-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689512-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:01:16.689513-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689515-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689516-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689517-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689518-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:01:16.68952-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689521-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689522-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689524-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689525-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:01:16.689526-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689528-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689529-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.68953-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689532-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:01:16.689533-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689535-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689536-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689537-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689538-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:01:16.68954-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689542-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689543-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689544-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689546-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:01:16.689547-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689549-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.68955-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689551-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689553-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:01:16.689554-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689556-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689557-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689558-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689559-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:01:16.689561-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689562-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.689564-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689565-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689566-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:01:16.689568-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:16.689569-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" To start a cluster, run: \"minikube start -p auto-602000\"\n"} +{"Time":"2023-05-31T12:01:16.68957-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.689572-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" ----------------------- debugLogs end: auto-602000 [took: 1.960046292s] --------------------------------\n"} +{"Time":"2023-05-31T12:01:16.689575-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" net_test.go:210: *** TestNetworkPlugins/group/auto FAILED at 2023-05-31 12:01:16.689172 -0700 PDT m=+1110.874519417\n"} +{"Time":"2023-05-31T12:01:16.689576-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:01:16.689578-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p auto-602000 -n auto-602000\n"} +{"Time":"2023-05-31T12:01:16.718397-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p auto-602000 -n auto-602000: exit status 7 (29.105167ms)\n"} +{"Time":"2023-05-31T12:01:16.71841-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.718412-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:16.718414-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:01:16.718429-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" \n"} +{"Time":"2023-05-31T12:01:16.718434-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:16.718435-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:01:16.718438-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:241: \"auto-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:01:16.71844-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:175: Cleaning up \"auto-602000\" profile ...\n"} +{"Time":"2023-05-31T12:01:16.718442-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p auto-602000\n"} +{"Time":"2023-05-31T12:01:16.811205-07:00","Action":"cont","Test":"TestNetworkPlugins/group/calico"} +{"Time":"2023-05-31T12:01:16.811217-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":"=== CONT TestNetworkPlugins/group/calico\n"} +{"Time":"2023-05-31T12:01:16.81124-07:00","Action":"run","Test":"TestNetworkPlugins/group/calico/Start"} +{"Time":"2023-05-31T12:01:16.811241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":"=== RUN TestNetworkPlugins/group/calico/Start\n"} +{"Time":"2023-05-31T12:01:16.811304-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p calico-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=calico --driver=qemu2 \n"} +{"Time":"2023-05-31T12:01:26.626785-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p calico-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=calico --driver=qemu2 : exit status 80 (9.813390958s)\n"} +{"Time":"2023-05-31T12:01:26.626846-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:26.626856-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:26.626863-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* [calico-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:26.626871-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:26.626879-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:26.626886-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:26.626894-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:26.626901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:26.626907-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:26.626914-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:01:26.62692-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:01:26.626927-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* Starting control plane node calico-602000 in cluster calico-602000\n"} +{"Time":"2023-05-31T12:01:26.626955-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:26.626962-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:26.626969-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:26.626976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:26.626982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* Deleting \"calico-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:01:26.626989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:26.626996-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:26.627007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:26.627014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:26.62702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:26.627026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:26.627032-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:26.627039-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:26.627045-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:01:26.627051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.838965 3485 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:01:26.627058-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.839106 3485 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:26.627066-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.839109 3485 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:01:26.627073-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.839111 3485 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:26.627081-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.839173 3485 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:01:26.627088-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.840168 3485 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:01:26.627097-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.855087 3485 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1847,\"bootTime\":1685557829,\"procs\":397,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:01:26.62711-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tW0531 12:01:16.855180 3485 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:01:26.627118-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.860488 3485 out.go:177] * [calico-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:26.627125-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.867472 3485 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:26.627132-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.867516 3485 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:01:26.627139-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.871505 3485 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:26.627149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.874457 3485 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:26.627157-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.877420 3485 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:26.627164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.880507 3485 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:26.627171-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.883388 3485 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:26.627179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.886787 3485 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:01:26.627188-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.886836 3485 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:01:26.62722-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.891467 3485 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:01:26.627228-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.898431 3485 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:01:26.627235-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.898436 3485 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:01:26.627244-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.898441 3485 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:01:26.627252-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.900488 3485 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:01:26.627261-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.903432 3485 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:01:26.627269-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.906516 3485 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:01:26.627279-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.906536 3485 cni.go:84] Creating CNI manager for \"calico\"\n"} +{"Time":"2023-05-31T12:01:26.627287-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.906540 3485 start_flags.go:314] Found \"Calico\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:01:26.627294-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.906547 3485 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:01:26.627308-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t{Name:calico-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:calico-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CR"} +{"Time":"2023-05-31T12:01:26.627322-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":"ISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:calico NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:01:26.62744-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.906666 3485 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:26.627457-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.910423 3485 out.go:177] * Starting control plane node calico-602000 in cluster calico-602000\n"} +{"Time":"2023-05-31T12:01:26.627465-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918384 3485 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:01:26.627473-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918408 3485 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:01:26.62748-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918427 3485 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:01:26.627488-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918484 3485 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:01:26.627497-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918491 3485 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:01:26.627505-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918557 3485 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/calico-602000/config.json ...\n"} +{"Time":"2023-05-31T12:01:26.627513-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918576 3485 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/calico-602000/config.json: {Name:mk1a05c0fbd53b40118e0fb5d5b32ee296b89402 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:26.627522-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918766 3485 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:01:26.62753-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918781 3485 start.go:364] acquiring machines lock for calico-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:26.627538-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918811 3485 start.go:368] acquired machines lock for \"calico-602000\" in 25.042µs\n"} +{"Time":"2023-05-31T12:01:26.627554-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918823 3485 start.go:93] Provisioning new machine with config: \u0026{Name:calico-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfi"} +{"Time":"2023-05-31T12:01:26.627568-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":"g:{KubernetesVersion:v1.27.2 ClusterName:calico-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:calico NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMS"} +{"Time":"2023-05-31T12:01:26.627584-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":"ize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:01:26.627594-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.918861 3485 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:26.627601-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.927413 3485 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:26.627609-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944125 3485 start.go:159] libmachine.API.Create for \"calico-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:26.627616-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944157 3485 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:01:26.627624-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944227 3485 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:01:26.627632-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944249 3485 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:26.627639-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944262 3485 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:26.627646-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944312 3485 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:01:26.627654-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944328 3485 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:26.627661-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944336 3485 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:26.627671-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:16.944694 3485 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:01:26.627679-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.092125 3485 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:01:26.627687-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.219507 3485 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:01:26.627694-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.219513 3485 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:01:26.627702-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.219670 3485 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:26.627711-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.228567 3485 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:26.627721-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.228585 3485 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:26.62773-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.228635 3485 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:01:26.627737-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.235732 3485 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:01:26.627745-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:26.627752-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.235746 3485 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:26.627829-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.235766 3485 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:26.627839-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.235772 3485 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:01:26.627849-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.235809 3485 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=9e:ea:56:52:1d:18 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:26.627868-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.237323 3485 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:26.627877-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.237336 3485 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:26.627884-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:26.627891-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:17.237354 3485 client.go:171] LocalClient.Create took 293.194875ms\n"} +{"Time":"2023-05-31T12:01:26.627899-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:19.239525 3485 start.go:128] duration metric: createHost completed in 2.320672917s\n"} +{"Time":"2023-05-31T12:01:26.627907-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:19.239620 3485 start.go:83] releasing machines lock for \"calico-602000\", held for 2.320831167s\n"} +{"Time":"2023-05-31T12:01:26.627915-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tW0531 12:01:19.239718 3485 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:26.627923-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:19.248211 3485 out.go:177] * Deleting \"calico-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:01:26.62793-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tW0531 12:01:19.267560 3485 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:26.627939-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:26.627947-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:19.267586 3485 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:01:26.627955-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.269763 3485 start.go:364] acquiring machines lock for calico-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:26.627964-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.270320 3485 start.go:368] acquired machines lock for \"calico-602000\" in 400.875µs\n"} +{"Time":"2023-05-31T12:01:26.62798-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.270447 3485 start.go:93] Provisioning new machine with config: \u0026{Name:calico-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfi"} +{"Time":"2023-05-31T12:01:26.627994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":"g:{KubernetesVersion:v1.27.2 ClusterName:calico-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:calico NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMS"} +{"Time":"2023-05-31T12:01:26.628007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":"ize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:01:26.628019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.270739 3485 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:26.628027-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.280416 3485 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:26.628035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.328489 3485 start.go:159] libmachine.API.Create for \"calico-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:26.628045-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.328551 3485 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:01:26.628055-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.328724 3485 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:01:26.628062-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.328771 3485 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:26.628069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.328793 3485 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:26.628076-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.328876 3485 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:01:26.628085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.328905 3485 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:26.628092-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.328917 3485 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:26.6281-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.329525 3485 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:01:26.628108-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.492544 3485 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:01:26.628115-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.567379 3485 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:01:26.628123-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.567385 3485 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:01:26.628131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.567515 3485 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:26.628139-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.576042 3485 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:26.62821-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.576066 3485 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:26.628229-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.576133 3485 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:01:26.628238-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.583234 3485 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:01:26.628247-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:26.628254-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.583250 3485 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:26.628262-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.583274 3485 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:26.628271-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.583278 3485 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:01:26.628282-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.583330 3485 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=ce:3c:55:62:72:27 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/calico-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:26.628294-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.584941 3485 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:26.628302-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.584960 3485 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:26.628309-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:26.628317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:24.584974 3485 client.go:171] LocalClient.Create took 256.417417ms\n"} +{"Time":"2023-05-31T12:01:26.628325-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:26.587183 3485 start.go:128] duration metric: createHost completed in 2.316454625s\n"} +{"Time":"2023-05-31T12:01:26.628333-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:26.587233 3485 start.go:83] releasing machines lock for \"calico-602000\", held for 2.316898917s\n"} +{"Time":"2023-05-31T12:01:26.628342-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tW0531 12:01:26.587613 3485 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p calico-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:26.628352-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p calico-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:26.62836-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:26.597122 3485 out.go:177] \n"} +{"Time":"2023-05-31T12:01:26.628369-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tW0531 12:01:26.601279 3485 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:26.628378-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:26.628386-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tW0531 12:01:26.601309 3485 out.go:239] * \n"} +{"Time":"2023-05-31T12:01:26.628394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:01:26.628402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tW0531 12:01:26.603880 3485 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:26.628413-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:26.628425-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:26.628433-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:26.628441-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:26.628448-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:26.628456-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:26.628464-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:26.628475-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:26.628484-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:26.628492-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:26.628499-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:26.628507-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:26.628514-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:26.628521-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:26.628529-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:26.628539-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \tI0531 12:01:26.612241 3485 out.go:177] \n"} +{"Time":"2023-05-31T12:01:26.628545-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:26.628552-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:01:26.628558-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:01:26.628575-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" net_test.go:209: \"calico\" test finished in 4m49.656278708s, failed=true\n"} +{"Time":"2023-05-31T12:01:28.789955-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:01:28.78997-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ----------------------- debugLogs start: calico-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:01:28.789972-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:01:28.789974-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.789976-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.789977-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.789979-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:01:28.78998-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.789982-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.789983-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.789984-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:01:28.789985-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.789987-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.789988-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.789989-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:01:28.789991-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.789992-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.789993-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.789994-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:01:28.789996-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.79-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790002-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:01:28.790004-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790005-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79001-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:01:28.790011-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790013-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790015-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:01:28.790016-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790017-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79002-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:01:28.790021-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790023-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790025-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:01:28.790026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790027-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790028-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79003-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:01:28.790031-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790032-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790036-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790037-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:01:28.790039-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790042-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790044-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:01:28.790046-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790047-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790048-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:01:28.790052-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790054-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790055-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790056-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:01:28.790057-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790059-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.79006-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790061-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790062-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:01:28.790064-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790066-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790069-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79007-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790071-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:01:28.790073-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790074-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790075-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790077-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:01:28.790078-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790079-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79008-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790082-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:01:28.790083-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790085-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790086-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790088-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:01:28.790089-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.79009-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790092-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790093-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:01:28.790094-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790096-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790098-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790099-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:01:28.7901-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790102-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790103-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790104-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:01:28.790106-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790107-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790108-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790109-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:01:28.790111-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790112-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790113-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790115-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:01:28.790116-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790118-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790119-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79012-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790121-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:01:28.790123-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790125-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790126-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790127-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790129-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:01:28.79013-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790131-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790133-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790134-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790135-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:01:28.790136-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790138-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790139-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79014-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790142-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:01:28.790143-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790144-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790146-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790147-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790149-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico daemon set:\n"} +{"Time":"2023-05-31T12:01:28.79015-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790152-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790153-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790154-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico daemon set pod(s):\n"} +{"Time":"2023-05-31T12:01:28.790156-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790157-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790158-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79016-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico daemon set container(s) logs (current):\n"} +{"Time":"2023-05-31T12:01:28.790162-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790164-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790165-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790166-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico daemon set container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:01:28.790168-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790169-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790171-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790172-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico deployment:\n"} +{"Time":"2023-05-31T12:01:28.790173-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790175-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790176-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790178-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe calico deployment pod(s):\n"} +{"Time":"2023-05-31T12:01:28.790179-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.79018-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790182-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790183-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico deployment container(s) logs (current):\n"} +{"Time":"2023-05-31T12:01:28.790184-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790186-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790187-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790188-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: calico deployment container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:01:28.79019-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790193-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790194-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790195-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:01:28.790196-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790197-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790198-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790201-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:01:28.790204-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790205-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790206-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790208-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:01:28.790209-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" error: context \"calico-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:28.790211-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790212-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790213-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:01:28.790215-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790216-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790218-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790219-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79022-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:01:28.790222-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790223-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790224-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790225-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790227-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:01:28.790228-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790229-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790231-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790232-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790233-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:01:28.790235-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790236-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790238-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79024-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790241-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:01:28.790243-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790244-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790246-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790248-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790249-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:01:28.79025-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:01:28.790252-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:01:28.790253-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:01:28.790254-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:01:28.790255-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:01:28.790257-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:01:28.790259-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" users: null\n"} +{"Time":"2023-05-31T12:01:28.79026-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790287-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790291-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:01:28.790293-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" Error in configuration: context was not found for specified context: calico-602000\n"} +{"Time":"2023-05-31T12:01:28.790295-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790297-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790298-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:01:28.7903-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790301-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790303-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790304-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790305-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:01:28.790307-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790308-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.79031-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790311-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790312-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:01:28.790314-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790316-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790317-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790318-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79032-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:01:28.790321-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790323-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790324-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790326-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790327-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:01:28.790328-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.79033-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790331-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790333-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790334-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:01:28.790336-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790337-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790338-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79034-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790341-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:01:28.790343-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790344-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790346-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790347-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790348-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:01:28.79035-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790352-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790355-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790357-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790359-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:01:28.79036-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790361-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790363-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790364-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790365-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:01:28.790367-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790368-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.79037-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790372-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790373-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:01:28.790375-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790376-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790378-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790379-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:01:28.790382-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790383-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790385-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790386-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790387-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:01:28.790389-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.79039-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790391-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790393-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790394-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:01:28.790395-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790397-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790398-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790399-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790401-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:01:28.790402-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790404-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790405-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790406-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790408-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:01:28.790409-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790411-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790412-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790413-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790415-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:01:28.790416-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790418-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790419-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.79042-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790421-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:01:28.790423-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:28.790424-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" To start a cluster, run: \"minikube start -p calico-602000\"\n"} +{"Time":"2023-05-31T12:01:28.790425-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.790427-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" ----------------------- debugLogs end: calico-602000 [took: 2.16295475s] --------------------------------\n"} +{"Time":"2023-05-31T12:01:28.79043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" net_test.go:210: *** TestNetworkPlugins/group/calico FAILED at 2023-05-31 12:01:28.78994 -0700 PDT m=+1122.975462667\n"} +{"Time":"2023-05-31T12:01:28.790431-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:01:28.790433-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p calico-602000 -n calico-602000\n"} +{"Time":"2023-05-31T12:01:28.81902-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p calico-602000 -n calico-602000: exit status 7 (28.936833ms)\n"} +{"Time":"2023-05-31T12:01:28.819037-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.819038-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:28.81904-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:01:28.819041-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" \n"} +{"Time":"2023-05-31T12:01:28.819043-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:28.819044-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:01:28.819047-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:241: \"calico-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:01:28.819049-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:175: Cleaning up \"calico-602000\" profile ...\n"} +{"Time":"2023-05-31T12:01:28.819051-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p calico-602000\n"} +{"Time":"2023-05-31T12:01:28.911859-07:00","Action":"cont","Test":"TestNetworkPlugins/group/custom-flannel"} +{"Time":"2023-05-31T12:01:28.911871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":"=== CONT TestNetworkPlugins/group/custom-flannel\n"} +{"Time":"2023-05-31T12:01:28.911891-07:00","Action":"run","Test":"TestNetworkPlugins/group/custom-flannel/Start"} +{"Time":"2023-05-31T12:01:28.911893-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"=== RUN TestNetworkPlugins/group/custom-flannel/Start\n"} +{"Time":"2023-05-31T12:01:28.911939-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p custom-flannel-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=testdata/kube-flannel.yaml --driver=qemu2 \n"} +{"Time":"2023-05-31T12:01:38.749903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p custom-flannel-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=testdata/kube-flannel.yaml --driver=qemu2 : exit status 80 (9.833492s)\n"} +{"Time":"2023-05-31T12:01:38.749953-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:38.749961-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:38.749968-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* [custom-flannel-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:38.749974-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:38.749981-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:38.749987-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:38.749993-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:38.749999-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:38.750004-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:38.750009-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:01:38.750015-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:01:38.75002-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* Starting control plane node custom-flannel-602000 in cluster custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:38.750026-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:38.750031-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:38.750036-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:38.750043-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:38.750048-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* Deleting \"custom-flannel-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:01:38.750054-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:38.750059-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:38.750064-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:38.750069-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:38.750074-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:38.750079-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:38.750083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:38.750088-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:38.750093-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:01:38.750098-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.939539 3602 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:01:38.750104-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.939658 3602 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:38.750112-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.939663 3602 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:01:38.750118-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.939666 3602 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:38.750124-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.939742 3602 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:01:38.750129-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.940756 3602 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:01:38.750152-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.955930 3602 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1859,\"bootTime\":1685557829,\"procs\":397,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:01:38.750162-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tW0531 12:01:28.955998 3602 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:01:38.750168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.961327 3602 out.go:177] * [custom-flannel-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:38.750174-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.968187 3602 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:38.750179-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.968254 3602 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:01:38.750184-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.972041 3602 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:38.750193-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.975244 3602 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:38.750199-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.979274 3602 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:38.750205-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.982198 3602 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:38.75021-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.985181 3602 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:38.750216-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.988529 3602 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:01:38.750222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.988576 3602 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:01:38.750227-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:28.993180 3602 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:01:38.750232-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.000170 3602 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:01:38.750237-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.000175 3602 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:01:38.750244-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.000182 3602 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:01:38.750253-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.002066 3602 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:01:38.750258-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.005224 3602 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:01:38.750264-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.008211 3602 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:01:38.75027-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.008232 3602 cni.go:84] Creating CNI manager for \"testdata/kube-flannel.yaml\"\n"} +{"Time":"2023-05-31T12:01:38.750275-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.008253 3602 start_flags.go:314] Found \"testdata/kube-flannel.yaml\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:01:38.750283-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.008260 3602 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:01:38.750293-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t{Name:custom-flannel-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:custom-flannel-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerR"} +{"Time":"2023-05-31T12:01:38.750304-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"untime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:testdata/kube-flannel.yaml NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/sock"} +{"Time":"2023-05-31T12:01:38.750312-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"et_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:01:38.750317-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.008357 3602 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:38.750323-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.014990 3602 out.go:177] * Starting control plane node custom-flannel-602000 in cluster custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:38.750328-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019192 3602 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:01:38.750334-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019216 3602 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:01:38.75034-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019228 3602 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:01:38.750345-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019295 3602 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:01:38.750351-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019300 3602 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:01:38.750357-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019357 3602 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/custom-flannel-602000/config.json ...\n"} +{"Time":"2023-05-31T12:01:38.750363-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019369 3602 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/custom-flannel-602000/config.json: {Name:mkb055bd4992c66cad2e2b35d849d38d73253e71 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:38.750371-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019561 3602 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:01:38.750573-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019576 3602 start.go:364] acquiring machines lock for custom-flannel-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:38.750584-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019609 3602 start.go:368] acquired machines lock for \"custom-flannel-602000\" in 25µs\n"} +{"Time":"2023-05-31T12:01:38.750595-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019624 3602 start.go:93] Provisioning new machine with config: \u0026{Name:custom-flannel-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kuberne"} +{"Time":"2023-05-31T12:01:38.750605-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"tesConfig:{KubernetesVersion:v1.27.2 ClusterName:custom-flannel-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:testdata/kube-flannel.yaml NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p200"} +{"Time":"2023-05-31T12:01:38.750614-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"0.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:01:38.750621-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.019650 3602 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:38.750626-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.027283 3602 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:38.750632-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.043899 3602 start.go:159] libmachine.API.Create for \"custom-flannel-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:38.750637-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.043922 3602 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:01:38.750643-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.043986 3602 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:01:38.750648-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.044012 3602 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:38.750653-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.044022 3602 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:38.750659-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.044071 3602 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:01:38.750665-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.044086 3602 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:38.750674-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.044103 3602 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:38.75068-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.044438 3602 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:01:38.750686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.220164 3602 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:01:38.750692-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.301646 3602 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:01:38.750697-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.301651 3602 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:01:38.750703-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.301791 3602 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:38.750709-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.310562 3602 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:38.750717-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.310576 3602 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:38.750723-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.310644 3602 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:01:38.750728-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.317990 3602 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:01:38.750733-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:38.750738-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.318004 3602 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:38.750743-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.318018 3602 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:38.75075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.318024 3602 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:01:38.750757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.318059 3602 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=f2:07:80:5c:ae:fc -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:38.750769-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.319630 3602 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:38.750774-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.319643 3602 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:38.750779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:38.750784-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:29.319661 3602 client.go:171] LocalClient.Create took 275.736583ms\n"} +{"Time":"2023-05-31T12:01:38.75079-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:31.321857 3602 start.go:128] duration metric: createHost completed in 2.302222458s\n"} +{"Time":"2023-05-31T12:01:38.750795-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:31.321908 3602 start.go:83] releasing machines lock for \"custom-flannel-602000\", held for 2.302323417s\n"} +{"Time":"2023-05-31T12:01:38.750801-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tW0531 12:01:31.321981 3602 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:38.750806-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:31.331095 3602 out.go:177] * Deleting \"custom-flannel-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:01:38.750812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tW0531 12:01:31.351374 3602 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:38.750818-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:38.750823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:31.351405 3602 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:01:38.750829-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.353557 3602 start.go:364] acquiring machines lock for custom-flannel-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:38.750835-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.354060 3602 start.go:368] acquired machines lock for \"custom-flannel-602000\" in 408.209µs\n"} +{"Time":"2023-05-31T12:01:38.750846-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.354171 3602 start.go:93] Provisioning new machine with config: \u0026{Name:custom-flannel-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kuberne"} +{"Time":"2023-05-31T12:01:38.75086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"tesConfig:{KubernetesVersion:v1.27.2 ClusterName:custom-flannel-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:testdata/kube-flannel.yaml NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p200"} +{"Time":"2023-05-31T12:01:38.750871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":"0.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:01:38.750877-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.354384 3602 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:38.750883-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.362811 3602 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:38.750888-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.411975 3602 start.go:159] libmachine.API.Create for \"custom-flannel-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:38.750894-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.412023 3602 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:01:38.750899-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.412259 3602 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:01:38.750904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.412345 3602 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:38.750909-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.412376 3602 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:38.750915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.412477 3602 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:01:38.750921-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.412512 3602 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:38.750926-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.412527 3602 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:38.750932-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.413162 3602 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:01:38.750938-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.578394 3602 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:01:38.750943-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.686583 3602 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:01:38.750949-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.686588 3602 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:01:38.750955-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.686734 3602 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:38.750961-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.695060 3602 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:38.750967-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.695078 3602 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:38.750972-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.695138 3602 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:01:38.750977-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.702243 3602 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:01:38.750982-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:38.750987-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.702259 3602 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:38.750992-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.702275 3602 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:38.751001-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.702282 3602 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:01:38.751009-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.702317 3602 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=52:d3:46:d0:80:6e -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/custom-flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:38.751017-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.703778 3602 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:38.751022-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.703793 3602 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:38.751027-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:38.751032-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:36.703804 3602 client.go:171] LocalClient.Create took 291.780416ms\n"} +{"Time":"2023-05-31T12:01:38.751038-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:38.705997 3602 start.go:128] duration metric: createHost completed in 2.351601041s\n"} +{"Time":"2023-05-31T12:01:38.751043-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:38.706110 3602 start.go:83] releasing machines lock for \"custom-flannel-602000\", held for 2.352060625s\n"} +{"Time":"2023-05-31T12:01:38.75105-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tW0531 12:01:38.706586 3602 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p custom-flannel-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:38.751056-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p custom-flannel-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:38.751062-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:38.716113 3602 out.go:177] \n"} +{"Time":"2023-05-31T12:01:38.751068-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tW0531 12:01:38.720261 3602 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:38.751075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:38.751083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tW0531 12:01:38.720306 3602 out.go:239] * \n"} +{"Time":"2023-05-31T12:01:38.751088-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:01:38.751094-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tW0531 12:01:38.722679 3602 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:38.751101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:38.751106-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:38.751112-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:38.751117-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:38.751125-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:38.75113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:38.751136-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:38.751146-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:38.751153-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:38.751158-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:38.751163-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:38.751168-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:38.751174-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:38.751179-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:38.751185-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:38.751191-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \tI0531 12:01:38.732135 3602 out.go:177] \n"} +{"Time":"2023-05-31T12:01:38.751196-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:38.7512-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:01:38.751206-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:01:38.751662-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net_test.go:209: \"custom-flannel\" test finished in 5m1.781367125s, failed=true\n"} +{"Time":"2023-05-31T12:01:40.856745-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:01:40.856757-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ----------------------- debugLogs start: custom-flannel-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:01:40.856759-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:01:40.856762-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856763-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856765-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856766-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:01:40.856768-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856769-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85677-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856772-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:01:40.856773-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856774-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856775-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856776-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:01:40.856778-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856779-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85678-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856782-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:01:40.856783-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856784-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856785-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856787-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:01:40.856788-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856789-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85679-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856792-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:01:40.856793-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856794-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856795-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856796-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:01:40.856798-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856799-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856805-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856807-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:01:40.856808-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.85681-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856812-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856813-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:01:40.856815-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856816-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856817-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856819-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:01:40.85682-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856822-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856823-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856825-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856826-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:01:40.856828-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.85683-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856831-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856832-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856833-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:01:40.856835-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856838-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856839-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85684-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856841-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:01:40.856843-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856844-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856845-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856847-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:01:40.856848-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856849-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.85685-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856853-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856854-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:01:40.856855-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856857-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856858-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856859-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85686-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:01:40.856862-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856863-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856865-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856866-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:01:40.856868-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856869-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85687-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856871-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:01:40.856873-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856874-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856875-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856877-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:01:40.856878-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856879-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85688-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856882-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:01:40.856883-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856884-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856886-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856887-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:01:40.856888-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856889-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856891-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856892-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:01:40.856893-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856895-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856896-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856897-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:01:40.856899-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.8569-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856901-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856903-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:01:40.856904-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856906-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856907-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856909-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85691-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:01:40.856911-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856913-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856915-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856916-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856917-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:01:40.856919-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.85692-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856922-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856923-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856924-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:01:40.856925-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856926-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856928-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856929-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85693-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:01:40.856932-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856933-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856934-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856936-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856937-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe flannel daemon set:\n"} +{"Time":"2023-05-31T12:01:40.856938-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.85694-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856941-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856943-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe flannel pod(s):\n"} +{"Time":"2023-05-31T12:01:40.856944-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.856946-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856947-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856948-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (current):\n"} +{"Time":"2023-05-31T12:01:40.85695-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856952-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856953-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856954-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:01:40.856956-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.856957-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856959-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85696-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /run/flannel/subnet.env:\n"} +{"Time":"2023-05-31T12:01:40.856962-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.856963-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.856965-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856966-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.856967-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/kube-flannel/cni-conf.json:\n"} +{"Time":"2023-05-31T12:01:40.856986-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857007-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857008-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85701-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857012-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:01:40.857013-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.857014-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857017-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857018-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:01:40.85702-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.857023-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857024-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857025-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:01:40.857026-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" error: context \"custom-flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:40.857028-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857029-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857031-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:01:40.857034-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857035-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857037-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857038-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857039-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:01:40.857041-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857042-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857043-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857045-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857046-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:01:40.857048-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.85705-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857051-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857052-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857054-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:01:40.857055-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857056-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857058-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857059-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85706-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:01:40.857062-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857064-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857065-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857066-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857067-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:01:40.857069-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:01:40.857071-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:01:40.857072-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:01:40.857074-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:01:40.857075-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:01:40.857077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:01:40.857078-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" users: null\n"} +{"Time":"2023-05-31T12:01:40.857079-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85708-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857081-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:01:40.857083-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" Error in configuration: context was not found for specified context: custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.857085-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857086-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857087-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:01:40.857088-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857091-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857092-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857093-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857095-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:01:40.857096-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857097-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857099-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.8571-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857101-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:01:40.857103-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857105-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857106-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857107-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857109-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:01:40.857111-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857112-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857113-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857115-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857116-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:01:40.857118-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857119-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857121-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857122-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857123-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:01:40.857125-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857126-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857127-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857129-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85713-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:01:40.857132-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857133-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857135-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857136-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857137-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:01:40.857139-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.85714-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857141-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857143-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857144-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:01:40.857145-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857147-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857148-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85715-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857151-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:01:40.857152-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857154-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857155-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857157-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857158-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:01:40.857159-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857161-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857163-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857164-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857166-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:01:40.857167-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857169-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.85717-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857171-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857172-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:01:40.857174-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857175-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857177-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857178-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85718-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:01:40.857181-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857183-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857184-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857185-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857187-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:01:40.857188-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.85719-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857192-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857193-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857194-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:01:40.857197-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.8572-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857201-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857203-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857204-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:01:40.857205-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857207-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857208-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.85721-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857211-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:01:40.857213-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:40.857214-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" To start a cluster, run: \"minikube start -p custom-flannel-602000\"\n"} +{"Time":"2023-05-31T12:01:40.857215-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.857217-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" ----------------------- debugLogs end: custom-flannel-602000 [took: 2.104986291s] --------------------------------\n"} +{"Time":"2023-05-31T12:01:40.85722-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" net_test.go:210: *** TestNetworkPlugins/group/custom-flannel FAILED at 2023-05-31 12:01:40.85673 -0700 PDT m=+1135.042426751\n"} +{"Time":"2023-05-31T12:01:40.857222-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:01:40.857224-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p custom-flannel-602000 -n custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.885077-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p custom-flannel-602000 -n custom-flannel-602000: exit status 7 (28.222ms)\n"} +{"Time":"2023-05-31T12:01:40.88509-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.885093-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:40.885094-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:01:40.885095-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" \n"} +{"Time":"2023-05-31T12:01:40.885097-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:40.8851-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:01:40.885103-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:241: \"custom-flannel-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:01:40.885105-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:175: Cleaning up \"custom-flannel-602000\" profile ...\n"} +{"Time":"2023-05-31T12:01:40.885106-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p custom-flannel-602000\n"} +{"Time":"2023-05-31T12:01:40.981795-07:00","Action":"cont","Test":"TestNetworkPlugins/group/false"} +{"Time":"2023-05-31T12:01:40.981807-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":"=== CONT TestNetworkPlugins/group/false\n"} +{"Time":"2023-05-31T12:01:40.98183-07:00","Action":"run","Test":"TestNetworkPlugins/group/false/Start"} +{"Time":"2023-05-31T12:01:40.981831-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":"=== RUN TestNetworkPlugins/group/false/Start\n"} +{"Time":"2023-05-31T12:01:40.981875-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p false-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=false --driver=qemu2 \n"} +{"Time":"2023-05-31T12:01:50.620286-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p false-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=false --driver=qemu2 : exit status 80 (9.637106791s)\n"} +{"Time":"2023-05-31T12:01:50.620331-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:50.620336-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:50.620339-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* [false-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:50.620344-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:50.620348-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:50.620352-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:50.620356-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:50.62036-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:50.620363-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:50.620392-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:01:50.620396-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:01:50.620399-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* Starting control plane node false-602000 in cluster false-602000\n"} +{"Time":"2023-05-31T12:01:50.620405-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:50.620428-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:50.620433-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:50.620436-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:50.620439-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* Deleting \"false-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:01:50.620443-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:50.620447-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:01:50.62045-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:50.620453-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:50.620456-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:50.62046-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:50.620463-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:50.620466-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:50.62047-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:01:50.620473-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.008372 3722 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:01:50.620477-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.008507 3722 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:50.620481-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.008510 3722 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:01:50.620485-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.008512 3722 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:01:50.620489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.008586 3722 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:01:50.620493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.009576 3722 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:01:50.620497-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.024366 3722 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1872,\"bootTime\":1685557829,\"procs\":399,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:01:50.620504-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tW0531 12:01:41.024455 3722 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:01:50.620508-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.028914 3722 out.go:177] * [false-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:01:50.620511-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.036107 3722 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:01:50.620515-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.036151 3722 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:01:50.620518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.039124 3722 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:01:50.620525-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.042070 3722 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:01:50.620529-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.045071 3722 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:01:50.620533-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.046491 3722 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:01:50.620536-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.049052 3722 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:01:50.62054-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.052321 3722 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:01:50.620544-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.052360 3722 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:01:50.620548-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.056908 3722 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:01:50.620551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.064095 3722 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:01:50.620555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.064099 3722 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:01:50.620559-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.064105 3722 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:01:50.620564-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.065867 3722 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:01:50.620569-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.069038 3722 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:01:50.620573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.072076 3722 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:01:50.620583-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.072091 3722 cni.go:84] Creating CNI manager for \"false\"\n"} +{"Time":"2023-05-31T12:01:50.620586-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.072094 3722 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:01:50.620593-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t{Name:false-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:false-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRIS"} +{"Time":"2023-05-31T12:01:50.6206-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":"ocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:false NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:01:50.620609-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.072168 3722 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:50.620613-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.079054 3722 out.go:177] * Starting control plane node false-602000 in cluster false-602000\n"} +{"Time":"2023-05-31T12:01:50.62062-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083038 3722 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:01:50.620624-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083063 3722 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:01:50.620627-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083070 3722 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:01:50.620631-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083116 3722 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:01:50.620636-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083121 3722 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:01:50.620643-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083177 3722 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/false-602000/config.json ...\n"} +{"Time":"2023-05-31T12:01:50.620647-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083188 3722 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/false-602000/config.json: {Name:mkddf1931c6367f31365792aa6516d76bd6f1d39 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:50.620653-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083374 3722 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:01:50.620657-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083389 3722 start.go:364] acquiring machines lock for false-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:50.620661-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083417 3722 start.go:368] acquired machines lock for \"false-602000\" in 23.875µs\n"} +{"Time":"2023-05-31T12:01:50.620668-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083434 3722 start.go:93] Provisioning new machine with config: \u0026{Name:false-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig"} +{"Time":"2023-05-31T12:01:50.620675-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":":{KubernetesVersion:v1.27.2 ClusterName:false-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:false NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:26"} +{"Time":"2023-05-31T12:01:50.620682-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":"2144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:01:50.620686-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.083455 3722 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:50.62069-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.092043 3722 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:50.620693-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108012 3722 start.go:159] libmachine.API.Create for \"false-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:50.620698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108032 3722 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:01:50.620701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108087 3722 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:01:50.620704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108109 3722 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:50.620708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108118 3722 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:50.620711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108153 3722 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:01:50.620715-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108166 3722 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:50.620718-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108172 3722 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:50.620722-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.108473 3722 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:01:50.620726-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.232902 3722 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:01:50.62073-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.284564 3722 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:01:50.620733-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.284569 3722 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:01:50.620737-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.284691 3722 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:50.620741-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.293152 3722 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:50.620745-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.293174 3722 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:50.620748-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.293222 3722 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:01:50.620752-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.300421 3722 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:01:50.620755-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:50.620758-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.300434 3722 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:50.620762-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.300448 3722 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:50.620766-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.300457 3722 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:01:50.620771-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.300497 3722 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=f2:bf:ae:93:93:42 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:50.620777-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.301879 3722 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:50.620781-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.301894 3722 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:50.620785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:50.620788-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:41.301911 3722 client.go:171] LocalClient.Create took 193.8745ms\n"} +{"Time":"2023-05-31T12:01:50.620791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:43.304091 3722 start.go:128] duration metric: createHost completed in 2.220649708s\n"} +{"Time":"2023-05-31T12:01:50.620795-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:43.304176 3722 start.go:83] releasing machines lock for \"false-602000\", held for 2.220748667s\n"} +{"Time":"2023-05-31T12:01:50.620798-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tW0531 12:01:43.304223 3722 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:50.620802-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:43.316199 3722 out.go:177] * Deleting \"false-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:01:50.620806-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tW0531 12:01:43.335136 3722 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:50.62081-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:50.620813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:43.335167 3722 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:01:50.620817-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.337360 3722 start.go:364] acquiring machines lock for false-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:01:50.620821-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.337822 3722 start.go:368] acquired machines lock for \"false-602000\" in 346.25µs\n"} +{"Time":"2023-05-31T12:01:50.620829-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.337945 3722 start.go:93] Provisioning new machine with config: \u0026{Name:false-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig"} +{"Time":"2023-05-31T12:01:50.620835-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":":{KubernetesVersion:v1.27.2 ClusterName:false-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:false NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:26"} +{"Time":"2023-05-31T12:01:50.620841-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":"2144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:01:50.620845-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.338170 3722 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:50.620849-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.345474 3722 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:01:50.620853-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392032 3722 start.go:159] libmachine.API.Create for \"false-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:01:50.620856-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392070 3722 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:01:50.620859-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392228 3722 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:01:50.620863-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392274 3722 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:50.620867-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392293 3722 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:50.620872-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392379 3722 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:01:50.620876-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392406 3722 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:01:50.620879-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392417 3722 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:01:50.620884-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.392947 3722 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:01:50.620887-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.515566 3722 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:01:50.620891-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.562418 3722 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:01:50.620895-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.562423 3722 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:01:50.620899-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.562555 3722 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:50.620903-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.571078 3722 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:50.620906-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.571094 3722 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:50.62091-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.571146 3722 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:01:50.620914-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.578327 3722 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:01:50.620918-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:50.620921-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.578340 3722 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:01:50.620924-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.578359 3722 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:50.620929-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.578364 3722 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:01:50.620933-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.578398 3722 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=9e:2a:3d:31:16:ec -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/false-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:01:50.620939-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.579874 3722 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:01:50.620942-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.579893 3722 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:01:50.620946-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:01:50.620949-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:48.579907 3722 client.go:171] LocalClient.Create took 187.836083ms\n"} +{"Time":"2023-05-31T12:01:50.620953-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:50.582048 3722 start.go:128] duration metric: createHost completed in 2.243879625s\n"} +{"Time":"2023-05-31T12:01:50.620959-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:50.582117 3722 start.go:83] releasing machines lock for \"false-602000\", held for 2.244305458s\n"} +{"Time":"2023-05-31T12:01:50.620964-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tW0531 12:01:50.582568 3722 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p false-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:50.620968-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p false-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:50.620972-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:50.590002 3722 out.go:177] \n"} +{"Time":"2023-05-31T12:01:50.620976-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tW0531 12:01:50.594332 3722 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:50.62098-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:01:50.620983-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tW0531 12:01:50.594371 3722 out.go:239] * \n"} +{"Time":"2023-05-31T12:01:50.620986-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:01:50.62099-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tW0531 12:01:50.596996 3722 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:50.620995-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:50.621-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:50.621004-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:50.621008-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:50.621012-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:50.621015-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:50.621019-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:50.621025-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:01:50.621031-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:50.621035-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:01:50.621039-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:01:50.621044-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:50.62105-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:01:50.621053-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:01:50.621058-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:01:50.621063-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \tI0531 12:01:50.607295 3722 out.go:177] \n"} +{"Time":"2023-05-31T12:01:50.621066-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" \n"} +{"Time":"2023-05-31T12:01:50.621069-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:01:50.621074-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:01:50.621084-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" net_test.go:209: \"false\" test finished in 5m13.651441542s, failed=true\n"} +{"Time":"2023-05-31T12:01:52.604417-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:01:52.604429-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ----------------------- debugLogs start: false-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:01:52.604432-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:01:52.604434-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604436-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604437-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604438-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:01:52.60444-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604441-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604442-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604443-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:01:52.604445-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604446-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604447-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604448-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:01:52.60445-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604451-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604452-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60446-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:01:52.604461-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604462-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604464-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604465-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:01:52.604466-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604468-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604469-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60447-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:01:52.604471-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604472-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604473-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:01:52.604476-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604477-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604479-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60448-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:01:52.604481-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604483-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604484-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604485-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:01:52.604486-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604488-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604489-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60449-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:01:52.604491-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604493-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604494-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604495-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604496-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:01:52.604498-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.6045-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604501-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604502-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604504-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:01:52.604505-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604506-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604507-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604509-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60451-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:01:52.604511-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604513-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604514-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604515-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:01:52.604517-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604518-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604526-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604528-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604529-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:01:52.60453-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604532-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604533-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604534-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604535-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:01:52.604537-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604538-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604539-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60454-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:01:52.604542-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604543-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604544-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604545-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:01:52.604546-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604548-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604549-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60455-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:01:52.604551-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604553-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604554-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604555-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:01:52.604557-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604558-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604559-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60456-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:01:52.604563-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604564-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604565-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604566-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:01:52.604568-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604569-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60457-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604571-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:01:52.604573-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604574-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604575-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604576-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:01:52.604578-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.60458-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604581-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604582-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604584-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:01:52.604585-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604586-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604587-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604589-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60459-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:01:52.604592-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604593-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604595-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604609-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604614-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:01:52.604616-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604618-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604619-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604621-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604622-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:01:52.604624-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604625-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604627-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604628-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604629-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:01:52.604631-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604632-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604633-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604635-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:01:52.604637-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604638-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604639-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60464-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:01:52.604642-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" error: context \"false-602000\" does not exist\n"} +{"Time":"2023-05-31T12:01:52.604643-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604644-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604645-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:01:52.604647-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604664-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604666-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604667-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604668-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:01:52.604669-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604671-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604672-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604673-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604675-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:01:52.604676-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604678-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604679-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60468-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604682-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:01:52.604683-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604685-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604686-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604687-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60469-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:01:52.604691-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604693-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604694-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604695-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604697-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:01:52.604698-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:01:52.6047-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:01:52.604701-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:01:52.604702-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:01:52.604704-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:01:52.604705-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:01:52.604707-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" users: null\n"} +{"Time":"2023-05-31T12:01:52.604708-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604709-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604711-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:01:52.604712-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" Error in configuration: context was not found for specified context: false-602000\n"} +{"Time":"2023-05-31T12:01:52.604714-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604715-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604716-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:01:52.604718-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604719-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.60472-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604722-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604723-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:01:52.604724-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604725-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604727-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604728-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604729-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:01:52.60473-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604732-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604733-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604734-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604737-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:01:52.60474-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604741-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604743-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604744-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604745-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:01:52.604746-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604748-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604749-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60475-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604751-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:01:52.604753-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604754-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604755-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604756-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604757-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:01:52.604759-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604767-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604781-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604785-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604787-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:01:52.604789-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604791-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604793-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604794-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604795-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:01:52.604797-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604799-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.6048-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604801-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604803-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:01:52.604804-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604806-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604807-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604808-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.60481-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:01:52.604811-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604813-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604814-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604815-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604819-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:01:52.60482-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604822-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604823-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604824-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604826-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:01:52.604828-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604829-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.60483-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604831-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604833-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:01:52.604834-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604836-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604837-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604838-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604839-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:01:52.604841-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604842-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604843-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604845-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604846-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:01:52.604848-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604849-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.60485-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604852-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604853-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:01:52.604854-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604856-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604857-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604858-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604859-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:01:52.604863-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:01:52.604865-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" To start a cluster, run: \"minikube start -p false-602000\"\n"} +{"Time":"2023-05-31T12:01:52.604866-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.604868-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" ----------------------- debugLogs end: false-602000 [took: 1.983942208s] --------------------------------\n"} +{"Time":"2023-05-31T12:01:52.604871-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" net_test.go:210: *** TestNetworkPlugins/group/false FAILED at 2023-05-31 12:01:52.604403 -0700 PDT m=+1146.790269501\n"} +{"Time":"2023-05-31T12:01:52.604872-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:01:52.604874-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p false-602000 -n false-602000\n"} +{"Time":"2023-05-31T12:01:52.632928-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p false-602000 -n false-602000: exit status 7 (28.394459ms)\n"} +{"Time":"2023-05-31T12:01:52.632939-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.632941-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:01:52.632943-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:01:52.632944-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" \n"} +{"Time":"2023-05-31T12:01:52.632946-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:01:52.632947-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:01:52.63295-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:241: \"false-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:01:52.632952-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:175: Cleaning up \"false-602000\" profile ...\n"} +{"Time":"2023-05-31T12:01:52.632953-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p false-602000\n"} +{"Time":"2023-05-31T12:01:52.729439-07:00","Action":"cont","Test":"TestNetworkPlugins/group/kindnet"} +{"Time":"2023-05-31T12:01:52.729452-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":"=== CONT TestNetworkPlugins/group/kindnet\n"} +{"Time":"2023-05-31T12:01:52.72947-07:00","Action":"run","Test":"TestNetworkPlugins/group/kindnet/Start"} +{"Time":"2023-05-31T12:01:52.729472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"=== RUN TestNetworkPlugins/group/kindnet/Start\n"} +{"Time":"2023-05-31T12:01:52.72951-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p kindnet-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=kindnet --driver=qemu2 \n"} +{"Time":"2023-05-31T12:02:02.519848-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p kindnet-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=kindnet --driver=qemu2 : exit status 80 (9.788354667s)\n"} +{"Time":"2023-05-31T12:02:02.519905-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:02.519915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:02.519924-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* [kindnet-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:02.519932-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:02.51994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:02.519948-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:02.519956-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:02.519992-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:02.520019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:02.520027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:02.520034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:02.520041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* Starting control plane node kindnet-602000 in cluster kindnet-602000\n"} +{"Time":"2023-05-31T12:02:02.520049-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:02.520056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:02.520063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:02.52007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:02.520077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* Deleting \"kindnet-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:02.520084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:02.520091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:02.520098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:02.520105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:02.520111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:02.520118-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:02.520124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:02.52013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:02.520141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:02:02.52015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.755679 3845 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:02:02.520157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.755797 3845 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:02.520165-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.755801 3845 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:02:02.520173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.755803 3845 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:02.520181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.755868 3845 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:02:02.520188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.756954 3845 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:02:02.520197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.771606 3845 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1883,\"bootTime\":1685557829,\"procs\":407,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:02:02.520217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tW0531 12:01:52.771663 3845 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:02:02.520225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.776796 3845 out.go:177] * [kindnet-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:02.520232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.783592 3845 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:02.520239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.787728 3845 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:02.520246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.783642 3845 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:02:02.520253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.790790 3845 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:02.520261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.792246 3845 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:02.520268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.795740 3845 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:02.520275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.798790 3845 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:02.52029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.802061 3845 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:02:02.520299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.802103 3845 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:02:02.520306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.805723 3845 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:02.520313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.813143 3845 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:02:02.52032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.813147 3845 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:02:02.520329-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.813152 3845 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:02:02.520337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.815042 3845 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:02:02.520347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.817784 3845 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:02.520355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.820824 3845 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:02:02.520362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.820838 3845 cni.go:84] Creating CNI manager for \"kindnet\"\n"} +{"Time":"2023-05-31T12:02:02.52037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.820841 3845 start_flags.go:314] Found \"CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:02:02.520377-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.820847 3845 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:02:02.520391-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t{Name:kindnet-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:kindnet-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker "} +{"Time":"2023-05-31T12:02:02.520404-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:kindnet NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:02:02.520417-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.820922 3845 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:02.520425-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.823664 3845 out.go:177] * Starting control plane node kindnet-602000 in cluster kindnet-602000\n"} +{"Time":"2023-05-31T12:02:02.520432-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.831756 3845 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:02:02.52044-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.831783 3845 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:02:02.520448-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.831792 3845 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:02:02.520456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.831850 3845 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:02:02.520469-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.831856 3845 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:02:02.520476-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.831913 3845 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/kindnet-602000/config.json ...\n"} +{"Time":"2023-05-31T12:02:02.520485-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.831925 3845 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/kindnet-602000/config.json: {Name:mkb6101f99d8cdbf265b0b450360fa5a99f2a80f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:02.520494-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.832122 3845 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:02:02.520502-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.832137 3845 start.go:364] acquiring machines lock for kindnet-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:02.52051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.832170 3845 start.go:368] acquired machines lock for \"kindnet-602000\" in 28.25µs\n"} +{"Time":"2023-05-31T12:02:02.520526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.832185 3845 start.go:93] Provisioning new machine with config: \u0026{Name:kindnet-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:02:02.52054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:kindnet-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:kindnet NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: Moun"} +{"Time":"2023-05-31T12:02:02.520552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"tMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:02.520562-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.832229 3845 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:02.520571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.841431 3845 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:02.520578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.857784 3845 start.go:159] libmachine.API.Create for \"kindnet-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:02.520587-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.857815 3845 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:02.520594-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.857876 3845 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:02.520602-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.857897 3845 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:02.520609-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.857906 3845 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:02.520616-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.857954 3845 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:02.520624-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.857972 3845 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:02.520636-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.857977 3845 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:02.520645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.858302 3845 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:02.520654-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:52.993425 3845 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:02.520661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.069906 3845 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:02.520668-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.069914 3845 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:02.520676-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.070061 3845 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:02.520684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.078358 3845 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:02.520691-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.078378 3845 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:02.520698-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.078446 3845 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:02.520705-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.085711 3845 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:02.520712-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:02.520719-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.085725 3845 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:02.520726-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.085743 3845 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:02.520734-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.085751 3845 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:02.520745-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.085791 3845 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=f6:fb:75:a2:c9:27 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:02.520756-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.087338 3845 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:02.520764-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.087353 3845 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:02.520771-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:02.520778-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:53.087375 3845 client.go:171] LocalClient.Create took 229.559208ms\n"} +{"Time":"2023-05-31T12:02:02.520785-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:55.089531 3845 start.go:128] duration metric: createHost completed in 2.257317375s\n"} +{"Time":"2023-05-31T12:02:02.520792-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:55.089624 3845 start.go:83] releasing machines lock for \"kindnet-602000\", held for 2.257447458s\n"} +{"Time":"2023-05-31T12:02:02.5208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tW0531 12:01:55.089692 3845 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:02.520808-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:55.100812 3845 out.go:177] * Deleting \"kindnet-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:02.520816-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tW0531 12:01:55.118905 3845 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:02.520825-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:02.520832-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:01:55.118941 3845 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:02:02.52084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.121087 3845 start.go:364] acquiring machines lock for kindnet-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:02.520849-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.121584 3845 start.go:368] acquired machines lock for \"kindnet-602000\" in 360.625µs\n"} +{"Time":"2023-05-31T12:02:02.520864-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.121687 3845 start.go:93] Provisioning new machine with config: \u0026{Name:kindnet-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:02:02.520879-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:kindnet-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:kindnet NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: Moun"} +{"Time":"2023-05-31T12:02:02.520894-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":"tMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:02.520903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.121925 3845 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:02.520911-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.132006 3845 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:02.520918-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.179629 3845 start.go:159] libmachine.API.Create for \"kindnet-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:02.520967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.179665 3845 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:02.520984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.179817 3845 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:02.520994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.179867 3845 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:02.521002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.179887 3845 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:02.521027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.179974 3845 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:02.521036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.180006 3845 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:02.521044-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.180023 3845 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:02.521054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.180670 3845 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:02.521063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.345982 3845 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:02.521069-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.458147 3845 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:02.521077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.458153 3845 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:02.521086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.458285 3845 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:02.521095-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.466437 3845 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:02.521102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.466455 3845 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:02.521109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.466515 3845 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:02.521117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.473591 3845 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:02.521124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:02.521131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.473604 3845 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:02.521139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.473617 3845 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:02.521148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.473624 3845 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:02.521158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.473659 3845 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=2e:6e:ef:01:48:0c -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kindnet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:02.521168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.475073 3845 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:02.521173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.475089 3845 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:02.521183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:02.521189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:00.475102 3845 client.go:171] LocalClient.Create took 295.414292ms\n"} +{"Time":"2023-05-31T12:02:02.521195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:02.477308 3845 start.go:128] duration metric: createHost completed in 2.355393417s\n"} +{"Time":"2023-05-31T12:02:02.521202-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:02.477369 3845 start.go:83] releasing machines lock for \"kindnet-602000\", held for 2.355793s\n"} +{"Time":"2023-05-31T12:02:02.521208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tW0531 12:02:02.477808 3845 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p kindnet-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:02.521215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p kindnet-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:02.521222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:02.485430 3845 out.go:177] \n"} +{"Time":"2023-05-31T12:02:02.521227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tW0531 12:02:02.490541 3845 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:02.521233-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:02.521248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tW0531 12:02:02.490575 3845 out.go:239] * \n"} +{"Time":"2023-05-31T12:02:02.521253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:02:02.521259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tW0531 12:02:02.493260 3845 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:02.521267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:02.521273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:02.52128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:02.521286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:02.521291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:02.521297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:02.521303-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:02.52131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:02.521317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:02.521323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:02.521328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:02.521334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:02.521339-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:02.521345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:02.521351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:02.521357-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \tI0531 12:02:02.504453 3845 out.go:177] \n"} +{"Time":"2023-05-31T12:02:02.521362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:02.521367-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:02:02.521372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:02:02.521385-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" net_test.go:209: \"kindnet\" test finished in 5m25.551232875s, failed=true\n"} +{"Time":"2023-05-31T12:02:04.580536-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:02:04.58055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ----------------------- debugLogs start: kindnet-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:02:04.580552-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:04.580554-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580556-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:02:04.580561-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580563-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580564-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580565-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:04.580567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580568-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580569-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:02:04.580572-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580574-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580575-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580823-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:02:04.580828-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.58083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580953-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580957-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:02:04.58096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580962-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580963-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580965-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:02:04.580967-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580968-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:04.580972-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580976-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580979-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:04.58098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580982-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:04.580985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.580986-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:04.58099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.580993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.580994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580996-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.580997-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:04.580998-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581003-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581005-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:04.581008-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:02:04.581015-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.581016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581019-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:02:04.58102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:02:04.581027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.58103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581033-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:02:04.581035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581038-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:02:04.581041-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581046-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:02:04.581048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.58105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:02:04.581054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581055-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581058-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:02:04.581059-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:02:04.581065-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581068-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:02:04.58107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:02:04.581075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:02:04.581086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581091-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:02:04.581093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581096-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:02:04.5811-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581101-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:02:04.581108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.58111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581114-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:02:04.581116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581118-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kindnet daemon set:\n"} +{"Time":"2023-05-31T12:02:04.581123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.581124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kindnet pod(s):\n"} +{"Time":"2023-05-31T12:02:04.581128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.58113-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kindnet container(s) logs (current):\n"} +{"Time":"2023-05-31T12:02:04.581135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581137-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kindnet container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:02:04.581141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581142-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581144-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:02:04.581146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581147-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:02:04.581151-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581154-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:02:04.581156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" error: context \"kindnet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:04.581157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:02:04.581162-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:02:04.58117-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581171-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581173-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:02:04.581177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581181-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:02:04.581183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581187-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:02:04.58119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581192-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581193-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581195-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:02:04.581197-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:02:04.581198-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:02:04.5812-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:02:04.581201-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:02:04.581203-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:02:04.581204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:02:04.581206-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" users: null\n"} +{"Time":"2023-05-31T12:02:04.581208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581209-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:02:04.581212-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" Error in configuration: context was not found for specified context: kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.581213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581216-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:02:04.581217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.58122-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:02:04.581224-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581227-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:02:04.581231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581237-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:02:04.581238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.58124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581242-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581244-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:02:04.581245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581247-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581251-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:02:04.581253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581255-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:02:04.58126-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581264-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:02:04.581267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581268-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:02:04.581274-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581276-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581278-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:02:04.581281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581284-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:02:04.581288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581292-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:02:04.581295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581296-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581299-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.5813-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:02:04.581302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:02:04.581309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.58131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:02:04.581316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581318-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.58132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:02:04.581323-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581329-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:02:04.581332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.581333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581337-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:02:04.581339-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:04.58134-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" To start a cluster, run: \"minikube start -p kindnet-602000\"\n"} +{"Time":"2023-05-31T12:02:04.581342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.581343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" ----------------------- debugLogs end: kindnet-602000 [took: 2.060455125s] --------------------------------\n"} +{"Time":"2023-05-31T12:02:04.581348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" net_test.go:210: *** TestNetworkPlugins/group/kindnet FAILED at 2023-05-31 12:02:04.580522 -0700 PDT m=+1158.766561751\n"} +{"Time":"2023-05-31T12:02:04.581349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:02:04.581351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p kindnet-602000 -n kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.61023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p kindnet-602000 -n kindnet-602000: exit status 7 (29.580209ms)\n"} +{"Time":"2023-05-31T12:02:04.61025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.610252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:04.610256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:02:04.610258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" \n"} +{"Time":"2023-05-31T12:02:04.61026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:04.610262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:02:04.610265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:241: \"kindnet-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:02:04.610269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:175: Cleaning up \"kindnet-602000\" profile ...\n"} +{"Time":"2023-05-31T12:02:04.61027-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p kindnet-602000\n"} +{"Time":"2023-05-31T12:02:04.702991-07:00","Action":"cont","Test":"TestNetworkPlugins/group/flannel"} +{"Time":"2023-05-31T12:02:04.703003-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":"=== CONT TestNetworkPlugins/group/flannel\n"} +{"Time":"2023-05-31T12:02:04.703034-07:00","Action":"run","Test":"TestNetworkPlugins/group/flannel/Start"} +{"Time":"2023-05-31T12:02:04.703036-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"=== RUN TestNetworkPlugins/group/flannel/Start\n"} +{"Time":"2023-05-31T12:02:04.703083-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p flannel-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=flannel --driver=qemu2 \n"} +{"Time":"2023-05-31T12:02:04.956138-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"E0531 12:02:04.956108 1477 cert_rotation.go:168] key failed with : open /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/functional-730000/client.crt: no such file or directory\n"} +{"Time":"2023-05-31T12:02:14.385769-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p flannel-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=flannel --driver=qemu2 : exit status 80 (9.679043458s)\n"} +{"Time":"2023-05-31T12:02:14.385819-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:14.385826-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:14.385831-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* [flannel-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:14.385837-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:14.385843-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:14.385848-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:14.385853-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:14.385859-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:14.385864-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:14.385868-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:14.385873-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:14.385878-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* Starting control plane node flannel-602000 in cluster flannel-602000\n"} +{"Time":"2023-05-31T12:02:14.385883-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:14.385888-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:14.385893-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:14.385898-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:14.385903-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* Deleting \"flannel-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:14.385908-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:14.385913-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:14.385917-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:14.385922-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:14.385927-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:14.385931-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:14.385936-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:14.38594-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:14.385945-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:02:14.38595-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.729808 3958 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:02:14.385955-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.729936 3958 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:14.385975-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.729939 3958 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:02:14.38598-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.729941 3958 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:14.385986-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.730019 3958 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:02:14.385993-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.730977 3958 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:02:14.385999-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.746121 3958 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1895,\"bootTime\":1685557829,\"procs\":404,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:02:14.38601-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tW0531 12:02:04.746182 3958 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:02:14.386016-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.750911 3958 out.go:177] * [flannel-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:14.386021-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.756751 3958 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:14.386026-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.756791 3958 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:02:14.386031-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.760857 3958 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:14.386037-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.763978 3958 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:14.386042-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.766822 3958 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:14.386047-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.769833 3958 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:14.386052-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.772857 3958 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:14.386057-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.774500 3958 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:02:14.386063-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.774555 3958 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:02:14.386068-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.778828 3958 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:14.386074-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.785696 3958 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:02:14.386078-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.785700 3958 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:02:14.386085-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.785705 3958 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:02:14.386091-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.787525 3958 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:02:14.386097-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.790772 3958 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:14.386103-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.793884 3958 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:02:14.386108-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.793899 3958 cni.go:84] Creating CNI manager for \"flannel\"\n"} +{"Time":"2023-05-31T12:02:14.386114-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.793906 3958 start_flags.go:314] Found \"Flannel\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:02:14.386119-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.793912 3958 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:02:14.386129-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t{Name:flannel-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:flannel-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker "} +{"Time":"2023-05-31T12:02:14.386147-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:flannel NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:02:14.386156-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.794010 3958 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:14.386162-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.801824 3958 out.go:177] * Starting control plane node flannel-602000 in cluster flannel-602000\n"} +{"Time":"2023-05-31T12:02:14.386167-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.805837 3958 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:02:14.386172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.805856 3958 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:02:14.386178-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.805865 3958 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:02:14.386184-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.805913 3958 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:02:14.386192-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.805918 3958 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:02:14.386197-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.805992 3958 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/flannel-602000/config.json ...\n"} +{"Time":"2023-05-31T12:02:14.386203-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.806003 3958 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/flannel-602000/config.json: {Name:mk54b79f11014237bb64842e55c816e933b67ad0 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:14.386215-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.806195 3958 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:02:14.386221-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.806208 3958 start.go:364] acquiring machines lock for flannel-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:14.386227-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.806235 3958 start.go:368] acquired machines lock for \"flannel-602000\" in 22.375µs\n"} +{"Time":"2023-05-31T12:02:14.386238-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.806246 3958 start.go:93] Provisioning new machine with config: \u0026{Name:flannel-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:02:14.386248-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:flannel-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:flannel NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: Moun"} +{"Time":"2023-05-31T12:02:14.386266-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"tMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:14.386278-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.806277 3958 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:14.386284-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.814882 3958 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:14.386289-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831432 3958 start.go:159] libmachine.API.Create for \"flannel-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:14.386296-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831461 3958 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:14.386302-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831523 3958 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:14.386307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831541 3958 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:14.386313-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831552 3958 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:14.386318-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831603 3958 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:14.386323-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831617 3958 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:14.386329-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831627 3958 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:14.386335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.831977 3958 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:14.386341-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.935866 3958 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:14.386346-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.982981 3958 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:14.386353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.982987 3958 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:14.386359-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.983131 3958 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:14.386366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.991447 3958 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:14.386371-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.991462 3958 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:14.386376-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.991528 3958 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:14.386381-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.998785 3958 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:14.386386-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:14.38639-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.998804 3958 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:14.386396-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.998820 3958 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:14.386402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.998825 3958 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:14.386409-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:04.998855 3958 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=36:5a:34:a0:8b:4a -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:14.386418-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:05.000317 3958 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:14.386423-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:05.000338 3958 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:14.386428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:14.386433-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:05.000357 3958 client.go:171] LocalClient.Create took 168.892958ms\n"} +{"Time":"2023-05-31T12:02:14.386438-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:07.002516 3958 start.go:128] duration metric: createHost completed in 2.196253s\n"} +{"Time":"2023-05-31T12:02:14.386443-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:07.002785 3958 start.go:83] releasing machines lock for \"flannel-602000\", held for 2.196374917s\n"} +{"Time":"2023-05-31T12:02:14.386449-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tW0531 12:02:07.002842 3958 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:14.386455-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:07.009998 3958 out.go:177] * Deleting \"flannel-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:14.386461-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tW0531 12:02:07.033525 3958 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:14.386467-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:14.386472-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:07.033601 3958 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:02:14.386477-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.035828 3958 start.go:364] acquiring machines lock for flannel-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:14.386483-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.036297 3958 start.go:368] acquired machines lock for \"flannel-602000\" in 365.792µs\n"} +{"Time":"2023-05-31T12:02:14.386494-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.036401 3958 start.go:93] Provisioning new machine with config: \u0026{Name:flannel-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:02:14.386504-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:flannel-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:flannel NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: Moun"} +{"Time":"2023-05-31T12:02:14.386512-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":"tMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:14.386518-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.036672 3958 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:14.386524-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.044087 3958 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:14.386529-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.094320 3958 start.go:159] libmachine.API.Create for \"flannel-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:14.386534-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.094372 3958 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:14.386539-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.094494 3958 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:14.386544-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.094539 3958 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:14.38655-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.094556 3958 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:14.386555-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.094626 3958 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:14.38656-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.094655 3958 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:14.386565-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.094670 3958 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:14.386571-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.095194 3958 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:14.386577-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.211527 3958 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:14.386582-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.325743 3958 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:14.386587-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.325749 3958 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:14.386593-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.325893 3958 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:14.386599-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.334193 3958 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:14.386604-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.334210 3958 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:14.386609-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.334264 3958 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:14.386614-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.341231 3958 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:14.386619-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:14.386624-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.341246 3958 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:14.386629-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.341263 3958 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:14.386635-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.341272 3958 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:14.386642-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.341307 3958 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=52:a4:8a:18:03:82 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/flannel-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:14.38665-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.342855 3958 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:14.386655-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.342869 3958 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:14.38666-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:14.386665-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:12.342879 3958 client.go:171] LocalClient.Create took 248.504208ms\n"} +{"Time":"2023-05-31T12:02:14.38667-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:14.344991 3958 start.go:128] duration metric: createHost completed in 2.308330459s\n"} +{"Time":"2023-05-31T12:02:14.386675-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:14.345074 3958 start.go:83] releasing machines lock for \"flannel-602000\", held for 2.30875975s\n"} +{"Time":"2023-05-31T12:02:14.386681-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tW0531 12:02:14.345312 3958 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p flannel-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:14.386688-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p flannel-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:14.386693-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:14.353592 3958 out.go:177] \n"} +{"Time":"2023-05-31T12:02:14.386699-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tW0531 12:02:14.357315 3958 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:14.386705-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:14.38671-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tW0531 12:02:14.357346 3958 out.go:239] * \n"} +{"Time":"2023-05-31T12:02:14.386715-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:02:14.386721-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tW0531 12:02:14.359694 3958 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:14.386728-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:14.386734-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:14.386741-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:14.386748-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:14.386753-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:14.386758-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:14.386764-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:14.386771-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:14.386778-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:14.386783-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:14.386788-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:14.386793-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:14.386798-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:14.386803-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:14.386809-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:14.386815-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \tI0531 12:02:14.368483 3958 out.go:177] \n"} +{"Time":"2023-05-31T12:02:14.38682-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:14.386824-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:02:14.386829-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:02:14.38684-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net_test.go:209: \"flannel\" test finished in 5m37.417703s, failed=true\n"} +{"Time":"2023-05-31T12:02:16.533082-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:02:16.533094-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ----------------------- debugLogs start: flannel-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:02:16.533097-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:16.533099-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.5331-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533102-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533103-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:02:16.533104-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533106-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533107-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533109-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:16.53311-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533111-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53312-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533121-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:02:16.533123-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533124-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533125-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533127-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:02:16.533128-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533131-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533132-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533133-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:02:16.533135-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533136-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533137-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533138-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:02:16.53314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533141-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533142-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533143-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:16.533145-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533146-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533147-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533148-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:16.53315-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533151-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533152-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533154-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:16.533155-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533156-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533158-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533159-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:16.53316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533162-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533163-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533164-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533166-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:16.533167-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533168-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.53317-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533171-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533172-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:16.533173-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533175-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533176-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533177-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533178-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:02:16.53318-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533181-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533216-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:02:16.533222-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533224-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533225-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533227-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533228-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:02:16.53323-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533231-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533233-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533234-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533235-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:02:16.533237-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533238-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53324-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533241-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:02:16.533243-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533244-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533245-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533246-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:02:16.533248-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533249-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53325-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533252-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:02:16.533253-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533254-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533255-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533256-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:02:16.533258-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533269-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53327-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533272-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:02:16.533273-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533274-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533276-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533277-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:02:16.533278-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.53328-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533281-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533282-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:02:16.533283-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533285-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533286-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533287-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:02:16.533289-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.53329-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533291-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533292-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533294-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:02:16.533295-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533297-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533299-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.5333-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533301-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:02:16.533302-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533308-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533309-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533311-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:02:16.533312-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533313-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533314-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533316-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533317-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:02:16.533318-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533319-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533321-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533323-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe flannel daemon set:\n"} +{"Time":"2023-05-31T12:02:16.533324-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533326-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533328-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533329-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe flannel pod(s):\n"} +{"Time":"2023-05-31T12:02:16.533331-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533332-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533333-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533334-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (current):\n"} +{"Time":"2023-05-31T12:02:16.533336-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533338-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533339-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: flannel container(s) logs (previous):\n"} +{"Time":"2023-05-31T12:02:16.53334-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533342-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533343-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /run/flannel/subnet.env:\n"} +{"Time":"2023-05-31T12:02:16.533345-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533347-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533348-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533349-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/kube-flannel/cni-conf.json:\n"} +{"Time":"2023-05-31T12:02:16.533354-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533357-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533359-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533361-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:02:16.533362-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533363-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533365-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533366-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:02:16.533367-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533369-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53337-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533371-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:02:16.533373-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" error: context \"flannel-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:16.533375-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533376-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533377-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:02:16.533378-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.53338-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533381-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533382-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533384-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:02:16.533385-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533387-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533388-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53339-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533391-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:02:16.533392-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533394-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533395-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533396-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533397-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:02:16.533399-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.5334-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533401-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533402-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533404-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:02:16.533405-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533407-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533408-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533409-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53341-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:02:16.533414-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:02:16.533415-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:02:16.533417-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:02:16.533418-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:02:16.533419-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:02:16.533421-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:02:16.533422-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" users: null\n"} +{"Time":"2023-05-31T12:02:16.533423-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533424-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533425-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:02:16.533427-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" Error in configuration: context was not found for specified context: flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.533428-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53343-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533431-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:02:16.533432-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533434-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533436-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533437-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533438-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:02:16.53344-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533441-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533442-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533444-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533445-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:02:16.533446-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533448-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.53345-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533451-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533452-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:02:16.533453-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533455-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533456-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533458-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533459-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:02:16.533461-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533462-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533463-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533465-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533466-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:02:16.533468-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533469-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.53347-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533472-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533473-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:02:16.533474-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533476-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533477-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533479-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53348-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:02:16.533482-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533483-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533484-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533486-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533487-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:02:16.533488-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.53349-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533491-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533492-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533493-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:02:16.533495-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533496-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533497-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533499-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.5335-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:02:16.533502-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533503-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533504-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533506-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533507-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:02:16.533508-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.53351-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533511-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533513-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533514-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:02:16.533515-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533517-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533518-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533519-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53352-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:02:16.533522-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533523-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533525-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533526-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533527-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:02:16.533528-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.53353-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533533-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533535-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533536-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:02:16.533538-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533539-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.53354-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533542-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533543-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:02:16.533545-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533547-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533548-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.53355-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533551-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:02:16.533553-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:16.533554-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" To start a cluster, run: \"minikube start -p flannel-602000\"\n"} +{"Time":"2023-05-31T12:02:16.533555-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.533557-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" ----------------------- debugLogs end: flannel-602000 [took: 2.146684542s] --------------------------------\n"} +{"Time":"2023-05-31T12:02:16.53356-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" net_test.go:210: *** TestNetworkPlugins/group/flannel FAILED at 2023-05-31 12:02:16.533066 -0700 PDT m=+1170.719278251\n"} +{"Time":"2023-05-31T12:02:16.533561-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:02:16.533568-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p flannel-602000 -n flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.561307-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p flannel-602000 -n flannel-602000: exit status 7 (28.101875ms)\n"} +{"Time":"2023-05-31T12:02:16.56132-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.561322-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:16.561324-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:02:16.561325-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" \n"} +{"Time":"2023-05-31T12:02:16.561326-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:16.561327-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:02:16.561329-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:241: \"flannel-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:02:16.561331-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:175: Cleaning up \"flannel-602000\" profile ...\n"} +{"Time":"2023-05-31T12:02:16.561333-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p flannel-602000\n"} +{"Time":"2023-05-31T12:02:16.652022-07:00","Action":"cont","Test":"TestNetworkPlugins/group/enable-default-cni"} +{"Time":"2023-05-31T12:02:16.652034-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":"=== CONT TestNetworkPlugins/group/enable-default-cni\n"} +{"Time":"2023-05-31T12:02:16.652062-07:00","Action":"run","Test":"TestNetworkPlugins/group/enable-default-cni/Start"} +{"Time":"2023-05-31T12:02:16.652063-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":"=== RUN TestNetworkPlugins/group/enable-default-cni/Start\n"} +{"Time":"2023-05-31T12:02:16.652118-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p enable-default-cni-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --enable-default-cni=true --driver=qemu2 \n"} +{"Time":"2023-05-31T12:02:26.467027-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p enable-default-cni-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --enable-default-cni=true --driver=qemu2 : exit status 80 (9.813085s)\n"} +{"Time":"2023-05-31T12:02:26.467085-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:26.467093-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:26.467102-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* [enable-default-cni-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:26.46711-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:26.467117-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:26.467145-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:26.467153-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:26.46716-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:26.467169-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:26.467175-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:26.467183-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:26.46719-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* Starting control plane node enable-default-cni-602000 in cluster enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:26.467197-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:26.467204-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:26.467211-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:26.467217-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:26.467224-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* Deleting \"enable-default-cni-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:26.467231-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:26.467238-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:26.467244-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:26.467251-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:26.467258-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:26.467264-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:26.46727-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:26.467277-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:26.467283-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:02:26.46729-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.678245 4080 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:02:26.467297-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.678588 4080 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:26.467304-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.678592 4080 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:02:26.467311-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.678594 4080 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:26.467318-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.678693 4080 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:02:26.467326-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.680250 4080 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:02:26.467334-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.695432 4080 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1907,\"bootTime\":1685557829,\"procs\":402,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:02:26.467347-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tW0531 12:02:16.695490 4080 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:02:26.467355-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.700449 4080 out.go:177] * [enable-default-cni-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:26.467362-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.706265 4080 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:26.467368-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.706313 4080 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:02:26.467381-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.710332 4080 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:26.467388-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.713382 4080 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:26.467395-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.716307 4080 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:26.467403-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.719339 4080 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:26.46741-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.722345 4080 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:26.467418-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.724030 4080 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:02:26.467426-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.724082 4080 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:02:26.467433-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.728244 4080 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:26.467444-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.735204 4080 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:02:26.467451-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.735208 4080 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:02:26.46746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.735212 4080 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:02:26.467469-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.737051 4080 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:02:26.467477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.740334 4080 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:26.467485-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tE0531 12:02:16.743418 4080 start_flags.go:453] Found deprecated --enable-default-cni flag, setting --cni=bridge\n"} +{"Time":"2023-05-31T12:02:26.467492-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.743426 4080 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:02:26.467501-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.743438 4080 cni.go:84] Creating CNI manager for \"bridge\"\n"} +{"Time":"2023-05-31T12:02:26.467509-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.743442 4080 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:02:26.467516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.743448 4080 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:02:26.46753-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t{Name:enable-default-cni-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:enable-default-cni-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Co"} +{"Time":"2023-05-31T12:02:26.467545-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":"ntainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:bridge NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet Sta"} +{"Time":"2023-05-31T12:02:26.467556-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":"ticIP:}\n"} +{"Time":"2023-05-31T12:02:26.467563-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.743537 4080 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:26.467571-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.746324 4080 out.go:177] * Starting control plane node enable-default-cni-602000 in cluster enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:26.467578-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754330 4080 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:02:26.467586-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754350 4080 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:02:26.467593-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754363 4080 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:02:26.467601-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754410 4080 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:02:26.467609-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754415 4080 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:02:26.467617-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754470 4080 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/enable-default-cni-602000/config.json ...\n"} +{"Time":"2023-05-31T12:02:26.467625-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754482 4080 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/enable-default-cni-602000/config.json: {Name:mkff4cc599827de4e5b99eb9ad0e06ff07b84e9b Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:26.467634-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754668 4080 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:02:26.467642-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754681 4080 start.go:364] acquiring machines lock for enable-default-cni-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:26.467651-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754708 4080 start.go:368] acquired machines lock for \"enable-default-cni-602000\" in 22.25µs\n"} +{"Time":"2023-05-31T12:02:26.467668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754721 4080 start.go:93] Provisioning new machine with config: \u0026{Name:enable-default-cni-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kub"} +{"Time":"2023-05-31T12:02:26.467682-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":"ernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:enable-default-cni-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:bridge NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID"} +{"Time":"2023-05-31T12:02:26.467694-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":":docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:26.467702-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.754749 4080 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:26.46771-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.763397 4080 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:26.467718-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780057 4080 start.go:159] libmachine.API.Create for \"enable-default-cni-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:26.467725-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780082 4080 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:26.467733-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780141 4080 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:26.46774-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780162 4080 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:26.467747-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780172 4080 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:26.467756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780219 4080 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:26.467763-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780233 4080 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:26.46777-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780243 4080 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:26.467778-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.780583 4080 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:26.467787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.888472 4080 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:26.467795-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.940270 4080 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:26.467802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.940276 4080 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:26.46781-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.940422 4080 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:26.467818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.948943 4080 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:26.467825-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.948957 4080 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:26.467832-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.949019 4080 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:26.46784-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.956095 4080 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:26.467846-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:26.467854-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.956108 4080 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:26.467862-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.956120 4080 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:26.46787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.956125 4080 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:26.467881-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.956160 4080 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=c6:47:0b:cd:a0:4c -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:26.467892-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.957586 4080 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:26.467899-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.957601 4080 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:26.467906-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:26.467913-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:16.957619 4080 client.go:171] LocalClient.Create took 177.535333ms\n"} +{"Time":"2023-05-31T12:02:26.46792-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:18.959814 4080 start.go:128] duration metric: createHost completed in 2.205065375s\n"} +{"Time":"2023-05-31T12:02:26.467927-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:18.959891 4080 start.go:83] releasing machines lock for \"enable-default-cni-602000\", held for 2.205204583s\n"} +{"Time":"2023-05-31T12:02:26.467936-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tW0531 12:02:18.959946 4080 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:26.467944-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:18.971220 4080 out.go:177] * Deleting \"enable-default-cni-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:26.467952-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tW0531 12:02:18.993313 4080 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:26.467961-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:26.468124-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:18.993355 4080 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:02:26.468142-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:23.995521 4080 start.go:364] acquiring machines lock for enable-default-cni-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:26.468152-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:23.996063 4080 start.go:368] acquired machines lock for \"enable-default-cni-602000\" in 435.25µs\n"} +{"Time":"2023-05-31T12:02:26.468167-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:23.996167 4080 start.go:93] Provisioning new machine with config: \u0026{Name:enable-default-cni-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kub"} +{"Time":"2023-05-31T12:02:26.468209-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":"ernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:enable-default-cni-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:bridge NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID"} +{"Time":"2023-05-31T12:02:26.468223-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":":docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:26.468232-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:23.996456 4080 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:26.46824-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.006214 4080 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:26.468248-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.053549 4080 start.go:159] libmachine.API.Create for \"enable-default-cni-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:26.468256-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.053602 4080 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:26.468265-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.053753 4080 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:26.468272-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.053808 4080 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:26.46828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.053828 4080 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:26.468287-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.053912 4080 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:26.468294-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.053942 4080 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:26.468302-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.053959 4080 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:26.46831-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.054502 4080 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:26.468318-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.175744 4080 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:26.468326-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.407080 4080 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:26.468333-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.407091 4080 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:26.468341-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.407248 4080 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:26.46835-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.415622 4080 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:26.468357-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.415638 4080 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:26.468365-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.415687 4080 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:26.468373-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.422797 4080 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:26.46838-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:26.468387-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.422817 4080 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:26.468396-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.422833 4080 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:26.468404-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.422847 4080 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:26.468416-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.422889 4080 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=06:5b:b1:13:55:f7 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/enable-default-cni-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:26.468427-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.424352 4080 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:26.468435-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.424367 4080 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:26.468464-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:26.468472-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:24.424381 4080 client.go:171] LocalClient.Create took 370.776458ms\n"} +{"Time":"2023-05-31T12:02:26.468479-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:26.426515 4080 start.go:128] duration metric: createHost completed in 2.430068625s\n"} +{"Time":"2023-05-31T12:02:26.468569-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:26.426580 4080 start.go:83] releasing machines lock for \"enable-default-cni-602000\", held for 2.4305285s\n"} +{"Time":"2023-05-31T12:02:26.468588-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tW0531 12:02:26.427010 4080 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p enable-default-cni-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:26.468597-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p enable-default-cni-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:26.468604-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:26.433396 4080 out.go:177] \n"} +{"Time":"2023-05-31T12:02:26.468611-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tW0531 12:02:26.438696 4080 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:26.468618-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:26.468624-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tW0531 12:02:26.438740 4080 out.go:239] * \n"} +{"Time":"2023-05-31T12:02:26.46863-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:02:26.468638-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tW0531 12:02:26.441092 4080 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:26.468646-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:26.468652-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:26.468658-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:26.468663-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:26.468669-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:26.468674-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:26.468681-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:26.468689-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:26.468696-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:26.468702-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:26.468707-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:26.468712-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:26.468718-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:26.468724-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:26.46873-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:26.468741-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \tI0531 12:02:26.451731 4080 out.go:177] \n"} +{"Time":"2023-05-31T12:02:26.468746-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:26.468751-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:02:26.468756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:02:26.468771-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" net_test.go:209: \"enable-default-cni\" test finished in 5m49.498774459s, failed=true\n"} +{"Time":"2023-05-31T12:02:28.420453-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:02:28.420466-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ----------------------- debugLogs start: enable-default-cni-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:02:28.420471-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:28.420474-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420476-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420477-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420479-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:02:28.420481-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420483-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420484-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420486-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:28.420487-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420488-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420489-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420491-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:02:28.420492-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420493-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420494-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420496-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:02:28.420497-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420498-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420499-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420501-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:02:28.420502-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420503-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420504-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420506-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:02:28.420507-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420508-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420509-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420511-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:28.420513-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420514-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420515-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420516-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:28.420518-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420519-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420521-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420522-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:28.420523-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420525-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420526-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420527-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:28.420529-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.42053-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420532-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420533-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420534-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:28.420535-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420537-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420538-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420539-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420541-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:28.420542-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420543-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420545-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420546-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420547-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:02:28.420549-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.42055-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420551-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420553-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:02:28.420554-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420555-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420557-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420558-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420559-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:02:28.42056-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420562-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420563-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420571-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420572-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:02:28.420573-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420575-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420576-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420577-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:02:28.420578-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.42058-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420581-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420582-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:02:28.420584-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420585-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420586-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420587-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:02:28.420588-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.42059-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420591-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420592-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:02:28.420593-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420595-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420597-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420598-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:02:28.4206-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420601-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420602-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420604-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:02:28.420605-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420607-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420608-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420609-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:02:28.420611-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420612-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420613-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420614-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:02:28.420626-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420631-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420633-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420635-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420636-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:02:28.420638-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.42064-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420641-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420643-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420644-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:02:28.420646-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420647-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420648-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.42065-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420651-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:02:28.420652-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420654-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420656-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420658-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420659-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:02:28.42066-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420662-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420663-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420664-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420665-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:02:28.420667-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420668-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.42067-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420671-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:02:28.420672-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420674-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420675-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420677-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:02:28.420678-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" error: context \"enable-default-cni-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:28.420679-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420681-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420683-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:02:28.420685-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420686-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420688-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420689-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.42069-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:02:28.420692-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420693-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420694-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420696-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420697-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:02:28.420698-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.4207-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420701-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420703-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420704-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:02:28.420706-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420707-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420709-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420711-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420712-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:02:28.420713-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420715-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420716-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420717-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420718-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:02:28.42072-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:02:28.420721-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:02:28.420723-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:02:28.420724-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:02:28.420725-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:02:28.420727-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:02:28.420728-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" users: null\n"} +{"Time":"2023-05-31T12:02:28.42073-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420732-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420733-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:02:28.420734-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" Error in configuration: context was not found for specified context: enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.420736-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420737-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420739-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:02:28.42074-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420742-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420743-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420744-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420745-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:02:28.420747-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420748-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420749-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420751-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420752-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:02:28.420753-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420755-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420756-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420757-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420759-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:02:28.420761-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420762-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420763-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420765-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420767-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:02:28.420769-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.42077-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420772-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420773-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420775-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:02:28.420776-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420777-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420779-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.42078-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420781-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:02:28.420783-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420785-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420786-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420787-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420789-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:02:28.42079-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420792-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420793-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420794-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420796-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:02:28.420797-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420798-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.4208-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420801-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420802-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:02:28.420804-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420805-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420807-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420808-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420809-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:02:28.420811-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420812-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420813-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420814-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420816-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:02:28.420817-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420818-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.42082-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420821-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420822-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:02:28.420823-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420825-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420827-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420828-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420829-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:02:28.420831-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420832-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420833-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420834-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420836-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:02:28.420837-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420839-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.42084-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420841-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420843-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:02:28.420844-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420846-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420847-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420848-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.42085-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:02:28.420851-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.420852-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420854-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420855-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420857-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:02:28.420858-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:28.42086-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" To start a cluster, run: \"minikube start -p enable-default-cni-602000\"\n"} +{"Time":"2023-05-31T12:02:28.420861-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.420862-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" ----------------------- debugLogs end: enable-default-cni-602000 [took: 1.953184917s] --------------------------------\n"} +{"Time":"2023-05-31T12:02:28.420866-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" net_test.go:210: *** TestNetworkPlugins/group/enable-default-cni FAILED at 2023-05-31 12:02:28.42044 -0700 PDT m=+1182.606823501\n"} +{"Time":"2023-05-31T12:02:28.420868-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:02:28.420869-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p enable-default-cni-602000 -n enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.448437-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p enable-default-cni-602000 -n enable-default-cni-602000: exit status 7 (27.860292ms)\n"} +{"Time":"2023-05-31T12:02:28.44845-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.448452-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:28.448454-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:02:28.448456-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" \n"} +{"Time":"2023-05-31T12:02:28.448458-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:28.448459-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:02:28.448461-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:241: \"enable-default-cni-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:02:28.448464-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:175: Cleaning up \"enable-default-cni-602000\" profile ...\n"} +{"Time":"2023-05-31T12:02:28.448469-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p enable-default-cni-602000\n"} +{"Time":"2023-05-31T12:02:28.542537-07:00","Action":"cont","Test":"TestNetworkPlugins/group/bridge"} +{"Time":"2023-05-31T12:02:28.54255-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":"=== CONT TestNetworkPlugins/group/bridge\n"} +{"Time":"2023-05-31T12:02:28.542585-07:00","Action":"run","Test":"TestNetworkPlugins/group/bridge/Start"} +{"Time":"2023-05-31T12:02:28.542589-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":"=== RUN TestNetworkPlugins/group/bridge/Start\n"} +{"Time":"2023-05-31T12:02:28.542649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p bridge-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=bridge --driver=qemu2 \n"} +{"Time":"2023-05-31T12:02:38.279842-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p bridge-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --cni=bridge --driver=qemu2 : exit status 80 (9.735262125s)\n"} +{"Time":"2023-05-31T12:02:38.279943-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:38.279953-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:38.27996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* [bridge-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:38.279968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:38.279976-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:38.279984-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:38.279992-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:38.279999-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:38.280005-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:38.280012-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:38.280019-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:38.280026-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* Starting control plane node bridge-602000 in cluster bridge-602000\n"} +{"Time":"2023-05-31T12:02:38.280033-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:38.280046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:38.280053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:38.28006-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:38.280067-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* Deleting \"bridge-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:38.280074-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:38.280081-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:38.280087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:38.280094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:38.2801-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:38.280106-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:38.280112-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:38.280118-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:38.280124-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:02:38.280133-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.569185 4192 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:02:38.280141-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.569306 4192 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:38.280148-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.569309 4192 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:02:38.280155-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.569311 4192 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:38.280162-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.569377 4192 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:02:38.28017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.570433 4192 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:02:38.280178-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.585525 4192 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1919,\"bootTime\":1685557829,\"procs\":399,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:02:38.280192-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tW0531 12:02:28.585586 4192 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:02:38.280199-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.590842 4192 out.go:177] * [bridge-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:38.280205-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.597683 4192 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:38.280213-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.601842 4192 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:38.28022-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.597726 4192 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:02:38.280227-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.606170 4192 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:38.280234-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.608828 4192 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:38.280241-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.611801 4192 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:38.280248-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.614860 4192 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:38.280255-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.618163 4192 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:02:38.280266-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.618213 4192 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:02:38.280274-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.622859 4192 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:38.28028-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.629757 4192 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:02:38.280287-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.629761 4192 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:02:38.280295-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.629766 4192 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:02:38.280303-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.631617 4192 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:02:38.280313-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.634838 4192 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:38.28032-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.637957 4192 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:02:38.280328-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.637971 4192 cni.go:84] Creating CNI manager for \"bridge\"\n"} +{"Time":"2023-05-31T12:02:38.280336-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.637974 4192 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:02:38.280343-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.637980 4192 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:02:38.280359-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t{Name:bridge-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:bridge-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CR"} +{"Time":"2023-05-31T12:02:38.280378-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":"ISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:bridge NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:02:38.28039-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.638354 4192 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:38.280398-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.642794 4192 out.go:177] * Starting control plane node bridge-602000 in cluster bridge-602000\n"} +{"Time":"2023-05-31T12:02:38.280406-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.649770 4192 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:02:38.280413-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.649794 4192 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:02:38.280421-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.649809 4192 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:02:38.280429-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.649865 4192 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:02:38.28044-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.649871 4192 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:02:38.280448-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.649928 4192 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/bridge-602000/config.json ...\n"} +{"Time":"2023-05-31T12:02:38.280456-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.649941 4192 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/bridge-602000/config.json: {Name:mk14488749276ef558d7918d9540b3ad0816a23c Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:38.280563-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.650137 4192 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:02:38.280584-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.650151 4192 start.go:364] acquiring machines lock for bridge-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:38.280593-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.650181 4192 start.go:368] acquired machines lock for \"bridge-602000\" in 25.083µs\n"} +{"Time":"2023-05-31T12:02:38.280609-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.650197 4192 start.go:93] Provisioning new machine with config: \u0026{Name:bridge-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfi"} +{"Time":"2023-05-31T12:02:38.280622-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":"g:{KubernetesVersion:v1.27.2 ClusterName:bridge-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:bridge NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMS"} +{"Time":"2023-05-31T12:02:38.280635-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":"ize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:38.280644-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.650234 4192 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:38.280653-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.657764 4192 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:38.28066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.674540 4192 start.go:159] libmachine.API.Create for \"bridge-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:38.280671-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.674571 4192 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:38.280679-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.674638 4192 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:38.280687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.674657 4192 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:38.280694-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.674666 4192 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:38.280701-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.674716 4192 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:38.280709-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.674731 4192 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:38.280716-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.674740 4192 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:38.280725-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.675064 4192 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:38.280733-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.797301 4192 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:38.28074-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.907063 4192 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:38.280747-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.907069 4192 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:38.280755-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.907205 4192 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:38.280766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.915630 4192 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:38.280772-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.915645 4192 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:38.28078-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.915696 4192 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:38.280788-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.922693 4192 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:38.280797-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:38.280804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.922710 4192 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:38.280811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.922724 4192 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:38.280819-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.922729 4192 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:38.28083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.922759 4192 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=5a:2c:6a:0b:cf:3f -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:38.280841-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.924173 4192 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:38.280849-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.924184 4192 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:38.280856-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:38.280862-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:28.924201 4192 client.go:171] LocalClient.Create took 249.629875ms\n"} +{"Time":"2023-05-31T12:02:38.28087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:30.926363 4192 start.go:128] duration metric: createHost completed in 2.276144875s\n"} +{"Time":"2023-05-31T12:02:38.280877-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:30.926429 4192 start.go:83] releasing machines lock for \"bridge-602000\", held for 2.276272083s\n"} +{"Time":"2023-05-31T12:02:38.280885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tW0531 12:02:30.926481 4192 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:38.280893-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:30.932750 4192 out.go:177] * Deleting \"bridge-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:38.280901-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tW0531 12:02:30.951604 4192 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:38.280909-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:38.280917-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:30.951639 4192 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:02:38.280924-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:35.953757 4192 start.go:364] acquiring machines lock for bridge-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:38.280934-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:35.954276 4192 start.go:368] acquired machines lock for \"bridge-602000\" in 396.5µs\n"} +{"Time":"2023-05-31T12:02:38.280953-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:35.954371 4192 start.go:93] Provisioning new machine with config: \u0026{Name:bridge-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfi"} +{"Time":"2023-05-31T12:02:38.280967-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":"g:{KubernetesVersion:v1.27.2 ClusterName:bridge-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI:bridge NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMS"} +{"Time":"2023-05-31T12:02:38.280979-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":"ize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:38.280987-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:35.954644 4192 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:38.280995-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:35.962037 4192 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:38.281002-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.009311 4192 start.go:159] libmachine.API.Create for \"bridge-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:38.28101-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.009355 4192 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:38.281018-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.009510 4192 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:38.281026-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.009561 4192 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:38.281033-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.009578 4192 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:38.28104-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.009658 4192 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:38.281048-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.009686 4192 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:38.281056-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.009702 4192 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:38.281064-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.010276 4192 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:38.281071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.133481 4192 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:38.281079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.218435 4192 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:38.281087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.218440 4192 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:38.281095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.218592 4192 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:38.281104-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.227262 4192 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:38.281111-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.227277 4192 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:38.281118-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.227337 4192 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:38.281125-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.234420 4192 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:38.281132-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:38.281138-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.234433 4192 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:38.281146-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.234449 4192 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:38.281154-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.234455 4192 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:38.281164-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.234494 4192 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=46:8f:37:c0:b9:50 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/bridge-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:38.281176-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.236043 4192 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:38.281183-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.236061 4192 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:38.281191-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:38.281197-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:36.236075 4192 client.go:171] LocalClient.Create took 226.717083ms\n"} +{"Time":"2023-05-31T12:02:38.281205-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:38.238328 4192 start.go:128] duration metric: createHost completed in 2.283669875s\n"} +{"Time":"2023-05-31T12:02:38.281212-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:38.238410 4192 start.go:83] releasing machines lock for \"bridge-602000\", held for 2.284144959s\n"} +{"Time":"2023-05-31T12:02:38.281218-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tW0531 12:02:38.238824 4192 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p bridge-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:38.281226-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p bridge-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:38.281232-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:38.249361 4192 out.go:177] \n"} +{"Time":"2023-05-31T12:02:38.281239-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tW0531 12:02:38.253581 4192 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:38.281245-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:38.28125-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tW0531 12:02:38.253604 4192 out.go:239] * \n"} +{"Time":"2023-05-31T12:02:38.281256-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:02:38.281261-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tW0531 12:02:38.256125 4192 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:38.281269-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:38.281274-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:38.28128-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:38.281285-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:38.28129-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:38.281296-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:38.281302-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:38.281309-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:38.281318-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:38.281323-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:38.281329-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:38.281334-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:38.281339-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:38.281344-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:38.28135-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:38.281356-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \tI0531 12:02:38.264479 4192 out.go:177] \n"} +{"Time":"2023-05-31T12:02:38.281361-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:38.281366-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:02:38.28137-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:02:38.281384-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" net_test.go:209: \"bridge\" test finished in 6m1.311744s, failed=true\n"} +{"Time":"2023-05-31T12:02:40.269623-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:02:40.269636-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ----------------------- debugLogs start: bridge-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:02:40.269638-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:40.26964-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269642-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269643-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269645-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:02:40.269646-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269648-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269649-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.26965-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:40.269651-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269653-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269654-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269655-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:02:40.269657-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269658-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269659-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.26966-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:02:40.269662-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269663-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269664-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269666-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:02:40.269667-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269668-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269669-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269671-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:02:40.269672-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269676-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269677-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269678-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:40.26968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269681-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269682-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269683-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:40.269685-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269686-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269687-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269688-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:40.26969-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269691-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269692-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269693-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:40.269695-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269696-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269698-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269699-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.2697-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:40.269701-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269703-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269704-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269705-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269706-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:40.269708-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269709-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269711-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269712-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269713-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:02:40.269742-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269747-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269749-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269751-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:02:40.269754-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269756-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269758-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269759-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.26976-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:02:40.269762-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269764-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269765-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269766-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269768-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:02:40.269769-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269771-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269772-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269773-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:02:40.269774-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269776-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269777-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269778-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:02:40.2698-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269801-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269803-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269804-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:02:40.269806-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269807-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269808-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.26981-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:02:40.269811-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269813-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269814-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269816-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:02:40.269818-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269819-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.26982-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269822-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:02:40.269823-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269824-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269826-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269827-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:02:40.269828-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.26983-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269831-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269832-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:02:40.269834-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269835-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269837-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269838-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269839-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:02:40.269872-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269876-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269878-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269879-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269881-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:02:40.269882-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269883-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269885-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269886-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269888-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:02:40.269889-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269892-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269894-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269895-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269896-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:02:40.269898-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.2699-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269901-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269902-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269903-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:02:40.269905-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269906-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269909-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.26991-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:02:40.269911-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269913-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269914-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269915-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:02:40.269917-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" error: context \"bridge-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:40.269919-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.26992-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269921-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:02:40.269923-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269924-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269926-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269927-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269929-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:02:40.26993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269932-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269933-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269934-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269935-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:02:40.269937-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269938-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269939-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269941-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269942-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:02:40.269943-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269944-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269946-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269947-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269948-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:02:40.269949-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.26995-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269952-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269953-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269954-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:02:40.269956-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:02:40.269957-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:02:40.269958-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:02:40.26996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:02:40.269961-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:02:40.269963-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:02:40.269964-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" users: null\n"} +{"Time":"2023-05-31T12:02:40.269965-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269967-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269968-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:02:40.26997-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" Error in configuration: context was not found for specified context: bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.269971-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269972-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269973-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:02:40.269975-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269976-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269978-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269979-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.26998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:02:40.269982-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269983-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269984-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269986-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269987-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:02:40.269989-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.26999-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269992-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269993-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.269995-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:02:40.269996-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.269998-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.269999-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.27-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270002-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:02:40.270003-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270004-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270006-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270007-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270008-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:02:40.27001-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270011-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270012-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270014-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270015-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:02:40.270017-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270018-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.27002-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270021-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270022-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:02:40.270024-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270025-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270027-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270028-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270029-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:02:40.270031-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270032-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270034-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270035-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270037-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:02:40.270038-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.27004-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270041-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270042-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270044-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:02:40.270045-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270046-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270047-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270049-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.27005-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:02:40.270052-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270053-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270055-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270056-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270058-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:02:40.270059-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.27006-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270062-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270063-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270064-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:02:40.270066-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270068-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270069-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270072-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:02:40.270073-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270075-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270076-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270078-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270079-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:02:40.27008-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270082-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270083-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270085-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:02:40.270087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270088-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.27009-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:02:40.270094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:40.270095-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" To start a cluster, run: \"minikube start -p bridge-602000\"\n"} +{"Time":"2023-05-31T12:02:40.270096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.270098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" ----------------------- debugLogs end: bridge-602000 [took: 1.989563292s] --------------------------------\n"} +{"Time":"2023-05-31T12:02:40.270101-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" net_test.go:210: *** TestNetworkPlugins/group/bridge FAILED at 2023-05-31 12:02:40.26961 -0700 PDT m=+1194.456164751\n"} +{"Time":"2023-05-31T12:02:40.270103-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:02:40.270104-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p bridge-602000 -n bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.301071-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p bridge-602000 -n bridge-602000: exit status 7 (31.327167ms)\n"} +{"Time":"2023-05-31T12:02:40.301084-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.301087-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:40.301088-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:02:40.30109-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" \n"} +{"Time":"2023-05-31T12:02:40.301091-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:40.301092-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:02:40.301094-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:241: \"bridge-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:02:40.301096-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:175: Cleaning up \"bridge-602000\" profile ...\n"} +{"Time":"2023-05-31T12:02:40.301098-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p bridge-602000\n"} +{"Time":"2023-05-31T12:02:40.396716-07:00","Action":"cont","Test":"TestNetworkPlugins/group/kubenet"} +{"Time":"2023-05-31T12:02:40.396729-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":"=== CONT TestNetworkPlugins/group/kubenet\n"} +{"Time":"2023-05-31T12:02:40.396759-07:00","Action":"run","Test":"TestNetworkPlugins/group/kubenet/Start"} +{"Time":"2023-05-31T12:02:40.396761-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"=== RUN TestNetworkPlugins/group/kubenet/Start\n"} +{"Time":"2023-05-31T12:02:40.396815-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" net_test.go:111: (dbg) Run: out/minikube-darwin-arm64 start -p kubenet-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --network-plugin=kubenet --driver=qemu2 \n"} +{"Time":"2023-05-31T12:02:50.152017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" net_test.go:111: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p kubenet-602000 --memory=3072 --alsologtostderr --wait=true --wait-timeout=15m --network-plugin=kubenet --driver=qemu2 : exit status 80 (9.752057292s)\n"} +{"Time":"2023-05-31T12:02:50.152078-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:50.152089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:50.152094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* [kubenet-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:50.1521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:50.152108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:50.152125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:50.152131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:50.152136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:50.15214-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:50.152145-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:50.15215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:50.152175-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* Starting control plane node kubenet-602000 in cluster kubenet-602000\n"} +{"Time":"2023-05-31T12:02:50.152184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:50.152189-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:50.152194-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:50.152199-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:50.152267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* Deleting \"kubenet-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:50.152276-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:50.152281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:02:50.152321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:50.152328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:50.152333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:50.152339-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:50.152344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:50.152349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:50.152355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:02:50.15236-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.424568 4306 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:02:50.152366-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.424721 4306 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:50.152372-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.424723 4306 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:02:50.152378-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.424726 4306 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:02:50.152383-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.424795 4306 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:02:50.152389-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.425863 4306 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:02:50.152396-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.440787 4306 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1931,\"bootTime\":1685557829,\"procs\":398,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:02:50.152444-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tW0531 12:02:40.440870 4306 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:02:50.152451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.447953 4306 out.go:177] * [kubenet-602000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:02:50.152456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.451941 4306 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:02:50.152462-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.451995 4306 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:02:50.152467-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.454915 4306 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:02:50.152473-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.457934 4306 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:02:50.152479-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.460910 4306 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:02:50.152484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.462224 4306 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:02:50.15249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.464906 4306 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:02:50.152495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.468246 4306 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:02:50.152502-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.468306 4306 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:02:50.152507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.472718 4306 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:02:50.152515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.479906 4306 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:02:50.15252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.479911 4306 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:02:50.152526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.479916 4306 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:02:50.152532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.481795 4306 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:02:50.152539-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.485786 4306 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:02:50.152545-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.489976 4306 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:02:50.152551-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.489994 4306 cni.go:80] network plugin configured as \"kubenet\", returning disabled\n"} +{"Time":"2023-05-31T12:02:50.152557-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.489999 4306 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:02:50.152567-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t{Name:kubenet-602000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:kubenet-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker "} +{"Time":"2023-05-31T12:02:50.152578-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"CRISocket: NetworkPlugin:kubenet FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:02:50.152655-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.490081 4306 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:50.152666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.497863 4306 out.go:177] * Starting control plane node kubenet-602000 in cluster kubenet-602000\n"} +{"Time":"2023-05-31T12:02:50.152672-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.501898 4306 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:02:50.152678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.501921 4306 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:02:50.152684-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.501934 4306 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:02:50.15269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.501995 4306 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:02:50.152697-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.502001 4306 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:02:50.152703-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.502061 4306 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/kubenet-602000/config.json ...\n"} +{"Time":"2023-05-31T12:02:50.152709-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.502073 4306 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/kubenet-602000/config.json: {Name:mkef00d7a68aa94c86ba047c4726941e2b1b703a Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:50.152718-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.502270 4306 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:02:50.152773-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.502283 4306 start.go:364] acquiring machines lock for kubenet-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:50.152856-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.502313 4306 start.go:368] acquired machines lock for \"kubenet-602000\" in 24.583µs\n"} +{"Time":"2023-05-31T12:02:50.152868-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.502327 4306 start.go:93] Provisioning new machine with config: \u0026{Name:kubenet-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:02:50.152879-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:kubenet-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:kubenet FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMS"} +{"Time":"2023-05-31T12:02:50.152889-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"ize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:50.152896-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.502354 4306 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:50.152903-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.510892 4306 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:50.152908-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527450 4306 start.go:159] libmachine.API.Create for \"kubenet-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:50.152915-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527472 4306 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:50.15292-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527535 4306 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:50.152926-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527556 4306 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:50.152931-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527567 4306 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:50.152936-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527604 4306 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:50.152991-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527623 4306 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:50.153024-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527629 4306 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:50.153031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.527962 4306 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:50.153037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.640383 4306 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:50.153042-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.734500 4306 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:50.153047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.734508 4306 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:50.153054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.734648 4306 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:50.153061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.743079 4306 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:50.153066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.743094 4306 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:50.153072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.743148 4306 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:50.153077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.750284 4306 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:50.153083-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:50.153087-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.750298 4306 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:50.153093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.750320 4306 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:50.153099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.750326 4306 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:50.153106-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.750369 4306 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=ee:c2:46:8c:61:da -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:50.153115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.751901 4306 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:50.15312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.751915 4306 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:50.153125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:50.15313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:40.751934 4306 client.go:171] LocalClient.Create took 224.461ms\n"} +{"Time":"2023-05-31T12:02:50.153135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:42.754077 4306 start.go:128] duration metric: createHost completed in 2.251738417s\n"} +{"Time":"2023-05-31T12:02:50.15314-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:42.754137 4306 start.go:83] releasing machines lock for \"kubenet-602000\", held for 2.251847833s\n"} +{"Time":"2023-05-31T12:02:50.153146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tW0531 12:02:42.754184 4306 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:50.153152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:42.760389 4306 out.go:177] * Deleting \"kubenet-602000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:02:50.153158-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tW0531 12:02:42.781454 4306 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:50.153164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:50.153169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:42.781482 4306 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:02:50.153217-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.783661 4306 start.go:364] acquiring machines lock for kubenet-602000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:02:50.153225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.784101 4306 start.go:368] acquired machines lock for \"kubenet-602000\" in 336.625µs\n"} +{"Time":"2023-05-31T12:02:50.153238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.784215 4306 start.go:93] Provisioning new machine with config: \u0026{Name:kubenet-602000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:3072 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:02:50.15325-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:kubenet-602000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:kubenet FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:15m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMS"} +{"Time":"2023-05-31T12:02:50.153259-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":"ize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:02:50.153266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.784467 4306 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:50.153272-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.794649 4306 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=3072MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:02:50.15328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.842567 4306 start.go:159] libmachine.API.Create for \"kubenet-602000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:02:50.153312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.842609 4306 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:02:50.153321-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.842815 4306 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:02:50.153327-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.842893 4306 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:50.153332-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.842914 4306 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:50.153343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.843021 4306 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:02:50.153349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.843055 4306 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:02:50.153355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.843078 4306 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:02:50.153361-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.843570 4306 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:02:50.153368-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:47.962404 4306 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:02:50.153373-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.090031 4306 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:02:50.153378-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.090037 4306 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:02:50.153384-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.090191 4306 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:50.15339-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.099075 4306 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:50.153395-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.099098 4306 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:50.153401-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.099175 4306 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:02:50.153407-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.106575 4306 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:02:50.153412-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:50.153417-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.106591 4306 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:02:50.153425-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.106608 4306 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:50.153431-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.106639 4306 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:02:50.153438-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.106680 4306 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 3072 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/qemu.pid -device virtio-net-pci,netdev=net0,mac=02:af:61:4e:80:8b -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/kubenet-602000/disk.qcow2\n"} +{"Time":"2023-05-31T12:02:50.153446-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.108243 4306 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:02:50.153451-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.108257 4306 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:02:50.153456-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t\n"} +{"Time":"2023-05-31T12:02:50.153461-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:48.108275 4306 client.go:171] LocalClient.Create took 265.663042ms\n"} +{"Time":"2023-05-31T12:02:50.153466-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:50.110434 4306 start.go:128] duration metric: createHost completed in 2.325965s\n"} +{"Time":"2023-05-31T12:02:50.153472-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:50.110530 4306 start.go:83] releasing machines lock for \"kubenet-602000\", held for 2.326437625s\n"} +{"Time":"2023-05-31T12:02:50.153478-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tW0531 12:02:50.111021 4306 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p kubenet-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:50.153484-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p kubenet-602000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:50.15349-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:50.121198 4306 out.go:177] \n"} +{"Time":"2023-05-31T12:02:50.153495-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tW0531 12:02:50.124447 4306 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:50.153501-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:02:50.153507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tW0531 12:02:50.124474 4306 out.go:239] * \n"} +{"Time":"2023-05-31T12:02:50.153512-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t* \n"} +{"Time":"2023-05-31T12:02:50.153518-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tW0531 12:02:50.126873 4306 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:50.153558-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:50.153566-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:50.153571-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:50.153577-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:50.153582-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:50.153613-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:50.153619-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:50.153627-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:02:50.153634-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:50.153639-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:02:50.153645-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:02:50.15365-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:50.153656-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:02:50.153661-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:02:50.153666-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:02:50.153673-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \tI0531 12:02:50.136389 4306 out.go:177] \n"} +{"Time":"2023-05-31T12:02:50.153678-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" \n"} +{"Time":"2023-05-31T12:02:50.153683-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:02:50.153688-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" net_test.go:113: failed start: exit status 80\n"} +{"Time":"2023-05-31T12:02:50.153704-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" net_test.go:209: \"kubenet\" test finished in 6m13.185000208s, failed=true\n"} +{"Time":"2023-05-31T12:02:52.204958-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" net_test.go:210: \n"} +{"Time":"2023-05-31T12:02:52.204971-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ----------------------- debugLogs start: kubenet-602000 [pass: false] --------------------------------\n"} +{"Time":"2023-05-31T12:02:52.204973-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nslookup kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:52.204975-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.204977-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.204978-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.20498-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nslookup debug kubernetes.default a-records:\n"} +{"Time":"2023-05-31T12:02:52.204981-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.204983-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.204984-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.204985-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: dig search kubernetes.default:\n"} +{"Time":"2023-05-31T12:02:52.204987-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.204988-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.204989-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.20499-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local udp/53:\n"} +{"Time":"2023-05-31T12:02:52.204992-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.204993-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.204994-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.204999-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: dig @10.96.0.10 kubernetes.default.svc.cluster.local tcp/53:\n"} +{"Time":"2023-05-31T12:02:52.205001-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.205002-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205003-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205004-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 udp/53:\n"} +{"Time":"2023-05-31T12:02:52.205006-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.205007-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205008-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205009-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: nc 10.96.0.10 tcp/53:\n"} +{"Time":"2023-05-31T12:02:52.205011-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.205012-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205013-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205014-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:52.205016-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.205017-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205018-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.20502-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:52.205021-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.205022-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205023-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205025-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e netcat: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:52.205026-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.205028-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205029-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205031-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/nsswitch.conf:\n"} +{"Time":"2023-05-31T12:02:52.205032-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205034-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205035-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205036-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205037-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/hosts:\n"} +{"Time":"2023-05-31T12:02:52.205039-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.20504-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205042-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205043-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205044-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/resolv.conf:\n"} +{"Time":"2023-05-31T12:02:52.205045-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205047-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205048-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205049-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.20505-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: nodes, services, endpoints, daemon sets, deployments and pods, :\n"} +{"Time":"2023-05-31T12:02:52.205052-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.205053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205054-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205056-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crictl pods:\n"} +{"Time":"2023-05-31T12:02:52.205057-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205058-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205059-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205061-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205062-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crictl containers:\n"} +{"Time":"2023-05-31T12:02:52.205063-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205064-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205066-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205067-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205068-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe netcat deployment:\n"} +{"Time":"2023-05-31T12:02:52.20507-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205071-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205072-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205074-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe netcat pod(s):\n"} +{"Time":"2023-05-31T12:02:52.205075-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205076-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205077-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205079-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: netcat logs:\n"} +{"Time":"2023-05-31T12:02:52.20508-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205081-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205082-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205084-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe coredns deployment:\n"} +{"Time":"2023-05-31T12:02:52.205085-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205086-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205088-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205089-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe coredns pods:\n"} +{"Time":"2023-05-31T12:02:52.20509-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205092-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205093-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205094-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: coredns logs:\n"} +{"Time":"2023-05-31T12:02:52.205095-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205097-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205098-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205099-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe api server pod(s):\n"} +{"Time":"2023-05-31T12:02:52.2051-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205102-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205103-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205104-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: api server logs:\n"} +{"Time":"2023-05-31T12:02:52.205105-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205107-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205108-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205109-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/cni:\n"} +{"Time":"2023-05-31T12:02:52.205111-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205112-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205115-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205116-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205118-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: ip a s:\n"} +{"Time":"2023-05-31T12:02:52.205119-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205121-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205123-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205124-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205125-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: ip r s:\n"} +{"Time":"2023-05-31T12:02:52.205127-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205128-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.20513-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205131-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205132-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: iptables-save:\n"} +{"Time":"2023-05-31T12:02:52.205133-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205135-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205136-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205138-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205139-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: iptables table nat:\n"} +{"Time":"2023-05-31T12:02:52.205141-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205142-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205143-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205144-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205146-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy daemon set:\n"} +{"Time":"2023-05-31T12:02:52.205148-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205149-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.20515-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205152-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: describe kube-proxy pod(s):\n"} +{"Time":"2023-05-31T12:02:52.205153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.205155-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205156-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205157-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kube-proxy logs:\n"} +{"Time":"2023-05-31T12:02:52.205159-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" error: context \"kubenet-602000\" does not exist\n"} +{"Time":"2023-05-31T12:02:52.20516-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205161-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205163-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: kubelet daemon status:\n"} +{"Time":"2023-05-31T12:02:52.205164-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205166-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205167-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205169-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.20517-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: kubelet daemon config:\n"} +{"Time":"2023-05-31T12:02:52.205172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205174-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205176-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205179-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kubelet logs:\n"} +{"Time":"2023-05-31T12:02:52.20518-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205183-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205185-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/kubernetes/kubelet.conf:\n"} +{"Time":"2023-05-31T12:02:52.205187-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205188-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.20519-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205191-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205204-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /var/lib/kubelet/config.yaml:\n"} +{"Time":"2023-05-31T12:02:52.205208-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.20521-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205212-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205213-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205215-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: kubectl config:\n"} +{"Time":"2023-05-31T12:02:52.205216-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" apiVersion: v1\n"} +{"Time":"2023-05-31T12:02:52.205218-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" clusters: null\n"} +{"Time":"2023-05-31T12:02:52.205219-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" contexts: null\n"} +{"Time":"2023-05-31T12:02:52.205221-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" current-context: \"\"\n"} +{"Time":"2023-05-31T12:02:52.205222-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" kind: Config\n"} +{"Time":"2023-05-31T12:02:52.205223-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" preferences: {}\n"} +{"Time":"2023-05-31T12:02:52.205225-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" users: null\n"} +{"Time":"2023-05-31T12:02:52.205226-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205228-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205229-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e k8s: cms:\n"} +{"Time":"2023-05-31T12:02:52.205231-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" Error in configuration: context was not found for specified context: kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.205232-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205234-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205235-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker daemon status:\n"} +{"Time":"2023-05-31T12:02:52.205237-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205238-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205239-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205241-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205242-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker daemon config:\n"} +{"Time":"2023-05-31T12:02:52.205243-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205245-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205246-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205248-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205249-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/docker/daemon.json:\n"} +{"Time":"2023-05-31T12:02:52.20525-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205252-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205253-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205254-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205256-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: docker system info:\n"} +{"Time":"2023-05-31T12:02:52.205257-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205258-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.20526-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205261-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205262-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-docker daemon status:\n"} +{"Time":"2023-05-31T12:02:52.205263-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205265-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205266-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205267-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205269-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-docker daemon config:\n"} +{"Time":"2023-05-31T12:02:52.20527-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205271-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205273-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205274-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205275-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/systemd/system/cri-docker.service.d/10-cni.conf:\n"} +{"Time":"2023-05-31T12:02:52.205277-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205278-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205279-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205281-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205282-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /usr/lib/systemd/system/cri-docker.service:\n"} +{"Time":"2023-05-31T12:02:52.205283-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205285-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205286-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205287-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: cri-dockerd version:\n"} +{"Time":"2023-05-31T12:02:52.20529-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205291-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205293-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205294-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205295-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd daemon status:\n"} +{"Time":"2023-05-31T12:02:52.205297-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205298-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.2053-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205301-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205302-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd daemon config:\n"} +{"Time":"2023-05-31T12:02:52.205304-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205305-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205306-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205308-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /lib/systemd/system/containerd.service:\n"} +{"Time":"2023-05-31T12:02:52.205311-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205312-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205313-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205315-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205316-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/containerd/config.toml:\n"} +{"Time":"2023-05-31T12:02:52.205317-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205319-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.20532-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205322-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205324-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: containerd config dump:\n"} +{"Time":"2023-05-31T12:02:52.205326-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205328-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205329-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.20533-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205331-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio daemon status:\n"} +{"Time":"2023-05-31T12:02:52.205333-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205334-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205335-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205336-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205338-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio daemon config:\n"} +{"Time":"2023-05-31T12:02:52.20534-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205342-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205343-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205344-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205345-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: /etc/crio:\n"} +{"Time":"2023-05-31T12:02:52.205347-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205348-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.20535-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205351-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205352-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \u003e\u003e\u003e host: crio config:\n"} +{"Time":"2023-05-31T12:02:52.205354-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:02:52.205355-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" To start a cluster, run: \"minikube start -p kubenet-602000\"\n"} +{"Time":"2023-05-31T12:02:52.205357-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.205358-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" ----------------------- debugLogs end: kubenet-602000 [took: 2.051812458s] --------------------------------\n"} +{"Time":"2023-05-31T12:02:52.205361-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" net_test.go:210: *** TestNetworkPlugins/group/kubenet FAILED at 2023-05-31 12:02:52.204944 -0700 PDT m=+1206.391671459\n"} +{"Time":"2023-05-31T12:02:52.205362-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:02:52.205364-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p kubenet-602000 -n kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.234153-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p kubenet-602000 -n kubenet-602000: exit status 7 (29.097583ms)\n"} +{"Time":"2023-05-31T12:02:52.234168-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.23417-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:02:52.234172-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:02:52.234177-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" \n"} +{"Time":"2023-05-31T12:02:52.234178-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:02:52.23418-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:02:52.234182-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:241: \"kubenet-602000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:02:52.234184-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:175: Cleaning up \"kubenet-602000\" profile ...\n"} +{"Time":"2023-05-31T12:02:52.234186-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p kubenet-602000\n"} +{"Time":"2023-05-31T12:02:52.335046-07:00","Action":"cont","Test":"TestStartStop/group/old-k8s-version"} +{"Time":"2023-05-31T12:02:52.335058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":"=== CONT TestStartStop/group/old-k8s-version\n"} +{"Time":"2023-05-31T12:02:52.335107-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial"} +{"Time":"2023-05-31T12:02:52.33511-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":"=== RUN TestStartStop/group/old-k8s-version/serial\n"} +{"Time":"2023-05-31T12:02:52.335139-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart"} +{"Time":"2023-05-31T12:02:52.335144-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/FirstStart\n"} +{"Time":"2023-05-31T12:02:52.335193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-arm64 start -p old-k8s-version-035000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=qemu2 --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T12:02:58.82492-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Setup","Output":" version_upgrade_test.go:167: v1.6.2 release installation failed: bad response code: 404\n"} +{"Time":"2023-05-31T12:02:58.82498-07:00","Action":"run","Test":"TestStoppedBinaryUpgrade/Upgrade"} +{"Time":"2023-05-31T12:02:58.824989-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":"=== RUN TestStoppedBinaryUpgrade/Upgrade\n"} +{"Time":"2023-05-31T12:02:58.825695-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Run: /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe start -p stopped-upgrade-412000 --memory=2200 --vm-driver=qemu2 \n"} +{"Time":"2023-05-31T12:02:58.833559-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Non-zero exit: /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe start -p stopped-upgrade-412000 --memory=2200 --vm-driver=qemu2 : fork/exec /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe: permission denied (7.681291ms)\n"} +{"Time":"2023-05-31T12:03:00.052528-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Run: /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe start -p stopped-upgrade-412000 --memory=2200 --vm-driver=qemu2 \n"} +{"Time":"2023-05-31T12:03:00.054371-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Non-zero exit: /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe start -p stopped-upgrade-412000 --memory=2200 --vm-driver=qemu2 : fork/exec /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe: permission denied (1.777167ms)\n"} +{"Time":"2023-05-31T12:03:02.17616-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Run: /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe start -p stopped-upgrade-412000 --memory=2200 --vm-driver=qemu2 \n"} +{"Time":"2023-05-31T12:03:02.185019-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:195: (dbg) Non-zero exit: /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe start -p stopped-upgrade-412000 --memory=2200 --vm-driver=qemu2 : fork/exec /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe: permission denied (8.326583ms)\n"} +{"Time":"2023-05-31T12:03:02.185209-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" version_upgrade_test.go:201: legacy v1.6.2 start failed: fork/exec /var/folders/2k/p0kjt1w95hl7b54xjlcc45ph0000gp/T/minikube-v1.6.2.3656460208.exe: permission denied\n"} +{"Time":"2023-05-31T12:03:02.186071-07:00","Action":"run","Test":"TestStoppedBinaryUpgrade/MinikubeLogs"} +{"Time":"2023-05-31T12:03:02.186086-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":"=== RUN TestStoppedBinaryUpgrade/MinikubeLogs\n"} +{"Time":"2023-05-31T12:03:02.186094-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" version_upgrade_test.go:218: (dbg) Run: out/minikube-darwin-arm64 logs -p stopped-upgrade-412000\n"} +{"Time":"2023-05-31T12:03:02.205822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p old-k8s-version-035000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=qemu2 --kubernetes-version=v1.16.0: exit status 80 (9.869554125s)\n"} +{"Time":"2023-05-31T12:03:02.205842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:02.205847-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:02.205852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* [old-k8s-version-035000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:02.205856-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:02.205866-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:02.20587-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:02.205874-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:02.205902-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:02.205906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:02.20591-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:02.205914-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:02.205918-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Starting control plane node old-k8s-version-035000 in cluster old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:02.205923-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:02.20593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:02.205934-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:02.205938-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.205942-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Deleting \"old-k8s-version-035000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:02.205946-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:02.20595-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:02.20596-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:02.205964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.205968-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.205971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.205975-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:02.205978-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:02.205982-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:02.205986-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.362740 4427 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:02.20599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.362871 4427 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:02.205994-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.362873 4427 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:02.205998-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.362876 4427 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:02.206003-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.362950 4427 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:02.206007-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.364005 4427 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:02.206013-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.380418 4427 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1943,\"bootTime\":1685557829,\"procs\":409,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:02.206022-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:02:52.380478 4427 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:02.206026-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.385990 4427 out.go:177] * [old-k8s-version-035000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:02.206031-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.391336 4427 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:02.206035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.395330 4427 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:02.206039-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.391404 4427 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:02.206043-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.398434 4427 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:02.206048-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.401343 4427 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:02.206052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.404524 4427 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:02.206066-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.406363 4427 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:02.20607-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.410548 4427 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:02.206075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.410598 4427 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:02.20608-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.415968 4427 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:02.206084-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.421292 4427 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:02.206088-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.421296 4427 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:02.206096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.421302 4427 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:02.206101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.423228 4427 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:03:02.206105-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.426439 4427 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:02.20611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.429374 4427 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:02.206115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.429389 4427 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:02.206119-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.429397 4427 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:03:02.206124-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.429403 4427 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:02.206133-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t{Name:old-k8s-version-035000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-035000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Container"} +{"Time":"2023-05-31T12:03:02.206143-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"Runtime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:02.206151-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.429487 4427 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:02.206155-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.437369 4427 out.go:177] * Starting control plane node old-k8s-version-035000 in cluster old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:02.206161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.441609 4427 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:03:02.206166-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.441634 4427 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:02.206181-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.441655 4427 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:02.206186-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.441723 4427 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:02.206191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.441729 4427 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T12:03:02.206196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.441792 4427 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/old-k8s-version-035000/config.json ...\n"} +{"Time":"2023-05-31T12:03:02.206203-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.441804 4427 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/old-k8s-version-035000/config.json: {Name:mk2363c5931fb616308d70044612692713b9347f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:02.206209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.442019 4427 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:02.206213-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.442031 4427 start.go:364] acquiring machines lock for old-k8s-version-035000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:02.206218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.442059 4427 start.go:368] acquired machines lock for \"old-k8s-version-035000\" in 23.167µs\n"} +{"Time":"2023-05-31T12:03:02.206228-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.442074 4427 start.go:93] Provisioning new machine with config: \u0026{Name:old-k8s-version-035000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kuberne"} +{"Time":"2023-05-31T12:03:02.206236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"tesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-035000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: "} +{"Time":"2023-05-31T12:03:02.206243-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:02.206248-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.442102 4427 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:02.206255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.449318 4427 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:02.20626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466037 4427 start.go:159] libmachine.API.Create for \"old-k8s-version-035000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:02.206265-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466063 4427 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:02.206271-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466121 4427 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:02.206276-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466141 4427 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:02.20628-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466154 4427 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:02.206286-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466200 4427 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:02.206291-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466215 4427 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:02.206295-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466221 4427 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:02.2063-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.466554 4427 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:02.206307-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.576645 4427 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:02.206311-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.702884 4427 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:02.206316-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.702895 4427 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:02.206321-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.703047 4427 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.206326-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.711866 4427 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:02.20633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.711887 4427 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:02.206334-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.711960 4427 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:02.206338-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.719360 4427 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:02.206342-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.206346-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.719375 4427 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:02.206351-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.719394 4427 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.206355-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.719406 4427 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:02.206362-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.719443 4427 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/qemu.pid -device virtio-net-pci,netdev=net0,mac=d2:07:0c:5b:66:92 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.206369-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.720941 4427 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:02.206374-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.720957 4427 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:02.206378-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.206382-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:52.720977 4427 client.go:171] LocalClient.Create took 254.911541ms\n"} +{"Time":"2023-05-31T12:03:02.206387-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:54.723142 4427 start.go:128] duration metric: createHost completed in 2.281055625s\n"} +{"Time":"2023-05-31T12:03:02.206392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:54.723203 4427 start.go:83] releasing machines lock for \"old-k8s-version-035000\", held for 2.281167167s\n"} +{"Time":"2023-05-31T12:03:02.206397-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:02:54.723315 4427 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.206403-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:54.734344 4427 out.go:177] * Deleting \"old-k8s-version-035000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:02.206409-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:02:54.753575 4427 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.206415-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.20642-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:54.753605 4427 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:02.206425-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.755822 4427 start.go:364] acquiring machines lock for old-k8s-version-035000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:02.20643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.756274 4427 start.go:368] acquired machines lock for \"old-k8s-version-035000\" in 364.833µs\n"} +{"Time":"2023-05-31T12:03:02.20644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.756377 4427 start.go:93] Provisioning new machine with config: \u0026{Name:old-k8s-version-035000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kuberne"} +{"Time":"2023-05-31T12:03:02.206448-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"tesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-035000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: "} +{"Time":"2023-05-31T12:03:02.206456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":"MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:02.206462-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.756703 4427 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:02.206467-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.767101 4427 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:02.206471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.814225 4427 start.go:159] libmachine.API.Create for \"old-k8s-version-035000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:02.206475-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.814278 4427 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:02.20648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.814391 4427 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:02.206485-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.814432 4427 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:02.206489-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.814452 4427 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:02.206494-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.814535 4427 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:02.206498-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.814563 4427 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:02.206503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.814578 4427 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:02.206509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:02:59.815165 4427 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:02.206515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.017177 4427 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:02.206519-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.148327 4427 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:02.206523-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.148334 4427 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:02.206529-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.148490 4427 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.206534-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.157207 4427 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:02.206538-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.157222 4427 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:02.206543-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.157275 4427 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:02.206548-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.164925 4427 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:02.206552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.206557-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.164938 4427 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:02.206564-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.164953 4427 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.206569-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.164960 4427 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:02.206576-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.164997 4427 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/qemu.pid -device virtio-net-pci,netdev=net0,mac=b2:96:bc:ef:62:9c -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.206584-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.166511 4427 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:02.206589-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.166526 4427 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:02.206593-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.206599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:00.166542 4427 client.go:171] LocalClient.Create took 352.260541ms\n"} +{"Time":"2023-05-31T12:03:02.206605-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:02.168678 4427 start.go:128] duration metric: createHost completed in 2.411980334s\n"} +{"Time":"2023-05-31T12:03:02.206611-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:02.168748 4427 start.go:83] releasing machines lock for \"old-k8s-version-035000\", held for 2.412485916s\n"} +{"Time":"2023-05-31T12:03:02.206616-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:03:02.169147 4427 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p old-k8s-version-035000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.206623-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p old-k8s-version-035000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.206629-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:02.178906 4427 out.go:177] \n"} +{"Time":"2023-05-31T12:03:02.206633-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:03:02.184909 4427 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.20664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.206645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:03:02.184941 4427 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:02.206649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:02.206654-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tW0531 12:03:02.187116 4427 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:02.20666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.206665-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:02.20667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:02.206674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.206679-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:02.206684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.206689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:02.206695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:02.206701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.206705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:02.20671-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:02.206716-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.20672-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:02.206725-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.20673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:02.206736-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tI0531 12:03:02.194853 4427 out.go:177] \n"} +{"Time":"2023-05-31T12:03:02.20674-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:02.206744-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:02.20675-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" start_stop_delete_test.go:188: failed starting minikube -first start-. args \"out/minikube-darwin-arm64 start -p old-k8s-version-035000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=qemu2 --kubernetes-version=v1.16.0\": exit status 80\n"} +{"Time":"2023-05-31T12:03:02.206759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:02.206764-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:02.261928-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (55.946916ms)\n"} +{"Time":"2023-05-31T12:03:02.261944-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:02.261947-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:02.261949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:02.261951-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:02.261953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:02.261956-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:02.261959-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:02.262056-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp"} +{"Time":"2023-05-31T12:03:02.262074-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/DeployApp\n"} +{"Time":"2023-05-31T12:03:02.262173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context old-k8s-version-035000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T12:03:02.29208-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Non-zero exit: kubectl --context old-k8s-version-035000 create -f testdata/busybox.yaml: exit status 1 (29.894875ms)\n"} +{"Time":"2023-05-31T12:03:02.292093-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:02.292095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:02.292097-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \terror: context \"old-k8s-version-035000\" does not exist\n"} +{"Time":"2023-05-31T12:03:02.292098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:02.2921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:02.292101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" start_stop_delete_test.go:196: kubectl --context old-k8s-version-035000 create -f testdata/busybox.yaml failed: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.292104-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:02.292109-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:02.314016-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" version_upgrade_test.go:218: (dbg) Non-zero exit: out/minikube-darwin-arm64 logs -p stopped-upgrade-412000: exit status 85 (125.8715ms)\n"} +{"Time":"2023-05-31T12:03:02.314033-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \n"} +{"Time":"2023-05-31T12:03:02.314035-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:02.314037-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:02.314038-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t* ==\u003e Audit \u003c==\n"} +{"Time":"2023-05-31T12:03:02.31404-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t* |---------|------------------------------------------------------|------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:03:02.314042-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| Command | Args | Profile | User | Version | Start Time | End Time |\n"} +{"Time":"2023-05-31T12:03:02.314044-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t|---------|------------------------------------------------------|------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:03:02.314045-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314047-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status kubelet --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314048-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.31405-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314051-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat kubelet | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314053-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314054-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314056-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | journalctl -xeu kubelet --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314057-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314059-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo cat | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.31406-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/kubernetes/kubelet.conf | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314065-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo cat | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314066-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /var/lib/kubelet/config.yaml | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314068-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314069-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status docker --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314071-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314072-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314074-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat docker | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314075-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314077-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo cat | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314079-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/docker/daemon.json | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.31408-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo docker | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314082-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | system info | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314083-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314085-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status cri-docker | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314086-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --all --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314088-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314089-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat cri-docker | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314091-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314092-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo cat | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314094-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/systemd/system/cri-docker.service.d/10-cni.conf | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314095-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo cat | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314097-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /usr/lib/systemd/system/cri-docker.service | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314098-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.3141-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | cri-dockerd --version | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314101-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314102-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status containerd | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314104-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --all --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314105-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314109-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat containerd | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.31411-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314112-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo cat | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314113-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /lib/systemd/system/containerd.service | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314115-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo cat | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314116-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/containerd/config.toml | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314118-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.31412-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | containerd config dump | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314122-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314123-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status crio --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314125-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314126-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314127-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat crio --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314129-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo find | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.31413-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/crio -type f -exec sh -c | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314132-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | 'echo {}; cat {}' \\; | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314134-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p bridge-602000 sudo crio | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314135-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | config | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314136-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| delete | -p bridge-602000 | bridge-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | 31 May 23 12:02 PDT |\n"} +{"Time":"2023-05-31T12:03:02.314138-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| start | -p kubenet-602000 | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314139-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --memory=3072 | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314141-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314142-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --wait-timeout=15m | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314144-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --network-plugin=kubenet | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314145-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314147-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314148-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/nsswitch.conf | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314149-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314151-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/hosts | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314153-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314155-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/resolv.conf | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314156-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo crictl | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314158-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | pods | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314159-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo crictl | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.31416-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | ps --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314162-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo find | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314163-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/cni -type f -exec sh -c | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314165-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | 'echo {}; cat {}' \\; | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314166-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo ip a s | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314168-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo ip r s | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314169-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314171-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | iptables-save | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314172-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314174-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | iptables -t nat -L -n -v | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314175-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314177-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status kubelet --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314178-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314179-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314181-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat kubelet | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314182-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314184-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314185-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | journalctl -xeu kubelet --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314187-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314188-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.31419-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/kubernetes/kubelet.conf | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314191-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314193-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /var/lib/kubelet/config.yaml | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314195-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314196-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status docker --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314198-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314199-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.3142-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat docker | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314202-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314203-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314205-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/docker/daemon.json | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314206-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo docker | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314208-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | system info | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314209-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314211-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status cri-docker | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314212-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --all --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314214-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314216-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat cri-docker | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314218-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314219-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314221-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/systemd/system/cri-docker.service.d/10-cni.conf | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314222-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314224-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /usr/lib/systemd/system/cri-docker.service | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314225-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314227-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | cri-dockerd --version | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314228-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.31423-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status containerd | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314231-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --all --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314233-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314234-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat containerd | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314236-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314237-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314239-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /lib/systemd/system/containerd.service | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.31424-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo cat | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314242-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/containerd/config.toml | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314243-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314245-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | containerd config dump | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314246-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314248-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl status crio --all | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314249-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --full --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314252-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314253-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | systemctl cat crio --no-pager | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314255-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo find | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314256-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | /etc/crio -type f -exec sh -c | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314258-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | 'echo {}; cat {}' \\; | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.31426-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| ssh | -p kubenet-602000 sudo crio | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314261-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | config | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314263-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| delete | -p kubenet-602000 | kubenet-602000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | 31 May 23 12:02 PDT |\n"} +{"Time":"2023-05-31T12:03:02.314264-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| start | -p old-k8s-version-035000 | old-k8s-version-035000 | jenkins | v1.30.1 | 31 May 23 12:02 PDT | |\n"} +{"Time":"2023-05-31T12:03:02.314266-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --memory=2200 | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314267-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --alsologtostderr --wait=true | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314269-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --kvm-network=default | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.31427-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --kvm-qemu-uri=qemu:///system | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314272-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --disable-driver-mounts | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314273-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --keep-context=false | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314275-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --driver=qemu2 | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314277-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t| | --kubernetes-version=v1.16.0 | | | | | |\n"} +{"Time":"2023-05-31T12:03:02.314278-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t|---------|------------------------------------------------------|------------------------|---------|---------|---------------------|---------------------|\n"} +{"Time":"2023-05-31T12:03:02.31428-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.314282-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:02.314283-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t* ==\u003e Last Start \u003c==\n"} +{"Time":"2023-05-31T12:03:02.314285-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t* Log file created at: 2023/05/31 12:02:52\n"} +{"Time":"2023-05-31T12:03:02.314286-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tRunning on machine: MacOS-M1-Agent-1\n"} +{"Time":"2023-05-31T12:03:02.314287-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tBinary: Built with gc go1.20.4 for darwin/arm64\n"} +{"Time":"2023-05-31T12:03:02.314289-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tLog line format: [IWEF]mmdd hh:mm:ss.uuuuuu threadid file:line] msg\n"} +{"Time":"2023-05-31T12:03:02.31429-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.362740 4427 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:02.314292-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.362871 4427 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:02.314293-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.362873 4427 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:02.314295-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.362876 4427 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:02.314296-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.362950 4427 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:02.314298-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.364005 4427 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:02.314299-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.380418 4427 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1943,\"bootTime\":1685557829,\"procs\":409,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:02.314303-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tW0531 12:02:52.380478 4427 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:02.314305-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.385990 4427 out.go:177] * [old-k8s-version-035000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:02.314306-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.391336 4427 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:02.314308-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.395330 4427 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:02.314309-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.391404 4427 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:02.31431-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.398434 4427 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:02.314312-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.401343 4427 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:02.314313-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.404524 4427 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:02.314315-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.406363 4427 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:02.314317-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.410548 4427 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:02.314318-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.410598 4427 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:02.31432-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.415968 4427 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:02.314321-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.421292 4427 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:02.314322-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.421296 4427 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:02.314324-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.421302 4427 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:02.314325-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.423228 4427 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:03:02.314327-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.426439 4427 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:02.314328-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.429374 4427 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:02.31433-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.429389 4427 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:02.314332-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.429397 4427 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:03:02.314334-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.429403 4427 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:02.314337-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t{Name:old-k8s-version-035000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-035000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local Container"} +{"Time":"2023-05-31T12:03:02.31434-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":"Runtime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:02.314343-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.429487 4427 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:02.314344-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.437369 4427 out.go:177] * Starting control plane node old-k8s-version-035000 in cluster old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:02.314345-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.441609 4427 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:03:02.314347-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.441634 4427 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:02.314349-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.441655 4427 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:02.31435-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.441723 4427 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:02.314352-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.441729 4427 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T12:03:02.314353-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.441792 4427 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/old-k8s-version-035000/config.json ...\n"} +{"Time":"2023-05-31T12:03:02.314357-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.441804 4427 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/old-k8s-version-035000/config.json: {Name:mk2363c5931fb616308d70044612692713b9347f Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:02.314359-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.442019 4427 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:02.31436-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.442031 4427 start.go:364] acquiring machines lock for old-k8s-version-035000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:02.314362-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.442059 4427 start.go:368] acquired machines lock for \"old-k8s-version-035000\" in 23.167µs\n"} +{"Time":"2023-05-31T12:03:02.314365-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.442074 4427 start.go:93] Provisioning new machine with config: \u0026{Name:old-k8s-version-035000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kuberne"} +{"Time":"2023-05-31T12:03:02.314368-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":"tesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-035000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: "} +{"Time":"2023-05-31T12:03:02.314371-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":"MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:02.314373-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.442102 4427 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:02.314374-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.449318 4427 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:02.314376-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466037 4427 start.go:159] libmachine.API.Create for \"old-k8s-version-035000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:02.314377-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466063 4427 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:02.314379-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466121 4427 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:02.31438-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466141 4427 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:02.314381-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466154 4427 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:02.314383-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466200 4427 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:02.314384-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466215 4427 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:02.314386-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466221 4427 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:02.314387-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.466554 4427 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:02.314389-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.576645 4427 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:02.31439-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.702884 4427 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:02.314392-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.702895 4427 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:02.314393-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.703047 4427 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.314395-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.711866 4427 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:02.314533-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.711887 4427 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:02.314567-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.711960 4427 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:02.31457-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.719360 4427 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:02.314572-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.314574-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.719375 4427 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:02.314575-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.719394 4427 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.314577-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.719406 4427 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:02.314582-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.719443 4427 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/qemu.pid -device virtio-net-pci,netdev=net0,mac=d2:07:0c:5b:66:92 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.314585-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.720941 4427 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:02.314586-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.720957 4427 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:02.314588-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.314589-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:52.720977 4427 client.go:171] LocalClient.Create took 254.911541ms\n"} +{"Time":"2023-05-31T12:03:02.314591-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:54.723142 4427 start.go:128] duration metric: createHost completed in 2.281055625s\n"} +{"Time":"2023-05-31T12:03:02.314592-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:54.723203 4427 start.go:83] releasing machines lock for \"old-k8s-version-035000\", held for 2.281167167s\n"} +{"Time":"2023-05-31T12:03:02.314594-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tW0531 12:02:54.723315 4427 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.314595-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:54.734344 4427 out.go:177] * Deleting \"old-k8s-version-035000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:02.314597-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tW0531 12:02:54.753575 4427 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.314599-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:54.753605 4427 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:02.314601-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.755822 4427 start.go:364] acquiring machines lock for old-k8s-version-035000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:02.314603-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.756274 4427 start.go:368] acquired machines lock for \"old-k8s-version-035000\" in 364.833µs\n"} +{"Time":"2023-05-31T12:03:02.314606-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.756377 4427 start.go:93] Provisioning new machine with config: \u0026{Name:old-k8s-version-035000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kuberne"} +{"Time":"2023-05-31T12:03:02.314609-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":"tesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-035000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: "} +{"Time":"2023-05-31T12:03:02.314612-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":"MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:02.314646-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.756703 4427 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:02.314653-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.767101 4427 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:02.314655-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.814225 4427 start.go:159] libmachine.API.Create for \"old-k8s-version-035000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:02.314656-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.814278 4427 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:02.314658-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.814391 4427 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:02.314659-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.814432 4427 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:02.314661-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.814452 4427 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:02.314662-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.814535 4427 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:02.314666-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.814563 4427 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:02.31469-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.814578 4427 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:02.314693-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:02:59.815165 4427 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:02.314695-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.017177 4427 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:02.314696-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.148327 4427 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:02.314698-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.148334 4427 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:02.314699-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.148490 4427 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.314843-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.157207 4427 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:02.314845-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.157222 4427 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:02.314847-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.157275 4427 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:02.314848-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.164925 4427 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:02.31485-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.314851-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.164938 4427 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:02.314854-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.164953 4427 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.314855-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.164960 4427 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:02.314858-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.164997 4427 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/qemu.pid -device virtio-net-pci,netdev=net0,mac=b2:96:bc:ef:62:9c -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:02.31486-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.166511 4427 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:02.314861-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.166526 4427 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:02.314863-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.314864-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:00.166542 4427 client.go:171] LocalClient.Create took 352.260541ms\n"} +{"Time":"2023-05-31T12:03:02.314866-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:02.168678 4427 start.go:128] duration metric: createHost completed in 2.411980334s\n"} +{"Time":"2023-05-31T12:03:02.314917-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:02.168748 4427 start.go:83] releasing machines lock for \"old-k8s-version-035000\", held for 2.412485916s\n"} +{"Time":"2023-05-31T12:03:02.314921-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tW0531 12:03:02.169147 4427 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p old-k8s-version-035000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.314924-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:02.178906 4427 out.go:177] \n"} +{"Time":"2023-05-31T12:03:02.314926-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tW0531 12:03:02.184909 4427 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:02.314927-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tW0531 12:03:02.184941 4427 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:02.31493-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tW0531 12:03:02.187116 4427 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:02.314934-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.314935-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:02.314937-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:02.314942-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.314943-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:02.314945-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:02.314947-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:02.314949-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \tI0531 12:03:02.194853 4427 out.go:177] \n"} +{"Time":"2023-05-31T12:03:02.31495-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t\n"} +{"Time":"2023-05-31T12:03:02.315015-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:02.315017-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t* Profile \"stopped-upgrade-412000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:03:02.315019-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \t To start a cluster, run: \"minikube start -p stopped-upgrade-412000\"\n"} +{"Time":"2023-05-31T12:03:02.315021-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" \n"} +{"Time":"2023-05-31T12:03:02.315022-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:02.315023-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" version_upgrade_test.go:220: `minikube logs` after upgrade to HEAD from v1.6.2 failed: exit status 85\n"} +{"Time":"2023-05-31T12:03:02.315027-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" version_upgrade_test.go:223: *** TestStoppedBinaryUpgrade FAILED at 2023-05-31 12:03:02.31477 -0700 PDT m=+1216.501643417\n"} +{"Time":"2023-05-31T12:03:02.315029-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:02.315031-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p stopped-upgrade-412000 -n stopped-upgrade-412000\n"} +{"Time":"2023-05-31T12:03:02.322619-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (30.417667ms)\n"} +{"Time":"2023-05-31T12:03:02.32263-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:02.322632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:02.322634-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:02.322635-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:02.322637-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:02.322638-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:02.322641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:02.322643-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:02.322649-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:02.353077-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (30.355458ms)\n"} +{"Time":"2023-05-31T12:03:02.35309-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:02.353092-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:02.353094-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:02.353095-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:02.353096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:02.353098-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:02.353101-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:02.353143-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:03:02.353145-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:03:02.353188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-arm64 addons enable metrics-server -p old-k8s-version-035000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:03:02.360697-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p stopped-upgrade-412000 -n stopped-upgrade-412000: exit status 85 (45.793667ms)\n"} +{"Time":"2023-05-31T12:03:02.360707-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:03:02.360709-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:02.360711-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t* Profile \"stopped-upgrade-412000\" not found. Run \"minikube profile list\" to view all profiles.\n"} +{"Time":"2023-05-31T12:03:02.360712-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \t To start a cluster, run: \"minikube start -p stopped-upgrade-412000\"\n"} +{"Time":"2023-05-31T12:03:02.360714-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" \n"} +{"Time":"2023-05-31T12:03:02.360716-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:02.360717-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:239: status error: exit status 85 (may be ok)\n"} +{"Time":"2023-05-31T12:03:02.36072-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:241: \"stopped-upgrade-412000\" host is not running, skipping log retrieval (state=\"* Profile \\\"stopped-upgrade-412000\\\" not found. Run \\\"minikube profile list\\\" to view all profiles.\\n To start a cluster, run: \\\"minikube start -p stopped-upgrade-412000\\\"\")\n"} +{"Time":"2023-05-31T12:03:02.360722-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:175: Cleaning up \"stopped-upgrade-412000\" profile ...\n"} +{"Time":"2023-05-31T12:03:02.360724-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p stopped-upgrade-412000\n"} +{"Time":"2023-05-31T12:03:02.411392-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context old-k8s-version-035000 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T12:03:02.438194-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Non-zero exit: kubectl --context old-k8s-version-035000 describe deploy/metrics-server -n kube-system: exit status 1 (26.803625ms)\n"} +{"Time":"2023-05-31T12:03:02.438207-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:02.438209-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:02.438211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \terror: context \"old-k8s-version-035000\" does not exist\n"} +{"Time":"2023-05-31T12:03:02.438212-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:02.438214-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:02.438216-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:217: failed to get info on auto-pause deployments. args \"kubectl --context old-k8s-version-035000 describe deploy/metrics-server -n kube-system\": exit status 1\n"} +{"Time":"2023-05-31T12:03:02.438218-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:221: addon did not load correct image. Expected to contain \" fake.domain/registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:03:02.43822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:02.438236-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:02.467644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (29.303667ms)\n"} +{"Time":"2023-05-31T12:03:02.467659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:02.467661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:02.467663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:02.467664-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:02.467666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:02.467667-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:02.467669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:02.467688-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/Stop"} +{"Time":"2023-05-31T12:03:02.467691-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/Stop\n"} +{"Time":"2023-05-31T12:03:02.467775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-arm64 stop -p old-k8s-version-035000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:03:02.533261-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:03:02.533274-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:03:02.533298-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:02.563437-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (30.054042ms)\n"} +{"Time":"2023-05-31T12:03:02.563452-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:02.563455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:02.563456-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:02.563458-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:02.563459-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:02.563461-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:02.563464-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-arm64 addons enable dashboard -p old-k8s-version-035000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:03:02.620795-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart"} +{"Time":"2023-05-31T12:03:02.620807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/SecondStart\n"} +{"Time":"2023-05-31T12:03:02.620839-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-arm64 start -p old-k8s-version-035000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=qemu2 --kubernetes-version=v1.16.0\n"} +{"Time":"2023-05-31T12:03:02.627451-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade","Output":"--- FAIL: TestStoppedBinaryUpgrade (165.26s)\n"} +{"Time":"2023-05-31T12:03:02.627464-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Setup","Output":" --- FAIL: TestStoppedBinaryUpgrade/Setup (161.46s)\n"} +{"Time":"2023-05-31T12:03:02.627467-07:00","Action":"fail","Test":"TestStoppedBinaryUpgrade/Setup","Elapsed":161.46} +{"Time":"2023-05-31T12:03:02.627471-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/Upgrade","Output":" --- FAIL: TestStoppedBinaryUpgrade/Upgrade (3.36s)\n"} +{"Time":"2023-05-31T12:03:02.627473-07:00","Action":"fail","Test":"TestStoppedBinaryUpgrade/Upgrade","Elapsed":3.36} +{"Time":"2023-05-31T12:03:02.627474-07:00","Action":"output","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Output":" --- FAIL: TestStoppedBinaryUpgrade/MinikubeLogs (0.13s)\n"} +{"Time":"2023-05-31T12:03:02.627477-07:00","Action":"fail","Test":"TestStoppedBinaryUpgrade/MinikubeLogs","Elapsed":0.13} +{"Time":"2023-05-31T12:03:02.627478-07:00","Action":"fail","Test":"TestStoppedBinaryUpgrade","Elapsed":165.26} +{"Time":"2023-05-31T12:03:02.627479-07:00","Action":"cont","Test":"TestStartStop/group/no-preload"} +{"Time":"2023-05-31T12:03:02.627481-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":"=== CONT TestStartStop/group/no-preload\n"} +{"Time":"2023-05-31T12:03:02.627511-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial"} +{"Time":"2023-05-31T12:03:02.627513-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":"=== RUN TestStartStop/group/no-preload/serial\n"} +{"Time":"2023-05-31T12:03:02.627561-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/FirstStart"} +{"Time":"2023-05-31T12:03:02.627562-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"=== RUN TestStartStop/group/no-preload/serial/FirstStart\n"} +{"Time":"2023-05-31T12:03:02.627574-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-arm64 start -p no-preload-457000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:10.254599-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p old-k8s-version-035000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=qemu2 --kubernetes-version=v1.16.0: exit status 80 (7.633059042s)\n"} +{"Time":"2023-05-31T12:03:10.254626-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:10.254632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.254636-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* [old-k8s-version-035000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:10.254641-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:10.254645-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:10.25465-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:10.254655-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:10.254659-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:10.254663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:10.254668-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Kubernetes 1.27.2 is now available. If you would like to upgrade, specify: --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:10.254673-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:10.254677-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Starting control plane node old-k8s-version-035000 in cluster old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.254681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"old-k8s-version-035000\" ...\n"} +{"Time":"2023-05-31T12:03:10.254685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:10.254689-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:10.254693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:10.254696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"old-k8s-version-035000\" ...\n"} +{"Time":"2023-05-31T12:03:10.2547-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:10.254705-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:10.254708-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:10.254712-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:10.254715-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:10.254719-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:10.254722-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.254726-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:10.25473-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.648290 4486 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:10.254735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.648420 4486 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:10.254739-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.648423 4486 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:10.254743-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.648426 4486 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:10.254757-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.648497 4486 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:10.254762-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.649743 4486 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:10.254767-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.667667 4486 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1953,\"bootTime\":1685557829,\"procs\":415,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:10.254775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:02.667733 4486 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:10.254779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.671135 4486 out.go:177] * [old-k8s-version-035000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:10.254783-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.683263 4486 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:10.254789-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.678691 4486 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:10.254793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.697211 4486 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:10.254797-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.709696 4486 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:10.254802-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.718165 4486 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:10.254807-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.722377 4486 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:10.254811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.725726 4486 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:10.254815-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.728952 4486 config.go:182] Loaded profile config \"old-k8s-version-035000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T12:03:10.254819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.741743 4486 out.go:177] * Kubernetes 1.27.2 is now available. If you would like to upgrade, specify: --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:10.254823-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.749661 4486 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:10.254827-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.761762 4486 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:10.254831-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.769663 4486 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:10.254842-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.769673 4486 start.go:875] validating driver \"qemu2\" against \u0026{Name:old-k8s-version-035000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kubernetes"} +{"Time":"2023-05-31T12:03:10.254852-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"Config:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-035000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequ"} +{"Time":"2023-05-31T12:03:10.254858-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"ested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:10.254864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.769738 4486 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:10.254869-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.772131 4486 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:10.254873-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.772161 4486 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:10.254877-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.772170 4486 cni.go:161] CNI unnecessary in this configuration, recommending no CNI\n"} +{"Time":"2023-05-31T12:03:10.25488-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.772174 4486 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:10.254889-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t{Name:old-k8s-version-035000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:true NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.16.0 ClusterName:old-k8s-version-035000 Namespace:"} +{"Time":"2023-05-31T12:03:10.254895-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin: FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.16.0 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Use"} +{"Time":"2023-05-31T12:03:10.254901-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":"rs:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:10.254906-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.772271 4486 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:10.25491-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.786179 4486 out.go:177] * Starting control plane node old-k8s-version-035000 in cluster old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.254913-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.790654 4486 preload.go:132] Checking if preload exists for k8s version v1.16.0 and runtime docker\n"} +{"Time":"2023-05-31T12:03:10.254917-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.790685 4486 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:10.254921-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.790808 4486 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:10.254927-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.790896 4486 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.16.0-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:10.254931-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.790904 4486 cache.go:60] Finished verifying existence of preloaded tar for v1.16.0 on docker\n"} +{"Time":"2023-05-31T12:03:10.254935-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.790993 4486 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/old-k8s-version-035000/config.json ...\n"} +{"Time":"2023-05-31T12:03:10.254941-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.795148 4486 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:10.254945-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:02.795161 4486 start.go:364] acquiring machines lock for old-k8s-version-035000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:10.254949-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.163347 4486 start.go:368] acquired machines lock for \"old-k8s-version-035000\" in 2.368168875s\n"} +{"Time":"2023-05-31T12:03:10.254953-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.163487 4486 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:10.254957-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.163503 4486 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:10.254962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.164135 4486 fix.go:103] recreateIfNeeded on old-k8s-version-035000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:10.254965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:05.164183 4486 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:10.254969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.174801 4486 out.go:177] * Restarting existing qemu2 VM for \"old-k8s-version-035000\" ...\n"} +{"Time":"2023-05-31T12:03:10.254976-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.185076 4486 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/qemu.pid -device virtio-net-pci,netdev=net0,mac=b2:96:bc:ef:62:9c -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:10.254981-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.195039 4486 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:10.254985-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.195129 4486 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:10.254988-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:10.254993-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.195279 4486 fix.go:57] fixHost completed within 31.769833ms\n"} +{"Time":"2023-05-31T12:03:10.254996-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.195306 4486 start.go:83] releasing machines lock for \"old-k8s-version-035000\", held for 31.901542ms\n"} +{"Time":"2023-05-31T12:03:10.255-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:05.195347 4486 start.go:687] error starting host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:10.255005-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:05.195580 4486 out.go:239] ! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:10.255011-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:10.255015-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:05.195601 4486 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:10.255019-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.196007 4486 start.go:364] acquiring machines lock for old-k8s-version-035000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:10.255024-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.196421 4486 start.go:368] acquired machines lock for \"old-k8s-version-035000\" in 306.666µs\n"} +{"Time":"2023-05-31T12:03:10.255028-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.196559 4486 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:10.255032-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.196577 4486 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:10.255035-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.197304 4486 fix.go:103] recreateIfNeeded on old-k8s-version-035000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:10.25504-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:10.197331 4486 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:10.255044-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.204011 4486 out.go:177] * Restarting existing qemu2 VM for \"old-k8s-version-035000\" ...\n"} +{"Time":"2023-05-31T12:03:10.255052-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.208114 4486 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/qemu.pid -device virtio-net-pci,netdev=net0,mac=b2:96:bc:ef:62:9c -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/old-k8s-version-035000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:10.255058-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.217122 4486 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:10.255062-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.217187 4486 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:10.255065-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:10.255068-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.217288 4486 fix.go:57] fixHost completed within 20.709792ms\n"} +{"Time":"2023-05-31T12:03:10.255071-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.217309 4486 start.go:83] releasing machines lock for \"old-k8s-version-035000\", held for 20.86475ms\n"} +{"Time":"2023-05-31T12:03:10.255075-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:10.217507 4486 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p old-k8s-version-035000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:10.255079-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p old-k8s-version-035000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:10.255083-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.229976 4486 out.go:177] \n"} +{"Time":"2023-05-31T12:03:10.255087-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:10.234063 4486 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:10.25509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:10.255096-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:10.234094 4486 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:10.255099-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:10.255103-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tW0531 12:03:10.235613 4486 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:10.255107-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:10.255111-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:10.255115-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:10.255118-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:10.255121-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:10.255125-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:10.255129-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:10.255134-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:10.255139-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:10.255142-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:10.255146-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:10.25515-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:10.255154-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:10.255157-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:10.255161-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:10.255165-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tI0531 12:03:10.244934 4486 out.go:177] \n"} +{"Time":"2023-05-31T12:03:10.255168-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:10.255172-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:10.255178-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" start_stop_delete_test.go:259: failed to start minikube post-stop. args \"out/minikube-darwin-arm64 start -p old-k8s-version-035000 --memory=2200 --alsologtostderr --wait=true --kvm-network=default --kvm-qemu-uri=qemu:///system --disable-driver-mounts --keep-context=false --driver=qemu2 --kubernetes-version=v1.16.0\": exit status 80\n"} +{"Time":"2023-05-31T12:03:10.255183-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:10.255187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.301748-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (46.99725ms)\n"} +{"Time":"2023-05-31T12:03:10.301765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:10.301768-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.30177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:10.301772-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:10.301773-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.301775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:10.301779-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:10.30186-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T12:03:10.301864-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:10.302082-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:275: failed waiting for 'addon dashboard' pod post-stop-start: client config: context \"old-k8s-version-035000\" does not exist\n"} +{"Time":"2023-05-31T12:03:10.302086-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:10.30211-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.333431-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (31.242334ms)\n"} +{"Time":"2023-05-31T12:03:10.333447-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:10.333449-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.333451-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:10.333453-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:10.333454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.333455-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:10.333457-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:10.333476-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T12:03:10.333478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:10.333666-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:288: failed waiting for 'addon dashboard' pod post-stop-start: client config: context \"old-k8s-version-035000\" does not exist\n"} +{"Time":"2023-05-31T12:03:10.333707-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context old-k8s-version-035000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T12:03:10.362943-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Non-zero exit: kubectl --context old-k8s-version-035000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard: exit status 1 (29.166042ms)\n"} +{"Time":"2023-05-31T12:03:10.362958-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:10.36296-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:10.362962-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \terror: context \"old-k8s-version-035000\" does not exist\n"} +{"Time":"2023-05-31T12:03:10.362964-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:10.362965-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:10.362967-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:293: failed to get info on kubernetes-dashboard deployments. args \"kubectl --context old-k8s-version-035000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\": exit status 1\n"} +{"Time":"2023-05-31T12:03:10.362969-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:297: addon did not load correct image. Expected to contain \" registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:03:10.362971-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:10.363012-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.395678-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (32.619334ms)\n"} +{"Time":"2023-05-31T12:03:10.395693-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:10.395696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.395698-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:10.395699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:10.395701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.395702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:10.395704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:10.395757-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T12:03:10.395759-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T12:03:10.395817-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-arm64 ssh -p old-k8s-version-035000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T12:03:10.457156-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Non-zero exit: out/minikube-darwin-arm64 ssh -p old-k8s-version-035000 \"sudo crictl images -o json\": exit status 89 (61.258083ms)\n"} +{"Time":"2023-05-31T12:03:10.457173-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:10.457175-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.457177-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:10.457179-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" \t To start a cluster, run: \"minikube start -p old-k8s-version-035000\"\n"} +{"Time":"2023-05-31T12:03:10.45718-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:10.457182-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.457184-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to get images inside minikube. args \"out/minikube-darwin-arm64 ssh -p old-k8s-version-035000 \\\"sudo crictl images -o json\\\"\": exit status 89\n"} +{"Time":"2023-05-31T12:03:10.457187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to decode images json invalid character '*' looking for beginning of value. output:\n"} +{"Time":"2023-05-31T12:03:10.457188-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:10.457189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" To start a cluster, run: \"minikube start -p old-k8s-version-035000\"\n"} +{"Time":"2023-05-31T12:03:10.45735-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: v1.16.0 images missing (-want +got):\n"} +{"Time":"2023-05-31T12:03:10.457354-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" []string{\n"} +{"Time":"2023-05-31T12:03:10.457356-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" - \t\"k8s.gcr.io/coredns:1.6.2\",\n"} +{"Time":"2023-05-31T12:03:10.457358-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" - \t\"k8s.gcr.io/etcd:3.3.15-0\",\n"} +{"Time":"2023-05-31T12:03:10.457359-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" - \t\"k8s.gcr.io/k8s-minikube/storage-provisioner:v5\",\n"} +{"Time":"2023-05-31T12:03:10.457361-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" - \t\"k8s.gcr.io/kube-apiserver:v1.16.0\",\n"} +{"Time":"2023-05-31T12:03:10.457363-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" - \t\"k8s.gcr.io/kube-controller-manager:v1.16.0\",\n"} +{"Time":"2023-05-31T12:03:10.457364-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" - \t\"k8s.gcr.io/kube-proxy:v1.16.0\",\n"} +{"Time":"2023-05-31T12:03:10.457365-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" - \t\"k8s.gcr.io/kube-scheduler:v1.16.0\",\n"} +{"Time":"2023-05-31T12:03:10.457367-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" - \t\"k8s.gcr.io/pause:3.1\",\n"} +{"Time":"2023-05-31T12:03:10.457368-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" }\n"} +{"Time":"2023-05-31T12:03:10.45737-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:10.457372-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.485174-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (27.740958ms)\n"} +{"Time":"2023-05-31T12:03:10.485185-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:10.485187-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.485189-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:10.485191-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:10.485192-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.485193-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:10.485196-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:10.48523-07:00","Action":"run","Test":"TestStartStop/group/old-k8s-version/serial/Pause"} +{"Time":"2023-05-31T12:03:10.485232-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":"=== RUN TestStartStop/group/old-k8s-version/serial/Pause\n"} +{"Time":"2023-05-31T12:03:10.485254-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-arm64 pause -p old-k8s-version-035000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:03:10.529669-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-arm64 pause -p old-k8s-version-035000 --alsologtostderr -v=1: exit status 89 (44.301458ms)\n"} +{"Time":"2023-05-31T12:03:10.529681-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:10.529684-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.529685-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:10.529692-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \t To start a cluster, run: \"minikube start -p old-k8s-version-035000\"\n"} +{"Time":"2023-05-31T12:03:10.529694-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:10.529695-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.529696-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:10.529697-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.511700 4612 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:10.529699-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.512149 4612 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:10.529701-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.512152 4612 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:10.529702-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.512155 4612 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:10.529704-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.512224 4612 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:10.529753-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.512408 4612 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:10.52977-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.512416 4612 mustload.go:65] Loading cluster: old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.529775-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.512582 4612 config.go:182] Loaded profile config \"old-k8s-version-035000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T12:03:10.529791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.516958 4612 out.go:177] * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:10.529793-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tI0531 12:03:10.524912 4612 out.go:177] To start a cluster, run: \"minikube start -p old-k8s-version-035000\"\n"} +{"Time":"2023-05-31T12:03:10.529795-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:10.529796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:10.529798-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" start_stop_delete_test.go:311: out/minikube-darwin-arm64 pause -p old-k8s-version-035000 --alsologtostderr -v=1 failed: exit status 89\n"} +{"Time":"2023-05-31T12:03:10.529801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:10.529804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.557632-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (27.859416ms)\n"} +{"Time":"2023-05-31T12:03:10.557644-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:10.557646-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.557647-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:10.557648-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:10.55765-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.557656-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:10.557658-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:10.557661-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:10.557663-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.585484-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p old-k8s-version-035000 -n old-k8s-version-035000: exit status 7 (27.766833ms)\n"} +{"Time":"2023-05-31T12:03:10.585496-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:10.585499-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.5855-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:10.585502-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:10.585503-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.585505-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:10.585507-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" helpers_test.go:241: \"old-k8s-version-035000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:10.585602-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-arm64 delete -p old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.689747-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.715454-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts old-k8s-version-035000: exit status 1 (25.635833ms)\n"} +{"Time":"2023-05-31T12:03:10.715466-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:10.715468-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:10.715469-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T12:03:10.715471-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:10.715472-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:10.715474-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:10.715476-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \terror: context old-k8s-version-035000 not found\n"} +{"Time":"2023-05-31T12:03:10.715477-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:10.715478-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:10.715481-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T12:03:10.715509-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" helpers_test.go:175: Cleaning up \"old-k8s-version-035000\" profile ...\n"} +{"Time":"2023-05-31T12:03:10.71552-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p old-k8s-version-035000\n"} +{"Time":"2023-05-31T12:03:10.950485-07:00","Action":"cont","Test":"TestStartStop/group/embed-certs"} +{"Time":"2023-05-31T12:03:10.950498-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":"=== CONT TestStartStop/group/embed-certs\n"} +{"Time":"2023-05-31T12:03:10.950551-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial"} +{"Time":"2023-05-31T12:03:10.950555-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":"=== RUN TestStartStop/group/embed-certs/serial\n"} +{"Time":"2023-05-31T12:03:10.95057-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/FirstStart"} +{"Time":"2023-05-31T12:03:10.950572-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"=== RUN TestStartStop/group/embed-certs/serial/FirstStart\n"} +{"Time":"2023-05-31T12:03:10.950624-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-arm64 start -p embed-certs-478000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=qemu2 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734028-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p no-preload-457000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.27.2: exit status 80 (10.104960542s)\n"} +{"Time":"2023-05-31T12:03:12.73405-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:12.734064-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:12.734069-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* [no-preload-457000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:12.734073-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:12.734077-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:12.734084-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:12.734088-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:12.734092-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:12.734096-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:12.7341-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:12.734104-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:12.734108-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* Starting control plane node no-preload-457000 in cluster no-preload-457000\n"} +{"Time":"2023-05-31T12:03:12.734112-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:12.734116-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:12.73412-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:12.734124-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:12.734128-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* Deleting \"no-preload-457000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:12.734132-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:12.734135-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:12.734139-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:12.734143-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:12.734146-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:12.73415-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:12.734153-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:12.734156-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:12.73416-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:12.734164-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.655561 4487 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:12.734168-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.655684 4487 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:12.734173-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.655687 4487 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:12.734177-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.655689 4487 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:12.734182-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.655755 4487 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:12.734186-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.656726 4487 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:12.734191-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.672812 4487 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1953,\"bootTime\":1685557829,\"procs\":416,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:12.7342-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tW0531 12:03:02.672889 4487 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:12.734204-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.683263 4487 out.go:177] * [no-preload-457000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:12.734207-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.689644 4487 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:12.734211-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.689730 4487 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:12.734215-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.701981 4487 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:12.734219-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.714497 4487 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:12.734223-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.718169 4487 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:12.734227-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.722380 4487 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:12.734231-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.725731 4487 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:12.734236-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.728961 4487 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734241-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.729031 4487 config.go:182] Loaded profile config \"old-k8s-version-035000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.16.0\n"} +{"Time":"2023-05-31T12:03:12.734246-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.729079 4487 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:12.73425-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.733705 4487 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:12.734256-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.745670 4487 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:12.734263-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.745676 4487 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:12.734269-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.745682 4487 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:12.734274-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.747888 4487 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:03:12.734278-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.753708 4487 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:12.734282-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.765680 4487 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:12.734287-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.765711 4487 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:12.734292-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.765721 4487 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:03:12.734296-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.765728 4487 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:03:12.7343-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.765739 4487 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:12.734309-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t{Name:no-preload-457000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:no-preload-457000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:d"} +{"Time":"2023-05-31T12:03:12.734319-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"ocker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:12.734327-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.765867 4487 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734332-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.773734 4487 out.go:177] * Starting control plane node no-preload-457000 in cluster no-preload-457000\n"} +{"Time":"2023-05-31T12:03:12.734336-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786178 4487 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:03:12.734341-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786273 4487 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/no-preload-457000/config.json ...\n"} +{"Time":"2023-05-31T12:03:12.734346-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786303 4487 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/no-preload-457000/config.json: {Name:mkd3fb9cbac82007a10f92dc8002e87d7dbcc575 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734351-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786299 4487 cache.go:107] acquiring lock: {Name:mk8806405f390f3cec717bbe4f9b348a64d9d691 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734357-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786300 4487 cache.go:107] acquiring lock: {Name:mk4e57cd1880c94c383c0b1e52bd7e202b9da6fe Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734362-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786344 4487 cache.go:107] acquiring lock: {Name:mk6f1a4e48608c2bc34652b13dfddaf46771e738 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734368-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786369 4487 cache.go:115] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5 exists\n"} +{"Time":"2023-05-31T12:03:12.734373-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786386 4487 cache.go:96] cache image \"gcr.io/k8s-minikube/storage-provisioner:v5\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5\" took 90.458µs\n"} +{"Time":"2023-05-31T12:03:12.734379-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786396 4487 cache.go:80] save to tar file gcr.io/k8s-minikube/storage-provisioner:v5 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5 succeeded\n"} +{"Time":"2023-05-31T12:03:12.734384-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786402 4487 cache.go:107] acquiring lock: {Name:mk4e2c8033f22a1345a66e475f0b986792009dd1 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.73439-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786727 4487 cache.go:107] acquiring lock: {Name:mkd6d6d76dfe06e2a4cdeef004ff024e35e8fa74 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734395-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786767 4487 cache.go:107] acquiring lock: {Name:mk36caadea503442045aa03db6c21e439c0828f5 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734402-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786447 4487 cache.go:107] acquiring lock: {Name:mk88824c046985da931a06e856e34a78f3de834e Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734407-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786826 4487 cache.go:107] acquiring lock: {Name:mk7e34c0eeb0af9ac98066074618b84b358e6e32 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734411-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786949 4487 image.go:134] retrieving image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734415-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786953 4487 image.go:134] retrieving image: registry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734422-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.786949 4487 image.go:134] retrieving image: registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:03:12.734426-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.787153 4487 image.go:134] retrieving image: registry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.73443-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.790736 4487 image.go:134] retrieving image: registry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T12:03:12.734435-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.790758 4487 image.go:134] retrieving image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:03:12.734439-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.790774 4487 image.go:134] retrieving image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734443-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.790881 4487 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:12.734448-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.790901 4487 start.go:364] acquiring machines lock for no-preload-457000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734453-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.790943 4487 start.go:368] acquired machines lock for \"no-preload-457000\" in 34µs\n"} +{"Time":"2023-05-31T12:03:12.734465-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.790964 4487 start.go:93] Provisioning new machine with config: \u0026{Name:no-preload-457000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesC"} +{"Time":"2023-05-31T12:03:12.734474-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"onfig:{KubernetesVersion:v1.27.2 ClusterName:no-preload-457000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountM"} +{"Time":"2023-05-31T12:03:12.734481-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"Size:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:12.73449-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.791001 4487 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:12.734495-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.798669 4487 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:12.7345-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.804459 4487 image.go:177] daemon lookup for registry.k8s.io/pause:3.9: Error response from daemon: No such image: registry.k8s.io/pause:3.9\n"} +{"Time":"2023-05-31T12:03:12.734506-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.804875 4487 image.go:177] daemon lookup for registry.k8s.io/etcd:3.5.7-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:03:12.734511-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.805627 4487 image.go:177] daemon lookup for registry.k8s.io/kube-proxy:v1.27.2: Error response from daemon: No such image: registry.k8s.io/kube-proxy:v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734516-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.805665 4487 image.go:177] daemon lookup for registry.k8s.io/kube-apiserver:v1.27.2: Error response from daemon: No such image: registry.k8s.io/kube-apiserver:v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734521-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.805743 4487 image.go:177] daemon lookup for registry.k8s.io/kube-scheduler:v1.27.2: Error response from daemon: No such image: registry.k8s.io/kube-scheduler:v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734526-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.805830 4487 image.go:177] daemon lookup for registry.k8s.io/coredns/coredns:v1.10.1: Error response from daemon: No such image: registry.k8s.io/coredns/coredns:v1.10.1\n"} +{"Time":"2023-05-31T12:03:12.734533-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.806523 4487 image.go:177] daemon lookup for registry.k8s.io/kube-controller-manager:v1.27.2: Error response from daemon: No such image: registry.k8s.io/kube-controller-manager:v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734538-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.816656 4487 start.go:159] libmachine.API.Create for \"no-preload-457000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:12.734545-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.816685 4487 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:12.73455-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.816754 4487 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:12.734554-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.816777 4487 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:12.734558-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.816788 4487 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:12.734562-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.816846 4487 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:12.734567-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.816862 4487 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:12.734573-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.816871 4487 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:12.734578-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:02.817224 4487 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:12.734583-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.017866 4487 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:12.734587-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.144814 4487 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:12.734591-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.144831 4487 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:12.734596-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.144999 4487 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:12.734601-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.153780 4487 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:12.734605-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.153799 4487 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:12.734609-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.153873 4487 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:12.734614-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.161204 4487 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:12.734618-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:12.734622-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.161217 4487 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:12.734626-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.161233 4487 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:12.734631-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.161242 4487 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:12.734638-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.161286 4487 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/qemu.pid -device virtio-net-pci,netdev=net0,mac=6a:eb:9b:30:ca:d0 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:12.734645-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.162882 4487 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:12.734649-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.162906 4487 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:12.734655-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:12.734659-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.162923 4487 client.go:171] LocalClient.Create took 346.236458ms\n"} +{"Time":"2023-05-31T12:03:12.734664-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.859347 4487 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.9\n"} +{"Time":"2023-05-31T12:03:12.734669-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.921084 4487 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/etcd_3.5.7-0\n"} +{"Time":"2023-05-31T12:03:12.734675-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.970539 4487 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734679-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.996384 4487 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.9 exists\n"} +{"Time":"2023-05-31T12:03:12.734684-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.996401 4487 cache.go:96] cache image \"registry.k8s.io/pause:3.9\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.9\" took 1.210020792s\n"} +{"Time":"2023-05-31T12:03:12.734689-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:03.996408 4487 cache.go:80] save to tar file registry.k8s.io/pause:3.9 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.9 succeeded\n"} +{"Time":"2023-05-31T12:03:12.734695-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:04.166155 4487 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734699-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:04.322948 4487 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734705-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:04.574184 4487 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.10.1\n"} +{"Time":"2023-05-31T12:03:12.73471-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:04.795927 4487 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.27.2\n"} +{"Time":"2023-05-31T12:03:12.734719-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:05.163085 4487 start.go:128] duration metric: createHost completed in 2.372087916s\n"} +{"Time":"2023-05-31T12:03:12.734723-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:05.163133 4487 start.go:83] releasing machines lock for \"no-preload-457000\", held for 2.372215167s\n"} +{"Time":"2023-05-31T12:03:12.734728-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tW0531 12:03:05.163174 4487 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:12.734733-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:05.179726 4487 out.go:177] * Deleting \"no-preload-457000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:12.734738-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tW0531 12:03:05.203852 4487 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:12.734744-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:12.734748-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:05.203887 4487 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:12.734753-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:06.425983 4487 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.27.2 exists\n"} +{"Time":"2023-05-31T12:03:12.734758-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:06.426037 4487 cache.go:96] cache image \"registry.k8s.io/kube-scheduler:v1.27.2\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.27.2\" took 3.639773833s\n"} +{"Time":"2023-05-31T12:03:12.734763-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:06.426079 4487 cache.go:80] save to tar file registry.k8s.io/kube-scheduler:v1.27.2 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.27.2 succeeded\n"} +{"Time":"2023-05-31T12:03:12.734768-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.345329 4487 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.27.2 exists\n"} +{"Time":"2023-05-31T12:03:12.734773-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.345373 4487 cache.go:96] cache image \"registry.k8s.io/kube-proxy:v1.27.2\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.27.2\" took 4.559028709s\n"} +{"Time":"2023-05-31T12:03:12.734778-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.345399 4487 cache.go:80] save to tar file registry.k8s.io/kube-proxy:v1.27.2 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.27.2 succeeded\n"} +{"Time":"2023-05-31T12:03:12.734783-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.493610 4487 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.10.1 exists\n"} +{"Time":"2023-05-31T12:03:12.734789-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.493650 4487 cache.go:96] cache image \"registry.k8s.io/coredns/coredns:v1.10.1\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.10.1\" took 4.707266834s\n"} +{"Time":"2023-05-31T12:03:12.734794-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.493675 4487 cache.go:80] save to tar file registry.k8s.io/coredns/coredns:v1.10.1 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.10.1 succeeded\n"} +{"Time":"2023-05-31T12:03:12.734799-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.876638 4487 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.27.2 exists\n"} +{"Time":"2023-05-31T12:03:12.734804-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.876682 4487 cache.go:96] cache image \"registry.k8s.io/kube-controller-manager:v1.27.2\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.27.2\" took 5.090456416s\n"} +{"Time":"2023-05-31T12:03:12.73481-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:07.876704 4487 cache.go:80] save to tar file registry.k8s.io/kube-controller-manager:v1.27.2 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.27.2 succeeded\n"} +{"Time":"2023-05-31T12:03:12.734818-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:08.532144 4487 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.27.2 exists\n"} +{"Time":"2023-05-31T12:03:12.734825-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:08.532194 4487 cache.go:96] cache image \"registry.k8s.io/kube-apiserver:v1.27.2\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.27.2\" took 5.745869792s\n"} +{"Time":"2023-05-31T12:03:12.734831-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:08.532221 4487 cache.go:80] save to tar file registry.k8s.io/kube-apiserver:v1.27.2 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.27.2 succeeded\n"} +{"Time":"2023-05-31T12:03:12.734838-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.204328 4487 start.go:364] acquiring machines lock for no-preload-457000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:12.734843-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.217386 4487 start.go:368] acquired machines lock for \"no-preload-457000\" in 12.994375ms\n"} +{"Time":"2023-05-31T12:03:12.734856-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.217474 4487 start.go:93] Provisioning new machine with config: \u0026{Name:no-preload-457000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesC"} +{"Time":"2023-05-31T12:03:12.734865-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"onfig:{KubernetesVersion:v1.27.2 ClusterName:no-preload-457000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountM"} +{"Time":"2023-05-31T12:03:12.734873-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":"Size:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:12.734878-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.217686 4487 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:12.734883-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.225937 4487 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:12.734889-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.268630 4487 start.go:159] libmachine.API.Create for \"no-preload-457000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:12.734893-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.268672 4487 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:12.734898-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.268819 4487 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:12.734903-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.268860 4487 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:12.734908-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.268882 4487 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:12.734912-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.268964 4487 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:12.734917-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.268993 4487 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:12.734922-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.269007 4487 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:12.734927-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.269489 4487 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:12.734932-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.424604 4487 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:12.734937-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.674409 4487 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:12.734941-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.674417 4487 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:12.734947-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.674600 4487 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:12.734952-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.683580 4487 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:12.734958-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.683598 4487 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:12.734962-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.683666 4487 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:12.734967-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.691400 4487 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:12.734971-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:12.734976-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.691424 4487 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:12.734981-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.691445 4487 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:12.734986-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.691452 4487 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:12.734993-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.691498 4487 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/qemu.pid -device virtio-net-pci,netdev=net0,mac=da:e1:b1:76:8e:db -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:12.735-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.693213 4487 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:12.735005-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.693227 4487 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:12.73501-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:12.735014-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:10.693251 4487 client.go:171] LocalClient.Create took 424.580875ms\n"} +{"Time":"2023-05-31T12:03:12.735019-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:12.694899 4487 start.go:128] duration metric: createHost completed in 2.477194167s\n"} +{"Time":"2023-05-31T12:03:12.735024-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:12.694961 4487 start.go:83] releasing machines lock for \"no-preload-457000\", held for 2.477583292s\n"} +{"Time":"2023-05-31T12:03:12.735029-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tW0531 12:03:12.695201 4487 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p no-preload-457000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:12.735035-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p no-preload-457000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:12.735041-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:12.702636 4487 out.go:177] \n"} +{"Time":"2023-05-31T12:03:12.735046-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tW0531 12:03:12.709757 4487 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:12.735052-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:12.735061-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tW0531 12:03:12.709799 4487 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:12.735065-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:12.735071-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tW0531 12:03:12.712624 4487 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:12.735077-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:12.735081-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:12.735088-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:12.735093-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:12.735097-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:12.735102-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:12.735107-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:12.735113-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:12.73512-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:12.735125-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:12.735129-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:12.735134-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:12.735138-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:12.735143-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:12.735148-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:12.735154-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tI0531 12:03:12.721701 4487 out.go:177] \n"} +{"Time":"2023-05-31T12:03:12.735159-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:12.735163-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:12.735168-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" start_stop_delete_test.go:188: failed starting minikube -first start-. args \"out/minikube-darwin-arm64 start -p no-preload-457000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.27.2\": exit status 80\n"} +{"Time":"2023-05-31T12:03:12.735173-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:12.735178-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:12.782523-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (48.353917ms)\n"} +{"Time":"2023-05-31T12:03:12.782539-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:12.782541-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:12.782544-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:12.782545-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:12.782547-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:12.78255-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:12.782552-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:12.782645-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/DeployApp"} +{"Time":"2023-05-31T12:03:12.78266-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":"=== RUN TestStartStop/group/no-preload/serial/DeployApp\n"} +{"Time":"2023-05-31T12:03:12.782713-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context no-preload-457000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T12:03:12.811726-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Non-zero exit: kubectl --context no-preload-457000 create -f testdata/busybox.yaml: exit status 1 (28.957375ms)\n"} +{"Time":"2023-05-31T12:03:12.811743-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:12.811745-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:12.811747-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \terror: context \"no-preload-457000\" does not exist\n"} +{"Time":"2023-05-31T12:03:12.811749-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:12.81175-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:12.811752-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" start_stop_delete_test.go:196: kubectl --context no-preload-457000 create -f testdata/busybox.yaml failed: exit status 1\n"} +{"Time":"2023-05-31T12:03:12.811759-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:12.811761-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:12.842694-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (30.856375ms)\n"} +{"Time":"2023-05-31T12:03:12.842715-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:12.842717-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:12.842719-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:12.84272-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:12.842722-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:12.842723-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:12.842726-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:12.842728-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:12.84273-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:12.872791-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (29.966208ms)\n"} +{"Time":"2023-05-31T12:03:12.872806-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:12.872808-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:12.872809-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:12.872823-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:12.872825-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:12.872826-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:12.872829-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:12.872835-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:03:12.872837-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/no-preload/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:03:12.872903-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-arm64 addons enable metrics-server -p no-preload-457000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:03:12.957127-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context no-preload-457000 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T12:03:12.985592-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Non-zero exit: kubectl --context no-preload-457000 describe deploy/metrics-server -n kube-system: exit status 1 (28.396ms)\n"} +{"Time":"2023-05-31T12:03:12.985606-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:12.985609-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:12.985615-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" \terror: context \"no-preload-457000\" does not exist\n"} +{"Time":"2023-05-31T12:03:12.985617-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:12.985618-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:12.98562-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:217: failed to get info on auto-pause deployments. args \"kubectl --context no-preload-457000 describe deploy/metrics-server -n kube-system\": exit status 1\n"} +{"Time":"2023-05-31T12:03:12.985623-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:221: addon did not load correct image. Expected to contain \" fake.domain/registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:03:12.985624-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:12.985627-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:13.014757-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (29.05175ms)\n"} +{"Time":"2023-05-31T12:03:13.014772-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:13.014774-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:13.014776-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:13.014777-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:13.014779-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:13.01478-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:13.014783-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:13.014805-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/Stop"} +{"Time":"2023-05-31T12:03:13.014807-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":"=== RUN TestStartStop/group/no-preload/serial/Stop\n"} +{"Time":"2023-05-31T12:03:13.014857-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-arm64 stop -p no-preload-457000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:03:13.077368-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:03:13.07738-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:03:13.077416-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:13.105592-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (28.081292ms)\n"} +{"Time":"2023-05-31T12:03:13.105605-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:13.105607-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:13.105609-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:13.105611-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:13.105612-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:13.105614-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:13.105616-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-arm64 addons enable dashboard -p no-preload-457000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:03:13.162345-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/SecondStart"} +{"Time":"2023-05-31T12:03:13.162357-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"=== RUN TestStartStop/group/no-preload/serial/SecondStart\n"} +{"Time":"2023-05-31T12:03:13.162402-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-arm64 start -p no-preload-457000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:20.144112-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p no-preload-457000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.27.2: exit status 80 (6.980787458s)\n"} +{"Time":"2023-05-31T12:03:20.144139-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:20.144144-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.144149-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t* [no-preload-457000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:20.144154-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:20.144165-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:20.14417-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:20.144174-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:20.144178-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:20.144182-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:20.144186-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:20.14419-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t* Starting control plane node no-preload-457000 in cluster no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.144199-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"no-preload-457000\" ...\n"} +{"Time":"2023-05-31T12:03:20.144203-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:20.144207-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:20.144211-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:20.144215-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"no-preload-457000\" ...\n"} +{"Time":"2023-05-31T12:03:20.144219-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:20.144223-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:20.144226-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:20.14423-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:20.144234-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:20.144237-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:20.144241-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.144244-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:20.144248-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.188606 4667 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:20.144252-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.188733 4667 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:20.144256-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.188736 4667 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:20.14426-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.188738 4667 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:20.144264-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.188815 4667 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:20.144268-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.189845 4667 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:20.144275-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.205017 4667 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1964,\"bootTime\":1685557829,\"procs\":412,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:20.144283-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:13.205099 4667 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:20.144287-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.210577 4667 out.go:177] * [no-preload-457000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:20.144291-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.216573 4667 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:20.144298-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.216607 4667 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:20.144302-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.224515 4667 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:20.144306-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.232481 4667 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:20.14431-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.238902 4667 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:20.144315-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.247572 4667 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:20.144319-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.255544 4667 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:20.144323-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.260811 4667 config.go:182] Loaded profile config \"no-preload-457000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:20.144328-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.261116 4667 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:20.144333-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.265567 4667 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:20.144337-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.275528 4667 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:20.144348-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.275533 4667 start.go:875] validating driver \"qemu2\" against \u0026{Name:no-preload-457000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:03:20.144357-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:no-preload-457000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:"} +{"Time":"2023-05-31T12:03:20.144367-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:20.144372-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.275603 4667 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:20.144378-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.278093 4667 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:20.144383-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.278125 4667 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:20.144387-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.278134 4667 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:03:20.144392-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.278140 4667 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:20.144404-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t{Name:no-preload-457000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:no-preload-457000 Namespace:default A"} +{"Time":"2023-05-31T12:03:20.144412-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"PIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/mi"} +{"Time":"2023-05-31T12:03:20.144419-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":"nikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:20.144425-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.278249 4667 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.14443-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.286548 4667 out.go:177] * Starting control plane node no-preload-457000 in cluster no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.144434-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290586 4667 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:03:20.144438-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290670 4667 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/no-preload-457000/config.json ...\n"} +{"Time":"2023-05-31T12:03:20.144443-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290711 4667 cache.go:107] acquiring lock: {Name:mk8806405f390f3cec717bbe4f9b348a64d9d691 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144448-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290714 4667 cache.go:107] acquiring lock: {Name:mk4e2c8033f22a1345a66e475f0b986792009dd1 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144453-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290792 4667 cache.go:115] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5 exists\n"} +{"Time":"2023-05-31T12:03:20.144458-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290806 4667 cache.go:96] cache image \"gcr.io/k8s-minikube/storage-provisioner:v5\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5\" took 98.125µs\n"} +{"Time":"2023-05-31T12:03:20.144465-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290730 4667 cache.go:107] acquiring lock: {Name:mk4e57cd1880c94c383c0b1e52bd7e202b9da6fe Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144469-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290825 4667 cache.go:115] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.27.2 exists\n"} +{"Time":"2023-05-31T12:03:20.144475-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290833 4667 cache.go:96] cache image \"registry.k8s.io/kube-apiserver:v1.27.2\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.27.2\" took 135.375µs\n"} +{"Time":"2023-05-31T12:03:20.144482-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290838 4667 cache.go:80] save to tar file registry.k8s.io/kube-apiserver:v1.27.2 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-apiserver_v1.27.2 succeeded\n"} +{"Time":"2023-05-31T12:03:20.144487-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290821 4667 cache.go:107] acquiring lock: {Name:mk7e34c0eeb0af9ac98066074618b84b358e6e32 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144492-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290786 4667 cache.go:107] acquiring lock: {Name:mk88824c046985da931a06e856e34a78f3de834e Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144497-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290856 4667 cache.go:107] acquiring lock: {Name:mkd6d6d76dfe06e2a4cdeef004ff024e35e8fa74 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144502-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290813 4667 cache.go:80] save to tar file gcr.io/k8s-minikube/storage-provisioner:v5 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/gcr.io/k8s-minikube/storage-provisioner_v5 succeeded\n"} +{"Time":"2023-05-31T12:03:20.144507-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290894 4667 cache.go:115] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.10.1 exists\n"} +{"Time":"2023-05-31T12:03:20.144512-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290900 4667 cache.go:96] cache image \"registry.k8s.io/coredns/coredns:v1.10.1\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.10.1\" took 80.375µs\n"} +{"Time":"2023-05-31T12:03:20.144518-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290905 4667 cache.go:80] save to tar file registry.k8s.io/coredns/coredns:v1.10.1 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/coredns/coredns_v1.10.1 succeeded\n"} +{"Time":"2023-05-31T12:03:20.144524-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290831 4667 cache.go:107] acquiring lock: {Name:mk6f1a4e48608c2bc34652b13dfddaf46771e738 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144529-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290908 4667 cache.go:107] acquiring lock: {Name:mk36caadea503442045aa03db6c21e439c0828f5 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144534-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290975 4667 cache.go:115] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.27.2 exists\n"} +{"Time":"2023-05-31T12:03:20.144538-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290983 4667 cache.go:96] cache image \"registry.k8s.io/kube-scheduler:v1.27.2\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.27.2\" took 151.333µs\n"} +{"Time":"2023-05-31T12:03:20.144544-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290988 4667 cache.go:80] save to tar file registry.k8s.io/kube-scheduler:v1.27.2 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-scheduler_v1.27.2 succeeded\n"} +{"Time":"2023-05-31T12:03:20.144549-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290990 4667 cache.go:115] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.9 exists\n"} +{"Time":"2023-05-31T12:03:20.144553-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291000 4667 cache.go:96] cache image \"registry.k8s.io/pause:3.9\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.9\" took 227.791µs\n"} +{"Time":"2023-05-31T12:03:20.144559-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291011 4667 cache.go:80] save to tar file registry.k8s.io/pause:3.9 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/pause_3.9 succeeded\n"} +{"Time":"2023-05-31T12:03:20.144564-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.290988 4667 image.go:134] retrieving image: registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:03:20.144568-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291039 4667 cache.go:115] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.27.2 exists\n"} +{"Time":"2023-05-31T12:03:20.144627-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291044 4667 cache.go:96] cache image \"registry.k8s.io/kube-controller-manager:v1.27.2\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.27.2\" took 330.25µs\n"} +{"Time":"2023-05-31T12:03:20.144661-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291050 4667 cache.go:80] save to tar file registry.k8s.io/kube-controller-manager:v1.27.2 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-controller-manager_v1.27.2 succeeded\n"} +{"Time":"2023-05-31T12:03:20.144666-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291063 4667 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:20.144671-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291078 4667 start.go:364] acquiring machines lock for no-preload-457000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144677-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291115 4667 cache.go:115] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.27.2 exists\n"} +{"Time":"2023-05-31T12:03:20.144695-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291130 4667 cache.go:96] cache image \"registry.k8s.io/kube-proxy:v1.27.2\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.27.2\" took 248.167µs\n"} +{"Time":"2023-05-31T12:03:20.144701-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.291137 4667 cache.go:80] save to tar file registry.k8s.io/kube-proxy:v1.27.2 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/kube-proxy_v1.27.2 succeeded\n"} +{"Time":"2023-05-31T12:03:20.144705-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:13.301328 4667 image.go:177] daemon lookup for registry.k8s.io/etcd:3.5.7-0: Error response from daemon: No such image: registry.k8s.io/etcd:3.5.7-0\n"} +{"Time":"2023-05-31T12:03:20.144709-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:14.318530 4667 cache.go:162] opening: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/etcd_3.5.7-0\n"} +{"Time":"2023-05-31T12:03:20.144713-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.033790 4667 start.go:368] acquired machines lock for \"no-preload-457000\" in 1.742711s\n"} +{"Time":"2023-05-31T12:03:20.14472-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.033910 4667 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:20.144725-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.033942 4667 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:20.144729-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.034564 4667 fix.go:103] recreateIfNeeded on no-preload-457000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:20.144733-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:15.034599 4667 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:20.144737-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.049708 4667 out.go:177] * Restarting existing qemu2 VM for \"no-preload-457000\" ...\n"} +{"Time":"2023-05-31T12:03:20.144743-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.061943 4667 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/qemu.pid -device virtio-net-pci,netdev=net0,mac=da:e1:b1:76:8e:db -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:20.144751-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.071500 4667 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:20.144755-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.071567 4667 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:20.144759-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:20.144763-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.071685 4667 fix.go:57] fixHost completed within 37.752375ms\n"} +{"Time":"2023-05-31T12:03:20.144768-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.071706 4667 start.go:83] releasing machines lock for \"no-preload-457000\", held for 37.878792ms\n"} +{"Time":"2023-05-31T12:03:20.144773-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:15.071736 4667 start.go:687] error starting host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:20.144777-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:15.071903 4667 out.go:239] ! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:20.144781-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:20.144785-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:15.071918 4667 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:20.144813-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:19.574276 4667 cache.go:157] /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/etcd_3.5.7-0 exists\n"} +{"Time":"2023-05-31T12:03:20.144822-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:19.574321 4667 cache.go:96] cache image \"registry.k8s.io/etcd:3.5.7-0\" -\u003e \"/Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/etcd_3.5.7-0\" took 6.283581625s\n"} +{"Time":"2023-05-31T12:03:20.144828-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:19.574385 4667 cache.go:80] save to tar file registry.k8s.io/etcd:3.5.7-0 -\u003e /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/images/arm64/registry.k8s.io/etcd_3.5.7-0 succeeded\n"} +{"Time":"2023-05-31T12:03:20.144832-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:19.574435 4667 cache.go:87] Successfully saved all images to host disk.\n"} +{"Time":"2023-05-31T12:03:20.14484-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.074007 4667 start.go:364] acquiring machines lock for no-preload-457000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:20.144846-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.074501 4667 start.go:368] acquired machines lock for \"no-preload-457000\" in 372.583µs\n"} +{"Time":"2023-05-31T12:03:20.144851-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.074655 4667 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:20.144855-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.074676 4667 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:20.144858-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.075444 4667 fix.go:103] recreateIfNeeded on no-preload-457000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:20.144862-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:20.075474 4667 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:20.144866-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.087034 4667 out.go:177] * Restarting existing qemu2 VM for \"no-preload-457000\" ...\n"} +{"Time":"2023-05-31T12:03:20.144871-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.091303 4667 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/qemu.pid -device virtio-net-pci,netdev=net0,mac=da:e1:b1:76:8e:db -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/no-preload-457000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:20.144908-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.100808 4667 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:20.144916-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.100866 4667 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:20.144923-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:20.144929-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.100943 4667 fix.go:57] fixHost completed within 26.267375ms\n"} +{"Time":"2023-05-31T12:03:20.144934-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.100964 4667 start.go:83] releasing machines lock for \"no-preload-457000\", held for 26.437ms\n"} +{"Time":"2023-05-31T12:03:20.14494-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:20.101154 4667 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p no-preload-457000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:20.144946-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p no-preload-457000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:20.144952-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.118142 4667 out.go:177] \n"} +{"Time":"2023-05-31T12:03:20.144957-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:20.122042 4667 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:20.144962-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:20.144968-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:20.122080 4667 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:20.144972-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:20.144978-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tW0531 12:03:20.124048 4667 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:20.145003-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:20.145008-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:20.145013-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:20.145017-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:20.145022-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:20.145026-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:20.145032-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:20.145038-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:20.145044-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:20.145048-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:20.145053-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:20.145057-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:20.145062-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:20.145066-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:20.145071-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:20.145077-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tI0531 12:03:20.133013 4667 out.go:177] \n"} +{"Time":"2023-05-31T12:03:20.145084-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:20.145088-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:20.145097-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" start_stop_delete_test.go:259: failed to start minikube post-stop. args \"out/minikube-darwin-arm64 start -p no-preload-457000 --memory=2200 --alsologtostderr --wait=true --preload=false --driver=qemu2 --kubernetes-version=v1.27.2\": exit status 80\n"} +{"Time":"2023-05-31T12:03:20.145102-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:20.145107-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.1936-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (49.326666ms)\n"} +{"Time":"2023-05-31T12:03:20.193636-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:20.19364-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.193646-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:20.193648-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:20.19365-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.193652-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:20.193655-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:20.193659-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T12:03:20.193661-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:20.193962-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:275: failed waiting for 'addon dashboard' pod post-stop-start: client config: context \"no-preload-457000\" does not exist\n"} +{"Time":"2023-05-31T12:03:20.193981-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:20.193987-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.224759-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (30.713375ms)\n"} +{"Time":"2023-05-31T12:03:20.224778-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:20.22478-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.224782-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:20.224784-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:20.224786-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.224799-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:20.224801-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:20.224805-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T12:03:20.224807-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/no-preload/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:20.22503-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:288: failed waiting for 'addon dashboard' pod post-stop-start: client config: context \"no-preload-457000\" does not exist\n"} +{"Time":"2023-05-31T12:03:20.225102-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context no-preload-457000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T12:03:20.25359-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Non-zero exit: kubectl --context no-preload-457000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard: exit status 1 (28.424042ms)\n"} +{"Time":"2023-05-31T12:03:20.253606-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:20.253608-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:20.25361-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" \terror: context \"no-preload-457000\" does not exist\n"} +{"Time":"2023-05-31T12:03:20.253612-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:20.253613-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:20.253616-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:293: failed to get info on kubernetes-dashboard deployments. args \"kubectl --context no-preload-457000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\": exit status 1\n"} +{"Time":"2023-05-31T12:03:20.253618-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:297: addon did not load correct image. Expected to contain \" registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:03:20.25362-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:20.253658-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.283805-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (30.079042ms)\n"} +{"Time":"2023-05-31T12:03:20.283821-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:20.283823-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.283825-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:20.283826-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:20.283828-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.283829-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:20.283837-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:20.283861-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T12:03:20.283864-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/no-preload/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T12:03:20.283926-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-arm64 ssh -p no-preload-457000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T12:03:20.337876-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Non-zero exit: out/minikube-darwin-arm64 ssh -p no-preload-457000 \"sudo crictl images -o json\": exit status 89 (53.877959ms)\n"} +{"Time":"2023-05-31T12:03:20.337891-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:20.337893-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.337894-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:20.337896-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" \t To start a cluster, run: \"minikube start -p no-preload-457000\"\n"} +{"Time":"2023-05-31T12:03:20.337898-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:20.337899-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.3379-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to get images inside minikube. args \"out/minikube-darwin-arm64 ssh -p no-preload-457000 \\\"sudo crictl images -o json\\\"\": exit status 89\n"} +{"Time":"2023-05-31T12:03:20.337904-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to decode images json invalid character '*' looking for beginning of value. output:\n"} +{"Time":"2023-05-31T12:03:20.337949-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:20.337952-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" To start a cluster, run: \"minikube start -p no-preload-457000\"\n"} +{"Time":"2023-05-31T12:03:20.338041-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: v1.27.2 images missing (-want +got):\n"} +{"Time":"2023-05-31T12:03:20.338079-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" []string{\n"} +{"Time":"2023-05-31T12:03:20.338081-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" - \t\"gcr.io/k8s-minikube/storage-provisioner:v5\",\n"} +{"Time":"2023-05-31T12:03:20.338093-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/coredns/coredns:v1.10.1\",\n"} +{"Time":"2023-05-31T12:03:20.338095-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/etcd:3.5.7-0\",\n"} +{"Time":"2023-05-31T12:03:20.338097-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-apiserver:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:20.338098-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-controller-manager:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:20.338099-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-proxy:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:20.338101-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-scheduler:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:20.338102-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/pause:3.9\",\n"} +{"Time":"2023-05-31T12:03:20.338104-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" }\n"} +{"Time":"2023-05-31T12:03:20.338105-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:20.338108-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.367236-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (29.130583ms)\n"} +{"Time":"2023-05-31T12:03:20.367248-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:20.367251-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.367253-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:20.367254-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:20.367256-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.367257-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:20.367259-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:20.367281-07:00","Action":"run","Test":"TestStartStop/group/no-preload/serial/Pause"} +{"Time":"2023-05-31T12:03:20.367283-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":"=== RUN TestStartStop/group/no-preload/serial/Pause\n"} +{"Time":"2023-05-31T12:03:20.367405-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-arm64 pause -p no-preload-457000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:03:20.407704-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-arm64 pause -p no-preload-457000 --alsologtostderr -v=1: exit status 89 (40.261375ms)\n"} +{"Time":"2023-05-31T12:03:20.407716-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:20.407718-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.40772-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:20.407722-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \t To start a cluster, run: \"minikube start -p no-preload-457000\"\n"} +{"Time":"2023-05-31T12:03:20.407723-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:20.407725-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.407726-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:20.407728-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.394317 4766 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:20.407729-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.394420 4766 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:20.407731-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.394423 4766 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:20.407732-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.394425 4766 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:20.407733-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.394499 4766 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:20.407735-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.394687 4766 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:20.407737-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.394696 4766 mustload.go:65] Loading cluster: no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.407738-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.394872 4766 config.go:182] Loaded profile config \"no-preload-457000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:20.40774-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.399065 4766 out.go:177] * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:20.407741-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tI0531 12:03:20.403169 4766 out.go:177] To start a cluster, run: \"minikube start -p no-preload-457000\"\n"} +{"Time":"2023-05-31T12:03:20.407743-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:20.407744-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:20.407746-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" start_stop_delete_test.go:311: out/minikube-darwin-arm64 pause -p no-preload-457000 --alsologtostderr -v=1 failed: exit status 89\n"} +{"Time":"2023-05-31T12:03:20.407749-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:20.40775-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.435375-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (27.562ms)\n"} +{"Time":"2023-05-31T12:03:20.435387-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:20.435395-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.435396-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:20.435398-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:20.4354-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.435402-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:20.435404-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:20.435406-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:20.435417-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.462643-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p no-preload-457000 -n no-preload-457000: exit status 7 (27.155833ms)\n"} +{"Time":"2023-05-31T12:03:20.462656-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:20.462658-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.46266-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:20.462661-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:20.462663-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.462664-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:20.462674-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" helpers_test.go:241: \"no-preload-457000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:20.462703-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-arm64 delete -p no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.558827-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.58441-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts no-preload-457000: exit status 1 (25.522417ms)\n"} +{"Time":"2023-05-31T12:03:20.584424-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:20.584426-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:20.584427-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T12:03:20.584429-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:20.584431-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:20.584432-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:20.584433-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \terror: context no-preload-457000 not found\n"} +{"Time":"2023-05-31T12:03:20.584435-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:20.584436-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:20.584437-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T12:03:20.584444-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":" helpers_test.go:175: Cleaning up \"no-preload-457000\" profile ...\n"} +{"Time":"2023-05-31T12:03:20.584462-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p no-preload-457000\n"} +{"Time":"2023-05-31T12:03:20.823332-07:00","Action":"cont","Test":"TestStartStop/group/disable-driver-mounts"} +{"Time":"2023-05-31T12:03:20.823346-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":"=== CONT TestStartStop/group/disable-driver-mounts\n"} +{"Time":"2023-05-31T12:03:20.82335-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" start_stop_delete_test.go:103: skipping TestStartStop/group/disable-driver-mounts - only runs on virtualbox\n"} +{"Time":"2023-05-31T12:03:20.823383-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" helpers_test.go:175: Cleaning up \"disable-driver-mounts-291000\" profile ...\n"} +{"Time":"2023-05-31T12:03:20.823396-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p disable-driver-mounts-291000\n"} +{"Time":"2023-05-31T12:03:21.055602-07:00","Action":"cont","Test":"TestStartStop/group/default-k8s-diff-port"} +{"Time":"2023-05-31T12:03:21.055618-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":"=== CONT TestStartStop/group/default-k8s-diff-port\n"} +{"Time":"2023-05-31T12:03:21.055643-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial"} +{"Time":"2023-05-31T12:03:21.055645-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial\n"} +{"Time":"2023-05-31T12:03:21.055662-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart"} +{"Time":"2023-05-31T12:03:21.055663-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/FirstStart\n"} +{"Time":"2023-05-31T12:03:21.055707-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-arm64 start -p default-k8s-diff-port-588000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=qemu2 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:22.585477-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p embed-certs-478000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=qemu2 --kubernetes-version=v1.27.2: exit status 80 (11.63292825s)\n"} +{"Time":"2023-05-31T12:03:22.585501-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:22.585532-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:22.585539-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* [embed-certs-478000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:22.585575-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:22.585635-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:22.58564-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:22.585645-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:22.585648-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:22.585652-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:22.585655-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:22.585659-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:22.585663-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* Starting control plane node embed-certs-478000 in cluster embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:22.585667-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:22.58567-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:22.585674-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:22.585678-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:22.585683-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* Deleting \"embed-certs-478000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:22.585687-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:22.585691-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:22.585695-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:22.585698-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:22.585701-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:22.585704-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:22.585708-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:22.585712-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:22.585716-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:22.585719-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:10.975582 4638 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:22.585723-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:10.975698 4638 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:22.585727-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:10.975702 4638 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:22.585749-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:10.975704 4638 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:22.585757-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:10.975782 4638 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:22.585762-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:10.976844 4638 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:22.585767-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:10.991707 4638 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1961,\"bootTime\":1685557829,\"procs\":410,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:22.585786-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tW0531 12:03:10.991772 4638 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:22.58579-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:10.995618 4638 out.go:177] * [embed-certs-478000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:22.585794-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.004662 4638 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:22.585798-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.001707 4638 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:22.585801-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.011686 4638 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:22.585805-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.015629 4638 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:22.585809-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.022657 4638 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:22.585812-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.026573 4638 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:22.585816-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.029618 4638 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:22.58582-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.032966 4638 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:22.585828-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.033031 4638 config.go:182] Loaded profile config \"no-preload-457000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:22.585832-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.033079 4638 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:22.585836-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.037615 4638 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:22.58584-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.044727 4638 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:22.585843-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.044730 4638 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:22.585849-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.044735 4638 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:22.585854-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.046522 4638 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:03:22.585858-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.050631 4638 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:22.585863-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.054715 4638 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:22.585874-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.054730 4638 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:22.585878-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.054738 4638 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:03:22.585882-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.054744 4638 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:03:22.585886-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.054749 4638 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:22.585893-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t{Name:embed-certs-478000 KeepContext:false EmbedCerts:true MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:embed-certs-478000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:"} +{"Time":"2023-05-31T12:03:22.585903-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:22.585909-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.054821 4638 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:22.585914-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.063640 4638 out.go:177] * Starting control plane node embed-certs-478000 in cluster embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:22.585918-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.067639 4638 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:03:22.585922-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.067668 4638 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:22.585926-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.067689 4638 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:22.58593-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.067750 4638 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:22.585935-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.067756 4638 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:03:22.585939-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.067806 4638 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/embed-certs-478000/config.json ...\n"} +{"Time":"2023-05-31T12:03:22.585973-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.067819 4638 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/embed-certs-478000/config.json: {Name:mkf350c0eb6182f84c6bea77ee6c109e25df6c87 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:22.586003-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.068006 4638 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:22.58601-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:11.068021 4638 start.go:364] acquiring machines lock for embed-certs-478000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:22.586016-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.695109 4638 start.go:368] acquired machines lock for \"embed-certs-478000\" in 1.627034417s\n"} +{"Time":"2023-05-31T12:03:22.586027-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.695341 4638 start.go:93] Provisioning new machine with config: \u0026{Name:embed-certs-478000 KeepContext:false EmbedCerts:true MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesC"} +{"Time":"2023-05-31T12:03:22.586036-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"onfig:{KubernetesVersion:v1.27.2 ClusterName:embed-certs-478000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: Mount"} +{"Time":"2023-05-31T12:03:22.586043-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"MSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:22.586049-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.695609 4638 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:22.586055-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.702652 4638 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:22.58606-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.749581 4638 start.go:159] libmachine.API.Create for \"embed-certs-478000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:22.586065-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.749622 4638 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:22.58607-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.749740 4638 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:22.586076-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.749784 4638 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:22.586081-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.749802 4638 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:22.586086-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.749849 4638 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:22.586092-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.749877 4638 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:22.586097-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.749888 4638 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:22.586102-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.750407 4638 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:22.586179-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:12.982946 4638 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:22.586185-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.011768 4638 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:22.586189-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.011778 4638 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:22.586196-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.011917 4638 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:22.5862-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.021208 4638 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:22.586204-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.021225 4638 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:22.586208-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.021282 4638 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:22.586233-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.029523 4638 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:22.586238-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:22.586242-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.029541 4638 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:22.586246-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.029558 4638 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:22.586251-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.029564 4638 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:22.586256-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.029603 4638 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/qemu.pid -device virtio-net-pci,netdev=net0,mac=b2:a9:7d:c0:04:84 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:22.586261-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.031360 4638 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:22.586265-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.031373 4638 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:22.586269-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:22.586272-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:13.031393 4638 client.go:171] LocalClient.Create took 281.768792ms\n"} +{"Time":"2023-05-31T12:03:22.586275-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:15.033555 4638 start.go:128] duration metric: createHost completed in 2.337948542s\n"} +{"Time":"2023-05-31T12:03:22.586279-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:15.033626 4638 start.go:83] releasing machines lock for \"embed-certs-478000\", held for 2.338473708s\n"} +{"Time":"2023-05-31T12:03:22.586284-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tW0531 12:03:15.033712 4638 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:22.586288-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:15.057719 4638 out.go:177] * Deleting \"embed-certs-478000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:22.586291-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tW0531 12:03:15.079349 4638 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:22.586297-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:22.586301-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:15.079379 4638 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:22.586304-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.081570 4638 start.go:364] acquiring machines lock for embed-certs-478000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:22.586309-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.101046 4638 start.go:368] acquired machines lock for \"embed-certs-478000\" in 19.401542ms\n"} +{"Time":"2023-05-31T12:03:22.586316-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.101156 4638 start.go:93] Provisioning new machine with config: \u0026{Name:embed-certs-478000 KeepContext:false EmbedCerts:true MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesC"} +{"Time":"2023-05-31T12:03:22.586324-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"onfig:{KubernetesVersion:v1.27.2 ClusterName:embed-certs-478000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: Mount"} +{"Time":"2023-05-31T12:03:22.586329-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":"MSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:22.586334-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.101353 4638 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:22.586338-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.115075 4638 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:22.586342-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.160292 4638 start.go:159] libmachine.API.Create for \"embed-certs-478000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:22.586346-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.160376 4638 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:22.586351-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.160497 4638 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:22.586355-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.160534 4638 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:22.586359-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.160556 4638 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:22.586362-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.160639 4638 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:22.586366-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.160667 4638 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:22.58637-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.160682 4638 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:22.586374-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.161125 4638 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:22.586378-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.353603 4638 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:22.586382-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.516003 4638 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:22.586385-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.516015 4638 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:22.586389-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.516194 4638 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:22.586393-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.524887 4638 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:22.586397-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.524908 4638 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:22.5864-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.524968 4638 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:22.586404-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.535740 4638 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:22.586407-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:22.58641-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.535764 4638 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:22.586414-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.535780 4638 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:22.586419-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.535786 4638 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:22.586424-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.535834 4638 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/qemu.pid -device virtio-net-pci,netdev=net0,mac=4a:de:70:51:d3:6b -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:22.58643-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.537960 4638 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:22.586433-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.537982 4638 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:22.586437-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:22.58644-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:20.537996 4638 client.go:171] LocalClient.Create took 377.618542ms\n"} +{"Time":"2023-05-31T12:03:22.586445-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:22.540147 4638 start.go:128] duration metric: createHost completed in 2.4387795s\n"} +{"Time":"2023-05-31T12:03:22.58645-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:22.540219 4638 start.go:83] releasing machines lock for \"embed-certs-478000\", held for 2.439182042s\n"} +{"Time":"2023-05-31T12:03:22.586475-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tW0531 12:03:22.540573 4638 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p embed-certs-478000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:22.586486-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p embed-certs-478000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:22.586492-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:22.559317 4638 out.go:177] \n"} +{"Time":"2023-05-31T12:03:22.586498-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tW0531 12:03:22.563465 4638 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:22.586505-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:22.58651-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tW0531 12:03:22.563525 4638 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:22.586515-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:22.58652-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tW0531 12:03:22.565605 4638 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:22.586531-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:22.586537-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:22.586542-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:22.586547-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:22.586552-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:22.586556-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:22.586561-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:22.586567-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:22.586573-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:22.58659-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:22.586595-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:22.586602-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:22.586606-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:22.586611-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:22.586616-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:22.586622-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tI0531 12:03:22.573253 4638 out.go:177] \n"} +{"Time":"2023-05-31T12:03:22.586626-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:22.586631-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:22.586639-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" start_stop_delete_test.go:188: failed starting minikube -first start-. args \"out/minikube-darwin-arm64 start -p embed-certs-478000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=qemu2 --kubernetes-version=v1.27.2\": exit status 80\n"} +{"Time":"2023-05-31T12:03:22.586645-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:22.58665-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:22.6353-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (49.626709ms)\n"} +{"Time":"2023-05-31T12:03:22.635317-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:22.635319-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:22.635321-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:22.635323-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:22.635325-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:22.635327-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:22.635331-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:22.635365-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/DeployApp"} +{"Time":"2023-05-31T12:03:22.63538-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":"=== RUN TestStartStop/group/embed-certs/serial/DeployApp\n"} +{"Time":"2023-05-31T12:03:22.63546-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context embed-certs-478000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T12:03:22.664804-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Non-zero exit: kubectl --context embed-certs-478000 create -f testdata/busybox.yaml: exit status 1 (29.258ms)\n"} +{"Time":"2023-05-31T12:03:22.66482-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:22.664822-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:22.664824-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \terror: context \"embed-certs-478000\" does not exist\n"} +{"Time":"2023-05-31T12:03:22.664826-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:22.664827-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:22.664829-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" start_stop_delete_test.go:196: kubectl --context embed-certs-478000 create -f testdata/busybox.yaml failed: exit status 1\n"} +{"Time":"2023-05-31T12:03:22.664831-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:22.664845-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:22.695109-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (30.168625ms)\n"} +{"Time":"2023-05-31T12:03:22.695135-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:22.695137-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:22.695139-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:22.69514-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:22.695142-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:22.695143-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:22.695147-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:22.695148-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:22.695151-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:22.725345-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (30.126625ms)\n"} +{"Time":"2023-05-31T12:03:22.725362-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:22.725364-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:22.725367-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:22.725368-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:22.725369-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:22.725371-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:22.725374-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:22.725423-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:03:22.725425-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/embed-certs/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:03:22.725476-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-arm64 addons enable metrics-server -p embed-certs-478000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:03:22.795264-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context embed-certs-478000 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T12:03:22.823278-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Non-zero exit: kubectl --context embed-certs-478000 describe deploy/metrics-server -n kube-system: exit status 1 (27.955167ms)\n"} +{"Time":"2023-05-31T12:03:22.823291-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:22.823293-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:22.823295-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" \terror: context \"embed-certs-478000\" does not exist\n"} +{"Time":"2023-05-31T12:03:22.823297-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:22.823298-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:22.823301-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:217: failed to get info on auto-pause deployments. args \"kubectl --context embed-certs-478000 describe deploy/metrics-server -n kube-system\": exit status 1\n"} +{"Time":"2023-05-31T12:03:22.823303-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:221: addon did not load correct image. Expected to contain \" fake.domain/registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:03:22.823304-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:22.823318-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:22.851744-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (28.331375ms)\n"} +{"Time":"2023-05-31T12:03:22.851757-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:22.851759-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:22.85176-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:22.851762-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:22.851763-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:22.851765-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:22.851766-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:22.851792-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/Stop"} +{"Time":"2023-05-31T12:03:22.851794-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":"=== RUN TestStartStop/group/embed-certs/serial/Stop\n"} +{"Time":"2023-05-31T12:03:22.851852-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-arm64 stop -p embed-certs-478000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:03:22.914058-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:03:22.914069-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:03:22.914117-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:22.942518-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (28.3095ms)\n"} +{"Time":"2023-05-31T12:03:22.942531-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:22.942534-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:22.942535-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:22.942537-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:22.942538-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:22.942539-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:22.942541-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-arm64 addons enable dashboard -p embed-certs-478000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:03:23.003083-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/SecondStart"} +{"Time":"2023-05-31T12:03:23.003094-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"=== RUN TestStartStop/group/embed-certs/serial/SecondStart\n"} +{"Time":"2023-05-31T12:03:23.00313-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-arm64 start -p embed-certs-478000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=qemu2 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:30.160819-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p embed-certs-478000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=qemu2 --kubernetes-version=v1.27.2: exit status 80 (7.15695475s)\n"} +{"Time":"2023-05-31T12:03:30.160843-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:30.160849-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.160853-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t* [embed-certs-478000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:30.160858-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:30.160862-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:30.160867-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:30.160871-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:30.160876-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:30.16088-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:30.160883-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:30.160887-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t* Starting control plane node embed-certs-478000 in cluster embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.160891-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"embed-certs-478000\" ...\n"} +{"Time":"2023-05-31T12:03:30.160895-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:30.160899-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:30.160903-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:30.160907-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"embed-certs-478000\" ...\n"} +{"Time":"2023-05-31T12:03:30.160911-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:30.160914-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:30.160918-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:30.160922-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:30.160925-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:30.160929-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:30.160932-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.160936-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:30.160939-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.029653 4835 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:30.160944-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.029758 4835 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:30.160948-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.029761 4835 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:30.160952-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.029763 4835 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:30.160982-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.029834 4835 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:30.160988-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.030804 4835 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:30.160993-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.046712 4835 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1974,\"bootTime\":1685557829,\"procs\":430,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:30.161002-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:23.046793 4835 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:30.161006-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.051200 4835 out.go:177] * [embed-certs-478000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:30.16101-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.062242 4835 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:30.161015-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.058320 4835 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:30.161019-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.070192 4835 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:30.161024-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.078180 4835 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:30.161028-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.081237 4835 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:30.161032-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.084241 4835 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:30.161036-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.088210 4835 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:30.16104-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.091489 4835 config.go:182] Loaded profile config \"embed-certs-478000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:30.161046-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.091749 4835 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:30.16105-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.096041 4835 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:30.161054-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.103235 4835 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:30.161065-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.103239 4835 start.go:875] validating driver \"qemu2\" against \u0026{Name:embed-certs-478000 KeepContext:false EmbedCerts:true MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:03:30.161086-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:embed-certs-478000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested"} +{"Time":"2023-05-31T12:03:30.161094-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":":false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:30.1611-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.103291 4835 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:30.161105-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.105239 4835 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:30.16111-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.105265 4835 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:30.161115-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.105272 4835 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:03:30.16112-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.105278 4835 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:30.161131-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t{Name:embed-certs-478000 KeepContext:false EmbedCerts:true MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:embed-certs-478000 Namespace:default "} +{"Time":"2023-05-31T12:03:30.161139-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/m"} +{"Time":"2023-05-31T12:03:30.161145-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":"inikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:30.161151-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.105353 4835 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:30.161157-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.113193 4835 out.go:177] * Starting control plane node embed-certs-478000 in cluster embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.161162-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.117261 4835 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:03:30.161167-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.117276 4835 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:30.161172-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.117290 4835 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:30.161176-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.117339 4835 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:30.161181-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.117344 4835 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:03:30.161187-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.117406 4835 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/embed-certs-478000/config.json ...\n"} +{"Time":"2023-05-31T12:03:30.161192-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.117775 4835 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:30.161196-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:23.117787 4835 start.go:364] acquiring machines lock for embed-certs-478000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:30.161201-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.059550 4835 start.go:368] acquired machines lock for \"embed-certs-478000\" in 1.9417615s\n"} +{"Time":"2023-05-31T12:03:30.161206-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.059694 4835 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:30.16121-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.059716 4835 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:30.161214-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.060364 4835 fix.go:103] recreateIfNeeded on embed-certs-478000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:30.161219-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:25.060404 4835 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:30.161223-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.072116 4835 out.go:177] * Restarting existing qemu2 VM for \"embed-certs-478000\" ...\n"} +{"Time":"2023-05-31T12:03:30.16123-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.084195 4835 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/qemu.pid -device virtio-net-pci,netdev=net0,mac=4a:de:70:51:d3:6b -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:30.161238-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.094237 4835 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:30.161242-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.094469 4835 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:30.161247-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:30.161251-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.094592 4835 fix.go:57] fixHost completed within 34.874917ms\n"} +{"Time":"2023-05-31T12:03:30.161255-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.094634 4835 start.go:83] releasing machines lock for \"embed-certs-478000\", held for 35.04475ms\n"} +{"Time":"2023-05-31T12:03:30.16126-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:25.094673 4835 start.go:687] error starting host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:30.161265-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:25.094869 4835 out.go:239] ! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:30.161273-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:30.161278-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:25.094887 4835 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:30.161283-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.097047 4835 start.go:364] acquiring machines lock for embed-certs-478000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:30.161288-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.097605 4835 start.go:368] acquired machines lock for \"embed-certs-478000\" in 406.958µs\n"} +{"Time":"2023-05-31T12:03:30.161294-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.097748 4835 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:30.161298-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.097768 4835 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:30.161305-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.098455 4835 fix.go:103] recreateIfNeeded on embed-certs-478000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:30.161309-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:30.098482 4835 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:30.161314-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.109153 4835 out.go:177] * Restarting existing qemu2 VM for \"embed-certs-478000\" ...\n"} +{"Time":"2023-05-31T12:03:30.16132-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.113267 4835 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/qemu.pid -device virtio-net-pci,netdev=net0,mac=4a:de:70:51:d3:6b -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/embed-certs-478000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:30.161329-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.122674 4835 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:30.161333-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.122754 4835 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:30.161338-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:30.161342-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.122841 4835 fix.go:57] fixHost completed within 25.075166ms\n"} +{"Time":"2023-05-31T12:03:30.161346-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.122863 4835 start.go:83] releasing machines lock for \"embed-certs-478000\", held for 25.2365ms\n"} +{"Time":"2023-05-31T12:03:30.16135-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:30.123103 4835 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p embed-certs-478000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:30.161355-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p embed-certs-478000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:30.16136-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.131079 4835 out.go:177] \n"} +{"Time":"2023-05-31T12:03:30.161364-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:30.138264 4835 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:30.161369-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:30.161374-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:30.138300 4835 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:30.161378-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:30.161383-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tW0531 12:03:30.140453 4835 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:30.161389-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:30.161394-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:30.161398-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:30.161402-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:30.161407-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:30.161412-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:30.161417-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:30.161423-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:30.161429-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:30.161434-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:30.161438-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:30.161442-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:30.161447-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:30.161452-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:30.161462-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:30.161468-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tI0531 12:03:30.150069 4835 out.go:177] \n"} +{"Time":"2023-05-31T12:03:30.161472-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:30.161476-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:30.161481-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" start_stop_delete_test.go:259: failed to start minikube post-stop. args \"out/minikube-darwin-arm64 start -p embed-certs-478000 --memory=2200 --alsologtostderr --wait=true --embed-certs --driver=qemu2 --kubernetes-version=v1.27.2\": exit status 80\n"} +{"Time":"2023-05-31T12:03:30.161488-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:30.161493-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.210808-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (49.805375ms)\n"} +{"Time":"2023-05-31T12:03:30.210823-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:30.210826-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.210828-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:30.21083-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:30.210832-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.210834-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:30.210837-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:30.210877-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T12:03:30.210907-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:30.211127-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:275: failed waiting for 'addon dashboard' pod post-stop-start: client config: context \"embed-certs-478000\" does not exist\n"} +{"Time":"2023-05-31T12:03:30.211137-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:30.21114-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.243126-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (31.83525ms)\n"} +{"Time":"2023-05-31T12:03:30.243141-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:30.243143-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.243145-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:30.243146-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:30.243148-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.24315-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:30.243153-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:30.243167-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T12:03:30.243191-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/embed-certs/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:30.243393-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:288: failed waiting for 'addon dashboard' pod post-stop-start: client config: context \"embed-certs-478000\" does not exist\n"} +{"Time":"2023-05-31T12:03:30.24342-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context embed-certs-478000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T12:03:30.27198-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Non-zero exit: kubectl --context embed-certs-478000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard: exit status 1 (28.401166ms)\n"} +{"Time":"2023-05-31T12:03:30.271994-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:30.271996-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:30.271998-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" \terror: context \"embed-certs-478000\" does not exist\n"} +{"Time":"2023-05-31T12:03:30.272-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:30.272001-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:30.272003-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:293: failed to get info on kubernetes-dashboard deployments. args \"kubectl --context embed-certs-478000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\": exit status 1\n"} +{"Time":"2023-05-31T12:03:30.272007-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:297: addon did not load correct image. Expected to contain \" registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:03:30.272008-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:30.272042-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.303452-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (31.335625ms)\n"} +{"Time":"2023-05-31T12:03:30.303467-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:30.30347-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.303471-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:30.303473-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:30.303474-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.303476-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:30.303478-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:30.303502-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T12:03:30.303506-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/embed-certs/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T12:03:30.303541-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-arm64 ssh -p embed-certs-478000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T12:03:30.354773-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Non-zero exit: out/minikube-darwin-arm64 ssh -p embed-certs-478000 \"sudo crictl images -o json\": exit status 89 (51.147542ms)\n"} +{"Time":"2023-05-31T12:03:30.354786-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:30.354789-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.354791-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:30.354792-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" \t To start a cluster, run: \"minikube start -p embed-certs-478000\"\n"} +{"Time":"2023-05-31T12:03:30.354794-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:30.354795-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.354796-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to get images inside minikube. args \"out/minikube-darwin-arm64 ssh -p embed-certs-478000 \\\"sudo crictl images -o json\\\"\": exit status 89\n"} +{"Time":"2023-05-31T12:03:30.354799-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to decode images json invalid character '*' looking for beginning of value. output:\n"} +{"Time":"2023-05-31T12:03:30.354801-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:30.354802-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" To start a cluster, run: \"minikube start -p embed-certs-478000\"\n"} +{"Time":"2023-05-31T12:03:30.354941-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: v1.27.2 images missing (-want +got):\n"} +{"Time":"2023-05-31T12:03:30.354949-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" []string{\n"} +{"Time":"2023-05-31T12:03:30.35495-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" - \t\"gcr.io/k8s-minikube/storage-provisioner:v5\",\n"} +{"Time":"2023-05-31T12:03:30.354953-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/coredns/coredns:v1.10.1\",\n"} +{"Time":"2023-05-31T12:03:30.354954-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/etcd:3.5.7-0\",\n"} +{"Time":"2023-05-31T12:03:30.354956-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-apiserver:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:30.354957-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-controller-manager:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:30.354959-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-proxy:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:30.35496-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-scheduler:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:30.354974-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/pause:3.9\",\n"} +{"Time":"2023-05-31T12:03:30.354975-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" }\n"} +{"Time":"2023-05-31T12:03:30.354977-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:30.354978-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.382896-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (27.86225ms)\n"} +{"Time":"2023-05-31T12:03:30.382909-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:30.382911-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.382913-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:30.382915-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:30.382916-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.382917-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:30.382919-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:30.382967-07:00","Action":"run","Test":"TestStartStop/group/embed-certs/serial/Pause"} +{"Time":"2023-05-31T12:03:30.383005-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":"=== RUN TestStartStop/group/embed-certs/serial/Pause\n"} +{"Time":"2023-05-31T12:03:30.383008-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-arm64 pause -p embed-certs-478000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:03:30.423818-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-arm64 pause -p embed-certs-478000 --alsologtostderr -v=1: exit status 89 (40.724125ms)\n"} +{"Time":"2023-05-31T12:03:30.423831-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:30.423833-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.42384-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:30.423841-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \t To start a cluster, run: \"minikube start -p embed-certs-478000\"\n"} +{"Time":"2023-05-31T12:03:30.423843-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:30.423844-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.423846-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:30.423847-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.409735 4874 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:30.423849-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.409852 4874 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:30.42385-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.409855 4874 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:30.423852-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.409858 4874 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:30.423853-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.409930 4874 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:30.423855-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.410126 4874 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:30.423856-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.410136 4874 mustload.go:65] Loading cluster: embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.423858-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.410323 4874 config.go:182] Loaded profile config \"embed-certs-478000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:30.42386-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.415052 4874 out.go:177] * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:30.423862-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tI0531 12:03:30.419225 4874 out.go:177] To start a cluster, run: \"minikube start -p embed-certs-478000\"\n"} +{"Time":"2023-05-31T12:03:30.423863-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:30.423864-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:30.423866-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" start_stop_delete_test.go:311: out/minikube-darwin-arm64 pause -p embed-certs-478000 --alsologtostderr -v=1 failed: exit status 89\n"} +{"Time":"2023-05-31T12:03:30.423868-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:30.42387-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.453256-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (29.322875ms)\n"} +{"Time":"2023-05-31T12:03:30.453271-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:30.453273-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.453275-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:30.453277-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:30.453278-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.453279-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:30.453281-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:30.453285-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:30.453287-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.482056-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p embed-certs-478000 -n embed-certs-478000: exit status 7 (28.699417ms)\n"} +{"Time":"2023-05-31T12:03:30.48207-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:30.482072-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.482073-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:30.482075-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:30.482076-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.482078-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:30.48208-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" helpers_test.go:241: \"embed-certs-478000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:30.482114-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-arm64 delete -p embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.574895-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.600656-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts embed-certs-478000: exit status 1 (25.696ms)\n"} +{"Time":"2023-05-31T12:03:30.600683-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:30.600686-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:30.600687-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T12:03:30.600689-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:30.60069-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:30.600691-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:30.600693-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \terror: context embed-certs-478000 not found\n"} +{"Time":"2023-05-31T12:03:30.600695-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:30.600696-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:30.600699-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T12:03:30.600703-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" helpers_test.go:175: Cleaning up \"embed-certs-478000\" profile ...\n"} +{"Time":"2023-05-31T12:03:30.600714-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p embed-certs-478000\n"} +{"Time":"2023-05-31T12:03:30.83343-07:00","Action":"cont","Test":"TestStartStop/group/newest-cni"} +{"Time":"2023-05-31T12:03:30.833442-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":"=== CONT TestStartStop/group/newest-cni\n"} +{"Time":"2023-05-31T12:03:30.833484-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial"} +{"Time":"2023-05-31T12:03:30.833486-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":"=== RUN TestStartStop/group/newest-cni/serial\n"} +{"Time":"2023-05-31T12:03:30.833499-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/FirstStart"} +{"Time":"2023-05-31T12:03:30.833504-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"=== RUN TestStartStop/group/newest-cni/serial/FirstStart\n"} +{"Time":"2023-05-31T12:03:30.833544-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Run: out/minikube-darwin-arm64 start -p newest-cni-415000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=qemu2 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:32.50742-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p default-k8s-diff-port-588000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=qemu2 --kubernetes-version=v1.27.2: exit status 80 (11.450746708s)\n"} +{"Time":"2023-05-31T12:03:32.507446-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:32.507452-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:32.507456-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* [default-k8s-diff-port-588000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:32.507461-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:32.507466-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:32.50747-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:32.507475-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:32.507479-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:32.507483-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:32.507486-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:32.50749-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:32.507494-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* Starting control plane node default-k8s-diff-port-588000 in cluster default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:32.507499-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:32.507503-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:32.507507-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:32.507532-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:32.507536-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* Deleting \"default-k8s-diff-port-588000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:32.50754-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:32.507544-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:32.507548-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:32.507552-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:32.507556-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:32.507559-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:32.507563-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:32.507566-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:32.50757-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:32.507574-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.081569 4804 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:32.507578-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.081679 4804 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:32.507582-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.081682 4804 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:32.507587-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.081685 4804 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:32.507591-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.081752 4804 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:32.507595-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.082661 4804 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:32.507601-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.098058 4804 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1972,\"bootTime\":1685557829,\"procs\":422,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:32.507609-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tW0531 12:03:21.098133 4804 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:32.507615-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.106601 4804 out.go:177] * [default-k8s-diff-port-588000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:32.50762-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.144552 4804 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:32.507624-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.119674 4804 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:32.507628-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.150546 4804 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:32.507633-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.160536 4804 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:32.507637-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.168537 4804 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:32.507655-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.176447 4804 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:32.50766-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.184594 4804 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:32.507664-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.186165 4804 config.go:182] Loaded profile config \"embed-certs-478000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:32.50767-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.186253 4804 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:32.507675-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.186306 4804 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:32.507679-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.190563 4804 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:32.507683-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.197451 4804 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:32.507689-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.197456 4804 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:32.507694-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.197463 4804 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:32.507699-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.200101 4804 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:03:32.507703-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.203571 4804 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:32.507708-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.206699 4804 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:32.507713-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.206721 4804 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:32.507718-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.206732 4804 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:03:32.507724-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.206738 4804 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:03:32.507729-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.206747 4804 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:32.507738-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t{Name:default-k8s-diff-port-588000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-588000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.lo"} +{"Time":"2023-05-31T12:03:32.507747-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"cal ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet Stat"} +{"Time":"2023-05-31T12:03:32.507754-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"icIP:}\n"} +{"Time":"2023-05-31T12:03:32.507759-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.206872 4804 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:32.507765-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.214584 4804 out.go:177] * Starting control plane node default-k8s-diff-port-588000 in cluster default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:32.507769-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.218545 4804 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:03:32.507774-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.218577 4804 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:32.507779-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.218596 4804 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:32.507785-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.218667 4804 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:32.50779-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.218675 4804 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:03:32.507795-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.218760 4804 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/default-k8s-diff-port-588000/config.json ...\n"} +{"Time":"2023-05-31T12:03:32.507802-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.218776 4804 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/default-k8s-diff-port-588000/config.json: {Name:mk4219f7f417cdd555d270277df97126bb3504f0 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:32.507807-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.219062 4804 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:32.507812-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:21.219083 4804 start.go:364] acquiring machines lock for default-k8s-diff-port-588000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:32.507816-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.540422 4804 start.go:368] acquired machines lock for \"default-k8s-diff-port-588000\" in 1.321272s\n"} +{"Time":"2023-05-31T12:03:32.507826-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.540587 4804 start.go:93] Provisioning new machine with config: \u0026{Name:default-k8s-diff-port-588000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 "} +{"Time":"2023-05-31T12:03:32.507842-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-588000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:} Nodes:[{Name: IP: Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:"} +{"Time":"2023-05-31T12:03:32.50785-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:32.507856-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.540889 4804 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:32.507861-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.554306 4804 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:32.507867-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.601715 4804 start.go:159] libmachine.API.Create for \"default-k8s-diff-port-588000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:32.507873-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.601750 4804 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:32.507877-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.602128 4804 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:32.507883-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.602171 4804 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:32.507889-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.602197 4804 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:32.507894-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.602404 4804 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:32.507899-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.602453 4804 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:32.507904-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.602466 4804 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:32.507911-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.603523 4804 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:32.507915-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:22.800227 4804 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:32.50792-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.032718 4804 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:32.507924-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.032726 4804 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:32.507929-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.032867 4804 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:32.507934-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.041362 4804 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:32.507939-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.041390 4804 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:32.507944-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.041465 4804 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:32.507949-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.055301 4804 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:32.507953-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:32.507957-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.055317 4804 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:32.507962-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.055362 4804 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:32.507966-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.055369 4804 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:32.507972-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.055411 4804 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/qemu.pid -device virtio-net-pci,netdev=net0,mac=9e:54:74:77:7c:00 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:32.507992-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.057055 4804 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:32.507997-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.057071 4804 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:32.508002-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:32.508006-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:23.057092 4804 client.go:171] LocalClient.Create took 455.342625ms\n"} +{"Time":"2023-05-31T12:03:32.50801-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:25.059268 4804 start.go:128] duration metric: createHost completed in 2.518381542s\n"} +{"Time":"2023-05-31T12:03:32.508015-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:25.059354 4804 start.go:83] releasing machines lock for \"default-k8s-diff-port-588000\", held for 2.518914333s\n"} +{"Time":"2023-05-31T12:03:32.508021-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tW0531 12:03:25.059408 4804 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:32.508026-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:25.080026 4804 out.go:177] * Deleting \"default-k8s-diff-port-588000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:32.508031-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tW0531 12:03:25.102803 4804 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:32.508037-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:32.508042-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:25.102839 4804 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:32.508047-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.103209 4804 start.go:364] acquiring machines lock for default-k8s-diff-port-588000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:32.508052-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.122950 4804 start.go:368] acquired machines lock for \"default-k8s-diff-port-588000\" in 19.657125ms\n"} +{"Time":"2023-05-31T12:03:32.508062-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.123081 4804 start.go:93] Provisioning new machine with config: \u0026{Name:default-k8s-diff-port-588000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 "} +{"Time":"2023-05-31T12:03:32.50807-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-588000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:} Nodes:[{Name: IP: Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:"} +{"Time":"2023-05-31T12:03:32.508079-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":"docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:32.508085-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.123279 4804 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:32.508091-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.134906 4804 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:32.508095-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.178403 4804 start.go:159] libmachine.API.Create for \"default-k8s-diff-port-588000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:32.5081-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.178455 4804 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:32.508107-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.178564 4804 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:32.508112-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.178600 4804 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:32.508116-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.178619 4804 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:32.50812-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.178688 4804 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:32.508125-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.178716 4804 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:32.50813-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.178731 4804 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:32.508135-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.179184 4804 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:32.50814-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.326282 4804 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:32.508144-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.441413 4804 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:32.508148-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.441423 4804 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:32.508153-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.441605 4804 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:32.508158-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.450643 4804 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:32.508163-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.450663 4804 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:32.508168-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.450736 4804 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:32.508173-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.459022 4804 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:32.508177-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:32.508181-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.459046 4804 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:32.508186-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.459065 4804 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:32.508191-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.459073 4804 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:32.508198-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.459122 4804 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/qemu.pid -device virtio-net-pci,netdev=net0,mac=be:aa:bb:ec:d3:22 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:32.508206-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.460813 4804 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:32.50821-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.460828 4804 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:32.508215-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:32.508219-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:30.460841 4804 client.go:171] LocalClient.Create took 282.385167ms\n"} +{"Time":"2023-05-31T12:03:32.508224-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:32.463001 4804 start.go:128] duration metric: createHost completed in 2.339729041s\n"} +{"Time":"2023-05-31T12:03:32.508229-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:32.463064 4804 start.go:83] releasing machines lock for \"default-k8s-diff-port-588000\", held for 2.340115083s\n"} +{"Time":"2023-05-31T12:03:32.508234-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tW0531 12:03:32.463411 4804 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p default-k8s-diff-port-588000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:32.508241-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p default-k8s-diff-port-588000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:32.508247-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:32.478210 4804 out.go:177] \n"} +{"Time":"2023-05-31T12:03:32.508252-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tW0531 12:03:32.483416 4804 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:32.50826-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:32.508265-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tW0531 12:03:32.483450 4804 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:32.508269-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:32.508275-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tW0531 12:03:32.485420 4804 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:32.508282-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:32.508287-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:32.508292-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:32.508297-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:32.508302-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:32.508306-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:32.508311-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:32.508318-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:32.508324-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:32.50833-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:32.508334-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:32.508339-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:32.508344-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:32.508348-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:32.508354-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:32.50836-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tI0531 12:03:32.496142 4804 out.go:177] \n"} +{"Time":"2023-05-31T12:03:32.508364-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:32.508369-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:32.508378-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" start_stop_delete_test.go:188: failed starting minikube -first start-. args \"out/minikube-darwin-arm64 start -p default-k8s-diff-port-588000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=qemu2 --kubernetes-version=v1.27.2\": exit status 80\n"} +{"Time":"2023-05-31T12:03:32.508383-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:32.508388-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:32.555055-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (47.490541ms)\n"} +{"Time":"2023-05-31T12:03:32.555071-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:32.555073-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:32.555076-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:32.555077-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:32.555079-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:32.555081-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:32.555085-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:32.555119-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp"} +{"Time":"2023-05-31T12:03:32.555136-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/DeployApp\n"} +{"Time":"2023-05-31T12:03:32.555237-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Run: kubectl --context default-k8s-diff-port-588000 create -f testdata/busybox.yaml\n"} +{"Time":"2023-05-31T12:03:32.584352-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: (dbg) Non-zero exit: kubectl --context default-k8s-diff-port-588000 create -f testdata/busybox.yaml: exit status 1 (29.043625ms)\n"} +{"Time":"2023-05-31T12:03:32.584367-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:32.584369-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:32.584371-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \terror: context \"default-k8s-diff-port-588000\" does not exist\n"} +{"Time":"2023-05-31T12:03:32.584373-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:32.584374-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:32.584376-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" start_stop_delete_test.go:196: kubectl --context default-k8s-diff-port-588000 create -f testdata/busybox.yaml failed: exit status 1\n"} +{"Time":"2023-05-31T12:03:32.584379-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:32.584381-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:32.616454-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (31.970166ms)\n"} +{"Time":"2023-05-31T12:03:32.61647-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:32.616472-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:32.616474-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:32.616475-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:32.616477-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:32.616478-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:32.61648-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:32.616483-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:32.616484-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:32.647107-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (30.5445ms)\n"} +{"Time":"2023-05-31T12:03:32.647124-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:32.647126-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:32.647128-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:32.647134-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" \n"} +{"Time":"2023-05-31T12:03:32.647136-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:32.647137-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:32.647139-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:32.647184-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:03:32.647186-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:03:32.647233-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-arm64 addons enable metrics-server -p default-k8s-diff-port-588000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:03:32.71794-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Run: kubectl --context default-k8s-diff-port-588000 describe deploy/metrics-server -n kube-system\n"} +{"Time":"2023-05-31T12:03:32.744538-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:215: (dbg) Non-zero exit: kubectl --context default-k8s-diff-port-588000 describe deploy/metrics-server -n kube-system: exit status 1 (26.543791ms)\n"} +{"Time":"2023-05-31T12:03:32.744549-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:32.744551-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:32.744553-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" \terror: context \"default-k8s-diff-port-588000\" does not exist\n"} +{"Time":"2023-05-31T12:03:32.744554-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:32.744556-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:32.744557-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:217: failed to get info on auto-pause deployments. args \"kubectl --context default-k8s-diff-port-588000 describe deploy/metrics-server -n kube-system\": exit status 1\n"} +{"Time":"2023-05-31T12:03:32.74456-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:221: addon did not load correct image. Expected to contain \" fake.domain/registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:03:32.744562-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:32.744564-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:32.772986-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (28.345375ms)\n"} +{"Time":"2023-05-31T12:03:32.773019-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:32.773047-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:32.773054-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:32.773056-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" \n"} +{"Time":"2023-05-31T12:03:32.773058-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:32.773059-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:32.773062-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:32.773065-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop"} +{"Time":"2023-05-31T12:03:32.773067-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/Stop\n"} +{"Time":"2023-05-31T12:03:32.773077-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-arm64 stop -p default-k8s-diff-port-588000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:03:32.831637-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:03:32.831652-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:03:32.831676-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:32.858739-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (26.993083ms)\n"} +{"Time":"2023-05-31T12:03:32.858751-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:32.858753-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:32.858754-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:32.858756-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:32.858757-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:32.858759-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:32.858761-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-arm64 addons enable dashboard -p default-k8s-diff-port-588000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:03:32.920476-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart"} +{"Time":"2023-05-31T12:03:32.920488-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/SecondStart\n"} +{"Time":"2023-05-31T12:03:32.920527-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-arm64 start -p default-k8s-diff-port-588000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=qemu2 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:39.935859-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p default-k8s-diff-port-588000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=qemu2 --kubernetes-version=v1.27.2: exit status 80 (7.014720667s)\n"} +{"Time":"2023-05-31T12:03:39.935883-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:39.935888-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:39.935892-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t* [default-k8s-diff-port-588000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:39.935896-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:39.935899-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:39.935903-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:39.935949-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:39.935954-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:39.935965-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:39.935968-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:39.935971-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t* Starting control plane node default-k8s-diff-port-588000 in cluster default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:39.935975-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"default-k8s-diff-port-588000\" ...\n"} +{"Time":"2023-05-31T12:03:39.935978-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:39.935982-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:39.935986-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:39.935989-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"default-k8s-diff-port-588000\" ...\n"} +{"Time":"2023-05-31T12:03:39.935994-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:39.935997-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:39.936-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:39.936003-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:39.936006-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:39.93601-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:39.936013-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:39.936016-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:39.93602-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.945849 4927 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:39.936024-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.945960 4927 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:39.936028-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.945963 4927 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:39.936031-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.945966 4927 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:39.936035-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.946032 4927 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:39.936038-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.946985 4927 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:39.936042-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.961820 4927 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1983,\"bootTime\":1685557829,\"procs\":418,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:39.936049-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:32.961889 4927 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:39.936052-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.966908 4927 out.go:177] * [default-k8s-diff-port-588000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:39.93611-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.978813 4927 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:39.936122-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.973960 4927 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:39.936127-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.984861 4927 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:39.936131-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:32.994860 4927 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:39.936135-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.004789 4927 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:39.936138-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.011868 4927 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:39.936145-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.018895 4927 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:39.93619-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.023066 4927 config.go:182] Loaded profile config \"default-k8s-diff-port-588000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:39.9362-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.023352 4927 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:39.936205-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.027824 4927 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:39.936221-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.037855 4927 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:39.936231-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.037865 4927 start.go:875] validating driver \"qemu2\" against \u0026{Name:default-k8s-diff-port-588000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 Kub"} +{"Time":"2023-05-31T12:03:39.936239-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"ernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-588000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:} Nodes:[{Name: IP: Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subne"} +{"Time":"2023-05-31T12:03:39.936245-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"t: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:39.93625-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.037924 4927 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:39.936255-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.040168 4927 start_flags.go:919] Waiting for all components: map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true]\n"} +{"Time":"2023-05-31T12:03:39.936283-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.040199 4927 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:39.93629-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.040209 4927 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:03:39.936296-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.040214 4927 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:39.936307-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t{Name:default-k8s-diff-port-588000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:default-k8s-diff-port-5880"} +{"Time":"2023-05-31T12:03:39.936318-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"00 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates: ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8444 NodeName:} Nodes:[{Name: IP: Port:8444 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:true default_sa:true extra:true kubelet:true node_ready:true system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false "} +{"Time":"2023-05-31T12:03:39.936324-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":"MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:39.936329-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.040331 4927 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:39.936334-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.047813 4927 out.go:177] * Starting control plane node default-k8s-diff-port-588000 in cluster default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:39.936338-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.051848 4927 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:03:39.936342-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.051873 4927 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:39.936348-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.051885 4927 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:39.936352-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.051951 4927 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:39.936356-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.051958 4927 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:03:39.93636-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.052021 4927 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/default-k8s-diff-port-588000/config.json ...\n"} +{"Time":"2023-05-31T12:03:39.936364-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.052531 4927 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:39.936368-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:33.052548 4927 start.go:364] acquiring machines lock for default-k8s-diff-port-588000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:39.936373-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.835919 4927 start.go:368] acquired machines lock for \"default-k8s-diff-port-588000\" in 1.783369s\n"} +{"Time":"2023-05-31T12:03:39.936377-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.836034 4927 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:39.936384-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.836058 4927 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:39.936387-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.836713 4927 fix.go:103] recreateIfNeeded on default-k8s-diff-port-588000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:39.936391-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:34.836754 4927 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:39.936395-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.846338 4927 out.go:177] * Restarting existing qemu2 VM for \"default-k8s-diff-port-588000\" ...\n"} +{"Time":"2023-05-31T12:03:39.936401-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.856429 4927 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/qemu.pid -device virtio-net-pci,netdev=net0,mac=be:aa:bb:ec:d3:22 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:39.936407-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.866949 4927 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:39.936412-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.867022 4927 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:39.936416-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:39.936419-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.867151 4927 fix.go:57] fixHost completed within 31.089ms\n"} +{"Time":"2023-05-31T12:03:39.936423-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.867174 4927 start.go:83] releasing machines lock for \"default-k8s-diff-port-588000\", held for 31.202333ms\n"} +{"Time":"2023-05-31T12:03:39.936428-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:34.867212 4927 start.go:687] error starting host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:39.936432-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:34.867390 4927 out.go:239] ! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:39.936436-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:39.93644-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:34.867406 4927 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:39.936444-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.869594 4927 start.go:364] acquiring machines lock for default-k8s-diff-port-588000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:39.936448-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.870030 4927 start.go:368] acquired machines lock for \"default-k8s-diff-port-588000\" in 354.167µs\n"} +{"Time":"2023-05-31T12:03:39.936458-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.870158 4927 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:39.936462-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.870177 4927 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:39.936468-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.870914 4927 fix.go:103] recreateIfNeeded on default-k8s-diff-port-588000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:39.936472-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:39.870940 4927 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:39.936476-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.880595 4927 out.go:177] * Restarting existing qemu2 VM for \"default-k8s-diff-port-588000\" ...\n"} +{"Time":"2023-05-31T12:03:39.936482-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.883779 4927 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/qemu.pid -device virtio-net-pci,netdev=net0,mac=be:aa:bb:ec:d3:22 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/default-k8s-diff-port-588000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:39.936522-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.893192 4927 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:39.936526-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.893253 4927 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:39.93653-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:39.936533-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.893345 4927 fix.go:57] fixHost completed within 23.165917ms\n"} +{"Time":"2023-05-31T12:03:39.936541-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.893390 4927 start.go:83] releasing machines lock for \"default-k8s-diff-port-588000\", held for 23.315792ms\n"} +{"Time":"2023-05-31T12:03:39.936545-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:39.893598 4927 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p default-k8s-diff-port-588000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:39.93655-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p default-k8s-diff-port-588000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:39.936554-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.910615 4927 out.go:177] \n"} +{"Time":"2023-05-31T12:03:39.936558-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:39.914725 4927 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:39.936562-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:39.936566-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:39.914756 4927 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:39.93657-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:39.936574-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tW0531 12:03:39.916161 4927 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:39.936579-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:39.936583-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:39.936587-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:39.936591-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:39.936595-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:39.936599-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:39.936603-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:39.936609-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:39.936614-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:39.936618-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:39.936622-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:39.936625-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:39.936629-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:39.936633-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:39.936638-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:39.936643-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tI0531 12:03:39.925576 4927 out.go:177] \n"} +{"Time":"2023-05-31T12:03:39.936646-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:39.93665-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:39.936654-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" start_stop_delete_test.go:259: failed to start minikube post-stop. args \"out/minikube-darwin-arm64 start -p default-k8s-diff-port-588000 --memory=2200 --alsologtostderr --wait=true --apiserver-port=8444 --driver=qemu2 --kubernetes-version=v1.27.2\": exit status 80\n"} +{"Time":"2023-05-31T12:03:39.936661-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:39.936665-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:39.979758-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (43.766334ms)\n"} +{"Time":"2023-05-31T12:03:39.979771-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:39.979774-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:39.979776-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:39.979777-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:39.979779-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:39.97978-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:39.979789-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:39.979804-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T12:03:39.979805-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:39.980054-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:275: failed waiting for 'addon dashboard' pod post-stop-start: client config: context \"default-k8s-diff-port-588000\" does not exist\n"} +{"Time":"2023-05-31T12:03:39.980059-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:39.980065-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.013686-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (33.543833ms)\n"} +{"Time":"2023-05-31T12:03:40.013701-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:40.013703-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:40.013705-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:40.013707-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:40.013708-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:40.01371-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:40.013712-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:40.013747-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T12:03:40.013749-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:40.013978-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:288: failed waiting for 'addon dashboard' pod post-stop-start: client config: context \"default-k8s-diff-port-588000\" does not exist\n"} +{"Time":"2023-05-31T12:03:40.014039-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Run: kubectl --context default-k8s-diff-port-588000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\n"} +{"Time":"2023-05-31T12:03:40.042458-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:291: (dbg) Non-zero exit: kubectl --context default-k8s-diff-port-588000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard: exit status 1 (28.34625ms)\n"} +{"Time":"2023-05-31T12:03:40.042471-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:40.042473-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:40.042474-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" \terror: context \"default-k8s-diff-port-588000\" does not exist\n"} +{"Time":"2023-05-31T12:03:40.042476-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:40.042478-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:40.042481-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:293: failed to get info on kubernetes-dashboard deployments. args \"kubectl --context default-k8s-diff-port-588000 describe deploy/dashboard-metrics-scraper -n kubernetes-dashboard\": exit status 1\n"} +{"Time":"2023-05-31T12:03:40.042483-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:297: addon did not load correct image. Expected to contain \" registry.k8s.io/echoserver:1.4\". Addon deployment info: \n"} +{"Time":"2023-05-31T12:03:40.042484-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:40.042502-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.07421-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (31.636125ms)\n"} +{"Time":"2023-05-31T12:03:40.074228-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:40.07423-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:40.074232-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:40.074234-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:40.074235-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:40.074237-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:40.074239-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:40.074258-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T12:03:40.07426-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T12:03:40.074297-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-arm64 ssh -p default-k8s-diff-port-588000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T12:03:40.140551-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Non-zero exit: out/minikube-darwin-arm64 ssh -p default-k8s-diff-port-588000 \"sudo crictl images -o json\": exit status 89 (66.157583ms)\n"} +{"Time":"2023-05-31T12:03:40.140567-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:40.140569-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:40.140571-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:40.140573-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" \t To start a cluster, run: \"minikube start -p default-k8s-diff-port-588000\"\n"} +{"Time":"2023-05-31T12:03:40.140575-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:40.140577-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:40.14058-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to get images inside minikube. args \"out/minikube-darwin-arm64 ssh -p default-k8s-diff-port-588000 \\\"sudo crictl images -o json\\\"\": exit status 89\n"} +{"Time":"2023-05-31T12:03:40.140582-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to decode images json invalid character '*' looking for beginning of value. output:\n"} +{"Time":"2023-05-31T12:03:40.140584-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:40.140585-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" To start a cluster, run: \"minikube start -p default-k8s-diff-port-588000\"\n"} +{"Time":"2023-05-31T12:03:40.14073-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: v1.27.2 images missing (-want +got):\n"} +{"Time":"2023-05-31T12:03:40.140734-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" []string{\n"} +{"Time":"2023-05-31T12:03:40.140737-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" - \t\"gcr.io/k8s-minikube/storage-provisioner:v5\",\n"} +{"Time":"2023-05-31T12:03:40.140739-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/coredns/coredns:v1.10.1\",\n"} +{"Time":"2023-05-31T12:03:40.14074-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/etcd:3.5.7-0\",\n"} +{"Time":"2023-05-31T12:03:40.140742-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-apiserver:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:40.140744-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-controller-manager:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:40.140745-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-proxy:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:40.140748-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-scheduler:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:40.140749-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/pause:3.9\",\n"} +{"Time":"2023-05-31T12:03:40.14075-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" }\n"} +{"Time":"2023-05-31T12:03:40.140752-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:40.140755-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.170166-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (29.329583ms)\n"} +{"Time":"2023-05-31T12:03:40.170181-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:40.170183-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:40.170185-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:40.170187-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:40.170188-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:40.17019-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:40.170193-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:40.170214-07:00","Action":"run","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause"} +{"Time":"2023-05-31T12:03:40.170216-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":"=== RUN TestStartStop/group/default-k8s-diff-port/serial/Pause\n"} +{"Time":"2023-05-31T12:03:40.170266-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-arm64 pause -p default-k8s-diff-port-588000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:03:40.213377-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-arm64 pause -p default-k8s-diff-port-588000 --alsologtostderr -v=1: exit status 89 (43.011125ms)\n"} +{"Time":"2023-05-31T12:03:40.21339-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:40.213392-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:40.213394-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:40.213395-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \t To start a cluster, run: \"minikube start -p default-k8s-diff-port-588000\"\n"} +{"Time":"2023-05-31T12:03:40.213397-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:40.213398-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:40.2134-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:40.213401-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.197255 4954 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:40.213409-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.197373 4954 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:40.21341-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.197376 4954 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:40.213412-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.197378 4954 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:40.213413-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.197466 4954 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:40.213415-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.197655 4954 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:40.213417-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.197665 4954 mustload.go:65] Loading cluster: default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.213418-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.197839 4954 config.go:182] Loaded profile config \"default-k8s-diff-port-588000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:40.21342-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.201691 4954 out.go:177] * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:40.213422-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tI0531 12:03:40.209609 4954 out.go:177] To start a cluster, run: \"minikube start -p default-k8s-diff-port-588000\"\n"} +{"Time":"2023-05-31T12:03:40.213423-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:40.21343-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:40.213431-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" start_stop_delete_test.go:311: out/minikube-darwin-arm64 pause -p default-k8s-diff-port-588000 --alsologtostderr -v=1 failed: exit status 89\n"} +{"Time":"2023-05-31T12:03:40.213434-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:40.213435-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.240688-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (27.205167ms)\n"} +{"Time":"2023-05-31T12:03:40.2407-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:40.240702-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:40.240704-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:40.240705-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:40.240707-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:40.240709-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:40.240712-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:40.240713-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:40.240715-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.267669-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p default-k8s-diff-port-588000 -n default-k8s-diff-port-588000: exit status 7 (26.846459ms)\n"} +{"Time":"2023-05-31T12:03:40.26768-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:40.267682-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:40.267683-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:40.267685-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:40.267686-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:40.267688-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:40.26769-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" helpers_test.go:241: \"default-k8s-diff-port-588000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:40.267694-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-arm64 delete -p default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.361516-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.387756-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts default-k8s-diff-port-588000: exit status 1 (26.174375ms)\n"} +{"Time":"2023-05-31T12:03:40.38777-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:40.387772-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:40.387774-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T12:03:40.387775-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:40.387777-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:40.387778-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:40.38778-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \terror: context default-k8s-diff-port-588000 not found\n"} +{"Time":"2023-05-31T12:03:40.387781-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:40.387787-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:40.387789-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T12:03:40.387793-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" helpers_test.go:175: Cleaning up \"default-k8s-diff-port-588000\" profile ...\n"} +{"Time":"2023-05-31T12:03:40.387809-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p default-k8s-diff-port-588000\n"} +{"Time":"2023-05-31T12:03:40.618246-07:00","Action":"output","Test":"TestNetworkPlugins","Output":"--- FAIL: TestNetworkPlugins (423.65s)\n"} +{"Time":"2023-05-31T12:03:40.618257-07:00","Action":"output","Test":"TestNetworkPlugins/group","Output":" --- FAIL: TestNetworkPlugins/group (2.36s)\n"} +{"Time":"2023-05-31T12:03:40.61826-07:00","Action":"output","Test":"TestNetworkPlugins/group/cilium","Output":" --- SKIP: TestNetworkPlugins/group/cilium (2.36s)\n"} +{"Time":"2023-05-31T12:03:40.618262-07:00","Action":"skip","Test":"TestNetworkPlugins/group/cilium","Elapsed":2.36} +{"Time":"2023-05-31T12:03:40.618265-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto","Output":" --- FAIL: TestNetworkPlugins/group/auto (11.76s)\n"} +{"Time":"2023-05-31T12:03:40.618267-07:00","Action":"output","Test":"TestNetworkPlugins/group/auto/Start","Output":" --- FAIL: TestNetworkPlugins/group/auto/Start (9.68s)\n"} +{"Time":"2023-05-31T12:03:40.618268-07:00","Action":"fail","Test":"TestNetworkPlugins/group/auto/Start","Elapsed":9.68} +{"Time":"2023-05-31T12:03:40.61827-07:00","Action":"fail","Test":"TestNetworkPlugins/group/auto","Elapsed":11.76} +{"Time":"2023-05-31T12:03:40.618271-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico","Output":" --- FAIL: TestNetworkPlugins/group/calico (12.10s)\n"} +{"Time":"2023-05-31T12:03:40.618273-07:00","Action":"output","Test":"TestNetworkPlugins/group/calico/Start","Output":" --- FAIL: TestNetworkPlugins/group/calico/Start (9.82s)\n"} +{"Time":"2023-05-31T12:03:40.618274-07:00","Action":"fail","Test":"TestNetworkPlugins/group/calico/Start","Elapsed":9.82} +{"Time":"2023-05-31T12:03:40.618276-07:00","Action":"fail","Test":"TestNetworkPlugins/group/calico","Elapsed":12.1} +{"Time":"2023-05-31T12:03:40.618277-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel","Output":" --- FAIL: TestNetworkPlugins/group/custom-flannel (12.07s)\n"} +{"Time":"2023-05-31T12:03:40.618278-07:00","Action":"output","Test":"TestNetworkPlugins/group/custom-flannel/Start","Output":" --- FAIL: TestNetworkPlugins/group/custom-flannel/Start (9.84s)\n"} +{"Time":"2023-05-31T12:03:40.61828-07:00","Action":"fail","Test":"TestNetworkPlugins/group/custom-flannel/Start","Elapsed":9.84} +{"Time":"2023-05-31T12:03:40.618281-07:00","Action":"fail","Test":"TestNetworkPlugins/group/custom-flannel","Elapsed":12.07} +{"Time":"2023-05-31T12:03:40.618282-07:00","Action":"output","Test":"TestNetworkPlugins/group/false","Output":" --- FAIL: TestNetworkPlugins/group/false (11.75s)\n"} +{"Time":"2023-05-31T12:03:40.618284-07:00","Action":"output","Test":"TestNetworkPlugins/group/false/Start","Output":" --- FAIL: TestNetworkPlugins/group/false/Start (9.64s)\n"} +{"Time":"2023-05-31T12:03:40.618285-07:00","Action":"fail","Test":"TestNetworkPlugins/group/false/Start","Elapsed":9.64} +{"Time":"2023-05-31T12:03:40.618286-07:00","Action":"fail","Test":"TestNetworkPlugins/group/false","Elapsed":11.75} +{"Time":"2023-05-31T12:03:40.618288-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet","Output":" --- FAIL: TestNetworkPlugins/group/kindnet (11.97s)\n"} +{"Time":"2023-05-31T12:03:40.618289-07:00","Action":"output","Test":"TestNetworkPlugins/group/kindnet/Start","Output":" --- FAIL: TestNetworkPlugins/group/kindnet/Start (9.79s)\n"} +{"Time":"2023-05-31T12:03:40.618291-07:00","Action":"fail","Test":"TestNetworkPlugins/group/kindnet/Start","Elapsed":9.79} +{"Time":"2023-05-31T12:03:40.618292-07:00","Action":"fail","Test":"TestNetworkPlugins/group/kindnet","Elapsed":11.97} +{"Time":"2023-05-31T12:03:40.618293-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel","Output":" --- FAIL: TestNetworkPlugins/group/flannel (11.95s)\n"} +{"Time":"2023-05-31T12:03:40.618295-07:00","Action":"output","Test":"TestNetworkPlugins/group/flannel/Start","Output":" --- FAIL: TestNetworkPlugins/group/flannel/Start (9.68s)\n"} +{"Time":"2023-05-31T12:03:40.618296-07:00","Action":"fail","Test":"TestNetworkPlugins/group/flannel/Start","Elapsed":9.68} +{"Time":"2023-05-31T12:03:40.618297-07:00","Action":"fail","Test":"TestNetworkPlugins/group/flannel","Elapsed":11.95} +{"Time":"2023-05-31T12:03:40.618298-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni","Output":" --- FAIL: TestNetworkPlugins/group/enable-default-cni (11.89s)\n"} +{"Time":"2023-05-31T12:03:40.6183-07:00","Action":"output","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Output":" --- FAIL: TestNetworkPlugins/group/enable-default-cni/Start (9.82s)\n"} +{"Time":"2023-05-31T12:03:40.618301-07:00","Action":"fail","Test":"TestNetworkPlugins/group/enable-default-cni/Start","Elapsed":9.82} +{"Time":"2023-05-31T12:03:40.618303-07:00","Action":"fail","Test":"TestNetworkPlugins/group/enable-default-cni","Elapsed":11.89} +{"Time":"2023-05-31T12:03:40.618304-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge","Output":" --- FAIL: TestNetworkPlugins/group/bridge (11.85s)\n"} +{"Time":"2023-05-31T12:03:40.618305-07:00","Action":"output","Test":"TestNetworkPlugins/group/bridge/Start","Output":" --- FAIL: TestNetworkPlugins/group/bridge/Start (9.74s)\n"} +{"Time":"2023-05-31T12:03:40.618307-07:00","Action":"fail","Test":"TestNetworkPlugins/group/bridge/Start","Elapsed":9.74} +{"Time":"2023-05-31T12:03:40.618308-07:00","Action":"fail","Test":"TestNetworkPlugins/group/bridge","Elapsed":11.85} +{"Time":"2023-05-31T12:03:40.618309-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet","Output":" --- FAIL: TestNetworkPlugins/group/kubenet (11.94s)\n"} +{"Time":"2023-05-31T12:03:40.618315-07:00","Action":"output","Test":"TestNetworkPlugins/group/kubenet/Start","Output":" --- FAIL: TestNetworkPlugins/group/kubenet/Start (9.76s)\n"} +{"Time":"2023-05-31T12:03:42.265547-07:00","Action":"fail","Test":"TestNetworkPlugins/group/kubenet/Start","Elapsed":9.76} +{"Time":"2023-05-31T12:03:42.265594-07:00","Action":"fail","Test":"TestNetworkPlugins/group/kubenet","Elapsed":11.94} +{"Time":"2023-05-31T12:03:42.265602-07:00","Action":"fail","Test":"TestNetworkPlugins/group","Elapsed":2.36} +{"Time":"2023-05-31T12:03:42.26561-07:00","Action":"fail","Test":"TestNetworkPlugins","Elapsed":423.65} +{"Time":"2023-05-31T12:03:42.26562-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" start_stop_delete_test.go:186: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p newest-cni-415000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=qemu2 --kubernetes-version=v1.27.2: exit status 80 (11.429946125s)\n"} +{"Time":"2023-05-31T12:03:42.265637-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:42.265644-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:42.265652-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* [newest-cni-415000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:42.265675-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:42.265683-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:42.265691-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:42.265698-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:42.265707-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:42.265713-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:42.26572-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:42.265727-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:42.265739-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* Starting control plane node newest-cni-415000 in cluster newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:42.265746-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:42.265753-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:42.26576-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:42.265766-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:42.265773-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* Deleting \"newest-cni-415000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:42.26578-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:42.265787-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:42.265793-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:42.2658-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:42.265807-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:42.265813-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:42.265819-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:42.265829-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:42.265836-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:42.265843-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.858616 4900 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:42.26585-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.858716 4900 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:42.265858-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.858719 4900 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:42.265866-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.858722 4900 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:42.265874-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.858793 4900 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:42.265882-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.859768 4900 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:42.265891-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.874570 4900 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1981,\"bootTime\":1685557829,\"procs\":418,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:42.265911-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tW0531 12:03:30.874621 4900 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:42.26592-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.879680 4900 out.go:177] * [newest-cni-415000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:42.265927-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.886592 4900 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:42.265937-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.890644 4900 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:42.265944-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.886640 4900 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:42.265951-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.896586 4900 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:42.265958-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.899652 4900 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:42.265965-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.902614 4900 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:42.265972-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.905636 4900 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:42.265979-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.908966 4900 config.go:182] Loaded profile config \"default-k8s-diff-port-588000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:42.265988-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.909026 4900 config.go:182] Loaded profile config \"multinode-073000-m01\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:42.265995-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.909073 4900 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:42.266003-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.916626 4900 out.go:177] * Using the qemu2 driver based on user configuration\n"} +{"Time":"2023-05-31T12:03:42.26601-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.923653 4900 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:42.266019-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.923661 4900 start.go:875] validating driver \"qemu2\" against \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:42.266029-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.923670 4900 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:42.266037-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.925665 4900 start_flags.go:305] no existing cluster config was found, will generate one from the flags \n"} +{"Time":"2023-05-31T12:03:42.26605-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tW0531 12:03:30.925686 4900 out.go:239] ! With --network-plugin=cni, you will need to provide your own CNI. See --cni flag as a user-friendly alternative\n"} +{"Time":"2023-05-31T12:03:42.266058-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t! With --network-plugin=cni, you will need to provide your own CNI. See --cni flag as a user-friendly alternative\n"} +{"Time":"2023-05-31T12:03:42.266065-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.933583 4900 out.go:177] * Automatically selected the socket_vmnet network\n"} +{"Time":"2023-05-31T12:03:42.266073-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.936716 4900 start_flags.go:938] Waiting for components: map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true]\n"} +{"Time":"2023-05-31T12:03:42.266081-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.936728 4900 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:42.266088-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.936735 4900 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:03:42.266096-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.936739 4900 start_flags.go:314] Found \"bridge CNI\" CNI - setting NetworkPlugin=cni\n"} +{"Time":"2023-05-31T12:03:42.266104-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.936743 4900 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:42.266114-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t{Name:newest-cni-415000 KeepContext:false EmbedCerts:false MinikubeISO: KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:newest-cni-415000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:d"} +{"Time":"2023-05-31T12:03:42.266125-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"ocker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/s"} +{"Time":"2023-05-31T12:03:42.266133-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"ocket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:42.266139-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.936824 4900 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:42.266145-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.944614 4900 out.go:177] * Starting control plane node newest-cni-415000 in cluster newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:42.26615-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948630 4900 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:03:42.266157-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948651 4900 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:42.266163-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948660 4900 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:42.266169-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948720 4900 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:42.266174-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948726 4900 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:03:42.266183-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948779 4900 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/newest-cni-415000/config.json ...\n"} +{"Time":"2023-05-31T12:03:42.266189-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948792 4900 lock.go:35] WriteFile acquiring /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/newest-cni-415000/config.json: {Name:mk7b9506c82272732fa8d6aed6b17bb62d9563e0 Clock:{} Delay:500ms Timeout:1m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:42.266196-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948984 4900 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:42.266201-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:30.948997 4900 start.go:364] acquiring machines lock for newest-cni-415000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:42.266207-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.463231 4900 start.go:368] acquired machines lock for \"newest-cni-415000\" in 1.514212375s\n"} +{"Time":"2023-05-31T12:03:42.266217-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.463401 4900 start.go:93] Provisioning new machine with config: \u0026{Name:newest-cni-415000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesC"} +{"Time":"2023-05-31T12:03:42.266228-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"onfig:{KubernetesVersion:v1.27.2 ClusterName:newest-cni-415000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountS"} +{"Time":"2023-05-31T12:03:42.266236-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"tring:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:42.266244-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.463614 4900 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:42.266251-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.471261 4900 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:42.266256-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.519673 4900 start.go:159] libmachine.API.Create for \"newest-cni-415000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:42.266261-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.519715 4900 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:42.266267-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.519852 4900 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:42.266272-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.519894 4900 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:42.266277-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.519918 4900 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:42.266283-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.520003 4900 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:42.266288-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.520034 4900 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:42.266294-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.520061 4900 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:42.266299-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.520629 4900 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:42.266308-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.674364 4900 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:42.266314-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.808138 4900 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:42.266319-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.808146 4900 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:42.266327-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.808300 4900 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:42.266333-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.823072 4900 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:42.266338-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.823097 4900 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:42.266344-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.823174 4900 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:42.26635-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.831427 4900 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:42.266358-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:42.266363-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.831448 4900 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:42.266369-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.831475 4900 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:42.266375-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.831480 4900 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:42.266383-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.831519 4900 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/qemu.pid -device virtio-net-pci,netdev=net0,mac=3a:89:ff:dc:50:00 -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:42.266392-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.833287 4900 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:42.266397-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.833301 4900 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:42.266402-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:42.266407-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:32.833319 4900 client.go:171] LocalClient.Create took 313.599875ms\n"} +{"Time":"2023-05-31T12:03:42.266412-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:34.835518 4900 start.go:128] duration metric: createHost completed in 2.371907166s\n"} +{"Time":"2023-05-31T12:03:42.266419-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:34.835600 4900 start.go:83] releasing machines lock for \"newest-cni-415000\", held for 2.372352625s\n"} +{"Time":"2023-05-31T12:03:42.266424-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tW0531 12:03:34.835834 4900 start.go:687] error starting host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:42.26643-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:34.853332 4900 out.go:177] * Deleting \"newest-cni-415000\" in qemu2 ...\n"} +{"Time":"2023-05-31T12:03:42.266437-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tW0531 12:03:34.874799 4900 out.go:239] ! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:42.266443-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t! StartHost failed, but will try again: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:42.266449-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:34.874831 4900 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:42.266455-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.876944 4900 start.go:364] acquiring machines lock for newest-cni-415000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:42.266461-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.893473 4900 start.go:368] acquired machines lock for \"newest-cni-415000\" in 16.422417ms\n"} +{"Time":"2023-05-31T12:03:42.266472-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.893604 4900 start.go:93] Provisioning new machine with config: \u0026{Name:newest-cni-415000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesC"} +{"Time":"2023-05-31T12:03:42.26649-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"onfig:{KubernetesVersion:v1.27.2 ClusterName:newest-cni-415000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[] CustomAddonImages:map[] CustomAddonRegistries:map[] VerifyComponents:map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountS"} +{"Time":"2023-05-31T12:03:42.266499-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":"tring:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:} \u0026{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}\n"} +{"Time":"2023-05-31T12:03:42.266506-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.893820 4900 start.go:125] createHost starting for \"\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:42.266511-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.902658 4900 out.go:204] * Creating qemu2 VM (CPUs=2, Memory=2200MB, Disk=20000MB) ...\n"} +{"Time":"2023-05-31T12:03:42.266517-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943125 4900 start.go:159] libmachine.API.Create for \"newest-cni-415000\" (driver=\"qemu2\")\n"} +{"Time":"2023-05-31T12:03:42.266523-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943167 4900 client.go:168] LocalClient.Create starting\n"} +{"Time":"2023-05-31T12:03:42.26653-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943291 4900 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/ca.pem\n"} +{"Time":"2023-05-31T12:03:42.266536-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943345 4900 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:42.266541-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943362 4900 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:42.266547-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943434 4900 main.go:141] libmachine: Reading certificate data from /Users/jenkins/minikube-integration/16569-1035/.minikube/certs/cert.pem\n"} +{"Time":"2023-05-31T12:03:42.266553-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943462 4900 main.go:141] libmachine: Decoding PEM data...\n"} +{"Time":"2023-05-31T12:03:42.266558-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943477 4900 main.go:141] libmachine: Parsing certificate...\n"} +{"Time":"2023-05-31T12:03:42.266564-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:39.943907 4900 main.go:141] libmachine: Downloading /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/boot2docker.iso from file:///Users/jenkins/minikube-integration/16569-1035/.minikube/cache/iso/arm64/minikube-v1.30.1-1684885329-16572-arm64.iso...\n"} +{"Time":"2023-05-31T12:03:42.26657-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.143227 4900 main.go:141] libmachine: Creating SSH key...\n"} +{"Time":"2023-05-31T12:03:42.266576-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.206250 4900 main.go:141] libmachine: Creating Disk image...\n"} +{"Time":"2023-05-31T12:03:42.266581-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.206258 4900 main.go:141] libmachine: Creating 20000 MB hard disk image...\n"} +{"Time":"2023-05-31T12:03:42.266589-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.206409 4900 main.go:141] libmachine: executing: qemu-img convert -f raw -O qcow2 /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2.raw /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:42.266594-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.215074 4900 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:42.266599-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.215096 4900 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:42.266605-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.215155 4900 main.go:141] libmachine: executing: qemu-img resize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2 +20000M\n"} +{"Time":"2023-05-31T12:03:42.266613-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.222676 4900 main.go:141] libmachine: STDOUT: Image resized.\n"} +{"Time":"2023-05-31T12:03:42.266621-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:42.266627-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.222696 4900 main.go:141] libmachine: STDERR: \n"} +{"Time":"2023-05-31T12:03:42.266633-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.222712 4900 main.go:141] libmachine: DONE writing to /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2.raw and /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:42.266639-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.222719 4900 main.go:141] libmachine: Starting QEMU VM...\n"} +{"Time":"2023-05-31T12:03:42.266647-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.222761 4900 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/qemu.pid -device virtio-net-pci,netdev=net0,mac=0a:2a:c0:43:da:3a -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:42.266656-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.224482 4900 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:42.266662-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.224497 4900 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:42.266667-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:42.266673-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:40.224509 4900 client.go:171] LocalClient.Create took 281.337917ms\n"} +{"Time":"2023-05-31T12:03:42.266679-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:42.226681 4900 start.go:128] duration metric: createHost completed in 2.332855417s\n"} +{"Time":"2023-05-31T12:03:42.266685-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:42.226777 4900 start.go:83] releasing machines lock for \"newest-cni-415000\", held for 2.333313208s\n"} +{"Time":"2023-05-31T12:03:42.266692-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tW0531 12:03:42.227224 4900 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p newest-cni-415000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:42.266699-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p newest-cni-415000\" may fix it: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:42.266704-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:42.235904 4900 out.go:177] \n"} +{"Time":"2023-05-31T12:03:42.26671-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tW0531 12:03:42.239973 4900 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:42.266717-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: creating host: create: creating: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:42.266723-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tW0531 12:03:42.240001 4900 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:42.266728-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:42.266734-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tW0531 12:03:42.242262 4900 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:42.266742-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:42.266747-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:42.266753-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:42.266758-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:42.266763-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:42.266769-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:42.266775-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:42.266782-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:42.266792-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:42.266797-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:42.266802-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:42.266807-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:42.266812-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:42.266818-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:42.266825-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:42.266831-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tI0531 12:03:42.249864 4900 out.go:177] \n"} +{"Time":"2023-05-31T12:03:42.266836-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:42.266841-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:42.26685-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" start_stop_delete_test.go:188: failed starting minikube -first start-. args \"out/minikube-darwin-arm64 start -p newest-cni-415000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=qemu2 --kubernetes-version=v1.27.2\": exit status 80\n"} +{"Time":"2023-05-31T12:03:42.266862-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:42.266868-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:42.330334-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000: exit status 7 (64.512875ms)\n"} +{"Time":"2023-05-31T12:03:42.33035-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:42.330353-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:42.330355-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:42.330357-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" \n"} +{"Time":"2023-05-31T12:03:42.330359-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:42.330361-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:42.330364-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" helpers_test.go:241: \"newest-cni-415000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:42.330474-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/DeployApp"} +{"Time":"2023-05-31T12:03:42.330479-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Output":"=== RUN TestStartStop/group/newest-cni/serial/DeployApp\n"} +{"Time":"2023-05-31T12:03:42.330486-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive"} +{"Time":"2023-05-31T12:03:42.330488-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":"=== RUN TestStartStop/group/newest-cni/serial/EnableAddonWhileActive\n"} +{"Time":"2023-05-31T12:03:42.330585-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:205: (dbg) Run: out/minikube-darwin-arm64 addons enable metrics-server -p newest-cni-415000 --images=MetricsServer=registry.k8s.io/echoserver:1.4 --registries=MetricsServer=fake.domain\n"} +{"Time":"2023-05-31T12:03:42.388874-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" start_stop_delete_test.go:211: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T12:03:42.388906-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/Stop"} +{"Time":"2023-05-31T12:03:42.388908-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":"=== RUN TestStartStop/group/newest-cni/serial/Stop\n"} +{"Time":"2023-05-31T12:03:42.388976-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":" start_stop_delete_test.go:228: (dbg) Run: out/minikube-darwin-arm64 stop -p newest-cni-415000 --alsologtostderr -v=3\n"} +{"Time":"2023-05-31T12:03:42.448905-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop"} +{"Time":"2023-05-31T12:03:42.448917-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/EnableAddonAfterStop\n"} +{"Time":"2023-05-31T12:03:42.448935-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:42.477759-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000: exit status 7 (28.752083ms)\n"} +{"Time":"2023-05-31T12:03:42.477771-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:42.477772-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:42.477774-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:42.477776-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" \n"} +{"Time":"2023-05-31T12:03:42.477777-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:42.477779-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:42.477784-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" start_stop_delete_test.go:246: (dbg) Run: out/minikube-darwin-arm64 addons enable dashboard -p newest-cni-415000 --images=MetricsScraper=registry.k8s.io/echoserver:1.4\n"} +{"Time":"2023-05-31T12:03:42.536901-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/SecondStart"} +{"Time":"2023-05-31T12:03:42.536912-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"=== RUN TestStartStop/group/newest-cni/serial/SecondStart\n"} +{"Time":"2023-05-31T12:03:42.536939-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Run: out/minikube-darwin-arm64 start -p newest-cni-415000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=qemu2 --kubernetes-version=v1.27.2\n"} +{"Time":"2023-05-31T12:03:47.706642-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:256: (dbg) Non-zero exit: out/minikube-darwin-arm64 start -p newest-cni-415000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=qemu2 --kubernetes-version=v1.27.2: exit status 80 (5.168349875s)\n"} +{"Time":"2023-05-31T12:03:47.706707-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:47.706716-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:47.706725-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t* [newest-cni-415000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:47.706732-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:47.70674-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:47.706751-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:47.706776-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:47.706785-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:47.706792-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:47.706798-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t* Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:47.706806-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t* Starting control plane node newest-cni-415000 in cluster newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:47.706813-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"newest-cni-415000\" ...\n"} +{"Time":"2023-05-31T12:03:47.70682-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:47.706826-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:47.706834-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:47.706842-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t* Restarting existing qemu2 VM for \"newest-cni-415000\" ...\n"} +{"Time":"2023-05-31T12:03:47.706849-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tOUTPUT: \n"} +{"Time":"2023-05-31T12:03:47.706855-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tERROR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:47.706862-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:47.706869-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:47.706876-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:47.706882-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:47.706889-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:47.706895-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:47.706902-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.563531 4990 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:47.706909-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.563647 4990 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:47.706917-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.563649 4990 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:47.706924-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.563652 4990 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:47.706931-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.563720 4990 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:47.706938-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.564712 4990 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:47.706966-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.579448 4990 start.go:127] hostinfo: {\"hostname\":\"MacOS-M1-Agent-1.local\",\"uptime\":1993,\"bootTime\":1685557829,\"procs\":424,\"os\":\"darwin\",\"platform\":\"darwin\",\"platformFamily\":\"Standalone Workstation\",\"platformVersion\":\"13.4\",\"kernelVersion\":\"22.5.0\",\"kernelArch\":\"arm64\",\"virtualizationSystem\":\"\",\"virtualizationRole\":\"\",\"hostId\":\"5b726c3a-f72c-561b-b03e-814251f12bfa\"}\n"} +{"Time":"2023-05-31T12:03:47.706982-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:42.579504 4990 start.go:135] gopshost.Virtualization returned error: not implemented yet\n"} +{"Time":"2023-05-31T12:03:47.706989-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.583249 4990 out.go:177] * [newest-cni-415000] minikube v1.30.1 on Darwin 13.4 (arm64)\n"} +{"Time":"2023-05-31T12:03:47.706996-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.590239 4990 out.go:177] - MINIKUBE_LOCATION=16569\n"} +{"Time":"2023-05-31T12:03:47.707003-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.590246 4990 notify.go:220] Checking for updates...\n"} +{"Time":"2023-05-31T12:03:47.707011-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.593994 4990 out.go:177] - KUBECONFIG=/Users/jenkins/minikube-integration/16569-1035/kubeconfig\n"} +{"Time":"2023-05-31T12:03:47.707019-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.597146 4990 out.go:177] - MINIKUBE_BIN=out/minikube-darwin-arm64\n"} +{"Time":"2023-05-31T12:03:47.707027-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.600195 4990 out.go:177] - MINIKUBE_SUPPRESS_DOCKER_PERFORMANCE=true\n"} +{"Time":"2023-05-31T12:03:47.707034-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.603197 4990 out.go:177] - MINIKUBE_HOME=/Users/jenkins/minikube-integration/16569-1035/.minikube\n"} +{"Time":"2023-05-31T12:03:47.707041-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.606176 4990 out.go:177] - MINIKUBE_FORCE_SYSTEMD=\n"} +{"Time":"2023-05-31T12:03:47.707049-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.609427 4990 config.go:182] Loaded profile config \"newest-cni-415000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:47.707057-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.609682 4990 driver.go:375] Setting default libvirt URI to qemu:///system\n"} +{"Time":"2023-05-31T12:03:47.707064-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.614231 4990 out.go:177] * Using the qemu2 driver based on existing profile\n"} +{"Time":"2023-05-31T12:03:47.707072-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.621156 4990 start.go:297] selected driver: qemu2\n"} +{"Time":"2023-05-31T12:03:47.707089-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.621161 4990 start.go:875] validating driver \"qemu2\" against \u0026{Name:newest-cni-415000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConf"} +{"Time":"2023-05-31T12:03:47.707105-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"ig:{KubernetesVersion:v1.27.2 ClusterName:newest-cni-415000 Namespace:default APIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cn"} +{"Time":"2023-05-31T12:03:47.707117-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"il\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeRequested:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:47.707127-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.621200 4990 start.go:886] status for qemu2: {Installed:true Healthy:true Running:true NeedsImprovement:false Error:\u003cnil\u003e Reason: Fix: Doc: Version:}\n"} +{"Time":"2023-05-31T12:03:47.707141-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.622985 4990 start_flags.go:938] Waiting for components: map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true]\n"} +{"Time":"2023-05-31T12:03:47.707149-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.623004 4990 cni.go:84] Creating CNI manager for \"\"\n"} +{"Time":"2023-05-31T12:03:47.707157-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.623011 4990 cni.go:157] \"qemu2\" driver + \"docker\" container runtime found on kubernetes v1.24+, recommending bridge\n"} +{"Time":"2023-05-31T12:03:47.707165-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.623016 4990 start_flags.go:319] config:\n"} +{"Time":"2023-05-31T12:03:47.707183-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t{Name:newest-cni-415000 KeepContext:false EmbedCerts:false MinikubeISO:https://storage.googleapis.com/minikube-builds/iso/16572/minikube-v1.30.1-1684885329-16572-arm64.iso KicBaseImage:gcr.io/k8s-minikube/kicbase-builds:v0.0.39-1685034446-16582@sha256:aa728b22374c829d1e5b0a5d64d51d3e0ae0f2b191381d957516fdff68f357c8 Memory:2200 CPUs:2 DiskSize:20000 VMDriver: Driver:qemu2 HyperkitVpnKitSock: HyperkitVSockPorts:[] DockerEnv:[] ContainerVolumeMounts:[] InsecureRegistry:[] RegistryMirror:[] HostOnlyCIDR:192.168.59.1/24 HypervVirtualSwitch: HypervUseExternalSwitch:false HypervExternalAdapter: KVMNetwork:default KVMQemuURI:qemu:///system KVMGPU:false KVMHidden:false KVMNUMACount:1 APIServerPort:0 DockerOpt:[] DisableDriverMounts:false NFSShare:[] NFSSharesRoot:/nfsshares UUID: NoVTXCheck:false DNSProxy:false HostDNSResolver:true HostOnlyNicType:virtio NatNicType:virtio SSHIPAddress: SSHUser:root SSHKey: SSHPort:22 KubernetesConfig:{KubernetesVersion:v1.27.2 ClusterName:newest-cni-415000 Namespace:default A"} +{"Time":"2023-05-31T12:03:47.707196-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"PIServerName:minikubeCA APIServerNames:[] APIServerIPs:[] DNSDomain:cluster.local ContainerRuntime:docker CRISocket: NetworkPlugin:cni FeatureGates:ServerSideApply=true ServiceCIDR:10.96.0.0/12 ImageRepository: LoadBalancerStartIP: LoadBalancerEndIP: CustomIngressCert: RegistryAliases: ExtraOptions:[{Component:kubeadm Key:pod-network-cidr Value:10.42.0.0/16}] ShouldLoadCachedImages:true EnableDefaultCNI:false CNI: NodeIP: NodePort:8443 NodeName:} Nodes:[{Name: IP: Port:8443 KubernetesVersion:v1.27.2 ContainerRuntime:docker ControlPlane:true Worker:true}] Addons:map[dashboard:true metrics-server:true] CustomAddonImages:map[MetricsScraper:registry.k8s.io/echoserver:1.4 MetricsServer:registry.k8s.io/echoserver:1.4] CustomAddonRegistries:map[MetricsServer:fake.domain] VerifyComponents:map[apiserver:true apps_running:false default_sa:true extra:false kubelet:false node_ready:false system_pods:true] StartHostTimeout:6m0s ScheduledStop:\u003cnil\u003e ExposedPorts:[] ListenAddress: Network:socket_vmnet Subnet: MultiNodeReques"} +{"Time":"2023-05-31T12:03:47.707208-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":"ted:false ExtraDisks:0 CertExpiration:26280h0m0s Mount:false MountString:/Users:/minikube-host Mount9PVersion:9p2000.L MountGID:docker MountIP: MountMSize:262144 MountOptions:[] MountPort:0 MountType:9p MountUID:docker BinaryMirror: DisableOptimizations:false DisableMetrics:false CustomQemuFirmwarePath: SocketVMnetClientPath:/opt/socket_vmnet/bin/socket_vmnet_client SocketVMnetPath:/var/run/socket_vmnet StaticIP:}\n"} +{"Time":"2023-05-31T12:03:47.707216-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.623102 4990 iso.go:125] acquiring lock: {Name:mk1c40ec4029847163093b2d18098a3398dc0050 Clock:{} Delay:500ms Timeout:10m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:47.707224-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.630169 4990 out.go:177] * Starting control plane node newest-cni-415000 in cluster newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:47.707232-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634201 4990 preload.go:132] Checking if preload exists for k8s version v1.27.2 and runtime docker\n"} +{"Time":"2023-05-31T12:03:47.707239-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634220 4990 preload.go:148] Found local preload: /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4\n"} +{"Time":"2023-05-31T12:03:47.707248-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634229 4990 cache.go:57] Caching tarball of preloaded images\n"} +{"Time":"2023-05-31T12:03:47.707255-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634284 4990 preload.go:174] Found /Users/jenkins/minikube-integration/16569-1035/.minikube/cache/preloaded-tarball/preloaded-images-k8s-v18-v1.27.2-docker-overlay2-arm64.tar.lz4 in cache, skipping download\n"} +{"Time":"2023-05-31T12:03:47.707263-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634289 4990 cache.go:60] Finished verifying existence of preloaded tar for v1.27.2 on docker\n"} +{"Time":"2023-05-31T12:03:47.707271-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634348 4990 profile.go:148] Saving config to /Users/jenkins/minikube-integration/16569-1035/.minikube/profiles/newest-cni-415000/config.json ...\n"} +{"Time":"2023-05-31T12:03:47.70728-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634698 4990 cache.go:195] Successfully downloaded all kic artifacts\n"} +{"Time":"2023-05-31T12:03:47.707288-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634710 4990 start.go:364] acquiring machines lock for newest-cni-415000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:47.707297-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634743 4990 start.go:368] acquired machines lock for \"newest-cni-415000\" in 28.042µs\n"} +{"Time":"2023-05-31T12:03:47.707306-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634753 4990 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:47.707314-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634756 4990 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:47.707321-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.634865 4990 fix.go:103] recreateIfNeeded on newest-cni-415000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:47.707329-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:42.634873 4990 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:47.707337-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.639127 4990 out.go:177] * Restarting existing qemu2 VM for \"newest-cni-415000\" ...\n"} +{"Time":"2023-05-31T12:03:47.707348-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.647167 4990 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/qemu.pid -device virtio-net-pci,netdev=net0,mac=0a:2a:c0:43:da:3a -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:47.70736-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.648937 4990 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:47.707368-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.648954 4990 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:47.707375-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:47.707382-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.648992 4990 fix.go:57] fixHost completed within 14.234291ms\n"} +{"Time":"2023-05-31T12:03:47.707389-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.648997 4990 start.go:83] releasing machines lock for \"newest-cni-415000\", held for 14.250667ms\n"} +{"Time":"2023-05-31T12:03:47.707397-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:42.649004 4990 start.go:687] error starting host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:47.707405-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:42.649032 4990 out.go:239] ! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:47.707417-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t! StartHost failed, but will try again: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:47.707426-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:42.649037 4990 start.go:702] Will try again in 5 seconds ...\n"} +{"Time":"2023-05-31T12:03:47.707433-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.651148 4990 start.go:364] acquiring machines lock for newest-cni-415000: {Name:mkc88a79be5b99df33d46ba1f84dc087a3b71eb1 Clock:{} Delay:500ms Timeout:13m0s Cancel:\u003cnil\u003e}\n"} +{"Time":"2023-05-31T12:03:47.707441-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.651570 4990 start.go:368] acquired machines lock for \"newest-cni-415000\" in 294.917µs\n"} +{"Time":"2023-05-31T12:03:47.707455-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.651723 4990 start.go:96] Skipping create...Using existing machine configuration\n"} +{"Time":"2023-05-31T12:03:47.707462-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.651742 4990 fix.go:55] fixHost starting: \n"} +{"Time":"2023-05-31T12:03:47.70747-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.652482 4990 fix.go:103] recreateIfNeeded on newest-cni-415000: state=Stopped err=\u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:47.707478-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:47.652509 4990 fix.go:129] unexpected machine state, will restart: \u003cnil\u003e\n"} +{"Time":"2023-05-31T12:03:47.707485-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.656882 4990 out.go:177] * Restarting existing qemu2 VM for \"newest-cni-415000\" ...\n"} +{"Time":"2023-05-31T12:03:47.707499-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.665103 4990 main.go:141] libmachine: executing: /opt/socket_vmnet/bin/socket_vmnet_client /var/run/socket_vmnet qemu-system-aarch64 -M virt,highmem=off -cpu host -drive file=/opt/homebrew/Cellar/qemu/7.2.0/share/qemu/edk2-aarch64-code.fd,readonly=on,format=raw,if=pflash -display none -accel hvf -m 2200 -smp 2 -boot d -cdrom /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/boot2docker.iso -qmp unix:/Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/monitor,server,nowait -pidfile /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/qemu.pid -device virtio-net-pci,netdev=net0,mac=0a:2a:c0:43:da:3a -netdev socket,id=net0,fd=3 -daemonize /Users/jenkins/minikube-integration/16569-1035/.minikube/machines/newest-cni-415000/disk.qcow2\n"} +{"Time":"2023-05-31T12:03:47.707514-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.674292 4990 main.go:141] libmachine: STDOUT: \n"} +{"Time":"2023-05-31T12:03:47.707522-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.674344 4990 main.go:141] libmachine: STDERR: Failed to connect to \"/var/run/socket_vmnet\": Connection refused\n"} +{"Time":"2023-05-31T12:03:47.707529-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t\n"} +{"Time":"2023-05-31T12:03:47.707536-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.674443 4990 fix.go:57] fixHost completed within 22.704042ms\n"} +{"Time":"2023-05-31T12:03:47.707543-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.674463 4990 start.go:83] releasing machines lock for \"newest-cni-415000\", held for 22.870625ms\n"} +{"Time":"2023-05-31T12:03:47.707556-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:47.674639 4990 out.go:239] * Failed to start qemu2 VM. Running \"minikube delete -p newest-cni-415000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:47.707566-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t* Failed to start qemu2 VM. Running \"minikube delete -p newest-cni-415000\" may fix it: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:47.707574-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.680106 4990 out.go:177] \n"} +{"Time":"2023-05-31T12:03:47.707582-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:47.684114 4990 out.go:239] X Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:47.707591-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tX Exiting due to GUEST_PROVISION: error provisioning guest: Failed to start host: driver start: Failed to connect to \"/var/run/socket_vmnet\": Connection refused: exit status 1\n"} +{"Time":"2023-05-31T12:03:47.707599-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:47.684165 4990 out.go:239] * \n"} +{"Time":"2023-05-31T12:03:47.70761-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t* \n"} +{"Time":"2023-05-31T12:03:47.707618-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tW0531 12:03:47.687058 4990 out.go:239] ╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:47.70763-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:47.707639-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:47.707647-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:47.707654-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:47.707661-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:47.707668-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:47.707676-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:47.707687-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t╭─────────────────────────────────────────────────────────────────────────────────────────────╮\n"} +{"Time":"2023-05-31T12:03:47.707697-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:47.707704-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ * If the above advice does not help, please let us know: │\n"} +{"Time":"2023-05-31T12:03:47.707711-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ https://github.com/kubernetes/minikube/issues/new/choose │\n"} +{"Time":"2023-05-31T12:03:47.707718-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:47.707726-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ * Please run `minikube logs --file=logs.txt` and attach logs.txt to the GitHub issue. │\n"} +{"Time":"2023-05-31T12:03:47.707733-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t│ │\n"} +{"Time":"2023-05-31T12:03:47.707743-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \t╰─────────────────────────────────────────────────────────────────────────────────────────────╯\n"} +{"Time":"2023-05-31T12:03:47.707751-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tI0531 12:03:47.693920 4990 out.go:177] \n"} +{"Time":"2023-05-31T12:03:47.707759-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:47.707765-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:47.707778-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" start_stop_delete_test.go:259: failed to start minikube post-stop. args \"out/minikube-darwin-arm64 start -p newest-cni-415000 --memory=2200 --alsologtostderr --wait=apiserver,system_pods,default_sa --feature-gates ServerSideApply=true --network-plugin=cni --extra-config=kubeadm.pod-network-cidr=10.42.0.0/16 --driver=qemu2 --kubernetes-version=v1.27.2\": exit status 80\n"} +{"Time":"2023-05-31T12:03:47.707787-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:47.707795-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:47.775114-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000: exit status 7 (68.239959ms)\n"} +{"Time":"2023-05-31T12:03:47.77513-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:47.775133-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:47.775135-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:47.775136-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" \n"} +{"Time":"2023-05-31T12:03:47.775138-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:47.77514-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:47.775143-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" helpers_test.go:241: \"newest-cni-415000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:47.775188-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop"} +{"Time":"2023-05-31T12:03:47.775197-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:47.775221-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":" start_stop_delete_test.go:273: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T12:03:47.775298-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop"} +{"Time":"2023-05-31T12:03:47.775323-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":"=== RUN TestStartStop/group/newest-cni/serial/AddonExistsAfterStop\n"} +{"Time":"2023-05-31T12:03:47.775326-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":" start_stop_delete_test.go:284: WARNING: cni mode requires additional setup before pods can schedule :(\n"} +{"Time":"2023-05-31T12:03:47.775329-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages"} +{"Time":"2023-05-31T12:03:47.775331-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":"=== RUN TestStartStop/group/newest-cni/serial/VerifyKubernetesImages\n"} +{"Time":"2023-05-31T12:03:47.775337-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Run: out/minikube-darwin-arm64 ssh -p newest-cni-415000 \"sudo crictl images -o json\"\n"} +{"Time":"2023-05-31T12:03:47.820604-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: (dbg) Non-zero exit: out/minikube-darwin-arm64 ssh -p newest-cni-415000 \"sudo crictl images -o json\": exit status 89 (45.237125ms)\n"} +{"Time":"2023-05-31T12:03:47.820615-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:47.820618-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:47.820619-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:47.820621-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" \t To start a cluster, run: \"minikube start -p newest-cni-415000\"\n"} +{"Time":"2023-05-31T12:03:47.820623-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:47.820624-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:47.820633-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to get images inside minikube. args \"out/minikube-darwin-arm64 ssh -p newest-cni-415000 \\\"sudo crictl images -o json\\\"\": exit status 89\n"} +{"Time":"2023-05-31T12:03:47.820638-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: failed to decode images json invalid character '*' looking for beginning of value. output:\n"} +{"Time":"2023-05-31T12:03:47.82064-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:47.820642-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" To start a cluster, run: \"minikube start -p newest-cni-415000\"\n"} +{"Time":"2023-05-31T12:03:47.82076-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" start_stop_delete_test.go:304: v1.27.2 images missing (-want +got):\n"} +{"Time":"2023-05-31T12:03:47.820763-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" []string{\n"} +{"Time":"2023-05-31T12:03:47.820765-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" - \t\"gcr.io/k8s-minikube/storage-provisioner:v5\",\n"} +{"Time":"2023-05-31T12:03:47.820767-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/coredns/coredns:v1.10.1\",\n"} +{"Time":"2023-05-31T12:03:47.820768-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/etcd:3.5.7-0\",\n"} +{"Time":"2023-05-31T12:03:47.82077-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-apiserver:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:47.820771-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-controller-manager:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:47.820772-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-proxy:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:47.820774-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/kube-scheduler:v1.27.2\",\n"} +{"Time":"2023-05-31T12:03:47.820775-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" - \t\"registry.k8s.io/pause:3.9\",\n"} +{"Time":"2023-05-31T12:03:47.820777-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" }\n"} +{"Time":"2023-05-31T12:03:47.820778-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:47.82078-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:47.850029-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000: exit status 7 (29.194625ms)\n"} +{"Time":"2023-05-31T12:03:47.850042-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:47.850044-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:47.850045-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:47.850047-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" \n"} +{"Time":"2023-05-31T12:03:47.850048-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:47.85005-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:47.850053-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" helpers_test.go:241: \"newest-cni-415000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:47.850087-07:00","Action":"run","Test":"TestStartStop/group/newest-cni/serial/Pause"} +{"Time":"2023-05-31T12:03:47.850089-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":"=== RUN TestStartStop/group/newest-cni/serial/Pause\n"} +{"Time":"2023-05-31T12:03:47.850156-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Run: out/minikube-darwin-arm64 pause -p newest-cni-415000 --alsologtostderr -v=1\n"} +{"Time":"2023-05-31T12:03:47.888741-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: (dbg) Non-zero exit: out/minikube-darwin-arm64 pause -p newest-cni-415000 --alsologtostderr -v=1: exit status 89 (38.4825ms)\n"} +{"Time":"2023-05-31T12:03:47.888754-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:47.888756-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:47.888757-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \t* The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:47.88876-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \t To start a cluster, run: \"minikube start -p newest-cni-415000\"\n"} +{"Time":"2023-05-31T12:03:47.888761-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:47.888762-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:47.888764-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:47.888765-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.877747 5005 out.go:296] Setting OutFile to fd 1 ...\n"} +{"Time":"2023-05-31T12:03:47.888767-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.877889 5005 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:47.888768-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.877892 5005 out.go:309] Setting ErrFile to fd 2...\n"} +{"Time":"2023-05-31T12:03:47.88877-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.877895 5005 out.go:343] TERM=,COLORTERM=, which probably does not support color\n"} +{"Time":"2023-05-31T12:03:47.888771-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.877975 5005 root.go:336] Updating PATH: /Users/jenkins/minikube-integration/16569-1035/.minikube/bin\n"} +{"Time":"2023-05-31T12:03:47.888773-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.878198 5005 out.go:303] Setting JSON to false\n"} +{"Time":"2023-05-31T12:03:47.88878-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.878206 5005 mustload.go:65] Loading cluster: newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:47.888782-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.878397 5005 config.go:182] Loaded profile config \"newest-cni-415000\": Driver=qemu2, ContainerRuntime=docker, KubernetesVersion=v1.27.2\n"} +{"Time":"2023-05-31T12:03:47.888783-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.880013 5005 out.go:177] * The control plane node must be running for this command\n"} +{"Time":"2023-05-31T12:03:47.888785-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tI0531 12:03:47.884122 5005 out.go:177] To start a cluster, run: \"minikube start -p newest-cni-415000\"\n"} +{"Time":"2023-05-31T12:03:47.888786-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:47.888788-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:47.888789-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" start_stop_delete_test.go:311: out/minikube-darwin-arm64 pause -p newest-cni-415000 --alsologtostderr -v=1 failed: exit status 89\n"} +{"Time":"2023-05-31T12:03:47.888791-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:47.888793-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:47.917601-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000: exit status 7 (28.742375ms)\n"} +{"Time":"2023-05-31T12:03:47.91762-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:47.917622-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:47.917623-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:47.917625-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:47.917626-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:47.917628-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:47.917632-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:241: \"newest-cni-415000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:47.917634-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:222: -----------------------post-mortem--------------------------------\n"} +{"Time":"2023-05-31T12:03:47.917639-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:239: (dbg) Run: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:47.946941-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:239: (dbg) Non-zero exit: out/minikube-darwin-arm64 status --format={{.Host}} -p newest-cni-415000 -n newest-cni-415000: exit status 7 (29.2135ms)\n"} +{"Time":"2023-05-31T12:03:47.946953-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:47.946955-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:47.946957-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \tStopped\n"} +{"Time":"2023-05-31T12:03:47.946958-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" \n"} +{"Time":"2023-05-31T12:03:47.94696-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:47.946961-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:239: status error: exit status 7 (may be ok)\n"} +{"Time":"2023-05-31T12:03:47.946964-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" helpers_test.go:241: \"newest-cni-415000\" host is not running, skipping log retrieval (state=\"Stopped\")\n"} +{"Time":"2023-05-31T12:03:47.947018-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:162: (dbg) Run: out/minikube-darwin-arm64 delete -p newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:48.040911-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:167: (dbg) Run: kubectl config get-contexts newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:48.067595-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:167: (dbg) Non-zero exit: kubectl config get-contexts newest-cni-415000: exit status 1 (26.621416ms)\n"} +{"Time":"2023-05-31T12:03:48.067608-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:48.06761-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" -- stdout --\n"} +{"Time":"2023-05-31T12:03:48.067611-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \tCURRENT NAME CLUSTER AUTHINFO NAMESPACE\n"} +{"Time":"2023-05-31T12:03:48.067613-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:48.067615-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" -- /stdout --\n"} +{"Time":"2023-05-31T12:03:48.067616-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" ** stderr ** \n"} +{"Time":"2023-05-31T12:03:48.067617-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \terror: context newest-cni-415000 not found\n"} +{"Time":"2023-05-31T12:03:48.067619-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" \n"} +{"Time":"2023-05-31T12:03:48.06762-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" ** /stderr **\n"} +{"Time":"2023-05-31T12:03:48.067622-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" start_stop_delete_test.go:169: config context error: exit status 1 (may be ok)\n"} +{"Time":"2023-05-31T12:03:48.067626-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" helpers_test.go:175: Cleaning up \"newest-cni-415000\" profile ...\n"} +{"Time":"2023-05-31T12:03:48.067647-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" helpers_test.go:178: (dbg) Run: out/minikube-darwin-arm64 delete -p newest-cni-415000\n"} +{"Time":"2023-05-31T12:03:48.312772-07:00","Action":"output","Test":"TestStartStop","Output":"--- FAIL: TestStartStop (189.80s)\n"} +{"Time":"2023-05-31T12:03:48.312789-07:00","Action":"output","Test":"TestStartStop/group","Output":" --- FAIL: TestStartStop/group (0.00s)\n"} +{"Time":"2023-05-31T12:03:48.312791-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version","Output":" --- FAIL: TestStartStop/group/old-k8s-version (18.62s)\n"} +{"Time":"2023-05-31T12:03:48.312794-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial (18.38s)\n"} +{"Time":"2023-05-31T12:03:48.312796-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/FirstStart (9.93s)\n"} +{"Time":"2023-05-31T12:03:48.312797-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/FirstStart","Elapsed":9.93} +{"Time":"2023-05-31T12:03:48.312801-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/DeployApp (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.312803-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/DeployApp","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312804-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive (0.11s)\n"} +{"Time":"2023-05-31T12:03:48.312806-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonWhileActive","Elapsed":0.11} +{"Time":"2023-05-31T12:03:48.312808-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/Stop (0.07s)\n"} +{"Time":"2023-05-31T12:03:48.312809-07:00","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/Stop","Elapsed":0.07} +{"Time":"2023-05-31T12:03:48.312811-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.312812-07:00","Action":"pass","Test":"TestStartStop/group/old-k8s-version/serial/EnableAddonAfterStop","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312813-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/SecondStart (7.68s)\n"} +{"Time":"2023-05-31T12:03:48.312815-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/SecondStart","Elapsed":7.68} +{"Time":"2023-05-31T12:03:48.312816-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop (0.03s)\n"} +{"Time":"2023-05-31T12:03:48.312818-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/UserAppExistsAfterStop","Elapsed":0.03} +{"Time":"2023-05-31T12:03:48.312819-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.312821-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/AddonExistsAfterStop","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312822-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.312823-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/VerifyKubernetesImages","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312824-07:00","Action":"output","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Output":" --- FAIL: TestStartStop/group/old-k8s-version/serial/Pause (0.10s)\n"} +{"Time":"2023-05-31T12:03:48.312826-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial/Pause","Elapsed":0.1} +{"Time":"2023-05-31T12:03:48.312827-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version/serial","Elapsed":18.38} +{"Time":"2023-05-31T12:03:48.312829-07:00","Action":"fail","Test":"TestStartStop/group/old-k8s-version","Elapsed":18.62} +{"Time":"2023-05-31T12:03:48.31283-07:00","Action":"output","Test":"TestStartStop/group/no-preload","Output":" --- FAIL: TestStartStop/group/no-preload (18.20s)\n"} +{"Time":"2023-05-31T12:03:48.312832-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial","Output":" --- FAIL: TestStartStop/group/no-preload/serial (17.96s)\n"} +{"Time":"2023-05-31T12:03:48.312833-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/FirstStart","Output":" --- FAIL: TestStartStop/group/no-preload/serial/FirstStart (10.16s)\n"} +{"Time":"2023-05-31T12:03:48.312835-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial/FirstStart","Elapsed":10.16} +{"Time":"2023-05-31T12:03:48.312836-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/DeployApp","Output":" --- FAIL: TestStartStop/group/no-preload/serial/DeployApp (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.312838-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial/DeployApp","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312839-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Output":" --- FAIL: TestStartStop/group/no-preload/serial/EnableAddonWhileActive (0.14s)\n"} +{"Time":"2023-05-31T12:03:48.31284-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial/EnableAddonWhileActive","Elapsed":0.14} +{"Time":"2023-05-31T12:03:48.312842-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Stop","Output":" --- PASS: TestStartStop/group/no-preload/serial/Stop (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.312843-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/Stop","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312844-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/no-preload/serial/EnableAddonAfterStop (0.08s)\n"} +{"Time":"2023-05-31T12:03:48.312846-07:00","Action":"pass","Test":"TestStartStop/group/no-preload/serial/EnableAddonAfterStop","Elapsed":0.08} +{"Time":"2023-05-31T12:03:48.312847-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/SecondStart","Output":" --- FAIL: TestStartStop/group/no-preload/serial/SecondStart (7.03s)\n"} +{"Time":"2023-05-31T12:03:48.312849-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial/SecondStart","Elapsed":7.03} +{"Time":"2023-05-31T12:03:48.31285-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Output":" --- FAIL: TestStartStop/group/no-preload/serial/UserAppExistsAfterStop (0.03s)\n"} +{"Time":"2023-05-31T12:03:48.312851-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial/UserAppExistsAfterStop","Elapsed":0.03} +{"Time":"2023-05-31T12:03:48.312853-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Output":" --- FAIL: TestStartStop/group/no-preload/serial/AddonExistsAfterStop (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.312854-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial/AddonExistsAfterStop","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312856-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Output":" --- FAIL: TestStartStop/group/no-preload/serial/VerifyKubernetesImages (0.08s)\n"} +{"Time":"2023-05-31T12:03:48.312857-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial/VerifyKubernetesImages","Elapsed":0.08} +{"Time":"2023-05-31T12:03:48.312858-07:00","Action":"output","Test":"TestStartStop/group/no-preload/serial/Pause","Output":" --- FAIL: TestStartStop/group/no-preload/serial/Pause (0.10s)\n"} +{"Time":"2023-05-31T12:03:48.31286-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial/Pause","Elapsed":0.1} +{"Time":"2023-05-31T12:03:48.312861-07:00","Action":"fail","Test":"TestStartStop/group/no-preload/serial","Elapsed":17.96} +{"Time":"2023-05-31T12:03:48.312862-07:00","Action":"fail","Test":"TestStartStop/group/no-preload","Elapsed":18.2} +{"Time":"2023-05-31T12:03:48.312863-07:00","Action":"output","Test":"TestStartStop/group/disable-driver-mounts","Output":" --- SKIP: TestStartStop/group/disable-driver-mounts (0.23s)\n"} +{"Time":"2023-05-31T12:03:48.312865-07:00","Action":"skip","Test":"TestStartStop/group/disable-driver-mounts","Elapsed":0.23} +{"Time":"2023-05-31T12:03:48.312866-07:00","Action":"output","Test":"TestStartStop/group/embed-certs","Output":" --- FAIL: TestStartStop/group/embed-certs (19.88s)\n"} +{"Time":"2023-05-31T12:03:48.312868-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial","Output":" --- FAIL: TestStartStop/group/embed-certs/serial (19.65s)\n"} +{"Time":"2023-05-31T12:03:48.312871-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Output":" --- FAIL: TestStartStop/group/embed-certs/serial/FirstStart (11.68s)\n"} +{"Time":"2023-05-31T12:03:48.312873-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial/FirstStart","Elapsed":11.68} +{"Time":"2023-05-31T12:03:48.312874-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Output":" --- FAIL: TestStartStop/group/embed-certs/serial/DeployApp (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.312876-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial/DeployApp","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312877-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Output":" --- FAIL: TestStartStop/group/embed-certs/serial/EnableAddonWhileActive (0.13s)\n"} +{"Time":"2023-05-31T12:03:48.312878-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial/EnableAddonWhileActive","Elapsed":0.13} +{"Time":"2023-05-31T12:03:48.31288-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Stop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/Stop (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.312881-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/Stop","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312882-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/embed-certs/serial/EnableAddonAfterStop (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.312884-07:00","Action":"pass","Test":"TestStartStop/group/embed-certs/serial/EnableAddonAfterStop","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312885-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Output":" --- FAIL: TestStartStop/group/embed-certs/serial/SecondStart (7.21s)\n"} +{"Time":"2023-05-31T12:03:48.312887-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial/SecondStart","Elapsed":7.21} +{"Time":"2023-05-31T12:03:48.312888-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Output":" --- FAIL: TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop (0.03s)\n"} +{"Time":"2023-05-31T12:03:48.31289-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial/UserAppExistsAfterStop","Elapsed":0.03} +{"Time":"2023-05-31T12:03:48.312892-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Output":" --- FAIL: TestStartStop/group/embed-certs/serial/AddonExistsAfterStop (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.312893-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial/AddonExistsAfterStop","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312895-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Output":" --- FAIL: TestStartStop/group/embed-certs/serial/VerifyKubernetesImages (0.08s)\n"} +{"Time":"2023-05-31T12:03:48.312896-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial/VerifyKubernetesImages","Elapsed":0.08} +{"Time":"2023-05-31T12:03:48.312897-07:00","Action":"output","Test":"TestStartStop/group/embed-certs/serial/Pause","Output":" --- FAIL: TestStartStop/group/embed-certs/serial/Pause (0.10s)\n"} +{"Time":"2023-05-31T12:03:48.312899-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial/Pause","Elapsed":0.1} +{"Time":"2023-05-31T12:03:48.3129-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs/serial","Elapsed":19.65} +{"Time":"2023-05-31T12:03:48.312901-07:00","Action":"fail","Test":"TestStartStop/group/embed-certs","Elapsed":19.88} +{"Time":"2023-05-31T12:03:48.312903-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port (19.56s)\n"} +{"Time":"2023-05-31T12:03:48.312904-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial (19.33s)\n"} +{"Time":"2023-05-31T12:03:48.312906-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial/FirstStart (11.50s)\n"} +{"Time":"2023-05-31T12:03:48.312907-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial/FirstStart","Elapsed":11.5} +{"Time":"2023-05-31T12:03:48.312909-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial/DeployApp (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.312911-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial/DeployApp","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312912-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive (0.13s)\n"} +{"Time":"2023-05-31T12:03:48.312913-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonWhileActive","Elapsed":0.13} +{"Time":"2023-05-31T12:03:48.312915-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/Stop (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.312917-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/Stop","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312918-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.31292-07:00","Action":"pass","Test":"TestStartStop/group/default-k8s-diff-port/serial/EnableAddonAfterStop","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312921-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial/SecondStart (7.06s)\n"} +{"Time":"2023-05-31T12:03:48.312922-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial/SecondStart","Elapsed":7.06} +{"Time":"2023-05-31T12:03:48.312925-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop (0.03s)\n"} +{"Time":"2023-05-31T12:03:48.312927-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial/UserAppExistsAfterStop","Elapsed":0.03} +{"Time":"2023-05-31T12:03:48.312928-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.31293-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial/AddonExistsAfterStop","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312931-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages (0.10s)\n"} +{"Time":"2023-05-31T12:03:48.312933-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial/VerifyKubernetesImages","Elapsed":0.1} +{"Time":"2023-05-31T12:03:48.312934-07:00","Action":"output","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Output":" --- FAIL: TestStartStop/group/default-k8s-diff-port/serial/Pause (0.10s)\n"} +{"Time":"2023-05-31T12:03:48.312936-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial/Pause","Elapsed":0.1} +{"Time":"2023-05-31T12:03:48.312937-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port/serial","Elapsed":19.33} +{"Time":"2023-05-31T12:03:48.312938-07:00","Action":"fail","Test":"TestStartStop/group/default-k8s-diff-port","Elapsed":19.56} +{"Time":"2023-05-31T12:03:48.31294-07:00","Action":"output","Test":"TestStartStop/group/newest-cni","Output":" --- FAIL: TestStartStop/group/newest-cni (17.48s)\n"} +{"Time":"2023-05-31T12:03:48.312942-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial","Output":" --- FAIL: TestStartStop/group/newest-cni/serial (17.23s)\n"} +{"Time":"2023-05-31T12:03:48.312943-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Output":" --- FAIL: TestStartStop/group/newest-cni/serial/FirstStart (11.50s)\n"} +{"Time":"2023-05-31T12:03:48.312945-07:00","Action":"fail","Test":"TestStartStop/group/newest-cni/serial/FirstStart","Elapsed":11.5} +{"Time":"2023-05-31T12:03:48.312946-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Output":" --- PASS: TestStartStop/group/newest-cni/serial/DeployApp (0.00s)\n"} +{"Time":"2023-05-31T12:03:48.312948-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/DeployApp","Elapsed":0} +{"Time":"2023-05-31T12:03:48.312949-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Output":" --- PASS: TestStartStop/group/newest-cni/serial/EnableAddonWhileActive (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.312951-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/EnableAddonWhileActive","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312952-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Stop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/Stop (0.06s)\n"} +{"Time":"2023-05-31T12:03:48.312954-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/Stop","Elapsed":0.06} +{"Time":"2023-05-31T12:03:48.312955-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/EnableAddonAfterStop (0.09s)\n"} +{"Time":"2023-05-31T12:03:48.312957-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/EnableAddonAfterStop","Elapsed":0.09} +{"Time":"2023-05-31T12:03:48.312958-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Output":" --- FAIL: TestStartStop/group/newest-cni/serial/SecondStart (5.24s)\n"} +{"Time":"2023-05-31T12:03:48.31296-07:00","Action":"fail","Test":"TestStartStop/group/newest-cni/serial/SecondStart","Elapsed":5.24} +{"Time":"2023-05-31T12:03:48.312961-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop (0.00s)\n"} +{"Time":"2023-05-31T12:03:48.312964-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/UserAppExistsAfterStop","Elapsed":0} +{"Time":"2023-05-31T12:03:48.312965-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Output":" --- PASS: TestStartStop/group/newest-cni/serial/AddonExistsAfterStop (0.00s)\n"} +{"Time":"2023-05-31T12:03:48.312967-07:00","Action":"pass","Test":"TestStartStop/group/newest-cni/serial/AddonExistsAfterStop","Elapsed":0} +{"Time":"2023-05-31T12:03:48.312968-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Output":" --- FAIL: TestStartStop/group/newest-cni/serial/VerifyKubernetesImages (0.07s)\n"} +{"Time":"2023-05-31T12:03:48.312969-07:00","Action":"fail","Test":"TestStartStop/group/newest-cni/serial/VerifyKubernetesImages","Elapsed":0.07} +{"Time":"2023-05-31T12:03:48.312971-07:00","Action":"output","Test":"TestStartStop/group/newest-cni/serial/Pause","Output":" --- FAIL: TestStartStop/group/newest-cni/serial/Pause (0.10s)\n"} +{"Time":"2023-05-31T12:03:48.312972-07:00","Action":"fail","Test":"TestStartStop/group/newest-cni/serial/Pause","Elapsed":0.1} +{"Time":"2023-05-31T12:03:48.312973-07:00","Action":"fail","Test":"TestStartStop/group/newest-cni/serial","Elapsed":17.23} +{"Time":"2023-05-31T12:03:48.312975-07:00","Action":"fail","Test":"TestStartStop/group/newest-cni","Elapsed":17.48} +{"Time":"2023-05-31T12:03:48.312976-07:00","Action":"fail","Test":"TestStartStop/group","Elapsed":0} +{"Time":"2023-05-31T12:03:48.312977-07:00","Action":"fail","Test":"TestStartStop","Elapsed":189.8} +{"Time":"2023-05-31T12:03:48.312979-07:00","Action":"output","Output":"FAIL\n"} +{"Time":"2023-05-31T12:03:48.312981-07:00","Action":"output","Output":"Tests completed in 21m2.448088s (result code 1)\n"} +{"Time":"2023-05-31T12:03:48.314124-07:00","Action":"fail","Elapsed":1263.018}